Papers by Ishan Budhiraja
Mathematical Biosciences and Engineering, Dec 31, 2022
2023 IEEE International Conference on Communications Workshops (ICC Workshops)

IEEE access, 2024
Quantum computers use quantum-mechanical phenomena for knowledge manipulation and depend on quant... more Quantum computers use quantum-mechanical phenomena for knowledge manipulation and depend on quantum bits or qubits. A qubit can be created in several different ways, and out of this, one way of creating a quantum state is by using superconductivity. They must be held very cold to work on these superconductive qubits for long periods. The key to information storage and manipulation is the skill of all computer systems. Current traditional computers handle single bits stored in binary states of 0 and 1 form. Every temperature factor inside the device may be updated; thus, quantum computers are more excellent than the vacuum of space at temperatures similar to absolute null. Consider how the dilution refrigerator of a quantum computer consisting of over 2000 components provides a cold atmosphere for the inside of the qubits. Researchers from all around the world today are using actual quantum processors for validating algorithms for different fields of operation. Yet quantum computation was a strictly speculative topic a couple of decades ago. Quantum cryptography, also known as quantum encoding, uses quantum mechanics principles to encrypt messages in a way nobody else reads. It benefits quantum states, along with its "theory of no transition," which means that it cannot be disrupted unknowingly. Quantum-improved AI calculations are especially applicable to the area. This work focuses on the implementation patterns of quantum computing in real-time cryptography so that the overall communication will be secured and integrity aware. INDEX TERMS Quantum cryptography; Real time cryptography; security; integrity in real world environment I. INTRODUCTION In everyday use, quantum computers use ions or photons as qubits, the critical segment of quantum physics. The crucial part of creative problem solving is generating, controlling, or manipulating qubits for high-performance and multidimensional approaches. Superconductive circuits can be operated at temperatures as low as those seen in outer space, for example, at the low-temperature area for many companies such as IBM, Google, and Rigetti. IonQ researchers use ultra-high vacuum chambers to trap single atoms within electromagnetic fields. However, in each situation, it is meant to be isolated differently. According to current technology, computers, current ones operate on 'pulses' (an electrical or optical stream of ones and zeros) [1]. [2] [3] The fundamentals of Quantum Computing include a more detailed overview of the fundamental principles of quantum computing. This will encompass a discussion on quantum bits (qubits), their unique properties, and the principles of superposition and entanglement that distinguish quantum computing from classical computing.
2023 IEEE International Conference on Communications Workshops (ICC Workshops)
2022 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)
Lecture notes in networks and systems, Jul 3, 2022

IEEE Access
The accomplishment of blockchain has increased the focus on the various applications for simplify... more The accomplishment of blockchain has increased the focus on the various applications for simplifying the confidentiality and transaction sanctuary using the decentralized architecture via consensus mechanisms between different internet of things (IoT) nodes in daily increasing societal areas. The growth of blockchain lasted to grow and used to do compare technologies. The major shortcomings of blockchain is the lack of scalability in modern application settings. Holochain technology vends itself as a ''thinking'' exterior to blocks, and it is a peer-to-peer disseminated ledger technology. It works contrarily compared to the blockchain, and it offers an exclusive value in the existing market. IoT devices are continuously used in distributed environments, in various smart applications. The peer-to-peer IoT networks, connected to smart agricultural systems are exposed to the security issues. Specifically, the personal data of agricultural land records need protection against unauthorized access and eradicate corruption in land transactions. The Blockchain offers a possible solution based on distributed ledger, but it has scalability issues due to high storage and processing requirements with growing network size. Also data is not locally stored in a Blockchain. This paper studies the conventions of holochain technology, its architecture and challenges, and critical mechanisms of holochain applications. We also analyze the numerous models utilized for the implementation of protected transactions. We discuss an agent centric framework with distributed hash table for secured applications. INDEX TERMS Holochain, communication infrastructure, holo, ledger, process models, distributed ledger technology, agent centric technology, blockchain.
IEEE Transactions on Vehicular Technology
IEEE internet of things magazine, Mar 1, 2023
Computer Communications, 2023
Algorithms for intelligent systems, Sep 19, 2022

