scispace - formally typeset
Search or ask a question
Author

Sanjay Deshmukh

Bio: Sanjay Deshmukh is an academic researcher. The author has contributed to research in topics: The Internet & IEEE 802.11e-2005. The author has an hindex of 1, co-authored 2 publications receiving 18 citations.

Papers
More filters
Journal ArticleDOI
TL;DR: The issues faced in implementing a secure IoV architecture are discussed and the various challenges in implementing security and privacy in IoV are examined by reviewing past papers along with pointing out research gaps and possible future work and putting forth on inferences relating to each paper.
Abstract: As an up-and-coming branch of the internet of things, internet of vehicles (IoV) is imagined to fill in as a fundamental information detecting and processing platform for astute transportation frameworks. Today, vehicles are progressively being associated with the internet of things which empower them to give pervasive access to data to drivers and travelers while moving. Be that as it may, as the quantity of associated vehicles continues expanding, new prerequisites, (for example, consistent, secure, vigorous, versatile data trade among vehicles, people, and side of the road frameworks) of vehicular systems are developing. Right now, the unique idea of vehicular specially appointed systems is being changed into another idea called the internet of vehicles (IoV). We talk about the issues faced in implementing a secure IoV architecture. We examine the various challenges in implementing security and privacy in IoV by reviewing past papers along with pointing out research gaps and possible future work and putting forth our on inferences relating to each paper.

30 citations

Journal ArticleDOI
TL;DR: This paper is concerned with establishing audio and video calls over Wireless LAN, using client-server model for this purpose, and a wireless router is used to create wireless LAN.
Abstract: Communication plays a paramount role in human life. Wireless LAN is more important because they can satisfy the requirements like mobility, relocation of the user and ad-hoc networking. Our paper \"Multimedia Transfer using Wireless LAN\" is concerned with establishing audio and video calls over Wireless LAN, We are using client-server model for this purpose, and a wireless router is used to create wireless LAN. Building wireless LAN is easier, cost effective and less time consuming than establishing wired LAN.

1 citations


Cited by
More filters
Journal Article
TL;DR: Calculations are developed and examined to reduce the entire quantity of Wireless access points as well as their locations in almost any given atmosphere while with the throughput needs and the necessity to ensure every place in the area can achieve a minimum of k APs.
Abstract: More particularly, calculations are developed and examined to reduce the entire quantity of Wireless access points as well as their locations in almost any given atmosphere while with the throughput needs and the necessity to ensure every place in the area can achieve a minimum of k APs. This paper concentrates on using Wireless for interacting with and localizing the robot. We've carried out thorough studies of Wireless signal propagation qualities both in indoor and outside conditions, which forms the foundation for Wireless AP deployment and communication to be able to augment how human operators communicate with this atmosphere, a mobile automatic platform is developed. Gas and oil refineries could be a harmful atmosphere for various reasons, including heat, toxic gasses, and unpredicted catastrophic failures. When multiple Wireless APs are close together, there's a possible for interference. A graph-coloring heuristic can be used to find out AP funnel allocation. Additionally, Wireless fingerprinting based localization is developed. All of the calculations implemented are examined in real life situations using the robot developed and answers are promising. For example, within the gas and oil industry, during inspection, maintenance, or repair of facilities inside a refinery, people might be uncovered to seriously high temps to have a long time, to toxic gasses including methane and H2S, and also to unpredicted catastrophic failures.

455 citations

Journal ArticleDOI
TL;DR: This article provides a comprehensive survey of research efforts to secure the industrial Internet of Things, discusses their applicability, and analyzes their security benefits.
Abstract: Given the tremendous success of the Internet of Things in interconnecting consumer devices, we observe a natural trend to likewise interconnect devices in industrial settings, referred to as industrial Internet of Things or Industry 4.0. While this coupling of industrial components provides many benefits, it also introduces serious security challenges. Although sharing many similarities with the consumer Internet of Things, securing the industrial Internet of Things introduces its own challenges but also opportunities, mainly resulting from a longer lifetime of components and a larger scale of networks. In this article, we identify the unique security goals and challenges of the industrial Internet of Things, which, unlike consumer deployments, mainly follow from safety and productivity requirements. To address these security goals and challenges, we provide a comprehensive survey of research efforts to secure the industrial Internet of Things, discuss their applicability, and analyze their security benefits.

107 citations

Journal ArticleDOI
TL;DR: This survey investigates the major research efforts over the period of 2013–2019 that address IoT security and privacy issues and provides extensive discussions on securing cloud-based IoT solutions, which include access control, integrity, and authentication.
Abstract: Since the term first coined in 1999, the Internet of Things (IoT) has gained significant momentum in connecting physical objects to the Internet and facilitating machine-to-human and machine-to-machine communications. By offering the capability to connect and integrate both digital and physical entities, IoT becomes an important paradigm that enables a whole new class of applications and services. Security is one of the most challenging issues that need to be addressed before these IoT applications and services can be fully embraced. In this survey, we investigate the major research efforts over the period of 2013–2019 that address IoT security and privacy issues. We provide extensive discussions on securing cloud-based IoT solutions. The main focus of these discussions is on securing the information in transit between IoT devices and IoT applications, where most of the data processing and modelling tasks take place. These discussions include all security aspects and challenges facing the data in transit. Specifically, a number of common attacks that target IoT solutions are first discussed, while presenting the main challenges of IoT security (e.g., the resource limitation of IoT devices, which hinder the ability of such devices to do expensive computations for securing the data). Then we present the main security requirements needed by IoT systems, which include access control, integrity, and authentication. We review recent research work in providing security and privacy services, which delegate the expensive computations to an edge or cloud, to cope with the low computations restrictions in IoT devices. Open research issues and possible research directions in securing cloud-based IoT systems are discussed, while proposing some possible solutions.

66 citations

Journal ArticleDOI
TL;DR: The extent to which some data categories have been used with ML-based solutions to preserve privacy and proposed novel opportunities for ML- based solutions to leverage these data sources in the IoT ecosystem are examined.

39 citations

Journal ArticleDOI
TL;DR: In this paper, the applicability of blockchain-based self-sovereign identity (SSI) solution in healthcare, their advantages and requirements, and a model use case for demonstrating the SSI application in healthcare.

38 citations