Yazar "Usman, Muhammad" seçeneğine göre listele
Listeleniyor 1 - 4 / 4
Sayfa Başına Sonuç
Sıralama seçenekleri
Öğe Fuzzy-in-the-Loop-Driven Low-Cost and Secure Biometric User Access to Server(IEEE-Inst Electrical Electronics Engineers Inc, 2021) Irshad, Azeem; Usman, Muhammad; Chaudhry, Shehzad Ashraf; Bashir, Ali Kashif; Jolfaei, Alireza; Srivastava, GautamFuzzy systems can aid in diminishing uncertainty and noise from biometric security applications by providing an intelligent layer to the existing physical systems to make them reliable. In the absence of such fuzzy systems, a little random perturbation in captured human biometrics could disrupt the whole security system, which may even decline the authentication requests of legitimate entities during the protocol execution. In the literature, few fuzzy logic-based biometric authentication schemes have been presented; however, they lack significant security features including perfect forward secrecy (PFS), untraceability, and resistance to known attacks. This article, therefore, proposes a novel two-factor biometric authentication protocol enabling efficient and secure combination of physically unclonable functions, a physical object analogous to human fingerprint, with user biometrics by employing fuzzy extractor-based procedures in the loop. This combination enables the participants in the protocol to achieve PFS. The security of the proposed scheme is tested using the well-known real-or-random model. The performance analysis signifies the fact that the proposed scheme not only offers PFS, untraceability, and anonymity to the participants, but is also resilient to known attacks using light-weight symmetric operations, which makes it an imperative advancement in the category of intelligent and reliable security solutions.Öğe Isocoumarins and 3,4-dihydroisocoumarins, amazing natural products: a review(TÜBİTAK, 2017) Saddiqa, Aisha; Usman, Muhammad; Çakmak, OsmanThe isocoumarins are naturally occurring lactones that constitute an important class of natural products exhibiting an array of biological activities. A wide variety of these lactones have been isolated from natural sources and, due to their remarkable bioactivities and structural diversity, great attention has been focused on their synthesis. This review article focuses on their structural diversity, biological applications, and commonly used synthetic modes.Öğe A Provably Secure and Efficient Authenticated Key Agreement Scheme for Energy Internet-Based Vehicle-to-Grid Technology Framework(Institute of Electrical and Electronics Engineers Inc., 2020) Irshad, Azeem; Usman, Muhammad; Chaudhry, Shehzad Ashraf; Naqvi, Husnain; Shafiq, MuhammadThe energy Internet (EI)-based vehicle-to-grid (V2G) technology facilitates the electric vehicles not only to distribute additional electricity into grid systems, but also support receiving back from the power grid in the form of charging. The secure key establishment is quite significant to initiate the bidirectional electricity power delivery into and from the system. To effectively implement any EI-based V2G communication, the authentication protocol must be free from cyber attacks. In this article, we not only explore the drawbacks of several smart grid-based authentication protocols but also bring forth the limitations of a recently presented EI-based V2G scheme by Gope and Sikdar. The examined drawbacks in this protocol may disrupt its proper functioning, since it faces desynchronization problems while logging into the mobile device bearing registration parameters. The scheme is also vulnerable to replay attack and man-in-the-middle attack. The user is also unable to validate session key in the protocol. Considering these limitations, we propose a novel and efficient V2G protocol framework enabling the vehicles to communicate or recharge at desired recharging stations. The results of the proposed framework are compared with several contemporary schemes, and its security features are validated by random oracle model-based formal analysis. © 1972-2012 IEEE.Öğe Security Hardened and Privacy Preserved Vehicle-to-Everything (V2X) Communication(WILEY-HINDAWI, ADAM HOUSE, 3RD FL, 1 FITZROY SQ, LONDON WIT 5HE, ENGLAND, 2022) Irshad, Azeem; Shafiq, Muhammad; Chaudhry, Shehzad Ashraf; Usman, MuhammadVehicle-to-everything (V2X) communications have recently gained concentration of researchers for both, academia as well as industry. In the V2X system, the information is communicated from vehicle sensors to other vehicles, infrastructure, pedestrians, and mobile network cloud through high-bandwidth reliable links [1–4]. &e technology may greatly improve the driver’s awareness of imminent hazards, thereby reducing the severity of accidents, fatalities, or possible collisions with other vehicles. &e V2X technology brings efficiency through creating warning alerts for drivers, imparting the information of alternative routes for avoiding possible traffic congestions and pinpointing available parking spaces. Such critical situations might become problematic if the security and privacy of V2X communication system is compromised [5–8]. &us, V2X vehicles along with efficiency, reliability, and safety parameters require more secure and robust communication protocols to meet the upcoming security challenges. Moreover, the wireless nature of the system might become challenging in affording secure and ubiquitous connectivity to the V2X network [9–13]. &is is crucial to create a fail-safe infrastructure of modern traffic scenario regarding smart cities since security and privacy issues are quite prevalent in our daily lives.