Yazar "Bashir, Ali Kashif" seçeneğine göre listele
Listeleniyor 1 - 6 / 6
Sayfa Başına Sonuç
Sıralama seçenekleri
Öğe An anonymous device to device access control based on secure certificate for internet of medical things systems(ELSEVIER, RADARWEG 29, 1043 NX AMSTERDAM, NETHERLANDS, 2021) Chaudhry, Shehzad Ashraf; Irshad, Azeem; Nebhen, Jamel; Bashir, Ali Kashif; Moustafa, Nour; Al-Otaibi, Yasser D.; Bin Zikria, YousafThe Internet of Medical Things (IoMT) is structured upon both the sensing and communication infrastructure and computation facilities. The IoMT provides the convenient and cheapest ways for healthcare by aiding the remote access to the patients’ physiological data and using machine learning techniques for help in diagnosis. The communication delays in IoMT can be very harmful to healthcare. Device to device (D2D) secure communication is a vital area that can reduce communication delays; otherwise, caused due to the mediation of a third party. To substantiate a secure D2D communication framework, some schemes were recently proposed to secure D2D based communication infrastructure suitable for IoMT-based environments. However, the insecurities of some schemes against device physical capture attack and non-provision of anonymity along with related attacks are evident from the literature. This calls for a D2D secure access control system for realizing sustainable smart healthcare. In this article, using elliptic curve cryptography, a certificate based D2D access control scheme for IoMT systems (D2DAC-IoMT) is proposed. The security of the proposed D2DAC-IoMT is substantiated through formal and informal methods. Moreover, the performance analysis affirms that the proposed scheme provides a good trade-off between security and efficiency compared with some recent schemes.Öğe Efficient equalisers for OFDM and DFrFT-OCDM multicarrier systems in mobile E-health video broadcasting with machine learning perspectives(ELSEVIER, RADARWEG 29, 1043 NX AMSTERDAM, NETHERLANDS, 2020) Attar, Hani H.; Solyman, Ahmad Amin Ahmad; Mohamed, Abd-Elnaser Fawzy; Khosravi, Mohammad R.; Menon, Varun G.; Bashir, Ali Kashif; Tavallali, PooyaRecently, the orthogonal frequency-division multiplexing (OFDM) system has become an appropriate technique to be applied on the physical layer in various requests, mainly in wireless communication standards, which is the reason to use OFDM within mobile wireless medical applications. The OFDM with cyclic prefix (CP) can compensate lacks for the time-invariant multi-path channel effects using a single tap equaliser. However, for mobile wireless communication, such as the use of OFDM in ambulances, the Doppler shift is expected, which produces a doubly dispersive communication channel where a complex equaliser is needed. This paper proposes a low-complexity band LDLH factorisation equaliser to be applied in mobile medical communication systems. Moreover, the discrete fractional Fourier transform (DFrFT) is used to improve the communication system’s performance over the OFDM. The proposed low-complexity equaliser could improve the OFDM, and the DFrFT-orthogonal chirpdivision multiplexing (DFrFT-OCDM) system’s performance, as illustrated in the simulation results. This proves that the recommended system outperforms the standard benchmark system, which is an essential factor as it is to be applied within mobile medical systems.Öğe Fuzzy-in-the-Loop-Driven Low-Cost and Secure Biometric User Access to Server(IEEE-Inst Electrical Electronics Engineers Inc, 2021) Irshad, Azeem; Usman, Muhammad; Chaudhry, Shehzad Ashraf; Bashir, Ali Kashif; Jolfaei, Alireza; Srivastava, GautamFuzzy systems can aid in diminishing uncertainty and noise from biometric security applications by providing an intelligent layer to the existing physical systems to make them reliable. In the absence of such fuzzy systems, a little random perturbation in captured human biometrics could disrupt the whole security system, which may even decline the authentication requests of legitimate entities during the protocol execution. In the literature, few fuzzy logic-based biometric authentication schemes have been presented; however, they lack significant security features including perfect forward secrecy (PFS), untraceability, and resistance to known attacks. This article, therefore, proposes a novel two-factor biometric authentication protocol enabling efficient and secure combination of physically unclonable functions, a physical object analogous to human fingerprint, with user biometrics by employing fuzzy extractor-based procedures in the loop. This combination enables the participants in the protocol to achieve PFS. The security of the proposed scheme is tested using the well-known real-or-random model. The performance analysis signifies the fact that the proposed scheme not only offers PFS, untraceability, and anonymity to the participants, but is also resilient to known attacks using light-weight symmetric operations, which makes it an imperative advancement in the category of intelligent and reliable security solutions.