Papers by Gitanjali Shinde
Applications of UWSN
SpringerBriefs in applied sciences and technology, 2021
SpringerBriefs in applied sciences and technology, 2021
The use of general descriptive names, registered names, trademarks, service marks, etc. in this p... more The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use.

Rethinking Decentralised Identifiers and Verifiable Credentials for the Internet of Things
Studies in systems, decision and control, 2020
In digital era of Internet of Things (IoT), internet-connected devices are becoming smart and aut... more In digital era of Internet of Things (IoT), internet-connected devices are becoming smart and autonomous. In this distributed world IoT device operate not only with the owner of the device but also need to operate with third parties, which leads to have identification for each IoT device. In the coming years, deploying IoT solutions at large scale will have to address complex issues of managing digital identity, security and identity ownership. Most of the current IoT solutions rely upon centralized client-server mechanism for providing connectivity and access to devices and services. However, when billions of devices will begin connecting simultaneously, then existing centralized solution will not suffice. Now days, we rely on federated identities however in this user need to depend on third party as users are not owner of their own identity, this leads to have Self-Sovereign Identities (SSI). In the sequel, there is a need of decentralized method for managing identities in near future. In this chapter, various identification methods are analyzed. Further, Decentralized Identifiers and Verifiable Credentials are discussed, the discussion focus on whether DID and VC are applicable to the IoT as IoT includes resource constrained devices at base level. It also presents smart home use case utilizing DID and VCs in order to evaluate its applicability. In the same line threat analysis is presented to analyze applicability of the DID and VC for the IoT applications.
Predictive Maintenance for Manufacturing
SpringerBriefs in applied sciences and technology, 2023
Introduction to Predictive Analytics
SpringerBriefs in applied sciences and technology, 2023
Predictive Maintenance for Mechanical Design System
SpringerBriefs in applied sciences and technology, 2023
Data Acquisition and Preparation
SpringerBriefs in applied sciences and technology, 2023
Predictive Analytics for Mechanical Engineering: A Beginners Guide
SpringerBriefs in applied sciences and technology, 2023
Intelligent Approaches
SpringerBriefs in applied sciences and technology, 2023
Predictive Maintenance
SpringerBriefs in applied sciences and technology, 2023
Deep and Transfer Learning in Malignant Cell Classification for Colorectal Cancer
Smart innovation, systems and technologies, 2023
The Secure E-Wallet Powered by Blockchain and Distributed Ledger Technology
2022 IEEE Pune Section International Conference (PuneCon)

International Journal on Recent and Innovation Trends in Computing and Communication
The use of smart devices is driving the Internet of Things (IoT) trend today. Day by day IoT hel... more The use of smart devices is driving the Internet of Things (IoT) trend today. Day by day IoT helps to support more services like car services, healthcare services, home automation, and security services, weather prediction services, etc, to ease user’s life. Integration of heterogeneous IoT devices and social resources sometimes creates many problems like the privacy of data. To avoid privacy issues, an appropriate access control mechanism is required to check authorized and trusted devices, so that only valid devices can access the data which is only required. In the sequel, this paper presents implementation of distributed and dynamic trust based access control mechanism (DDTAC) for secure machine to machine communication or distributed IoT environment. Novelty of this mechanism is that, it uses trust calculation and device classification for dynamic access control. The proposed scheme is implemented, tested and deployed on Node MCU and same mechanism is also simulated on NS-2 f...

Mathematical Problems in Engineering
Underwater wireless sensor network (UWSN) has limited bandwidth, long propagation delays, and unr... more Underwater wireless sensor network (UWSN) has limited bandwidth, long propagation delays, and unrechargeable batteries, which forces the development of techniques minimizing the energy consumption of UWSNs. One solution is clustering that outperforms in terms of energy optimization and, in addition, can also provide scalability and data reliability. The development of clustering algorithms depends on UWSN architectures. In our case, we have proposed a hybrid UWSN network architecture named ACOP-UWSN (ACoustic OPtical Underwater Wireless Sensor Network), which aims for reliable data transmission at the fastest speed with higher data rates and minimized propagation delays. In ACOP-UWSN, optical sensors sense data, whereas acoustic sensors only relay data towards the surface buoy. Clustering of all these nodes may result in unnecessary wastage of the node’s energy and memory. Therefore, we undergo clustering of only optical sensors, as comparatively, sensing and processing of data cons...
Intrusion Prevention Framework for WSN using Deep CNN
Turkish Journal of Computer and Mathematics Education (TURCOMAT), May 22, 2021
Data Analysis and Mathematical Modeling for COVID-19 Pandemic
Studies in Big Data, 2021
Data Analytics and Learning Techniques
Studies in Big Data, 2021
Impact of COVID-19 Pandemic on Agriculture Sector
Studies in Big Data, 2021
Influence of COVID-19 on Quality of Work-Life in Real Estate Sector
Studies in Big Data, 2021
Open Authorization 2.0
Authorization and Access Control, 2022
Uploads
Papers by Gitanjali Shinde