Indian Institute of Information Technology, Lucknow
भारतीय सूचना प्रौद्योगिकी संस्थान, लखनऊ
(An Institute of National Importance by the Act of Parliament)

Dr. Brijesh Kr. Chaurasia

Dr. Brijesh Kumar Chaurasia
Lucknow, India

Dr. Brijesh Kumar Chaurasia

Assistant Professor

Research Interests

  • Network Security
  • Vehicular Ad hoc Networks
  • Internet of Vehicles
  • Trust Management in Wireless Ad-hoc Networks
  • Internet of Things
  • Cloud Computing

Education

  • Ph. D. (Privacy Preservation in Vehicular Ad-hoc Networks) from IIIT‐Allahabad, UP, India
  • M. Tech. (CS) from Devi Ahilya Vishwavidyalaya, Indore, MP, India

Teaching

  • Cryptography and network security
  • Computer Networks
  • Wireless Adhoc Networks
  • Optimization Techniques
  • Internet of Things

SUPERVISORY EXPERIENCE

Ph.D Students
  • Completed : Mr. Kapil Sharma, “Trust Management in VANETs”, 2019.
  • Ongoing : i. Gaurav Tripathi ii. Sandeep Shrivastava iii. Utpal Pandey
M.Tech Students
  • More than 17 M Tech. students are supervised

International / National Conferences & Seminar

Funded Seminar / Conference

  • 2nd International Conference on Communication, Networks and Computing(CNC-2019), Dec. 29-31, 2019, as a Program Chair.
  • 1st International Conference on Communication, Networks and Computing(CNC-2018), March 22-24, 2018, as a Program Chair.
  • International IEEE conference on Communication Network (ICCN-2015), November 17-19, 2015, as a General Chair.
  • National Seminar on Communication Networks & Computing (CNC-2014), January 23-24, 2014, as a coordinator, funded by M. P. Council of Science & Technology, Bhopal (MPCST)
  • National Seminar on Communication Networks & Computing (CNC-2015) 23-01-2015, as a coordinator, funded by M. P. Council of Science & Technology, Bhopal (MPCST)

Publications

Books Editor

  • Neeraj Kumar, Alka Agrawal, Brijesh Kumar Chaurasia, and Raees A. Khan, “Limitations and Future Applications of Quantum Cryptography,” IGI, 2020. 10.4018/978-1-7998-6677-0
  • Verma, R. S. Tomar, Brijesh Kumar Chaurasia, V. Singh, J. Abawajy, “Communication, Networks and Computing,” First International Conference, First International Conference on Communication, Networks and Computings (CNC-2018), Gwalior, India, Series Vol. 839, Springer Singapore, 2018. (DOI – 10.1007/978-981-13-2372-0 & eBook ISBN – 978-981-13-2372-0)

