@kiet.edu
ASSISTANT PROFESSOR
KIET GHAZIABAD
Ambedkar Institute of Advanced Communication Technologies and Research: Geeta Colony, Delhi, INDIA
WSN, IoT
Scopus Publications
Scholar Citations
Scholar h-index
Scholar i10-index
Ila Kaushik, Nupur Prakash, and Anurag Jain
Springer Science and Business Media LLC
Ila Kaushik and Nupur Prakash
IEEE
The ever-increasing population gave rise towards shift from traditional farming to modern farming methods. Limited availability of land, diminishing natural resources, unpredictable weather conditions resulting in food scarcity which is major concern which must be addressed. In order to increase the productivity and efficiency of agricultural land, Internet of things (IoT) offers many features in smart farming like monitoring of water, farm, soil, management of irrigation facilities, detection of pests and diseases, asset tracking, greenhouse farming, remotely control and diagnosis of farming related equipment etc. This paper presents different applications of IoT in smart agriculture and how productivity has increased which results in adding economic growth to the country using advanced technologies in agriculture industry.
Vikash Kumar Aggarwal, Nikhil Sharma, Ila Kaushik, Bharat Bhushan, and Himanshu
IOP Publishing
Himanshu, Rishu Rana, Nikhil Sharma, Ila Kaushik, and Bharat Bhushan
CRC Press
Bharti Verma, Nikhil Sharma, Ila Kaushik, and Bharat Bhushan
Springer International Publishing
Ila Kaushik, Nupur Prakash, and Anurag Jain
IEEE
Internet of things (IoT) plays a major role in every field. It helps in transforming the way with the use of sensors, edge devices and its infrastructure. As sensors are major source of information gathering which is stored on the cloud and relevant information is being retrieved. Information is passed at various levels of IoT ecosystem, which takes security into consideration. With the growth of interconnected devices, data security is becoming increasingly complex. The necessity arising for building a secure and smart structure leads in combining blockchain technology with IoT based system in precision agriculture. With the use of blockchain, traditional methods utilized for collecting and sharing agriculture data are replaced with transparent, reliable and decentralized data storage methods. This combined approach helps us in maintaining an autonomous precise agriculture system and managing in more secure and optimized ways. This paper presents a comprehensive approach on highlighting the importance of integrating blockchain technology with smart agriculture. This paper also proposes novel approach to blockchain models which are used as alternate solutions for challenges faced by IoT based smart agriculture. Various sub sectors like food supply chain, livestock grazing, and crops overseeing are also managed using blockchain platform. Later section of the paper focuses on open challenges and issues while developing blockchain based IoT system used in precision farming.
Nikhil Sharma, Ila Kaushik, Vikash Kumar Agarwal, Bharat Bhushan, and Aditya Khamparia
Wiley
Nikhil Sharma, Bharat Bhushan, Ila Kaushik, and Narayan C. Debnath
Springer International Publishing
Sukriti Goyal, Nikhil Sharma, Ila Kaushik, Bharat Bhushan, and Nitin Kumar
Springer Singapore
Apeksha Rustagi, Chinkit Manchanda, Nikhil Sharma, and Ila Kaushik
Springer Singapore
Depression is a temperament syndrome that causes a tenacious emotion of wretchedness and loss of interest in any activity. It is a supreme root of mental illness, which has established the growth in the risk of early death and economic burden to a country. Traditional clinical analysis procedures are subjective, complex and need considerable contribution of professionals. The turn of the century saw incredible progress in using deep learning for medical diagnosis. Though, prediction and implementation of mental state can be remarkably hard. In this paper, we present Combinational Deep Neural Network (CDNN) for automated depression detection with facial images and text data using amalgamation of Convolutional Neural Network (CNN) and Recurrent Neural Network (RNN). Thereafter, combining the prediction scores of both CNN and RNN model and level of depression is decided on the basis of the range of the predefined depression-level scores. Simulation outcomes based on real-field channel measurements show that the proposed model can significantly predict depression with superior performance.
Depender Kumar Soni, Harbhajan Sharma, Bharat Bhushan, Nikhil Sharma, and Ila Kaushik
IEEE
In the dawn of crypto-currencies the most talked currency is Bitcoin. Bitcoin is widely flourished digital currency and an exchange trading commodity implementing peer-to-peer payment network. No central athourity exists in Bitcoin. The users in network or pool of bitcoin need not to use real names, rather they use pseudo names for managing and verifying transactions. Due to the use of pseudo names bitcoin is apprehended to provide anonymity. However, the most transparent payment network is what bitcoin is. Here all the transactions are publicly open. To furnish wholeness and put a stop to double-spending, Blockchain is used, which actually works as a ledger for management of Bitcoins. Blockchain can be misused to monitor flow of bitcoins among multiple transactions. When data from external sources is amalgamated with insinuation acquired from the Blockchain, it may result to reveal user’s identity and profile. In this way the activity of user may be traced to an extent to fraud that user. Along with the popularity of Bitcoins the number of adversarial attacks has also gain pace. All these activities are meant to exploit anonymity and privacy in Bitcoin. These acivities result in loss of bitcoins and unlawful profit to attackers. Here in this paper we tried to present analysis of major attacks such as malicious attack, greater than 52% attacks and block withholding attack. Also this paper aims to present analysis and improvements in Bitcoin’s anonymity and privacy.
