Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Designing a Blockchain Based Framework for IoT Data Trade

    With its application ranging from smart homes and wearables to smart vehicles and smart cities, Internet of Things(IoT) devices have become an integral part of our lives. These devices are enabled with sensing...

    Pranav Kumar Singh, Roshan Singh, Sunit Kumar Nandi in Innovations for Community Services (2020)

  2. No Access

    Chapter

    Seamless V2I Communication in HetNet: State-of-the-Art and Future Research Directions

    Vehicle-to-infrastructure ( ) communication enables a variety of applications and services, including safety, infotainment, mobility, payment, and so on, to be accessed and consumed. However, V2I requires seam...

    Pranav Kumar Singh, Roshan Singh in Connected Vehicles in the Internet of Thin… (2020)

  3. No Access

    Chapter and Conference Paper

    Smart Contract Based Decentralized Parking Management in ITS

    Pranav Kumar Singh, Roshan Singh, Sunit Kumar Nandi in Innovations for Community Services (2019)

  4. No Access

    Chapter and Conference Paper

    Machine Learning Based Approach to Detect Position Falsification Attack in VANETs

    VANETs is a major enabling technology for connected and autonomous vehicles. Vehicles communicate wirelessly with other vehicles, sensors, humans, and infrastructure, thereby improving decision making based on...

    Pranav Kumar Singh, Shivam Gupta, Ritveeka Vashistha in Security and Privacy (2019)

  5. No Access

    Chapter and Conference Paper

    Managing Smart Home Appliances with Proof of Authority and Blockchain

    With the advance in technology and growth in standard of living, smart homes have become a reality. Smart homes consist of home appliances and devices that communicate with each other to address the needs of t...

    Pranav Kumar Singh, Roshan Singh, Sunit Kumar Nandi in Innovations for Community Services (2019)

  6. No Access

    Chapter and Conference Paper

    Elliptic Curve Cryptography Based Mechanism for Secure Wi-Fi Connectivity

    The connection establishment and client handover mechanism for Wi-Fi Protected Access (WPA/WPA2) Pre-Shared Key (PSK) networks described by the IEEE 802.11 standard are vulnerable to various attacks. The exist...

    Pranav Kumar Singh, Prateek Vij, Arpan Vyas in Distributed Computing and Internet Technol… (2019)