FUNDED PROJECT

DST-PMAC project, Symmetric Random Function Generator as a New Cryptographic Primitive, grant of 15 Lakhs by DST India, Lovely Professional University, India.

PATENT

System and method for generating a symmetrically balanced output, Patent Grant Id: US11070354B2.

PUBLICATIONS

[58] A. Verma, R. Saha, N. Kumar, Gulshan Kumar, Tai Hoon Kim, A detailed survey of denial of service for IoT and multimedia systems: Past, present and futuristic development. Multimedia Tools Appl, 81, 19879–19944, 2022.

[57] Gulshan Kumar, Rahul Saha, Mauro Conti, Reji Thomas, Tannishtha Devgun, Joel J. P C. Rodrigues, Adaptive Intrusion Detection in Edge Computing using Cerebellar Model Articulation Controller and Spline Fit, IEEE Transactions on Services Computing, 2022, Accepted.

[56] Ashish Kumar, Rahul Saha, Mauro Conti, Gulshan Kumar, Tai Hoon Kim, A Comprehensive Survey of Authentication Methods in Internet-of-Things and Its Conjunctions, Journal of Network and Computer Applications, 2022, Accepted.


[55] Arshdeep Singh, Gulshan Kumar, Rahul Saha, Mauro Conti, Mamoun Alazab, Reji Thomas, Consensus in Blockchains: State-of-the-art Approaches and Open Futuristic Opportunities, Journal of System Architecture, 2022, Accepted.

[54] Pranav Nerurkar, Rahul Saha, Gulshan Kumar, Mauro Conti, Luigi Vignere, A Survey on Security Challenges and Solutions in IOTA, Journal of Network and Computer Applications, Vol. 203, 2022.

[53] P.L.S. Jayalaxmi, Rahul Saha, Gulshan Kumar, Tai-Hoon Kim, Machine and deep learning amalgamation for feature extraction in Industrial Internet-of-Things, Computers & Electrical Engineering, Volume 97, 2022.

[52] A. Brighente, M. Conti, G. Kumar, R. Ghanbari and R. Saha, Knocking on Tangle's Doors: Security Analysis of IOTA Ports, 2021 IEEE International Conference on Blockchain (Blockchain), 2021, pp. 433-439.

[51] R. Saha, G. Kumar, A. Brighente and M. Conti, Towards An Enhanced Reputation System for IOTA’s Coordicide, 2021 Third International Conference on Blockchain Computing and Applications (BCCA), 2021, pp. 26-33.

[50] Archana Chhabra, Rahul Saha, Gulshan Kumar, Tai Hoon Kim, A Survey of Privacy Concerns in Blockchains and Information Retrieval Algorithms, CEUR Workshop Proceedings, Computing and Mathematics Conference, August 19 – 20, 2021, Chennai, India.

[49] Rahul Saha, Gulshan Kumar, Tannishtha Devgun, William Buchanan, Reji Thomas, Mamoun Alazab, Tai-Hoon Kim, Joel Rodrigues, A Blockchain Framework in Post-Quantum Decentralization, IEEE Transactions on Services Computing, Early Access, 2021.

[48] Irfan Ahmad Rather, Gulshan Kumar, Rahul Saha, Survey on RoF technology and the mitigation schemes over the challenges in the RoF network, Optik, 247, 2021.

[47] Rahul Saha, Gulshan Kumar, Mauro Conti, Tannishtha Devgun, Tai-Hoon Kim, Mamoun Alazab, Reji Thomas, DHACS: Smart Contract-based Decentralized Hybrid Access Control for Industrial Internet of Things, IEEE Transactions on Industrial Informatics, Volume 18, Issue 5, 2021.

[46] Rahul Saha, Ganesan Geetha, Gulshan Kumar, William J. Buchanan, Tai-Hoon Kim, A Secure Random Number Generator with Immunity and Propagation Characteristics for Cryptography Functions, Applied Sciences, 2021, 11, 8073.

[45] R Saha, G Kumar, N Kumar, T Kim, T Devgun, R Thomas, A Barnawi, Internet-of-Things Framework for Oxygen Saturation Monitoring in COVID-19 Environment, IEEE Internet of Things Journal, Early Access, 2021.

[44] TH Kim, G Kumar, R Saha, WJ Buchanan, T Devgun, R Thomas, LiSP-XK: Extended light-weight Signcryption for IoT in Resource-constrained Environments, IEEE Access, Early Access, 2021.

[43] Rahul Saha, Gulshan Kumar, G. Geetha, Tai Hoon-Kim, Mamoun Alazab, Reji Thomas, Mritunjay Kumar Rai, Joel J Rodrigues, The Blockchain Solution for the Security of Internet of Energy and Electric Vehicle Interface, IEEE Transactions on Vehicular Technology, 2021 (Accepted).

