Dr. Vinod Kumar

@pgdavcollege.edu.in

Assistant Professor in Department of Mathematics
PGDAV College, University of Delhi



              

https://researchid.co/vinod.iitkgp13

RESEARCH INTERESTS

* Authentication protocols for Information Security, IoT, Cloud Computing, Vehicular Cloud network and Supply
Chain Management.
* Cryptography, Blockchain, Bitcoin, Cryptocurrency, Number theory and Applied Mathematics.

134

Scopus Publications

935

Scholar Citations

17

Scholar h-index

21

Scholar i10-index

Scopus Publications

  • RKMIS: robust key management protocol for industrial sensor network system
    Samiulla Itoo, Musheer Ahmad, Vinod Kumar, and Ahmed Alkhayyat

    Springer Science and Business Media LLC

  • Current Reduction in Electrical Vehicles via EPAS System Control using MVO and GWO based Tuning Methodology
    Vinod Kumar, Gunjan Chorasiya, and Sathans Suhag

    Deanship of Scientific Research
    : The electric power assist steering (EPAS) system has, in the recent years, emerged as an e ff ective alternative to the conventional hydraulic powered steering system in new vehicles owing to its significant potential in minimizing energy utilization and enhancing the e ffi ciency of driving performance. In all new electrical vehicular technology, for all sub-systems, there is a requirement of battery energy; hence energy conservation is the first essential criterion to be met. In this work, therefore, recent meta-heuristic techniques are implemented to optimally tune the proportional, integral, and derivative with filter (PIDF) controller, applied over the EPAS system, to realize the assist current reduction for its operation. The results establish the e ff ectiveness of the novel proposition in reducing the assist current and minimizing the energy demand as compared to the conventional tuning. Apart from this, the drive torque is also reduced. Matlab ® platform is used for modelling and simulations.


  • An Efficient Road Side Unit Assisted Sender Authentication Protocol for Secure Message Transmission in Vehicular Ad-Hoc Networks
    Pradeep Kumar Tiwari, Narendra Kumar Shukla, Vinod Kumar, Animesh Tripathi, and Shiv Prakash

    Springer Nature Singapore


  • An efficient key distribution Scheme for WSN with Mutual Healing Capability
    Neeraj Patel and Vinod Kumar

    Springer Science and Business Media LLC

  • RAKS: robust authentication and key agreement scheme for satellite infrastructure
    Akber Ali Khan, Vinod Kumar, Jangirala Srinivas, Saru Kumari, and Mridul Kumar Gupta

    Springer Science and Business Media LLC

  • RAPCHI: Robust authentication protocol for IoMT-based cloud-healthcare infrastructure
    Vinod Kumar, Mahmoud Shuker Mahmoud, Ahmed Alkhayyat, Jangirala Srinivas, Musheer Ahmad, and Adesh Kumari

    Springer Science and Business Media LLC

  • A secure and energy efficient key agreement framework for vehicle-grid system
    Akber Ali Khan, Vinod Kumar, Musheer Ahmad, and Srinivas Jangirala

    Elsevier BV

  • Wireless OFDM system transmission channel model parameter detection
    Martha Shiva Prasad, V. Sandeep Kumar, B. Mamatha, P. Akshya, V. Ravi Kumar, B. Bhargav Kumar, and P. Karthik

    AIP Publishing

  • RAFI: Robust Authentication Framework for IoT-Based RFID Infrastructure
    Vikas Kumar, Rahul Kumar, Akber Ali Khan, Vinod Kumar, Yu-Chi Chen, and Chin-Chieh Chang

    MDPI AG
    The Internet of Things (IoT) is a future trend that uses the Internet to connect a variety of physical things with the cyber world. IoT technology is rapidly evolving, and it will soon have a significant impact on our daily lives. While the growing number of linked IoT devices makes our daily lives easier, it also puts our personal data at risk. In IoT applications, Radio Frequency Identification (RFID) helps in the automatic identification of linked devices, and the dataflow of the system forms a symmetry in communication between the tags and the readers. However, the security and privacy of RFID-tag-connected devices are the key concerns. The communication link is thought to be wireless or insecure, making the RFID system open to several known threats. In order to address these security issues, we propose a robust authentication framework for IoT-based RFID infrastructure. We use formal security analysis in the random oracle model, as well as information analysis to support the claim of secure communication. Regarding the desirable performance characteristics, we describe and analyze the proposed framework’s performance and compare it to similar systems. According to our findings, the proposed framework satisfies all security requirements while also improving the communication.

