Yazar "Ghani, Anwar" seçeneğine göre listele
Listeleniyor 1 - 7 / 7
Sayfa Başına Sonuç
Sıralama seçenekleri
Öğe A low-cost privacy preserving user access in mobile edge computing framework(PERGAMON-ELSEVIER SCIENCE LTD, THE BOULEVARD, LANGFORD LANE, KIDLINGTON, OXFORD OX5 1GB, ENGLAND, 2022) Irshad, Azeem; Chaudhry, Shehzad Ashraf; Ghani, Anwar; Mallah, Ghulam Ali; Bilal, Muhammad; Alzahrani, Bander A.The computational offloading from conventional cloud datacenter towards edge devices sprouted a new world of prospective applications in pervasive and Mobile Edge Computing (MEC) paradigm, leading to substantial gains in the form of increased availability, bandwidth with low latency. The MEC offers real-time computing and storage facility within the proximity of mobile user-access network, hence it is imperative to secure communication between end user and edge server. The existing schemes do not fulfill real time processing and efficiency requirements for using complex crypto-primitives. To this end, we propose a novel two-factor biometric authentication protocol for MEC enabling efficient and secure combination of Physically Unclonable Functions (PUFs) with user-oriented biometrics employing fuzzy extractor-based procedures. The performance analysis depicts that our scheme offers resistance to known attacks using lightweight operations and supports 30% more security features than comparative studies. Our scheme is provably secure under Real-or-Random (ROR) formal security analysis model.Öğe A Robust Anonymous Authentication Scheme using Biometrics for Digital Rights Management System(Institute of Electrical and Electronics Engineers Inc., 2021) Khan, Muhammad Ayaz; Ghani, Anwar; Obaidat, Mohammad S.; Vijayakumar, Pandi; Mansoor, Khwaja; Chaudhry, Shehzad AshrafAs digital content transmission through the internet is convenient and quick, so the outspread of digital content is very high. However, along with this incredible speed and ease, current communication technologies and computers have also brought with them plenty of digital rights management complications. Digital Rights Management Systems are designed to limit the access to the utilization, alternation, and distribution of persevered digital content. This article scrutinized two recent schemes of Lee et al. and Yu et al. and it is found that these schemes are suspected to an insider attack, stolen smart-card attack, Daniel of services (Dos) attack, and impersonation attack. Furthermore, their proposal also suffers from incorrect issues. To fix these flaws, a robust anonymous authentication scheme using biometrics for Digital Rights Management System is proposed in this article. The proposed scheme is checked for correctness and its security is proved through BAN logic. The performance of the scheme is also analyzed using computation time and communication time. The results show that the designed scheme is highly secure with the same computation and communication cost as the existing protocols. © 2021 IEEE.Öğe A robust authentication and access control protocol for securing wireless healthcare sensor networks(Elsevier Ltd, 2020) Ali, Zeeshan; Ghani, Anwar; Khan, Imran; Chaudhry, Shehzad Ashraf; Islam, SK Hafizul; Giri, DebasisWireless Healthcare Sensor Network (WHSN) has become one of the major research fields over the past decades that play a very prominent role in the medical field. Due to the rapid growth of technology in wireless communication, different security challenges have been raised in WHSN. Authentication protocols are used to secure the information transferred over the public channels by WHSN. For this prospect recently, Liu & Chung proposed an authentication and data transmission mechanism for WHSN. However, Challa et al. identified that Liu-Chung's scheme is vulnerable to stolen smart-card, offline password guessing, privileged insider, and user impersonation attacks. Challa et al. then proposed an enhanced scheme to overcome beforehand stated flaws. This paper denotes out that in accession to before mentioned attacks, Liu-Chung's scheme is also prone to users’ private key leakage and user impersonation attacks towards sensors. Moreover, Challa et al.’s scheme suffers from incorrectness, broadcasting problem, lack of authentication between Trusted Authority (TA) and sensor nodes, replay attack, Denial of Service (DoS) attack, forgery attack and delay in communication due to the involvement of the TA. Using the elliptic curve cryptography and bilinear paring, an improved scheme is proposed in this paper, to mitigate the weaknesses of Challah et al. and Liu-Chang schemes. The formal security analysis using simulation tool AVISPA and BAN logic demonstrate that the proposed scheme is secure. The rigorous informal security analysis also attests that our scheme is safe against well-known attacks. © 2020 Elsevier LtdÖğe A secure and improved multi server authentication protocol using fuzzy commitment(SPRINGER, VAN GODEWIJCKSTRAAT 30, 3311 GZ DORDRECHT, NETHERLANDS, 2021) Rehman, Hafeez Ur; Ghani, Anwar; Chaudhry, Shehzad Ashraf; Alsharif, Mohammed H.; Nabipour, NarjesThe advancement in communication and computation technologies has paved a way for connecting large number of heterogeneous devices to offer specified services. Still, the advantages of this advancement are not realized completely due to inherent security issues. Most of the existing authentication mechanisms ensure the legitimacy of requesting user thorough single server leading towards multiple registrations and corresponding credentials storage on user side. Intelligent multimedia networks (IMN) may encompass wide range of networks and applications. However, the privacy and security of IMN cannot be apprehended through traditional multi sign on/single server authentication systems. The multi-server authentication systems can enable