Anas Ahmad, Bharat Bhushan, Nikhil Sharma, Ila Kaushik, and Saurabh Arora
IEEE
This With the ever-growing demand of high internet connectivity and ease of life Internet of Things in 5G has become the need of the hour as it has been the most sort out topic for researchers. The 4G industry has brought a revolution with it in the field of internet connectivity but is quite not enough for advanced IoT device demands and challenges. The upgrade in wireless communication is much needed for a much brighter and advanced future. The 5G will bring better Quality of Service, reliability and scalability to the IoT industry. In this paper we have discussed about the security issues and attacks that can affect working of Internet of Things. We have also explained in detail about the architecture of the 5G IoT system. That is why we have highlighted some of the major application and security aspects of 5G IoT.
Saurabh Arora, Nikhil Sharma, Bharat Bhushan, Ila Kaushik, and Anas Ahmad
IEEE
The fundamental feature of internet of things (IoT) is to integrate the sensing technology along with the technology of radio frequency identification and port these technology on the devices produced now-a-days. As of now the IoT has been facing many issues like poor security measures, high maintenance cost and least reliable. So, there is a need of new emerging technology like 5G which could resolve all these issues. 5G has the capability to introduce features like ultra-dense network support, high reliability with world class security measure. Which make the production of new devices with advance technology highly cost effective. So, in this paper we are going to discuss about what were the IoT based devices were facing before the introduction of emerging technology like 5G and how will be able to resolve out all those issues. Lastly, we will discuss how 5G along with IoT could bring a revolution in the existing technology.
Rohan Sethi and Ila Kaushik
IEEE
Hand-written character and digit recognition have been one of the most exigent and engrossing field of pattern recognition and image processing. The main aim of this paper is to demonstrate and represent the work which is related to hand-written digit recognition. The hand-written digit recognition is a very exigent task. In this recognition task, the numbers are not accurately written or scripted as they differ in shape or size; due to which the feature extraction and segmentation of hand-written numerical script is arduous. The vertical and horizontal projections methods are used for the purpose of segmentation in the proposed work. SVM is applied for recognition and classification, while Convex hull algorithm is applied for feature extraction.
Sukriti Goyal, Nikhil Sharma, Ila Kaushik, Bharat Bhushan, and Abhijeet Kumar
IEEE
In the network of IoT, a huge amount of data is frequently generated, major messages through complicated networks serving device-to-device communications are swapped and also, sensitive smart world frameworks are controlled and monitored by thousands of gadgets and sensors. To extenuate the acceleration of overcrowding of resources in the network, as an approach edge computing, has risen as a modern approach to resolve requirements of confined computing as well as IoT. In this paper, a brief introduction of Internet of Things and edge computing is discussed which consists of general concepts of IoT and its components, basic introduction of edge computing, and structure of edge computing. After that, fundamental concepts of cloud computing, edge computing and IoT are introduced by comparing their features with each other and a structure of IoT based on edge computing is also illustrated with a slight introduction of the architecture of both the edge computing and IoT. Moreover, the advantages of using the technology of edge computing to assist the technology of IoT are provided as well as the efficiency of integrating these two technologies together is demonstrated. Then, the issues like security and privacy, advanced communication etc. related to combination of IoT and edge computing system are discussed and finally, the conclusion of the paper is presented. So, basically, in this paper, an extensive survey is conducted to analyze how the usage of edge computing progresses the performance of systems of IoT. The performance of edge computing is studied by comparing delay of network, occupation of bandwidth, power utilization, and many other characteristics.
Depender Kumar Soni, Nikhil Sharma, Ila Kaushik, and Bharat Bhushan
IEEE
We all are familiar with the problems a blind person faces while performing several daily life activities. These problems are generally related to walking on roads, walking on ramps, movement in staircases, looking for path in crowded streets and market places and many other situations. Of course, many of us come ahead to help them by guiding their way, but sometimes it becomes a matter of self-respect, or say, the person is not willing to take help from others or even it is possible that nobody may be available to help. Think of a situation when a blind person is alone and an Electronic Travel Aid Stick suddenly stops working due to a completely discharged battery system. This paper aims to build a device that can generate that much amount of energy that is required to run the electronic systems efficiently so that it can prevent visually impaired people from suffering in difficult situations.
