Saeed Mahfooz

ORCID: 0000-0003-4810-1196
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • IPv6, Mobility, Handover, Networks, Security
  • Advanced Authentication Protocols Security
  • Mobile Ad Hoc Networks
  • Wireless Communication Networks Research
  • Vehicular Ad Hoc Networks (VANETs)
  • Network Traffic and Congestion Control
  • Mobile Agent-Based Network Management
  • Network Packet Processing and Optimization
  • Opportunistic and Delay-Tolerant Networks
  • Context-Aware Activity Recognition Systems
  • IoT and Edge/Fog Computing
  • Advanced MIMO Systems Optimization
  • Advanced Data Compression Techniques
  • Internet Traffic Analysis and Secure E-voting
  • Data Management and Algorithms
  • Cognitive Radio Networks and Spectrum Sensing
  • IoT Networks and Protocols
  • Software-Defined Networks and 5G
  • Caching and Content Delivery
  • Cryptography and Data Security
  • Power Line Communications and Noise
  • Cloud Data Security Solutions
  • Wireless Sensor Networks and IoT
  • Privacy-Preserving Technologies in Data
  • Digital and Cyber Forensics

University of Peshawar
2010-2022

Najran University
2021

The vehicular ad hoc network (VANET) is one of the promising and encouraging technologies, it going to attract great attention in near future. VANET has turned into a main module intelligent transport system. It self-controlled, wheeled (also called on wheels), wider stimulating class mobile (MANET). VANETs raise many innovative challenges because their high-class unique features, such as high-node mobility, dynamic topology changes, wireless links breakage, constancy, scalability. A...

10.1109/access.2017.2732727 article EN cc-by-nc-nd IEEE Access 2017-07-27

Industrial Internet of Things (IIoT) is the other name industrial Internet. It integrates a variety existing automation technologies with computing, machine learning, and communication technologies. Vehicular ad hoc network, an application IIoT, self‐organized network vehicles which tends to provide improved road safety, diminished traffic congestion, ultimate comfort travellers. In VANETs, exchange data each directly or through roadside units (RSUs). Data dissemination in VANETs experiences...

10.1155/2018/1857202 article EN cc-by Wireless Communications and Mobile Computing 2018-01-01

Vehicular ad hoc network (VANET) is a wireless emerging technology that aims to provide safety and communication services drivers passengers. In VANETs, vehicles communicate with other directly or through road side units (RSU) for sharing traffic information. The data dissemination in VANETs challenging issue as the have share critical information real time. distribution usually done using broadcast method resulting inefficient use of resources. Therefore, avoid storm efficiently resources,...

10.1155/2017/4671892 article EN cc-by Mathematical Problems in Engineering 2017-01-01

Abstract Because of the existence Covid-19 and its variants, health monitoring systems have become mandatory, particularly for critical patients such as neonates. However, massive volume real-time data generated by devices necessitates use efficient methods approaches to respond promptly. A fog-based architecture IoT healthcare tends provide better services, but it also produces some issues that must be addressed. We present a bidirectional approach improving transmission monitors minimizing...

10.1186/s13677-022-00371-w article EN cc-by Journal of Cloud Computing Advances Systems and Applications 2022-11-30

IPv6 over Low Power Wireless Personal Area Network (6LoWPAN) provides IP connectivity to the highly constrained nodes in Internet of Things (IoTs). 6LoWPAN allows with limited battery power and storage capacity carry datagrams lossy error-prone radio links offered by IEEE 802.15.4 standard, thus acting as an adoption layer between protocol network. The data link is based on AES (Advanced Encryption Standard), but standard lacks has omitted security privacy requirements at higher layers....

10.32604/cmc.2022.018589 article EN Computers, materials & continua/Computers, materials & continua (Print) 2021-09-08

Health monitoring systems are now required, particularly for essential patients, following the COVID-19 pandemic, which was followed by its variants and other epidemics of a similar nature. Effective procedures strategies though, to react promptly enormous volume real-time data offered equipment. Although fog-based designs IoT health typically result in enhanced services, they also give rise issues that need be resolved. In this paper, we propose two-way strategy reduce network latency use...

10.32604/csse.2023.036316 article EN cc-by Computer Systems Science and Engineering 2023-01-01

The number of wireless services and devices have remarkably increased, especially since the introduction smart phones. population mobile nodes (MNs) is now exceeding traditional non-mobile nodes. Mobility a key factor in core networks as it responsible for providing continuous communication when MN on move. Currently, centralized network architecture implemented, which has certain limitations. Distributed mobility management (DMM) often seen solution to problems associated with (CMM)....