Publications

Publications in International Journals

  • Brijesh Kumar Chaurasia, Wellington S. Manjoro & Mradul Dhakar, “Traffic Congestion Identification and Reduction,” Wireless Personal Communications, Springer, Vol. 114, pp. 1267–1286, ISSN No: 0929-6212, SCI, Impact Factor:1.170, Switzerland, 07 May, 2020.
  • Brijesh Kumar Chaurasia, Md. Iftekhar Alam, Arun Prakash, Ranjeet Singh Tomar & Shekhar Verma, “MPMAC: Clustering based MAC protocol for VANETs,” Wireless Personal Communications, Springer, Vol. 106, No. 2, pp. 409-436, ISSN No: 0929-6212, SCI, Impact Factor:1.019, 2019.
  • T. Chakavarika, S. K. Gupta, and Brijesh Kumar Chaurasia, “Energy Efficient Key Distribution and Management Scheme in Wireless Sensor Networks,” Wireless Personal Communications, Springer, Vol. 97, No. 146, pp 1059-1070, ISSN No: 0929-6212, Impact Factor:1.489, 2017.
  • Brijesh Kumar Chaurasia and Dr. Shekhar Verma, “Secure Pay While On Move Toll Collection through VANET”, In International of Computer Standards & Interfaces, Elsevier, Vol. 36, No. 2, pp. 403-411, ISSN No. : 0920-5489, Impact Factor:1.465, 2014.
  • Brijesh Kumar Chaurasia, Dr. Shekhar Verma and Dr. G. S. Tomar, “Mechanism for Privacy Preservation in VANETs,” In the International Journal of Grid and High Performance Computing (IJGHPC), Special Issue on: Grid computing and Security, IGI, Vol. 2, No 2, pp. 12-22, ISSN No: 1938-0259, 2010. `
  • Kapil Sharma, Brijesh Kumar Chaurasia, Sehkhar Verma and G. S. Tomar, “Token Based Trust Computation in VANET,” International Journal of Grid and Distributed Computing, Vol. 9, No. 5, pp. 313-320, ISSN No: 2005-4262, 2016.
  • Pushpi Rani, Brijesh Kumar Chaurasia, and G. S. Tomar, “ID- Based Authentication for WiMAX”, In International Journal of Future Generation Communication and Networking, SERSC, Vol. 9, No. 2, pp. 211-218, ISSN No: 2233-7857, 2016.
  • Brijesh Kumar Chaurasia, Shekhar Verma, Henna Parveen and G. S. Tomar, “VANET Optimized IP Address Allocation,” In the International Journal of Future Generation Communication and Networking, SERSC, Vol. 8, No. 3, pp. 161-168, ISSN No. : 2233-7857, 2015.
  • Brijesh Kumar Chaurasia and Kapil Sharma, “Trust Computation in VANET Cloud,” In the International Journal of Trans. on Computational Science, Springer-Verlag Berlin Heidelberg, Vol. 34, pp. 77-95, ISBN No.: 978-3-662-59957-0, 2019.
  • Kapil Sharma, Varsha Dixit, Brijesh Kumar Chaurasia and Sehkhar verma, Trust Computation using Fuzzy Analyser, In Int. J. Inf. Technol. Commun. Convergence, Vol. 3, No. 3, pp. 177-190, ISSN No. : 2042-3225, 2020. 10.1504/IJITCC.2019.106556
  • Kapil Sharma, Brijesh Kumar Chaurasia, Sehkhar verma, and Arpita Bhargava, “Trust Computation using TOEFV,” International Journal of Trust Management in Computing and Communications, Inderscience, Vol. 4, No.1, pp. 36-51, ISSN No: 2048-8386, 2018.
  • Kapil Sharma, Aditya shrivastava, Ranjeet Singh Tomar, Brijesh Kumar Chaurasia, and Namkyun Baik, “A Probabilistic Based Reputation Computation Model for VANET”, In International Journal of Software Engineering and Its Applications, Vol. 10, No. 12 , pp. 461-472, ISSN No. : 1738-9984, 2016.
  • Vishal Bhatt, Mradul Dhakar and Brijesh Kumar Chaurasia, “ Filtered Clustering Based on Local Outlier Factor in Data Mining,” International Journal of Database Theory and Application, Vol. 9, No. 5, pp. 275-282, ISSN No: 2005-4270, 2016.
  • Gunjan Jain, S. R. Biradar and Brijesh Kumar Chaurasia, “Cluster Head Selection Heuristic using Weight and Rank in WSN,” In the International Journal of Trans. on Computational Science, Springer-Verlag Berlin Heidelberg, Vol. 25, pp. 135-147, ISSN No.: 978-3-662-47074-9, 2015.
  • Brijesh Kumar Chaurasia, Ranjeet Singh Tomar and Shekhar Verma, “Using Trust for Light Weight Communication in VANETs ,” In the International Journal of Artificial Intelligence and Soft Computing (IJAISC), Vol. 5, No. 2, pp.105–116, ISSN No. : 1755-4969, 2015.
