This page has only limited features, please log in for full access.
University Educator/Researcher
01 March 2018 - 31 August 2021
Research or Laboratory Scientist
01 June 2016 - 01 February 2018
Manager
01 March 2012 - 01 March 2016
Madhusudan Singh is an Assistant Professor/Director of ReBlockchain Group at ECIS, Woosong University, South Korea. He is actively involved in entrepreneurial endeavors in Blockchain Technologies with Artificial Intelligence, Information Security, and Autonomous vehicles. And in his career, he has worked as a senior engineer in the R&D division at Samsung Display, Korea, and Research Professor in YICT, Yonsei University, Korea. He serves as a series editor of the Blockchain Technologies in Springer Nature, IEEE Computer Society and ACM Distinguished speaker, a senior member of IEEE societies.
This work focuses on the synthesis and deposition process for the fabrication of uniform amorphous thin (\(\sim \) 70 nm) unannealed films of potassium sodium niobate (KNN). The composition of deposited and dried (at \({90}^{\circ }{\text{C}}\)) films were confirmed using energy dispersive X-ray spectroscopy and X-ray photoelectron spectroscopy (XPS). For unity K:Na ratios, piezo response force microscopy revealed large electromechanical response potentially due to tip-induced poling in pulsed DC measurements. Low thermal footprint of the process is likely to significantly lower the cost of devices requiring high performance piezoelectric materials and to maintain the final stoichiometry of the film.
Rajinder Singh Deol; Soumen Saha; Nitika Batra; Bhaskar Mitra; Madhusudan Singh. Study of low temperature solution-processed amorphous KNN thin films using PFM. MRS Communications 2021, 1 -5.
AMA StyleRajinder Singh Deol, Soumen Saha, Nitika Batra, Bhaskar Mitra, Madhusudan Singh. Study of low temperature solution-processed amorphous KNN thin films using PFM. MRS Communications. 2021; ():1-5.
Chicago/Turabian StyleRajinder Singh Deol; Soumen Saha; Nitika Batra; Bhaskar Mitra; Madhusudan Singh. 2021. "Study of low temperature solution-processed amorphous KNN thin films using PFM." MRS Communications , no. : 1-5.
Medical IoT devices that use miniature sensors to collect patient’s bio-signals and connected medical applications are playing a crucial role in providing pervasive and personalized healthcare. This technological improvement has also created opportunities for the better management of personal health information. The Personal Health Information Management System (PHIMS) supports activities such as acquisition, storage, organization, integration, and privacy-sensitive retrieval of consumer’s health information. For usability and wide acceptance, the PHIMS should follow the design principles that guarantee privacy-aware health information sharing, individual information control, integration of information obtained from multiple medical IoT devices, health information security, and flexibility. Recently, blockchain technology has emerged as a lucrative option for the management of personal health information. In this paper, we propose eHealthChain—a blockchain-based PHIMS for managing health data originating from medical IoT devices and connected applications. The eHealthChain architecture consists of four layers, which are a blockchain layer for hosting a blockchain database, an IoT device layer for obtaining personal health data, an application layer for facilitating health data sharing, and an adapter layer, which interfaces the blockchain layer with an application layer. Compared to existing systems, eHealthChain provides complete control to the user in terms of personal health data acquisition, sharing, and self-management. We also present a detailed implementation of a Proof of Concept (PoC) prototype of eHealthChain system built using Hyperledger Fabric platform.
Pravin Pawar; Neeraj Parolia; Sameer Shinde; Thierry Oscar Edoh; Madhusudan Singh. eHealthChain—a blockchain-based personal health information management system. Annals of Telecommunications 2021, 1 -13.
AMA StylePravin Pawar, Neeraj Parolia, Sameer Shinde, Thierry Oscar Edoh, Madhusudan Singh. eHealthChain—a blockchain-based personal health information management system. Annals of Telecommunications. 2021; ():1-13.
Chicago/Turabian StylePravin Pawar; Neeraj Parolia; Sameer Shinde; Thierry Oscar Edoh; Madhusudan Singh. 2021. "eHealthChain—a blockchain-based personal health information management system." Annals of Telecommunications , no. : 1-13.
