Mohammad Wazid
Orcid: 0000-0001-9898-0921Affiliations:
- Department of Computer Science and Engineering, Graphic Era Deemed to be University, Dehradun, India
According to our database1,
Mohammad Wazid
authored at least 106 papers
between 2012 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orkg.org
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
An Authentication and Key Management Framework for Secure and Intelligent Transportation of Internet of Space Things.
IEEE Trans. Intell. Transp. Syst., June, 2024
An Ensemble-Based Machine Learning-Envisioned Intrusion Detection in Industry 5.0-Driven Healthcare Applications.
IEEE Trans. Consumer Electron., February, 2024
ACKS-IA: An Access Control and Key Agreement Scheme for Securing Industry 4.0 Applications.
IEEE Trans. Netw. Sci. Eng., 2024
A secure signature-based access control and key management scheme for fog computing-based IoT-enabled big data applications.
Secur. Priv., 2024
Generic Quantum Blockchain-Envisioned Security Framework for IoT Environment: Architecture, Security Benefits and Future Research.
IEEE Open J. Comput. Soc., 2024
A Secure Deepfake Mitigation Framework: Architecture, Issues, Challenges, and Societal Impact.
Cyber Secur. Appl., 2024
Secure Artificial Intelligence of Things (AIoT)-enabled authenticated key agreement technique for smart living environment.
Comput. Electr. Eng., 2024
Designing Secure Big Data Analytics Mechanism Using Authentication for Drones-Assisted Military Applications.
Proceedings of the IEEE INFOCOM 2024, 2024
Proceedings of the International Conference on Computer, 2024
Proceedings of the International Conference on Communications, 2024
2023
Design of blockchain-enabled secure smart health monitoring system and its testbed implementation.
Cyber Secur. Appl., December, 2023
On the design of an AI-driven secure communication scheme for internet of medical things environment.
Digit. Commun. Networks, October, 2023
Robust authenticated key agreement protocol for internet of vehicles-envisioned intelligent transportation system.
J. Syst. Archit., September, 2023
BACKM-EHA: A Novel Blockchain-enabled Security Solution for IoMT-based E-healthcare Applications.
ACM Trans. Internet Techn., August, 2023
MADP-IIME: malware attack detection protocol in IoT-enabled industrial multimedia environment using machine learning approach.
Multim. Syst., June, 2023
SINN-RD: Spline interpolation-envisioned neural network-based ransomware detection scheme.
Comput. Electr. Eng., March, 2023
BSFR-SH: Blockchain-Enabled Security Framework Against Ransomware Attacks for Smart Healthcare.
IEEE Trans. Consumer Electron., February, 2023
Design and Testbed Experiments of User Authentication and Key Establishment Mechanism for Smart Healthcare Cyber Physical Systems.
IEEE Trans. Netw. Sci. Eng., 2023
AISCM-FH: AI-Enabled Secure Communication Mechanism in Fog Computing-Based Healthcare.
IEEE Trans. Inf. Forensics Secur., 2023
Explainable artificial intelligence envisioned security mechanism for cyber threat hunting.
Secur. Priv., 2023
IEEE Open J. Commun. Soc., 2023
Design of Robust Blockchain-Envisioned Authenticated Key Management Mechanism for Smart Healthcare Applications.
IEEE Access, 2023
Embattle The Security of E-Health System Through A Secure Authentication and Key Agreement Protocol.
Proceedings of the International Wireless Communications and Mobile Computing, 2023
Securing Fog Computing-based Industry 4.0 Communication Using Authenticated Key Agreement Scheme.
Proceedings of the International Wireless Communications and Mobile Computing, 2023
Multiclass Classification Approaches for Intrusion Detection in IoT-Driven Aerial Computing Environment.
Proceedings of the IEEE Global Communications Conference, 2023
Ransomware Attacks Detection Methodology to Protect IoT-Enabled Critical Infrastructures.
Proceedings of the IEEE Global Communications Conference, 2023
Proceedings of the International Conference on Computer, 2023
SLA-SCA: Secure and Lightweight Authentication and Key Agreement Mechanism for Smart City Applications.
Proceedings of the International Conference on Communications, 2023
Proceedings of the International Conference on Communications, 2023
2022
Security in IoMT-driven smart healthcare: A comprehensive review and open challenges.
Secur. Priv., 2022
BUAKA-CS: Blockchain-enabled user authentication and key agreement scheme for crowdsourcing system.
