GK

Gulshan Kumar

27 records found

Authored

The Internet of Things (IoT) is a network of interconnected objects, which congregate and exchange gigantic amounts of data. Usually, predeployed embedded sensors sense this massive data. Soon, several applications of IoT are anticipated to exploit emerging 6G technology. Heal ...

VAIDANSHH

Adaptive DDoS detection for heterogeneous hosts in vehicular environments

Vehicular networks are vulnerable to Distributed Denial of Service (DDoS), an extension of a Denial of Service (DoS) attack. The existing solutions for DDoS detection in vehicular networks use various Machine Learning (ML) algorithms. However, these algorithms are applicable o ...

Lawful evidence management by law enforcement agencies during the Digital Forensics (DF) investigation is of supreme importance since it convicts suspects of crimes. Therefore, a secure and efficient evidence management system should have certain features such as tamper-resist ...

RAPCOL

A range-free power efficient cooperative localization with heterogeneous devices for industrial internet-of-things

Industrial applications and automation controls are closely connected with heterogeneous Wireless Sensor Network (WSN); thus, Industrial Internet-of Thing (IIoT) enhances the productivity, scalability, and flexibility of the operations. However, in many cases such as tracking ...

BENIGREEN

Blockchain-Based Energy-Efficient Privacy-Preserving Scheme for Green IoT

The energy conservative extension of the Internet of Things (IoT), green IoT, is a revolutionary approach in connecting people, processes, and things in an energy-efficient way. The existing research works in the domain of green IoT forbid the use of decentralized management ( ...

PIGNUS

A Deep Learning model for IDS in industrial internet-of-things

The heterogeneous nature of the Industrial Internet of Thing (IIoT) has a considerable impact on the development of an effective Intrusion Detection System (IDS). The proliferation of linked devices results in multiple inputs from industrial sensors. IDS faces challenges in an ...

COUNT

Blockchain framework for resource accountability in e-healthcare

The progress of sensor devices, digital communication, and computing techniques enhances the functionalities of e-healthcare, where the medical facilities are manageable based on the Internet. Now a days, e-healthcare not only helps in disease diagnosis, or tele-medicine, but ...

PoSC

Combined Score for Consensus in Intemet-of-Things Applications

The properties of decentralization, security, and immutability have made the blockchain technology beneficial for various Internet of Things (IoT) applications. Consensus algorithms enable the peers in IoT-based networks to reach a common agreement on the current state of the ...

Blockchain is an emerging decentralized and distributed technology. Along with the beneficial features of decentralization, transparency, and security the consensus algorithms of blockchains form key building blocks for this technology. Consensus protocol/algorithm helps to pr ...

The increasing number of connected devices in the era of Internet of Thing (IoT) has also increased the number intrusions. Intrusion Detection System (IDS) is a secondary intelligent system to monitor, detect, and alert about malicious activities; an Intrusion Prevention Syste ...

Internet of Thing (IoT) is one of the most influential technologies in the present time. People, processes, and things are connected with the Internet through IoT. With the increasing demands of user applications, the number of connections is also increasing exponentially. The ...

DeBot

A deep learning-based model for bot detection in industrial internet-of-things

In this paper, we show a deep learning model for bot detection, named as DeBot, for industrial network traffic. DeBot uses a novel Cascade Forward Back Propagation Neural Network (CFBPNN) model with a subset of features using the Correlation-based Feature Selection (CFS) techn ...

Wide-scale adoption of the Internet of Everything requires decentralized security, responsibility, and trust among the stakeholders. All these can be achieved by a Distributed Ledger Technology (DLT) backbone. As a mathematical model for enabling this DLT backbone, IOTA's Tang ...

Internet-of-Thing (IoT) faces various security attacks. Different solutions exist to mitigate the intrusion problems. However, the existing solutions lack behind in dealing with heterogeneity of attack sources and features. The future anticipated demand of devices' connections ...

Stopping Floods with Buckets

Attack and Countermeasure for IOTA Autopeering

Distributed Ledger Technology (DLT) is one of the most promising technology at present with applications in different domains, such as Cyber-Physical Systems (CPS) and Internet of Thing (IoT). IOTA is an example of Directed Acyclic Graph (DAG)-based DLTs applicable to IoT, add ...

Internet of Things (IoT) composed of large number of sensing devices with a variety of features applicable for various applications. In such scenarios, due to low data handling capabilities, limited storage, and security aspects, it is quite challenging to protect networks aga ...

DHACS

Smart Contract-Based Decentralized Hybrid Access Control for Industrial Internet-of-Things

The integration between blockchains, Internet-of-Thing (IoT), and smart contracts is an emerging and promising technology. The advantages of this technology have raised the importance of Industrial Internet-of-Thing (IIoT) and have paved the pathway for 'Industry 4.0.' Surpris ...

Reputation plays a fundamental role in the blockchain ecosystem, as it provides means to assign trust levels to participating nodes. Reputation is usually gained in time: The higher the fair participation of a node to the network, the higher its reputation. IOTA's Coordicide p ...

Internet-of-Forensic (IoF)

A blockchain based digital forensics framework for IoT applications

Digital forensic in Internet-of-Thing (IoT) paradigm is critical due to its heterogeneity and lack of transparency of evidence processing. Moreover, cross-border legalization makes a hindrance in such process pertaining to the cloud forensic issues. This urges a forensic frame ...

Knocking on Tangle's Doors

Security Analysis of IOTA Ports

Blockchains are currently deployed in a large number of different scenarios, such as cryptocurrencies, communications, factory automation, and vehicular networks. Both academia's and industry's interest in this technology is motivated by its distributed nature and its inherent ...