The Internet of vehicles (IoV) is a rapidly emerging technological evolution of Intelligent Transportation System (ITS). This paper proposes SafeDrive, a dynamic driver profile (DDP) using a hybrid recommendation system. DDP is a set of functional modules, to analyses individual driver’s behaviors, using prior violation and accident records, to identify driving risk patterns. In this paper, we have considered three synthetic data-sets for 1500 drivers based on their profile information, risk parameters information, and risk likelihood. In addition, we have also considered the driver’s historical violation/accident data-set records based on four risk-score levels such as high-risk, medium-risk, low-risk, and no-risk to predict current and future driver risk scores. Several error calculation methods have been applied in this study to analyze our proposed hybrid recommendation systems’ performance to classify the driver’s data with higher accuracy based on various criteria. The evaluated results help to improve the driving behavior and broadcast early warning alarm to the other vehicles in IoV environment for the overall road safety. Moreover, the propoed model helps to provide a safe and predicted environment for vehicles, pedestrians, and road objects, with the help of regular monitoring of vehicle motion, driver behavior, and road conditions. It also enables accurate prediction of accidents beforehand, and also minimizes the complexity of on-road vehicles and latency due to fog/cloud computing servers.
Rayan Nouh; Madhusudan Singh; Dhananjay Singh. SafeDrive: Hybrid Recommendation System Architecture for Early Safety Predication Using Internet of Vehicles. Sensors 2021, 21, 3893 .
AMA StyleRayan Nouh, Madhusudan Singh, Dhananjay Singh. SafeDrive: Hybrid Recommendation System Architecture for Early Safety Predication Using Internet of Vehicles. Sensors. 2021; 21 (11):3893.
Chicago/Turabian StyleRayan Nouh; Madhusudan Singh; Dhananjay Singh. 2021. "SafeDrive: Hybrid Recommendation System Architecture for Early Safety Predication Using Internet of Vehicles." Sensors 21, no. 11: 3893.
When we are reading about data analysis research, we often hear the terms machine learning. In this article has mentioned that machine learning is shaped by unsupervised learning, supervised learning and reinforcement learning. The vehicle data generated have known parameters. Based on this fact the machine learning model that should be used would be supervised learning because we have the vehicle data as well as corresponding labels for them. This article has provided the overview of about vehicle data collection and analysis on real-time. It has mentioned the machine learning approach in vehicle data analysis.
Madhusudan Singh. Vehicle Mobile Data Analysis for Driving Safety and Security. Econometrics for Financial Applications 2021, 141 -153.
AMA StyleMadhusudan Singh. Vehicle Mobile Data Analysis for Driving Safety and Security. Econometrics for Financial Applications. 2021; ():141-153.
Chicago/Turabian StyleMadhusudan Singh. 2021. "Vehicle Mobile Data Analysis for Driving Safety and Security." Econometrics for Financial Applications , no. : 141-153.
In this chapter, we present the International SAE (Society of Automotive Engineer) six level development of vehicle automation and their information security challenges. In addition, we have introduced the history of automotive technology revolution and discussed about vehicles development stages. We have discussed threats of advanced automotive technologies such as self-driving car and its components. Finally, we discuss several automotive technologies with the association of information technologies.
Madhusudan Singh. An Overview of Automotive Vehicles and Information Security. Econometrics for Financial Applications 2021, 1 -13.
AMA StyleMadhusudan Singh. An Overview of Automotive Vehicles and Information Security. Econometrics for Financial Applications. 2021; ():1-13.
Chicago/Turabian StyleMadhusudan Singh. 2021. "An Overview of Automotive Vehicles and Information Security." Econometrics for Financial Applications , no. : 1-13.
This presentation has discussed Cyber security and safety for autonomous vehicles with the understanding of real time vehicular data. It has also given an understanding the analysis process and interpreting the vehicular data and finally conclude the course with the explanation of automotive cybersecurity research findings in economy and safety areas. This presentation has presented the vehicular data analytics and research findings on security, economy and safety. It provides cybersecurity and safety for intelligent autonomous vehicles, collection and understanding of available real-time vehicular data, understanding of analysis process and show process of data interpretation and finally it’s discussed research findings to be drawing and conclude the impact of vehicular data in economy and safety.