  • An elliptic curve cryptography based mutual authentication scheme for smart grid communications using biometric approach
    Akber Ali Khan, Vinod Kumar, and Musheer Ahmad

    Elsevier BV
    Abstract Smart grid (SG) provides a suitable adjustment in the amount of power generation by providing the ability to supervise consumer behavior. SG uses in the smart system to encourage cultural heritage because it is accountable for providing power without any interruption. SG is one of the vital components to authorize smart systems with a lot of smart features to attract visitors to come and visit heritage. In SG, environment security and privacy are the major concern for communications. An authentication protocol provides secure communication between users and service provider for security and privacy purpose. Several authentication protocols are available in the literature. However, they are enabled to known security attacks easily or they are not computationally efficient for SG communication. In the present paper, we design an ECC-based mutual authentication protocol for smart grid communication using biometric approach. The present framework satisfy various security features such as replay attack, user anonymity, man in the middle attack, key freshness, message authentication, session key agreement, impersonation attack, non-traceability and non-transferability. Further, the proposed protocol takes much less communication and computation costs compared with other existing protocols in SG environment. Therefore, our scheme is convenient for practical application in SG communication.

  • Security and Privacy Preservation for Data Communication Network
    Kamal Kumar, Vinod Kumar, and Seema

    Elsevier BV

  • Enhancement of Liver Ultrasound Images by Guided Image Filtering Technique
    Anjna Kumari, Nishant Jain, and Vinod Kumar

    IEEE
    The liver ultrasound images suffer from low contrast and resolution, that results in deterioration of the quality of such kind of images as well as having less clarity of fine details i.e. edges or boundaries within the image as well. Therefore, visual interpretation of liver US images and its analysis for disease diagnosis becomes a challenging task for medical examiners or sonographers. So there is need of enhancement of these images so as to figure out the significant details of the image accurately. In this paper, an attempt is made for enhancing the liver US images by utilizing guided image filter (GIF) technique, in order to obtain images with suppressed noise & more highlighted fine detail that will help in liver ultrasound image analysis for any abnormality identification associated to it. The result outcome from the experimental analysis reveals that better enhancement of liver ultrasound images is achieved after applying weighted guided image filter (WGIF) technique. It is justified by the obtained image quality metrics, for GIF-technique PSNR value is (32.575-35.007) and SSIM value is (0.8269-0.8785), whereas for WGIF-technique, the range of PSNR value is (49.056-51.250) and SSIM value is (0.993-0.995) respectively.

  • Blockchain Network: Performance Optimization
    Om Pal, Surendra Singh, and Vinod Kumar

    Springer Nature Singapore

  • Design Flaws and Cryptanalysis of a Lightweight Mutual Authentication Protocol for V2V Communication in Internet of Vehicles
    Vinod Kumar, Srinivas Jangirala, Hari Pratap, and Adesh Kumari

    Springer Nature Singapore

  • RAVCC: Robust Authentication Protocol for RFID based Vehicular Cloud Computing


  • PSEBVC: Provably Secure ECC and Biometric based Authentication Framework using Smartphone for Vehicular Cloud Environment
    Vinod Kumar, Ammar Mohammed Ali Al-Tameemi, Adesh Kumari, Musheer Ahmad, Mayadah Waheed Falah, and Ahmed A. Abd El-Latif

    Institute of Electrical and Electronics Engineers (IEEE)

  • CKMIB: Construction of Key Agreement Protocol for Cloud Medical Infrastructure Using Blockchain
    Samiulla Itoo, Akber Ali Khan, Vinod Kumar, Ahmed Alkhayyat, Musheer Ahmad, and Jangirala Srinivas

