Sumeet Gupta

@smvdu.ac.in

Associate Professor,School of Electronics & Communication Engineering
Shri Mata Vaishno Devi University



              

https://researchid.co/sumeetgupta

EDUCATION

Ph.D. in Electronics & Communication Engineering

25

Scopus Publications

Scopus Publications

  • UAV-Enabled Disaster Management: Applications, Open Issues, And Challenges


  • UAV-enabled disaster management: Applications, open issues, and challenges


  • Disaster Management Solution Based on Collaboration Between SAR Team and Multi-UAV
    Amina Khan, Sumeet Gupta, and Sachin Kumar Gupta

    Springer Nature Singapore

  • Interstellar Carbonaceous Dust and Its Formation Pathways: From an Experimental Astrochemistry Perspective
    Arijit Roy, V. S. Surendra, R. Ramachandran, J. K. Meka, S. Gupta, P. Janardhan, B. N. Rajasekhar, H. Hill, Anil Bhardwaj, N. J. Mason,et al.

    Springer Science and Business Media LLC

  • Optimization of Integrated Optic Micro Ring Resonator Gas Sensor using Machine Learning Technique
    Sathish Malathi, Ugra mohan Roy, Sana Kadambot S, Utkarsh Tiwari, Shreyansh Mishra, Sumeet Gupta, and Shantanu Gupta

    SPIE
    Integrated Optic Micro ring Resonator-based sensors are suitable for lab-on-chip applications due to their smaller footprint. Optical sensors are sensitive to detecting small changes in external parameters. Simultaneous detection of multiple gases present in the atmosphere is crucial for several civilian and military applications. Integrated optic micro ring resonators are promising sensing devices. In this paper, machine learning techniques are used in the classification and detection of gases for a sensor of a Micro Ring Resonator (MRR) array . In this paper machine learning techniques are used to reduce the data to be used for the analysis and improve accuracy of the sensor. Three target gases in the proposed model are Ammonia, Methane and Carbon on each ring simulated in this work. The features and influences on wavelength, transmittance, concentration of gases, and ring radius have also been analyzed. Principal Component Analysis (PCA) and K-Clustering algorithm has been used for the classification and detection of different gases. The Davies Boulden Index is calculated as 0.57 which shows the distance between the clusters. The sensor has a sensitivity of 0.35 nm/ppm.

  • Blockchain Based Secure Architecture for Electronic Healthcare Record Management



  • Multi-UAV integrated HetNet for maximum coverage in disaster management
    Amina Khan, Sumeet Gupta, and Sachin Kumar Gupta

    Walter de Gruyter GmbH
    Abstract This article presents a practical method for the 3D placement of a group of HetNet of unmanned aerial vehicles (UAV)-mounted base station (mBS) to offer maximum wireless connectivity and coverage for terrestrial users in a particular region. There are two ways to solve this issue. First, the ideal flying height for each UAV is determined based on the transmit power of the UAV, which offers the maximum ground coverage radius. Depending on their ideal flying altitudes and transmitting power, UAVs are divided into several categories. Given a collection of UAVs, the proposed approach identifies an optimum subset of the available UAVs and places them optimally in 3D to offer maximum coverage of the network for a particular area on the terrestrial ground while using the least amount of power. The results of the simulations show that the suggested approach is effective, and they also give important visions about the behavior of the HetNet supported UAVmBS cell subnetworks.

  • Electronic Control Unit Based Stolen Vehicle Tracking System
    Vaibhavi Vaibhavi, , Samridhi Khanna, Sachin Kr Gupta, Zeeshan Vakil, Mohd Najim, Ravi Prakash Dwivedi, , , ,et al.

    Sumy State University
    Stolen vehicle tracking systems are becoming essential nowadays, mainly in the case of stolen automo- biles. Vehicle burglary is a significant issue these days, and retrieving those stolen vehicles is another issue in addition. It has become increasingly difficult to solve this problem over a long period of time due to differences in car license plates, the destruction and confusion of some parts stolen. In light of these com-plexities, it is difficult to stop every vehicle and determine what method of managing work is required to reduce the effort and find the stolen vehicle. We propose to develop a framework that will upload the number of a stolen vehicle and be able to detect fraudulent vehicles with the assistance of the digital signature based ECU and will also be ready to send the coordinates of a fraudulent vehicle to the local department. To fight against theft, this technique can be a powerful tool. This will drastically reduce the danger of auto theft, saving car owners hundreds of dollars in insurance and other damages and will also help law en-forcement. The interface is complemented with the help of other microcontrollers and a few modules. The key goal was to make this technology as simple as feasible, while keeping the cost as low as possible without compromising its reliability.

