Yazar "Chaudhry, Shehzad Ashraf" seçeneğine göre listele
Listeleniyor 1 - 20 / 73
Sayfa Başına Sonuç
Sıralama seçenekleri
Öğe Adaptive Fault-Tolerant System and Optimal Power Allocation for Smart Vehicles in Smart Cities Using Controller Area Network(WILEY-HINDAWI, ADAM HOUSE, 3RD FL, 1 FITZROY SQ, LONDON WIT 5HE, ENGLAND, 2021) Biswal, Anil Kumar; Singh, Debabrata; Pattanayak, Binod Kumar; Samanta, Debabrata; Chaudhry, Shehzad Ashraf; Irshad, AzeemNowadays, the power consumption and dependable repeated data collection are causing the main issue for fault or collision in controller area network (CAN), which has a great impact for designing autonomous vehicle in smart cities. Whenever a smart vehicle is designed with several sensor nodes, Internet of ,ings (IoT) modules are linked through CAN for reliable transmission of a message for avoiding collision, but it is failed in communication due to delay and collision in communication of message frame from a source node to the destination. Generally, the emerging role of IoT and vehicles has undoubtedly brought a new path for tomorrow’s cities. ,e method proposed in this paper is used to gain fault-tolerant capability through Probabilistic Automatic Repeat Request (PARQ) and also Probabilistic Automatic Repeat Request (PARQ) with Fault Impact (PARQ-FI), in addition to providing optimal power allocation in CAN sensor nodes for enhancing the performance of the process and also significantly acting a role for making future smart cities. Several message frames are needed to be retransmitted on PARQ and fault impact (PARQ-FI) calculates the message with a response probability of each node.Öğe Amassing the Security: An ECC-Based Authentication Scheme for Internet of Drones(IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 445 HOES LANE, PISCATAWAY, NJ 08855-4141, 2021) Hussain, Sajid; Chaudhry, Shehzad Ashraf; Alomari, Osama Ahmad; Alsharif, Mohammed H.; Khan, Muhammad Khurram; Kumar, NeerajThe continuous innovation and progression in hardware, software and communication technologies helped the expansion and accelerated growth in Internet of Things based drone networks (IoD), for the devices, applications and people to communicate and share data. IoD can enhance comfort in many applications including, daily life, commercial, and military/rescue operations in smart cities. However, this growth in infrastructure smartness is also subject to new security threats and the countermeasures require new customized solutions for IoD. Many schemes to secure IoD environments are proposed recently; however, some of those were proved as insecure and some degrades the efficiency. In this article, using elliptic curve cryptography, we proposed a new authentication scheme to secure the communication between a user and a drone flying in some specific flying zone. The security of the proposed scheme is solicited using formal Random oracle method along with a brief discussion on security aspects provided by proposed scheme. Finally, the comparisons with some related and latest schemes is illustrated.Öğe Analyzing and evaluating the energy efficiency based on multi-5G small cells with a mm-waves in the next generation cellular networks(Institute of Advanced Engineering and Science, 2020) Alsharif, Mohammed H.; Yahya, Khalid; Chaudhry, Shehzad AshrafThis paper evaluates the impact of multi-5G small cell systems on the energy efficiency (EE) in a Fifth Generation (5G) of cellular networks. Both the proposed model and the analysis of the EE in this study take into account (i) the path losses, fading, and shadowing that affect the received signal at the user equipment (UE) within the same cell, and (ii) the interference effects of adjacent cells. In addition, the concepts of new technologies such as large MIMO in millimeter range communication have also been considered. The simulation results show that the interference from adjacent cells can degrade the EE of a multi-cell cellular network. With the high interference the number of bits that will be transferred per joule of energy is 1.29 Mb/J with a 0.25 GHz bandwidth and 16 transmit antennas. While, with a 1 GHz bandwidth the transfer rate increases to 5.17 Mb/J. Whereas, with 64 transmit antennas the EE improved to 5.17 Mb/J with a 0.25 GHz BW and 20.70 Mb/J with a 1 GHz BW. These results provide insight into the impact of the number of antennas in millimeter range communication and the interference from adjacent cells on achieving real gains in the EE of multi-5G small cells cellular network. Copyright © 2020 Institute of Advanced Engineering and Science. All rights reserved.