Pardeep Kumar

Orcid: 0000-0001-8124-5509

Affiliations:
  • Swansea University, Department of Computer Science, UK
  • Oxford University, Department of Computer Science, UK (2016-2018)
  • University of Oulu, Center for Wireless Communications, Finland (2012-2015)
  • Dongseo University, Department of computer science, Busan, Korea (PhD 2012)


According to our database1, Pardeep Kumar authored at least 48 papers between 2009 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
AKAASH: A realizable authentication, key agreement, and secure handover approach for controller-pilot data link communications.
Int. J. Crit. Infrastructure Prot., September, 2023

Towards 6G: Key technological directions.
ICT Express, August, 2023

2022
A user-centric privacy-preserving authentication protocol for IoT-AmI environments.
Comput. Commun., 2022

2021
Survey on 6G Frontiers: Trends, Applications, Requirements, Technologies and Future Research.
IEEE Open J. Commun. Soc., 2021

A Lightweight and Robust Secure Key Establishment Protocol for Internet of Medical Things in COVID-19 Patients Care.
IEEE Internet Things J., 2021

Secure Device-to-Device communications for 5G enabled Internet of Things applications.
Comput. Commun., 2021

Detection of evil flies: securing air-ground aviation communication.
Proceedings of the ACM MobiCom '21: The 27th Annual International Conference on Mobile Computing and Networking, 2021

Understanding Young People's Experiences of Cybersecurity.
Proceedings of the EuroUSEC '21: European Symposium on Usable Security 2021, Karlsruhe, Germany, October 11, 2021

2020
Secure and Resilient Communications in the Industrial Internet.
Proceedings of the Guide to Disaster-Resilient Communication Networks, 2020

Secure and Privacy-Preserving RFID Authentication Scheme for Internet of Things Applications.
Wirel. Pers. Commun., 2020

MAKE-IT - A Lightweight Mutual Authentication and Key Exchange Protocol for Industrial Internet of Things.
Sensors, 2020

A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements, and Future Directions.
IEEE Commun. Surv. Tutorials, 2020

Cyber-Physical Trust Systems Driven by Blockchain.
IEEE Access, 2020

Robust and Lightweight Key Exchange (LKE) Protocol for Industry 4.0.
IEEE Access, 2020

Robust and Lightweight Mutual Authentication Scheme in Distributed Smart Environments.
IEEE Access, 2020

2019
Lightweight Authentication and Key Agreement for Smart Metering in Smart Energy Networks.
IEEE Trans. Smart Grid, 2019

Smart Grid Metering Networks: A Survey on Security, Privacy and Open Research Issues.
IEEE Commun. Surv. Tutorials, 2019

Fog-Orchestrated and Server-Controlled Anonymous Group Authentication and Key Agreement.
IEEE Access, 2019

Novel 5G Authentication Protocol to Improve the Resistance Against Active Attacks and Malicious Serving Networks.
IEEE Access, 2019

2018
An efficient anonymous authentication protocol in multiple server communication networks (EAAM).
J. Supercomput., 2018

2017
CHIP: Collaborative Host Identity Protocol with Efficient Key Establishment for Constrained Devices in Internet of Things.
Wirel. Pers. Commun., 2017

Anonymous Secure Framework in Connected Smart Home Environments.
IEEE Trans. Inf. Forensics Secur., 2017

2016
Novel secure VPN architectures for LTE backhaul networks.
Secur. Commun. Networks, 2016

The Quest for Privacy in the Internet of Things.
IEEE Cloud Comput., 2016

Poster Abstract: An Efficient Authentication Model in Smart Grid Networks.
Proceedings of the 15th ACM/IEEE International Conference on Information Processing in Sensor Networks, 2016

Performance and security evaluation of intra-vehicular communication architecture.
Proceedings of the IEEE International Conference on Communication, 2016

2015
Secure and Efficient Automatic Ruling in Three-Level Network Architecture.
Proceedings of the ICT Innovations 2015, 2015

Proxy-based end-to-end key establishment protocol for the Internet of Things.
Proceedings of the IEEE International Conference on Communication, 2015

Efficient Key Establishment for Constrained IoT Devices with Collaborative HIP-Based Approach.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

2014
Delegation-based robust authentication model for wireless roaming using portable communication devices.
IEEE Trans. Consumer Electron., 2014

An Efficient and Adaptive Mutual Authentication Framework for Heterogeneous Wireless Sensor Network-Based Applications.
Sensors, 2014

PAuthKey: A Pervasive Authentication Protocol and Key Establishment Scheme for Wireless Sensor Networks in Distributed IoT Applications.
Int. J. Distributed Sens. Networks, 2014

Two-phase authentication protocol for wireless sensor networks in distributed IoT applications.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2014

An efficient and simple key distribution scheme for smart environments.
Proceedings of the IEEE International Conference on Consumer Electronics, 2014

2013
A Mobile Object-Based Secret Key Distribution Scheme for Wireless Sensor Networks.
Proceedings of the 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing, 2013

Certificate-Based Pairwise Key Establishment Protocol for Wireless Sensor Networks.
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013

2012
E-SAP: Efficient-Strong Authentication Protocol for Healthcare Applications Using Wireless Medical Sensor Networks.
Sensors, 2012

Security Issues in Healthcare Applications Using Wireless Medical Sensor Networks: A Survey.
Sensors, 2012

2011
RUASN: A Robust User Authentication Framework for Wireless Sensor Networks.
Sensors, 2011

A User Authentication for Healthcare Application Using Wireless Medical Sensor Networks.
Proceedings of the 13th IEEE International Conference on High Performance Computing & Communication, 2011

A Strong User Authentication Framework for Cloud Computing.
Proceedings of the 2011 IEEE Asia-Pacific Services Computing Conference, 2011

2010
TriSec: A Secure Data Framework for Wireless Sensor Networks Using Authenticated Encryption.
J. Inform. and Commun. Convergence Engineering, 2010

An efficient key pre-distribution scheme for wireless sensor network using public key cryptography.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2010

Addressing secure data routing scheme for heterogeneous sensor networks.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2010

Secure health monitoring using medical wireless sensor networks.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2010

2009
A Secure Data Mechanism for Ubiquitous Sensor Network with Dragon Cipher.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009

PingPong-MAC: secure ubiquitous sensor network with authenticated encryption.
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, 2009

A secure ubiquitous sensor network with Dragon.
Proceedings of the 2009 International Conference on Hybrid Information Technology, 2009


  Loading...