Proof-of-work consensus approach in blockchain technology for cloud and fog computing using maximization-factorization statistics G Kumar, R Saha, MK Rai, R Thomas, TH Kim IEEE Internet of Things Journal 6 (4), 6835-6842, 2019 | 145 | 2019 |
Privacy Ensured -Healthcare for Fog-Enhanced IoT Based Applications R Saha, G Kumar, MK Rai, R Thomas, SJ Lim IEEE Access 7, 44536-44543, 2019 | 121 | 2019 |
A novel trust evaluation process for secure localization using a decentralized blockchain in wireless sensor networks TH Kim, R Goyat, MK Rai, G Kumar, WJ Buchanan, R Saha, R Thomas IEEE access 7, 184133-184144, 2019 | 117 | 2019 |
Decentralized accessibility of e-commerce products through blockchain technology G Kumar, R Saha, WJ Buchanan, G Geetha, R Thomas, MK Rai, TH Kim, ... Sustainable Cities and Society 62, 102361, 2020 | 110 | 2020 |
Internet-of-Forensic (IoF): A blockchain based digital forensics framework for IoT applications G Kumar, R Saha, C Lal, M Conti Future Generation Computer Systems 120, 13-25, 2021 | 93 | 2021 |
A taxonomy of security issues in Industrial Internet-of-Things: Scoping review for existing solutions, future implications, and research challenges P Jayalaxmi, R Saha, G Kumar, N Kumar, TH Kim IEEE Access 9, 25344-25359, 2021 | 79 | 2021 |
Machine and deep learning solutions for intrusion detection and prevention in IoTs: A survey PLS Jayalaxmi, R Saha, G Kumar, M Conti, TH Kim IEEE Access 10, 121173-121192, 2022 | 76 | 2022 |
Blockchain-based data storage with privacy and authentication in internet of things R Goyat, G Kumar, M Alazab, M Conti, MK Rai, R Thomas, R Saha, ... IEEE Internet of Things Journal 9 (16), 14203-14215, 2020 | 67 | 2020 |
A survey and taxonomy of consensus protocols for blockchains A Singh, G Kumar, R Saha, M Conti, M Alazab, R Thomas Journal of Systems Architecture 127, 102503, 2022 | 63 | 2022 |
A survey on security challenges and solutions in the IOTA M Conti, G Kumar, P Nerurkar, R Saha, L Vigneri Journal of Network and Computer Applications 203, 103383, 2022 | 60 | 2022 |
Secure device-to-device communications for 5g enabled internet of things applications GS Gaba, G Kumar, TH Kim, H Monga, P Kumar Computer Communications 169, 114-128, 2021 | 58 | 2021 |
Blockchain powered secure range-free localization in wireless sensor networks R Goyat, G Kumar, MK Rai, R Saha, R Thomas, TH Kim Arabian Journal for Science and Engineering 45, 6139-6155, 2020 | 58 | 2020 |
A privacy preserving distributed ledger framework for global human resource record management: The blockchain aspect TH Kim, G Kumar, R Saha, MK Rai, WJ Buchanan, R Thomas, M Alazab IEEE access 8, 96455-96467, 2020 | 57 | 2020 |
Robust and Lightweight Key Exchange (LKE) Protocol for Industry 4.0 GS GABA, G KUMAR, H MONGA, TAIH KIM, M LIYANAGE IEEE Access 8, 132808-132824, 2020 | 55 | 2020 |
A privacy-preserving secure framework for electric vehicles in IoT using matching market and signcryption G Kumar, R Saha, MK Rai, WJ Buchanan, R Thomas, G Geetha, ... IEEE Transactions on Vehicular Technology 69 (7), 7707-7722, 2020 | 54 | 2020 |
RK‐AES: An Improved Version of AES Using a New Key Generation Process with Random Keys R Saha, G Geetha, G Kumar, T Kim Security and Communication Networks 2018 (1), 9802475, 2018 | 52 | 2018 |
A secure localization scheme based on trust assessment for WSNs using blockchain technology R Goyat, G Kumar, M Alazab, R Saha, R Thomas, MK Rai Future Generation Computer Systems 125, 221-231, 2021 | 50 | 2021 |
Robust and lightweight mutual authentication scheme in distributed smart environments GS Gaba, G Kumar, H Monga, TH Kim, P Kumar IEEE Access 8, 69722-69733, 2020 | 45 | 2020 |
The security perspectives of vehicular networks: A taxonomical analysis of attacks and solutions A Verma, R Saha, G Kumar, T Kim Applied Sciences 11 (10), 4682, 2021 | 42 | 2021 |
A comprehensive survey of authentication methods in Internet-of-Things and its conjunctions A Kumar, R Saha, M Conti, G Kumar, WJ Buchanan, TH Kim Journal of Network and Computer Applications 204, 103414, 2022 | 41 | 2022 |