Madhusudan Singh. Vehicular Data Analytics and Research Findings on Security, Economy and Safety. Econometrics for Financial Applications 2021, 155 -167.
AMA StyleMadhusudan Singh. Vehicular Data Analytics and Research Findings on Security, Economy and Safety. Econometrics for Financial Applications. 2021; ():155-167.
Chicago/Turabian StyleMadhusudan Singh. 2021. "Vehicular Data Analytics and Research Findings on Security, Economy and Safety." Econometrics for Financial Applications , no. : 155-167.
As we know security is always important challenges in technology. In cyberworld is full of lack of security. We need to protect our cyber worlds in real time. This article has described basics of security, security impact and provide and an overview on security areas and their vulnerable places in our cyber world such as Computer security, Network Security, and Cyber security. These security features must not be limited to protecting confidential information, but also needs to address safety critical systems such as brake, accelerator or steering etc.
Madhusudan Singh. Security Analysis of Information Technology. Econometrics for Financial Applications 2021, 15 -27.
AMA StyleMadhusudan Singh. Security Analysis of Information Technology. Econometrics for Financial Applications. 2021; ():15-27.
Chicago/Turabian StyleMadhusudan Singh. 2021. "Security Analysis of Information Technology." Econometrics for Financial Applications , no. : 15-27.
As we probably are aware these days, automotive technology is a developing exploration territory for scientists and researchers all over the world. The developers are taking a shot at to make astute and self-driving vehicles in, and transportation system in automotive innovation. The more vehicles become shrewd the more we have to think and work on wellbeing and security for automotive and vehicle innovation. This presentation intends to encourage conversation on automotive cybersecurity-related issues and their potential solutions.
Madhusudan Singh. An Assessment of Automotive Cyber Security. Econometrics for Financial Applications 2021, 51 -59.
AMA StyleMadhusudan Singh. An Assessment of Automotive Cyber Security. Econometrics for Financial Applications. 2021; ():51-59.
Chicago/Turabian StyleMadhusudan Singh. 2021. "An Assessment of Automotive Cyber Security." Econometrics for Financial Applications , no. : 51-59.
Intelligent transport system cyber security deals and focusses on the problems related to cyber-security of transport system. As the transport system starts to get intelligent, more the vulnerable for cyber-attacks. Here we have basically dealt with cyber security for both intelligent vehicles and the infrastructure of intelligent transportation system. The overview of automotive requirement specification, Elicitation and validation with verification is highlighted in this review report. And more elaboration towards security requirement definition and method to improve the security requirement in advanced automotive technology.
Madhusudan Singh. Security Analysis of Intelligent Transport System. Econometrics for Financial Applications 2021, 61 -83.
AMA StyleMadhusudan Singh. Security Analysis of Intelligent Transport System. Econometrics for Financial Applications. 2021; ():61-83.
Chicago/Turabian StyleMadhusudan Singh. 2021. "Security Analysis of Intelligent Transport System." Econometrics for Financial Applications , no. : 61-83.
In this article we have described basics of security, Security impact and provide and, overview on security areas and their vulnerable places such as Computer security, Network Security, and Cyber security. These security features must not be limited to protecting confidential information, but also needs to address safety critical systems such as brake, accelerator or steering etc. In this presentation, we have talk about the essentials of the vehicle-to-vehicle communication features and their difficulties and talk about the review on potential solutions. We have additionally referenced overall cyber security ventures summary.
Madhusudan Singh. Vehicle to Vehicle Communication Protection. Econometrics for Financial Applications 2021, 125 -139.
AMA StyleMadhusudan Singh. Vehicle to Vehicle Communication Protection. Econometrics for Financial Applications. 2021; ():125-139.
Chicago/Turabian StyleMadhusudan Singh. 2021. "Vehicle to Vehicle Communication Protection." Econometrics for Financial Applications , no. : 125-139.