Device-to-device (D2D) communication is one of the promising technology of the fifth-generation (... more Device-to-device (D2D) communication is one of the promising technology of the fifth-generation (5G) network. In D2D, the devices are in close proximity to each other communicate directly with or without depending upon the base station (BS), resulting in large gain, low latency, and high energy efficiency. Also, it improves the spectral efficiency by sharing the spectrum resources with cellular mobile users (CMUs). Despite these advantages, co-channel interference and eavesdropping attack on the D2D links are two major challenges. To overcome these issues, we used the power domain non orthogonal multiple access (PDNOMA) techniques with the D2D mobile groups (DMGs) under the social-domain scenario. The successive interference cancellation technique of PD-NOMA in the DMGs mitigate the intra-user and co-channel interference among the D2D receivers (DDRs), resulting in an increase in signal to interference noise ratio (SINR) and better quality of services. Furthermore, to improve the spectral efficiency, and reduce the security risk of the eavesdropper on the DMGs over each resource block (RB) in the presence of dynamic channel environment of imperfect channel state information, we used the coalition game approach. The simulated results show the proposed scheme achieves 5.5% and 27.77% higher sum rate and ensure 8.3% and 41.6% higher information secrecy as compared to first-order algorithm (FOA) and orthogonal frequency division multiple access (OFDMA) schemes.

IEEE Systems Journal, Jun 1, 2021
In this article, a joint user pairing and secure resource allocation scheme for cognitive radio i... more In this article, a joint user pairing and secure resource allocation scheme for cognitive radio inspired nonorthogonal multiple access (CR-NOMA) femtocells in the presence of a jammer base station (JBS) is proposed. In the considered CR-NOMA-based femtocells, femto base stations (FBSs) serve their femto mobile station (FMS) by sharing the resource block (RB) with macromobile stations (MMSs), while the JBS in each femtocell secures the data rate of a weak user from the eavesdropping capability of the strong FMS. The strong FMS intercepts the data rate of the weak FMS using a successive interference cancellation technique to decode their own data as per the NOMA principle. The weak FMS protects its data from the strong eavesdroppers through the JBS. The JBS generates artificial noise to confuse the strong eavesdroppers. The problem of the joint user pairing and resource allocation is formulated as an optimization problem, whose main goal is to maximize the secure sum rate of the FMS while guaranteeing the secure data rate of the weak FMS and MMS. For RB allocation, CR at the FBS senses the best RB for its FMS using the Greedy approach. To optimize the power of the FBS and JBS, a successive convex approximation scheme with a low complexity is applied. Simulation results show that our proposed scheme provides an improvement in the secure sum rate of the FMS in comparison to the conventional NOMA and preexisting orthogonal multiple access schemes.

Energy management of mobile devices is a crucial issue in fifth generation (5G) network due to th... more Energy management of mobile devices is a crucial issue in fifth generation (5G) network due to their limited battery capacity. Simultaneous Wireless Information and Power Transfer (SWIPT) is an emerging technique which allows mobile devices to harvest energy from radio frequency (RF) signals. Moreover, Non-Orthogonal Multiple Access (NOMA) serves multiple users simultaneously using the same subchannel inter-user interference mitigation. By considering the aforementioned issues, in this paper, we propose a subchannel assignment scheme for SWIPT-NOMA based pico base station/femto base station with macro-cellular networks. The energy-efficient subchannel assignment is a probabilistic mixed non-convex optimization problem by considering imperfect channel state information (CSI). To address this problem, many-to-many matching theory is used in the proposal. Numerical results show that the proposed algorithm performs better in terms of numbers of PUs/FUs, average energy efficiency (EE) of the Picocells/Femtocells, in comparison to the orthogonal frequency division access scheme and conventional NOMA.
Neural Computing and Applications, Sep 20, 2022
Computer Communications, Nov 1, 2022
Uploads
Papers by Ishan Budhiraja