Dr. Tarunpreet Bhatia
Assistant Professor


Assistant Professor


Wireless Networks, Sensor Networks, Network Routing and Security




Tarunpreet joined Computer Science and Engineering Department of Thapar Institute of Engineering & Technology, Patiala, India, in 2013 and presently working as an Assistant Professor. She received her Ph.D and M.E. degree in Computer Science & Engineering from Thapar Institute of Engineering & Technology and B.E. (with Honors) in Computer Science and Engineering from Kurukshetra University. She received the Gold Medal in Master of Engineering. Her research interests include Network and Information Security, Mobile Computing, Cloud Computing, Internet of Things and Soft Computing. She has more than 30 research publications in reputed journals and conferences. She is member of various program committees for different International/National Conferences and reviewer of various International/National journals. She has taught various subjects at UG and PG level such as Data Structures and Algorithms, Advanced Data Structures, Algorithm Analysis and Design, Operating Systems, Computer System Architecture, Object Oriented Programming, Web Technologies, LAMP technologies, Secure Coding etc. She has also handled various administrative (UG coordinator, member of SUGC and DAAC, Curriculum Coordinator etc.) responsibilities along with teaching. She is Vice President, Computer Society of India (CSI), Thapar Institute of Engineering & Technology.

  Membership of Professional Institutions, Associations, Societies

  • Association for Computing Machinery (ACM)
  • Computer society of India (CSI)

Publications and other Research Outputs

International Journals (SCI/SCIE)

  • Bhatia, T., and Verma, A. K. (2017). Data security in mobile cloud computing paradigm: a survey, taxonomy and open research issues. The Journal of Supercomputing, vol. 73, no. 6, pp 2558–2631
  • Bhatia, T., Kansal, S., Goel, S., and Verma, A.K. (2016). "A genetic algorithm based distance-aware routing protocol for wireless sensor networks." Computers & Electrical Engineering, vol. 56, pp. 441-455


International Journals (Non SCI)


  • Gautam, S., Moudgil, S., and Bhatia, T. (2016). “Fuzzy Logic Based Intrusion Detection Scheme against DoS Attack in MANET”, International Journal of Research in IT, Management and Engineering, vol. 6, pp. 21-27.
  • Sharma, M., Kansal, M., Bhatia, T. (2015). “Simulation Analysis of MANET Routing Protocols under Different Mobility Models”, International Journal of Wireless Communications and Network Technologies, 4(1), pp. 1-8.
  • Bhatia, T., and Verma, A.K. (2015). “QoS Comparison of MANET Routing Protocols”, International Journal of Computer Network and Information Security, 9, pp. 64-73.
  • Kaur, S., Moudgil, S., Bhatia, T. (2015). “Energy Efficient Load Balanced Multipath Routing in MANET”, International Journal Of Engineering And Computer Science, 4(6), pp. 12557-12562.
  • Bhatia, T., and Verma, A.K. (2013). “Performance Evaluation of AODV under Blackhole Attack”, International Journal of Computer Network and Information Security, 5 (2), pp 35-44.
  • Bhatia, T., and Verma, A.K. (2013). “Security Issues in Manet: A Survey on Attacks and Defense Mechanisms”, International Journal of Advanced Research in Computer Science and Software Engineering, 3 (6), pp. 1382-1394.
  • Bhatia, T., and Verma, A.K. (2013). “Simulation and Comparative Analysis of Single Path and Multipath Routing Protocol for MANET”, Anveshanam - The Journal of Computer Science & Applications, 2 (1), pp. 30-35.
  • Bhatia, T., and Garg, D. (2011). “Efficient Search Techniques in Peer to Peer Networks”, International Journal of Computer Applications, 36 (1), pp 31-38.


Book Chapters


  • Bhatia, T., and Verma, A.K. (2014). “Biometric Authentication for Cloud Computing”, Handbook of Research on Securing Cloud-Based Databases with Biometric Applications, IGI Global, pp. 209-235.

International Conferences

  1. Sachdeva, S., Bhatia, T., Verma, A.K. (2017) “Flood Susceptibility Mapping using GIS-based Support Vector Machine and Particle Swarm Optimization: A case study in Uttarakhand (India)”, In Proceedimgs of Eight International Conference On Computing, Communication And Networking Technologies (ICCCNT), IIT Delhi, India.

  2. Kuchta V., Sharma G., Sahu R.A., Bhatia T., Markowitch O. (2017) “Secure Certificateless Proxy Re-encryption Without Pairing”. In: Obana S., Chida K. (eds) Advances in Information and Computer Security. IWSEC 2017. Lecture Notes in Computer Science, vol 10418. Springer, Cham.

  3. Jain, B., Bhatia, T., and Verma, A.K. (2017) "Security of Big Data in Cloud: A Review", In Proceedings of International Conference on Communication, Computing and Networking (ICCCN), IEEE, Chandigarh, India, pp. 154-150.

  4. Jain, B., Bhatia, T., and Verma, A.K. (2017) "ABE based Secure Distributed Storage Scheme for Big Data in Cloud", In Proceedings of International Conference on Smart Technologies in Computer and Communication (SmartTech 2017), Jaipur, India.

  5. Dagar, V., Prakash, V., and Bhatia, T.(2016) "Analysis of pattern matching algorithms in network intrusion detection systems", 2nd International Conference on Advances in Computing, Communication, & Automation (ICACCA), Bareilly, India, pp. 1-5.

  6. Aneja, M.J.S., and Bhatia, T. (2016) "Artificial Intelligence based IDS in VANETs : A Review“, In Proceedings of 2nd IEEE International Conference on Engineering & Technology (ICETECH), Coimbatore, India,  pp. 639-644.

  7. Rani, R., and Bhatia, T. (2016). "A Survey on Machine Learning And Data Mining Techniques For Real-Time Intrusion Detection System“, In Proceedings of 2nd IEEE International Conference on Engineering & Technology (ICETECH), Coimbatore, India, pp. 561-566.

  8. Kaur, G., and Bhatia, T. (2016). "Trust Based Security in Opportunistic Networks: A Survey”, In Proceedings of 2nd IEEE International Conference of Engineering & Technology (ICETECH), Coimbatore, India, pp. 634-638.

  9. Kansal, S., Bhatia, T., Goel, S. (2015) “Performance analysis of LEACH and its variants”, Electronics and Communication Systems (ICECS), 2015 2nd International Conference on, IEEE, pp. 630-634.

  10. Goyal, S., Bhatia, T., Verma, A.K. (2015). “Wormhole and Sybil Attack in WSN: A Review”, INDIACOM 2015:09th INDIACOM, 2nd IEEE International Conference on Computing for Sustainable Global Development, pp. 1463-1468.

  11. Miglani, A., Bhatia, T., Goel, S. (2015)“Trust based energy efficient routing in LEACH for wireless sensor network, In Proceedings of 2015 Global Conference on Communication Technologies (GCCT 2015), IEEE, pp. 361-365.

Awards and Honours

  • GATE and UGC-NET qualified for lectureship and JRF
  • University Medal, Thapar Institute of Engineering & Technology, Patiala in 2013
  • Honoured with cash prize and Academic Roll of Honour by Guru Harkrishan Educational Society in its Annual ‘Sanman Samaroh’ maintained for Toppers on 27th April, 2014.
  • Received GATE scholarship from MHRD, Government of India for 2 years
  • Certification of Merit from CBSE in Mathematics

 Description of Research Interests

Tarunpreet Bhatia's research interests include network and data security in mobile cloud computing and she has published research work in reputed journals of Springer, Elsevier, IGI Global and prominent conferences in the field of network security