Yazar "Khan, Sajjad Ahmad" seçeneğine göre listele
Listeleniyor 1 - 3 / 3
Sayfa Başına Sonuç
Sıralama seçenekleri
Öğe Designing an Enhanced User Authenticated Key Management Scheme for 6G-Based Industrial Applications(Institute of Electrical and Electronics Engineers Inc., 2022) Darman, Ijaz; Mahmood, Musaria Karim; Chaudhry, Shehzad Ashraf; Khan, Sajjad Ahmad; Lim, HuhnkukIn the Sixth Generation (6G) mobile system, the importance of security increases even more in the communication system. One of the potential technologies of 6G is the Network in a Box (NIB). The 6G-enabled NIB is a multi-generational, easily and quickly installable technology used for communication. It is based on both hardware and software. The main features of a 6G-enabled NIB include low latency and a high level of flexibility. In addition, it provides connectivity services to the applications used in unusual situations such as battlefields or natural disasters in the industry. However, most of the applications used in the 6G-enabled NIB are not appropriately secured. There are chances of several active and passive attacks due to the insecure channel. Therefore, a novel remote user authentication and key management scheme is presented in this paper. This scheme is the modified and improved version of UAKMS-NIB and is renamed as the improved User Authentication and Management Scheme to secure the 6G-enabled NIB (iUAKMS-NIB) that can be used in industrial applications. Hence, the proposed scheme provides the best security solution against the possible attacks on the 6G communication system. The analytical results show that the proposed scheme performs better compared to the existing schemes. © 2013 IEEE.Öğe A Lightweight Authentication Scheme for 6G-IoT Enabled Maritime Transport System(IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 445 HOES LANE, PISCATAWAY, NJ 08855-4141, 2023) Chaudhry, Shehzad Ashraf; Irshad, Azeem; Khan, Muhammad Asghar; Khan, Sajjad Ahmad; Nosheen, Summera; AlZubi, Ahmad Ali; Zikria, Yousaf BinThe Sixth-Generation (6G) mobile network has the potential to provide not only traditional communication services but also additional processing, caching, sensing, and control capabilities to a massive number of Internet of Things (IoT) devices. Meanwhile, a 6G mobile network may provide global coverage and diverse quality-of-service provisioning to the Maritime Transportation System (MTS) when enabled through satellite systems. Although modern MTS has gained significant benefits from Internet of Things (IoT) and 6G technologies, threats and challenges in terms of security and privacy have also been grown substantially. Tracking the location of vessels, GPS spoofing, unauthorized access to data, and message tampering are some of the potential security and privacy vulnerabilities in the 6G-IoT enabled MTS. In this article, we propose a lightweight authentication protocol for a 6G-IoT enabled maritime transportation system to efficiently assist and ensure the security and privacy of maritime transportation systems. To validate the security characteristics, formal security assessment methods are utilized, i.e., Real-Or-Random (ROR) oracle model. The findings of the security analysis show that the proposed scheme is more secure than the existing schemes.Öğe Secure Message Transmission for V2V Based on Mutual Authentication for VANETs(Hindawi Limited, 2021) Mahmood, Jabar; Duan, Zongtao; Xue, Heng; Yang, Yun; Berwo, Michael Abebe; Khan, Sajjad Ahmad; Yassin, Abd Al Kader AhmedThe advancements in Vehicular Ad Hoc Networks (VANETs) require more intelligent security protocols that ultimately provide unbreakable security to vehicles and other components of VANETs. VANETs face various types of security pitfalls due to the openness characteristics of the VANET communication infrastructure. Researchers have recently proposed different mutual authentication schemes that address security and privacy issues in vehicle-to-vehicle (V2V) communication. However, some V2V security schemes suffer from inadequate design and are hard to implement practically. In addition, some schemes face vehicle traceability and lack anonymity. Hence, this paper's primary goal is to enhance privacy preservation through mutual authentication and to achieve better security and performance. Therefore, this article first describes the vulnerabilities of a very recent authentication scheme presented by Vasudev et al. Our analysis proves that the design of Vasudev et al.'s scheme is incorrect, and resultantly, the scheme does not provide mutual authentication between a vehicle and vehicle server when multiple vehicles are registered with the vehicle sever. Furthermore, this paper proposes a secure message transmission scheme for V2V in VANETs. The proposed scheme fulfills the security and performance requirements of VANETs. The security analysis of the proposed scheme using formal BAN and informal discussion on security features confirm that the proposed scheme fulfills the security requirements, and the performance comparisons show that the proposed scheme copes with the lightweightness requirements of VANETs. © 2021 Jabar Mahmood et al.