Öğe An anonymous device to device access control based on secure certificate for internet of medical things systems(ELSEVIER, RADARWEG 29, 1043 NX AMSTERDAM, NETHERLANDS, 2021) Chaudhry, Shehzad Ashraf; Irshad, Azeem; Nebhen, Jamel; Bashir, Ali Kashif; Moustafa, Nour; Al-Otaibi, Yasser D.; Bin Zikria, YousafThe Internet of Medical Things (IoMT) is structured upon both the sensing and communication infrastructure and computation facilities. The IoMT provides the convenient and cheapest ways for healthcare by aiding the remote access to the patients’ physiological data and using machine learning techniques for help in diagnosis. The communication delays in IoMT can be very harmful to healthcare. Device to device (D2D) secure communication is a vital area that can reduce communication delays; otherwise, caused due to the mediation of a third party. To substantiate a secure D2D communication framework, some schemes were recently proposed to secure D2D based communication infrastructure suitable for IoMT-based environments. However, the insecurities of some schemes against device physical capture attack and non-provision of anonymity along with related attacks are evident from the literature. This calls for a D2D secure access control system for realizing sustainable smart healthcare. In this article, using elliptic curve cryptography, a certificate based D2D access control scheme for IoMT systems (D2DAC-IoMT) is proposed. The security of the proposed D2DAC-IoMT is substantiated through formal and informal methods. Moreover, the performance analysis affirms that the proposed scheme provides a good trade-off between security and efficiency compared with some recent schemes.Öğe An Anonymous Device to Device Authentication Protocol Using ECC and Self Certified Public Keys Usable in Internet of Things Based Autonomous Devices(MDPI, ST ALBAN-ANLAGE 66, CH-4052 BASEL, SWITZERLAND, 2020) Alzahrani, Bander A.; Chaudhry, Shehzad Ashraf; Barnawi, Ahmed; Al-Barakati, Abdullah; Shon, TaeshikTwo party authentication schemes can be good candidates for deployment in Internet of Things (IoT)-based systems, especially in systems involving fast moving vehicles. Internet of Vehicles (IoV) requires fast and secure device-to-device communication without interference of any third party during communication, and this task can be carried out after registration of vehicles with a trusted certificate issuing party. Recently, several authentication protocols were proposed to enable key agreement in two party settings. In this study, we analyze two recent protocols and show that both protocols are insecure against key compromise impersonation attack (KCIA) as well as both lack of user anonymity. Therefore, this paper proposes an improved protocol that does not only resist KCIA and related attacks, but also offers comparable computation and communication. The security of proposed protocol is tested under formal model as well as using well known Burrows-Abadi-Needham (BAN) logic along with a discussion on security features. While resisting the KCIA and related attacks, proposed protocol also provides comparable trade-of between security features and efficiency and completes a round of key agreement in just 13.42 ms, which makes it a promising candidate to be deployed in IoT environments.Öğe ARAP-SG: Anonymous and Reliable Authentication Protocol for Smart Grids(IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 445 HOES LANE, PISCATAWAY, NJ 08855-4141, 2021) Tanveer, Muhammad; Khan, Abd Ullah; Shah, Habib; Alkhayyat, Ahmed; Chaudhry, Shehzad Ashraf; Ahmad, MusheerInternet of Things-enabled smart grid (SG) technology provides ample advantages to traditional power grids. In an SG system, the smart meter (SM) is the critical component that collects the power usage information related to users and delivers the accumulated vital information to the central service provider (CSP) via the Internet. The information is exposed to numerous pernicious security threats. Consequently, it is crucial to preserve the integrity of the communication between SMs and CSP for the smooth running of the SG system. Authentication protocol effectively enables SM and CSP to communicate securely by establishing a secure channel. Therefore, this paper presents an anonymous and reliable authentication protocol for SG (ARAP-SG) to enable