J. Syst. Archit., 2022
TACAS-IoT: Trust Aggregation Certificate-Based Authentication Scheme for Edge-Enabled IoT Systems.
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
Uniting cyber security and machine learning: Advantages, challenges and future research.
ICT Express, 2022
Blockchain-enabled secure communication mechanism for IoT-driven personal health records.
Trans. Emerg. Telecommun. Technol., 2022
Machine learning security attacks and defense approaches for emerging cyber physical applications: A comprehensive survey.
Comput. Commun., 2022
An efficient node placement scheme to mitigate routing attacks in Internet of Battlefield Things.
Comput. Electr. Eng., 2022
ASCP-IoMT: AI-Enabled Lightweight Secure Communication Protocol for Internet of Medical Things.
IEEE Access, 2022
Healthcare 5.0 Security Framework: Applications, Issues and Future Research Directions.
IEEE Access, 2022
BAKP-IoDA: blockchain driven authentication and key agreement protocol for internet of drones based applications.
Proceedings of the 5th International ACM Mobicom Workshop on Drone Assisted Wireless Communications for 5G and Beyond, 2022
BDESF-ITS: Blockchain-Based Secure Data Exchange and Storage Framework for Intelligent Transportation System.
Proceedings of the IEEE INFOCOM 2022, 2022
2021
On the Design of Mutual Authentication and Key Agreement Protocol in Internet of Vehicles-Enabled Intelligent Transportation System.
IEEE Trans. Veh. Technol., 2021
Designing Authenticated Key Management Scheme in 6G-Enabled Network in a Box Deployed for Industrial Applications.
IEEE Trans. Ind. Informatics, 2021
J. Inf. Secur. Appl., 2021
Secure Communication Framework for Blockchain-Based Internet of Drones-Enabled Aerial Computing Deployment.
IEEE Internet Things Mag., 2021
Securing Internet of Drones Networks Using AI-Envisioned Smart-Contract-Based Blockchain.
IEEE Internet Things Mag., 2021
Designing Secure User Authentication Protocol for Big Data Collection in IoT-Based Intelligent Transportation System.
IEEE Internet Things J., 2021
Security in 5G-Enabled Internet of Things Communication: Issues, Challenges, and Future Research Roadmap.
IEEE Access, 2021
iGCACS-IoD: An Improved Certificate-Enabled Generic Access Control Scheme for Internet of Drones Deployment.
IEEE Access, 2021
On the Security of a Secure and Lightweight Authentication Scheme for Next Generation IoT Infrastructure.
IEEE Access, 2021
SPCS-IoTEH: Secure Privacy-Preserving Communication Scheme for IoT-Enabled e-Health Applications.
Proceedings of the ICC 2021, 2021
2020
Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment.
IEEE Trans. Dependable Secur. Comput., 2020
Anonymous Lightweight Chaotic Map-Based Authenticated Key Agreement Protocol for Industrial Internet of Things.
IEEE Trans. Dependable Secur. Comput., 2020
Designing Efficient Sinkhole Attack Detection Mechanism in Edge-Based IoT Deployment.
Sensors, 2020
J. Netw. Comput. Appl., 2020
A Tutorial and Future Research for Building a Blockchain-Based Secure Communication Scheme for Internet of Intelligent Things.
IEEE Access, 2020
Intrusion Detection Protocols in Wireless Sensor Networks Integrated to Internet of Things Deployment: Survey and Future Challenges.
IEEE Access, 2020
LAKS-NVT: Provably Secure and Lightweight Authentication and Key Agreement Scheme Without Verification Table in Medical Internet of Things.
IEEE Access, 2020
BAKMP-IoMT: Design of Blockchain Enabled Authenticated Key Management Protocol for Internet of Medical Things Deployment.
IEEE Access, 2020
Authentication Protocols in Internet of Vehicles: Taxonomy, Analysis, and Challenges.
IEEE Access, 2020
Private blockchain-envisioned security framework for AI-enabled IoT-based drone-aided healthcare services.
Proceedings of the DroneCom '20: Proceedings of the 2nd ACM MobiCom Workshop on Drone Assisted Wireless Communications for 5G and Beyond, 2020
On the Design of Secure Communication Framework for Blockchain-Based Internet of Intelligent Battlefield Things Environment.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
Proceedings of the IEEE Global Communications Conference, 2020
2019
LDAKM-EIoT: Lightweight Device Authentication and Key Management Mechanism for Edge-Based IoT Deployment.
