Follow
Dr. Neeraj Kumar, SMIEEE
Dr. Neeraj Kumar, SMIEEE
Professor, CSED, Thapar Institute of Engineering and Technology, India
Verified email at thapar.edu
Title
Cited by
Cited by
Year
A systematic review on clustering and routing techniques based upon LEACH protocol for wireless sensor networks
S Tyagi, N Kumar
Journal of Network and Computer Applications 36 (2), 623-645, 2013
4942013
A survey on privacy protection in blockchain system
Q Feng, D He, S Zeadally, MK Khan, N Kumar
Journal of Network and Computer Applications 126, 45-58, 2019
4912019
Anonymous authentication for wireless body area networks with provable security
D He, S Zeadally, N Kumar, JH Lee
IEEE Systems Journal 11 (4), 2590-2601, 2016
3992016
Blockchain for 5G-enabled IoT for industrial automation: A systematic review, solutions, and challenges
I Mistry, S Tanwar, S Tyagi, N Kumar
Mechanical systems and signal processing 135, 106382, 2020
3792020
Blockchain for 5G-enabled IoT for industrial automation: A systematic review, solutions, and challenges
NK Ishan Mistry, Sudeep Tanwar, Sudhanshu Tyagi
Mechanical Systems and Signal Processing 135, 106382, 2019
379*2019
Fog computing for Healthcare 4.0 environment: Opportunities and challenges
A Kumari, S Tanwar, S Tyagi, N Kumar
Computers & Electrical Engineering 72, 1-13, 2018
3632018
Decision tree and SVM-based data analytics for theft detection in smart grid
A Jindal, A Dua, K Kaur, M Singh, N Kumar, S Mishra
IEEE Transactions on Industrial Informatics 12 (3), 1005-1016, 2016
3572016
Secure signature-based authenticated key establishment scheme for future IoT applications
S Challa, M Wazid, AK Das, N Kumar, AG Reddy, EJ Yoon, KY Yoo
Ieee Access 5, 3028-3043, 2017
3252017
A systematic review on routing protocols for vehicular ad hoc networks
A Dua, N Kumar, S Bawa
Vehicular Communications 1 (1), 33-52, 2014
3182014
Blockchain for industry 4.0: A comprehensive review
U Bodkhe, S Tanwar, K Parekh, P Khanpara, S Tyagi, N Kumar, M Alazab
IEEE Access 8, 79764-79800, 2020
3032020
Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks
D He, N Kumar, J Chen, CC Lee, N Chilamkurti, SS Yeo
Multimedia Systems 21 (1), 49-60, 2015
2992015
Edge computing in the industrial internet of things environment: Software-defined-networks-based edge-cloud interplay
K Kaur, S Garg, GS Aujla, N Kumar, JJPC Rodrigues, M Guizani
IEEE communications magazine 56 (2), 44-51, 2018
2872018
Design of secure user authenticated key management protocol for generic IoT networks
M Wazid, AK Das, V Odelu, N Kumar, M Conti, M Jo
IEEE Internet of Things Journal 5 (1), 269-282, 2017
2872017
A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment
R Amin, N Kumar, GP Biswas, R Iqbal, V Chang
Future Generation Computer Systems 78, 1005-1019, 2018
2622018
A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks
D He, N Kumar, N Chilamkurti
Information Sciences 321, 263-277, 2015
2542015
Path planning techniques for unmanned aerial vehicles: A review, solutions, and challenges
S Aggarwal, N Kumar
Computer Communications 149, 270-299, 2020
2372020
Secure remote user authenticated key establishment protocol for smart home environment
M Wazid, AK Das, V Odelu, N Kumar, W Susilo
IEEE Transactions on Dependable and Secure Computing 17 (2), 391-406, 2017
2342017
Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks
R Amin, SKH Islam, GP Biswas, MK Khan, L Leng, N Kumar
Computer Networks 101, 42-62, 2016
2332016
Blockchain for smart communities: Applications, challenges and opportunities
S Aggarwal, R Chaudhary, GS Aujla, N Kumar, KKR Choo, AY Zomaya
Journal of Network and Computer Applications 144, 13-48, 2019
2312019
Security and privacy for the internet of drones: Challenges and solutions
C Lin, D He, N Kumar, KKR Choo, A Vinel, X Huang
IEEE Communications Magazine 56 (1), 64-69, 2018
2292018
The system can't perform the operation now. Try again later.
Articles 1–20