    Institute of Electrical and Electronics Engineers (IEEE)
    In the traditional medical healthcare system, each medical facility is responsible for preserving its own records. Sharing such records with another medical establishment is difficult for them. To tackle this challenge, the traditional medical system leverages internet technology to transform into a modern electronic system. In electronic healthcare systems, managing the security and privacy of patient data becomes a major issue. As an alternative, the healthcare sector might use blockchain technology to exchange digitised healthcare data. Blockchain technology is characterised by anonymity, decentralisation, and immutability. It is hard to keep all electronic healthcare data on blockchain due to the expense and volume. Cloud computing is the best solution for storing this type of data and resolving problems like these. To address these concerns, we offer a blockchain-based key agreement protocol for cloud medical network systems that enhances privacy and security. We demonstrate a formal and informal security analysis of the proposed protocol that shows that the proposed protocol is both secure and communicative. We provide security verification of the proposed protocol by using the AVISPA software tool against man in the middle attack and replay attack. Finally, we compute the computation and communication costs of the proposed protocol and other existing protocols, the proposed protocol has less computation and communication costs than other existing protocols in the electronic healthcare system.

  • Cryptanalysis and design flaws of anonymous ECC based self-certified key distribution scheme for smart grid
    Akber Ali Khan, Samiulla Itoo, Vinod Kumar, Musheer Ahmad, and Srinivas Jangirala

    Elsevier BV

  • A Cluster-based Data Aggregation Framework for WSN using Blockchain
    Arabind Kumar, Sanjay Yadav, Vinod Kumar, and Jangirala Srinivas

    Springer Singapore

  • Design Flaws and Suggested Improvement of Secure Medical Data Sharing Scheme Based on Blockchain
    Samiulla Itoo, Akber Ali Khan, Vinod Kumar, Srinivas Jangirala, and Musheer Ahmad

    Springer Singapore

  • EAAF: ECC-based anonymous authentication framework for cloud-medical system
    Adesh Kumari, Vinod Kumar, and M. Yahya Abbasi

    Informa UK Limited

  • A secure and efficient key agreement framework for critical energy infrastructure using mobile device
    Akber Ali Khan, Vinod Kumar, Musheer Ahmad, B. B. Gupta, Musheer Ahmad, and Ahmed A. Abd El-Latif

    Springer Science and Business Media LLC

  • A review paper on hypervisor and virtual machine security
    Zunaid Aalam, Vinod Kumar, and Surendra Gour

    IOP Publishing
    A hypervisor is a computer programme or software that facilitates to create and run multiple virtual machines. It is also known as Virtual Machine Manager (VMM). Due to their popularity, it exploits the attack surface, because the Hypervisor code contains much vulnerability. Since the Hypervisor is a core element of any cloud computing service, it is always on the top priority of the attackers. There are many Software (open source) and Hardware-based Solutions are available in the market to monitor and control the hypervisor activities. This paper summarizes various types of attacks, vulnerabilities, security issues and challenges related to hypervisor and virtual machines.

RECENT SCHOLAR PUBLICATIONS

  • A Systematic Review of Blockchain Technology Assisted with Artificial Intelligence Technology for Networks and Communication Systems
    K Kumar, V Kumar, MK Sharma, AA Khan, MJ Idrisi
    Journal of Computer Networks and Communications 2024 2024

  • Use of Cryptography in Networking to Preserve Secure Systems
    K Kumar, V Kumar
    Intelligent Data Analytics, IoT, and Blockchain, 135-144 2024

  • A Digital Twin-Based Safe Authentication Protocol for Vehicular Cloud Networking
    VKAM D. Tiger
    Tuijin Jishu/Journal of Propulsion Technology 45 (1), 4721-4729 2024

  • Robust Authentication Protocol for Autonomous Vehicle using Digital Twin Networks
    RP Kamal Kumar, Vinod Kumar, Seema
    Tuijin Jishu/Journal of Propulsion Technology 45 (1), 2632 - 2645 2024

  • ECLSS: Extended Chaotic Map-Based Certificate less Signature Scheme
    G Singh, P Kumar, G Thakur, V Kumar, S Rana
    Tuijin Jishu/Journal of Propulsion Technology 44 (3), 3630-3643 2023

