- IoT and Edge/Fog Computing
- Security in Wireless Sensor Networks
- Energy Efficient Wireless Sensor Networks
- Wireless Body Area Networks
- Opportunistic and Delay-Tolerant Networks
- Vehicular Ad Hoc Networks (VANETs)
- Advanced Authentication Protocols Security
- Caching and Content Delivery
- Mobile Ad Hoc Networks
- Privacy-Preserving Technologies in Data
- Cooperative Studies and Economics
- IPv6, Mobility, Handover, Networks, Security
- Cloud Data Security Solutions
- Energy Harvesting in Wireless Networks
- Blockchain Technology Applications and Security
- Cryptography and Data Security
- Internet of Things and AI
- Autonomous Vehicle Technology and Safety
- Network Security and Intrusion Detection
- Wireless Communication Security Techniques
- Mobile Crowdsensing and Crowdsourcing
- Software Engineering Techniques and Practices
- Context-Aware Activity Recognition Systems
- Electricity Theft Detection Techniques
- Smart Parking Systems Research
National University of Modern Languages
2015-2024
Hong Kong University of Science and Technology
2024
University of Hong Kong
2024
New Cross Hospital
2023
The Royal Wolverhampton NHS Trust
2023
International Islamic University Chittagong
2022
ORCID
2018-2022
Pakistan Agricultural Research Council
2021
University of Science and Technology Beijing
2018-2020
University of Malakand
2020
Internet of medical things (IoMT) is getting researchers' attention due to its wide applicability in healthcare. Smart healthcare sensors and IoT enabled devices exchange data collaborate with other smart without human interaction securely transmit collected sensitive towards the server nodes. Alongside communications, security privacy also quite challenging aggregate Fog cloud servers. We explored existing surveys identify a gap literature that survey fog-assisted secure collection schemes...
With the rapid growth in connected vehicles and related innovative applications, it is getting keen interest among researchers. Vehicular ad-hoc networks (VANETs) comprise of interconnected with sensing capabilities to exchange traffic, weather emergency information. Intelligent transportation system (ITS) supports better coordination providing reliable services. In VANET, topology dynamic due high mobility vehicles, therefore, existing topology-based schemes are not suitable. this paper, we...
The Internet of Things (IoT) is gaining attention because its broad applicability, especially by integrating smart devices for massive communication during sensing tasks. IoT-assisted Wireless Sensor Networks (WSN) are suitable various applications like industrial monitoring, agriculture, and transportation. In this regard, routing challenging to find an efficient path using transmitting the packets towards big data repositories while ensuring energy utilization. This paper presents Robust...
With the ever-growing demand of electric power, it is quite challenging to detect and prevent Non-Technical Loss (NTL) in power industries. NTL committed by meter bypassing, hooking from main lines, reversing tampering meters. Manual on-site checking reporting remains an unattractive strategy due required manpower associated cost. The use machine learning classifiers has been attractive option for detection. It enhances data-oriented analysis high hit ratio along with less cost requirements....
With the rapid growth in connected vehicles, FoG-assisted vehicular ad hoc network (VANET) is an emerging and novel field of research. For information sharing, a number messages are exchanged various applications, including traffic monitoring area-specific live weather social aspects monitoring. It quite challenging where vehicles' speed, direction, density neighbors on move not consistent. In this scenario, congestion avoidance also to avoid communication loss during busy hours or emergency...
Tuberculosis (TB) is an infectious disease that can lead towards death if left untreated. TB detection involves extraction of complex manifestation features such as lung cavity, air space consolidation, endobronchial spread, and pleural effusions from chest x-rays (CXRs). Deep learning based approach named convolutional neural network (CNN) has the ability to learn CXR images. The main problem CNN does not consider uncertainty classify CXRs using softmax layer. It lacks in presenting true...
Abstract We live in the era of Intelligent Transport Systems (ITS), which is an extension Vehicular AdHoc Networks (VANETs). In VANETs, vehicles act as nodes connected with each other and sometimes a public station. Vehicles continuously exchange collect information to provide innovative transportation services; for example, traffic management, navigation, autonomous driving, generation alerts. However, VANETs are extremely challenging data collection, due their high mobility dynamic network...
Cognitive radio network (CRN) is getting growing interest of the researchers due to its wide applicability for spectrum sharing with massive number active devices in Internet Things (IoT). In existing schemes, a large part may remain underutilized which was assigned service providers as primary users (PU). Secondary user (SU) be alternative use spectrum. The main challenge that SU keeps on sending packets an incremental manner until free channel found real conditions. It results excessive...
