ILA KAUSHIK

@kiet.edu

ASSISTANT PROFESSOR
KIET GHAZIABAD



              

https://researchid.co/ila.kaushik

EDUCATION

Ambedkar Institute of Advanced Communication Technologies and Research: Geeta Colony, Delhi, INDIA

RESEARCH INTERESTS

WSN, IoT

29

Scopus Publications

815

Scholar Citations

18

Scholar h-index

29

Scholar i10-index

Scopus Publications

  • Plant disease detection using a depth-wise separable-based adaptive deep neural network
    Ila Kaushik, Nupur Prakash, and Anurag Jain

    Springer Science and Business Media LLC

  • Applicability of IoT for Smart Agriculture: Challenges Future Research Direction
    Ila Kaushik and Nupur Prakash

    IEEE
    The ever-increasing population gave rise towards shift from traditional farming to modern farming methods. Limited availability of land, diminishing natural resources, unpredictable weather conditions resulting in food scarcity which is major concern which must be addressed. In order to increase the productivity and efficiency of agricultural land, Internet of things (IoT) offers many features in smart farming like monitoring of water, farm, soil, management of irrigation facilities, detection of pests and diseases, asset tracking, greenhouse farming, remotely control and diagnosis of farming related equipment etc. This paper presents different applications of IoT in smart agriculture and how productivity has increased which results in adding economic growth to the country using advanced technologies in agriculture industry.

  • Integration of blockchain and IoT (B-IoT): Architecture, solutions, & future research direction
    Vikash Kumar Aggarwal, Nikhil Sharma, Ila Kaushik, Bharat Bhushan, and Himanshu

    IOP Publishing

  • Blockchain Technology for Industry 4.0 Applications: Issues, Challenges and Future Research Directions
    Himanshu, Rishu Rana, Nikhil Sharma, Ila Kaushik, and Bharat Bhushan

    CRC Press

  • Applicability of Machine Learning Algorithms for Intelligent Farming
    Bharti Verma, Nikhil Sharma, Ila Kaushik, and Bharat Bhushan

    Springer International Publishing

  • Integration of Blockchain IoT in Precision Farming: Exploration, Scope and Security Challenges
    Ila Kaushik, Nupur Prakash, and Anurag Jain

    IEEE
    Internet of things (IoT) plays a major role in every field. It helps in transforming the way with the use of sensors, edge devices and its infrastructure. As sensors are major source of information gathering which is stored on the cloud and relevant information is being retrieved. Information is passed at various levels of IoT ecosystem, which takes security into consideration. With the growth of interconnected devices, data security is becoming increasingly complex. The necessity arising for building a secure and smart structure leads in combining blockchain technology with IoT based system in precision agriculture. With the use of blockchain, traditional methods utilized for collecting and sharing agriculture data are replaced with transparent, reliable and decentralized data storage methods. This combined approach helps us in maintaining an autonomous precise agriculture system and managing in more secure and optimized ways. This paper presents a comprehensive approach on highlighting the importance of integrating blockchain technology with smart agriculture. This paper also proposes novel approach to blockchain models which are used as alternate solutions for challenges faced by IoT based smart agriculture. Various sub sectors like food supply chain, livestock grazing, and crops overseeing are also managed using blockchain platform. Later section of the paper focuses on open challenges and issues while developing blockchain based IoT system used in precision farming.

  • Attacks and Security Measures in Wireless Sensor Network
    Nikhil Sharma, Ila Kaushik, Vikash Kumar Agarwal, Bharat Bhushan, and Aditya Khamparia

    Wiley

  • Applicability of Blockchain Technology in Healthcare Industry: Applications, Challenges, and Solutions
    Nikhil Sharma, Bharat Bhushan, Ila Kaushik, and Narayan C. Debnath

    Springer International Publishing

  • A green 6G network era: Architecture and propitious technologies
    Sukriti Goyal, Nikhil Sharma, Ila Kaushik, Bharat Bhushan, and Nitin Kumar

    Springer Singapore

  • Depression anatomy using combinational deep neural network
    Apeksha Rustagi, Chinkit Manchanda, Nikhil Sharma, and Ila Kaushik