  • Chaturvedi, D. N. Goswami, R. Soni and Brijesh Kumar Chaurasia, “Secure Multi-party Communication in Data-mining Applications,” In International Journal of Database Theory and Application, Vol.8, No.4, pp. 299-306, ISSN No. : 2005-4270, 2015.
  • Gunjan Jain, Nancy Jain and Brijesh Kumar Chaurasia, “Geographical Grid Based Clustering for WSN”, International Journal of Smart Business and Technology, SERSC, Vol. 2, No.1, pp. 15-20, ISSN No: 2288-8969, 2014.
  • Brijesh Kumar Chaurasia and Shekhar Verma, “Privacy Preserving Mutual Authentication in WiMAX,” In International Journal of Information Technology, Communications and Convergence (IJITCC), Inderscience, Vol. 2, No. 4, pp. 308-320, ISSN No: 2042-3225, 2013.
  • Brijesh Kumar Chaurasia and Shekhar Verma “Trust Based Group Formation in VANET,” In International Journal of Modern Traffic and Transportation Engineering Research (MTTER), Vol. 2, No. 2, pp. 121-125, ISSN No: 2304-9391, 2013.
  • Brijesh Kumar Chaurasia, Shekhar Verma and Geetam. S. Tomar, “Intersection Attack on Anonymity in VANET,” In the M.L. Gavrilova and C.J.K. Tan (Eds.): Trans. on Computational Science, Springer-Verlag Berlin Heidelberg, Vol. 7420, pp 133-149, ISBN No: 978-3-642-17499, 2013.
  • Laxmi Shrivastava, Brijesh Kumar Chaurasia, Sarita S. Bhadauraia and Geetam. S. Tomar, “Secure Congestion Adaptive Routing using Group Signature Scheme,” In the M.L. Gavrilova and C.J.K. Tan (Eds.): Trans. on Computational Science, Springer-Verlag Berlin Heidelberg, Vol. 7420, pp 101-115, ISBN No: 978-3-642-17499, 2013.
  • Brijesh Kumar Chaurasia and Shekhar Verma “Model Based Verification of Privacy Preserving Authentication Protocol for VANETs”, In International Journal of Information Technology, Communications and Convergence (IJITCC), Inderscience, Vol. 2, No. 2, pp. 120-137, ISSN No: 2042-3225, 2012.
  • Brijesh Kumar Chaurasia and Dr. Shekhar Verma, “Conditional Privacy through Ring Signature in Vehicular Ad-hoc Networks,” In the M.L. Gavrilova and C.J.K. Tan (Eds.): Trans. on Computational Science XIII, LNCS 6750, pp. 147–156, Springer-Verlag Berlin Heidelberg, ISSN No: 978-3-642-17499, 2011.
  • Brijesh Kumar Chaurasia, and Dr. Shekhar Verma, “Secure Toll Collection in VANETs,” In International Journal of Information Technology, Communications and Convergence (IJITCC), Inderscience, Vol. 1, No.4 pp. 421 – 443, ISSN No: 2042-3225, 2011.
  • Brijesh Kumar Chaurasia and Shekhar Verma “Infrastructure based Authentication in VANETs,” In International Journal of Multimedia and Ubiquitous Engineering, Vol. 6, No. 2, pp. 41-54, ISSN No: 1975-0080, 2011.
  • Brijesh Kumar Chaurasia, Shekhar Verma and G. S. Tomar, “Gausian Profile based Vehicular Mobility Modeling,” In Asia-pacifc Journal of Multimedia Services Convergence with Art, Humanites and Sociology, Vol.1, No.2 pp. 61-78, ISSN No: 2383-5281, 2011.
  • Saurabh Upadhyay and Brijesh Kumar Chaurasia, “Impact of Wormhole Attacks on MANETs,” In International Journal of Computer Science & Emerging Technologies, Vol. 2, Issue 1, pp. 77-82, ISSN No: 2044-6004, 2011.
  • Brijesh Kumar Chaurasia and Dr. Shekhar Verma, “Maximising Anonymity of a Vehicle,” In International Journal of Autonomous and Adaptive Communications Systems (IJAACS), Special Issue on: Security, Trust, and Privacy in DTN and Vehicular Communications, Inderscience, Vol. 3, No. 2, pp. 198-216, ISSN No: 1754-8640, 2010.
  • Pratibha Tomar, Brijesh Kumar Chaurasia and Dr. G. S. Tomar, “State of the art of Data Dissemination in VANETs,” In International Journal of Computer Theory and Engineering (IJCTE), Vol.2, No.6, pp. 957-962, ISSN No: 1793-8201, 2010.
  • Brijesh Kumar Chaurasia, Dr. Shekhar Verma, G. S. Tomar and Ajith Abraham, “Optimizing Pseudonym Updation in Vehicular Ad-hoc Networks,” In the Transactions on Computational Science IV, Special Issue on Security in Computing, LNCS volume 5430, pp. 136-148, ISBN No: 978-3-642-01003, 2009.
  • Brijesh Kumar Chaurasia and Dr. Shekhar Verma, “Privacy Preserving in VANETs”, In the IUP Journal of Systems Management (IJSYM), pp. 42-52, Vol. IX, No. 2, 2011.