secure and reliable information exchange between SM and CSP. The proposed ARAP-SG uses the hash function, elliptic curve cryptography, and symmetric encryption to complete the authentication phase. Consequently, ARAP-SG guarantees reliable information exchange during the authentication phase while conserving the anonymity of both SP and SM. Additionally, ARAP-SG authorizes CSP and SM to construct a session key (SK) after accomplishing the authentication phase for undecipherable information exchange in the future. We utilize the random oracle model to corroborate the security of the constructed SK in ARAP-SG. Moreover, by effectuating informal security analysis, it is manifested that ARAP-SG is proficient in thwarting covert security attacks. Furthermore, Scyther-based analysis is conducted to manifest that ARAP-SG is secure. Finally, through a comparative analysis with relevant authentication protocols, it is explained and shown that ARAP-SG entails 25.5-56.76% and 7.69- 49.47% low computational and communication overheads, respectively, with improved security properties.Öğe Artificial intelligence technology for diagnosing COVID-19 cases: a review of substantial issues(VERDUCI PUBLISHER, VIA GREGORIO VII, ROME 186-00165, ITALY, 2020) Alsharif, Mohammed H.; Alsharif, Yahia H.; Chaudhry, Shehzad Ashraf; Albreem, Mahmoud A. M.; Jahid, Abu; Hwang, EenjunToday, the world suffers from the rapid spread of COVID-19, which has claimed thousands of lives. Unfortunately, its treatment is yet to be developed. Nevertheless, this phenomenon can be decelerated by diagnosing and quarantining patients with COVID-19 at early stages, thereby saving numerous lives. In this study, the early diagnosis of this disease through artificial intelligence (AI) technology is explored. AI is a revolutionizing technology that drives new research opportunities in various fields. Although this study does not provide a final solution, it highlights the most promising lines of research on AI technology for the diagnosis of COVID-19. The major contribution of this work is a discussion on the following substantial issues of AI technology for preventing the severe effects of COVID-19: (1) rapid diagnosis and detection, (2) outbreak and prediction of virus spread, and (3) potential treatments. This study profoundly investigates these controversial research topics to achieve a precise, concrete, and concise conclusion. Thus, this study provides significant recommendations on future research directions related to COVID-19.Öğe Attacks and Solutions for a Two-Factor Authentication Protocol for Wireless Body Area Networks(WILEY-HINDAWI, ADAM HOUSE, 3RD FL, 1 FITZROY SQ, LONDON WIT 5HE, ENGLAND, 2021) Chen, Chien-Ming; Li, Zhen; Chaudhry, Shehzad Ashraf; Li, LongAs an extension of the 4G system, 5G is a new generation of broadband mobile communication with high speed, low latency, and large connection characteristics. It solves the problem of human-to-thing and thing-to-thing communication to meet the needs of intelligent medical devices, automotive networking, smart homes, industrial control, environmental monitoring, and other IoT application needs. 'is has resulted in new research topics related to wireless body area networks. However, such networks are still subject to significant security and privacy threats. Recently, Fotouhi et al. proposed a lightweight and secure two-factor authentication protocol for wireless body area networks in medical IoT. However, in this study, we demonstrate that their proposed protocol is still vulnerable to sensor-capture attacks and the lack of authentication between users and mobile devices. In addition, we propose a new protocol to overcome the limitations mentioned above. A detailed comparison shows that our proposed protocol is better than the previous protocols in terms of security and performance.