Chhagan Lal

Orcid: 0000-0002-0051-1551

According to our database1, Chhagan Lal authored at least 76 papers between 2011 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Explainable artificial intelligence for intrusion detection in IoT networks: A deep learning based approach.
Expert Syst. Appl., March, 2024

A Location-Aware and Healing Attestation Scheme for Air-Supported Internet of Vehicles.
IEEE Trans. Intell. Transp. Syst., February, 2024

Time-Restricted, Verifiable, and Efficient Query Processing Over Encrypted Data on Cloud.
IEEE Trans. Serv. Comput., 2024

SPARQ: SYN Protection using Acyclic Redundancy check and Quartile range on P4 switches.
Comput. Commun., 2024

SYNTROPY: TCP SYN DDoS attack detection for Software Defined Network based on Rényi entropy.
Comput. Networks, 2024

Anonymous and reliable ultralightweight RFID-enabled authentication scheme for IoT systems in cloud computing.
Comput. Networks, 2024

SORCHIC: A Hybrid Image Cipher for IoT Applications Using Second Order Reversible Cellular Automata.
IEEE Access, 2024

2023
EQRSRL: an energy-aware and QoS-based routing schema using reinforcement learning in IoMT.
Wirel. Networks, October, 2023

An efficient and reliable ultralightweight RFID authentication scheme for healthcare systems.
Comput. Commun., May, 2023

Mnemosyne: Privacy-Preserving Ride Matching With Collusion-Resistant Driver Exclusion.
IEEE Trans. Veh. Technol., April, 2023

HTTPScout: A Machine Learning based Countermeasure for HTTP Flood Attacks in SDN.
Int. J. Inf. Sec., April, 2023

Anomaly based network intrusion detection for IoT attacks using deep learning technique.
Comput. Electr. Eng., April, 2023

Authenticated Message-Exchange Protocol for Fog-Assisted Vehicular Cloud Computing.
Wirel. Pers. Commun., 2023

Astraea: Anonymous and Secure Auditing Based on Private Smart Contracts for Donation Systems.
IEEE Trans. Dependable Secur. Comput., 2023

Nereus: Anonymous and Secure Ride-Hailing Service Based on Private Smart Contracts.
IEEE Trans. Dependable Secur. Comput., 2023

Eunomia: Anonymous and Secure Vehicular Digital Forensics Based on Blockchain.
IEEE Trans. Dependable Secur. Comput., 2023

A Survey on Blockchain for Healthcare: Challenges, Benefits, and Future Directions.
IEEE Commun. Surv. Tutorials, 2023

Privacy-Preserving and Security in SDN-Based IoT: A Survey.
IEEE Access, 2023

2022
User-Defined Privacy-Preserving Traffic Monitoring Against n-by-1 Jamming Attack.
IEEE/ACM Trans. Netw., 2022

Quantifying Location Privacy for Navigation Services in Sustainable Vehicular Networks.
IEEE Trans. Green Commun. Netw., 2022

Privacy-Preserving Navigation Supporting Similar Queries in Vehicular Networks.
IEEE Trans. Dependable Secur. Comput., 2022

Blockchain verification and validation: Techniques, challenges, and research directions.
Comput. Sci. Rev., 2022

ESRAS: An efficient and secure ultra-lightweight RFID authentication scheme for low-cost tags.
Comput. Networks, 2022

Software defined network-based HTTP flooding attack defender.
Comput. Electr. Eng., 2022

Graph Encryption for Shortest Path Queries with k Unsorted Nodes.
Proceedings of the IEEE International Conference on Trust, 2022

Repetitive, Oblivious, and Unlinkable SkNN Over Encrypted-and-Updated Data on Cloud.
Proceedings of the Information and Communications Security - 24th International Conference, 2022

2021
AEGIS: Detection and Mitigation of TCP SYN Flood on SDN Controller.
IEEE Trans. Netw. Serv. Manag., 2021

Anonymous and Verifiable Reputation System for E-Commerce Platforms Based on Blockchain.
IEEE Trans. Netw. Serv. Manag., 2021

Privacy for 5G-Supported Vehicular Networks.
IEEE Open J. Commun. Soc., 2021

LEChain: A blockchain-based lawful evidence management scheme for digital forensics.
Future Gener. Comput. Syst., 2021

Internet-of-Forensic (IoF): A blockchain based digital forensics framework for IoT applications.
Future Gener. Comput. Syst., 2021

Blockchain Testing: Challenges, Techniques, and Research Directions.
CoRR, 2021

Where to Meet a Driver Privately: Recommending Pick-Up Locations for Ride-Hailing Services.
Proceedings of the Security and Trust Management - 17th International Workshop, 2021

2020
Mobility-Aware and Radio Characteristics Enabled Routing for Video Streaming over MANETs.
Wirel. Pers. Commun., 2020

Reliable and secure data transfer in IoT networks.
Wirel. Networks, 2020

TARE: Topology Adaptive Re-kEying scheme for secure group communication in IoT networks.
Wirel. Networks, 2020