Publications

Publications in International Conferences

  • Brijesh Kumar Chaurasia et al., “Improved Election of Cluster Head Using CH-PSO for Different Scenarios in VANET,” International Conference on Communication, Networks and Computing (CNC-2018), Communication, Networks and Computing, pp. 110-120, CCIS (839), ISBN 978-981-13-2372, Springer, Singapore, March 22-24, 2018
  • Brijesh Kumar Chaurasia et al., “Performance Analysis of Hidden Terminal Problem in VANET for Safe Transportation System,” International conference on Harmony Search and Nature Inspired Optimization Algorithms (ICHSA 2018), Harmony Search and Nature Inspired Optimization Algorithms, pp. 1199-1208, ISBN 978-981-13-0761-4, Springer, Singapore, February 7–9, 2018
  • Brijesh Kumar Chaurasia et al., “Certificate Revocation in Hybrid Ad-hoc Network,”The 1st International Conference on Data, Engineering and Applications 2017 (IDEA-2k17), October 28-29, 2017
  • Brijesh Kumar Chaurasia et al., “Computational Trust Model for Internet of Vehicles,” Conference on Information and Communication Technology (CICT’17), pp. 1-5, ISBN NO.:978-1-5386-1866-0, 2017
  • Brijesh Kumar Chaurasia et al., “Security Issues in Fog Computing using Vehicular Cloud,”International Conference on Information, Communication, Instrumentation and Control – 2017 (ICICIC-`17) , pp. 1-4,ISBN: 978-1-5090-6313-0, 2017
  • Brijesh Kumar Chaurasia et al., “Multilateration Mechanism in WSN Using Grid Analysis,” In Proceedings of the International Conference on Communication and Computing Systems (ICCCS 2016), CRC Press, Taylor and Francis Group, pp. 999 -1002, ISBN No: 9781138029521, 2016
  • Brijesh Kumar Chaurasia et al., “HMM for Reputation Computation in VANET”,International Conference on Computing, Communication and Automation (ICCCA2016), pp. 667 – 670,ISBN No: 978-1-5090-1666-2,2016
  • Brijesh Kumar Chaurasia et al., “Operational analysis of k-medoids and k-means algorithms on noisy data,” In International Conference on Communication and Signal Processing (ICCSP), Organized by IEEE, pp. 1500-1505, ISBN No: 978-1-5090-0396-9, 2016
  • Brijesh Kumar Chaurasia et al., “Reputation System Based On Message Dissemination in VANET,” International Conference on Advances in Information Communication Technology & Computing, AICTC, ACM, Article No. 44,ISBN No: 978-1-4503-4213-1, 2016
  • Brijesh Kumar Chaurasia et al., “Traffic Congestion Detection using Data Mining in VANET,” IEEE Students’ Conference on Electrical, Electronics and Computer Science (SCEECS), ISBN No: 978-1-4673-7918-2, 2016
  • Brijesh Kumar Chaurasia et al., “Performance Evaluation of a Polynomial based Key Management scheme in Wireless Sensor Networks”, In IEEE International Conference on Communication and Signal Processing (ICCSP), pp. 1768-1772, ISBN No: 978-1-5090-0396-9, 2016
  • Brijesh Kumar Chaurasia et al., “Improved Energy Efficient Key Management scheme in Wireless Sensor Networks”, In IEEE International Conference on Communication and Signal Processing (ICCSP),pp. 1792-1797, ISBN No: 978-1-5090-0396-9, 2016
  • Brijesh Kumar Chaurasia et al., “Kalman Filter for Trust Estimation in VANETs,”In IEEE UP SectionConference on Electrical Computer and Electronics (UPCON), pp. 1-6, ISBN No: 978-1-4673-8507-7, 2015
  • Brijesh Kumar Chaurasia et al., “Trust Based Location Finding Mechanism in VANET using DST”,International Conference on Computational Intelligence and Communication Networks, pp. 763-766, ISBN No: 978-1-4799-1796-9, 2015
  • Brijesh Kumar Chaurasia et al., “Trust based scheme for location finding in VANETs”,International Conference On Opto-Electronics And Applied Optics 2014 (IEM Optronix-2014), Advances in Optical Science and Engineering, Springer, Vol. 166,No. XI, pp. 425-432, ISBN No:978-81-322-2366-5, 2015
  • Brijesh Kumar Chaurasia et al., “FANET based Flights Monitoring Simulation System Over Cloud”,International Conference On Opto-Electronics And Applied Optics 2014 (IEM Optronix-2014), Advances in Optical Science and Engineering, Springer, Vol. 166, No. XI,pp. 417-423, ISBN No: , 2015
  • Brijesh Kumar Chaurasia et al., “Blackhole Tolerant Protocol for ZigBee Wireless Networks”,International Conference on Computational Intelligence and Communication Networks, pp. 782-786, ISBN No: 978-1-4799-6928-9 , 2014
  • Brijesh Kumar Chaurasia et al., “Secure Communication for Cluster Based Wireless Sensor Network”,International Conference on Computational Intelligence and Communication Networks, pp. 867-871, ISBN No:978-1-4799-6928-9, 2014
  • Brijesh Kumar Chaurasia et al., “Detection and Isolation of Sinkhole Attack from AODV Routing Protocol in MANET”,International Conference on Computational Intelligence and Communication Networks, pp. 799-802, ISBN No:978-1-4799-6928-9, 2014
  • Brijesh Kumar Chaurasia et al., “Reputation and Trust Computation in VANETs,”International Conference On Electronics Engineering and Computer Science (IEMCON2014)Organized by Elsevier, ISBN No:9789351072485, 2014
  • Brijesh Kumar Chaurasia et al., “An Efficient and Secure Architecture for cloud computing Environment”,International Conference On Electronics Engineering and Computer Science (IEMCON2014)Organized by Elsevier, ISBN No:9789351072485, 2014
  • Brijesh Kumar Chaurasia et al., “Key Management in WiMAX”,International Conference On Communication System and Network Technologies (CSNT-2014) Organized by IEEE,pp. 669-672, ISBN No:978-1-4799-3069-2, 2014
  • Brijesh Kumar Chaurasia et al., “Link Weight Based Enable Protocol in Wireless Sensor Network”,International Conference On Communication System and Network Technologies (CSNT-2014) Organized by IEEE,pp. 156-159, ISBN No:978-1-4799-3069-2, 2014
  • Brijesh Kumar Chaurasia et al., “Network Connectivity in VANETs”,3rdInternational conference on soft computing for problem solving (SocProS2013), Organized by Springer,pp. 767-775, ISBN No:978-81-322-1770-1, 2013
  • Brijesh Kumar Chaurasia et al., “Authentication in Cloud Computing Environment using Two Factor Authentication”,3rdInternational conference on soft computing for problem solving (SocProS2013), Organized by Springer,Greater Noida Extension Center of IIT Roorkee, Vol. 2, pp. 779-786, ISBN No: , 2013