Energy and cost efficiency is a notable drawback in Blockchain Technology as well as in traditional consensus schemes and Blockchain does not have any standard consensus protocol for resource constraint applications such as vehicular communication environment. In this paper, we propose a novel Adaptive Proof of Driving (APoD) consensus algorithm for Blockchain based Vehicular Communication Networks (VCN), especially for resource constraint environments. Our developed algorithm provides secure, trusted and reliable communication environment for vehicles based on reputation. The main contribution of our paper is to improve the power consumption, miner congestion, and cost efficiency of blockchain system for vehicular networks. We evaluate, our proposed approach with the help of congestion less intersection use case for adaptive and secure distributed consensus.
Madhusudan Singh; Iftekhar Salam. Adaptive Proof of Driving Consensus for Intelligent Vehicle Communication. Econometrics for Financial Applications 2021, 229 -237.
AMA StyleMadhusudan Singh, Iftekhar Salam. Adaptive Proof of Driving Consensus for Intelligent Vehicle Communication. Econometrics for Financial Applications. 2021; ():229-237.
Chicago/Turabian StyleMadhusudan Singh; Iftekhar Salam. 2021. "Adaptive Proof of Driving Consensus for Intelligent Vehicle Communication." Econometrics for Financial Applications , no. : 229-237.
We’re in the twenty-first century, and we’re no longer encircled by mechanical vehicles, but instead, there’s COW (Computer on Wheels). Various security devices, gadgets and protocols for vehicles, for example, programmed emergency braking, forward-crash alarms, vehicle-to-vehicle communication, and potentially, in the coming years, completely automated vehicles, can be actualized because of the cutting-edge technologies as of now existing. Remembering that above mentioned advancements have extraordinary potential in them, vehicle producers and transportation specialists are improving the protection of technologies. This chapter will help to get a concise outline of the Importance of cybersecurity in automotive technology.
Madhusudan Singh. Cybersecurity in Automotive Technology. Econometrics for Financial Applications 2021, 29 -50.
AMA StyleMadhusudan Singh. Cybersecurity in Automotive Technology. Econometrics for Financial Applications. 2021; ():29-50.
Chicago/Turabian StyleMadhusudan Singh. 2021. "Cybersecurity in Automotive Technology." Econometrics for Financial Applications , no. : 29-50.
Recently, the utilization of electronic control units (ECUs) from the wellbeing of vehicles to infotainment has been incredibly expanded. Thus, vehicles are progressively advancing as smart vehicles or associated vehicles in the basic mechanical system and self-driving vehicles are relied upon to develop sooner rather than later. This presentation will introduce the in-vehicle review and their security challenges and furthermore conceivable solutions.
Madhusudan Singh. In-Vehicle Cyber Security. Econometrics for Financial Applications 2021, 117 -124.
AMA StyleMadhusudan Singh. In-Vehicle Cyber Security. Econometrics for Financial Applications. 2021; ():117-124.
Chicago/Turabian StyleMadhusudan Singh. 2021. "In-Vehicle Cyber Security." Econometrics for Financial Applications , no. : 117-124.
The quantity of car crashes far and wide are evaluated by the World Health Organization at around 1.3 million every year. All-inclusive, auto crashes are the main source of death among youthful grown-ups ages 15–29. Connected vehicles are conceptualized so that they share traffic data continuously upgrading security. In addition to safety, connected vehicles offer a range of advanced services to vehicle owners whether individuals that own one vehicle or companies that own fleets of vehicles, government transport authorities, vehicle manufacturers, and other service providers such as gas stations, service stations, parking lots, etc. These services increase the efficiency of the entire transportation system. The benefits are numerous, let us examine how we can achieve them. Internet connected vehicles play a vital role to improve efficiency and safety of road transportation systems.
Madhusudan Singh. Secure Vehicular Cloud for Vehicle Communication. Econometrics for Financial Applications 2021, 169 -187.
AMA StyleMadhusudan Singh. Secure Vehicular Cloud for Vehicle Communication. Econometrics for Financial Applications. 2021; ():169-187.
Chicago/Turabian StyleMadhusudan Singh. 2021. "Secure Vehicular Cloud for Vehicle Communication." Econometrics for Financial Applications , no. : 169-187.
