Bharat Bhushan

Orcid: 0000-0002-9345-4786

Affiliations:
  • Sharda University, Greater Noida, India


According to our database1, Bharat Bhushan authored at least 27 papers between 2018 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
EESDA: Energy-Efficient And Secure Data Aggregation Protocol for IoT.
Peer Peer Netw. Appl., August, 2025

2024
Recent Lightweight cryptography (LWC) based security advances for resource-constrained IoT networks.
Wirel. Networks, May, 2024

Enhanced authentication security for IoT client nodes through T-ECDSA integrated into MQTT broker.
J. Supercomput., May, 2024

EMCP: evolutionary multi-objective clustering protocol for prolonged lifetime of heterogeneous IoT networks.
J. Supercomput., March, 2024

Temporal ECDSA: A timestamp and signature mask enabled ECDSA algorithm for IoT client node authentication.
Comput. Commun., 2024

A Review of Blockchain based Decentralised Authentication Solutions and their improvement through Metamask.
Proceedings of the 2nd International Conference on Artificial Intelligence, 2024

A Review of Spectrum Sharing in 6G for IoT Environment.
Proceedings of the 2nd International Conference on Artificial Intelligence, 2024

Detection of DoS and DDoS Attacks Using Machine Learning and Blockchain in IoMT Networks.
Proceedings of the 2nd International Conference on Artificial Intelligence, 2024

2023
Light-weight privacy enabled topology establishment and communication protocol for swarm IoT networks.
Clust. Comput., December, 2023

Blockchain for healthcare systems: Architecture, security challenges, trends and future directions.
J. Netw. Comput. Appl., June, 2023

Demystifying the Role of Natural Language Processing (NLP) in Smart City Applications: Background, Motivation, Recent Advances, and Future Research Directions.
Wirel. Pers. Commun., May, 2023

Deep Learning Approaches for Cyber Threat Detection and Mitigation.
Proceedings of the 2023 7th International Conference on Advances in Artificial Intelligence, 2023

Blockchain Based Security Framework for Internet of Medical Things (IoMT) Applications.
Proceedings of the 2023 7th International Conference on Advances in Artificial Intelligence, 2023

2022
FLEAC: Fuzzy Logic-based Energy Adequate Clustering Protocol for Wireless Sensor Networks using Improved Grasshopper Optimization Algorithm.
Wirel. Pers. Commun., 2022

Prediction model using SMOTE, genetic algorithm and decision tree (PMSGD) for classification of diabetes mellitus.
Multim. Syst., 2022

Underwater estimation of audio signal prediction using fruit fly algorithm and hybrid wavelet neural network.
J. Reliab. Intell. Environ., 2022

Conceptualizing smart city applications: Requirements, architecture, security issues, and emerging trends.
Expert Syst. J. Knowl. Eng., 2022

2021
Unification of Blockchain and Internet of Things (BIoT): requirements, working model, challenges and future directions.
Wirel. Networks, 2021

CGP: Cluster-based gossip protocol for dynamic resource environment in cloud.
Simul. Model. Pract. Theory, 2021

Blockchain based solutions to secure IoT: Background, integration trends and a way forward.
J. Netw. Comput. Appl., 2021

An internet of health things-driven deep learning framework for detection and classification of skin cancer using transfer learning.
Trans. Emerg. Telecommun. Technol., 2021

Untangling blockchain technology: A survey on state of the art, security threats, privacy services, applications and future research directions.
Comput. Electr. Eng., 2021

2020
ISFC-BLS (Intelligent and Secured Fuzzy Clustering Algorithm Using Balanced Load Sub-Cluster Formation) in WSN Environment.
Wirel. Pers. Commun., 2020

Fuzzy genetic based dynamic spectrum allocation approach for cognitive radio sensor networks.
Turkish J. Electr. Eng. Comput. Sci., 2020

Requirements, Protocols, and Security Challenges in Wireless Sensor Networks: An Industrial Perspective.
Proceedings of the Handbook of Computer Networks and Cyber Security, 2020

2019
E<sup>2</sup> SR<sup>2</sup>: An acknowledgement-based mobile sink routing protocol with rechargeable sensors for wireless sensor networks.
Wirel. Networks, 2019

2018
Recent Advances in Attacks, Technical Challenges, Vulnerabilities and Their Countermeasures in Wireless Sensor Networks.
Wirel. Pers. Commun., 2018


  Loading...