  • RSFVC: Robust Biometric-Based Secure Framework for Vehicular Cloud Networking
    V Kumar
    IEEE Transactions on Intelligent Transportation Systems 2023

  • RKMIS: robust key management protocol for industrial sensor network system
    S Itoo, M Ahmad, V Kumar, A Alkhayyat
    The Journal of Supercomputing 79 (9), 9837-9865 2023

  • Investigation of Digital Twin Technology for Secure and Privacy Preserving Networking
    F Hassan, V Kumar, AK Nishad, V Gautam
    Procedia Computer Science 230, 398-406 2023

  • Online Games and Indian Society
    V Kumar
    https://www.swadeshionline.in/search 2022

  • Design flaws and cryptanalysis of a lightweight mutual authentication protocol for V2V communication in internet of vehicles
    V Kumar, S Jangirala, H Pratap, A Kumari
    Proceedings of 3rd International Conference on Machine Learning, Advances in 2022

  • RAKS: robust authentication and key agreement scheme for satellite infrastructure
    AA Khan, V Kumar, J Srinivas, S Kumari, MK Gupta
    Telecommunication Systems 81 (1), 83-98 2022

  • RAPCHI: Robust authentication protocol for IoMT-based cloud-healthcare infrastructure
    V Kumar, MS Mahmoud, A Alkhayyat, J Srinivas, M Ahmad, A Kumari
    The Journal of Supercomputing 78 (14), 16167-16196 2022

  • Cryptanalysis of RFID Mutual Authentication Protocol for IoT
    V Kumar, R Kumar, V Kumar, A Kumari
    Smart Data Intelligence: Proceedings of ICSMDI 2022, 173-183 2022

  • RAVCC: Robust Authentication Protocol for RFID based Vehicular Cloud Computing
    V Kumar, R Kumar, V Kumar, A Kumari, S Kumari
    Journal of Network Intelligence 7 (3), 526-543 2022

  • Psebvc: Provably secure ecc and biometric based authentication framework using smartphone for vehicular cloud environment
    V Kumar, AMA Al-Tameemi, A Kumari, M Ahmad, MW Falah, ...
    IEEE Access 10, 84776-84789 2022

  • A secure and energy efficient key agreement framework for vehicle-grid system
    AA Khan, V Kumar, M Ahmad, S Jangirala
    Journal of Information Security and Applications 68, 103231 2022

  • CKMIB: Construction of key agreement protocol for cloud medical infrastructure using blockchain
    S Itoo, AA Khan, V Kumar, A Alkhayyat, M Ahmad, J Srinivas
    IEEE Access 10, 67787-67801 2022

  • EAAF: ECC-based anonymous authentication framework for cloud-medical system
    A Kumari, V Kumar, MY Abbasi
    International Journal of Computers and Applications 44 (5), 491-500 2022

  • RAFI: robust authentication framework for IoT-based RFID infrastructure
    V Kumar, R Kumar, AA Khan, V Kumar, YC Chen, CC Chang
    Sensors 22 (9), 3110 2022

  • A Cluster-based Data Aggregation Framework for WSN using Blockchain
    A Kumar, S Yadav, V Kumar, J Srinivas
    Evolutionary Computing and Mobile Sustainable Networks: Proceedings of 2022

MOST CITED SCHOLAR PUBLICATIONS

  • RSEAP: RFID based secure and efficient authentication protocol for vehicular cloud computing
    V Kumar, M Ahmad, D Mishra, S Kumari, MK Khan
    Vehicular Communications 22, 100213 2020
    Citations: 86

  • Csef: cloud-based secure and efficient framework for smart medical system using ecc
    A Kumari, V Kumar, MY Abbasi, S Kumari, P Chaudhary, CM Chen
    IEEE Access 8, 107838-107852 2020
    Citations: 80

  • An efficient mutual authentication framework for healthcare system in cloud computing
    V Kumar, S Jangirala, M Ahmad
    Journal of medical systems 42, 1-25 2018
    Citations: 75