    Springer Singapore
    Depression is a temperament syndrome that causes a tenacious emotion of wretchedness and loss of interest in any activity. It is a supreme root of mental illness, which has established the growth in the risk of early death and economic burden to a country. Traditional clinical analysis procedures are subjective, complex and need considerable contribution of professionals. The turn of the century saw incredible progress in using deep learning for medical diagnosis. Though, prediction and implementation of mental state can be remarkably hard. In this paper, we present Combinational Deep Neural Network (CDNN) for automated depression detection with facial images and text data using amalgamation of Convolutional Neural Network (CNN) and Recurrent Neural Network (RNN). Thereafter, combining the prediction scores of both CNN and RNN model and level of depression is decided on the basis of the range of the predefined depression-level scores. Simulation outcomes based on real-field channel measurements show that the proposed model can significantly predict depression with superior performance.

  • Security issues & seclusion in bitcoin system
    Depender Kumar Soni, Harbhajan Sharma, Bharat Bhushan, Nikhil Sharma, and Ila Kaushik

    IEEE
    In the dawn of crypto-currencies the most talked currency is Bitcoin. Bitcoin is widely flourished digital currency and an exchange trading commodity implementing peer-to-peer payment network. No central athourity exists in Bitcoin. The users in network or pool of bitcoin need not to use real names, rather they use pseudo names for managing and verifying transactions. Due to the use of pseudo names bitcoin is apprehended to provide anonymity. However, the most transparent payment network is what bitcoin is. Here all the transactions are publicly open. To furnish wholeness and put a stop to double-spending, Blockchain is used, which actually works as a ledger for management of Bitcoins. Blockchain can be misused to monitor flow of bitcoins among multiple transactions. When data from external sources is amalgamated with insinuation acquired from the Blockchain, it may result to reveal user’s identity and profile. In this way the activity of user may be traced to an extent to fraud that user. Along with the popularity of Bitcoins the number of adversarial attacks has also gain pace. All these activities are meant to exploit anonymity and privacy in Bitcoin. These acivities result in loss of bitcoins and unlawful profit to attackers. Here in this paper we tried to present analysis of major attacks such as malicious attack, greater than 52% attacks and block withholding attack. Also this paper aims to present analysis and improvements in Bitcoin’s anonymity and privacy.

  • Importunity evolution of IoT for 5G
    Anas Ahmad, Bharat Bhushan, Nikhil Sharma, Ila Kaushik, and Saurabh Arora

    IEEE
    This With the ever-growing demand of high internet connectivity and ease of life Internet of Things in 5G has become the need of the hour as it has been the most sort out topic for researchers. The 4G industry has brought a revolution with it in the field of internet connectivity but is quite not enough for advanced IoT device demands and challenges. The upgrade in wireless communication is much needed for a much brighter and advanced future. The 5G will bring better Quality of Service, reliability and scalability to the IoT industry. In this paper we have discussed about the security issues and attacks that can affect working of Internet of Things. We have also explained in detail about the architecture of the 5G IoT system. That is why we have highlighted some of the major application and security aspects of 5G IoT.

  • Evolution of 5G wireless network in IoT
    Saurabh Arora, Nikhil Sharma, Bharat Bhushan, Ila Kaushik, and Anas Ahmad

    IEEE
    The fundamental feature of internet of things (IoT) is to integrate the sensing technology along with the technology of radio frequency identification and port these technology on the devices produced now-a-days. As of now the IoT has been facing many issues like poor security measures, high maintenance cost and least reliable. So, there is a need of new emerging technology like 5G which could resolve all these issues. 5G has the capability to introduce features like ultra-dense network support, high reliability with world class security measure. Which make the production of new devices with advance technology highly cost effective. So, in this paper we are going to discuss about what were the IoT based devices were facing before the introduction of emerging technology like 5G and how will be able to resolve out all those issues. Lastly, we will discuss how 5G along with IoT could bring a revolution in the existing technology.

  • Hand written digit recognition using machine learning
    Rohan Sethi and Ila Kaushik

    IEEE
    Hand-written character and digit recognition have been one of the most exigent and engrossing field of pattern recognition and image processing. The main aim of this paper is to demonstrate and represent the work which is related to hand-written digit recognition. The hand-written digit recognition is a very exigent task. In this recognition task, the numbers are not accurately written or scripted as they differ in shape or size; due to which the feature extraction and segmentation of hand-written numerical script is arduous. The vertical and horizontal projections methods are used for the purpose of segmentation in the proposed work. SVM is applied for recognition and classification, while Convex hull algorithm is applied for feature extraction.