Öğe Blockchain for Fool-Proof E-Voting Systems(Springer Science and Business Media Deutschland GmbH, 2022) Yadav, Janardan Krishna; Jangirala, Srinivas; Verma, Deepika Chandra; Srivastava, Shashi Kant; Chaudhry, Shehzad AshrafBlockchain-enabled e-voting system (BEV) is the need of the hour for many organizations and for democracies. With allegations being raised on validity of the voting system and mass protests, e.g., in the USA as well as the allegations of some hired tech companies interfering in elections of different countries, it is indispensable to have a reliable voting system to know the opinion of the voters. As paper ballot has its own issues of processing, safety and ease of e-voting is the way forward. Blockchain-based e-voting system can fix the loopholes that lead to voting frauds by first providing a unique ID to the voter and the eligible voters can cast a ballot anonymously at his comfort using a PC or smartphone. Second, the BEV’s encrypted key and tamper-proof personal IDs can help to ensure the validity of the submitted vote, if any discrepancy happens it can be easily identified by the modified blockchain. The blockchain-enabled e-voting system relies on the encrypted data transfer and storage on distributed ledger that can be confirmed from any node of the blockchain. The voter ID cards are issued to the eligible voters, this ID card contains encrypted files that identify the owner and allows him/her to carry out a number of online transactions; say, for example, for a single time voting a single “coin” can be uploaded to the wallet of the user account that can be used to cast their vote only once. The voters are allowed to change their vote as many times they wish for a particular duration, say three days till the voting closes. Once the user confirms the vote by using the verification PIN or credentials, it is verified for authenticity. In the next stage, the identified authentic votes are transferred to the counting server and accounted for as advised by the voter. A non-blockchain e-voting system may leave many points where the frauds can happen for example under reporting of votes received, selecting a few responses that favor some candidate, corrupting the data, or erasing the data rendering the voting exercise invalid, etc. Blockchain proposes the possible solutions to each of these problems of the existing e-voting systems in practice. The BEV can provide the solution to the challenges any voting system in any level of organization may face, e.g., no coercion of the voters, anonymity of the voter, proof of a valid vote, correct counting and accounting of votes, avoiding single entity control on vote tallying and election result announcement, weeding out ineligible voters. All these issues will be discussed in detail in the chapter. This chapter often uses blockchain currency analogy to keep the reader interested and makes it easier for the reader who is not familiar with the blockchain technology or is familiar only with the bitcoins and focuses on major issues like voter access and voter fraud. Some used cases are also provided to illustrate the benefits and challenges in implementing the blockchain-based e-voting system industry that has remained at the forefront when it comes to technology adaptation and it seems the case for adaptation of blockchain technology. Blockchain technology has appeared as a landmark revolution in data encryption and storage. The distributed ledger system allows the hashes to be available with multiple nodes any time and tampering and modification create a new hash hence makes it easy to confirm the authenticity of the data files and track the node where the changes happened. Blockchain technology promises a great future for digital data security for digital transactions be it informational or monetary. Industries that deal with information exchange between multiple stakeholders like aviation industry have found multiple applications of blockchain technology, and the adaptations in the industry are advancing but still there is a long way to go. In this chapter, we discuss various transaction situations in the aviation industry where the blockchain technology can be of use or have already been put to practice. © 2022, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.Öğe A clogging resistant secure authentication scheme for fog computing services(ELSEVIER, RADARWEG 29, 1043 NX AMSTERDAM, NETHERLANDS, 2021) Ali, Zeeshan; Chaudhry, Shehzad Ashraf; Mahmood, Khalid; Garg, Sahil; Lv, Zhihan; Bin Zikria, YousafFog computing (FC) is an infrastructure consisting of decentralized computing, where computing resources such as storage, applications, and data are scattered among the cloud and data source. Fog computing inherits similar privacy and security concerns present in cloud computing, such as authentication and key management issues. Recently, Wazid et al. presented a scheme of authentication key exchange for fog computing called SAKA-FC to address these issues. We analyzed and identified that the SAKA-FC suffers from some severe vulnerabilities. Furthermore, we presented an