a user to acquire services from multiple servers using single registration and with single set of credentials (i.e.Password/smart card etc.) and can be accomplish IMN security and privacy needs. In 2018, Barman et al. proposed a multi-server authentication protocol using fuzzy commitment. The authors claimed that their protocol provides anonymity while resisting all known attacks. In this paper, we analyze that Barman et al.’s protocol is still vulnerable to anonymity violation attack and impersonation based on stolen smart card attack; moreover, it has incomplete login request and is prone to scalability issues. We then propose an enhanced protocol to overcome the security weaknesses of Barman et al.’s scheme. The security of the proposed protocol is verified using BAN logic and widely accepted automated AVISPA tool. The BAN logic and automated AVISPA along with the informal analysis ensure the robustness of the scheme against all known attacks.Öğe A secure blockchain-oriented data delivery and collection scheme for 5G-enabled IoD environment(ELSEVIER, RADARWEG 29, 1043 NX AMSTERDAM, NETHERLANDS, 2021) Irshad, Azeem; Chaudhry, Shehzad Ashraf; Ghani, Anwar; Bilal, MuhammadThere are innumerable ways the Internet of Drones (IoD) technology can impact our society. With the deployment of an airborne network, the IoD can support real-time low-cost delivery of services ranging from military surveillance to a myriad of civilian applications. Nevertheless, the drones employ insecure wireless communication channels to communicate with other entities in the system, inhibiting its induction in sensitive installations if insecure or inefficient Authenticated Key Agreement (AKA) schemes are employed. The blockchain, an open distributed ledger-based technology, is increasingly being adopted to address the security concern as discussed. Recently, Bera et al. presented an efficient blockchain-enabled AKA scheme for data management among various entities in IoD network. However, their scheme does not support anonymity and untraceability for the drones; also, it does not provide resistance to Ground station server impersonation attack, while the protocol has a few redundancies. Later, we proposed an enhanced blockchain-enabled AKA scheme BOD5-IOD to authenticate drones in the system. The BOD5-IOD, other than supporting a robust access control mechanism between drones and GSS, also ensures safe transactions among all entities in the IoD environment. The formal analysis and performance evaluation endorse that our scheme supports security requirements with computational and communication efficiency of 34.4% and 23.3%, respectively.Öğe Securing IoT-Based RFID Systems: A Robust Authentication Protocol Using Symmetric Cryptography(MDPI, ST ALBAN-ANLAGE 66, CH-4052 BASEL, SWITZERLAND, 2019) Mansoor, Khwaja; Ghani, Anwar; Chaudhry, Shehzad Ashraf; Shamshirband, Shahaboddin; Ghayyur, Shahbaz Ahmed Khan; Mosavi, AmirDespite the many conveniences of Radio Frequency Identification (RFID) systems, the underlying open architecture for communication between the RFID devices may lead to various security threats. Recently, many solutions were proposed to secure RFID systems and many such systems are based on only lightweight primitives, including symmetric encryption, hash functions, and exclusive OR operation. Many solutions based on only lightweight primitives were proved insecure, whereas, due to resource-constrained nature of RFID devices, the public key-based cryptographic solutions are unenviable for RFID systems. Very recently, Gope and Hwang proposed an authentication protocol for RFID systems based on only lightweight primitives and claimed their protocol can withstand all known attacks. However, as per the analysis in this article, their protocol is infeasible and is vulnerable to collision, denial-of-service (DoS), and stolen verifier attacks. This article then presents an improved realistic and lightweight authentication protocol to ensure protection against known attacks. The security of the proposed protocol is formally analyzed using Burrows Abadi-Needham (BAN) logic and under the attack model of automated security verification tool ProVerif. Moreover, the security features are also well analyzed, although informally. The proposed protocol outperforms the competing protocols in terms of security.Öğe Security and Key Management in IoT Based Wireless Sensor Networks: An Authentication Protocol Using Symmetric Key(WILEY, 111 RIVER ST, HOBOKEN 07030-5774, NJ USA, 2019) Ghani, Anwar; Mansoor, Khwaja; Mehmood, Shahid; Chaudhry, Shehzad Ashraf; Rahman, Arif Ur; Saqib, Malik NajmusWireless sensor networks (WSN) consist of hundreds of miniature sensor nodes to sense various events in the surrounding environment and report back to the base station. Sensor networks are at the base of internet of things (IoT) and smart computing applications where a function is performed as a result of sensed event or information. However, in resource-limited WSN authenticating a remote user is a vital security concern. Recently, researchers put forth various authentication protocols to address different security issues. Gope et al presented a protocol claiming resistance against known attacks. A thorough analysis of their protocol shows that it is vulnerable to user traceability, stolen verifier, and denial of service (DoS) attacks. In this article, an enhanced symmetric key-based authentication protocol for IoT-based WSN has been presented. The proposed protocol has the ability to counter user traceability, stolen verifier, and DoS attacks. Furthermore, the proposed protocol has been simulated and verified using Proverif and BAN logic. The proposed protocol has the same communication cost as the baseline protocol; however, in computation cost, it has 52.63% efficiency as compared with the baseline protocol.