Research

Publications

Journal

  • Ashish Nanda, Deepak Puthal, Joel Rodrigues and Sergei Kozlov, ‘Internet of Autonomous Vehicles Communications Security: Overview, Issues, and Directions’, IEEE Wireless Communications, 2019 — Published, (Impact Factor 9.2)
  • Ashish Nanda, Priyadarsi Nanda, Xiangjian He, Aruna Jamdagni, and Deepak Puthal, ‘A hybrid encryption technique for Secure-GLOR: The adaptive secure routing protocol for dynamic wireless mesh networks’, Future Generation Computer Systems (FGCS), DOI - 10.1016/j.future.2018.05.065, 2018 — Published, (ERA tier A, Impact Factor 4.639)
  • Ashish Nanda, Deepak Puthal, Saraju Mohanty and Uma Choppali, ‘A Computing Perspective of Quantum Cryptography’, IEEE Consumer Electronics Magazine, DOI - 10.1109/MCE.2018.2851741, 2018 — Published, (Impact Factor 1.434)
  • Deepak Puthal, Rajiv Ranjan, Ashish Nanda, Priyadrsi Nanda, Prem P Jayaraman and Albert Y Zomaya, ‘Secure Authentication and Load Balancing of Distributed Edge Datacenters’, Journal of Parallel and Distributed Computing, 2018.— Published, (ERA tier A*, Impact Factor 1.815)

 

Conference

  • Ashish Nanda, Priyadarsi Nanda, Mohammed S. Obaidat, Xiangjian He, and Deepak Puthal, "A Novel Multi-Path Anonymous Randomized Key Distribution Scheme for Geo Distributed Networks", IEEE Global Communications Conference (GLOBECOM), 2019 — Published, (ERA tier B)
  • Ashish Nanda, Priyadarsi Nanda, Xiangjian He and Deepak Puthal, "A Novel Hybrid Authentication Model for Geo Location Oriented Routing in Dynamic Wireless Mesh Networks", 51st Hawaii International Conference on System Sciences(HICSS-51),  2018 — Published, (ERA tier A)
  • Ashish Nanda, Priyadarsi Nanda, Xiangjian He, Aruna Jamdagni, and Deepak Puthal, "Secure-GLOR: An Adaptive Secure Routing Protocol for Dynamic Wireless Mesh Networks", 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-17), 2017 — Published, (ERA tier A)
  • Ashish Nanda, Priyadarsi Nanda and Xiangjian He, "Geo-Location Oriented Routing Protocol for Smart Dynamic Mesh Network", 18th IEEE International Conference on High Performance Computing and Communications (HPCC-2016), 2016 —Published, (ERA tier B)
  • Ashish Nanda, Priyadarsi Nanda, Xiangjian He and Aruna Jamdagni, "A Secure Routing Scheme for Wireless Mesh Networks", 12th International Conference on Information Systems Security (ICISS-2016), 2016 — Published, (ERA tier B)

 

Articles

  • “Gesture Recognition System” (ID: COG153), National Conference on Innovations in Computing and Information Technology (Cognition-2015), 2015 — Published
  • “A Secure Lightweight Mutual-Authentication and Key-Agreement Protocol for Healthcare System”, Intelligent Data Security Solutions for e-Health Applications, 2020 — Published.

 

Research Projects and Engagements

Hand Gesture Recognition System - ZAUBER

  • Task: An application development as a component of B. Tech Degree Final Year Research Thesis at Amity University
  • Technology Used: .NET framework and OpenCV.
  • Methodology: The application uses the onboard camera of a system to recognize various gestures and accordingly perform the operation related to it. The gesture tracking was enhanced using machine learning with a large database of active recognition region and random background images.

 

Secure Payroll Generation System

  • Task: Development of a Payroll System for The State Trading Corporation of India Limited (STC), a premier international trading house of the Government of India.
  • Technology Used: MS Access and Proprietary Systems.
  • Methodology: The system was designed to replace the manual processing of tasks by automatically generating, updating & editing salary information and other statutory reports for the employees every month and securely transferring the data to the bank upon approval with a 99.99% accuracy. The payroll system upon completion was deployed and continues to be used at the corporate office and over 10 major branches of the company across India.

 

Online Portal & Database Design

  • Task: Development of a portal and data segregation for National Informatics Centre (NIC), under the Department of Electronics and Information Technology, Government of India.
  • Technology Used: Visual Studio, Drupal and Confidential Proprietary Software.
  • Methodology: An online portal was designed to securely access a segregated database containing almost a million entries about the geographical information of various constituencies in the country over the internet through www.egovstandards.gov.in.

 

Development of Standardized Templates for Online Filling

  • Task: Development of a Graphical User Interface (GUI) Module for National Informatics Centre (NIC), under the Department of Electronics and Information Technology, Government of India.
  • Technology Used: Visual Studio, Drupal and Confidential Proprietary Software.
  • Methodology: The GUI based templates were built according to “Metadata and Data Standards- Demographic Version 1.1.” offering a dynamic design module enabling secure authentication through a set of validations and verifications while maintaining ease of usage.

 

Hostel Automation Project

  • Task: Development of a web-based portal for better administration at Amity University Hostel.
  • Technology Used: Visual Studio, Drupal and Confidential Proprietary Software.
  • Methodology: The project includes an intranet service providing an easy way of registering complaints with a completion time assurance to the students living in the university hostel. This portal can also be used to access important notices along with providing student information to the admin staff.

 

Race Track Management System

  • Task: Development of a complete solution for racing events held by Incarnation Sports.
  • Technology Used: Arduino, Proprietary Software and Open Technologies.
  • Methodology: A hardware and software solution was developed for automating car racing event tracking. The project provides an interconnected device setup spread across the track to manage races using different proximity sensors to obtain the data and mesh network to collect and relay it to a central control entity for processing and taking appropriate decisions.

 

Area of Interest

  • Cyber Security (Computer Security)
  • Distributed Computing and Networking
  • Wireless Networks
  • Internet of Things (IoT)
  • Blockchain