Muhammad Faizan Ayub

ORCID: 0000-0001-7616-0420
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Authentication Protocols Security
  • User Authentication and Security Systems
  • Cryptography and Data Security
  • Vehicular Ad Hoc Networks (VANETs)
  • Security in Wireless Sensor Networks
  • Biometric Identification and Security
  • Blockchain Technology Applications and Security
  • Smart Grid Security and Resilience
  • Advanced Malware Detection Techniques
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • RFID technology advancements
  • Power Line Communications and Noise
  • Multimedia Learning Systems
  • Wireless Body Area Networks
  • Information Retrieval and Data Mining
  • Security and Verification in Computing
  • Wireless Communication Security Techniques
  • Digital Rights Management and Security
  • Cloud Data Security Solutions
  • Edcuational Technology Systems

University of Electronic Science and Technology of China
2023-2025

COMSATS University Islamabad
2020-2023

Universitas Informatika dan Bisnis Indonesia
2021

Johns Hopkins University
2020

Modern information technology has been utilized progressively to store and distribute a large amount of healthcare data reduce costs improve medical facilities. In this context, the emergence e-Health clouds offers novel opportunities, like easy remote accessibility data. However, achievement produces plenty new risks challenges how provide integrity, security, confidentiality highly susceptible Among these challenges, authentication is major issue that ensures in not available illegal...

10.1016/j.dcan.2020.06.003 article EN cc-by-nc-nd Digital Communications and Networks 2020-07-11

With the advent of state-of-art technologies, Telecare Medicine Information System (TMIS) now offers fast and convenient healthcare services to patients at their doorsteps. However, this architecture engenders new risks challenges patients' server's confidentiality, integrity security. In order avoid any resource abuse malicious attack, employing an authentication scheme is widely considered as most effective approach for TMIS verify legitimacy server. Therefore, several protocols have been...

10.1016/j.dcan.2021.07.002 article EN cc-by-nc-nd Digital Communications and Networks 2021-07-16

The Internet of Things (IoT) has a wide range applications that influence the life people expeditiously. In recent years, IoT becomes an emerging technology in number fields. Different devices with divergent functionality are applied to work several domains. These domains include smart home, farming, and Industrial (IIoT). Among these territories, IIoT obtains more attention. environment, legitimate user can control access remotely. Legitimate users real-time data share confidential...

10.1109/tii.2022.3156629 article EN IEEE Transactions on Industrial Informatics 2022-03-07

Globally, the development of Intelligent Cyber-Physical Transportation Systems (ICTS) aims to tackle several challenges, including reducing traffic accidents and fuel usage, alleviating congestion, shortening travel time, enhancing overall transportation safety. These systems leverage advanced customer-centric communication networked control methods, such as inter-vehicle, vehicle-to-roadside (V2R), vehicle-to-vehicle (V2V) through use vehicular ad hoc networks (VANETs) cover all aspects...

10.1109/tce.2023.3324273 article EN IEEE Transactions on Consumer Electronics 2023-10-16

The development of the industrial Internet Things and smart grid networks has emphasized importance secure communication for future electric power transmission. However, current deployment meters wireless methods presents several security concerns that must be addressed to ensure sustainable resilient Industry 5.0, with a focus on consumer-centric technologies. In this context, we propose privacy-focused authentication solution demand response management in networks, incorporating consumer...

10.1109/tce.2023.3320974 article EN IEEE Transactions on Consumer Electronics 2023-09-29

The popularity of vehicles promotes the evolution smart cities. This development makes vehicular ad-hoc network (VANET) a widely used inter-vehicular communication to obtain information about road conditions, speed, vehicle location and traffic congestion. Such public is vulnerable different security threats. Overall, private data in VANET critical task. It has been observed that various authentication protocols have devised for VANETs. However, most proposed are not secure reliable because...

10.1109/tits.2023.3266030 article EN IEEE Transactions on Intelligent Transportation Systems 2023-04-19

The idea of a smart city and the utilization vehicles are emerging rapidly. For inter-vehicular communication, this progression builds Vehicular Ad-Hoc Network (VANET) an extensively used network. VANET is to obtain information regarding road's condition, location vehicles, speed, traffic congestion description. exchange in public which leads severe security threats. Generally, one most crucial tasks data. So it becomes urgent researchers. We have reviewed several authentication schemes for...

10.1109/tvt.2023.3286187 article EN IEEE Transactions on Vehicular Technology 2023-01-01

Smart grid plays an important role in managing demand response management modern smart city using Information and Communication Technologies (ICTs). In environment, sensors are widely used for surveillance. These deployed on the high tension power supply lines which help to share information control center about line breakage or any other flaw. Besides cyber-attacks, may also experience physical attacks as they high-tension open environment. Moreover, attacker can impersonate exchanged...