Blockchain-Enabled Secure Energy Trading With Verifiable Fairness in Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2020

A robust multicast communication protocol for Low power and Lossy networks.
J. Netw. Comput. Appl., 2020

The Road Ahead for Networking: A Survey on ICN-IP Coexistence Solutions.
IEEE Commun. Surv. Tutorials, 2020

LiDL: Localization with early detection of sybil and wormhole attacks in IoT Networks.
Comput. Secur., 2020

Context-based Co-presence detection techniques: A survey.
Comput. Secur., 2020

Security and design requirements for software-defined VANETs.
Comput. Networks, 2020

NC based DAS-NDN: Network Coding for robust Dynamic Adaptive Streaming over NDN.
Comput. Networks, 2020

One-Time, Oblivious, and Unlinkable Query Processing Over Encrypted Data on Cloud.
Proceedings of the Information and Communications Security - 22nd International Conference, 2020

Opening the software engineering toolbox for the assessment of trustworthy AI.
Proceedings of the First International Workshop on New Foundations for Human-Centered AI (NeHuAI) co-located with 24th European Conference on Artificial Intelligence (ECAI 2020), 2020

2019
Lightweight solutions to counter DDoS attacks in software defined networking.
Wirel. Networks, 2019

TILAK: A token-based prevention approach for topology discovery threats in SDN.
Int. J. Commun. Syst., 2019

SYN-Guard: An effective counter for SYN flooding attack in software-defined networking.
Int. J. Commun. Syst., 2019

Multi-constraint Zigbee routing to prolong lifetime of mobile wireless sensor networks.
Int. J. Ad Hoc Ubiquitous Comput., 2019

A Survey on Software-Defined VANETs: Benefits, Challenges, and Future Directions.
CoRR, 2019

Reliable Group Communication Protocol for Internet of Things.
CoRR, 2019

CENSOR: Cloud-enabled secure IoT architecture over SDN paradigm.
Concurr. Comput. Pract. Exp., 2019

SLDP: A secure and lightweight link discovery protocol for software defined networking.
Comput. Networks, 2019

BlockA<i>uth</i>: BlockChain based distributed producer authentication in ICN.
Comput. Networks, 2019

Mobility-aware cross-layer routing for peer-to-peer networks.
Comput. Electr. Eng., 2019

Secure Machine to Machine Communication in Industrial Internet of Things.
Proceedings of the Security and Privacy Trends in the Industrial Internet of Things, 2019

2018
Enhancing QoE for video streaming in MANETs via multi-constraint routing.
Wirel. Networks, 2018

SAFETY: Early Detection and Mitigation of TCP SYN Flood Utilizing Entropy in SDN.
IEEE Trans. Netw. Serv. Manag., 2018

A Survey on Context-based Co-presence Detection Techniques.
CoRR, 2018

A Survey on Security and Privacy Issues of Bitcoin.
IEEE Commun. Surv. Tutorials, 2018

Fair-RTT-DAS: A robust and efficient dynamic adaptive streaming over ICN.
Comput. Commun., 2018

2017
Practical extensions to countermeasure DoS attacks in software defined networking.
Proceedings of the 2017 IEEE Conference on Network Function Virtualization and Software Defined Networks, 2017

REMI: A Reliable and Secure Multicast Routing Protocol for IoT Networks.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Improving QoE Using Link Stability for Video Streaming in MANETs.
Proceedings of the Ad-hoc, Mobile, and Wireless Networks - 15th International Conference, 2016

2015
Bandwidth-aware routing and admission control for efficient video streaming over MANETs.
Wirel. Networks, 2015

JellyFish attack: Analysis, detection and countermeasure in TCP-based MANET.
J. Inf. Secur. Appl., 2015

2014
Analysis of Identity Forging Attack in MANETs.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014

LSMRP: Link stability based multicast routing protocol in MANETs.
Proceedings of the Seventh International Conference on Contemporary Computing, 2014

2013
Impact analysis of JellyFish attack on TCP-based mobile ad-hoc networks.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013

An adaptive cross-layer routing protocol for delay-sensitive applications over MANETs.
Proceedings of the International Conference on Advances in Computing, 2013

Video streaming over MANETs: Testing and analysis using real-time emulation.
Proceedings of the 19th Asia-Pacific Conference on Communications, 2013

QoS-aware routing for transmission of H.264/SVC encoded video traffic over MANETs.
Proceedings of the 19th Asia-Pacific Conference on Communications, 2013

2012
A rate adaptive and multipath routing protocol to support video streaming in MANETs.
Proceedings of the 2012 International Conference on Advances in Computing, 2012

A Node-Disjoint Multipath Routing Method Based on AODV Protocol for MANETs.
Proceedings of the IEEE 26th International Conference on Advanced Information Networking and Applications, 2012

2011
A Rate Adaptation Scheme to Support QoS for H.264/SVC Encoded Video Streams over MANETs.
Proceedings of the Advanced Communication and Networking, 2011

Analysis of a Traffic Classification Scheme for QoS Provisioning over MANETs.
Proceedings of the Advances in Computing and Communications, 2011


  Loading...