Yazar "Khan, Muhammad Asghar" seçeneğine göre listele
Listeleniyor 1 - 6 / 6
Sayfa Başına Sonuç
Sıralama seçenekleri
Öğe A Lightweight and Robust User Authentication Protocol with User Anonymity for IoT-Based Healthcare(TECH SCIENCE PRESS, 871 CORONADO CENTER DR, SUTE 200, HENDERSON, NV 89052, 2022) Chen, Chien-Ming; Liu, Shuangshuang; Chaudhry, Shehzad Ashraf; Chen, Yeh-Cheng; Khan, Muhammad AsgharWith the rise of the Internet of Things (IoT), the word “intelligent medical care” has increasingly become a major vision. Intelligent medicine adopts the most advanced IoT technology to realize the interaction between patients and people, medical institutions, and medical equipment. However, with the openness of network transmission, the security and privacy of information transmission have become a major problem. Recently, Masud et al. proposed a lightweight anonymous user authentication protocol for IoT medical treatment, claiming that their method can resist various attacks. However, through analysis of the protocol, we observed that their protocol cannot effectively resist privileged internal attacks, sensor node capture attacks, and stolen authentication attacks, and their protocol does not have perfect forward security. Therefore, we propose a new protocol to resolve the security vulnerabilities in Masud’s protocol and remove some redundant parameters, so as to make the protocol more compact and secure. In addition, we evaluate the security and performance of the new protocol and prove that the overall performance of the new protocol is better than that of other related protocols.Öğe A Lightweight Authentication Scheme for 6G-IoT Enabled Maritime Transport System(IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 445 HOES LANE, PISCATAWAY, NJ 08855-4141, 2023) Chaudhry, Shehzad Ashraf; Irshad, Azeem; Khan, Muhammad Asghar; Khan, Sajjad Ahmad; Nosheen, Summera; AlZubi, Ahmad Ali; Zikria, Yousaf BinThe Sixth-Generation (6G) mobile network has the potential to provide not only traditional communication services but also additional processing, caching, sensing, and control capabilities to a massive number of Internet of Things (IoT) devices. Meanwhile, a 6G mobile network may provide global coverage and diverse quality-of-service provisioning to the Maritime Transportation System (MTS) when enabled through satellite systems. Although modern MTS has gained significant benefits from Internet of Things (IoT) and 6G technologies, threats and challenges in terms of security and privacy have also been grown substantially. Tracking the location of vessels, GPS spoofing, unauthorized access to data, and message tampering are some of the potential security and privacy vulnerabilities in the 6G-IoT enabled MTS. In this article, we propose a lightweight authentication protocol for a 6G-IoT enabled maritime transportation system to efficiently assist and ensure the security and privacy of maritime transportation systems. To validate the security characteristics, formal security assessment methods are utilized, i.e., Real-Or-Random (ROR) oracle model. The findings of the security analysis show that the proposed scheme is more secure than the existing schemes.Öğe Optimization Analysis of Sustainable Solar Power System for Mobile Communication Systems(TECH SCIENCE PRESS, 871 CORONADO CENTER DR, SUTE 200, HENDERSON, NV 89052, 2022) Alsharif, Mohammed H.; Kannadasan, Raju; Hassan, Amir Y.; Tawfik, Wael Z.; Kim, Mun-Kyeom; Khan, Muhammad Asghar; Solyman, Ahmad Amin AhmadCellular mobile technology has witnessed tremendous growth in recent times. One of the challenges facing the operators to extend the coverage of the networks to meet the rising demand for cellular mobile services is the power sources used to supply cellular towers with energy, especially in remote. Thus, switch from the conventional sources of energy to a greener and sustainable power model became a target of the academic and industrial sectors in many fields; one of these important fields is the telecommunication sector. Accordingly, this study aims to find the optimum sizing and technoeconomic investigation of a solar photovoltaic scheme to deploy cellular mobile technology infrastructure cleanly and sustainably. The optimal solarpowered system is designed by employing the energy-balance procedures of the HOMER software tool. The problem objective is considered in terms of cost, but the energy system is constrained to meet the power demand reliably. Process simulations were performed to determine the optimum sizing, performance and monetary cost of the power system, using long-term meteorological datasets for a case study site with defined longitude (31? 25 E) and latitude (30? 06 N). From the observed results, the total net present cost (NPC) of the proposed system is $28,187. Indeed, these outcomes can provide profound economic, technical, and ecological benefits to cellular operators. It also ensures a sizeable reduction in greenhouse gas that supports sustainable green wireless network (WN) deployment in remote areas.