Sensors, 2019
User authentication in a tactile internet based remote surgery environment: Security issues, challenges, and future research directions.
Pervasive Mob. Comput., 2019
J. Syst. Archit., 2019
Design and Analysis of Secure Lightweight Remote User Authentication and Key Agreement Scheme in Internet of Drones Deployment.
IEEE Internet Things J., 2019
AKM-IoV: Authenticated Key Management Protocol in Fog Computing-Based Internet of Vehicles Deployment.
IEEE Internet Things J., 2019
RAD-EI: A routing attack detection scheme for edge-based Internet of Things environment.
Int. J. Commun. Syst., 2019
Design of secure key management and user authentication scheme for fog computing services.
Future Gener. Comput. Syst., 2019
IEEE Consumer Electron. Mag., 2019
IEEE Access, 2019
Provably Secure ECC-Based Device Access Control and Key Agreement Protocol for IoT Environment.
IEEE Access, 2019
2018
IEEE Trans. Smart Grid, 2018
A Novel Authentication and Key Agreement Scheme for Implantable Medical Devices Deployment.
IEEE J. Biomed. Health Informatics, 2018
Design of Secure and Lightweight Authentication Protocol for Wearable Devices Environment.
IEEE J. Biomed. Health Informatics, 2018
A secure enhanced privacy-preserving key agreement protocol for wireless mobile networks.
Telecommun. Syst., 2018
J. Netw. Comput. Appl., 2018
Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks.
IEEE Internet Things J., 2018
Biometrics-Based Privacy-Preserving User Authentication Scheme for Cloud-Based Industrial Internet of Things Deployment.
IEEE Internet Things J., 2018
Authentication Protocols for Implantable Medical Devices: Taxonomy, Analysis and Future Directions.
IEEE Consumer Electron. Mag., 2018
2017
A Secure Group-Based Blackhole Node Detection Scheme for Hierarchical Wireless Sensor Networks.
Wirel. Pers. Commun., 2017
Secure Three-Factor User Authentication Scheme for Renewable-Energy-Based Smart Grid Environment.
IEEE Trans. Ind. Informatics, 2017
An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment.
J. Netw. Comput. Appl., 2017
Secure Authentication Scheme for Medicine Anti-Counterfeiting System in IoT Environment.
IEEE Internet Things J., 2017
Provably secure authenticated key agreement scheme for distributed mobile cloud computing services.
Future Gener. Comput. Syst., 2017
On the design of a secure user authentication and key agreement scheme for wireless sensor networks.
Concurr. Comput. Pract. Exp., 2017
Comput. Electr. Eng., 2017
Design of Lightweight Authentication and Key Agreement Protocol for Vehicular Ad Hoc Networks.
IEEE Access, 2017
Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications.
IEEE Access, 2017
2016
An Efficient Hybrid Anomaly Detection Scheme Using K-Means Clustering for Wireless Sensor Networks.
Wirel. Pers. Commun., 2016
A Secure and Robust Smartcard-Based Authentication Scheme for Session Initiation Protocol Using Elliptic Curve Cryptography.
Wirel. Pers. Commun., 2016
Provably secure biometric-based user authentication and key agreement scheme in cloud computing.
Secur. Commun. Networks, 2016
Design of an efficient and provably secure anonymity preserving three-factor user authentication and key agreement scheme for TMIS.
Secur. Commun. Networks, 2016
Design of sinkhole node detection mechanism for hierarchical wireless sensor networks.
Secur. Commun. Networks, 2016
An efficient multi-gateway-based three-factor user authentication and key agreement scheme in hierarchical wireless sensor networks.
Secur. Commun. Networks, 2016
Secure anonymity-preserving password-based user authentication and session key agreement scheme for telecare medicine information systems.
Comput. Methods Programs Biomed., 2016
Secure anonymous mutual authentication for star two-tier wireless body area networks.
Comput. Methods Programs Biomed., 2016
2015
2014
IACR Cryptol. ePrint Arch., 2014
2013
Proceedings of the Security in Computing and Communications - International Symposium, 2013
Proceedings of the Sixth International Conference on Contemporary Computing, 2013
2012
Efficient Protocol Prediction Algorithm for MANET Multimedia Transmission Under JF Periodic Dropping Attack.
Proceedings of the Second International Conference on Soft Computing for Problem Solving, 2012
Proceedings of the CUBE International IT Conference & Exhibition, 2012