  • Cooperative Control between Multi-UAVs for Maximum Coverage in Disaster Management: Review and Proposed Model
    Amina Khan, Sumeet Gupta, and Sachin Kumar Gupta

    IEEE
    In the aftermath of natural disasters, the Disaster Management Team (DMT) plays a crucial role in catastrophe recovery and can dramatically mitigate damage and destruction. Aerial tracking and monitoring will be a grateful enabler for rapid response to catastrophe. Initial risk evaluation may be done by aerial surveillance, which helps prioritize DMTs to different locations depending on the number of individuals who have sustained an injury or the degree of infrastructure loss. Thus, shortly following a catastrophe, a total disaster map leads to an exact estimate of the costs, financial expenses, and loss that will increase the performance of a disaster recovery operation incredibly. In this case, it can be a practical approach to incorporate a multi-agent scheme composed of multiple cooperative UAVs. On the other hand, a very adverse atmosphere is one of the most common causes of UAV loss and maybe so destructive in disasters related to the climate. This article aims to survey cooperative control and the formation of multi-agent and multi-agent UAVs' applications. It proposes a Fault-Tolerant Maximum Coverage (FTMC) framework for a heterogeneous Multi-Agent System (MAS) to support the DMT Moreover, it provides solutions and gives future directions for disaster management.


  • A novel approach for securing data against intrusion attacks in unmanned aerial vehicles integrated heterogeneous network using functional encryption technique
    Diwankshi Sharma, Sachin Kumar Gupta, Aabid Rashid, Sumeet Gupta, Mamoon Rashid, and Ashutosh Srivastava

    Wiley

  • A Review of Graphene Nanoribbon Field-Effect Transistor Structures
    Sanna Lone, Anil Bhardwaj, Amit Kant Pandit, Sumeet Gupta, and Shubham Mahajan

    Springer Science and Business Media LLC
    The ascending trend of Moore’s law has stretched to the horizon, where the prospects of carbon-based materials show the potential of replacing the silicon-based complementary metal-oxide semiconductor technology. These alternatives include nanowire transistors, carbon nanotube field-effect transistors, quantum-dot cellular automata, and graphene nanoribbon field-effect transistors (GNRFETs). This paper presents a review of the evolution of graphene, its fabrication process, and graphene-based field-effect transistor device structures. The diverse features of graphene as a material are derived from its structural, electronic, and thermal properties. A brief review of the techniques utilized for the fabrication of GNRFETs is mentioned in this paper. GNRFETs are based on excellent electrical properties that include strong ballistic transport, high current ratio, better compatibility with high K dielectrics, high electron mobility, reliability, scalability, and transconductance. GNRFET structures are reviewed for several aspects which include the Ion/Ioff ratio, subthreshold swing, oxide thickness, high K dielectrics, etc. that help to monitor the improvement in the performance of GNRFET devices. A comparison of the structures is presented to help researchers have a fair idea of the impact of modifications on device performance. The compact model used to simulate GNRFET-based devices is also included in this paper. GNRFET-based devices have several applications to offer in the current scenario. This paper also reports several applications of present GNRFET-based devices.

  • Securing communication by attribute-based authentication in HetNet used for medical applications
    Tufail A. Lone, Aabid Rashid, Sumeet Gupta, Sachin Kumar Gupta, Duggirala Srinivasa Rao, Mohd Najim, Ashutosh Srivastava, Abhishek Kumar, Lokendra Singh Umrao, and Achintya Singhal

    Springer Science and Business Media LLC
    One of the major applications of the Heterogeneous Network (HetNet) is in the healthcare system. Deploying HetNet in healthcare systems enables patients, physicians, and other stakeholders to communicate easily with each other. Due to the large growth in the network’s subscribers, the security of the stored health data became one of the major concerns because unauthorized access to this data may lead to very serious complications, and unreliable transmission of data may lead to fatal risks to the patient’s life. Therefore, taking data integrity into consideration, user authentication has become one of the main factors. However, significant research work has been performed at HetNet’s physical layer to secure communication, but the result of this leads to an increase in hardware components. The increasing hardware components not only costs money but also power consumption. Therefore, this paper presents an alternate way of securing communication in HetNet at the network layer. However, resolving security problems at the network layer increases computational complexity. Nevertheless, earlier, some encryption techniques like identity-based encryption (IBE), symmetric key encryption (SKE), and public-key encryption (PKE) have been utilized for securing data. Due to their own disadvantages, this paper utilizes an attribute-based encryption (ABE) authentication scheme for securing health data in medical applications. With the help of this method, access to the intruders is denied which results in reduced communication overhead. This authentication scheme helps protect the essential information against attacks by the intruders. It includes a third party server that helps to authenticate and store patient’s information. The whole security technique has been written in the form of HLPSL (high-level protocol specification language) codes, and the results are then validated with the help of AVISPA (automated validation of Internet security protocols and applications) tool.

