This page has only limited features, please log in for full access.

Mr. Deep Kumar Bangotra
DEPARTMENT OF HIGHER EDUCATION, GOVT OF J&K

Basic Info


Research Keywords & Expertise

0 Machine Learning
0 IoT
0 WSN
0 INTELLIGENT ROUTING
0 SECURE ROUTING

Honors and Awards

The user has no records in this section


Career Timeline

Baba Ghulam Shah Badshah University, Rajouri, J&K

Institute, Department or Faculty Head

01 November 2006 - 01 January 2012




Short Biography

Deep Kumar Bangotra, Assistant Professor in the Department of Higher Education, J&K Govt. is currently pursuing Ph.D from the Department of Computer Science and IT, Central University of Jammu, J&K-India. Mr. Bangotra has a research interest in Wireless Sensor Networks and Machine Learning. He has attended many national and international conferences and has published research papers in SCI and Scopus indexed Journals of good repute. He has 14 years of teaching experience to his credit.

Following
Followers
Co Authors
The list of users this user is following is empty.
Following: 0 users

Feed

Article
Published: 18 May 2021 in Wireless Personal Communications
Reads 0
Downloads 0

The need for reliable transmission of data packets is becoming more critical as Wireless Sensor Networks (WSN) gain popularity. Reliable delivery of data packets is possible only when the protocols for routing the data packets are secure and efficient. Due to the constrained nature of the WSN, the current cryptosystems may not be used to provide WSN security. The trust-based intelligent routing, however, may provide security with fewer resources, and it has become common in the last five years. In this paper, a new Trust-Based Secure Intelligent Opportunistic Routing Protocol(TBSIOP) has been proposed. The proposed protocol uses three distinct WSN attributes to compute a node's likelihood of being malicious(Pm). These attributes are sincerity in forwarding data packets(Fs), sincerity in acknowledgment (ACKs), and Energy Depletion (Ed), and these attributes are used for trust computation. Based on the trust factor computed, the relay selection algorithm of the proposed protocol prevents malicious nodes from being chosen as relay nodes. The proposed protocol is applied on the forwarder node list that is formed by Intelligent Opportunistic Routing Protocol. The proposed protocol is simulated and compared with the existing trust-based routing protocols present in the literature. The proposed TBSIOP has better performance in terms of Average Risk Level, Packet Delivery Ratio, End-to-End delay, Energy Consumption, and Network Lifetime than the comparative protocols present in the literature.

ACS Style

Deep Kumar Bangotra; Yashwant Singh; Arvind Selwal; Nagesh Kumar; Pradeep Kumar Singh. A Trust Based Secure Intelligent Opportunistic Routing Protocol for Wireless Sensor Networks. Wireless Personal Communications 2021, 1 -22.

AMA Style

Deep Kumar Bangotra, Yashwant Singh, Arvind Selwal, Nagesh Kumar, Pradeep Kumar Singh. A Trust Based Secure Intelligent Opportunistic Routing Protocol for Wireless Sensor Networks. Wireless Personal Communications. 2021; ():1-22.

Chicago/Turabian Style

Deep Kumar Bangotra; Yashwant Singh; Arvind Selwal; Nagesh Kumar; Pradeep Kumar Singh. 2021. "A Trust Based Secure Intelligent Opportunistic Routing Protocol for Wireless Sensor Networks." Wireless Personal Communications , no. : 1-22.

Journal article
Published: 05 March 2021 in Sensors
Reads 0
Downloads 0

The escalated growth of the Internet of Things (IoT) has started to reform and reshape our lives. The deployment of a large number of objects adhered to the internet has unlocked the vision of the smart world around us, thereby paving a road towards automation and humongous data generation and collection. This automation and continuous explosion of personal and professional information to the digital world provides a potent ground to the adversaries to perform numerous cyber-attacks, thus making security in IoT a sizeable concern. Hence, timely detection and prevention of such threats are pre-requisites to prevent serious consequences. The survey conducted provides a brief insight into the technology with prime attention towards the various attacks and anomalies and their detection based on the intelligent intrusion detection system (IDS). The comprehensive look-over presented in this paper provides an in-depth analysis and assessment of diverse machine learning and deep learning-based network intrusion detection system (NIDS). Additionally, a case study of healthcare in IoT is presented. The study depicts the architecture, security, and privacy issues and application of learning paradigms in this sector. The research assessment is finally concluded by listing the results derived from the literature. Additionally, the paper discusses numerous research challenges to allow further rectifications in the approaches to deal with unusual complications.

ACS Style

Parushi Malhotra; Yashwant Singh; Pooja Anand; Deep Bangotra; Pradeep Singh; Wei-Chiang Hong. Internet of Things: Evolution, Concerns and Security Challenges. Sensors 2021, 21, 1809 .

AMA Style

Parushi Malhotra, Yashwant Singh, Pooja Anand, Deep Bangotra, Pradeep Singh, Wei-Chiang Hong. Internet of Things: Evolution, Concerns and Security Challenges. Sensors. 2021; 21 (5):1809.

Chicago/Turabian Style

Parushi Malhotra; Yashwant Singh; Pooja Anand; Deep Bangotra; Pradeep Singh; Wei-Chiang Hong. 2021. "Internet of Things: Evolution, Concerns and Security Challenges." Sensors 21, no. 5: 1809.