Sukriti Goyal, Nikhil Sharma, Ila Kaushik, and Bharat Bhushan
Elsevier
Ila Kaushik and Nikhil Sharma
Springer International Publishing
Computers are being reasonably important part of our daily lives. Different solutions were introduced for its connectivity such as wired approach which existed for longer duration of time. But due to advancement in field of technology wireless connectivity came into picture for connectivity to internet, exchanging information etc. One of suited network based on wireless standard is wireless sensor network (WSN). WSN comprises of a number of small motes that are distributed in random manner in any environment. The motes communicate with one another in their resource domain using low power communication medium. WSN possesses many characteristics but difficulty arises in its energy management, security aspect and deployment. Communication take place over radio environment and are prone to various attacks. Some of the attacks include Black hole attack, Gray hole attack, sinkhole attack etc. In this paper we are discussing network layer Black hole attack along with its security measure to decrease its effect in the network.
Tanishq Varshney, Nikhil Sharma, Ila Kaushik, and Bharat Bhushan
IEEE
Internet of Things (IoT) depicts a future technology where devices establish a connection with internet for building the intelligent structural system and to implement self-configuration system IoT is an internetworking of devices which are physically present, function of that device is to sense the data In today’s scenario IoT involves with different technologies like blockchain, WSN and many more to give better results. Also, IoT has various implementations like in healthcare, wearables, farming etc. Main objective of IoT is to produce a helpful communication between any two heterogeneous devices, which are physically present at various locations with the help of technology of networking. Applications and implementations of IoT is increasing day-by-day, to secure and maintain Confidentiality, Integrity, Availability (CIA) and other parameters becomes very crucial. We have discussed the principles of IoT in this paper, then comparison between the IoT and Traditional IT services is being discussed. Appropriate techniques and mechanisms to build a secure framework for covering all the IoT layers is being shown in this paper. This paper also discusses about the privacy and security challenges faced during the designing of IoT network. Then the security measures proposed by various researchers is being highlighted in this paper, so as to make a reliable IoT network.
Ratik Tiwari, Nikhil Sharma, Ila Kaushik, Archit Tiwari, and Bharat Bhushan
IEEE
In today’s world, we are surrounded by enormous devices that sense some sort of data and gives a particular output. To track the record and manage that data by connecting all devices in a network in such an efficient manner that it can be utilized in favour of mankind, this is what we call as Internet of Things. It is very difficult task to manage such a huge amount of data with great efficiency, but here the Internet of Things along with concepts of Deep Learning plays a vital role in successful completion of the task. In this paper, you are about see an absolute overview about the analytics that are used to maintain and process huge amount of input data using the concepts of Deep Learning in the very domain of Internet of Things. Firstly, we start by giving a brief description about Internet of Things and some characteristics and requirements possessed by it. We will also explain some major key factors that make deep learning a good choice for implementation of Internet of Things. Also, we have discussed about the concept of Big Data and what role it has in Internet of Things. We have evaluated some research attempts made in the very domain of Internet of Things and Deep Learning. Finally, we have explained some real-life applications and the concept behind them in this paper.
Mahima Harjani, Moksh Grover, Nikhil Sharma, and Ila Kaushik
IEEE
By applying machine learning algorithms, patterns are identified or recognized in the process of Pattern Recognition. On the grounds of prior knowledge, the data is collected and sorted. In this method, the raw data is transformed into a susceptible form which can be used by the machine. Electrocardiogram (ECG) Pattern Recognition is the main focus of this paper. ECG keeps a track of heart’s electrical activity. In the field of biometric it is used as a robust biometric. On the person, off the person and in the person, are the three categories for tracking and capturing signals. Only Off-the-person category in which there is no or minimal skin contact, is included in this paper. To analyze and implement data, six baseline methods are utilized. These baseline methods are applied two publicly available databases-CYBHi and UofT. Raw signals and spectrogram of heartbeat are used for studying about representing features. Various machine learning algorithms are also discussed. Implementation for predicting heartbeat as normal or abnormal and heart diseases, is performed.
Moksh Grover, Bharti Verma, Nikhil Sharma, and Ila Kaushik
IEEE
Nowadays with the increase in advancement of traffic network methodology we have potentials to control traffic congestion and hindrance using huge range of traffic management strategies. Feasibly there are two most promising techniques proffered are chaos theory and reinforcement leaning techniques, the goal of this research technique is to make up a model that self-sufficiently learns by itself the optimal policy. In this paper, we use V-2-V based fuzzy node mechanism and chaos theory that notifies where the traffic could get clustered. On other hand, our reinforcement learning agent makes up discretions (signal status) for the proffered environment.