[42] Rekha Goyat, Gulshan Kumar, Mamoun Alazab, Rahul Saha, Reji Thomas, Mritunjay Kumar Rai, A secure localization scheme based on trust assessment for WSNs using blockchain technology, Future Generation Computer Systems, Volume 125, 2021, Pages 221-231.

[41] Amandeep Verma, Rahul Saha, Gulshan Kumar, Tai Hoon Kim, The Security Perspectives of Vehicular Networks: A Taxonomical Analysis of Attacks and Solutions, Applied Sciences, 11(10), 2021.

[40] PLS Jayalaxmi, Rahul Saha, Gulshan Kumar, Tai Hoon Kim, Machine and Deep Learning Amalgamation for Feature Extraction in Industrial Internet-of-Things, 2021, Computers and Electrical Engineering, Accepted.

[39] G Kumar, R Saha, C Lal, M Conti, Internet-of-Forensic (IoF): A blockchain based digital forensics framework for IoT applications, Future Generation Computer Systems 120, 13-25, 2021.

[38] A. Kumar, R. Saha and G. Kumar, LiSP: A Lightweight Signcryption using PHOTON hash for Internet-of-Things Infrastructure, 2020 IEEE International Symposium on Sustainable Energy, Signal Processing and Cyber Security (iSSSC), Gunupur Odisha, India, 2020, pp. 1-6 .

[37] P. Jayalaxmi, R. Saha, G. Kumar, N. Kumar and T. H. Kim, A Taxonomy of Security Issues in Industrial Internet-of-Things: Slcoping Review for Existing Solutions, Future Implications, and Research Challenges, IEEE Access, Volume 9, 2021.

[36] Ashish Kumar, Rahul Saha, Mamoun Alazab, Gulshan Kumar, A Lightweight Signcryption Method for Perception Layer in Internet-of-Things, Journal of Information Security and Applications, Volume 55, December 2020, 102662 .

[35] Gulshan Kumar, Rahul Saha, G Geetha, Mamoun Alazab, RESCHAIN: A Futuristic Solution for Avoiding Fraudulence in Real Estate Environment. In Maleh Y, Shojafar M, Alazab M, Romdhani I, editors, Blockchain for Cybersecurity and Privacy: Architectures, Challenges, and Applications. CRC Press. 2020.

[34] Rekha Goyat, Gulshan Kumar, Mamoun Alazab, Mauro Conti, Rahul Saha, Rai, Mritunjay Kumar Rai, Reji Thomas, Tai-hoon Kim, Blockchain-based Data Storage with Privacy and Authentication in Internet-of-Things, IEEE Internet-of Things Journal, Early Access, 2020.

[33] Gulshan Kumar, Rahul Saha, W J Buchanan, G. Geetha, Reji Thomas, M K Rai, Tai-Hoon Kim, Mamoun Alazab, Decentralized Accessibility of e-Commerce Products Through Blockchain Technology, Sustainable Cities and Society, Volume 62, November 2020, 102361.

[32] Rahul Saha, G. Geetha, Gulshan Kumar, Tai Hoon Kim, On the Propagation and Immunity Characteristics of Symmetric and Balanced Random Function Generator (SRFG) for Cryptographic Primitives, Bulletin of the Polish Academy of Sciences: Technical Sciences. (Accepted)

[31] Tai-Hoon Kim, Gulshan Kumar, Rahul Saha, Mritunjay Kumar Rai, William J Buchanan, Reji Thomas, Mamoun Alazab, A Privacy Preserving Distributed Ledger Framework for Global Human Resource Record Management: The Blockchain Aspect, IEEE Access, Vol.8, 2020.

[30] Tai-Hoon Kim Gulshan Kumar, Rahul Saha, Mamoun Alazab, William J Buchanan, Mritunjay Kumar Rai, G.Geetha, Reji Thomas, CASCF: Certificateless Aggregated SignCryption Framework for Internet-of-Things Infrastructure, IEEE Access, Vol.8, No.1, 2020.

[29] Gulshan Kumar, Mritunjay Rai, Rahul Saha, William J. Buchanan, Reji Thomas, G. Geetha, Tai-Hoon, Joel JPC Rodrigues, A Privacy-Preserving Secure Framework for Electric Vehicles in IoT using Matching Market and Signcryption, IEEE Transactions on Vehicular Technology, 2020, Early Access.

[28] G. Kumar, R. Saha, M. K. Rai and T. Kim, G.Geetha, Reji Thomas, Joel JPC Rodrigues, A Novel Framework for Fog Computing: Lattice-based Secured Framework for Cloud Interface , IEEE Internet of Things, 2020, Early Access.

[27] G. Kumar, R. Saha, M. K. Rai, R. Thomas and T. Kim, "A Lattice Signcrypted Secured Localization in Wireless Sensor Networks," in IEEE Systems Journal, doi: 10.1109/JSYST.2019.2961476.

