Muhammad Tanveer

ORCID: 0000-0001-9836-9970
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Authentication Protocols Security
  • User Authentication and Security Systems
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Cryptography and Data Security
  • Security in Wireless Sensor Networks
  • UAV Applications and Optimization
  • Cryptographic Implementations and Security
  • Advanced MIMO Systems Optimization
  • Cognitive Radio Networks and Spectrum Sensing
  • Vehicular Ad Hoc Networks (VANETs)
  • Biometric Identification and Security
  • Privacy, Security, and Data Protection
  • Opportunistic and Delay-Tolerant Networks
  • Indoor and Outdoor Localization Technologies
  • Energy Efficient Wireless Sensor Networks
  • Cloud Data Security Solutions
  • Smart Grid Security and Resilience
  • Wireless Body Area Networks
  • Wireless Networks and Protocols
  • Machine Learning and ELM
  • Nasal Surgery and Airway Studies
  • Advanced Wireless Communication Technologies
  • Mobile Ad Hoc Networks
  • Spam and Phishing Detection
  • Brain Tumor Detection and Classification

University of Management and Technology
2022-2025

Ghulam Ishaq Khan Institute of Engineering Sciences and Technology
2019-2022

China Railway Group (China)
2020

Tsinghua University
2020

Beijing Jiaotong University
2020

Hong Kong University of Science and Technology
2020

Southeast University
2020

University of International Business and Economics
2020

Advanced Neural Dynamics (United States)
2020

Internet of Drones (IoD) is the interconnection unmanned aerial vehicles or drones deployed for collecting sensitive data to be used in critical applications. The transmit collected control room (CR) analysis, while CR sends commands drone monitor their operations. This exchange information between and takes place through a wireless communication channel, which susceptible various security risks. Therefore, it vital ensure confidentiality integrity such IoD environment. To this end,...

10.1109/jiot.2021.3084946 article EN IEEE Internet of Things Journal 2021-06-04

A drone is an unmanned aerial vehicle, which deployed in a particular Fly Zone (FZ), and used to collect crucial information from its surrounding environment be transmitted the server for further processing.Generally, Mobile User (MU) required access real-time collected by stationed specific FZ securely.Therefore, ensure secure reliable communications Authenticated Key Exchange (AKE) protocol imperative Internet of Drone (IoD) environment.An AKE scheme ensures only authentic MU IoD network...

10.1109/access.2020.3019367 article EN cc-by IEEE Access 2020-01-01

In response to the rapid advancements in facial manipulation technologies, particularly facilitated by Generative Adversarial Networks (GANs) and Stable Diffusion-based methods, this paper explores critical issue of deepfake content creation. The increasing accessibility these tools necessitates robust detection methods curb potential misuse. context, investigates Vision Transformers (ViTs) for effective image detection, leveraging their capacity extract global features. Objective: primary...

10.3390/computers13010031 article EN cc-by Computers 2024-01-21

The rise of smart cities and the increasing demand for drones has sparked considerable interest in Internet Drones (IoD) within realms academia industry. IoD presents a multitude advantages city settings, facilitating services like traffic monitoring, environmental surveillance, disaster management by harnessing potential IoT Flying Ad-Hoc Networks (FANET) infrastructures. However, transmission sensitive messages between IoD-based is disseminated over insecure channels, leaving them exposed...

10.1109/tvt.2024.3365992 article EN IEEE Transactions on Vehicular Technology 2024-02-14

The Internet of Things (IoT) has emerged as a revolutionary communication technology, enabling the connection resource-limited devices to Internet. These are deployed in various industrial control systems remotely monitor and applications. However, public Internet's inherent vulnerability malicious attacks poses significant challenge secure operation these systems. To address this challenge, lightweight efficient authentication framework, LEAF-IIoT, is proposed. LEAF-IIoT leverages...

10.1109/access.2024.3357090 article EN cc-by-nc-nd IEEE Access 2024-01-01

With the rapid progress of communication technology, Internet Things (IoT) has emerged as an essential element in our daily lives. Given that IoT encompasses diverse devices often have limited resources terms communication, computation, and storage. Consequently, National Institute Standards Technology (NIST) standardized several lightweight cryptographic algorithms for encryption decryption, specifically designed to meet needs resource-constrained devices. These algorithms, known...

10.1016/j.eij.2024.100474 article EN cc-by-nc-nd Egyptian Informatics Journal 2024-05-14

Ensuring security and privacy in the Internet of Things (IoT) while taking into account resource-constrained nature IoT devices is challenging. In smart home (SH) applications, remote users (RUs) need to communicate securely with network entities through public procure real-time information. While 6LoWPAN adaptation-layer standard provides resource-efficient IPv6 compatibility low-power wireless networks, basic design does not include features. A authenticated key exchange (AKE) scheme...

10.1109/jiot.2021.3085595 article EN IEEE Internet of Things Journal 2021-06-04

The revolutionary advancement in the capabilities of hardware tools, software packages, and communication techniques gave rise to Internet Things-supported drone networks (IoD), thereby enabling smooth among devices applications, impacting drastically various aspects human lives. However, with increasing sophistication infrastructure IoD, new security threats arise that require novel algorithms schemes as solutions. To this end, several have recently been proposed. some cannot perfectly...