Physical unclonable function (PUF) is hardware-specific security primitive for providing cryptographic functionalities that are applicable secure communication among the embedded devices. The physical structure of PUF considered to be easy manufacture but hard or impossible replicate due variations in its manufacturing process. However, a large community analytics believes hardware-based has paved way realisation dependable security. In this study, authors have thoroughly explored...
With the continuous development of Artificial Intelligence (AI), autonomous driving has become a popular research area. AI enables system to make judgment, which makes studies on reaches period booming development. However, due defects AI, it is not easy realize general intelligence, also limits driving. In this paper, we summarize existing architectures and taxonomy. Then introduce concept hybrid human-artificial intelligence (H-AI) into semi-autonomous system. For making better use H-AI,...
Internet of Medical Things (IoMT) is becoming an essential part remote health monitoring due to the evolution medical wireless sensors and intelligent communication technologies. IoT-based healthcare applications are employed in centers provide continuous a patient. However, recent smart devices have limited resources handle huge amount data. IoMT faces several challenging issues, like security, privacy, anonymity, interoperability. In data aggregation communication, privacy security...
Internet of Things (IoT) comprises large number smart devices that can exchange sensed data by availing online services. Smart directly interact with the human beings for sensing healthcare parameters and transmitting to a central repository. During exchange, it is mandatory secure messages between sender receiver handle malicious based attacks. For providing communication, signature-based schemes are explored in literature but need more lightweight operations ensuring desired security...
Abstract Power companies are responsible for producing and transferring the required amount of electricity from grid stations to individual households. Many countries suffer huge losses in billions dollars due non-technical loss (NTL) power supply companies. To deal with NTL, many machine learning classifiers have been employed recent time. However, few has studied about performance evaluation metrics that used NTL detection evaluate how good or bad classifier is predicting loss. This paper...
Internet of Things (IoT) comprises huge number connected smart devices to exchange sensed data across different networks. With the rapid growth in security applications development, Physical Unclonable Functions (PUF) has gain interest researchers. PUF exploits random factors IC manufacturing process generate a variety mismatches. It helps unique challenge-response pairs store repository and then use for secure associations between IoT. Memory based Analog electronic PUFs are mostly used...
Mobile ad-hoc networks (MANETs) comprise a large number of mobile wireless nodes that can move in random fashion with the capability to join or leave network anytime. Due rapid growth devices on Internet Things (IoT), messages are transmitted during information exchange dense areas. It cause congestion results increasing transmission delay and packet loss. This problem is more severe larger traffic high mobility enforces dynamic topology. To resolve these issues, we present bandwidth aware...
Internet of Things (IoT) comprises a huge number connected devices that can communicate within the same network and across networks. IoT-enabled wireless sensor networks (WSNs) are getting growing interest due to its wide applicability in healthcare, patient monitoring, transportation, surveillance. The main issue is mostly deployed hostile environments where an attacker may physically destroy CHs or other technical fault occur. It isolates cluster causes loss sensitive data from region....
Internet of Things (IoT) is a network physical objects or things that can communicate and share information. In IoT-enabled Wireless Medical Sensor Network (WMSN), the smart sensing devices remote patient monitoring data towards central repositories. During medical aggregation transmission, security mandatory to guard against intruders. The main problem in existing base schemes complex multiplication operations are used for batch key creation. These computationally expensive require huge...
Internet-of-Things (IoT) include a large number of devices that can communicate across different networks. Cyber-Physical Systems (CPS) also includes connected to the internet where wearable are included. Both systems enable researchers develop healthcare with additional intelligence as well prediction capabilities both for lifestyle and in hospitals. It offers much persistence platform ubiquitous by using sensors transfer information over servers, smartphones, other smart Telecare Medical...
Wireless Sensor Networks (WSNs) consist of lightweight devices to measure sensitive data that are highly vulnerable security attacks due their constrained resources. In a similar manner, the internet-based used in Internet Things (IoT) facing severe and privacy issues because direct accessibility connection internet. Complex resource-intensive schemes infeasible reduce network lifetime. this regard, we have explored polynomial distribution-based key establishment identified an issue...
Cloud computing has become a significant model in the IT industry. In this emerging model, resources such as software, hardware, networking, and storage can be accessed anywhere world on pay-per-use basis. However, storing sensitive data un-trusted servers is challenging issue for model. To guarantee confidentiality proper access control of outsourced data, classical encryption techniques are used. schemes not feasible cloud because their lack flexibility, scalability, fine-grained control....