  • Multi-hazard disaster studies: Monitoring, detection, recovery, and management, based on emerging technologies and optimal techniques
    Amina Khan, Sumeet Gupta, and Sachin Kumar Gupta

    Elsevier BV
    Abstract Every year man-made and natural disasters impact the lives of millions of people. The frequency of occurrence of such disasters is steadily increasing since the last 50 years, and this has resulted in considerable loss of life, destruction of infrastructure, and social and economic disruption. A focussed and comprehensive solution is needed encompassing all aspects, including early detection of disaster scenarios, prevention, recovery, and management to minimize the losses. This survey paper presents a critical analysis of the existing methods and technologies that are relevant to a disaster scenario, such as WSN, remote sensing technique, artificial intelligence, IoT, UAV, and satellite imagery, to encounter the issues associated with disaster monitoring, detection, and management. In case of emergency conditions arising out of a typical disaster scenario, there is a strong likelihood that the communication networks will be partially disrupted; thus the alternate networks can play a vital role in disaster detection and management. It focuses on the role of the alternate networks and the associated technologies in maintaining connectivity in various disaster scenarios. It presents a comprehensive study on multiple disasters such as landslide, forest fire, and an earthquake based on the latest technologies to monitor, detect, and manage the various disasters. It focuses on several parameters that are necessary for disaster detection and monitoring and offers appropriate solutions. It also touches upon big data analytics for disaster management. Several techniques are explored, along with their merits and demerits. Open challenges are highlighted, and possible future directions are given.

  • Nanotechnology Applications and Synthesis of Graphene as Nanomaterial for Nanoelectronics
    Anil Bhardwaj, Gaurav Sharma, and Sumeet Gupta

    Springer International Publishing
    Nanotech and nanoscience have no doubt become a cliche in today’s world. There are many research groups in the world that are currently working to understand the strange and unique properties of materials at nanoscale regime. The motivation for this chapter is to inculcate a feeling of interest and to illustrate the recent developments in the field of nanotechnology for electronics. This chapter focuses on the number of applications of nanotechnology which is extensively implemented in day-to-day lifestyle of humans. The chief areas of applications are in the field of electronics, aeronautics, robotics, biomedical, chemical, pharmaceuticals, and cosmetics. The emergence of this fascinating field has created a scientific revolution that will impact several technological areas. The interest in the field is due to the unique behavior and phenomenon exhibited by the engineered materials at nanolength scale. More than a decade of focused research in this field has already resulted into commercializing several products using engineered nanomaterials. This chapter primarily focuses on nanostructures, application of nanotechnology, graphene as nanomaterial and also includes their properties, synthesis, and applications. The primary focus of this chapter is on nanomaterial into electronics applications. The properties of these applications are studied, and their behavior is observed that is why they are being acknowledged as the wonder materials.


  • Identity-Based Encryption in UAV Assisted HetNets: A Survey
    Aabid Rashid, Diwankshi Sharma, Tufail A. Lone, Sumeet Gupta, and Sachin Kr. Gupta

    IEEE
    In this modern technological world, the Unmanned Ariel Vehicle (UAV) assisted Heterogeneous Networks (HetNets) is almost being used by every developing/developed country for its serving civilian, military missions and natural disasters, etc. The military using UAV aided HetNets in their battlefields and nuclear war conditions and gathering reconnaissance information from hostile areas and neighboring military zones. However, the untypical nature of UAV assisted network requests security inspection at the time of establishing the network. So the UAV assisted HetNets is in need of trusted and secure communication among military users using the same network. The term trusted is being widely used for authorized users within the network. This research work confers the word trusted on the standardization of the cryptographic scheme known Identity-Based Encryption (IBE). Hence, the IBE helps the users to use the UAV aided HetNets securely in getting the reconnaissance information from enemy areas. Also, the IBE prevents the same network from the intrusion attacks of intruders. The security protocols have been formulated with the AVISPA supported language HLPSL and then validated with the same AVISPA TOOL.