  • Precedence & issues of IoT based on edge computing
    Sukriti Goyal, Nikhil Sharma, Ila Kaushik, Bharat Bhushan, and Abhijeet Kumar

    IEEE
    In the network of IoT, a huge amount of data is frequently generated, major messages through complicated networks serving device-to-device communications are swapped and also, sensitive smart world frameworks are controlled and monitored by thousands of gadgets and sensors. To extenuate the acceleration of overcrowding of resources in the network, as an approach edge computing, has risen as a modern approach to resolve requirements of confined computing as well as IoT. In this paper, a brief introduction of Internet of Things and edge computing is discussed which consists of general concepts of IoT and its components, basic introduction of edge computing, and structure of edge computing. After that, fundamental concepts of cloud computing, edge computing and IoT are introduced by comparing their features with each other and a structure of IoT based on edge computing is also illustrated with a slight introduction of the architecture of both the edge computing and IoT. Moreover, the advantages of using the technology of edge computing to assist the technology of IoT are provided as well as the efficiency of integrating these two technologies together is demonstrated. Then, the issues like security and privacy, advanced communication etc. related to combination of IoT and edge computing system are discussed and finally, the conclusion of the paper is presented. So, basically, in this paper, an extensive survey is conducted to analyze how the usage of edge computing progresses the performance of systems of IoT. The performance of edge computing is studied by comparing delay of network, occupation of bandwidth, power utilization, and many other characteristics.

  • Producing energy using blind man stick
    Depender Kumar Soni, Nikhil Sharma, Ila Kaushik, and Bharat Bhushan

    IEEE
    We all are familiar with the problems a blind person faces while performing several daily life activities. These problems are generally related to walking on roads, walking on ramps, movement in staircases, looking for path in crowded streets and market places and many other situations. Of course, many of us come ahead to help them by guiding their way, but sometimes it becomes a matter of self-respect, or say, the person is not willing to take help from others or even it is possible that nobody may be available to help. Think of a situation when a blind person is alone and an Electronic Travel Aid Stick suddenly stops working due to a completely discharged battery system. This paper aims to build a device that can generate that much amount of energy that is required to run the electronic systems efficiently so that it can prevent visually impaired people from suffering in difficult situations.

  • Blockchain as a solution for security attacks in named data networking of things
    Sukriti Goyal, Nikhil Sharma, Ila Kaushik, and Bharat Bhushan

    Elsevier

  • Black Hole Attack and Its Security Measure in Wireless Sensors Networks
    Ila Kaushik and Nikhil Sharma

    Springer International Publishing
    Computers are being reasonably important part of our daily lives. Different solutions were introduced for its connectivity such as wired approach which existed for longer duration of time. But due to advancement in field of technology wireless connectivity came into picture for connectivity to internet, exchanging information etc. One of suited network based on wireless standard is wireless sensor network (WSN). WSN comprises of a number of small motes that are distributed in random manner in any environment. The motes communicate with one another in their resource domain using low power communication medium. WSN possesses many characteristics but difficulty arises in its energy management, security aspect and deployment. Communication take place over radio environment and are prone to various attacks. Some of the attacks include Black hole attack, Gray hole attack, sinkhole attack etc. In this paper we are discussing network layer Black hole attack along with its security measure to decrease its effect in the network.

  • Architectural Model of Security Threats theirCountermeasures in IoT
    Tanishq Varshney, Nikhil Sharma, Ila Kaushik, and Bharat Bhushan

    IEEE
    Internet of Things (IoT) depicts a future technology where devices establish a connection with internet for building the intelligent structural system and to implement self-configuration system IoT is an internetworking of devices which are physically present, function of that device is to sense the data In today’s scenario IoT involves with different technologies like blockchain, WSN and many more to give better results. Also, IoT has various implementations like in healthcare, wearables, farming etc. Main objective of IoT is to produce a helpful communication between any two heterogeneous devices, which are physically present at various locations with the help of technology of networking. Applications and implementations of IoT is increasing day-by-day, to secure and maintain Confidentiality, Integrity, Availability (CIA) and other parameters becomes very crucial. We have discussed the principles of IoT in this paper, then comparison between the IoT and Traditional IT services is being discussed. Appropriate techniques and mechanisms to build a secure framework for covering all the IoT layers is being shown in this paper. This paper also discusses about the privacy and security challenges faced during the designing of IoT network. Then the security measures proposed by various researchers is being highlighted in this paper, so as to make a reliable IoT network.

