Short CV: Rahul Johari is teaching at University School of Information and Communication Technology, Guru Gobind Singh Indraprastha University (GGSIP), Dwarka, Delhi, India. He is the Head of the Software Development Cell and Head and Founder of the Security, Wireless, IoT Network Group of Engineering and Research Lab (SWINGER) and the ACM@USICT Student Chapter.
Prior to joining GGSIP University in September 2007, he worked in the Centre for Development of Advanced Computing(C-DAC), Noida, from September 2001 to August 2007. He did his MTech from GGSIP University, Delhi and PhD from Department of Computer Science, University of Delhi under guidance of Neelima Gupta.
Rahul is a Microsoft/Google Certified Professional and ODEM certified Blockchain Faculty. He was named Best Teacher/Researcher at GGSIP for the academic year 2013-2014 and 2014-2015. He holds four international patents. Five of his research papers have been adjudged as "Best Research paper" at international conferences. With 83 SCOPUS indexed publications, 25 book chapters and over 100 publications in leading IEEE, Springer, Elsevier and ACM indexed international conferences and journal, his current Google Scholar H-index is 13. He has delivered more than 95 keynote and invited talks on topics including Cloud Computing, Wireless Network, Blockchain Technology, IoT, Cryptography and Network Security. He is a member of ACM, IEEE, IAENG, Data Security Council of India and Cloud Computing Innovation Council of India.
Note: All talks will cover both theoretical aspects and hands-on lab sessions so as to guide students to pursue projects/dissertations on the chosen topic as part of their BTech/MTech and MCA course curricula.
Title of Talk 1: Unblocking the Blocks in Blockchain Technology: Concept and Simulation, Using MHRD-IIT BlockChain Virtual Lab
Synopsis: The talk will focus on the concepts, principles and application of Blockchain technology, starting with the basics of hashing (using MD 5/SHA algorithm) and scaling up to cover the topics of proof of work and proof of stake, etc. Students will be exposed to real-time application of the Blockchain technology and the talk will conclude with simulation of 5 experiments covering various aspects of Blockchain technology like cryptocurrency and smart contracts with the help of online demonstration using MHRD-IIT BlockChain Virtual Lab.
Title of Talk 2: STEM: Secure Transmission of Encrypted Message in IoT
Synopsis: As is well known, IoT encompasses many research domains/tracks like: sensing, routing, security, data aggregation and analysis, and power management issues. The talk will cover two tracks: routing and security as it focuses on how to carry out the safe and secure transmission of ciphertext in IoT . The talk will conclude with 30-35 minutes of hands-on Java- based lab simulation showcasing how to securely route the messages in IoT using MQTT (Message Queue Telemetry Transport) protocol.
Title of Talk 3: MiCEF (Mist, IOT, Cloud, Edge and Fog) Computing: With Hands-on Simulation Using CloudSim Simulator
Synopsis: In the next decade, the IT industry is looking at the amalgamation of IoT and cloud computing. The talk will focus on how these technologies can be seamlessly integrated. For the benefit of the students, not only theoretically concepts related to mist/fog/edge computing will be discussed but also the secure applications dedicated to camera surveillance and applications related to medical/health sector will be showcased using the free and open source (FOSS) Java-based iFogSim simulator.
Title of Talk 4: BLAST: BLockchain Algorithm for Secure Transaction: With Hands-on Simulation Using Java Programming Language on ECLIPSE IDE
Synopsis: In the world of information security, Blockchain technology has immense potential to safeguard customer data from professional hackers in real-time scenarios on the web. Literature survey of Blockchain reveals that the MD 5 (Message Digest 5) and SHA (Secure Hash Algorithm) are the two most popular and widelyused hashing algorithms. In this talk, extensive Java-based simulation in ECLIPSE IDE will be shown to students, wherein they are exposed to how to create a Blockchain for securing the information regarding the credit card details of the customer. Concepts of Java Cryptography Architecture (JCA) utilizing the API dedicated to the MD5 or SHA algorithm will also be discussed and its simulation will be demonstrated.
Title of Talk 5: Routing in SHIP Network with Hands-on Simulation Using Java-based ONE Simulator
Synopsis: SHIP, or sparse, hybrid, intermittent and partitioned network, is a new age wireless network which addresses the pertinent issues of delay tolerant network (DTN)/opportunistic network and MANET (mobile adhoc network). The proposed talk will focus on how to carry out optimized routing using routing protocol(s) such as Epidemic, PROPHET, Spray n Wait, etc., on the free and open source (FOSS) Java-based ONE (opportunistic network environment) simulator using the real-time contact traces and datasets downloaded from the CRAWDAD dataset portal.
Qualifications: M.Tech, Guru Gobind Singh Indraprastha University and PhD, University of Delhi
Title: Assistant Professor
Affiliation: School of Information and Communication Technology, Guru Gobind Singh Indraprastha University, Dwarka, Delhi
Contact Details: email@example.com; firstname.lastname@example.org