Humaira Ashraf

ORCID: 0000-0001-5067-3172
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Energy Efficient Wireless Sensor Networks
  • IoT and Edge/Fog Computing
  • Network Security and Intrusion Detection
  • Blockchain Technology Applications and Security
  • Security in Wireless Sensor Networks
  • Wireless Body Area Networks
  • Sentiment Analysis and Opinion Mining
  • Advanced Authentication Protocols Security
  • Advanced Malware Detection Techniques
  • IPv6, Mobility, Handover, Networks, Security
  • Energy Harvesting in Wireless Networks
  • Internet of Things and AI
  • Topic Modeling
  • Vehicular Ad Hoc Networks (VANETs)
  • Information and Cyber Security
  • Hip disorders and treatments
  • Digital Transformation in Industry
  • Natural Antidiabetic Agents Studies
  • Online Learning and Analytics
  • Big Data and Business Intelligence
  • Chaos-based Image/Signal Encryption
  • Spam and Phishing Detection
  • Advanced Steganography and Watermarking Techniques
  • Cloud Data Security Solutions
  • Text and Document Classification Technologies

Taylor's University
2023-2025

International Islamic University, Islamabad
2014-2024

Sher-e-Kashmir University of Agricultural Sciences and Technology of Kashmir
2024

Jinnah University for Women
2022

National Institute of Cardiovascular Diseases
2021-2022

Rutgers New Jersey Medical School
2021

Rutgers, The State University of New Jersey
2021

Ziauddin Hospital
2021

Liaquat University of Medical & Health Sciences
2021

Hospital for Special Surgery
2020

Internet of medical things (IoMT) is getting researchers' attention due to its wide applicability in healthcare. Smart healthcare sensors and IoT enabled devices exchange data collaborate with other smart without human interaction securely transmit collected sensitive towards the server nodes. Alongside communications, security privacy also quite challenging aggregate Fog cloud servers. We explored existing surveys identify a gap literature that survey fog-assisted secure collection schemes...

10.1109/access.2021.3052850 article EN cc-by IEEE Access 2021-01-01

The Internet of Things (IoT) is gaining attention because its broad applicability, especially by integrating smart devices for massive communication during sensing tasks. IoT-assisted Wireless Sensor Networks (WSN) are suitable various applications like industrial monitoring, agriculture, and transportation. In this regard, routing challenging to find an efficient path using transmitting the packets towards big data repositories while ensuring energy utilization. This paper presents Robust...

10.32604/cmc.2021.015533 article EN Computers, materials & continua/Computers, materials & continua (Print) 2021-01-01

An IoT-based wireless sensor network (WSN) comprises many small sensors to collect the data and share it with central repositories. These are battery-driven resource-restrained devices that consume most of energy in sensing or collecting transmitting it. During sharing, security is an important concern such networks as they prone threats, which deadliest wormhole attack. attacks launched without acquiring vital information highly compromise communication, security, performance network. In...

10.32604/cmc.2021.015259 article EN Computers, materials & continua/Computers, materials & continua (Print) 2021-01-01

10.1007/s12652-020-02728-y article EN Journal of Ambient Intelligence and Humanized Computing 2021-01-02

The popularity of wireless sensor networks for establishing different communication systems is increasing daily. A network consists sensors prone to various security threats. These nodes make a vulnerable denial-of-service attacks. One them wormhole attack that uses low latency link between two malicious and affects the routing paths entire network. This brutal as it resistant many cryptographic schemes hard observe within paper provides comprehensive review literature on subject detection...

10.3390/electronics11152324 article EN Electronics 2022-07-26

The Internet of Things (IoT) uses wireless networks without infrastructure to install a huge number sensors that track system, physical, and environmental factors. There are variety WSN uses, some well-known application factors include energy consumption lifespan duration for routing purposes. have detecting, processing, communication capabilities. In this paper, an intelligent healthcare system is proposed which consists nano collect real-time health status transfer it the doctor's server....

10.3390/s23115055 article EN cc-by Sensors 2023-05-25

Internet of Medical Things (IoMT) is becoming an essential part remote health monitoring due to the evolution medical wireless sensors and intelligent communication technologies. IoT-based healthcare applications are employed in centers provide continuous a patient. However, recent smart devices have limited resources handle huge amount data. IoMT faces several challenging issues, like security, privacy, anonymity, interoperability. In data aggregation communication, privacy security...

