National Institute Of Technology,Kurukshetra

DEPARTMENT OF COMPUTER_ENGG

Faculty

Name : Dr. Priyanka Ahlawat
Designation : Assistant Professor
Qualification : PhD (NIT Kurukshetra)
Current Address :

CT-103, NIT campus, NIT kurushetra (Haryana).


Phone 1 (office) : 01744-233496 (Office)
Phone 2 (office) : 9034996998 (mobile No.)
Email : priyankaahlawat@nitkkr.ac.in

Area Of Intrest :

Information Security, Computer Networks, Internet of Things, Wireless Sensor Networks, Cyber Security, IoT Security, Adhoc Network Security, WSN Security, Key Management and Distribution

Other Areas of Interest: Cyber defense and vulnerability, Cloud Security,  Mobile Computing, Digital Forsenics

 

All interested Ph.D. aspirants want to do research in the above said areas may contact me at priyankaahlawat@nitkkr.ac.in

 

 

Experience :

Teaching: 15yrs (approx.)

Other :

INTERNATIONAL JOUNRNALS (10)

  1. Ahlawat, P., & Dave, M. (2020). Secure Path Key Establishment Schemes Based on Random Key Management for WSN. Proceedings of the National Academy of Sciences, India Section A: Physical Sciences, 1-13.1.

  2. Priyanka ahlawat, (2019). Key Distribution and Management in WSN Security: A State of the Art, IJITEE, Vol. 9, issue 2s, Dec. 2019. (Scopus )

  3. Ahlawat, P., & Dave, M. (2018). A cost effective attack matrix based key management scheme with dominance key set for wireless sensor network security. International Journal of Communication Systems, e3713.

  4. Ahlawat, P., & Dave, M. (2018). Deployment Based Attack Resistant Key Distribution with Non Overlapping Key Pools in WSN. Wireless Personal Communications, 99(4), 1541-1568.

  5. Ahlawat, P., & Dave, M. (2018). An attack resistant key predistribution scheme for wireless sensor networks. Journal of King Saud University-Computer and Information Sciences.

  6. Ahlawat, P., & Dave, M. (2018). An attack model based highly secure key management scheme for wireless sensor networks. Procedia Computer Science, 125, 201-207.

  7. Ahlawat, P., & Dave, M. (2017). A hybrid approach for path vulnerability matrix on random key predistribution for wireless sensor networks. Wireless Personal Communications, 94(4), 3327-3353.

  8. Nagpal, P. B., & Mann, P. A. (2011). Comparative study of density based clustering algorithms. International Journal of Computer Applications, 27(11), 421-435.

  9. Nagpal, P. B., & Mann, P. A. (2011). Survey of Density Based Clustering Algorithms. International journal of Computer Science and its Applications, 1(1), 313-317.

  10. Kumar Gupta, A., & Ahlawat Mann, P. (2011). Railway Train Ticket Generation through ATM Machine: A Business Application for Indian Railways. International Journal of Computer Applications, 22(7), 46-50

 

INTERNATIONAL CONFERENCES (23):

Best paper award: Ahlawat, P. (2019). Key Distribution and management in WSN security: A state of Art. 3rd International Conference on Data Engineering and Communication Systems,RNS INSTITUTE OF TECHNOLOGY, BANGALURU, Dec. 19-20, 2019.

 

  1. Aggarwal, Shubham & Ahlawat, P.(2020), A Survey on the Authentication Techniques in Internet of Things. 2020 IEEE International Students' Conference on Electrical,Electronics and Computer Science (SCEECS).MANIT Bhopal, February 2020.

  2. Aggarwal, Shubham & Ahlawat, P.(2020), Mutual Authentication of IoT devices using Kronecker product on Secure vault. PCCDS-2020 (International Conference on Paradigms of Computing, Communication and Data Sciences)(accepted).

  3. Nehal, A., & Ahlawat, P. (2020). Wireless routing for IoT networks. In 2019 6th International conference on Recent Trends and Advancements in engineering and Technology, 17-18 January, 2020.

  4. Nehal, A., & Ahlawat, P. (2019, June). Securing IoT applications with OP-TEE from hardware level OS. In 2019 3rd International conference on Electronics, Communication and Aerospace Technology (ICECA) (pp. 1441-1444). IEEE.

  5. Attkan, Ankit & Ahlawat, P.(2019) Lightweight Two-factor Authentication protocol and session key generation scheme for WSN in IoT deployment. In 2019 Springer International Conference on Cybernetics, Cognition and Machine Learning Applications (ICCCMLA), 16-17 August 2019, Goa, India.

  6. Attkan, Ankit & Ahlawat, P.(2019) Authentication Schemes for IoT security: A Survey”. In 2019 IEEE 5th Student’s Conference on Engineering and Systems (SCES-2019), 29-31 May 2019, India.

  7. Kamal, R., & Ahlawat, P. (2019, July). A Comparative Analysis of Matrix Based Key Management Schemes For Wireless Sensor Network. In 2019 International Conference on Communication and Electronics Systems (ICCES) (pp. 892-896). IEEE.

  8. Bilaiya, R., & Ahlawat, P. (2019, August). Hybrid Evolutionary Approach for IDS by Using Genetic and Poisson Distribution. In International Conference on Inventive Computation Technologies (pp. 766-773). Springer, Cham.Kamal,

  9. R., & Ahlawat, P. (2019, September). Improved matrix based Key Management Scheme for Wireless Sensor Network security. In 2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT) (Vol. 1, pp. 1-5). IEEE.

