Mohammad Wazid

Orcid: 0000-0001-9898-0921

Affiliations:
  • Department of Computer Science and Engineering, Graphic Era Deemed to be University, Dehradun, India


According to our database1, Mohammad Wazid authored at least 106 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
An Authentication and Key Management Framework for Secure and Intelligent Transportation of Internet of Space Things.
IEEE Trans. Intell. Transp. Syst., June, 2024

An Ensemble-Based Machine Learning-Envisioned Intrusion Detection in Industry 5.0-Driven Healthcare Applications.
IEEE Trans. Consumer Electron., February, 2024

ACKS-IA: An Access Control and Key Agreement Scheme for Securing Industry 4.0 Applications.
IEEE Trans. Netw. Sci. Eng., 2024

A secure signature-based access control and key management scheme for fog computing-based IoT-enabled big data applications.
Secur. Priv., 2024

Generic Quantum Blockchain-Envisioned Security Framework for IoT Environment: Architecture, Security Benefits and Future Research.
IEEE Open J. Comput. Soc., 2024

A Secure Deepfake Mitigation Framework: Architecture, Issues, Challenges, and Societal Impact.
Cyber Secur. Appl., 2024

Secure Artificial Intelligence of Things (AIoT)-enabled authenticated key agreement technique for smart living environment.
Comput. Electr. Eng., 2024

Designing Secure Big Data Analytics Mechanism Using Authentication for Drones-Assisted Military Applications.
Proceedings of the IEEE INFOCOM 2024, 2024

Designing Blockchain-Based Decentralized Scheme for Secure File Storage System.
Proceedings of the International Conference on Computer, 2024

Machine Learning-Based Security Mechanism for Detecting Phishing Attacks.
Proceedings of the International Conference on Communications, 2024

2023
Design of blockchain-enabled secure smart health monitoring system and its testbed implementation.
Cyber Secur. Appl., December, 2023

On the design of an AI-driven secure communication scheme for internet of medical things environment.
Digit. Commun. Networks, October, 2023

Robust authenticated key agreement protocol for internet of vehicles-envisioned intelligent transportation system.
J. Syst. Archit., September, 2023

BACKM-EHA: A Novel Blockchain-enabled Security Solution for IoMT-based E-healthcare Applications.
ACM Trans. Internet Techn., August, 2023

MADP-IIME: malware attack detection protocol in IoT-enabled industrial multimedia environment using machine learning approach.
Multim. Syst., June, 2023

SINN-RD: Spline interpolation-envisioned neural network-based ransomware detection scheme.
Comput. Electr. Eng., March, 2023

BSFR-SH: Blockchain-Enabled Security Framework Against Ransomware Attacks for Smart Healthcare.
IEEE Trans. Consumer Electron., February, 2023

Design and Testbed Experiments of User Authentication and Key Establishment Mechanism for Smart Healthcare Cyber Physical Systems.
IEEE Trans. Netw. Sci. Eng., 2023

AISCM-FH: AI-Enabled Secure Communication Mechanism in Fog Computing-Based Healthcare.
IEEE Trans. Inf. Forensics Secur., 2023

Explainable artificial intelligence envisioned security mechanism for cyber threat hunting.
Secur. Priv., 2023

An Ensemble-Based IoT-Enabled Drones Detection Scheme for a Safe Community.
IEEE Open J. Commun. Soc., 2023

Design of Robust Blockchain-Envisioned Authenticated Key Management Mechanism for Smart Healthcare Applications.
IEEE Access, 2023

Embattle The Security of E-Health System Through A Secure Authentication and Key Agreement Protocol.
Proceedings of the International Wireless Communications and Mobile Computing, 2023

Securing Fog Computing-based Industry 4.0 Communication Using Authenticated Key Agreement Scheme.
Proceedings of the International Wireless Communications and Mobile Computing, 2023

Multiclass Classification Approaches for Intrusion Detection in IoT-Driven Aerial Computing Environment.
Proceedings of the IEEE Global Communications Conference, 2023

Ransomware Attacks Detection Methodology to Protect IoT-Enabled Critical Infrastructures.
Proceedings of the IEEE Global Communications Conference, 2023

A Survey of DDoS Attacks Detection Schemes in SDN Environment.
Proceedings of the International Conference on Computer, 2023

SLA-SCA: Secure and Lightweight Authentication and Key Agreement Mechanism for Smart City Applications.
Proceedings of the International Conference on Communications, 2023

Design of a Secure Machine Learning-Based Malware Detection and Analysis Scheme.
Proceedings of the International Conference on Communications, 2023

2022
Security in IoMT-driven smart healthcare: A comprehensive review and open challenges.
Secur. Priv., 2022

BUAKA-CS: Blockchain-enabled user authentication and key agreement scheme for crowdsourcing system.
J. Syst. Archit., 2022

TACAS-IoT: Trust Aggregation Certificate-Based Authentication Scheme for Edge-Enabled IoT Systems.
IEEE Internet Things J., 2022

