Neetesh Saxena

Dr Neetesh Saxena

  • Lecturer (Academic) in Cyber Security
  • Poole House P420, Talbot Campus, Fern Barrow, Poole, BH12 5BB
Back to top


I am a Lecturer in Cyber Security within the Department of Computing and Informatics. Before joining BU, I was a Post-Doctoral Researcher in the School of Electrical and Computer Engineering at the Georgia Institute of Technology, USA. Prior to this, I was with the Department of Computer Science, The State University of New York (SUNY) Korea, South Korea as a Post-Doctoral Researcher and a Visiting Scholar at the Department of Computer Science, Stony Brook University, USA. I earned my PhD in Computer Science and Engineering from Indian Institute of Technology, Indore, India. In 2013-14, I was a Visiting Research Student and a DAAD Scholar at Bonn-Aachen International Center for Information Technology (B-IT), Rheinische-Friedrich-Wilhelms Universität, Bonn, Germany. I was also a TCS Research Scholar during Jan. 2012 - Apr. 2014. I work in the area of security and privacy. My current research interests include cyber security, cyber-physical system security in the smart grid and vehicle-to-grid, security and privacy in the cellular networks, securing end-to-end systems, and secure mobile applications...



I am actively looking for good students or faculty members who are interested in doing a PhD (full time, 3-year) on security related topic from Bournemouth University, UK.

There are two schemes under which he/she can be admitted:

1) Match-funded PhD:

He/She can find a company that can pay 8000 pounds per year for three consecutive years. Bournemouth University will subsidise the remaining cost of the research. The subsidy from BU is worth up to £20,000, comprised of a fee waiver and the other half of the stipend.

It's a competitive call and the deadline is 30 Dec. 2016 to approach me.

2) Vice-Chancellor PhD scholarships: (at present call is closed, will open soon):

These scholarships only provide a fee waiver, they do not include a stipend to cover living expenses. As part of the application process, you will need to provide evidence that you can support yourself financially for the duration of your doctorate. He/she must be a sponsored candidate. The university will not provide any scholarship, but his/her fees will be waived. So, he/she must have some fund to support him/herself. Therefore, It is necessary that person has some money to cover living expenses.

Please contact me ASAP with updated CV, if you/your friend/colleague are interested in doing so. The PhD studentship will start from Sept...


Journal Articles

  • Chaudhary, R., Jindal, A., Aujla, G.S., Kumar, N., Das, A.K. and Saxena, N., 2018. LSCSH: Lattice-Based Secure Cryptosystem for Smart Healthcare in Smart Cities Environment. IEEE Communications Magazine, 56 (4), 24-32.
  • Saxena, N., Shen, H., Komninos, N., Choo, K.K.R. and Chaudhari, N.S., 2018. BVPSMS: A Batch Verification Protocol for End-to-End Secure SMS for Mobile Users. IEEE Transactions on Dependable and Secure Computing.
  • Saxena, N. and Grijalva, S., 2017. Dynamic Secrets and Secret Keys Based Scheme for Securing Last Mile Smart Grid Wireless Communication. IEEE Transactions on Industrial Informatics, 13 (3), 1482-1491.
  • Saxena, N., Grijalva, S., Chukwuka, V. and Vasilakos, A.V., 2017. Network Security and Privacy Challenges in Smart Vehicle-to-Grid. IEEE Wireless Communications, 24 (4), 88-98.
  • Saxena, N. and Grijavla S, 2017. Efficient Signature Scheme for Delivering Authentic Control Commands in the Smart Grid. IEEE Transactions on Smart Grid.
  • Saxena, N., Grijalva, S. and Chaudhari, N.S., 2016. Authentication protocol for an iot-enabled LTE network. ACM Transactions on Internet Technology, 16 (4).
  • Saxena, N. and Choi, B.J., 2016. Integrated Distributed Authentication Protocol for Smart Grid Communications. IEEE Systems Journal.
  • Saxena, N. and Choi, B.J., 2016. Authentication Scheme for Flexible Charging and Discharging of Mobile Vehicles in the V2G Networks. IEEE Transactions on Information Forensics and Security, 11 (7), 1438-1452.
  • Saxena, N., Choi, B.J. and Lu, R., 2016. Authentication and Authorization Scheme for Various User Roles and Devices in Smart Grid. IEEE Transactions on Information Forensics and Security, 11 (5), 907-921.
  • Saxena and Choi B J, 2015. State of Art Authentication, Integration, and Access Control in Smart Grid. Energies, 8 (10), 11883-11915.
  • Saxena, N., Thomas, J. and Chaudhari, N.S., 2015. ES-AKA: An Efficient and Secure Authentication and Key Agreement Protocol for UMTS Networks. Wireless Personal Communications, 84 (3), 1981-2012.
  • Saxena, N. and Choi, B.J., 2015. State of the art authentication, access control, and secure integration in smart grid. Energies, 8 (10), 11883-11915.
  • Saxena, N. and Chaudhari, N.S., 2014. SecureSMS: A secure SMS protocol for VAS and other applications. Journal of Systems and Software, 90 (1), 138-150.
  • Saxena, N. and Chaudhari, N.S., 2014. Secure-AKA: An efficient AKA protocol for UMTS networks. Wireless Personal Communications, 78 (2), 1345-1373.
  • Saxena, N. and Chaudhari, N.S., 2014. EasySMS: A protocol for end-to-end secure transmission of SMS. IEEE Transactions on Information Forensics and Security, 9 (7), 1157-1168.