10.1109/access.2022.3149376 article EN cc-by IEEE Access 2022-01-01

With the widespread utilization of Internet-enabled smart devices (SDs), Industrial Internet Things (IIoT) has become prevalent in recent years. SDs exchange information through open Internet, which creates security and privacy concerns for exchanged information. To address these concerns, various solutions exist literature which, because high computational communication overheads, are not appropriate resource-constricted IIoT environment. This article proposes a resource-efficient...

10.1109/jiot.2022.3188711 article EN IEEE Internet of Things Journal 2022-07-20

The phenomenal growth of smartphones and wearable devices has begun crowd-sourcing applications for the Internet Things (IoT). E-healthcare is considered essential service IoT that help remote access or storage medical server (MS) data to authorized doctors, patients, nurses, etc., via public Internet. As exposed various security attacks, user authenticated key exchange (AKE) become a pressing need secure reliable use these services. This paper proposes new resource-efficient AKE scheme...

10.1109/access.2022.3153069 article EN cc-by IEEE Access 2022-01-01

Internet of Drones (IoD) offers several advantages, such as enabling ground communications in areas with connectivity limitations due to physical obstacles. However, IoD also introduces new security vulnerabilities. For instance, an attacker could launch a drone capture attack obtain confidential credentials and inject counterfeit information into the network, jeopardizing its smooth operation. In scenarios, authentication plays crucial role ensuring security. Unfortunately, existing...

10.1109/tvt.2023.3306813 article EN IEEE Transactions on Vehicular Technology 2023-08-24

Smart home environments are a vital component of the larger ecosystem within smart cities, aiming to revolutionize residential living through integration Internet Things (IoT) devices and advanced technologies. However, ensuring robust security preserving privacy in these interconnected ecosystems present significant challenges. During monitoring controlling tasks environment, diverse commands exchanged between IoT device user over public Internet. The is open vulnerable various attacks,...

10.3390/math11163450 article EN cc-by Mathematics 2023-08-09

Enhancing spectrum utilization efficiency (SUE) to accommodate the multitude of 5G-based IoT devices within available scarce has been a pivotal point research in current decade. Equipped with interweave and underlay modes, cognitive radio networks (CRNs) are envisioned be most promising technology for SUE enhancement. Since is swiftly transforming into heterogeneous network, hybrid underlay-interweave mode CRNs appear optimal key Besides enhancing SUE, ensuring fairness among secondary users...

10.1109/access.2020.2981413 article EN cc-by IEEE Access 2020-01-01

Lightweight cryptography (LWC)-based authenticated encryption with associative data (AEAD) cryptographic primitives require fewer computational and energy resources than conventional as a single operation of an AEAD scheme provides confidentiality, integrity, authenticity data. This feature schemes helps design access control (AC) protocol to be leveraged for enhancing the security resource-constrained Internet Things (IoT)-enabled smart grid (SG) system low overhead operations. article...

10.1109/jiot.2021.3113469 article EN IEEE Internet of Things Journal 2021-09-17

In Internet of Drones (IoD), unmanned aerial vehicles (UAVs) or drones are deployed in various mission-critical applications to collect sensitive data and disseminate it the server placed on ground station. Users mostly require real-time from drones, instead information stored by server, specific perform timely actions. However, performing communication with a drone through public channel, which is exposed different security risks, mandates an authenticated key exchange (AKE) between users...

10.1109/tnse.2022.3151843 article EN IEEE Transactions on Network Science and Engineering 2022-02-15

10.1109/tvt.2025.3548625 article EN IEEE Transactions on Vehicular Technology 2025-01-01

IPv6 over Low Power Wireless Personal Area Networks (6LoWPAN) has an ample share in the Internet of Things. Sensor nodes 6LoWPAN collect vital information from environment and transmit to a central server through public Internet. Therefore, it is inevitable secure communications allow legitimate sensor access network resources. This paper presents lightweight Authentication Key Exchange (AKE) scheme for using authenticated encryption algorithm hash function. Upon successful authentication,...

10.3390/s20092707 article EN cc-by Sensors 2020-05-09

Internet of Things-enabled smart grid (SG) technology provides ample advantages to traditional power grids. In an SG system, the meter (SM) is critical component that collects usage information related users and delivers accumulated vital central service provider (CSP) via Internet, imperiled numerous pernicious security threats. Consequently, it crucial preserve integrity communication between SMs CSP for smooth running system. Authentication protocol effectively enables SM communicate...

10.1109/access.2021.3121291 article EN cc-by-nc-nd IEEE Access 2021-01-01

Smart grid (SG) recently acquired considerable attention due to their utilization in sustaining demand response management power systems. meters (SMs) deployed SG systems collect and transmit data the server. Since all communications between SM server occur through a public communication channel, transmitted are exposed adversary attacks. Therefore, security privacy essential requirements system for ensuring reliable communication. Additionally, an AuthentiCation (AC) protocol designed...

10.3390/s23042309 article EN cc-by Sensors 2023-02-19
Coming Soon ...