Yazar "Irshad, Azeem" seçeneğine göre listele
Listeleniyor 1 - 18 / 18
Sayfa Başına Sonuç
Sıralama seçenekleri
Öğe Adaptive Fault-Tolerant System and Optimal Power Allocation for Smart Vehicles in Smart Cities Using Controller Area Network(WILEY-HINDAWI, ADAM HOUSE, 3RD FL, 1 FITZROY SQ, LONDON WIT 5HE, ENGLAND, 2021) Biswal, Anil Kumar; Singh, Debabrata; Pattanayak, Binod Kumar; Samanta, Debabrata; Chaudhry, Shehzad Ashraf; Irshad, AzeemNowadays, the power consumption and dependable repeated data collection are causing the main issue for fault or collision in controller area network (CAN), which has a great impact for designing autonomous vehicle in smart cities. Whenever a smart vehicle is designed with several sensor nodes, Internet of ,ings (IoT) modules are linked through CAN for reliable transmission of a message for avoiding collision, but it is failed in communication due to delay and collision in communication of message frame from a source node to the destination. Generally, the emerging role of IoT and vehicles has undoubtedly brought a new path for tomorrow’s cities. ,e method proposed in this paper is used to gain fault-tolerant capability through Probabilistic Automatic Repeat Request (PARQ) and also Probabilistic Automatic Repeat Request (PARQ) with Fault Impact (PARQ-FI), in addition to providing optimal power allocation in CAN sensor nodes for enhancing the performance of the process and also significantly acting a role for making future smart cities. Several message frames are needed to be retransmitted on PARQ and fault impact (PARQ-FI) calculates the message with a response probability of each node.Öğe An anonymous device to device access control based on secure certificate for internet of medical things systems(ELSEVIER, RADARWEG 29, 1043 NX AMSTERDAM, NETHERLANDS, 2021) Chaudhry, Shehzad Ashraf; Irshad, Azeem; Nebhen, Jamel; Bashir, Ali Kashif; Moustafa, Nour; Al-Otaibi, Yasser D.; Bin Zikria, YousafThe Internet of Medical Things (IoMT) is structured upon both the sensing and communication infrastructure and computation facilities. The IoMT provides the convenient and cheapest ways for healthcare by aiding the remote access to the patients’ physiological data and using machine learning techniques for help in diagnosis. The communication delays in IoMT can be very harmful to healthcare. Device to device (D2D) secure communication is a vital area that can reduce communication delays; otherwise, caused due to the mediation of a third party. To substantiate a secure D2D communication framework, some schemes were recently proposed to secure D2D based communication infrastructure suitable for IoMT-based environments. However, the insecurities of some schemes against device physical capture attack and non-provision of anonymity along with related attacks are evident from the literature. This calls for a D2D secure access control system for realizing sustainable smart healthcare. In this article, using elliptic curve cryptography, a certificate based D2D access control scheme for IoMT systems (D2DAC-IoMT) is proposed. The security of the proposed D2DAC-IoMT is substantiated through formal and informal methods. Moreover, the performance analysis affirms that the proposed scheme provides a good trade-off between security and efficiency compared with some recent schemes.Öğe Comment on 'ElGamal cryptosystem-based secure authentication system for cloud-based IoT applications'(Wiley, 2021) Irshad, Azeem; Chaudhry, Shehzad AshrafThis comment is presented to identify the drawbacks in a recently demonstrated scheme by Maitra et al., SAS-Cloud: doi:, which adopted an ElGamal cryptosystem-based technique for biometric authentication in cloud-based IoT applications. In this protocol, the authors claim that their scheme provides mutual authentication. However, it is demonstrated in this article that the protocol merely supports unilateral authentication, which may result in clogging attack on the server's end. This is because the latter is unable to verify the authentication request in absolute terms, which might lead to resource clogging as well as denial of service attack affecting its Quality of Service (QoS).Öğe Comment on 'SFVCC: Chaotic map-based security framework for vehicular cloud computing'(Wiley, 2020) Irshad, Azeem; Ashraf Chaudhry, ShehzadThis comment is presented to identify the drawbacks in a recently published scheme SFVCC by Mishra et al. doi:10.1049/iet-its.2019.0250. In this scheme, a malicious adversary may initiate a replay attack and denial of service attack after eavesdropping the communication. These attacks render the scheme inapplicable for practical deployment.