SCS-WoT: Secure Communication Scheme for Web of Things Deployment.
IEEE Internet Things J., 2022

Fortifying Smart Transportation Security Through Public Blockchain.
IEEE Internet Things J., 2022

Uniting cyber security and machine learning: Advantages, challenges and future research.
ICT Express, 2022

Blockchain-enabled secure communication mechanism for IoT-driven personal health records.
Trans. Emerg. Telecommun. Technol., 2022

Machine learning security attacks and defense approaches for emerging cyber physical applications: A comprehensive survey.
Comput. Commun., 2022

An efficient node placement scheme to mitigate routing attacks in Internet of Battlefield Things.
Comput. Electr. Eng., 2022

ASCP-IoMT: AI-Enabled Lightweight Secure Communication Protocol for Internet of Medical Things.
IEEE Access, 2022

Healthcare 5.0 Security Framework: Applications, Issues and Future Research Directions.
IEEE Access, 2022

BAKP-IoDA: blockchain driven authentication and key agreement protocol for internet of drones based applications.
Proceedings of the 5th International ACM Mobicom Workshop on Drone Assisted Wireless Communications for 5G and Beyond, 2022

BDESF-ITS: Blockchain-Based Secure Data Exchange and Storage Framework for Intelligent Transportation System.
Proceedings of the IEEE INFOCOM 2022, 2022

2021
On the Design of Mutual Authentication and Key Agreement Protocol in Internet of Vehicles-Enabled Intelligent Transportation System.
IEEE Trans. Veh. Technol., 2021

Designing Authenticated Key Management Scheme in 6G-Enabled Network in a Box Deployed for Industrial Applications.
IEEE Trans. Ind. Informatics, 2021

A blockchain based secure communication framework for community interaction.
J. Inf. Secur. Appl., 2021

Secure Communication Framework for Blockchain-Based Internet of Drones-Enabled Aerial Computing Deployment.
IEEE Internet Things Mag., 2021

Securing Internet of Drones Networks Using AI-Envisioned Smart-Contract-Based Blockchain.
IEEE Internet Things Mag., 2021

Designing Secure User Authentication Protocol for Big Data Collection in IoT-Based Intelligent Transportation System.
IEEE Internet Things J., 2021

Security in 5G-Enabled Internet of Things Communication: Issues, Challenges, and Future Research Roadmap.
IEEE Access, 2021

iGCACS-IoD: An Improved Certificate-Enabled Generic Access Control Scheme for Internet of Drones Deployment.
IEEE Access, 2021

On the Security of a Secure and Lightweight Authentication Scheme for Next Generation IoT Infrastructure.
IEEE Access, 2021

SPCS-IoTEH: Secure Privacy-Preserving Communication Scheme for IoT-Enabled e-Health Applications.
Proceedings of the ICC 2021, 2021

2020
Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment.
IEEE Trans. Dependable Secur. Comput., 2020

Anonymous Lightweight Chaotic Map-Based Authenticated Key Agreement Protocol for Industrial Internet of Things.
IEEE Trans. Dependable Secur. Comput., 2020

Designing Efficient Sinkhole Attack Detection Mechanism in Edge-Based IoT Deployment.
Sensors, 2020

LAM-CIoT: Lightweight authentication mechanism in cloud-based IoT environment.
J. Netw. Comput. Appl., 2020

A Tutorial and Future Research for Building a Blockchain-Based Secure Communication Scheme for Internet of Intelligent Things.
IEEE Access, 2020

Intrusion Detection Protocols in Wireless Sensor Networks Integrated to Internet of Things Deployment: Survey and Future Challenges.
IEEE Access, 2020

LAKS-NVT: Provably Secure and Lightweight Authentication and Key Agreement Scheme Without Verification Table in Medical Internet of Things.
IEEE Access, 2020

BAKMP-IoMT: Design of Blockchain Enabled Authenticated Key Management Protocol for Internet of Medical Things Deployment.
IEEE Access, 2020

Authentication Protocols in Internet of Vehicles: Taxonomy, Analysis, and Challenges.
IEEE Access, 2020

Private blockchain-envisioned security framework for AI-enabled IoT-based drone-aided healthcare services.
Proceedings of the DroneCom '20: Proceedings of the 2nd ACM MobiCom Workshop on Drone Assisted Wireless Communications for 5G and Beyond, 2020

On the Design of Secure Communication Framework for Blockchain-Based Internet of Intelligent Battlefield Things Environment.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

SAC-FIIoT: Secure Access Control Scheme for Fog-Based Industrial Internet of Things.
Proceedings of the IEEE Global Communications Conference, 2020

2019
LDAKM-EIoT: Lightweight Device Authentication and Key Management Mechanism for Edge-Based IoT Deployment.
Sensors, 2019

User authentication in a tactile internet based remote surgery environment: Security issues, challenges, and future research directions.
Pervasive Mob. Comput., 2019

Authentication in cloud-driven IoT-based big data environment: Survey and outlook.
J. Syst. Archit., 2019

