Journal of University of Shanghai for Science and Technology, 2021
The Internet of Things (IoT) is one of the most promising scientific fields of the last decade. T... more The Internet of Things (IoT) is one of the most promising scientific fields of the last decade. The number of devices developed that support Internet things makes the application of internet things more interesting. The field of use includes the insurance sector, intelligent monitoring Environment, Smart City, sector-health care, Intelligent City, and also many other applications enabled for smart devices.The vision of the introduction of the internet, forming a network called IoT, where various information technology devices are connected, security and trust are most important for the user, because this network presumably used a large amount of data.However, trust is a significant obstacle that can hinder the growth of the IoT and even slow down the significant compression of many applications.This paper presents an approach using trust management (TM) with next-generation IoT networks for healthcare, agriculture, and sustainable development goals. Implementation of IoT conveys var...
In wireless sensor networks, establishing a suitable link between the base station and nodes is a... more In wireless sensor networks, establishing a suitable link between the base station and nodes is an essential task. Link establishing is termed as routing which helps the network for reliable and efficient communication. At the same time attacks in the routing schemes to gain access to the data also increases and it significantly affects the network performance. Privacy preservation, encryption, and authentication can't handle some routing attacks. The trust has recently introduced a mechanism to increase safety and better node interaction. The routing mechanism of trust allows you to avoid that nodes are routed by the solution to be credible. Many trust-based Routing Protocol (RP) use routing that accounts for various routing attacks. This study aims to analyze the recent situation and search open research topics by investigating the existing proposed scheme. The paper presents the trust-based system and routing protocols. Eventually, comparative performance analysis of RP is made using the NS-2 network simulator.
2012 Ninth International Conference on Wireless and Optical Communications Networks (WOCN), 2012
ABSTRACT The Mobile ad hoc networks served as explanatory facts on various issues and challenges ... more ABSTRACT The Mobile ad hoc networks served as explanatory facts on various issues and challenges to learn threats in security of wireless data. This data is actually moves around various components of ad hoc network to perform various operations. The confliction comes when a data is associated with multiple components and reflects the different outputs inside the network. Then it vanish many legitimate operations and creates nuisance or misconduct with participating nodes. Trust overlay can describe respective policies to opt a node to communicate data inside a network. The applications of SMC protocols showed a great impact and useful derivations to compute the secure result at various levels. Further, the various frontiers of infrastructure less networks are in keen interest to serve better with minimal delay in transmission of packets. That means the probability of occurrences of packet drops can also be address with respect to various attacks and countermeasures. This work emphasizes on inside view in an ad hoc network to find and eliminate various security threats to rectify nuisance created by multi association of freely moving data.
Purpose The latest 2019 coronavirus (COVID-2019), which first appeared in December 2019 in Wuhan&... more Purpose The latest 2019 coronavirus (COVID-2019), which first appeared in December 2019 in Wuhan's city in China, rapidly spread around the world and became a pandemic. It has had a devastating impact on daily lives, the public's health and the global economy. The positive cases must be identified as soon as possible to avoid further dissemination of this disease and swift care of patients affected. The need for supportive diagnostic instruments increased, as no specific automated toolkits are available. The latest results from radiology imaging techniques indicate that these photos provide valuable details on the virus COVID-19. User advanced artificial intelligence (AI) technologies and radiological imagery can help diagnose this condition accurately and help resolve the lack of specialist doctors in isolated areas. In this research, a new paradigm for automatic detection of COVID-19 with bare chest X-ray images is displayed. Images are presented. The proposed model DarkCo...
Journal of University of Shanghai for Science and Technology, 2021
The Internet of Things (IoT) is one of the most promising scientific fields of the last decade. T... more The Internet of Things (IoT) is one of the most promising scientific fields of the last decade. The number of devices developed that support Internet things makes the application of internet things more interesting. The field of use includes the insurance sector, intelligent monitoring Environment, Smart City, sector-health care, Intelligent City, and also many other applications enabled for smart devices.The vision of the introduction of the internet, forming a network called IoT, where various information technology devices are connected, security and trust are most important for the user, because this network presumably used a large amount of data.However, trust is a significant obstacle that can hinder the growth of the IoT and even slow down the significant compression of many applications.This paper presents an approach using trust management (TM) with next-generation IoT networks for healthcare, agriculture, and sustainable development goals. Implementation of IoT conveys var...
In wireless sensor networks, establishing a suitable link between the base station and nodes is a... more In wireless sensor networks, establishing a suitable link between the base station and nodes is an essential task. Link establishing is termed as routing which helps the network for reliable and efficient communication. At the same time attacks in the routing schemes to gain access to the data also increases and it significantly affects the network performance. Privacy preservation, encryption, and authentication can't handle some routing attacks. The trust has recently introduced a mechanism to increase safety and better node interaction. The routing mechanism of trust allows you to avoid that nodes are routed by the solution to be credible. Many trust-based Routing Protocol (RP) use routing that accounts for various routing attacks. This study aims to analyze the recent situation and search open research topics by investigating the existing proposed scheme. The paper presents the trust-based system and routing protocols. Eventually, comparative performance analysis of RP is made using the NS-2 network simulator.
2012 Ninth International Conference on Wireless and Optical Communications Networks (WOCN), 2012
ABSTRACT The Mobile ad hoc networks served as explanatory facts on various issues and challenges ... more ABSTRACT The Mobile ad hoc networks served as explanatory facts on various issues and challenges to learn threats in security of wireless data. This data is actually moves around various components of ad hoc network to perform various operations. The confliction comes when a data is associated with multiple components and reflects the different outputs inside the network. Then it vanish many legitimate operations and creates nuisance or misconduct with participating nodes. Trust overlay can describe respective policies to opt a node to communicate data inside a network. The applications of SMC protocols showed a great impact and useful derivations to compute the secure result at various levels. Further, the various frontiers of infrastructure less networks are in keen interest to serve better with minimal delay in transmission of packets. That means the probability of occurrences of packet drops can also be address with respect to various attacks and countermeasures. This work emphasizes on inside view in an ad hoc network to find and eliminate various security threats to rectify nuisance created by multi association of freely moving data.
Purpose The latest 2019 coronavirus (COVID-2019), which first appeared in December 2019 in Wuhan&... more Purpose The latest 2019 coronavirus (COVID-2019), which first appeared in December 2019 in Wuhan's city in China, rapidly spread around the world and became a pandemic. It has had a devastating impact on daily lives, the public's health and the global economy. The positive cases must be identified as soon as possible to avoid further dissemination of this disease and swift care of patients affected. The need for supportive diagnostic instruments increased, as no specific automated toolkits are available. The latest results from radiology imaging techniques indicate that these photos provide valuable details on the virus COVID-19. User advanced artificial intelligence (AI) technologies and radiological imagery can help diagnose this condition accurately and help resolve the lack of specialist doctors in isolated areas. In this research, a new paradigm for automatic detection of COVID-19 with bare chest X-ray images is displayed. Images are presented. The proposed model DarkCo...
Uploads
Papers by Dr Shubham Joshi