Follow
Gulshan Kumar, SMIEEE
Gulshan Kumar, SMIEEE
Lovely Professional University, Punjab, SPRITZ Research Group, Department of Mathematics, University
Verified email at unipd.it
Title
Cited by
Cited by
Year
Proof-of-work consensus approach in blockchain technology for cloud and fog computing using maximization-factorization statistics
G Kumar, R Saha, MK Rai, R Thomas, TH Kim
IEEE Internet of Things Journal 6 (4), 6835-6842, 2019
1422019
Privacy Ensured -Healthcare for Fog-Enhanced IoT Based Applications
R Saha, G Kumar, MK Rai, R Thomas, SJ Lim
IEEE Access 7, 44536-44543, 2019
1112019
A novel trust evaluation process for secure localization using a decentralized blockchain in wireless sensor networks
TH Kim, R Goyat, MK Rai, G Kumar, WJ Buchanan, R Saha, R Thomas
IEEE access 7, 184133-184144, 2019
952019
Decentralized accessibility of e-commerce products through blockchain technology
G Kumar, R Saha, WJ Buchanan, G Geetha, R Thomas, MK Rai, TH Kim, ...
Sustainable Cities and Society 62, 102361, 2020
882020
Internet-of-Forensic (IoF): A blockchain based digital forensics framework for IoT applications
G Kumar, R Saha, C Lal, M Conti
Future Generation Computer Systems 120, 13-25, 2021
762021
A taxonomy of security issues in Industrial Internet-of-Things: Scoping review for existing solutions, future implications, and research challenges
P Jayalaxmi, R Saha, G Kumar, N Kumar, TH Kim
IEEE Access 9, 25344-25359, 2021
622021
Blockchain-based data storage with privacy and authentication in internet of things
R Goyat, G Kumar, M Alazab, M Conti, MK Rai, R Thomas, R Saha, ...
IEEE Internet of Things Journal 9 (16), 14203-14215, 2020
552020
Blockchain powered secure range-free localization in wireless sensor networks
R Goyat, G Kumar, MK Rai, R Saha, R Thomas, TH Kim
Arabian Journal for Science and Engineering 45, 6139-6155, 2020
502020
Secure device-to-device communications for 5g enabled internet of things applications
GS Gaba, G Kumar, TH Kim, H Monga, P Kumar
Computer Communications 169, 114-128, 2021
472021
A privacy-preserving secure framework for electric vehicles in IoT using matching market and signcryption
G Kumar, R Saha, MK Rai, WJ Buchanan, R Thomas, G Geetha, ...
IEEE Transactions on Vehicular Technology 69 (7), 7707-7722, 2020
472020
Robust and Lightweight Key Exchange (LKE) Protocol for Industry 4.0
GS GABA, G KUMAR, H MONGA, TAIH KIM, M LIYANAGE
IEEE Access 8, 132808-132824, 2020
452020
A privacy preserving distributed ledger framework for global human resource record management: The blockchain aspect
TH Kim, G Kumar, R Saha, MK Rai, WJ Buchanan, R Thomas, M Alazab
IEEE access 8, 96455-96467, 2020
452020
A survey on security challenges and solutions in the IOTA
M Conti, G Kumar, P Nerurkar, R Saha, L Vigneri
Journal of Network and Computer Applications 203, 103383, 2022
442022
A secure localization scheme based on trust assessment for WSNs using blockchain technology
R Goyat, G Kumar, M Alazab, R Saha, R Thomas, MK Rai
Future Generation Computer Systems 125, 221-231, 2021
442021
RK-AES: an improved version of AES using a new key generation process with random keys
R Saha, G Geetha, G Kumar, T Kim
Security and Communication Networks 2018, 1-11, 2018
432018
A survey and taxonomy of consensus protocols for blockchains
A Singh, G Kumar, R Saha, M Conti, M Alazab, R Thomas
Journal of Systems Architecture 127, 102503, 2022
422022
Robust and lightweight mutual authentication scheme in distributed smart environments
GS Gaba, G Kumar, H Monga, TH Kim, P Kumar
IEEE Access 8, 69722-69733, 2020
422020
Machine and deep learning solutions for intrusion detection and prevention in IoTs: A survey
PLS Jayalaxmi, R Saha, G Kumar, M Conti, TH Kim
IEEE Access 10, 121173-121192, 2022
372022
An energy efficient and optimized load balanced localization method using CDS with one-hop neighbourhood and genetic algorithm in WSNs
G Kumar, MK Rai
Journal of Network and Computer Applications 78, 73-82, 2017
362017
Multidimensional security provision for secure communication in vehicular ad hoc networks using hierarchical structure and end-to-end authentication
G Kumar, R Saha, MK Rai, TH Kim
IEEE Access 6, 46558-46567, 2018
342018
The system can't perform the operation now. Try again later.
Articles 1–20