  • Brijesh Kumar Chaurasia et al., “AHP Based Trust Model in VANETs”,The IEEE 5th International Conference on Computational Intelligence and Communication Networks (CICN2013), pp. 391-393, ISBN No:978-0-7695-5069-5, 2013
  • Brijesh Kumar Chaurasia et al., “Trust Computation in VANETs”,The International Conference on Communication Systems and Network Technologies (CSNT-2013), pp. 468-471, ISBN No:978-1-4673-5603-9, 2013
  • Brijesh Kumar Chaurasia et al., “Traffic Analysis for WiMAX”,The IEEE 5th International Conference on Computational Intelligence and Communication Networks (CICN2013), pp. 138-140, ISBN No:978-1-4673-5603-9, 2013
  • Brijesh Kumar Chaurasia et al., “Analysis and Feasibility of Reactive Routing Protocols with Malicious Nodes in MANETs”,The International Conference on Communication Systems and Network Technologies (CSNT-2013),Organized by IEEE, Gwalior, India, pp. 356-360, ISBN No:978-1-4673-5603-9, 2013
  • Brijesh Kumar Chaurasia et al., “Suitability of MANET Routing Protocols for Vehicular Ad hoc Networks”,The International Conference on Communication Systems and Network Technologies (CSNT-2012),Organized by IEEE, Rajkot, India, pp. 334-338, ISBN No:978-1-4673-1538-8, 2012
  • Brijesh Kumar Chaurasia et al., “Trust Management Model for Wireless Ad hoc Networks”,International conference on soft computing for problem solving,K. Deep et al. (Eds.): Proceedings of the International Conf. on SocProS2011, AISC 130, Organized by Springer,Vol. 1, pp. 193-198, ISBN No:978-81-322-0486-2, 2012, IIT Roorkee, India
  • Brijesh Kumar Chaurasia et al., “Attacks on Anonymity in VANET,” The IEEE International Conference on Computational Intelligence and Communication Networks (CICN2011), pp. 217-221, Gwalior, India, ISBN No:978-1-4577-2033-8, 2011
  • Brijesh Kumar Chaurasia et al., “Meta Search Engine based on Prioritizor”, The IEEE International Conference on Computational Intelligence and Communication Networks (CICN2011), pp. 512-514, Gwalior, India, ISBN No:978-1-4577-2033-8, 2011
  • Brijesh Kumar Chaurasia et al., “Verification of Privacy Preserving Authentication Protocol for VANETs,” The International Conference on Computational Intelligence and Communication and Networks (CICN-2010) organized by IEEE in Bhopal, India, pp. 243-248, ISBN No:978-1-4244-8653-3, 2010
  • Brijesh Kumar Chaurasia et al., “Infrastructure aided privacy preserving-authentication in VANETs,” 2nd International Conference on Advanced Communication and Networking (ACN-2010) organized by LNCS, Communications in Computer and Information Science, Vol. 76, pp. 179-189, in Miyazaki, ISBN No:978-3-642-17568-8, 2010
  • Brijesh Kumar Chaurasia et al., “Haste Induced Behavior and VANET Communication, ” IEEE International Conference on Vehicular Electronics and Safety (ICVES-2009) organized by IEEE Bombay section (IIT Bombay), Pune, India, pp. 19-24 , ISBN No:978-1-4244-5442-6, 2009
  • Brijesh Kumar Chaurasia et al., “Pseudonym Based Mechanism for Sustaining Privacy in VANETs,”The First IEEE International conference on Computational Intelligence, Communication Systems and Networks (CICSYN-2009), Indore, India, pp. 420 – 425, ISBN No:978-0-7695-3743-6/09 , 2009
  • Brijesh Kumar Chaurasia et al., “Profile Based Mobility Model in Vehicular Ad- Hoc Networks,” World congress on Nature and Biologically Inspired Computing(NaBIC 2009) In Cooperation with IEEE , NaBIC2009, Coimbatore, India, pp. 493-498, ISBN No:978-1-4244-5053-4, 2009
  • Brijesh Kumar Chaurasia et al., “Optimizing Pseudonym Updation for Anonymity in VANETs,”The First IEEE International Workshop on Vehicular Networking (VON-08) In Conjunction With IEEE APSCC 2008, Yilan, Taiwan, pp. 1633 – 1637, ISBN No:978-0-7695-3473-2, 2008
  • Brijesh Kumar Chaurasia et al., “Maximizing Anonymity of a Vehicle through Pseudonym Updation,” First International Workshop on Wireless Vehicular Networking Technology (VINT-08) In conjunction with The Fourth Annual International Wireless Internet Conference (WICON 2008), Maui, Hawaii, USA, November 17-19, 10.4108/ICST.WICON2008.4904, Article no. – 83, ISBN No:978-963-9799-36-3, 2008
  • Brijesh Kumar Chaurasia et al., “Modified Stream Control Transmission Protocol over Broadband High Latency Networks,” Second Asia International Conference on Modelling & Simulation Kuala Lumpur (AMS-2008), Malaysia, pp. 174-179, ISBN No: , 2008
  • Brijesh Kumar Chaurasia et al., “Multiple spreading codes based MAC protocol for wireless networks,” Fourth International Conference on Wireless Communication and Sensor Networks, pp. 192-195,ISBN No:978-0-7695-3136-6, 2008
  • Brijesh Kumar Chaurasia et al., “Message broadcast in VANETs using Group Signature,”Fourth International Conference on Wireless Communication and Sensor Networks , pp. 131-136,ISBN No:978-1-4244-3326-1, 2008
  • Brijesh Kumar Chaurasia et al., “Maximizing Anonymity of a Vehicle,” Fourth International Conference on Wireless Communication and Sensor Networks , Indian Institute of Information Technology, Allahabad, India, pp. 95-98, ISBN No:978-1-4244-3326-1, 2008
  • Brijesh Kumar Chaurasia et al., “Efficiency Enhanced Association Rule Mining Technique”,International Conference on Parallel, Distributed Computing technologies and Applications (PDCTA-2011), pp. 375-384,ISBN No:978-3-642-24036-2, 2011
  • Brijesh Kumar Chaurasia et al., “Hiding Sensitive Association Rules without Altering theSupport of Sensitive Item(s)”,The Third International Conference on Wireless & Mobile Networks (WiMoNe‐2012),Bangalore, India, N. Meghanathan et al. (Eds.): CCSIT 2012, Part I, LNICST 84, pp. 500–509, ISBN No:978-3-642-27298-1, 2012
  • Brijesh Kumar Chaurasia et al., “Detecting and Avoiding Wormhole Attack in MANET using Statistical Analysis Approach”,The Third International Conference on Wireless & Mobile Networks (WiMoNe‐2012),N. Meghanathan et al. (Eds.): CCSIT 2012, Part I, LNICST 84, pp. 402–408, ISBN No:978-3-642-27298-1, 2012
  • Brijesh Kumar Chaurasia et al., “Effect of number of CBR Connections on the performance of a Load Balanced Congestion Adaptive Routing for MANET,” In IEEE International Conference on Computational Intelligence and Communication Networks (CICN-2012), pp. 112-116, ISBN No: , 2012