Design and Analysis of Secure Lightweight Remote User Authentication and Key Agreement Scheme in Internet of Drones Deployment.
IEEE Internet Things J., 2019

AKM-IoV: Authenticated Key Management Protocol in Fog Computing-Based Internet of Vehicles Deployment.
IEEE Internet Things J., 2019

RAD-EI: A routing attack detection scheme for edge-based Internet of Things environment.
Int. J. Commun. Syst., 2019

Design of secure key management and user authentication scheme for fog computing services.
Future Gener. Comput. Syst., 2019

Mobile Banking: Evolution and Threats: Malware Threats and Security Solutions.
IEEE Consumer Electron. Mag., 2019

IoMT Malware Detection Approaches: Analysis and Research Challenges.
IEEE Access, 2019

Provably Secure ECC-Based Device Access Control and Key Agreement Protocol for IoT Environment.
IEEE Access, 2019

2018
Provably Secure Authenticated Key Agreement Scheme for Smart Grid.
IEEE Trans. Smart Grid, 2018

A Novel Authentication and Key Agreement Scheme for Implantable Medical Devices Deployment.
IEEE J. Biomed. Health Informatics, 2018

Design of Secure and Lightweight Authentication Protocol for Wearable Devices Environment.
IEEE J. Biomed. Health Informatics, 2018

A secure enhanced privacy-preserving key agreement protocol for wireless mobile networks.
Telecommun. Syst., 2018

Authenticated key management protocol for cloud-assisted body area sensor networks.
J. Netw. Comput. Appl., 2018

Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks.
IEEE Internet Things J., 2018

Biometrics-Based Privacy-Preserving User Authentication Scheme for Cloud-Based Industrial Internet of Things Deployment.
IEEE Internet Things J., 2018

Authentication Protocols for Implantable Medical Devices: Taxonomy, Analysis and Future Directions.
IEEE Consumer Electron. Mag., 2018

2017
A Secure Group-Based Blackhole Node Detection Scheme for Hierarchical Wireless Sensor Networks.
Wirel. Pers. Commun., 2017

Secure Three-Factor User Authentication Scheme for Renewable-Energy-Based Smart Grid Environment.
IEEE Trans. Ind. Informatics, 2017

An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment.
J. Netw. Comput. Appl., 2017

Secure Authentication Scheme for Medicine Anti-Counterfeiting System in IoT Environment.
IEEE Internet Things J., 2017

Provably secure authenticated key agreement scheme for distributed mobile cloud computing services.
Future Gener. Comput. Syst., 2017

On the design of a secure user authentication and key agreement scheme for wireless sensor networks.
Concurr. Comput. Pract. Exp., 2017

Lightweight authentication protocols for wearable devices.
Comput. Electr. Eng., 2017

Design of Lightweight Authentication and Key Agreement Protocol for Vehicular Ad Hoc Networks.
IEEE Access, 2017

Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications.
IEEE Access, 2017

2016
An Efficient Hybrid Anomaly Detection Scheme Using K-Means Clustering for Wireless Sensor Networks.
Wirel. Pers. Commun., 2016

A Secure and Robust Smartcard-Based Authentication Scheme for Session Initiation Protocol Using Elliptic Curve Cryptography.
Wirel. Pers. Commun., 2016

Provably secure biometric-based user authentication and key agreement scheme in cloud computing.
Secur. Commun. Networks, 2016

Design of an efficient and provably secure anonymity preserving three-factor user authentication and key agreement scheme for TMIS.
Secur. Commun. Networks, 2016

Design of sinkhole node detection mechanism for hierarchical wireless sensor networks.
Secur. Commun. Networks, 2016

An efficient multi-gateway-based three-factor user authentication and key agreement scheme in hierarchical wireless sensor networks.
Secur. Commun. Networks, 2016

Analysis of Security Protocols for Mobile Healthcare.
J. Medical Syst., 2016

Secure anonymity-preserving password-based user authentication and session key agreement scheme for telecare medicine information systems.
Comput. Methods Programs Biomed., 2016

Secure anonymous mutual authentication for star two-tier wireless body area networks.
Comput. Methods Programs Biomed., 2016

2015
Forensics of Random-UDP Flooding Attacks.
J. Networks, 2015

2014
Hybrid Anomaly Detection using K-Means Clustering in Wireless Sensor Networks.
IACR Cryptol. ePrint Arch., 2014

2013
Implementation and Embellishment of Prevention of Keylogger Spyware Attacks.
Proceedings of the Security in Computing and Communications - International Symposium, 2013

Big data: Issues, challenges, tools and Good practices.
Proceedings of the Sixth International Conference on Contemporary Computing, 2013

2012
Efficient Protocol Prediction Algorithm for MANET Multimedia Transmission Under JF Periodic Dropping Attack.
Proceedings of the Second International Conference on Soft Computing for Problem Solving, 2012

Performance of a LAN under different ethernet wiring standards.
Proceedings of the CUBE International IT Conference & Exhibition, 2012


  Loading...