[26] Rekha Goyat, Gulshan Kumar, Mritunjay Kumar Rai, Rahul Saha, Reji Thomas, Tai Hoon Kim, Blockchain Powered Secure Range-Free Localization in Wireless Sensor Networks, Arabian Journal for Science and Engineering, 2020.

[25] T. H. Kim, R. Goyat, M. K. Rai, G. Kumar, W. J. Buchanan, R. Saha, R. Thomas, A Novel Trust Evaluation Process for Secure Localization using a Decentralized Blockchain in Wireless Sensor Networks, Accepted in IEEE Access, Vol.7, 2019.

[24] R. Saha, G. Geetha, G. Kumar, T. Kim and W. J. Buchanan, "MRC4: A Modified RC4 Algorithm Using Symmetric Random Function Generator for Improved Cryptographic Features," in IEEE Access, vol. 7, pp. 172045-172054, 2019.

[23] Rekha Goyat, Mritunjay Kumar Rai, Gulshan Kumar, Rahul Saha, Tai-Hoon Kim, Energy Efficient Range-Free Localization Algorithm for Wireless Sensor Networks, Sensors, Vol.19, Issue16, 2019.

[22] Gulshan Kumar, Rahul Saha, Mritunjay Kumar Rai, Reji Thomas, Tai-Hoon Kim, Proof-of-Work Consensus Approach in Blockchain technology for Cloud and Fog Computing using Maximization-Factorization Statistics, IEEE Internet of Things Journal, Vol.6, No.4, 2019. doi:10.1109/JIOT.2019.2911969.

[21] R. Saha, G. Kumar, M. K. Rai, R. Thomas and S. Lim, Privacy ensured e-healthcare for fog enhanced IoT-based Applications”, IEEE Access, Vol., 2019. Doi:10.1109/ACCESS.2019.2908664 .

[20] Gulshan Kumar, Rahul Saha, Mritunjay Rai, Reji Thomas, Tai-Hoon Kim, Se-Jung Lim, Jai Sukh Paul Singh, Improved Location Estimation in Wireless Sensor Networks Using a Vector-Based Swarm Optimized Connected Dominating Set, Sensors 19 (2), 376, 2019.

[19] G. Kumar, R. Saha, M. K. Rai and T. Kim, Multidimensional Security Provision for Secure Communication in Vehicular Ad Hoc Networks Using Hierarchical Structure and End-to-End Authentication, IEEE Access 6, 46558-46567, 2018.

[18] Vikash Kulhari, Se-Jung Lim, Gulshan Kumar, Rahul Saha, Mritunjay Kumar Rai, Analyzing the Tradeoff between Planning and Execution of Robotics Process Automation Implementation in IT Sector, International Journal of Advanced Science and Technology, Vol.120, 2018.

[17] Rahul Saha, G. Geetha, Gulshan Kumar, Tai-Hoon Kim, RK-AES: An Improved Version of AES Using a New Key Generation Process with Random Keys, Security and Communication Networks, vol. 2018, Article ID 9802475, 11 pages, 2018.

[16] Gulshan Kumar, Thirumalaraju Vamsi Krishna, Mritunjay Rai, Rahul Saha, Hye-Jin Kim, An Approach for Location Verification using Atomic Localization in Wireless Sensor Networks, International Journal of Control and Automation, Vol.11, 2018.

[15] Gulshan Kumar, Mritunjay Kumar Rai, Rahul Saha, Hye-jin Kim, An improved DV-Hop localization with minimum connected dominating set for mobile nodes in wireless sensor networks, International Journal of Distributed Sensor Networks 14(1), 2018.

[14] Manpreet Kaur, Gulshan Kumar, Mritunjay Rai, Rahul Saha, Hye-jin Kim, Design of Distributed Approach for Wormhole Attack Detection in Wireless Sensor Networks, International Journal of Control and Automation, Vol.10, No.7, pp:89 96, 2017.

[13] Rahul Saha, Geetha Ganesan, Gulshan Kumar, Probabilistic Triadic Model: Relation of Triadic Closure and Social Influences, International Journal of Multimedia and Ubiquitous Engineering, Vol.12, No.7, pp:01-08, 2017.

[12] Rahul Saha, G. Geetha, Symmetric random function generator (SRFG): A novel cryptographic primitive for designing fast and robust algorithms”, In Chaos, Solitons & Fractals, Volume 104, 2017, Pages 371-377.

[11] Gulshan Kumar, Mritunjay Kumar Rai, Hye-jin Kim, and Rahul Saha, Secure Localization Approach Using Mutual Authentication and Insider Node Validation in Wireless Sensor Networks, Mobile Information Systems, Vol.2017, 2017.