10.3390/electronics8121519 article EN Electronics 2019-12-11

IPv6 over Low Power Wireless Personal Area Network (6LoWPAN) connects the highly constrained sensor nodes with internet using protocol. 6LoWPAN has improved scalability of Internet Things (IoTs) infrastructure and allows mobile to send packets IEEE 802.15.4 wireless network. Several mobility managements schemes have been suggested for handling registration handover procedures in 6LoWPAN. However, these performance constraints, such as increased transmission cost, signalling overhead,...

10.32604/cmc.2021.017177 article EN Computers, materials & continua/Computers, materials & continua (Print) 2021-01-01

Next Generation Networks (NGNs) promise Always Best Connection in heterogeneous networks. Providing end-to-end QoS such environment is a challenging task. Since application's requirements and user's expectations are increasing, gains the significance NGNs. In order to provide NGNs, this paper proposes new protocol Combined SIP HMIPv6 (CSH) with module manager. Unlike other mechanisms, CSH focuses on both core edge The achievements of will include better session terminal mobility, network...

10.1109/iccnit.2011.6020916 article EN 2011-07-01

Abstract Traditional centralized approaches toward mobility management such as MIPv6 and its variants suffer because of the performance issues like single‐point failure, non‐optimal routing, low scalability, authentication latency, signaling messages overhead protocols. In this paper, we propose a novel network‐based Distributed Mobility Authentication Mechanism (DMAM) to focus on these issues. DMAM decomposes functions into Home Address Allocation, routing (MR), location (LM). A new entity...

10.1002/sec.1041 article EN Security and Communication Networks 2014-06-23

Abstract—In this paper we propose a novel Cross-layer Localized Authentication Mechanism (CLAM) to secure mobility in Next Generation Networks. The proposed mechanism integrates Proxy MIPv6 and Session Initiation Protocol (SIP) handle the authentication locally real-time non-real-time communications. design objectives of CLAM are three fold: i) handover latency is minimized by local management authentication; ii) simple implement mobile devices because symmetric cryptographic one-way hash...

10.12720/jcm.9.2.144-156 article EN Journal of Communications 2014-01-01

Next Generation Networks (NGNs) are aiming to integrate different access technologies for the accessibility of heterogeneous platform under control IP protocol. In such a complex environment, availability high data rates, bandwidth, security, and end-to-end QoS major challenges. this paper cross-layer localized mobility management based on Session Initiation Protocol (SIP) Hierarchical MIPv6 (HMIPv6) is proposed support providence end-to- end QoS; network session mobility; reduce latency;...

10.12720/jcm.9.3.217-225 article EN Journal of Communications 2014-01-01

Frequent itemsets mining is one of the interesting applications data mining. Recently has got a great deal attention due to explosive growth in and economic scientific need for turning such into useful information. However, traditional frequent algorithms have become inefficient work with large datasets effectively on single machine computational power memory limits. Current methods prefer control execution time output by using higher minimum support thresholds, which lead less candidates...

10.1145/2908446.2908457 article EN 2016-05-09

Web applications have gained an enormous increase in popularity for providing various facilities online, such as e-shopping, e-banking, e-ticketing, e-learning etc. As the use of web grow, there is attacks on well. Among these attacking techniques, SQL Injection has been emerging one most dangerous threats to applications. technique mostly attack data driven By especially built user input through form fields, attacker can access and modify contents underlying database a application. This...

10.1109/futuretech.2010.5482721 article EN 2010-01-01

Most of the file systems today are based on desktop metaphor utilizing hierarchies folders and sub-folders for information storage retrieval. A folder is usually assumed to store semantically related in form files sub-folders. However, there always exist somewhere else local system hierarchy. Users often fail find these disconnected or discover relationship among these. File maintain a plain set metadata items about each which could be utilized some hidden relationships. this...

10.1109/icosst.2016.7838590 article EN 2016-12-01

In today's world of communication, everything is going wireless. The licensed and unlicensed bands the Radio Frequency (RF) spectrum play a key role in wireless communication. Considering tremendous growth applications devices, RF can be thought as sacred resource it vital component which makes communication possible. addition, limited even more important to utilize efficiently. Cognitive (CR) technology considered solution for efficient usage spectrum. Keeping significance mind, this paper...

10.1109/iccnit.2011.6020931 article EN 2011-07-01
Coming Soon ...