  • Evolution of IoT Data Analytics using Deep Learning
    Ratik Tiwari, Nikhil Sharma, Ila Kaushik, Archit Tiwari, and Bharat Bhushan

    IEEE
    In today’s world, we are surrounded by enormous devices that sense some sort of data and gives a particular output. To track the record and manage that data by connecting all devices in a network in such an efficient manner that it can be utilized in favour of mankind, this is what we call as Internet of Things. It is very difficult task to manage such a huge amount of data with great efficiency, but here the Internet of Things along with concepts of Deep Learning plays a vital role in successful completion of the task. In this paper, you are about see an absolute overview about the analytics that are used to maintain and process huge amount of input data using the concepts of Deep Learning in the very domain of Internet of Things. Firstly, we start by giving a brief description about Internet of Things and some characteristics and requirements possessed by it. We will also explain some major key factors that make deep learning a good choice for implementation of Internet of Things. Also, we have discussed about the concept of Big Data and what role it has in Internet of Things. We have evaluated some research attempts made in the very domain of Internet of Things and Deep Learning. Finally, we have explained some real-life applications and the concept behind them in this paper.

  • Analysis of Various Machine Learning Algorithm for Cardiac Pulse Prediction
    Mahima Harjani, Moksh Grover, Nikhil Sharma, and Ila Kaushik

    IEEE
    By applying machine learning algorithms, patterns are identified or recognized in the process of Pattern Recognition. On the grounds of prior knowledge, the data is collected and sorted. In this method, the raw data is transformed into a susceptible form which can be used by the machine. Electrocardiogram (ECG) Pattern Recognition is the main focus of this paper. ECG keeps a track of heart’s electrical activity. In the field of biometric it is used as a robust biometric. On the person, off the person and in the person, are the three categories for tracking and capturing signals. Only Off-the-person category in which there is no or minimal skin contact, is included in this paper. To analyze and implement data, six baseline methods are utilized. These baseline methods are applied two publicly available databases-CYBHi and UofT. Raw signals and spectrogram of heartbeat are used for studying about representing features. Various machine learning algorithms are also discussed. Implementation for predicting heartbeat as normal or abnormal and heart diseases, is performed.

  • Traffic control using V-2-V Based Method using Reinforcement Learning
    Moksh Grover, Bharti Verma, Nikhil Sharma, and Ila Kaushik

    IEEE
    Nowadays with the increase in advancement of traffic network methodology we have potentials to control traffic congestion and hindrance using huge range of traffic management strategies. Feasibly there are two most promising techniques proffered are chaos theory and reinforcement leaning techniques, the goal of this research technique is to make up a model that self-sufficiently learns by itself the optimal policy. In this paper, we use V-2-V based fuzzy node mechanism and chaos theory that notifies where the traffic could get clustered. On other hand, our reinforcement learning agent makes up discretions (signal status) for the proffered environment.

  • Authentication Encryption Based Security Services in Blockchain Technology
    Tanishq Varshney, Nikhil Sharma, Ila Kaushik, and Bharat Bhushan

    IEEE
    Without any involvement of third party, block chain has shown tremendous potential in establishing secure links with IoT.This technology can be widely used without using any centralized authority. By combining both the technologies throughput of the system can be enhanced. Due to its various applications it is being widely used in almost every field which makes it vulnerable to various attacks. In this paper, blockchain architecture along with its key properties has been discussed. Later part of paper comprises of various security principles such as confidentiality, integrity and availability, various attacks on network along with its countermeasures.