 

Publications in International Conferences (Book Chapters)

 
  1. Anubha Chaturvedi and Brijesh Kumar Chaurasia, Certificate Revocation in Hybrid Ad-hoc Network,” The 1st International Conference on Data, Engineering and Applications 2017 (IDEA-2k17), October 28-29, Vol. 2, pp. 85-91, ISBN 978-981-13-6351-1, 2019.
  2. Bhairo Singh Rajawat, Ranjeet Singh Tomar, Mayank Satya Prakash Sharma and Brijesh Kumar Chaurasia, “Improved Election of Cluster Head Using CH-PSO for Different Scenarios in VANET,” International Conference on Communication, Networks and Computing (CNC-2018), Communication, Networks and Computing, CCIS (839), ISBN 978-981-13-2372, Springer, Singapore, March 22-24, 2018, Vol. 839, 110-120, 2019.
  3. RS Tomar, MSP Sharma, S Jha and , Brijesh Kumar Chaurasia, “Performance Analysis of Hidden Terminal Problem in VANET for Safe Transportation System,” International conference on Harmony Search and Nature Inspired Optimization Algorithms (ICHSA 2018), Harmony Search and Nature Inspired Optimization Algorithms, ISBN 978-981-13-0761-4, Springer, Singapore, February 7–9, 2018, Vol. 741, pp. 1199-1208, 2019.
  4. Sonam Soni, Kapil Sharma and Brijesh Kumar Chaurasia, “Trust based scheme for location finding in VANETs”, International Conference On Opto-Electronics And Applied Optics 2014(IEM Optronix-2014), Advances in Optical Science and Engineering, Springer,  166, No. XI, pp. 425-432, ISBN No: 978-81-322-2366-5, 2015.
  5. Vipul Tiwari, Kapil Sharma and Brijesh Kumar Chaurasia, “FANET based Flights Monitoring Simulation System Over Cloud”, International Conference On Opto-Electronics And Applied Optics 2014(IEM Optronix-2014), Advances in Optical Science and Engineering, Springer,  166, No. XI, pp. 417-423, ISBN No: 978-81-322-2366-5 , 2015.
  6. Ranjeet Singh Tomar, Brijesh Kumar Chaurasia, Shekhar Verma and Rajendra Singh Kushwah, “Network Connectivity in VANETs”, 3rd International conference on soft computing for problem solving (SocProS2013), Organized by Springer, 767-775, ISBN No: 978-81-322-1770-1, 2013.
  7. Brijesh Kumar Chaurasia, Awanish Shahi and Shekhar Verma, “Authentication in Cloud Computing Environment using Two Factor Authentication”, 3rd International conference on soft computing for problem solving (SocProS2013), Organized by Springer, Greater Noida Extension Center of IIT Roorkee, Vol. 2, pp. 779-786, 2013.
  8. Brijesh Kumar Chaurasia and Ranjeet Singh Tomar, “Trust Management Model for Wireless Ad hoc Networks”, International conference on soft computing for problem solving, Deep et al. (Eds.): Proceedings of the International Conf. on SocProS2011, AISC 130, Organized by Springer, Vol. 1, pp. 193-198, ISBN No: 978-81-322-0486-2, 2012, IIT Roorkee, India.
  9. Brijesh Kumar Chaurasia, Shekhar Verma and G. S. Tomar, “Infrastructure aided privacy preserving-authentication in VANETs,” 2nd International Conference on Advanced Communication and Networking (ACN-2010) organized by LNCS, Communications in Computer and Information Science, Vol. 76, pp. 179-189, in Miyazaki, ISBN No: 978-3-642-17568-8, 2010.
  10. Brijesh Kumar Chaurasia, Abhishek Agrawal, Urjita Thakar and Rishi Soni, “Efficiency Enhanced Association Rule Mining Technique”, International Conference on Parallel, Distributed Computing technologies and Applications (PDCTA-2011), 375-384, ISBN No: 978-3-642-24036-2,  2011.
  11. Dhyanendra Jain, Pallavi Khatri, Rishi Soni, and Brijesh Kumar Chaurasia, “Hiding Sensitive Association Rules without Altering the Support of Sensitive Item(s)”, The Third International Conference on Wireless & Mobile Networks (WiMoNe2012), Bangalore, India, N. Meghanathan et al. (Eds.): CCSIT 2012, Part I, LNICST 84, pp. 500–509, ISBN No: 978-3-642-27298-1, 2012.