This chapter has presented the vehicle communication feature, for example, vehicle to vehicle (V2V) communication, vehicle to cloud, vehicle to system design. It presents the vehicular communication protocol explicitly committed short-range and remote access vehicular conditions and their cybersecurity challenges. Here some of the international standard cybersecurity standards for vehicular communication, for example, IEEE 1609, European Telecommunications Standards Institute (ETSI) security prerequisites within the vehicle to infrastructure environment have been discussed.
Madhusudan Singh. Cybersecurity in Vehicular Communication. Econometrics for Financial Applications 2021, 101 -116.
AMA StyleMadhusudan Singh. Cybersecurity in Vehicular Communication. Econometrics for Financial Applications. 2021; ():101-116.
Chicago/Turabian StyleMadhusudan Singh. 2021. "Cybersecurity in Vehicular Communication." Econometrics for Financial Applications , no. : 101-116.
Modern vehicles now can be connected over vehicular network that gives the opportunity for building an intelligent transportation system. These networks provide many attractive features to provide comfort and safety. However, this also raises a new set of security concerns. These security features must not be limited to protecting confidential information, but also needs to address safety critical systems such as brake, accelerator or steering etc. this article has presented the cryptography mechanism overview for automotive cybersecurity.
Iftekhar Salam; Madhusudan Singh. Cryptographic Techniques for Automotive Technology. Econometrics for Financial Applications 2021, 85 -99.
AMA StyleIftekhar Salam, Madhusudan Singh. Cryptographic Techniques for Automotive Technology. Econometrics for Financial Applications. 2021; ():85-99.
Chicago/Turabian StyleIftekhar Salam; Madhusudan Singh. 2021. "Cryptographic Techniques for Automotive Technology." Econometrics for Financial Applications , no. : 85-99.
Ubiquitous availability of Internet connectivity IoT enabled medical devices and advances in electronic health records have given rise to massive amounts of personal health data. However, being sensitive in nature, there are stringent legal requirements related to the sharing and processing of personal health data. There is a growing trend of using Personal Information Management System (PIMS) to gather, store, manage, and provide secure and privacy-aware access to personal data. Recently, blockchain technology has emerged as a lucrative option for personal health information management. In this chapter, we propose a layered architecture for a blockchain-based PIMS for managing data originating from medical IoT devices. The proposed architecture has four layers as follows: (1) A blockchain layer that provides functionality to implement and host blockchain database; (2) An IoT device layer that consists of electronic data devices such as health watch, weighing scale, and blood pressure measurement sensors; (3) An application layer that collects data from the health devices and displays consolidated data view to the user; and (4) An adapter layer that has a responsibility of interfacing an application layer with the blockchain layer. The proposed architecture is extensible to accommodate additional electronic devices and services and it is also language and platform agnostic. We are currently building a Proof of Concept (PoC) prototype for validating proposed architecture using Hyperledger Fabric platform.
Pravin Pawar; Thierry Oscar Edoh; Madhusudan Singh; Neeraj Parolia. Hitching Medical IoT Devices to Blockchain for Personal Health Information Management. Blockchain Technology for IoT Applications 2021, 191 -205.
AMA StylePravin Pawar, Thierry Oscar Edoh, Madhusudan Singh, Neeraj Parolia. Hitching Medical IoT Devices to Blockchain for Personal Health Information Management. Blockchain Technology for IoT Applications. 2021; ():191-205.
Chicago/Turabian StylePravin Pawar; Thierry Oscar Edoh; Madhusudan Singh; Neeraj Parolia. 2021. "Hitching Medical IoT Devices to Blockchain for Personal Health Information Management." Blockchain Technology for IoT Applications , no. : 191-205.
Real-time facial recognition systems are being widely implemented all around the world because of being efficient, reliable and very accurate systems. The Facial recognition softwares are everywhere we look and the best examples are payment methods, where we can securely make our payments without the need to enter our passwords or we can just make our groceries and the payments have done through payment methods by our identity has recognized through camera at a shop. Nowadays, Universities all around the world are also starting to use these very useful systems for taking their attendances or to authenticate their school stuff or students. This system challenge is securing the face data in database. In this chapter, we have discussed the facial recognition system (FaceHub). The requirements modelling and the real-time facial recognition system (FaceHub) that we created in order to make use of it in our University attendance system and introducing blockchain technology for facial data management, which manage the facial data in the permissioned distributed server to securely store the facial data of student. Also, we discussed the benefits of blockchain in FaceHub Data. To further, improve the security of the software by implementing the blockchain into our software.