[10] Gulshan Kumar, Mritunjay Kumar Rai, Rahul Saha, Securing range free localization against wormhole attack using distance estimation and maximum likelihood estimation in Wireless Sensor Networks, In Journal of Network and Computer Applications, Volume 99, 2017.

[9] Rahul Saha, Geetha Ganesan, Gulshan Kumar, Probabilistic Relation between Triadic Closure and the Balance of Social Networks in Presence of Influence, The International Journal of Cyber Behavior, Psychology and Learning (IJCBPL).

[8] Gagan Rana, Rahul Saha, Geetha Ganesan, Analysis of Relation between Entropy and Factors in Image Based CAPTCHAs”, International Journal of Engineering and Technology (IJET), Vol 7 No 6, pp: 2105-2108, 2016.

[7] Gulshan Kumar, Rahul Saha, Mritunjay Kumar Rai, “Improvement of Trust and Reputation using Intrusion Detection and Authentication in Ad Hoc Networks”, International Journal of Security and Its Applications Vol. 10, No. 4, pp.63-70, 2016.

[6] Gulshan Kumar, Rahul Saha, Mritunjay Kumar Rai , DSAB – A Hybrid Approach for Providing Security in MANETs”, an extension of a paper published in the ISCTURKEY2012, International Journal of Information Security Science, Vol.1, No.3, page: 82., 2012.

[5] Rahul Saha, Riyanka Manna, G. Geetha, Combocaptcha-A New Vision in CAPTCHA World, International Journal of Software Engineering & Its Applications 8 (11), Scopus Indexed, 2014.

[4] Gulshan Kumar, Rahul Saha, Mritunjay Kumar Rai, SeLHOC: Secured Location Estimation With One Hop Clusters In Wireless Sensor Networks, International Journal of Applied Engineering 10(5), Scopus Indexed, 2015.

[3] Rahul Saha, Riyanka Manna, G. Geetha CAPTCHINO- A Gamification of Image-based CAPTCHAs to Evaluate Usability Issues” in the Proceedings of International Conference on Computing Sciences (ICCS 2012) in association with IEEE, Scopus Indexed, September 2012.

[2] Riyanka Manna, Rahul Saha, G. Geetha, Complexity Analysis of Image-based CAPTCHAs to Evaluate Usability Issues, in the Proceedings of International Conference on Computing Sciences (ICCS 2012) in association with IEEE, Scopus Indexed, September 2012.

[1] Rahul Saha, G. Geetha, Gang-soo Lee, “Claptcha- A Novel Captcha”, T.-h. Kim et al. (Eds.): SecTech 2011, CCIS 259, pp. 94–100, 2011 © Springer-Verlag Berlin Heidelberg 2011. This work is supported by Security Engineering Research Center and granted by Korea Ministry of Knowledge Economy.


CONFERENCES –WORKSHOPS

[10] IoT-SECFOR 2021, The 5th International Workshop on Security and Forensics of IoT in conjunction with the 16th International Conference on Availability, Reliability and Security, Vienna, Austria, 19th August 2021, https://www.ares-conference.eu/conference-2021/keynote-speakers/ (Keynote speaker).

[9] EASTON100, International Conference on Computing Sciences Organized by Advanced Computing Research Society, India, May 1, 2021. (Workshop chair).

[8] Presented paper in 4th International Conference on Intelligent, Interactive Systems and Applications(IISA2019, June 28-30, 2019, Bangkok, Thailand.

[7] CISCO Instructor Conference and Workshop, India, 14-15 February 2019.

[6] 3rd International Conference on Intelligent Computing and Signal Processing-Autumn Session, 28-30 September 2018, Zhuhai, China as Keynote Speaker.

[5] Shannon100 International Conference in 2016 at Lovely Professional University, Punjab as paper presenter and venue coordinator.

[4] NNSC workshop and National Championship in 2014 at Lovely Professional University, Punjab. Worked as a faculty coordinator and an active participant.

[3] Wilkes100 International Conference in 2013 at Lovely Professional University, Punjab as paper presenter and organizer.

[2] National Conference on Data Mining at Lingaya’s University, Faridabad, 2012 as a paper presenter.

[1] Turing100 International Conference in 2012 at Lovely Professional University, Punjab as paper presenter and organizer.


ONGOING RESEARCH WORKS

  • A Range-free Power Efficient Cooperative MAC Localization Algorithm in mobile Heterogeneous WSNs

  • Future Applications of IOTA ledger

  • Admissibility of digital evidences in courtroom

  • Analysis of deep learning models for intrusion detection in IIoTs

  • Severity analysis of attack detection in IoTs

  • Privacy analysis of healthcare blockchains

  • Intrusion detection in multimedia networks

  • Polar code feasibility for post-quantum sustainability of cryptography

  • Decentralization in E-voting frameworks