  • Network Layers Threats its Countermeasures in WSNs
    Vardaan Pruthi, Kanika Mittal, Nikhil Sharma, and Ila Kaushik

    IEEE
    WSN can be termed as a collection of dimensionally diffused nodes which are capable of surveilling and analyzing their surroundings. The sensors are delicate, transportable and small in size while being economical at the same time. However, the diffused nature of these networks also exposes them to a variety of security hazards. Hence, ensuring a reliable file exchange in these networks is not an easy job due to various security requirements that must be fulfilled. In this paper we concentrate mainly on network layer threats and their security countermeasures to overcome the scope of intruders to access the information without having any authentication on the network layer. Various network layer intrusions that are discussed here include Sinkhole Attack, Sybil Attack, Wormhole Attack, Selective Forwarding Attack, Blackhole Attack And Hello Flood Attack.

  • Privacy Issues Security Techniques in Big Data
    Archit Tiwari, Nikhil Sharma, Ila Kaushik, and Ratik Tiwari

    IEEE
    Big Data, as the name suggests is a process of collection of information in a very large amount and storing it in a multidimensional database of various organizations and thereby performing Analytical operations on it to increase their efficiency and enhance their ability of decision making. Strategies can be made using this technology which uses real time using Big Data Analytics. The main advantage of the technology of big data is that the user gets a complete and an accurate view of answers to all those questions raised by the user in processes related to business decisions. Moreover, the errors which exist within any organization can be identified with the help of this technology. This is due to the real time intuition which helps the organizations identify the errors. Also, in case if any on sanctioned user intends to cheat the organization with the valuable data stored at the database of the organization, the it can be detected at the instant it happens and so suitable measures can be taken against that unsanctioned user. Despite of having so many advantages, it has some limitations also. One of the main issues of concern of this technology is Privacy security. This paper focuses on identifying the threats related to data privacy information stored on the database of the organization and access control systems.

RECENT SCHOLAR PUBLICATIONS

  • Recent innovations in building smart irrigation systems
    I Kaushik, N Prakash, A Jain
    Automation and Computation, 203-213 2023

  • Cryptocurrency Revolution: Bitcoin Time Forecasting & Blockchain Anomaly Detection
    N Sharma, I Kaushik, B Bhushan, CK Dixit
    Blockchain Technology in Healthcare Applications, 61-85 2022

  • Integration of Blockchain& IoT in Precision Farming: Exploration, Scope and Security Challenges
    I Kaushik, N Prakash, A Jain
    2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile 2021

  • Applicability of machine learning algorithms for intelligent farming
    B Verma, N Sharma, I Kaushik, B Bhushan
    Advanced soft computing techniques in data science, IoT and cloud computing 2021

  • 10 Blockchain Technology
    RR Himanshu, N Sharma, I Kaushik, B Bhushan
    Big Data Analysis for Green Computing: Concepts and Applications, 147 2021

  • Blockchain Technology for Industry 4.0 Applications: Issues, Challenges and Future Research Directions
    R Rana, N Sharma, I Kaushik, B Bhushan
    Big Data Analysis for Green Computing, 147-171 2021

  • Applicability of blockchain technology in healthcare industry: applications, challenges, and solutions
    N Sharma, B Bhushan, I Kaushik, NC Debnath
    Efficient Data Handling for Massive Internet of Medical Things: Healthcare 2021

  • Industrial revolution: blockchain as a wave for industry 4.0 and IIoT
    S Goyal, N Sharma, I Kaushik, B Bhushan
    Advances in computing communications and informatics, 108-130 2021

  • Blockchain-based cultivating ideas for growth: A New AGRONOMICS PERSPECTIVE
    BS Vishakha, N Sharma, B Bhushan, I Kaushik
    Advances in Computing Communications and Informatics, 195-219 2021

  • Performance evaluation using different routing protocols in MANETs
    I Kaushik, N Sharma, B Bhushan, S Gautam
    Integration of WSNs into internet of things, 101-120 2021

  • Applicability of IoT for smart agriculture: Challenges & future research direction
    I Kaushik, N Prakash
    2021 IEEE World AI IoT Congress (AIIoT), 0462-0467 2021

  • Attacks and security measures in wireless sensor network
    N Sharma, I Kaushik, VK Agarwal, B Bhushan, A Khamparia
    Intelligent Data Analytics for Terror Threat Prediction: Architectures 2021

