@pgdavcollege.edu.in
Assistant Professor in Department of Mathematics
PGDAV College, University of Delhi
* Authentication protocols for Information Security, IoT, Cloud Computing, Vehicular Cloud network and Supply
Chain Management.
* Cryptography, Blockchain, Bitcoin, Cryptocurrency, Number theory and Applied Mathematics.
Scopus Publications
Scholar Citations
Scholar h-index
Scholar i10-index
Samiulla Itoo, Musheer Ahmad, Vinod Kumar, and Ahmed Alkhayyat
Springer Science and Business Media LLC
Vinod Kumar, Gunjan Chorasiya, and Sathans Suhag
Deanship of Scientific Research
: The electric power assist steering (EPAS) system has, in the recent years, emerged as an e ff ective alternative to the conventional hydraulic powered steering system in new vehicles owing to its significant potential in minimizing energy utilization and enhancing the e ffi ciency of driving performance. In all new electrical vehicular technology, for all sub-systems, there is a requirement of battery energy; hence energy conservation is the first essential criterion to be met. In this work, therefore, recent meta-heuristic techniques are implemented to optimally tune the proportional, integral, and derivative with filter (PIDF) controller, applied over the EPAS system, to realize the assist current reduction for its operation. The results establish the e ff ectiveness of the novel proposition in reducing the assist current and minimizing the energy demand as compared to the conventional tuning. Apart from this, the drive torque is also reduced. Matlab ® platform is used for modelling and simulations.
Khushboo Gupta and Vinod Kumar
Springer Nature Singapore
Pradeep Kumar Tiwari, Narendra Kumar Shukla, Vinod Kumar, Animesh Tripathi, and Shiv Prakash
Springer Nature Singapore
Neeraj Patel and Vinod Kumar
Springer Science and Business Media LLC
Akber Ali Khan, Vinod Kumar, Jangirala Srinivas, Saru Kumari, and Mridul Kumar Gupta
Springer Science and Business Media LLC
Vinod Kumar, Mahmoud Shuker Mahmoud, Ahmed Alkhayyat, Jangirala Srinivas, Musheer Ahmad, and Adesh Kumari
Springer Science and Business Media LLC
Akber Ali Khan, Vinod Kumar, Musheer Ahmad, and Srinivas Jangirala
Elsevier BV
Martha Shiva Prasad, V. Sandeep Kumar, B. Mamatha, P. Akshya, V. Ravi Kumar, B. Bhargav Kumar, and P. Karthik
AIP Publishing
Vikas Kumar, Rahul Kumar, Akber Ali Khan, Vinod Kumar, Yu-Chi Chen, and Chin-Chieh Chang
MDPI AG
The Internet of Things (IoT) is a future trend that uses the Internet to connect a variety of physical things with the cyber world. IoT technology is rapidly evolving, and it will soon have a significant impact on our daily lives. While the growing number of linked IoT devices makes our daily lives easier, it also puts our personal data at risk. In IoT applications, Radio Frequency Identification (RFID) helps in the automatic identification of linked devices, and the dataflow of the system forms a symmetry in communication between the tags and the readers. However, the security and privacy of RFID-tag-connected devices are the key concerns. The communication link is thought to be wireless or insecure, making the RFID system open to several known threats. In order to address these security issues, we propose a robust authentication framework for IoT-based RFID infrastructure. We use formal security analysis in the random oracle model, as well as information analysis to support the claim of secure communication. Regarding the desirable performance characteristics, we describe and analyze the proposed framework’s performance and compare it to similar systems. According to our findings, the proposed framework satisfies all security requirements while also improving the communication.
Akber Ali Khan, Vinod Kumar, and Musheer Ahmad
Elsevier BV
Abstract Smart grid (SG) provides a suitable adjustment in the amount of power generation by providing the ability to supervise consumer behavior. SG uses in the smart system to encourage cultural heritage because it is accountable for providing power without any interruption. SG is one of the vital components to authorize smart systems with a lot of smart features to attract visitors to come and visit heritage. In SG, environment security and privacy are the major concern for communications. An authentication protocol provides secure communication between users and service provider for security and privacy purpose. Several authentication protocols are available in the literature. However, they are enabled to known security attacks easily or they are not computationally efficient for SG communication. In the present paper, we design an ECC-based mutual authentication protocol for smart grid communication using biometric approach. The present framework satisfy various security features such as replay attack, user anonymity, man in the middle attack, key freshness, message authentication, session key agreement, impersonation attack, non-traceability and non-transferability. Further, the proposed protocol takes much less communication and computation costs compared with other existing protocols in SG environment. Therefore, our scheme is convenient for practical application in SG communication.
