scispace - formally typeset
Search or ask a question
Institution

Jaypee Institute of Information Technology

EducationNoida, Uttar Pradesh, India
About: Jaypee Institute of Information Technology is a education organization based out in Noida, Uttar Pradesh, India. It is known for research contribution in the topics: Cluster analysis & Wireless sensor network. The organization has 2136 authors who have published 3435 publications receiving 31458 citations. The organization is also known as: JIIT Noida.


Papers
More filters
Journal ArticleDOI
TL;DR: A game-theoretic approach is used to model the interactions between the vehicles providing and consuming offloading services and the proposed model is proven to be highly scalable and well suited for microtransactions or frequent data transfer among the nodes in the vehicular network.
Abstract: Data sharing and content offloading among vehicles is an imperative part of the Internet of Vehicles (IoV). A peer-to-peer connection among vehicles in a distributed manner is a highly promising solution for fast communication among vehicles. To ensure security and data tracking, existing studies use blockchain as a solution. The Blockchain-enabled Internet of Vehicles (BIoV) requires high computation power for the miners to mine the blocks and let the chain grow. Over and above, the blockchain consensus is probabilistic and the block generated today can be eventually declared as a fork and can be pruned from the chain. This reduces the overall efficiency of the protocol because the correct work done initially is eventually not used if it becomes a fork. To address these challenges, in this paper, we propose a Directed Acyclic Graph enabled IoV (DAGIoV) framework. We make use of a tangle data structure where each node acts as a miner and eventually the network achieves consensus among the nodes. A game-theoretic approach is used to model the interactions between the vehicles providing and consuming offloading services. The proposed model is proven to be highly scalable and well suited for microtransactions or frequent data transfer among the nodes in the vehicular network.

65 citations

Journal ArticleDOI
TL;DR: The supply chain’s security-critical application areas are discussed and a detailed survey of the security issues in the existing supply chain architecture is presented.
Abstract: The rapid improvement in the global connectivity standards has escalated the level of trade taking place among different parties. Advanced communication standards are allowing the trade of all types of commodities and services. Furthermore, the goods and services developed in a particular region are transcending boundaries to enter into foreign markets. Supply chains play an essential role in the trade of these goods. To be able to realize a connected world with no boundary restrictions in terms of goods and services, it is imperative to keep the associated supply chains transparent, secure, and trustworthy. Therefore, some fundamental changes in the current supply chain architecture are essential to achieve a secure trade environment. This article discusses the supply chain’s security-critical application areas and presents a detailed survey of the security issues in the existing supply chain architecture. Various emerging technologies, such as blockchain, machine learning (ML), and physically unclonable functions (PUFs) as solutions to the vulnerabilities in the existing infrastructure of the supply chain have also been discussed. Recent studies reviewed in this work reveal a growing sentiment in the industry toward new and emerging technologies, such as Internet of Things (IoT), blockchain, and ML. While many organizations have already adopted IoT applications and artificial intelligence systems in their businesses, widespread adoption of blockchain remains distant. It has also been found that over the past decade, PUF-based authentication systems have gained much ground. However, a proper reference model for their implementation in complex supply chains is still missing.

65 citations

Journal ArticleDOI
TL;DR: In this article, the authors present a detailed review of the security-critical drone applications, and security-related challenges in drone communication such as DoS attacks, Man-in-the-middle attacks, De-Authentication attacks, and so on.
Abstract: Drone security is currently a major topic of discussion among researchers and industrialists. Although there are multiple applications of drones, if the security challenges are not anticipated and required architectural changes are not made, the upcoming drone applications will not be able to serve their actual purpose. Therefore, in this paper, we present a detailed review of the security-critical drone applications, and security-related challenges in drone communication such as DoS attacks, Man-in-the-middle attacks, De-Authentication attacks, and so on. Furthermore, as part of solution architectures, the use of Blockchain, Software Defined Networks (SDN), Machine Learning, and Fog/Edge computing are discussed as these are the most emerging technologies. Drones are highly resource-constrained devices and therefore it is not possible to deploy heavy security algorithms on board. Blockchain can be used to cryptographically store all the data that is sent to/from the drones, thereby saving it from tampering and eavesdropping. Various ML algorithms can be used to detect malicious drones in the network and to detect safe routes. Additionally, the SDN technology can be used to make the drone network reliable by allowing the controller to keep a close check on data traffic, and fog computing can be used to keep the computation capabilities closer to the drones without overloading them.

65 citations

Journal ArticleDOI
TL;DR: The present review focuses on highlighting the implications of air pollution in deteriorating cardiac health and the mechanisms leading to these harmful effects on the cardiovascular system.

64 citations

Journal ArticleDOI
TL;DR: In this paper, a sufficient condition for implementation of quantum dialogue protocol is obtained and it is shown that the set of unitary operators used for the purpose must form a group under multiplication, and a generalized protocol of quantum dialogues is obtained using the sufficient condition.

63 citations


Authors

Showing all 2176 results

NameH-indexPapersCitations
Sanjay Gupta9990235039
Mohsen Guizani79111031282
José M. Merigó5536110658
Ashish Goel502059941
Avinash C. Pandey453017576
Krishan Kumar352424059
Yogendra Kumar Gupta351834571
Nidhi Gupta352664786
Anirban Pathak332143508
Amanpreet Kaur323675713
Navneet Sharma312193069
Garima Sharma31973348
Manoj Kumar301082660
Rahul Sharma301893298
Ghanshyam Singh292632957
Network Information
Related Institutions (5)
Birla Institute of Technology and Science
13.9K papers, 170K citations

90% related

Indian Institute of Technology Roorkee
21.4K papers, 419.9K citations

89% related

Jadavpur University
27.6K papers, 422K citations

89% related

VIT University
24.4K papers, 261.8K citations

89% related

Indian Institute of Technology Guwahati
17.1K papers, 257.3K citations

88% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
202321
202258
2021401
2020395
2019464
2018366