  • Blockchain as a solution for security attacks in named data networking of things
    S Goyal, N Sharma, I Kaushik, B Bhushan
    Security and privacy issues in IoT devices and sensor networks, 211-243 2021

  • Integration of blockchain and IoT (B-IoT): architecture, solutions, & future research direction
    VK Aggarwal, N Sharma, I Kaushik, B Bhushan
    IOP conference series: materials science and engineering 1022 (1), 012103 2021

  • A green 6G network era: architecture and propitious technologies
    S Goyal, N Sharma, I Kaushik, B Bhushan, N Kumar
    Data Analytics and Management: Proceedings of ICDAM, 59-75 2021

  • Applicability of industrial IoT in diversified sectors: evolution, applications and challenges
    R Sethi, B Bhushan, N Sharma, R Kumar, I Kaushik
    Multimedia technologies in the Internet of Things environment, 45-67 2021

  • Depression anatomy using combinational deep neural network
    A Rustagi, C Manchanda, N Sharma, I Kaushik
    International Conference on Innovative Computing and Communications 2021

  • Blockchain as a Lifesaver of IoT: Applications, Security, and Privacy Services and Challenges
    S Goyal, N Sharma, I Kaushik, B Bhushan, A Kumar
    Security and Trust Issues in Internet of Things, 209-237 2020

  • Malware threat analysis of IoT devices using deep learning neural network methodologies
    M Grover, N Sharma, B Bhushan, I Kaushik, A Khamparia
    Security and Trust Issues in Internet of Things, 123-143 2020

  • Predictive analysis of type 2 diabetes using hybrid ML model and IoT
    A Sharma, N Sharma, I Kaushik, S Kumar, N Khatoon
    IoT security paradigms and applications, 303-320 2020

MOST CITED SCHOLAR PUBLICATIONS

  • Architectural model of security threats & theircountermeasures in iot
    T Varshney, N Sharma, I Kaushik, B Bhushan
    2019 international conference on computing, communication, and intelligent 2019
    Citations: 84

  • Applicability of industrial IoT in diversified sectors: evolution, applications and challenges
    R Sethi, B Bhushan, N Sharma, R Kumar, I Kaushik
    Multimedia technologies in the Internet of Things environment, 45-67 2021
    Citations: 66

  • Evolution of IoT & data analytics using deep learning
    R Tiwari, N Sharma, I Kaushik, A Tiwari, B Bhushan
    2019 international conference on computing, communication, and intelligent 2019
    Citations: 53

  • Authentication & encryption based security services in blockchain technology
    T Varshney, N Sharma, I Kaushik, B Bhushan
    2019 International Conference on Computing, Communication, and Intelligent 2019
    Citations: 44

  • Applicability of WSN and biometric models in the field of healthcare
    N Sharma, I Kaushik, B Bhushan, S Gautam, A Khamparia
    Deep Learning Strategies for Security Enhancement in Wireless Sensor 2020
    Citations: 43

  • Comfy smart home using IoT
    S Jadon, A Choudhary, H Saini, U Dua, N Sharma, I Kaushik
    Proceedings of the International Conference on Innovative Computing 2020
    Citations: 31

  • Hand written digit recognition using machine learning
    R Sethi, I Kaushik
    2020 IEEE 9th International Conference on Communication Systems and Network 2020
    Citations: 30

  • Analysis of various machine learning algorithm for cardiac pulse prediction
    M Harjani, M Grover, N Sharma, I Kaushik
    2019 International Conference on Computing, Communication, and Intelligent 2019
    Citations: 28

  • Blockchain as a solution for security attacks in named data networking of things
    S Goyal, N Sharma, I Kaushik, B Bhushan
    Security and privacy issues in IoT devices and sensor networks, 211-243 2021
    Citations: 27

  • Black hole attack and its security measure in wireless sensors networks
    I Kaushik, N Sharma
    Handbook of wireless sensor networks: issues and challenges in current 2020
    Citations: 27

  • Security countermeasures in web based application
    A Sharma, A Singh, N Sharma, I Kaushik, B Bhushan
    2019 2nd International Conference on Intelligent Computing, Instrumentation 2019
    Citations: 26

  • Taxonomy of attacks on web based applications
    A Singh, A Sharma, N Sharma, I Kaushik, B Bhushan
    2019 2nd International Conference on Intelligent Computing, Instrumentation 2019
    Citations: 26