Öğe Further comments on 'SFVCC: Chaotic map-based security framework for vehicular cloud computing'(Wiley, 2020) Irshad, Azeem; Ashraf Chaudhry, Shehzad[Abstract Not Available]Öğe Fuzzy-in-the-Loop-Driven Low-Cost and Secure Biometric User Access to Server(IEEE-Inst Electrical Electronics Engineers Inc, 2021) Irshad, Azeem; Usman, Muhammad; Chaudhry, Shehzad Ashraf; Bashir, Ali Kashif; Jolfaei, Alireza; Srivastava, GautamFuzzy systems can aid in diminishing uncertainty and noise from biometric security applications by providing an intelligent layer to the existing physical systems to make them reliable. In the absence of such fuzzy systems, a little random perturbation in captured human biometrics could disrupt the whole security system, which may even decline the authentication requests of legitimate entities during the protocol execution. In the literature, few fuzzy logic-based biometric authentication schemes have been presented; however, they lack significant security features including perfect forward secrecy (PFS), untraceability, and resistance to known attacks. This article, therefore, proposes a novel two-factor biometric authentication protocol enabling efficient and secure combination of physically unclonable functions, a physical object analogous to human fingerprint, with user biometrics by employing fuzzy extractor-based procedures in the loop. This combination enables the participants in the protocol to achieve PFS. The security of the proposed scheme is tested using the well-known real-or-random model. The performance analysis signifies the fact that the proposed scheme not only offers PFS, untraceability, and anonymity to the participants, but is also resilient to known attacks using light-weight symmetric operations, which makes it an imperative advancement in the category of intelligent and reliable security solutions.Öğe An Improved SIP Authenticated Key Agreement Based on Dongqing et al.(SPRINGER, ONE NEW YORK PLAZA, SUITE 4600 , NEW YORK, NY 10004, UNITED STATES, 2020) Ul Hassan, Mahmood; Chaudhry, Shehzad Ashraf; Irshad, AzeemThe IP multimedia subsystem represents an architectural framework to support multimedia-based services using internet protocol over wired and wireless media. These IP-based multimedia services rely on session initiation protocol (SIP) for creating, maintaining and terminating the communicative sessions, which underscores the efciency and security of SIP protocol. Many SIP based authentication schemes have been put forward in the last decade, however with many limitations. Recently, Lu et al. and Chaudhary et al. presented SIP based authentication protocols. Then, Dongqing et al. discovered limitations in Lu et al. and Chaudhary et al. schemes, and presented an improved SIP authentication protocol. Nonetheless, we ascertain that Dongqing et al.’s protocol is prone to privileged insider attack, denial of service attack, and session specifc ephemeral secret-leakage attack. Besides, this protocol assumes a strictly time synchronized system, which limits the practical efectiveness of the protocol for a real environment. We also propose an improved SIP authentication protocol that covers the limitations of Dongqing et al. protocol. Our scheme is formally proved as secure using BAN logic analysis. The performance analysis illustrates the comparison for related schemes with proposed scheme, which depicts the efciency and robustness of the scheme over previous schemes.Öğe A Lightweight Authentication Scheme for 6G-IoT Enabled Maritime Transport System(IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 445 HOES LANE, PISCATAWAY, NJ 08855-4141, 2023) Chaudhry, Shehzad Ashraf; Irshad, Azeem; Khan, Muhammad Asghar; Khan, Sajjad Ahmad; Nosheen, Summera; AlZubi, Ahmad Ali; Zikria, Yousaf BinThe Sixth-Generation (6G) mobile network has the potential to provide not only traditional communication services but also additional processing, caching, sensing, and control capabilities to a massive number of Internet of Things (IoT) devices. Meanwhile, a 6G mobile network may provide global coverage and diverse quality-of-service provisioning to the Maritime Transportation System (MTS) when enabled through satellite systems. Although modern MTS has gained significant benefits from Internet of Things (IoT) and 6G technologies, threats and challenges in terms of security and privacy have also been grown substantially. Tracking the location of vessels, GPS spoofing, unauthorized access to data, and message tampering are some of the potential security and privacy vulnerabilities in the 6G-IoT enabled MTS. In this article, we propose a lightweight authentication protocol for a 6G-IoT enabled maritime transportation system to efficiently assist and ensure the security and privacy of maritime transportation systems. To validate the security characteristics, formal security assessment methods are utilized, i.e., Real-Or-Random (ROR) oracle model. The findings of the security analysis show that the proposed scheme is more secure than the existing schemes.