  12. Brijesh Kumar Chaurasia and Saurabh Updhyay, “Detecting and Avoiding Wormhole Attack in MANET using Statistical Analysis Approach”, The Third International Conference on Wireless & Mobile Networks (WiMoNe2012), Meghanathan et al. (Eds.): CCSIT 2012, Part I, LNICST 84, pp. 402–408, ISBN No: 978-3-642-27298-1, 2012.
  13. Vijay Kumar Yadav, Rakesh Kumar Yadav, Brijesh Kumar Chaurasia, Shekhar Verma, and       S Venkatesan, “MITM Attack on Modification of Diffie-Hellman Key Exchange Algorithm,” 2nd International Conference on Communication, Networks & Computing (CNC-2019), Accepted.
  14. Rakesh Kumar Yadav, Abhishek, Prashant Shukla Rakesh Kumar Yadav, Abhishek, Prashant Shukla, Nazish Tabassum, Brijesh Kumar Chaurasia, and Shekhar Verma, “Spatial Information Preservation in Graph Convolutional Neural Network,” 2nd International Conference on Communication, Networks & Computing (CNC-2019), Accepted.
Papers Presented in International Conferences:
  1. Arpita Bhargava, Sehkhar Verma, Brijesh Kumar Chaurasia and Geetam S. Tomar, “Computational Trust Model for Internet of Vehicles,” Conference on Information and Communication Technology (CICT’17), pp. 1-5, ISBN NO.: 978-1-5386-1866-0, 2017.
  2. Ankita SamadhiyaGunjan Jain and Brijesh Kumar Chaurasia, “Link Weight Based Enable Protocol in Wireless Sensor Network”, International Conference On Communication System and Network Technologies (CSNT-2014) Organized by IEEE, 156-159, ISBN No: 978-1-4799-3069-2, 2014. 10.1109/CSNT.2014.246
  3. Shilpi JaniAlankar Shastri and Brijesh Kumar Chaurasia, “Analysis and Feasibility of Reactive Routing Protocols with Malicious Nodes in MANETs”, The International Conference on Communication Systems and Network Technologies (CSNT-2013), Organized by IEEE, Gwalior, India, pp. 356-360, ISBN No: 978-1-4673-5603-9, 2013.
  4. Brijesh Kumar Chaurasia, Shekhar Verma and Geetam S. Tomar, “Trust Computation in VANETs”, The International Conference on Communication Systems and Network Technologies (CSNT-2013), 468-471, ISBN No: 978-1-4673-5603-9, 2013. 10.1109/CSNT.2013.103
  5. Brijesh Kumar Chaurasia, Shekhar Verma, and G. S. Tomar, “Attacks on Anonymity in VANET,” The IEEE International Conference on Computational Intelligence and Communication Networks (CICN2011), 217-221, Gwalior, India, ISBN No: 978-1-4577-2033-8, 2011.
  6. Brijesh Kumar Chaurasia, Shashi Kant Gupta, and Rishi Soni, “Meta Search Engine based on Prioritizor”, The IEEE International Conference on Computational Intelligence and Communication Networks (CICN2011), 512-514, Gwalior, India, ISBN No: 978-1-4577-2033-8, 2011. 10.1109/CICN.2011.109
  7. Brijesh Kumar Chaurasia, Shruti Keshari, Shekhar Verma and G. S. Tomar, “Verification of Privacy Preserving Authentication Protocol for VANETs,” The International Conference on Computational Intelligence and Communication and Networks (CICN-2010) organized by IEEE in Bhopal, India, pp. 243-248, ISBN No: 978-1-4244-8653-3, 2010.
  8. Brijesh Kumar Chaurasia, Dr. Shekhar Verma, Dr. G. S. Tomar, and S.M. Bhaskar, “Pseudonym Based Mechanism for Sustaining Privacy in VANETs,” The First IEEE International conference on Computational Intelligence, Communication Systems and Networks (CICSYN-2009), Indore, India, 420 – 425, ISBN No: 978-0-7695-3743-6/09 , 2009.
  9. Brijesh Kumar Chaurasia, Shekhar Verma, and M. Bhasker,  Message broadcast in VANETs using Group Signature,” Fourth International Conference on Wireless Communication and Sensor Networks , pp. 131-136, ISBN No: 978-1-4244-3326-1, 2008. 10.1109/WCSN.2008.4772697
  10. Brijesh Kumar Chaurasia, Shekhar Verma, and S. M. Bhasker, “Maximizing Anonymity of a Vehicle,” Fourth International Conference on Wireless Communication and Sensor Networks , Indian Institute of Information Technology, Allahabad, India, pp. 95-98, ISBN No: 978-1-4244-3326-1, 2008. 1109/WCSN.2008.4772689

