scispace - formally typeset
T

Tejasvi Alladi

Researcher at Birla Institute of Technology and Science

Publications -  22
Citations -  1299

Tejasvi Alladi is an academic researcher from Birla Institute of Technology and Science. The author has contributed to research in topics: Computer science & Deep learning. The author has an hindex of 8, co-authored 15 publications receiving 447 citations. Previous affiliations of Tejasvi Alladi include Carleton University.

Papers
More filters
Journal ArticleDOI

Blockchain Applications for Industry 4.0 and Industrial IoT: A Review

TL;DR: This paper comprehensively review existing blockchain applications in Industry 4.0 and IIoT settings, and presents the current research trends in each of the related industrial sectors, as well as successful commercial implementations of blockchain in these relevant sectors.
Journal ArticleDOI

Consumer IoT: Security Vulnerability Case Studies and Solutions

TL;DR: The common attacks faced by consumer IoT devices are described and potential mitigation strategies are suggested, in the hope that the findings will inform the future design of IoT devices.
Journal ArticleDOI

Blockchain in Smart Grids: A Review on Different Use Cases

TL;DR: The blockchain can be used for peer-to-peer energy trading, where a credit-based payment scheme can enhance the energy trading process and efficient data aggregation schemes based on the blockchain technology can overcome the challenges related to privacy and security in the grid.
Journal ArticleDOI

Applications of blockchain in unmanned aerial vehicles: A review

TL;DR: Various applications of blockchain in UAV networks such as network security, decentralized storage, inventory management, surveillance, etc., are reviewed and various challenges to be addressed in the integration of blockchain and UAVs are discussed.
Journal ArticleDOI

SecAuthUAV: A Novel Authentication Scheme for UAV-Ground Station and UAV-UAV Communication

TL;DR: A lightweight mutual authentication scheme based on Physical Unclonable Functions for UAV-GS authentication is presented and is resilient against many security attacks such as masquerade, replay, node tampering, and cloning attacks, etc.