Öğe A low-cost privacy preserving user access in mobile edge computing framework(PERGAMON-ELSEVIER SCIENCE LTD, THE BOULEVARD, LANGFORD LANE, KIDLINGTON, OXFORD OX5 1GB, ENGLAND, 2022) Irshad, Azeem; Chaudhry, Shehzad Ashraf; Ghani, Anwar; Mallah, Ghulam Ali; Bilal, Muhammad; Alzahrani, Bander A.The computational offloading from conventional cloud datacenter towards edge devices sprouted a new world of prospective applications in pervasive and Mobile Edge Computing (MEC) paradigm, leading to substantial gains in the form of increased availability, bandwidth with low latency. The MEC offers real-time computing and storage facility within the proximity of mobile user-access network, hence it is imperative to secure communication between end user and edge server. The existing schemes do not fulfill real time processing and efficiency requirements for using complex crypto-primitives. To this end, we propose a novel two-factor biometric authentication protocol for MEC enabling efficient and secure combination of Physically Unclonable Functions (PUFs) with user-oriented biometrics employing fuzzy extractor-based procedures. The performance analysis depicts that our scheme offers resistance to known attacks using lightweight operations and supports 30% more security features than comparative studies. Our scheme is provably secure under Real-or-Random (ROR) formal security analysis model.Öğe A Novel Pairing-Free Lightweight Authentication Protocol for Mobile Cloud Computing Framework(IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 445 HOES LANE, PISCATAWAY, NJ 08855-4141, 2021) Irshad, Azeem; Chaudhry, Shehzad Ashraf; Alomari, Osama Ahmad; Yahya, Khalid O. Moh.; Kumar, NeerajThe mobile cloud computing (MCC) refers to an infrastructure that integrates cloud computing and mobile computing, and it has changed a great deal, the service provisioning of applications, which requires to get the data processed after collection from vast sensor and Internet-of-Things-based network. The ever increasing number of handheld mobile gadgets has exacerbated the need for robust and efficient authenticated key agreements. We could witness a number of MCC-based multiserver authentication schemes lately to foster the secure adaptation of the technology; however, the demonstrated solutions are either insecure or employing too costly bilinear pairing operations for implementation. In view of limitations, as illustrated in previous studies, we propose a novel pairing-free multiserver authentication protocol for MCC environment based on an elliptic curve cryptosystem that is not only efficient, but also free from security loopholes as demonstrated. The performance evaluation section discusses and distinguishes the findings among latest studies. The strength of the contributed scheme is proved theoretically under formal security model.Öğe A Physical Capture Resistant Authentication Scheme for the Internet of Drones(Institute of Electrical and Electronics Engineers Inc., 2021) Chaudhry, Shehzad Ashraf; Nebhen, Jamel; Irshad, Azeem; Bashir, Ali Kashif; Kharel, Rupak; Yu, Keping; Zikria, Yousaf BinThe internet of Drones (IoD) can encompass many essential services, including surveillance and emergency/rescue operations. While IoD is becomin popular and experiencing a rapid usage increase, privacy and security are the main concerns to avoid leakage of critical information and/or denial of services by a single drone or a whole IoD network. In addition to traditional privacy cum security issues, the physical capture of a single drone can severely impact the entire IoD network. This article provides an overview of the security challenges and requirements for IoD environments in addition to a discussion related to IoD communication/security standards. More-over, this article proposes a novel scheme for securing IoD specifically, from physical drone capturing and related attacks. © 2017 IEEE.Öğe A Provably Secure and Efficient Authenticated Key Agreement Scheme for Energy Internet-Based Vehicle-to-Grid Technology Framework(Institute of Electrical and Electronics Engineers Inc., 2020) Irshad, Azeem; Usman, Muhammad; Chaudhry, Shehzad Ashraf; Naqvi, Husnain; Shafiq, MuhammadThe energy Internet (EI)-based vehicle-to-grid (V2G) technology facilitates the electric vehicles not only to distribute additional electricity into grid systems, but also support receiving back from the power grid in the form of charging. The secure key establishment is quite significant to initiate the bidirectional electricity power delivery into and from the system. To effectively implement any EI-based V2G communication, the authentication protocol must be free from cyber attacks. In this article, we not only explore the drawbacks of several smart grid-based authentication protocols but also bring forth the limitations of a recently presented EI-based V2G scheme by Gope and Sikdar. The examined drawbacks in this protocol may disrupt its proper functioning, since it faces desynchronization problems while logging into the mobile device bearing registration parameters. The scheme is also vulnerable to replay attack and man-in-the-middle attack. The user is also unable to validate session key in the protocol. Considering these limitations, we propose a novel and efficient V2G protocol framework enabling the vehicles to communicate or recharge at desired recharging stations. The results of the proposed framework are compared with several contemporary schemes, and its security features are validated by random oracle model-based formal analysis. © 1972-2012 IEEE.