Öğe A resource friendly authentication scheme for space–air–ground–sea integrated Maritime Communication Network(PERGAMON-ELSEVIER SCIENCE LTD, THE BOULEVARD, LANGFORD LANE, KIDLINGTON, OXFORD OX5 1GB, ENGLAND, 2022) Khan, Muhammad Asghar; Alzahrani, Bander A.; Barnawi, Ahmed; Al-Barakati, Abdullah; Irshad, Azeem; Chaudhry, Shehzad AshrafRecently, the demand for a faster , low-latency, and full-coverage Maritime Communication Network (MCN) has gained attention as marine operations have increased substantially. Using modern information network technologies and integrating space, air, ground, and sea network segments, MCN may be able to offer worldwide coverage and diverse Quality-of-Service (QoS) provisioning. These network segments are expected to provide not only traditional communication services, but also processing, caching, sensing, and control capabilities when linked via Sixth Generation (6G) mobile networks. However, this development in infrastructure growth is subjected to new security and privacy concerns due to open links, moving nodes, and diverse collaborative algorithms. In this paper, we propose an improved and resource friendly authentication scheme for the space– air–ground–sea integrated maritime communication network using Elliptic Curve Cryptography (ECC). To validate the security hardness of the proposed scheme, formal security assessment method such as Random Oracle Model (ROM) is used. Finally, comparisons with relevant authentication schemes are provided in terms of computation and communication costs. The findings support the viability of the proposed scheme.Öğe Role of Drone Technology Helping in Alleviating the COVID-19 Pandemic(MDPI, ST ALBAN-ANLAGE 66, CH-4052 BASEL, SWITZERLAND, 2022) Mohsan, Syed Agha Hassnain; Zahra, Qurat ul Ain; Khan, Muhammad Asghar; Alsharif, Mohammed H.; Elhaty, Ismail A. M.; Jahid, AbuThe COVID-19 pandemic, caused by a new coronavirus, has affected economic and social standards as governments and healthcare regulatory agencies throughout the world expressed worry and explored harsh preventative measures to counteract the disease’s spread and intensity. Several academics and experts are primarily concerned with halting the continuous spread of the unique virus. Social separation, the closing of borders, the avoidance of big gatherings, contactless transit, and quarantine are important methods. Multiple nations employ autonomous, digital, wireless, and other promising technologies to tackle this coronary pneumonia. This research examines a number of potential technologies, including unmanned aerial vehicles (UAVs), artificial intelligence (AI), blockchain, deep learning (DL), the Internet of Things (IoT), edge computing, and virtual reality (VR), in an effort to mitigate the danger of COVID-19. Due to their ability to transport food and medical supplies to a specific location, UAVs are currently being utilized as an innovative method to combat this illness. This research intends to examine the possibilities of UAVs in the context of the COVID-19 pandemic from several angles. UAVs offer intriguing options for delivering medical supplies, spraying disinfectants, broadcasting communications, conducting surveillance, inspecting, and screening patients for infection. This article examines the use of drones in healthcare as well as the advantages and disadvantages of strict adoption. Finally, challenges, opportunities, and future work are discussed to assist in adopting drone technology to tackle COVID-19-like diseases.Öğe SKIA-SH: A Symmetric Key-Based Improved Lightweight Authentication Scheme for Smart Homes(WILEY-HINDAWI, ADAM HOUSE, 3RD FL, 1 FITZROY SQ, LONDON WIT 5HE, ENGLAND, 2022) Alzahrani, Bander A.; Barnawi, Ahmed; Albarakati, Abdullah; Irshad, Azeem; Khan, Muhammad Asghar; Chaudhry, Shehzad AshrafBeing one of the finest applications of the IoT, smart homes (SHs) with an aim to improve quality of life are taking over the traditional lifestyles. The entities within a SH communicate with each other and with the environment including the users to transform daily life seamlessly enjoyable and easy. However, owing to the public communication infrastructure, the advantages of SH are subject to security and privacy issues. Recently, Yu et al. presented a privacy and security solution for SH environment. The scheme of Yu et al. is based on lightweight symmetric key functions. Although the scheme of Yu et al. exhibits the lightweight property, it is proven in this paper that their scheme cannot provide mutual authentication due to a crucial design fault. An improved scheme using symmetric key functions for SH (SKIA-SH) is proposed in this paper. The security of the proposed scheme is furnished through formal BAN logic followed by brief discussion on security attribute provision of the proposed SKIA-SH. The comparisons show that the proposed SKIA-SH provides the required security on the cost of slight increase in computation and communication costs. The simulation results show that the SKIA-SH completes an authentication round by exchanging 216 bytes in just 5.34 ms.