improved scheme to mitigate these problems while retaining its strengths. The formal security analysis of the proposed scheme is validated through BAN logic. At the same time, the AVISPA tool is employed for automated formal security verification. Informal security analysis is conducted to attest that the proposal can confront the known attacks. Using computation and communication costs as the metrics, the proposed scheme is also compared with some state-of-the-art schemes. The proposed scheme achieves the same communication cost as of SAKA-FC, whereas the difference in computation cost is 24%. This increase in computation cost is justifiable as the proposal is resistant to clogging attacks and provides better security than the prior schemes.Öğe Combating Identity De-Synchronization: An improved Lightweight Symmetric key based Authentication scheme for IoV(Taiwan Ubiquitous Information CO LTD, 2021) Chaudhry, Shehzad AshrafDue to its resource-friendly nature, symmetric-key based authentication methods are prioritized over public key infrastructure for employment in resource-constrained devices. Recently, a large number of symmetric-key based authentication protocols are proposed; however, the real progress is still marginal owing to repeated mistakes. Specifi-cally, the emphasis on anonymity and privacy alongside the computational and commu-nicative efficiencies has introduced some design flaws. The Identity De-Synchronization (ID-S) is one of such important issues that surfaced owing to such design flaws. This article aims to emphasize the causes and pitfalls of ID-S and for this purpose, a recent symmetric-key based authentication for the internet of vehicles (IoV) is analyzed. Pre-cisely, it is to show in this article that the scheme of Xu et al. is vulnerable against ID-S under the widely used DY adversarial model. The article also proposes the avail-able remedies to avoid ID-S and proposes an improved scheme. © 2021, Taiwan Ubiquitous Information CO LTD. All rights reserved.Öğe Comment on 'ElGamal cryptosystem-based secure authentication system for cloud-based IoT applications'(Wiley, 2021) Irshad, Azeem; Chaudhry, Shehzad AshrafThis comment is presented to identify the drawbacks in a recently demonstrated scheme by Maitra et al., SAS-Cloud: doi:, which adopted an ElGamal cryptosystem-based technique for biometric authentication in cloud-based IoT applications. In this protocol, the authors claim that their scheme provides mutual authentication. However, it is demonstrated in this article that the protocol merely supports unilateral authentication, which may result in clogging attack on the server's end. This is because the latter is unable to verify the authentication request in absolute terms, which might lead to resource clogging as well as denial of service attack affecting its Quality of Service (QoS).Öğe Comments on “A Secure, Privacy-Preserving, and Lightweight Authentication Scheme for VANETs”(IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 445 HOES LANE, PISCATAWAY, NJ 08855-4141, 2022) Chaudhry, Shehzad AshrafVery recently in 2021, Nandy et al. proposed an authentication scheme (IEEE Sensors Journal, 21(18), pp. 20998-21011, DOI: 10.1109/JSEN.2021.3097172, 2021) using elliptic curve cryptography and symmetric key-based hash functions and claimed it to provide privacy-preserving security for the VANETs. Nandy et al. further claimed that their designed method outperforms some of the existing schemes. Despite, the claim that their scheme can be deployed in real-world VANETs scenarios, this study mentions a critical design flaw in the computation of the key pair of each of the vehicles participating in the vehicular networks. Specifically, it is shown that a vehicle in Nandy et al.’s scheme cannot generate its private key. As a result, the public key of the vehicle is also void. Furthermore, it is also argued in this paper that Nandy et al.’s scheme does not provide vehicle privacy and during communication, two vehicles exchange useless pseudo numbers without any open or hidden identification information. Moreover, owing to the non-verification of the credentials of the process initiating vehicle, the scheme of Nandy et al. can become a prey to clogging attack.Öğe Comments on “Biometrics-Based Privacy-Preserving User Authentication Scheme for Cloud-Based Industrial Internet of Things Deployment”(IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 445 HOES LANE, PISCATAWAY, NJ 08855-4141, 2019) