Skip to main content

previous disabled Page of 2
and
  1. No Access

    Article

    Detecting Sybil Attacks in VANET: Exploring Feature Diversity and Deep Learning Algorithms with Insights into Sybil Node Associations

    Vehicular ad hoc networks (VANET) facilitate vehicle to everything (V2X) communication between vehicles and road side units (RSU) to exchange safety and alert messages required for the successful implementatio...

    Rukhsar Sultana, Jyoti Grover in Journal of Network and Systems Management (2024)

  2. No Access

    Article

    Analysis of crypto module in RIOT OS using Frama-C

    With the growing advances in Internet of Things (IoT) technology, it has become an indispensable part of many areas like home automation, industries, medical equipment, etc. Thus, the security of the IoT hardw...

    Nirnai Rai, Jyoti Grover in The Journal of Supercomputing (2024)

  3. No Access

    Article

    Federated learning analysis for vehicular traffic flow prediction: evaluation of learning algorithms and aggregation approaches

    The increasing development and implementation of Intelligent Transportation System have led to a growing focus on traffic flow prediction. To make these predictions, a large amount of historical and real-time ...

    Nidhi, Jyoti Grover in Cluster Computing (2024)

  4. No Access

    Chapter and Conference Paper

    Feature Selection-Based Evaluation for Network Intrusion Detection System with Machine Learning Methods on CICIDS2017

    Network attacks endanger the privacy and security of information. As a consequence of this, an effective mechanism is required for identifying network attacks. In this study, we show NIDS to increase classific...

    Lav Upadhyay, Meenakshi Tripathi, Jyoti Grover in Communication and Intelligent Systems (2024)

  5. No Access

    Chapter and Conference Paper

    Addressing DIO Suppression Attack in RPL based IoT Networks

    The Internet of Things (IoT) has brought a revolution in technology in the last decade. IoT is susceptible to numerous internal routing attacks because of the characteristics of the sensors used in IoT network...

    Rajat Kumar, Jyoti Grover, Girish Sharma in Information Security, Privacy and Digital … (2024)

  6. No Access

    Article

    Integration of Blockchain in VANET Using gRPC for Privacy Preservation of Vehicles

    Vehicular ad hoc network (VANET) is a mobile network comprising vehicles, roadside units, and related infrastructure that enables inter-node communication to manage traffic and enhance road safety. Despite its...

    Aditya Kumar Singh, Jyoti Grover, Sumita Mishra in SN Computer Science (2023)

  7. No Access

    Chapter and Conference Paper

    Performance Assessment of Routing Protocols in Cognitive Radio Vehicular Ad Hoc Networks

    Cognitive radio technology is an inventive method to solve spectrum scarcity problems in wireless networks. Growing interest of cognitive radio (CR) technology in vehicular communication systems has led CR-ena...

    Jyoti Grover, Sunita Singhal in Applied Mathematics and Computational Intelligence (2023)

  8. No Access

    Article

    Investigating the performance of a vehicular communication system based on visible light communication (VLC)

    The use of visible light for vehicle-to-vehicle (V2V) communication is intrinsically suited. This work uses the NS3.25 simulator to develop and simulate a V2V communication system based on visible light commun...

    Sumita Mishra, Ritvik Maheshwari in International Journal of Information Techn… (2022)

  9. No Access

    Chapter and Conference Paper

    Analysis of Hatchetman Attack in RPL Based IoT Networks

    Low power and lossy networks (LLN) are flourishing as an integral part of communication infrastructure, particularly for growing Internet of Things (IoT) applications. RPL-based LLNs are vulnerable and unprote...

    Girish Sharma, Jyoti Grover, Abhishek Verma in Emerging Technologies in Computer Engineer… (2022)

  10. No Access

    Chapter and Conference Paper

    Performance Evaluation of Image-Based Diseased Leaf Identification Model Using CNN and GA

    India is an agricultural country and plays an important role in agriculture due to rapid population growth and increased demand for food production. Due to growing population, weather shifts and to make more p...

    Anita Shrotriya, Akhilesh Kumar Sharma in International Conference on Artificial Int… (2022)

  11. No Access

    Article

    LICCA: a lightweight image cipher using 3-D cellular automata

    The rapid rise of Internet of Technology (IoT) applications in the twenty-first century is characterized by the frequent transmission of sensitive multimedia data. Such transmissions are vulnerable to security...

    Manu Shrivastava, Satyabrata Roy, Krishna Kumar in Nonlinear Dynamics (2021)

  12. No Access

    Chapter and Conference Paper

    Investigation of SNR in VLC-Based Intelligent Transportation System Under Environmental Disturbances

    Various forms of wireless communications technologies have been proposed for intelligent transportation systems (ITSs). Recent events have illustrated that visible light communication (VLC) can play a signific...

    Ritvik Maheshwari, Jyoti Grover in Mobile Radio Communications and 5G Networks (2021)

  13. No Access

    Chapter and Conference Paper

    Hybrid Genetic Algorithm: Traveling Salesman Problem

    A genetic algorithm has three main operators namely selection, crossover and mutation. Each operator has various sub operators. Selection of sub operator that can be applied on particular problem is difficult...

    Sunita Singhal, Hemlata Goyal, Parth Singhal in Advances in Decision Sciences, Image Proce… (2020)

  14. No Access

    Chapter and Conference Paper

    Performance Assessment of Thirteen Crossover Operators Using GA

    Performance of genetic algorithms depends on evolutionary operators, i.e., selection, crossover, and mutation, in general, and on the type of crossover operators, in particular. With constant research going on...

    Ashish Jain, Tripti Mishra, Jyoti Grover, Vivek Verma in Soft Computing for Problem Solving (2019)

  15. No Access

    Chapter and Conference Paper

    Real-Time VANET Applications Using Fog Computing

    The main objective of vehicular ad hoc networks (VANETs) is to improve driver safety and traffic efficiency. Most of VANET applications are based on periodic exchange of safety messages between nearby vehicles...

    Jyoti Grover, Ashish Jain, Sunita Singhal in Proceedings of First International Confere… (2018)

  16. No Access

    Chapter and Conference Paper

    Cuckoo Search Strategies for Solving Combinatorial Problems (Solving Substitution Cipher: An Investigation)

    Approximate algorithms have been well studied in order to solve combinatorial problems. This paper addresses cryptanalysis of the substitution cipher which is an interesting combinatorial problem. For this pur...

    Ashish Jain, Jyoti Grover, Tarun Jain in Proceedings of First International Confere… (2018)

  17. Article

    Attack models and infrastructure supported detection mechanisms for position forging attacks in vehicular ad hoc networks

    Vehicular ad hoc networks (VANETs) are vulnerable to message forging attacks, where an attacker creates a new message or replays/modifies an existing message. Forging of message can be carried out by attacker ...

    Jyoti Grover, Vijay Laxmi, Manoj Singh Gaur in CSI Transactions on ICT (2013)

  18. Chapter and Conference Paper

    Vimprint: Exploring Alternative Learning through Low-End Mobiles

    The Internet today provides a plethora of applications to assist anyone wanting to learn a new subject, language or a concept. Resources available include dictionaries, translation engines, downloadable e-book...

    Sheetal K. Agarwal, Jyoti Grover, Anupam Jain in Human-Computer Interaction – INTERACT 2013 (2013)

  19. Chapter and Conference Paper

    Visual Conversational Interfaces to Empower Low-Literacy Users

    Mobile phones have come a long way from being plain voice calling devices to becoming multipurpose handy tools powered by ever increasing new applications available on-the-go. For many, the mobile phone of tod...

    Sheetal K. Agarwal, Jyoti Grover, Arun Kumar in Human-Computer Interaction – INTERACT 2013 (2013)

  20. No Access

    Chapter

    Trust Establishment Techniques in VANET

    Establishment of trust is amongst the most critical aspects of any system’s security. For any network, trust refers to a set of relationships amongst the entities participating in the network operations. Trust...

    Jyoti Grover, Manoj Singh Gaur, Vijay Laxmi in Wireless Networks and Security (2013)

previous disabled Page of 2