Öğe A resource friendly authentication scheme for space–air–ground–sea integrated Maritime Communication Network(PERGAMON-ELSEVIER SCIENCE LTD, THE BOULEVARD, LANGFORD LANE, KIDLINGTON, OXFORD OX5 1GB, ENGLAND, 2022) Khan, Muhammad Asghar; Alzahrani, Bander A.; Barnawi, Ahmed; Al-Barakati, Abdullah; Irshad, Azeem; Chaudhry, Shehzad AshrafRecently, the demand for a faster , low-latency, and full-coverage Maritime Communication Network (MCN) has gained attention as marine operations have increased substantially. Using modern information network technologies and integrating space, air, ground, and sea network segments, MCN may be able to offer worldwide coverage and diverse Quality-of-Service (QoS) provisioning. These network segments are expected to provide not only traditional communication services, but also processing, caching, sensing, and control capabilities when linked via Sixth Generation (6G) mobile networks. However, this development in infrastructure growth is subjected to new security and privacy concerns due to open links, moving nodes, and diverse collaborative algorithms. In this paper, we propose an improved and resource friendly authentication scheme for the space– air–ground–sea integrated maritime communication network using Elliptic Curve Cryptography (ECC). To validate the security hardness of the proposed scheme, formal security assessment method such as Random Oracle Model (ROM) is used. Finally, comparisons with relevant authentication schemes are provided in terms of computation and communication costs. The findings support the viability of the proposed scheme.Öğe Rotating behind Privacy: An Improved Lightweight Authentication Scheme for Cloud-based IoT Environment(Assoc Computing Machinery, 2021) Chaudhry, Shehzad Ashraf; Irshad, Azeem; Yahya, Khalid; Kumar, Neeraj; Alazab, Mamoun; Bin Zikria, YousafThe advancements in the internet of things (IoT) require specialized security protocols to provide unbreakable security along with computation and communication efficiencies. Moreover, user privacy and anonymity has emerged as an integral part, along with other security requirements. Unfortunately, many recent authentication schemes to secure IoT-based systems were either proved as vulnerable to different attacks or prey of inefficiencies. Some of these schemes suffer from a faulty design that happened mainly owing to undue emphasis on privacy and anonymity alongside performance efficiency. This article aims to show the design faults by analyzing a very recent hash functions-based authentication scheme for cloud-based IoT systems with misunderstood privacy cum efficiency tradeoff owing to an unadorned design flaw, which is also present in many other such schemes. Precisely, it is proved in this article that the scheme of Wazid et al. cannot provide mutual authentication and key agreement between a user and a sensor node when there exists more than one registered user. We then proposed an improved scheme and proved its security through formal and informal methods. The proposed scheme completes the authentication cycle with a minor increase in computation cost but provides all security goals along with privacy.Öğe A secure blockchain-oriented data delivery and collection scheme for 5G-enabled IoD environment(ELSEVIER, RADARWEG 29, 1043 NX AMSTERDAM, NETHERLANDS, 2021) Irshad, Azeem; Chaudhry, Shehzad Ashraf; Ghani, Anwar; Bilal, MuhammadThere are innumerable ways the Internet of Drones (IoD) technology can impact our society. With the deployment of an airborne network, the IoD can support real-time low-cost delivery of services ranging from military surveillance to a myriad of civilian applications. Nevertheless, the drones employ insecure wireless communication channels to communicate with other entities in the system, inhibiting its induction in sensitive installations if insecure or inefficient Authenticated Key Agreement (AKA) schemes are employed. The blockchain, an open distributed ledger-based technology, is increasingly being adopted to address the security concern as discussed. Recently, Bera et al. presented an efficient blockchain-enabled AKA scheme for data management among various entities in IoD network. However, their scheme does not support anonymity and untraceability for the drones; also, it does not provide resistance to Ground station server impersonation attack, while the protocol has a few redundancies. Later, we proposed an enhanced blockchain-enabled AKA scheme BOD5-IOD to authenticate drones in the system. The BOD5-IOD, other than supporting a robust access control mechanism between drones and GSS, also ensures safe transactions among all entities in the IoD environment. The formal analysis and performance evaluation endorse that our scheme supports security requirements with computational and communication efficiency of 34.4% and 23.3%, respectively.