 

Publications in International Conferences:
  1. Vipul Tiwari and Brijesh Kumar Chaurasia, Security Issues in Fog Computing using Vehicular Cloud,” International Conference on Information, Communication, Instrumentation and Control – 2017 (ICICIC-`17), pp. 1-4, ISBN: 978-1-5090-6313-0, 2017.
  2. Monica Yadav, Brijesh Kumar Chaurasia and S. K. Gupta, “Multilateration Mechanism in WSN Using Grid Analysis,” In Proceedings of the International Conference on Communication and Computing Systems (ICCCS 2016), CRC Press, Taylor and Francis Group, pp. 999 -1002, ISBN No: 9781138029521, 2016.
  3. Aditya Shrivastava, Kapil Sharma and Brijesh Kumar Chaurasia, “HMM for Reputation Computation in VANET”, International Conference on Computing, Communication and Automation (ICCCA2016), pp. 667 – 670, ISBN No: 978-1-5090-1666-2,
  4. Wellington Simbarashe Manjoro, Mradul Dhakar and Brijesh Kumar Chaurasia, “Operational analysis of k-medoids and k-means algorithms on noisy data,” In International Conference on Communication and Signal Processing (ICCSP), Organized by IEEE, pp. 1500-1505, ISBN No: 978-1-5090-0396-9, 2016.
  5. Aditya Shrivastava, Kapil Sharma and Brijesh Kumar Chaurasia, “Reputation System Based On Message Dissemination in VANET,” International Conference on Advances in Information Communication Technology & Computing, AICTC, ACM, Article No. 44, ISBN No: 978-1-4503-4213-1, 2016.
  6. Wellington Simbarashe Manjoro, Mradul Dhakar and Brijesh Kumar Chaurasia, “Traffic Congestion Detection using Data Mining in VANET,” IEEE Students’ Conference on Electrical, Electronics and Computer Science (SCEECS), ISBN No:978-1-4673-7918-2, 2016.
  7. T. Chakavarika, B. K. Chaurasia and S. K. Gupta, “Performance Evaluation of a Polynomial based Key Management scheme in Wireless Sensor Networks”, In IEEE International Conference on Communication and Signal Processing (ICCSP), pp. 1768-1772, ISBN No: 978-1-5090-0396-9, 2016.
  8. T. Chakavarika, B. K. Chaurasia and S. K. Gupta, “Improved Energy Efficient Key Management scheme in Wireless Sensor Networks”, In IEEE International Conference on Communication and Signal Processing (ICCSP), pp. 1792-1797, ISBN No: 978-1-5090-0396-9, 2016.
  9. Arpita Bhargava, Sehkhar Verma and Brijesh Kumar Chaurasia, “Kalman Filter for Trust Estimation in VANETs,”  In IEEE UP Section Conference on Electrical Computer and Electronics (UPCON), pp. 1-6, ISBN No: 978-1-4673-8507-7, 2015.
  10. Kapil Sharma and Brijesh Kumar Chaurasia, “Trust Based Location Finding Mechanism in VANET using DST”, International Conference on Computational Intelligence and Communication Networks, pp. 763-766, ISBN No: 978-1-4799-1796-9, 2015.
  11. Hemant Sharma, Koushik Banerjee and Brijesh Kumar Chaurasia, “Blackhole Tolerant Protocol for ZigBee Wireless Networks”, International Conference on Computational Intelligence and Communication Networks, pp. 782-786, ISBN No: 978-1-4799-6928-9 , 2014.
  12. Koushik Banerjee, Hemant Sharma and Brijesh Kumar Chaurasia, “Secure Communication for Cluster Based Wireless Sensor Network”, International Conference on Computational Intelligence and Communication Networks, pp. 867-871, ISBN No: 978-1-4799-6928-9, 2014.
  13. Shashi Pratap Singh and Brijesh Kumar Chaurasia, “Detection and Isolation of Sinkhole Attack from AODV Routing Protocol in MANET”, International Conference on Computational Intelligence and Communication Networks, pp. 799-802, ISBN No: 978-1-4799-6928-9, 2014.
  14. Kapil Sharma, Sonam Soni and Brijesh Kumar Chaurasia, “Reputation and Trust Computation in VANETs,” International Conference On Electronics Engineering and Computer Science (IEMCON2014) Organized by Elsevier, ISBN No: 9789351072485, 2014.
  15. Anasuya Sengupta, Brijesh Kumar Chaurasia, Arun Kumar Yadav,“An Efficient and Secure Architecture for cloud computing Environment”, International Conference On Electronics Engineering and Computer Science (IEMCON2014) Organized by Elsevier, ISBN No: 9789351072485, 2014.
  16. Himanshu Singh and Brijesh Kumar Chaurasia, “Key Management in WiMAX”, International Conference On Communication System and Network Technologies (CSNT-2014) Organized by IEEE, 669-672, ISBN No: 978-1-4799-3069-2, 2014.
  17. Deepika Saraswat and Brijesh Kumar Chaurasia, “AHP Based Trust Model in VANETs”, The IEEE 5th International Conference on Computational Intelligence and Communication Networks (CICN2013), 391-393, ISBN No: 978-0-7695-5069-5, 2013. 10.1109/CICN.2013.86
  18. Anju Bhatele, Ramesh Parajuli and Brijesh Kumar Chaurasia, “Traffic Analysis for WiMAX”, The IEEE 5th International Conference on Computational Intelligence and Communication Networks (CICN2013), 138-140, ISBN No: 978-1-4673-5603-9, 2013.
  19. Brijesh Kumar Chaurasia, Ranjeet Singh Tomar, Shekhar Verma and G. S. Tomar “Suitability of MANET Routing Protocols for Vehicular Ad hoc Networks”, The International Conference on Communication Systems and Network Technologies (CSNT-2012), Organized by IEEE, Rajkot, India, pp. 334-338, ISBN No: 978-1-4673-1538-8, 2012. 1109/CSNT.2012.78
  20. Brijesh Kumar Chaurasia, and Dr. Shekhar Verma, “Haste Induced Behavior and VANET Communication, ” IEEE International Conference on Vehicular Electronics and Safety (ICVES-2009) organized by IEEE Bombay section (IIT Bombay), Pune, India, pp. 19-24 , ISBN No: 978-1-4244-5442-6, 2009.

Brijesh Kumar Chaurasia, Ajit  Jaiswal, Dr. Shekhar Verma and G. S. Tomar, “Profile Based Mobility Model in Vehicular Ad- Hoc Networks,” World congress on Nature and Biologically Inspired Computing (NaBIC 2009) In Cooperation with IEEE , NaBIC2009, Coimbatore, India, pp. 493-498, ISBN No: 978-1-4244-5053-4, 2009. 10.1109/NABIC.2009.5393368

INVITED TALKS

  • IoT and it’s Security Issues, KIT, Kanpur, 19 May, 2021.
  • Security – Role of Machine Learning, National Workshop on “Machine Learning Models and Applications” Institute of Engineering & Technology, Dr  R.M.L. Avadh University, Ayodhya, India 19-23 February, 2021. (23 February, 2021)
  • Blockchain Technology and Applications, STTP on Applied Computing, MITS Gwalior, 09-13 November, 2020. (11 November, 2020)
  • Cryptography & Network Security, Jiwaji University, Gwalior, 24 Oct, 2020.
  • Blockchain Technology and Applications, TEQIP- III : Recent Trends in Computer Science and Engineering, MIT Ujjain, 09 August, 2020.
  • Cryptography & Network Security, REC Banda, 09 August 2019.

MEMBER OF PROFESSIONAL SOCIETY

  • Member IEEE (80747261)
  • Fellow IETE (F-234192)
  • Member IE (M-152775-9)
  • Fellow, CSI (F8000812)

REVIEWER IN INTERNATIONAL JOURNALS

  • Transactions on Intelligent Transportation Systems, 2021.
  • Wireless Personal Communications, Springer, 2020, 2021.
  • IEEE Sensor journal, 2010, 2016, 2017, 2020.
  • Vehicular Communication, Elsevier, 2019, 2021.
  • IEEE ITS Transaction, 2018, 2017, 2014.
  • SCN, Wiely 2016, 2014, 2013, 2012.
  • IEEE ITS Transaction, 2013.
  • Journal of Computer Science and Interface, Elsevier, 2012.
  • Journal of Network and Computer Applications, Elsevier, 2012, 2011.

Contact

Department of Information Technology,
Indian Institute of Information Technology,
Lucknow, India.
[email protected]

Skip to content