  • Saxena, N., Stone, J.A. and Dogan, H., 2018. Systematic Analysis: Resistance to Traffic Analysis Attacks in Tor System for Critical Infrastructures. In: IEEE SMC 7-10 October 2018 Miyazaki, Japan.
  • Chaudhary, R., Aujla, G.S., Kumar, N., Das, A.K., Saxena, N. and Rodrigues, J.J.P.C., 2018. LaCSys: Lattice-based Cryptosystem for Secure Communication in Smart Grid Environment. In: IEEE ICC 20-24 May 2018 Kansas City, USA.
  • Saxena, N. and Chaudhari, N.S., 2018. Secure algorithms for SAKA protocol in the GSM network. 1-8.
  • Saxena, N., Santiago G and Choi BJ, 2018. Securing Restricted Publisher-Subscriber Communications in Smart Grid Substations. In: COMSNET 3-7 January 2018 Bengaluru.
  • Saxena, N., katos and Kumar N, 2017. Cyber-Physical Smart Grid Security Tool for Education and Training Purposes. In: International Workshop on Realigning Cyber Security Education 27 November 2017 Canberra, Australia.
  • Saxena, N., Chukwuka, V., Xiong, L. and Grijalva, S., 2017. CPSA: A cyber-physical security assessment tool for situational awareness in smart grid. 69-79.
  • Saxena, N., Choi, B.J. and Grijalva, S., 2017. Secure and privacy-preserving concentration of metering data in AMI networks.
  • Saxena, N., Choi, B.J. and Cho, S., 2015. Lightweight privacy-preserving authentication scheme for V2G networks in the smart grid. 604-611.
  • Saxena and Chaudhari N S, 2015. Proposed Terminal Device for End-to-End Secure SMS in Cellular Networks. In: 10th Annual Symposium on Information Assurance (ASIA), Academic track of the 18th Annual NYS Cyber Security Conference 2-3 June 2015 Albany, NY, USA.
  • Saxena and Chaudhari N S, 2013. First Symmetric Batch Verification Protocol for Securely Deliver Value Added Services to Multiple Mobile Users. In: 29th Annual Computer Security Applications Conference (ACSAC) 9-13 December 2013 New Orleans, USA.
  • Saxena and Chaudhari N S, 2013. An Integrated Approach for SMS Based Secure Mobile Banking in India. In: 29th Annual Computer Security Applications Conference (ACSAC) 9-13 December 2013 New Orleans, USA.
  • Saxena, N. and Chaudhari, N.S., 2013. VAS-AKA: An efficient batch verification protocol for value added services. 1560-1565.
  • Saxena, N., Chaudhari, N.S. and Thomas, J., 2013. Solution to an attack on digital signature in SMS security.
  • Thomas, J., Chaudhari, N.S. and Saxena, N., 2013. Genetic based effective column generation for 1-D Cutting Stock problem.
  • Saxena and Chaudhari N S, 2013. NPA: Protocol for Secure Communications in GSM Cellular Network. In: 10th Annual IEEE Consumer Communications & Networking Conference (CCNC) 11-14 January 2013 Las Vagas, Navada USA. IEEE.
  • Saxena, N., Chaudhari, N.S. and Prajapati, G.L., 2012. An extended approach for SMS security using authentication functions. 663-668.
  • Saxena, N. and Chaudhari, N.S., 2012. Secure encryption with digital signature approach for Short Message Service. 803-806.
  • Saxena, N. and Chaudhari, N.S., 2012. A secure approach for SMS in GSM network. 59-64.
  • Saxena, N. and Chaudhari, N.S., 2012. Analysis of El-Gamal with Diffie-Hellman scheme using Hash-function for message security. 55-60.

Profile of Teaching PG

  • Cyber Security and Human Factor


  • ACM, Member (2012-),
  • IEEE, Senior Fellow,
The data on this page was last updated at 04:06 on August 17, 2018.