Öğe A secure demand response management authentication scheme for smart grid(ELSEVIER, RADARWEG 29, 1043 NX AMSTERDAM, NETHERLANDS, 2021) Irshad, Azeem; Chaudhry, Shehzad Ashraf; Alazab, Mamoun; Kanwal, Ambrina; Zia, Muhammad Sultan; Bin Zikria, YousafThe electricity demands are floated through smart grid (SG) devices to a remote power management system and utility center (UC) for utilizing energy-based services, while the UCs manage the distribution of power. Nevertheless, in smart grid systems, the communication messages are susceptible to various threats, since the information related to power consumption is communicated over an unsafe public channel. Therefore, a secure authenticated key agreement scheme is crucial for dispensing energy-based services to legal subscribers. In this regard, Yu et al. designed a secure authentication scheme for smart grid-based demand response management. Nevertheless, we discover that Yu et al.’s protocol is prone to replay attack, denial-of-service attack, and many technical defects in the protocol. Thus, we propose an anonymous and lightweight authenticated key agreement protocol for smart grid-based demand response management countering the limitations in Yu et al.’s scheme. Our scheme may withstand known security attacks, and also supports privacy as well as mutual authentication. We evaluate the security properties of contributed protocol employing informal security analysis and proved the security of session key between the utility center and smart grid using Burrows Abadi Needham (BAN) logic analysis and ProVerif automated simulation. The achieved results sufficiently advocate the practical implementation of the scheme.Öğe Security Hardened and Privacy Preserved Vehicle-to-Everything (V2X) Communication(WILEY-HINDAWI, ADAM HOUSE, 3RD FL, 1 FITZROY SQ, LONDON WIT 5HE, ENGLAND, 2022) Irshad, Azeem; Shafiq, Muhammad; Chaudhry, Shehzad Ashraf; Usman, MuhammadVehicle-to-everything (V2X) communications have recently gained concentration of researchers for both, academia as well as industry. In the V2X system, the information is communicated from vehicle sensors to other vehicles, infrastructure, pedestrians, and mobile network cloud through high-bandwidth reliable links [1–4]. &e technology may greatly improve the driver’s awareness of imminent hazards, thereby reducing the severity of accidents, fatalities, or possible collisions with other vehicles. &e V2X technology brings efficiency through creating warning alerts for drivers, imparting the information of alternative routes for avoiding possible traffic congestions and pinpointing available parking spaces. Such critical situations might become problematic if the security and privacy of V2X communication system is compromised [5–8]. &us, V2X vehicles along with efficiency, reliability, and safety parameters require more secure and robust communication protocols to meet the upcoming security challenges. Moreover, the wireless nature of the system might become challenging in affording secure and ubiquitous connectivity to the V2X network [9–13]. &is is crucial to create a fail-safe infrastructure of modern traffic scenario regarding smart cities since security and privacy issues are quite prevalent in our daily lives.Öğe SKIA-SH: A Symmetric Key-Based Improved Lightweight Authentication Scheme for Smart Homes(WILEY-HINDAWI, ADAM HOUSE, 3RD FL, 1 FITZROY SQ, LONDON WIT 5HE, ENGLAND, 2022) Alzahrani, Bander A.; Barnawi, Ahmed; Albarakati, Abdullah; Irshad, Azeem; Khan, Muhammad Asghar; Chaudhry, Shehzad AshrafBeing one of the finest applications of the IoT, smart homes (SHs) with an aim to improve quality of life are taking over the traditional lifestyles. The entities within a SH communicate with each other and with the environment including the users to transform daily life seamlessly enjoyable and easy. However, owing to the public communication infrastructure, the advantages of SH are subject to security and privacy issues. Recently, Yu et al. presented a privacy and security solution for SH environment. The scheme of Yu et al. is based on lightweight symmetric key functions. Although the scheme of Yu et al. exhibits the lightweight property, it is proven in this paper that their scheme cannot provide mutual authentication due to a crucial design fault. An improved scheme using symmetric key functions for SH (SKIA-SH) is proposed in this paper. The security of the proposed scheme is furnished through formal BAN logic followed by brief discussion on security attribute provision of the proposed SKIA-SH. The comparisons show that the proposed SKIA-SH provides the required security on the cost of slight increase in computation and communication costs. The simulation results show that the SKIA-SH completes an authentication round by exchanging 216 bytes in just 5.34 ms.