Tanishq Varshney, Nikhil Sharma, Ila Kaushik, and Bharat Bhushan
IEEE
Without any involvement of third party, block chain has shown tremendous potential in establishing secure links with IoT.This technology can be widely used without using any centralized authority. By combining both the technologies throughput of the system can be enhanced. Due to its various applications it is being widely used in almost every field which makes it vulnerable to various attacks. In this paper, blockchain architecture along with its key properties has been discussed. Later part of paper comprises of various security principles such as confidentiality, integrity and availability, various attacks on network along with its countermeasures.
Vardaan Pruthi, Kanika Mittal, Nikhil Sharma, and Ila Kaushik
IEEE
WSN can be termed as a collection of dimensionally diffused nodes which are capable of surveilling and analyzing their surroundings. The sensors are delicate, transportable and small in size while being economical at the same time. However, the diffused nature of these networks also exposes them to a variety of security hazards. Hence, ensuring a reliable file exchange in these networks is not an easy job due to various security requirements that must be fulfilled. In this paper we concentrate mainly on network layer threats and their security countermeasures to overcome the scope of intruders to access the information without having any authentication on the network layer. Various network layer intrusions that are discussed here include Sinkhole Attack, Sybil Attack, Wormhole Attack, Selective Forwarding Attack, Blackhole Attack And Hello Flood Attack.
Archit Tiwari, Nikhil Sharma, Ila Kaushik, and Ratik Tiwari
IEEE
Big Data, as the name suggests is a process of collection of information in a very large amount and storing it in a multidimensional database of various organizations and thereby performing Analytical operations on it to increase their efficiency and enhance their ability of decision making. Strategies can be made using this technology which uses real time using Big Data Analytics. The main advantage of the technology of big data is that the user gets a complete and an accurate view of answers to all those questions raised by the user in processes related to business decisions. Moreover, the errors which exist within any organization can be identified with the help of this technology. This is due to the real time intuition which helps the organizations identify the errors. Also, in case if any on sanctioned user intends to cheat the organization with the valuable data stored at the database of the organization, the it can be detected at the instant it happens and so suitable measures can be taken against that unsanctioned user. Despite of having so many advantages, it has some limitations also. One of the main issues of concern of this technology is Privacy security. This paper focuses on identifying the threats related to data privacy information stored on the database of the organization and access control systems.
1. Black Hole Attack and Its Security Measure in Wireless Sensors Networks. Advances in Intelligent Systems and Computing Handbook of Wireless Sensor Networks: Issues and Challenges in Current Scenarios, 401–416. doi: 10.1007/978-3-030-40305-8_20
2. Performance Measurement Using Different Shortest Path Techniques in Wireless Sensor Network. 2019 2nd International Conference on Signal Processing and Communication (ICSPC). doi: 10.1109/
3. Intrusion Detection and Security System for Blackhole Attack. 2019 2nd International Conference on Signal Processing and Communication (ICSPC). doi: 10.1109/
4. Analysis of Various Machine Learning Algorithm for Cardiac Pulse Prediction. 2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS). doi: 10.1109/
5. Evaluation of Accidental Death Records Using Hybrid Genetic Algorithm. SSRN Electronic Journal. doi: 10.2139/
6. Traffic control using V-2-V Based Method using Reinforcement Learning. 2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS). doi: 10.1109/
7. Architectural Model of Security Threats & their Countermeasures in IoT. 2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS). doi: 10.1109/
8. Network Layers Threats & its Countermeasures in WSNs. 2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS). doi: 10.1109/
9. Evolution of IoT & Data Analytics using Deep Learning. 2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS). doi: 10.1109/
10. Authentication & Encryption Based Security Services in Blockchain Technology. 2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS). doi: 10.1109/
11. Privacy Issues & Security Techniques in Big Data. 2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS). doi: 10.1109/
12. Security Countermeasures in Web Based Application. 2019 2nd International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT). doi: 10.1109/
13. Taxonomy of Attacks on Web Based Applications. 2019 2nd International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT). doi: 10.1109/
14. Comfy Smart Home using IoT. SSRN Electronic Journal. doi: 10.2139/
15. Producing Energy Using Blind Man Stick. 2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT). doi:10.1109/
16. Importunity & Evolution of IoT for 5G. 2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT). doi:10.1109/
17. Evolution of 5G Wireless Network in IoT. 2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT). doi:10.1109/
18. Hand Written Digit Recognition using Machine Learning. 2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT). doi:10.1109/
19. Precedence & Issues of IoT based on Edge Computing. 2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT). doi:10.1109/
20. Security issues of MAC layer in MANETS. 2017 International Journal of Security and Usability.