Öğe GCACS-IoD: A certificate based generic access control scheme for Internet of drones(ELSEVIER, RADARWEG 29, 1043 NX AMSTERDAM, NETHERLANDS, 2021) Chaudhry, Shehzad Ashraf; Yahya, Khalid O. Moh.; Karuppiah, Marimuthu; Kharel, Rupak; Bashir, Ali Kashif; Bin Zikria, YousafInternet of drones (IoD) has gained significant importance in recent times due to its applications in several critical domains ranging from commercial to defense and rescue operations. With several drones flying in different zones to carry out specified tasks, the IoD can be beneficial to gather the real time data for interpretation by the users. However, the data access is carried out through an open channel and battery operated drones. Therefore, the drones’ security and privacy are crucial for accomplishing mission-critical, safety-critical, or surveillance operations. In 2020, Bera et al. presented a certificate based access control scheme for securing the IoD access and argued the scheme’s security through formal and informal methods. However, the analysis presented in this paper shows that the scheme of Bera et al. does not provide anonymity and is insecure against multiple threats, including drone impersonation, the man in the middle, and replay attacks. We then designed a generic certificate based access control scheme to provide inter-drone and drone to ground station access control/authentication in the IoD domain (GCACS-IoD). The GCACS-IoD is provably secure against the known attacks and provides anonymity. GCACS-IoD extends security while preserving computation and communication efficiencies.Öğe A Physical Capture Resistant Authentication Scheme for the Internet of Drones(Institute of Electrical and Electronics Engineers Inc., 2021) Chaudhry, Shehzad Ashraf; Nebhen, Jamel; Irshad, Azeem; Bashir, Ali Kashif; Kharel, Rupak; Yu, Keping; Zikria, Yousaf BinThe internet of Drones (IoD) can encompass many essential services, including surveillance and emergency/rescue operations. While IoD is becomin popular and experiencing a rapid usage increase, privacy and security are the main concerns to avoid leakage of critical information and/or denial of services by a single drone or a whole IoD network. In addition to traditional privacy cum security issues, the physical capture of a single drone can severely impact the entire IoD network. This article provides an overview of the security challenges and requirements for IoD environments in addition to a discussion related to IoD communication/security standards. More-over, this article proposes a novel scheme for securing IoD specifically, from physical drone capturing and related attacks. © 2017 IEEE.Öğe A Secure and Lightweight Drones-Access Protocol for Smart City Surveillance(IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 445 HOES LANE, PISCATAWAY, NJ, 2022) Akram, Muhammad Wahid; Bashir, Ali Kashif; Shamshad, Salman; Saleem, Muhammad Asad; AlZubi, Ahmad Ali; Chaudhry, Shehzad Ashraf; Alzahrani, Bander A.; Bin Zikria, YousafThe rising popularity of ICT and the Internet has enabled Unmanned Aerial Vehicle (UAV) to offer advantageous assistance to Vehicular Ad-hoc Network (VANET), realizing a relay node’s role among the disconnected segments in the road. In this scenario, the communication is done between Vehicles to UAVs (V2U), subsequently transforming into a UAV-assisted VANET. UAV-assisted VANET allows users to access real-time data, especially the monitoring data in smart cities using current mobile networks. Nevertheless, due to the open nature of communication infrastructure, the high mobility of vehicles along with the security and privacy constraints are the significant concerns of UAV-assisted VANET. In these scenarios, Deep Learning Algorithms (DLA) could play an effective role in the security, privacy, and routing issues of UAV-assisted VANET. Keeping this in mind, we have devised a DLA-based key-exchange protocol for UAV-assisted VANET. The proposed protocol extends the scalability and uses secure bitwise XOR operations, one-way hash functions, including user’s biometric verification when users and drones are mutually authenticated. The proposed protocol can resist many well-known security attacks and provides formal and informal security under the Random Oracle Model (ROM). The security comparison shows that the proposed protocol outperforms the security performance in terms of running time cost and communication cost and has effective security features compared to other related protocols.