H-Index & Metrics Top Publications

H-Index & Metrics

Discipline name H-index Citations Publications World Ranking National Ranking
Computer Science H-index 85 Citations 20,765 518 World Ranking 332 National Ranking 1

Overview

What is he best known for?

The fields of study he is best known for:

  • Computer network
  • The Internet
  • Artificial intelligence

Computer network, Computer security, Authentication, The Internet and Distributed computing are his primary areas of study. His Computer network research is multidisciplinary, incorporating elements of Energy consumption and Smart grid. His research in Smart grid tackles topics such as Smart city which are related to areas like Smart system.

As part of one scientific family, Neeraj Kumar deals mainly with the area of Computer security, narrowing it down to issues related to the Wireless, and often Mobile device and Password cracking. His study in Authentication is interdisciplinary in nature, drawing from both Elliptic curve cryptography, Password, Internet security and Smart card. His Distributed computing research incorporates elements of Learning automata, Network congestion, Edge device, Edge computing and Big data.

His most cited work include:

  • Review: A systematic review on clustering and routing techniques based upon LEACH protocol for wireless sensor networks (306 citations)
  • Anonymous Authentication for Wireless Body Area Networks With Provable Security (235 citations)
  • A systematic review on routing protocols for Vehicular Ad Hoc Networks (195 citations)

What are the main themes of his work throughout his whole career to date?

His primary scientific interests are in Computer network, Computer security, Distributed computing, The Internet and Authentication. His Computer network study combines topics from a wide range of disciplines, such as Dissemination and Wireless ad hoc network, Vehicular ad hoc network. His studies deal with areas such as Learning automata, Scalability, Quality of service, Smart grid and Efficient energy use as well as Distributed computing.

The Smart grid study combines topics in areas such as Demand response and Energy management. The various areas that Neeraj Kumar examines in his Authentication study include Password, Internet security and Elliptic curve cryptography. He has researched Wireless sensor network in several fields, including Key distribution in wireless sensor networks and Base station.

He most often published in these fields:

  • Computer network (38.88%)
  • Computer security (23.26%)
  • Distributed computing (19.02%)

What were the highlights of his more recent work (between 2019-2021)?

  • Computer security (23.26%)
  • Blockchain (12.05%)
  • Computer network (38.88%)

In recent papers he was focusing on the following fields of study:

His main research concerns Computer security, Blockchain, Computer network, Artificial intelligence and The Internet. His Computer security study frequently involves adjacent topics like Protocol. Neeraj Kumar interconnects Scalability, Smart grid, Internet privacy and Traceability in the investigation of issues within Blockchain.

His study looks at the relationship between Smart grid and topics such as Distributed computing, which overlap with Scheduling. His Computer network study often links to related topics such as Wireless. His work in Authentication addresses subjects such as Security analysis, which are connected to disciplines such as Internet security.

Between 2019 and 2021, his most popular works were:

  • Blockchain for 5G-enabled IoT for industrial automation: A systematic review, solutions, and challenges (125 citations)
  • Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment (91 citations)
  • Cloud Centric Authentication for Wearable Healthcare Monitoring System (70 citations)

In his most recent research, the most cited papers focused on:

  • Computer network
  • The Internet
  • Artificial intelligence

Neeraj Kumar mainly focuses on Computer security, Blockchain, Authentication, The Internet and Smart grid. In the subject of general Computer security, his work in Key is often linked to Software deployment, thereby combining diverse domains of study. He has included themes like Security analysis and Internet security in his Authentication study.

His The Internet research integrates issues from Deep learning, Artificial intelligence, Data management and Drone. His Smart grid research includes themes of Load management, Risk analysis, Demand response and Renewable energy. His work deals with themes such as Energy consumption, Edge computing and Computer network, which intersect with Data migration.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Top Publications

Review: A systematic review on clustering and routing techniques based upon LEACH protocol for wireless sensor networks

Sudhanshu Tyagi;Neeraj Kumar.
Journal of Network and Computer Applications (2013)

439 Citations

Anonymous Authentication for Wireless Body Area Networks With Provable Security

Debiao He;Sherali Zeadally;Neeraj Kumar;Jong-Hyouk Lee.
IEEE Systems Journal (2017)

341 Citations

A systematic review on routing protocols for Vehicular Ad Hoc Networks

Amit Dua;Neeraj Kumar;Seema Bawa.
Vehicular Communications (2014)

293 Citations

A survey on privacy protection in blockchain system

Qi Feng;Debiao He;Sherali Zeadally;Muhammad Khurram Khan.
Journal of Network and Computer Applications (2019)

244 Citations

Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks

Debiao He;Neeraj Kumar;Jianhua Chen;Cheng-Chi Lee.
Multimedia Systems (2015)

242 Citations

A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks

Debiao He;Neeraj Kumar;Naveen Chilamkurti.
Information Sciences (2015)

225 Citations

Decision Tree and SVM-Based Data Analytics for Theft Detection in Smart Grid

Anish Jindal;Amit Dua;Kuljeet Kaur;Mukesh Singh.
IEEE Transactions on Industrial Informatics (2016)

223 Citations

Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications

Sravani Challa;Mohammad Wazid;Ashok Kumar Das;Neeraj Kumar.
IEEE Access (2017)

207 Citations

Fog computing for Healthcare 4.0 environment: Opportunities and challenges

Aparna Kumari;Sudeep Tanwar;Sudhanshu Tyagi;Neeraj Kumar.
Computers & Electrical Engineering (2018)

205 Citations

Clustering in vehicular ad hoc networks

Rasmeet S Bali;Neeraj Kumar;Joel J.P.C. Rodrigues.
Vehicular Communications (2014)

184 Citations

Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking h-index is inferred from publications deemed to belong to the considered discipline.

If you think any of the details on this page are incorrect, let us know.

Contact us

Top Scientists Citing Neeraj Kumar

Ashok Kumar Das

Ashok Kumar Das

International Institute of Information Technology, Hyderabad

Publications: 70

Saru Kumari

Saru Kumari

Chaudhary Charan Singh University

Publications: 66

Joel J. P. C. Rodrigues

Joel J. P. C. Rodrigues

Federal University of Piauí

Publications: 51

Debiao He

Debiao He

Wuhan University

Publications: 50

Kim-Kwang Raymond Choo

Kim-Kwang Raymond Choo

The University of Texas at San Antonio

Publications: 37

Muhammad Khurram Khan

Muhammad Khurram Khan

King Saud University

Publications: 36

Mohammad S. Obaidat

Mohammad S. Obaidat

University of Jordan

Publications: 35

Nadeem Javaid

Nadeem Javaid

COMSATS University Islamabad

Publications: 33

Sudeep Tanwar

Sudeep Tanwar

Nirma University

Publications: 31

Cheng-Chi Lee

Cheng-Chi Lee

Fu Jen Catholic University

Publications: 23

Kim-Kwang Raymond Choo

Kim-Kwang Raymond Choo

The University of Texas at San Antonio

Publications: 22

Georges Kaddoum

Georges Kaddoum

École de Technologie Supérieure

Publications: 21

Arun Kumar Sangaiah

Arun Kumar Sangaiah

Vellore Institute of Technology University

Publications: 21

Sherali Zeadally

Sherali Zeadally

University of Kentucky

Publications: 20

Yan Zhang

Yan Zhang

Chinese Academy of Sciences

Publications: 20

Something went wrong. Please try again later.