10.1109/tsg.2021.3072244 article EN IEEE Transactions on Smart Grid 2021-04-09

Telecare Medical Information System (TMIS) encourages patients to securely exchange their health data with a remote medical server for real-time diagnosis. During the access of patients' information, privacy and security have loomed as indispensable issues. To address these issues, secure authentication mechanism is imperative that can efficiently verify legitimacy TMIS server. Therefore, we introduce an extended scheme robust anonymity Internet-of-Things-enabled multiserver infrastructure...

10.1109/jsyst.2021.3118014 article EN IEEE Systems Journal 2021-12-02

The agriculture is the backbone of economic system, and it plays an essential part in survival a nation’s prosperity. In addition to providing raw materials food, also offers numerous employment opportunities. Consequently, necessitates modern technology increase productivity. these circumstances, Wireless Sensor Networks (WSNs) are used detect climatic parameters like light, humidity, carbon dioxide, acidity, soil moisture, temperature agricultural field. However, research that being done...

10.1145/3607142 article EN ACM Transactions on Sensor Networks 2023-07-03

The epidemic growth of the Internet Things (IoT) objects have revolutionized Maritime Transportation Systems (MTS). Though, it becomes challenging for centralized cloud-centric framework to fulfil application requirements such as low latency and power utilization. introduction distributed edge-centric has recently helped IoT-enabled MTS meet these by manipulating tasks at edge networks. Despite fact that leverages mobile subscribers overcoming inherent cloud computing limitations, data...

10.1109/tits.2023.3295818 article EN IEEE Transactions on Intelligent Transportation Systems 2023-07-25

Universal Serial Bus (USB) is widely used, for example to facilitate hot-swapping and plug-and-play. However, USB ports can be exploited by an adversary extract private or personal data from the connected devices. Hence, a number of organizations workplaces have prohibited their employees using devices, there been efforts design secure storage device schemes more effectively resist different known security attacks. designing such challenging. For example, in this article we revisit Wei et...

10.1109/tce.2020.3035566 article EN IEEE Transactions on Consumer Electronics 2020-11-01

The rapid advancement in the field of wireless sensor and cellular networks have established a rigid foundation for Internet Things (IoT). IoT has become novel standard that incorporates various physical objects by allowing them to collaborate with each other. A large number services applications emerging include healthcare, surveillance, industries, transportation, security. service provider (SP) offers several are accessible through smart from any time, anywhere, place via Internet. Due...

10.1155/2020/8829319 article EN Journal of Sensors 2020-09-22

The extensive use of vehicles evolved the concept smart city, due to which Vehicular Ad-hoc Network (VANET) is broadly acknowledged for communication vehicles. This helps obtain information like location a vehicle, road condition and traffic congestion description, among others. Certainly, secure data transmission in VANET has become great challenge researchers. numerous authentication protocols have been devised VANETs preserve anonymity privacy However, most existing suffer from heavy...

10.1109/icais50930.2021.9395888 article EN 2021-03-25

Summary Information and communication technology (ICT) can add appealing attributes such as transparency, energy conservation, cost reduction, reliability, efficiency to the traditional power grid. The addition of these is possible due concept a smart grid (SG). However, ICT applications engender new access control challenges. Therefore, many studies have been conducted in recent years investigate that most significant challenge privacy. In light studies, two problems identified for SG...

10.1002/dac.5115 article EN International Journal of Communication Systems 2022-02-13

Firewall is an algorithm that allows filtering activities to determine access restrictions on a komputer can use Publik network and which s cannot pass through access, this commonly called filtering. As time goes by, the development of today's technology increasing rapidly. sophistication major influence in facilitating human life. Based this, authors create IpSec/L2TP Protocol as Security Solution for PT.Neu Indonesia, aims prevent attacks types malware found site circulating networks by it...

10.31294/coscience.v1i2.435 article EN cc-by-nc-sa Computer Science (CO-SCIENCE) 2021-07-26

Macaroons are authorization credentials which have high efficiency and expressiveness that rivals public-key-based mechanisms like Simple Public Key Infrastructure (SPKI) / Distributed Security (SDSI). simple easy to deploy similar web cookies. Additionally, they offer secure delegation via their chained hashed message authentication code (HMAC) construction provides a construct for decentralized delegation. These characteristics motivating factors the adoption of macaroons; however, modern...

10.1109/sss47320.2020.9174369 article EN 2020-07-01
Coming Soon ...