Akobir Ismatov; Vanessa Garza Enriquez; Madhusudan Singh. FaceHub: Facial Recognition Data Management in Blockchain. Blockchain Technology for IoT Applications 2021, 135 -153.
AMA StyleAkobir Ismatov, Vanessa Garza Enriquez, Madhusudan Singh. FaceHub: Facial Recognition Data Management in Blockchain. Blockchain Technology for IoT Applications. 2021; ():135-153.
Chicago/Turabian StyleAkobir Ismatov; Vanessa Garza Enriquez; Madhusudan Singh. 2021. "FaceHub: Facial Recognition Data Management in Blockchain." Blockchain Technology for IoT Applications , no. : 135-153.
An intelligent system is a technology that has opened diverse ranges of possibilities due to its availability, value, and accessibility. Such an intelligence resides in the possibility to measure and know the current state of entities or environments. Thus, the measurement process constitutes a key asset for many aspects related to the intelligence of systems (e.g., decision-making) and the relationship with the data gathering strategies. A strategy for formalizing monitoring projects based on entity states and scenarios is introduced. It integrates the visualization pipeline to align the visual communication to measurement requirements. From the methodological point of view, an extension of a measurement and evaluation framework which supports the modeling of entity states and scenarios is considered. The framework allows agreeing on concepts required to formalize a measurement project. Thus, a specialization of the Goal-oriented Context-aware Measurement and Evaluation strategy is introduced using the business process model to describe how scenarios and entity states are articulated jointly with their transition models. Also, the visualization pipeline is integrated into the new strategy to articulate the information need that gives origin to the measurement project jointly with the visual communication strategy. A synthesized case as a proof-of-concept is introduced. In this way, a monitoring strategy aware of scenarios, entity states, and the visualization pipeline into a measurement project is reached. Thus, traceability about each visual perspective is aligned with measurement points of view.
Mario José Diván; Madhusudan Singh. The Impact of the Measurement Process in Intelligent System of Data Gathering Strategies. Transactions on Petri Nets and Other Models of Concurrency XV 2021, 445 -457.
AMA StyleMario José Diván, Madhusudan Singh. The Impact of the Measurement Process in Intelligent System of Data Gathering Strategies. Transactions on Petri Nets and Other Models of Concurrency XV. 2021; ():445-457.
Chicago/Turabian StyleMario José Diván; Madhusudan Singh. 2021. "The Impact of the Measurement Process in Intelligent System of Data Gathering Strategies." Transactions on Petri Nets and Other Models of Concurrency XV , no. : 445-457.
The nursing care staff shortage is a worldwide phenomenon. The reasons for this are multiple. The older people population is the faster growing population in the western countries and their demand for accommodate nursing is also increasing day-in day-out. Though, at the same time the nursing profession is becoming less attractive for many reasons e.g. high burden on the caregivers, poor salary, poor quality of life, etc. All these ingredients lead to a severe nursing crisis worldwide. This study aims at seeking alternative technology-supported solutions since all solutions in place, particularly in Germany, fail to stem the crisis. The study evidence supports our theory that implementing smart home technology in the home care will increase family involvement in older people care at and thus decrease the burden on the inpatient-care-system. Consequently, this will mitigate the nursing shortage crisis.
Thierry Edoh; Madhusudan Singh. Sustainably Stemming the Nursing Care Crisis in Germany. Transactions on Petri Nets and Other Models of Concurrency XV 2021, 188 -198.
AMA StyleThierry Edoh, Madhusudan Singh. Sustainably Stemming the Nursing Care Crisis in Germany. Transactions on Petri Nets and Other Models of Concurrency XV. 2021; ():188-198.
Chicago/Turabian StyleThierry Edoh; Madhusudan Singh. 2021. "Sustainably Stemming the Nursing Care Crisis in Germany." Transactions on Petri Nets and Other Models of Concurrency XV , no. : 188-198.