Conference paper
Published: 13 January 2021 in Lecture Notes in Electrical Engineering
Reads 0
Downloads 0

Wireless sensor networks (WSNs) applications have grown huge in the recent years. WSN is very popular due to its abilities to record, process, and transmit data related to various parameters of the environment. Due to WSN inherent nature, these networks are vulnerable to various types of attacks, especially at the network layer of the protocol stack in WSN. In this paper, an analysis about different security threats w.r.t different layers of the protocol stack using opportunistic routing (OR) is presented. The wireless nature and broadcast feature of WSN cause many attacks in the network layer and security of the transmitted data becomes an important issue. Different machine learning (ML) techniques are used for solving various security issues of the WSN. Also, in this paper, we focus on the analysis of different ML methods used for detection of security related attacks on the routing process in WSN.

ACS Style

Deep Kumar Bangotra; Yashwant Singh; Arvind Selwal. Intelligent Opportunistic Routing Protocol in Wireless Sensor Networks: A Security Perspective. Lecture Notes in Electrical Engineering 2021, 221 -233.

AMA Style

Deep Kumar Bangotra, Yashwant Singh, Arvind Selwal. Intelligent Opportunistic Routing Protocol in Wireless Sensor Networks: A Security Perspective. Lecture Notes in Electrical Engineering. 2021; ():221-233.

Chicago/Turabian Style

Deep Kumar Bangotra; Yashwant Singh; Arvind Selwal. 2021. "Intelligent Opportunistic Routing Protocol in Wireless Sensor Networks: A Security Perspective." Lecture Notes in Electrical Engineering , no. : 221-233.

Journal article
Published: 13 July 2020 in Sensors
Reads 0
Downloads 0

The lifetime of a node in wireless sensor networks (WSN) is directly responsible for the longevity of the wireless network. The routing of packets is the most energy-consuming activity for a sensor node. Thus, finding an energy-efficient routing strategy for transmission of packets becomes of utmost importance. The opportunistic routing (OR) protocol is one of the new routing protocol that promises reliability and energy efficiency during transmission of packets in wireless sensor networks (WSN). In this paper, we propose an intelligent opportunistic routing protocol (IOP) using a machine learning technique, to select a relay node from the list of potential forwarder nodes to achieve energy efficiency and reliability in the network. The proposed approach might have applications including e-healthcare services. As the proposed method might achieve reliability in the network because it can connect several healthcare network devices in a better way and good healthcare services might be offered. In addition to this, the proposed method saves energy, therefore, it helps the remote patient to connect with healthcare services for a longer duration with the integration of IoT services.

ACS Style

Deep Kumar Bangotra; Yashwant Singh; Arvind Selwal; Nagesh Kumar; Pradeep Kumar Singh; Wei-Chiang Hong. An Intelligent Opportunistic Routing Algorithm for Wireless Sensor Networks and Its Application Towards e-Healthcare. Sensors 2020, 20, 3887 .

AMA Style

Deep Kumar Bangotra, Yashwant Singh, Arvind Selwal, Nagesh Kumar, Pradeep Kumar Singh, Wei-Chiang Hong. An Intelligent Opportunistic Routing Algorithm for Wireless Sensor Networks and Its Application Towards e-Healthcare. Sensors. 2020; 20 (14):3887.

Chicago/Turabian Style

Deep Kumar Bangotra; Yashwant Singh; Arvind Selwal; Nagesh Kumar; Pradeep Kumar Singh; Wei-Chiang Hong. 2020. "An Intelligent Opportunistic Routing Algorithm for Wireless Sensor Networks and Its Application Towards e-Healthcare." Sensors 20, no. 14: 3887.

Journal article
Published: 01 January 2020 in International Journal of Multimedia Data Engineering and Management
Reads 0
Downloads 0

Opportunistic routing (OR) is an emerging and promising data communication protocol in wireless sensor networks (WSNs). The OR becomes more important when the routing of data is Big Data (BD) generated from multidimensional distributed sensors nodes. The central idea behind OR is overhearing and coordination between relay nodes in the forwarders list and management of multidimensional BD. It uses the salient broadcast feature of the wireless medium for achieving advanced reliability and maximizing the communication range. This article presents the basic concepts of WSN, reviews different OR protocols, and describes the use of different machine learning (ML) techniques in routing BD. Current issues and challenges associated with WSN in general and OR in particular are also presented in this article.

ACS Style

Deep Kumar Bangotra; Yashwant Singh; Arvind Kumar Selwal. An Intelligent Opportunistic Routing Protocol for Big Data in WSNs. International Journal of Multimedia Data Engineering and Management 2020, 11, 15 -29.

AMA Style

Deep Kumar Bangotra, Yashwant Singh, Arvind Kumar Selwal. An Intelligent Opportunistic Routing Protocol for Big Data in WSNs. International Journal of Multimedia Data Engineering and Management. 2020; 11 (1):15-29.

Chicago/Turabian Style

Deep Kumar Bangotra; Yashwant Singh; Arvind Kumar Selwal. 2020. "An Intelligent Opportunistic Routing Protocol for Big Data in WSNs." International Journal of Multimedia Data Engineering and Management 11, no. 1: 15-29.