10.1109/access.2021.3101668 article EN cc-by IEEE Access 2021-01-01

Mission critical applications impose the requirements of reliability and network efficiency on Underwater Wireless Sensor Networks (UWSN). Innovative routing solutions are therefore required for efficient data forwarding. In this paper, we propose a cooperative scheme UWSNs to enhance performance. Many communication protocols developed investigating physical MAC layer aspects improve link in harsh underwater environment, however, at layer, it is still largely unexplored. Cooperation employed...

10.1109/bwcca.2014.45 article EN 2014-11-01

Software Requirements Engineering has paved its roots in both industry and academia, as today's complex systems are programmed to provide efficient user-centric functionalities. This also refers the emergence of challenges Elicitation techniques, approaches, tools while performing them. Particularly, area for software development, a number techniques approaches have been observed literature but mobile application which is different from traditional not discussed much past studies. Short...

10.1109/access.2018.2874981 article EN cc-by-nc-nd IEEE Access 2018-01-01

The new generation of wireless body area networks (WBAN) for the internet things (IoT) is emerging in a fast-paced. Today patients can be tested using remote clinical nanosensors. WBAN involves small interconnected sensors collection ongoing medical data and transmitted through further processing. However, protection healthcare very important difficult because various active passive numbers attacks. Although there exist several literatures on security techniques such as digital signatures,...

10.1109/access.2020.3028686 article EN cc-by IEEE Access 2020-01-01

Internet of Things (IoT) comprises a huge number connected devices that can communicate within the same network and across networks. IoT-enabled wireless sensor networks (WSNs) are getting growing interest due to its wide applicability in healthcare, patient monitoring, transportation, surveillance. The main issue is mostly deployed hostile environments where an attacker may physically destroy CHs or other technical fault occur. It isolates cluster causes loss sensitive data from region....

10.1109/jiot.2021.3098635 article EN IEEE Internet of Things Journal 2021-07-20

Nowadays, secure and reliable management of logistics is highly needed. Logistics the delivery goods from producers to legitimate consumers in accurate amounts good conditions. The use low-capable sensor nodes smart makes it vulnerable many security threats. Smart necessitated suitable information authorized person at appropriate time place, which only feasible with a stable infrastructure. This paper presents an authentication scheme together blockchain technology provide supply chain...

10.1109/icbats57792.2023.10111371 article EN 2022 International Conference on Business Analytics for Technology and Security (ICBATS) 2023-03-07

The paper provides an explicit outlook on the development of a comprehensive sentiment analysis systems for online social media by targeting user-generated text and images platforms such as Twitter, Facebook, Instagram. system is developed to provide complete users' emotions expressions media. project composed three interconnected sections, Text-based model, Image-based model web application prototype that integrates these models real time results. text-based includes, data preprocessing,...

10.1109/khi-htc60760.2024.10482213 article EN 2024-01-08

Cloud Computing facilitates business by storing an enormous amount of data in the cloud transmitted over Internet with seamless access to and no hardware compatibility limitations. However, during transmission is vulnerable man middle, known plain text, chosen cipher related key pollution attack.Therefore,uploading on a single may increase risk damage confidential data. Existing literature study uncovered multiple cryptography techniques such as SA-EDS, Reliable Framework for Data...

10.1109/access.2020.3004433 article EN cc-by IEEE Access 2020-01-01

With the new age of data innovation, Internet Things (IoT) proliferation has drawn enormous thought and applied to help applications in different fields i.e. natural assurance, military observing, industrial applications. WSNs are essential segment IoT for monitoring as well tracking. The most preeminent provide confinement identification continuous objects wildfire, toxic gas, bio synthetics concoctions, so forth. In case such fire gases detected identify boundary damage alert teams rescue...

10.1109/access.2021.3110203 article EN cc-by IEEE Access 2021-01-01

Summary Wireless sensor networks (WSNs) consist of hundreds small sensors that collect and report data. During data sharing, these WSNs become vulnerable to numerous security threats, including the deadly ones. Mitigating this risk is a real challenge, especially in low‐resource environment such as WSN. In work, using systematic literature review, we surveyed large body research (28 studies) focused on mitigating wormhole attacks. Through study, evaluate impact many proposed schemes their...

10.1002/dac.5311 article EN International Journal of Communication Systems 2022-08-02

Mobile Ad hoc Networks (MANETs) play an important role in the technological era by enabling wireless communication dynamic and infrastructure-free contexts. Because of Manet’s unique qualities decentralized nature, MANETs are subject to many attacks such as Blackhole attack, grey hole Byzantine Wormhole Sybil attack. pose a substantial risk MANETs. A attack occurs when malicious node impersonates identities inside network, resulting creation multiple suspicious nodes that appear...

10.20944/preprints202401.0508.v1 preprint EN 2024-01-05
Coming Soon ...