- Cryptography and Data Security
- Advanced Authentication Protocols Security
- UAV Applications and Optimization
- Vehicular Ad Hoc Networks (VANETs)
- User Authentication and Security Systems
- Cryptography and Residue Arithmetic
- Cryptographic Implementations and Security
- Privacy-Preserving Technologies in Data
- IoT and Edge/Fog Computing
- Blockchain Technology Applications and Security
- Security in Wireless Sensor Networks
- Wireless Communication Security Techniques
- Wireless Body Area Networks
- Opportunistic and Delay-Tolerant Networks
- Cloud Data Security Solutions
- Video Surveillance and Tracking Methods
- Chaos-based Image/Signal Encryption
- Speech and Audio Processing
- Mobile Ad Hoc Networks
- Caching and Content Delivery
- Cooperative Communication and Network Coding
- Robotic Path Planning Algorithms
- Biometric Identification and Security
- Advanced Steganography and Watermarking Techniques
- Antenna Design and Optimization
University of Essex
2024-2025
Hamdard University
2019-2023
Hazara University
2016-2020
Abbottabad University of Science and Technology
2018
In this article, unmanned aerial vehicles (UAVs) are expected to play a key role in improving the safety and reliability of transportation systems, particularly where data traffic is nonhomogeneous nonstationary. However, heterogeneous sharing raises plenty security privacy concerns, which may keep UAVs out future intelligent systems (ITS). Some well-known issues UAV-enabled ITS ecosystem include tracking vehicle locations, unauthorized access data, message modification. Therefore, we...
A Flying Ad-hoc Network (FANET) consists of Unmanned Aerial Vehicles (UAVs) tasked to handle the communication jobs in a multi-hop ad-hoc fashion. Unlike its predecessors, i.e. Mobile Networks (MANETs) and Vehicular (VANETs), FANET promises uninterrupted connectivity, especially during events that are temporary stipulate massive audience reach. However, usually, participating UAVs environment resource-constrained are, therefore, prone cyber-attacks. In order resolve issue enable secure...
Today, farmers are suffering from the low yield of crops. Though right crop selection is main boosting key to maximize by doing soil analysis and considering metrological factors, lack knowledge about fertility reason for production. In changed current climate, having primitive conventional farming facing challenges making sagacious decisions on selection. The same in every seasonal cycle makes fertility. This study aimed at an efficient accurate system using IoT devices machine learning...
The evolution of Flying Ad-hoc Networks (FANETs) marks the paradigm shift from a single large drone to multiple small drones linked together in an ad-hoc fashion. To maintain Quality Service (QoS) multi-hop networking schema, FANETs utilize available resources efficiently. However, due open wireless boundary and high mobility drones, are vulnerable malicious nodes that can penetrate network and, thus, pose serious security threats, particularly at Medium Access Control (MAC) layer. Such...
The Internet of Drones (IoD) has recently gained popularity in several military, commercial, and civilian applications due to its unique characteristics, such as high mobility, three-dimensional (3D) movement, ease deployment. Drones, on the other hand, communicate over an unencrypted wireless link have little computational capability a typical IoD environment, making them exposed wide range cyber-attacks. Security vulnerabilities systems include man-in-the-middle attacks, impersonation,...
A smart grid is a new ecosystem, which made by combining number of Internet Things (IoT) devices that manage wide energy sources increasing the efficiency and reliability systems. As IoT in ecosystem generate gigantic amount data needs to be stored managed cloud server. On other hand, server can accessible users, therefore need authenticity secrecy. Here, fulfill security requirements such type communication, signcryption with proxy re-encryption technique most suitable option where...
Named Data Networking (NDN) is one of the future envisioned networking paradigm used to provide fast and efficient content dissemination with interest-based retrieval, name-based routing in-network caching. On hand, this new breed Internet architecture becoming a key technology for data in IoT networks; on other NDN suffers from challenges terms security. Among them, poisoning attack most common security challenge. The aim inject poisoned an invalid signature network. Therefore, prevent...
The Internet of Health Things (IoHT) is an extended breed the (IoT), which plays important role in remote sharing data from various physical processes such as patient monitoring, treatment progress, observation, and consultation. key benefit IoHT platform ease time-independent interaction geographically distant locations by offering preventive or proactive healthcare services at a lower cost. communication, integration, computation, interoperability are provided low-power biomedical sensors...
The integration of the Internet Things (IoT) and telecare medical information system (TMIS) enables patients to receive timely convenient healthcare services regardless their location or time zone. Since serves as key hub for connection data sharing, its open nature presents security privacy concerns should be considered when integrating this technology into current global system. Cybercriminals target TMIS because it holds a lot sensitive patient data, including records, personal...
Unmanned aerial vehicles (UAVs), when interconnected in a multi-hop ad-hoc fashion, or as flying network (FANET), can efficiently accomplish mission-critical tasks. However, UAVs usually suffer from the issues of shorter lifespan and limited computational resources. Therefore, existing security approaches, being fragile, are not capable countering attacks, whether known unknown. Such lapse result debilitated FANET system. In order to cope up with such various efficient signature schemes have...
Recently, the spectacular innovations in fields of wireless body area networks (WBAN) and Internet Things (IoT) have made e-Care services rise as a promising application domain, which significantly advances quality medical system, however, due to openness environment privacy people’s physiological data, WBAN IoT are prone various cyber-attacks. There is significant need for an efficient highly secured cryptographic scheme that can meet requirements resource-constrained devices. Therefore,...
A group of small UAVs can synergize to form a flying ad hoc network (FANET). The are, typically, prone security lapses because limited onboard power, restricted computing ability, insufficient bandwidth, etc. Such limitations hinder the applicability standard cryptographic techniques. Thus, assuring confidentiality and authentication on part UAV remains far-fetched goal. We aim address such an issue by proposing identity-based generalized signcryption scheme. lightweight scheme employs...
Internet of Drones (IoD) is a decentralized networking architecture that makes use the internet for uniting drones to enter controlled airspace in coordinated manner. On one hand, this new clan interconnected has ushered era real-world applications; Small drones, on other are generally not designed with security mind, making them exposed fundamental and privacy concerns. Limited computing capabilities, along communication over an open wireless channel, exacerbate these challenges, IoD...
The Internet of Vehicles (IoV) is considered an enhancement existing vehicular ad-hoc networks, which helps connect mobile vehicles to the Things (IoT) with support 5G networks. To assure quality-of-service demand by users, edge computing paradigm networks can be incorporated in IoV environment for supporting compute-intensive applications. basic safety messages are typically transmitted using a multicast pattern IoV-enabled paradigm. use channel may accelerate communication process;...
Internet of drones (IoD) is a network small that leverages IoT infrastructure to deliver real-time data communication services users. On the one hand, IoD an excellent choice for number military and civilian applications owing key characteristics like agility, low cost, ease deployment; on other are rarely designed with security privacy concerns in mind. Intruders can exploit this vulnerability compromise networks harm information exchange operation. An aggregate signature scheme best...
Vehicular ad hoc networks (VANETs) have become an essential part of the intelligent transportation system because they provide secure communication among vehicles, enhance vehicle safety, and improve driving experience. However, due to openness vulnerability wireless networks, participating vehicles in a VANET are prone variety cyberattacks. To privacy assure authenticity, integrity, nonrepudiation messages, numerous signature schemes been employed literature on VANETs. The majority these...