  10. Saini, K., & Ahlawat, P. (2019). A Trust-Based Secure Hybrid Framework for Routing in WSN. In Recent Findings in Intelligent Computing Techniques (pp. 585-591). Springer, Singapore.

  11. Ahlawat, P. (2019) An efficient key management solution to node capture attack for WSN, 1st International Conference on Machine Learning, Image Processing, Network Security and Data Sciences. 3 - 4 March, 2019

  12. Ahlawat, P., & Dave, M. (2016, December). An improved hybrid key management scheme for wireless sensor networks. In Parallel, Distributed and Grid Computing (PDGC), 2016 Fourth International Conference on (pp. 253-258). IEEE.

  13. Ahlawat, P., & Dave, M. (2017, July). A resilient and seamless rekeying scheme based on random key distribution for WSN. In Computer, Communications and Electronics (Comptelix), 2017 International Conference on (pp. 321-327). IEEE.

  14. Ahlawat, P. (2017, August). Attacks resistant trust mechanisms for WSN: A comparative analysis. In 2017 2nd International Conference on Telecommunication and Networks (TEL-NET) (pp. 1-5). IEEE.

  15. Gupta, A., & Ahlawat, P. (2014, May). Improved blom key management scheme for wireless sensor network. In Recent Advances and Innovations in Engineering (ICRAIE), 2014 (pp. 1-5). IEEE.

  16. Ahlawat, P. (2014, September). Comparative study of matrix based key management schemese. In Computer and Communication Technology (ICCCT), 2014 International Conference on (pp. 153-156). IEEE.

  17. Gupta, A., & Ahlawat, P. (2014, May). Improved blom key management scheme for wireless sensor network. In Recent Advances and Innovations in Engineering (ICRAIE), 2014 (pp. 1-5). IEEE.

  18. Gupta, A., & Ahlawat, P. (2014, March). Revisiting the Blom key management scheme. In Electrical, Electronics and Computer Science (SCEECS), 2014 IEEE Students' Conference on (pp. 1-4). IEEE.

  19. Setia, A., & Ahlawat, P. (2013). Enhanced LZW Algorithm with Less Compression Ratio. In Proceedings of International Conference on Advances in Computing (pp. 347-351). Springer, New Delhi.

  20. Singh, S., & Ahlawat, P. (2012, September). Candidate-resolved online voting protocol using distributed ElGamal Cryptosystem. In Proceedings of the CUBE International Information Technology Conference (pp. 759-763). ACM.

  21. Ahlawat, P. (2013). Towards increasing the reseliency of key management scheme supporting node mobility in hetrogenous sensor networks.

  22. Chillar, R. S., Ahlawat, P., & Kumari, U. (2012). Measuring complexity of component based system using weighted assignment technique. In International Conference on Information Communication and Management (Vol. 55, pp. 19-27).

  23. Singh, P., & Duhan, M. (2006, September). Enhancing LZW Algorithm to Increase Overall Performance. In India Conference, 2006 Annual IEEE (pp. 1-4). IEEE.

 

Book Chapters:

 

  1. Agrawal, S., & Ahlawat, P. (2020). Key Management Schemes in Internet of Things: A Matrix Approach. In Handbook of Wireless Sensor Networks: Issues and Challenges in Current Scenario's (pp. 381-400). Springer, Cham.

  2. N., & Ahlawat, P. (2020). 5G for IoT: Between Reality and Friction. In Fundamental and Supportive Technologies for 5G Mobile Networks (pp. 1-23). IGI Global.

  3. P., & Dave, M. (2019). Key Management in WSN Security: An Attacker's Perspective. In Handbook of Research on the IoT, Cloud Computing, and Wireless Network Optimization (pp. 303-325). IGI Global.

 

Book Published:

  1. Security and Privacy Issues in Sensor Networks and IoT, IGI global , 2020

 

Conference / workshops / Symposia attended : 15

No. of short term course/ workshop organized/worked as resource person: 03

(last three years)

  1. 5th International Conference on Cyber Security & Privacy in Communication Networks (ICCS) , November 29-30, 2019

  2. Short Term Course on Security Issues for Sensor, IoT and Opportunistic Networks (SISION) under ISEA Project Phase II during September 10-15, 2018, NIT, Kurukshetra

  3. TEQIP-III Sponsored One Week Short Term Course On Pattern Recognition and Cyber Security Applications (PRCSA) ,Sept 5-9, 2019, NIT Kurukshetra

 

Professional Membership:

  • IEEE

  • ACM

  • Life Member ISTE

  • Life Member Computer Society of India

    PhD (02 ongoing)

    B.tech Projects ( Completed 30 Nos.) 04 (ongoing)

    M. Tech. Students (On-going: 4 Nos.)

    M. Tech. Students (Completed: 15 Nos.)

    Administrative and Academic Responsibilities:

  1. Internship Coordinator

  2. M. Tech Coordinator (Computer Engineering)

  3. DPC member

  4. Warden

  5. Member (Library Committee)

  6. DAC member

  7. BOS member

  8. Prof -in -charge (Time table and Examination)

  9. Mentor faculty

  10. Turtin Software Handler

  11. Member M.Tech admission committee

  12. Member anti ragging Squad

  13. Member of different committees of annual convocation, Confluence and annual athletic meet

  14. Departmental accreditation and visiting committee

  15. Member UG and PG curriculum revision committee

  16. Member (B.Tech SAR Coommittee)