Kamal Kumar, Vinod Kumar, and Seema
Elsevier BV
Anjna Kumari, Nishant Jain, and Vinod Kumar
IEEE
The liver ultrasound images suffer from low contrast and resolution, that results in deterioration of the quality of such kind of images as well as having less clarity of fine details i.e. edges or boundaries within the image as well. Therefore, visual interpretation of liver US images and its analysis for disease diagnosis becomes a challenging task for medical examiners or sonographers. So there is need of enhancement of these images so as to figure out the significant details of the image accurately. In this paper, an attempt is made for enhancing the liver US images by utilizing guided image filter (GIF) technique, in order to obtain images with suppressed noise & more highlighted fine detail that will help in liver ultrasound image analysis for any abnormality identification associated to it. The result outcome from the experimental analysis reveals that better enhancement of liver ultrasound images is achieved after applying weighted guided image filter (WGIF) technique. It is justified by the obtained image quality metrics, for GIF-technique PSNR value is (32.575-35.007) and SSIM value is (0.8269-0.8785), whereas for WGIF-technique, the range of PSNR value is (49.056-51.250) and SSIM value is (0.993-0.995) respectively.
Om Pal, Surendra Singh, and Vinod Kumar
Springer Nature Singapore
Vinod Kumar, Srinivas Jangirala, Hari Pratap, and Adesh Kumari
Springer Nature Singapore
Vinod Kumar, Ammar Mohammed Ali Al-Tameemi, Adesh Kumari, Musheer Ahmad, Mayadah Waheed Falah, and Ahmed A. Abd El-Latif
Institute of Electrical and Electronics Engineers (IEEE)
Samiulla Itoo, Akber Ali Khan, Vinod Kumar, Ahmed Alkhayyat, Musheer Ahmad, and Jangirala Srinivas
Institute of Electrical and Electronics Engineers (IEEE)
In the traditional medical healthcare system, each medical facility is responsible for preserving its own records. Sharing such records with another medical establishment is difficult for them. To tackle this challenge, the traditional medical system leverages internet technology to transform into a modern electronic system. In electronic healthcare systems, managing the security and privacy of patient data becomes a major issue. As an alternative, the healthcare sector might use blockchain technology to exchange digitised healthcare data. Blockchain technology is characterised by anonymity, decentralisation, and immutability. It is hard to keep all electronic healthcare data on blockchain due to the expense and volume. Cloud computing is the best solution for storing this type of data and resolving problems like these. To address these concerns, we offer a blockchain-based key agreement protocol for cloud medical network systems that enhances privacy and security. We demonstrate a formal and informal security analysis of the proposed protocol that shows that the proposed protocol is both secure and communicative. We provide security verification of the proposed protocol by using the AVISPA software tool against man in the middle attack and replay attack. Finally, we compute the computation and communication costs of the proposed protocol and other existing protocols, the proposed protocol has less computation and communication costs than other existing protocols in the electronic healthcare system.
Akber Ali Khan, Samiulla Itoo, Vinod Kumar, Musheer Ahmad, and Srinivas Jangirala
Elsevier BV
Arabind Kumar, Sanjay Yadav, Vinod Kumar, and Jangirala Srinivas
Springer Singapore
Samiulla Itoo, Akber Ali Khan, Vinod Kumar, Srinivas Jangirala, and Musheer Ahmad
Springer Singapore
Adesh Kumari, Vinod Kumar, and M. Yahya Abbasi
Informa UK Limited
Akber Ali Khan, Vinod Kumar, Musheer Ahmad, B. B. Gupta, Musheer Ahmad, and Ahmed A. Abd El-Latif
Springer Science and Business Media LLC
Zunaid Aalam, Vinod Kumar, and Surendra Gour
IOP Publishing
A hypervisor is a computer programme or software that facilitates to create and run multiple virtual machines. It is also known as Virtual Machine Manager (VMM). Due to their popularity, it exploits the attack surface, because the Hypervisor code contains much vulnerability. Since the Hypervisor is a core element of any cloud computing service, it is always on the top priority of the attackers. There are many Software (open source) and Hardware-based Solutions are available in the market to monitor and control the hypervisor activities. This paper summarizes various types of attacks, vulnerabilities, security issues and challenges related to hypervisor and virtual machines.