İqra Mustafa

ORCID: 0000-0002-6047-6882
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Blockchain Technology Applications and Security
  • Cryptography and Data Security
  • Cryptographic Implementations and Security
  • Vehicular Ad Hoc Networks (VANETs)
  • Smart Grid Energy Management
  • IoT Networks and Protocols
  • Smart Grid Security and Resilience
  • Chaos-based Image/Signal Encryption
  • IoT and Edge/Fog Computing
  • Network Security and Intrusion Detection
  • Security in Wireless Sensor Networks
  • Advanced Malware Detection Techniques
  • Quantum Computing Algorithms and Architecture
  • Energy Load and Power Forecasting
  • Advanced MIMO Systems Optimization
  • Security and Verification in Computing
  • Software-Defined Networks and 5G
  • Cloud Data Security Solutions
  • Advanced Wireless Communication Technologies
  • Wireless Communication Security Techniques
  • Insurance and Financial Risk Management
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Polynomial and algebraic computation
  • Electric Vehicles and Infrastructure
  • Energy Efficient Wireless Sensor Networks

Munster Technological University
2020-2024

Institute of Business Leadership
2021

National Yang Ming Chiao Tung University
2020-2021

COMSATS University Islamabad
2020

Quaid-i-Azam University
2016

As novel technologies continue to reshape the digital era, cyberattacks are also increasingly becoming more commonplace and sophisticated. Distributed denial of service (DDoS) attacks are, perhaps, most prevalent exponentially-growing attack, targeting varied emerging computational network infrastructures across globe. This necessitates design an efficient early detection large-scale sophisticated DDoS attacks. Software defined networks (SDN) point a promising solution, as paradigm which...

10.1109/access.2020.2976908 article EN cc-by IEEE Access 2020-01-01

Day-ahead electricity price forecasting plays a critical role in balancing energy consumption and generation, optimizing the decisions of market participants, formulating trading strategies, dispatching independent system operators. Despite fact that much research on has been published recent years, it remains difficult task because challenging nature prices includes seasonality, sharp fluctuations price, high volatility. This study presents three-stage short-term model by employing ensemble...

10.3390/forecast3030028 article EN cc-by Forecasting 2021-06-22

Conventional RSA algorithm, being a basis for several proposed cryptosystems, has remarkable security laps with respect to confidentiality and integrity over the internet which can be compromised by state-of-the-art attacks, especially, different types of data generation, transmission, analysis IoT applications. This threat hindrance is considered hard problem solve on classical computers. However, bringing quantum mechanics into account, concept no longer holds true. So, this calls out...

10.1109/access.2020.2995801 article EN cc-by IEEE Access 2020-01-01

The concept of smart contracts (SCs) is becoming more prevalent, and their application gaining traction across many diverse scenarios. However, producing poorly constructed carries significant risks, including the potential for substantial financial loss, a lack trust in technology, risk exposure to cyber-attacks. Several tools exist assist developing SCs, but limited functionality increases development complexity. Expert knowledge required ensure contract reliability, resilience,...

10.3389/fbloc.2023.1276233 article EN cc-by Frontiers in Blockchain 2024-01-08

Among several approaches to privacy-preserving cryptographic schemes, we have concentrated on noise-free homomorphic encryption. It is a symmetric key encryption that supports operations encrypted data. We present fully (FHE) scheme based sedenion algebra over finite ℤ <sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">n</sub> rings. The innovation of the compression 16-dimensional vector for application Frobenius automorphism. For sedenion, p <sup...

10.1109/access.2020.3007717 article EN cc-by IEEE Access 2020-01-01

Wireless Sensor Networks (WSNs) provide noteworthy advantages over conventional methods for various real-time applications, i.e., healthcare, temperature sensing, smart homes, homeland security, and environmental monitoring. However, limited resources, short life-time network constraints, security vulnerabilities are the challenging issues in era of WSNs. Besides, WSNs performance is susceptible to anomalies, particularly misdirection attacks. The above-mentioned pose our attentions produce...

10.1109/iwcmc48107.2020.9148445 article EN 2022 International Wireless Communications and Mobile Computing (IWCMC) 2020-06-01

10.1109/icbc59979.2024.10634424 article EN 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC) 2024-05-27

With the existing Long Term Evolution(LTE) based Cellular Vehicle to Anything(C-V2X) infrastructure and recent advancements in 5G implemented Ultra Reliable Low Latency Communication(URLLC), comes need of fast secure communications Connected Autonomous Vehicles(CAVs). Physical layer can always be a reliable medium for exploitation while having legit communication as source performance latency optimization besides enhanced spectrum efficiency depicted by multicasting its adequate worth....

10.1109/isncc49221.2020.9297191 article EN 2022 International Symposium on Networks, Computers and Communications (ISNCC) 2020-10-20

In a traditional vehicle to anything (V2X) use case, we already have sophisticated service provisioning infrastructure based on the Long-term evolution design for addressing group of same content receiving entities through evolved multimedia broadcast multicast services employment proven be practically realizable apt architecture, more specifically viable connected autonomous vehicles (CAVs). With resource exploitation advantage in cars making up an Intelligent Transport System (ITS) comes...

10.1109/cacs50047.2020.9289814 article EN 2020-11-04

Long term evolution (LTE) infrastructure already had proven itself as a sophisticated resource provisioning architecture for the earlier networks. With recent surge in connected devices 5G networks, we encounter new challenges existing environments. They include latency stringent extremely dynamic access requests, autonomous handling of resources online markets order to effectively benefit consumers and service providers simultaneously. In this paper, address these problems by formulating...

10.1109/iceccme52200.2021.9591152 article EN 2022 International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME) 2021-10-07

The 5th generation (5G) of communication networks will facilitate innovative and emerging services applications having lower latency requirements, increased energy efficiency reliability. These characteristics 5G make it capable to act as a potential underlying network for smart city such implementation demand response in grids. More specifically, terms response, these low are used the explicit exchange messages between utility companies customers pricing mechanisms. According time use (ToU)...

10.1109/vtc2020-spring48590.2020.9129415 article EN 2020-05-01

Now-a-days, secure communication is a significant characteristic that should be proficient to accommodate increasing demand of wireless communication. The fundamental principle the extraction secret key and keeping this secret. In paper, we propose innovative approach for reconciliation. We exploit channel reciprocity through relative calibration use reciprocal as between two legitimate users. method, there no physical sharing users so eavesdropper could not interfere confidential also prove...

10.1109/icosst.2016.7838577 article EN 2016-12-01
Coming Soon ...