  • A secure elliptic curve cryptography based mutual authentication protocol for cloud-assisted TMIS
    V Kumar, M Ahmad, A Kumari
    Telematics and Informatics 38, 100-117 2019
    Citations: 73

  • PALK: Password-based anonymous lightweight key agreement framework for smart grid
    AA Khan, V Kumar, M Ahmad, S Rana, D Mishra
    International Journal of Electrical Power & Energy Systems 121, 106121 2020
    Citations: 69

  • ESEAP: ECC based secure and efficient mutual authentication protocol using smart card
    A Kumari, S Jangirala, MY Abbasi, V Kumar, M Alam
    Journal of Information Security and Applications 51, 102443 2020
    Citations: 66

  • An elliptic curve cryptography based mutual authentication scheme for smart grid communications using biometric approach
    AA Khan, V Kumar, M Ahmad
    Journal of King Saud University-Computer and Information Sciences 34 (3 2022
    Citations: 64

  • LAKAF: Lightweight authentication and key agreement framework for smart grid network
    AA Khan, V Kumar, M Ahmad, S Rana
    Journal of Systems Architecture 116, 102053 2021
    Citations: 62

  • SEBAP: A secure and efficient biometric‐assisted authentication protocol using ECC for vehicular cloud computing
    V Kumar, M Ahmad, A Kumari, S Kumari, MK Khan
    International Journal of Communication Systems, 1 - 21 2019
    Citations: 53

  • Integration of next generation IIoT with Blockchain for the development of smart industries
    A Iqbal, M Amir, V Kumar, A Alam, M Umair
    Emerg. Sci. J 4, 1-17 2020
    Citations: 35

  • A secure user authentication protocol using elliptic curve cryptography
    A Kumari, M Yahya Abbasi, V Kumar, AA Khan
    Journal of Discrete Mathematical Sciences and Cryptography 22 (4), 521-530 2019
    Citations: 33

  • A pairing-free identity based authentication framework for cloud computing
    D Mishra, V Kumar, S Mukhopadhyay
    Network and System Security: 7th International Conference, NSS 2013, Madrid 2013
    Citations: 32

  • A secure and efficient key agreement framework for critical energy infrastructure using mobile device
    AA Khan, V Kumar, M Ahmad, BB Gupta, M Ahmad, AA Abd El-Latif
    Telecommunication Systems 78, 539-557 2021
    Citations: 24

  • An identity-based authentication framework for big data security
    V Kumar, M Ahmad, P Kumar
    Proceedings of 2nd International Conference on Communication, Computing and 2019
    Citations: 23

  • The cryptanalysis of a secure authentication scheme based on elliptic curve cryptography for IOT and cloud servers
    A Kumari, V Kumar, M YahyaAbbasi, M Alam
    2018 international conference on advances in computing, Communication 2018
    Citations: 20

  • CKMIB: Construction of key agreement protocol for cloud medical infrastructure using blockchain
    S Itoo, AA Khan, V Kumar, A Alkhayyat, M Ahmad, J Srinivas
    IEEE Access 10, 67787-67801 2022
    Citations: 18

  • SFVCC: chaotic map‐based security framework for vehicular cloud computing
    D Mishra, V Kumar, D Dharminder, S Rana
    IET Intelligent Transport Systems 14 (4), 241-249 2020
    Citations: 17

  • RAPCHI: Robust authentication protocol for IoMT-based cloud-healthcare infrastructure
    V Kumar, MS Mahmoud, A Alkhayyat, J Srinivas, M Ahmad, A Kumari
    The Journal of Supercomputing 78 (14), 16167-16196 2022
    Citations: 16

  • RAVCC: Robust Authentication Protocol for RFID based Vehicular Cloud Computing
    V Kumar, R Kumar, V Kumar, A Kumari, S Kumari
    Journal of Network Intelligence 7 (3), 526-543 2022
    Citations: 15

  • EAAF: ECC-based anonymous authentication framework for cloud-medical system
    A Kumari, V Kumar, MY Abbasi
    International Journal of Computers and Applications 44 (5), 491-500 2022
    Citations: 11