Anup
icon
Sports

Cricket, Badminton, Table Tennis

Qualifications:

M.Tech. (Artificial Intelligence) - University of Hyderabad, Ph.D. (Computer Science) - IDRBT Hyderabad (Established by RBI)

Areas of Expertise

Machine Learning, Artificial Intelligence and Information Security Analytics for the Internet of Things

Anup Kumar Maurya

Profile and History

Dr. Anup Kumar Maurya is currently an Associate Professor in the Big Data Analytics Department at the Goa Institute of Management. He earned his Ph.D. in Computer Science (Efficient User Authentication and Key Establishment Protocols for Wireless Sensor Networks & Internet of Things) from the Institute for Development & Research in Banking Technology (IDRBT), established by the RBI, and the University of Hyderabad, India. He holds an M.Tech. in Artificial Intelligence from the University of Hyderabad, a Master's Degree in Computer Applications from Uttar Pradesh Technical University, Lucknow, and a Bachelor's Degree in Mathematics from DDU Gorakhpur University, India.
Dr. Maurya has completed a Faculty Development Program (FDP) on Machine Learning with Business Applications from the Indian Institute of Management, Bangalore (IIM-B). His research contributions include several publications, with a notable Best Research Paper Award at the 2017 International Symposium on Security in Computing and Communication, Manipal, India. He has contributed to innovative mobile banking projects at the Centre for Mobile Banking at IDRBT, Hyderabad.
In addition to his research, Dr. Maurya serves as a reviewer for reputed international journals, including the International Journal of Distributed Sensor Networks, IEEE Sensors Journal, IEEE Access, and the International Journal of Communication Systems. He was also selected as a visiting researcher at the State University of New York at Buffalo, where he worked on biometric-based efficient user authentication protocols at the Centre for Unified Biometrics and Sensors.

Courses taught: Machine Learning, Big Data Analytics, Cloud Computing & Cyber Security, Data Mining, Deep Learning, Data Analytics for Decision Making, Advanced Machine Learning, Generative AI, and Large Language Models for Business Applications.

Experience
10 Year Research and Teaching Experience
 

Research

Journal Publications:

  • Maurya, A.K., Das, A.K., Jamal, S.S., & Giri, D. (2021). Secure User Authentication Mechanism for IoT-enabled Wireless Sensor Networks Based on Multiple Bloom Filters. Journal of Systems Architecture, 120, 102296. DOI: 10.1016/j.sysarc.2021.102296.
  • Maurya, A.K., & Sastry, V.N. (2017). Fuzzy Extractor and Elliptic Curve Based Efficient User Authentication Protocol for Wireless Sensor Networks and Internet of Things. Information (MDPI Journal), 8(4), 136, 1-38. DOI: 10.3390/info8040136.
  • Surapaneni, P., Bojjagani, S., & Maurya, A.K. (2024). Handover-Authentication Scheme for Internet of Vehicles (IoV) Using Blockchain and Hybrid Computing. IEEE Access, 12, 140483-140501. DOI: 10.1109/ACCESS.2024.3468473.
  • Surapaneni, P., Bojjagani, S., Bharathi, V.C., Morampudi, M.K., & Maurya, A.K. (2024). A Systematic Review on Blockchain-enabled Internet of Vehicles (BIoV): Challenges, Defences and Future Research Directions. IEEE Access, 12, 123529-123560. DOI: 10.1109/ACCESS.2024.3453433.
  • Bojjagani, S., Seelam, N.R., Sharma, N.K., Uyyala, R., Akuri, S.R.C.M., & Maurya, A.K. (2023). The Use of IoT-based Wearable Devices to Ensure Secure Lightweight Payments in FinTech Applications. Journal of King Saud University - Computer and Information Sciences, 35(9), 101785. DOI: 10.1016/j.jksuci.2022.101785.
  • Sharma, N.K., Bojjagani, S., Reddy, Y.C.A.P., Vivekanandan, M., Srinivasan, J., & Maurya, A.K. (2023). A Novel Energy Efficient Multi-Dimensional Virtual Machines Allocation and Migration at the Cloud Data Center. IEEE Access, 11, 107480-107495. DOI: 10.1109/ACCESS.2023.3320729.
  • Shashidhara, R., Bojjagani, S., Maurya, A.K., Kumari, S., & Xiong, H. (2020). A Robust User Authentication Protocol with Privacy-Preserving for Roaming Service in Mobility Environments. Peer-to-Peer Networking and Applications, 13(6), 1943-1966. DOI: 10.1007/s12083-020-00929-y.
     

Conference Publications:

  • Maurya, A.K., & Sastry, V.N. (2017). Secure and Efficient Authenticated Key Exchange Mechanism for Wireless Sensor Networks and Internet of Things Using Bloom Filter. In Proceedings of the 3rd IEEE International Conference on Collaboration and Internet Computing (pp. 173-180). October 15-17, San Jose, California, USA.
  • Maurya, A.K., & Sastry, V.N. (2017). User Authentication Scheme for Wireless Sensor Networks and Internet of Things Using LU Decomposition. In Proceedings of the Fifth International Symposium on Security in Computing and Communications (pp. 39-53). September 13-16, Manipal, India.
  • Maurya, A.K., & Sastry, V.N. (2017). User Authentication Scheme for Wireless Sensor Networks and Internet of Things Using Chinese Remainder Theorem. In Proceedings of the Fifth International Symposium on Security in Computing and Communications (pp. 79-94). September 13-16, Manipal, India.(Best Paper Award)
  • Maurya, A.K., & Sastry, V.N. (2017). Symmetric Hash Function Based Secure and Efficient Authenticated Key Exchange Mechanism for Wireless Sensor Networks. In Proceedings of the 11th IEEE International Conference on Advanced Networks and Telecommunications Systems (pp. 1-6). December 17-20, Bhubaneswar, Odisha, India
  • Maurya, A.K., Sastry, V.N., & Udgata, S.K. (2015). Cryptanalysis and Improvement of ECC-Based Security Enhanced User Authentication Protocol for Wireless Sensor Networks. In Proceedings of the Third International Symposium on Security in Computing and Communications (pp. 134-145). August 10-13, Kochi, India.
  • Sandhya, M., Rao, Y.S., Biswajeet, S., Kumar, V.D., & Kumar, M.A. (2020). A Score-Level Fusion Method for Protecting Fingerprint and Palmprint Templates. In Select Proceedings of the Security and Privacy (ICSP) 2020 Conference (Vol. 744, pp. 1).

 

Experience

10 Year Research and Teaching Experience