  • Intrusion detection and security system for blackhole attack
    I Kaushik, N Sharma, N Singh
    2019 2nd International Conference on Signal Processing and Communication 2019
    Citations: 22

  • Network layers threats & its countermeasures in WSNs
    V Pruthi, K Mittal, N Sharma, I Kaushik
    2019 International Conference on Computing, Communication, and Intelligent 2019
    Citations: 21

  • Traffic control using V-2-V based method using reinforcement learning
    M Grover, B Verma, N Sharma, I Kaushik
    2019 International Conference on Computing, Communication, and Intelligent 2019
    Citations: 21

  • Integration of blockchain and IoT (B-IoT): architecture, solutions, & future research direction
    VK Aggarwal, N Sharma, I Kaushik, B Bhushan
    IOP conference series: materials science and engineering 1022 (1), 012103 2021
    Citations: 20

  • Precedence & issues of IoT based on edge computing
    S Goyal, N Sharma, I Kaushik, B Bhushan, A Kumar
    2020 IEEE 9th International Conference on Communication Systems and Network 2020
    Citations: 20

  • Importunity & evolution of IoT for 5G
    A Ahmad, B Bhushan, N Sharma, I Kaushik, S Arora
    2020 IEEE 9th international conference on communication systems and network 2020
    Citations: 19

  • Attacks and security measures in wireless sensor network
    N Sharma, I Kaushik, VK Agarwal, B Bhushan, A Khamparia
    Intelligent Data Analytics for Terror Threat Prediction: Architectures 2021
    Citations: 18

  • Privacy issues & security techniques in big data
    A Tiwari, N Sharma, I Kaushik, R Tiwari
    2019 International Conference on Computing, Communication, and Intelligent 2019
    Citations: 18

RESEARCH OUTPUTS (PATENTS, SOFTWARE, PUBLICATIONS, PRODUCTS)

1. Black Hole Attack and Its Security Measure in Wireless Sensors Networks. Advances in Intelligent Systems and Computing Handbook of Wireless Sensor Networks: Issues and Challenges in Current Scenarios, 401–416. doi: 10.1007/978-3-030-40305-8_20
2. Performance Measurement Using Different Shortest Path Techniques in Wireless Sensor Network. 2019 2nd International Conference on Signal Processing and Communication (ICSPC). doi: 10.1109/
3. Intrusion Detection and Security System for Blackhole Attack. 2019 2nd International Conference on Signal Processing and Communication (ICSPC). doi: 10.1109/
4. Analysis of Various Machine Learning Algorithm for Cardiac Pulse Prediction. 2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS). doi: 10.1109/
5. Evaluation of Accidental Death Records Using Hybrid Genetic Algorithm. SSRN Electronic Journal. doi: 10.2139/
6. Traffic control using V-2-V Based Method using Reinforcement Learning. 2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS). doi: 10.1109/
7. Architectural Model of Security Threats & their Countermeasures in IoT. 2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS). doi: 10.1109/
8. Network Layers Threats & its Countermeasures in WSNs. 2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS). doi: 10.1109/
9. Evolution of IoT & Data Analytics using Deep Learning. 2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS). doi: 10.1109/
10. Authentication & Encryption Based Security Services in Blockchain Technology. 2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS). doi: 10.1109/
11. Privacy Issues & Security Techniques in Big Data. 2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS). doi: 10.1109/
12. Security Countermeasures in Web Based Application. 2019 2nd International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT). doi: 10.1109/
13. Taxonomy of Attacks on Web Based Applications. 2019 2nd International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT). doi: 10.1109/
14. Comfy Smart Home using IoT. SSRN Electronic Journal. doi: 10.2139/
15. Producing Energy Using Blind Man Stick. 2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT). doi:10.1109/
16. Importunity & Evolution of IoT for 5G. 2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT). doi:10.1109/
17. Evolution of 5G Wireless Network in IoT. 2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT). doi:10.1109/
18. Hand Written Digit Recognition using Machine Learning. 2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT). doi:10.1109/
19. Precedence & Issues of IoT based on Edge Computing. 2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT). doi:10.1109/
20. Security issues of MAC layer in MANETS. 2017 International Journal of Security and Usability.