  • IoT Based Innovative Dual Level Control System with Fault Tolerance Fail Safe Capability
    Sagun Sharma, Sumeet Gupta, Swastik Gupta, and Shashi Bhushan Kotwal

    IEEE
    IoT provides a machine to machine link capability thus ensuring continuous acquisition of data from sensor, machines, objects connected at any point on the Internet. Normally, used for acquisition of data on the cloud, IoT is gradually moving on to the next phase of evolution wherein control of actuators for automating applications is a point of focus. Control action requires a robust yet flexible mechanism, to ensure that no breakdown in the control action occurs at any point of time despite failure of communication link between the cloud and the objects. This paper provides information about the solution for ensuring continuity of control action despite link failure by implementing a dual level of control mechanism. The simulation results and a limited hardware implementation have been implemented to demonstrate the proof of concept.

  • Secure Communication in UAV Assisted HetNets: A Proposed Model
    Aabid Rashid, Diwankshi Sharma, Tufail A. Lone, Sumeet Gupta, and Sachin Kumar Gupta

    Springer International Publishing
    In the current scientific and technological world, every emerging/advanced country employs Heterogeneous Networks (HetNets) assisted by Unmanned Ariel Vehicle (UAV) to serve its civilian, military and natural catastrophes, etc. The area of focusing in this work will be military zones for getting securely the reconnaissance information from enemy/hostile areas in their battlefields and nuclear war conditions. Though, once the network is created for such scenarios, the untypical nature of UAV assisted network demands protection evaluation. The UAV facilitated HetNets, therefore, demands trust worthy and secure communication among military users using the network. Authentication is one characteristic which enables to mitigate security issues. The prevalent identity and authentication scheme is thus intended to tackle the security threats in HetNets assisted by UAV. In this paper, a security model is proposed based on Identity Based (IB) authentication scheme for UAV-integrated HetNets. The absolutism of such a suggested scheme is screened using the AVISPA tool and some of its outcomes has shown that our scheme is resistant to the vulnerabilities of intruders like replay, impersonation etc.

  • Impact of double gate geometry on the performance of carbon nanotube field effect transistor structures for low power digital design
    Anil Kumar Bhardwaj, Sumeet Gupta, Balwinder Raj, and Amandeep Singh

    American Scientific Publishers


  • Energy optimization and lifetime enhancement techniques in wireless sensor networks: A survey
    Rohit Khajuria and Sumeet Gupta

    IEEE
    Developments in last decade in the field of electronics & communication, computer science and information technology field have resulted in the new technology paradigm, Wireless Sensor Networks. WSN is becoming increasingly popular due to their wide range of applications. For successful adaption of WSN in real field applications, there are certain issues which need to be addressed particularly the issue of energy consumption associated with sensor nodes. This limitation combined with node deployment has added many challenges to design and management of wireless sensor networks. The WSNs are involved in applications such as remote environment monitoring, event tracking in areas where providing electrical energy is very difficult. Moreover, the battery fed sensor nodes have very small energy associated with them, so preserving that energy and maximizing the usage of that energy is most critical issue in WSNs. Here, we present a survey of various energy optimization and lifetime enhancement techniques in wireless sensor networks and makes the reader aware about various energy saving techniques in WSN. They are analyzed from various points of view: Device hardware, Transmission, MAC protocols and Routing protocols.

  • Intelligent industrial data acquisition and energy monitoring using wireless sensor networks
    Sumeet Gupta, Shekhar Verma, G.S. Tomar, and Raj Kumar Abrol

    IGI Global
    Most of the application-oriented research in the field of Wireless Sensor Networks has been in remote monitoring, including environmental, building automation, and security. However, this paper presents the methodology followed for implementation of a Wireless Sensor Network based solution in a process plant for energy management and leak detection. The sensor network acquires data pertaining to detection of leakage in a plant. The network further serves effectively as a maintenance and diagnostic system that is used to manage the plant and conserve energy in a process plant. The critical design issues, testing methodologies and implementation problems pertaining to the system are also presented. Additionally, special focus has been placed on the calculations pertaining to the network life time.

  • Wireless sensor network based industrial monitoring & diagnostic system
    Sumeet Gupta, Shekhar Varma, G.S. Tomar, and R.K. Abrol

    IEEE
    Wireless sensor network is need of present era or advanced technology. In this paper we have presented the details of methodology followed for implementation of a Wireless Sensor Network in a process plant for based solution for data acquisition in a process plant. Due to its specific approach the solution not only acquires the data but also serves very effectively as a maintenance and diagnostic system, which is used to manage the plant and conserve energy in a process plant. The critical design issues, testing methodologies and implementation problems pertaining to the system are also presented. This paper will help in bringing the process at par with the theoretical results and performance will increase many folds. the simulated results are encouraging and has provided boost to our design and implementation in future.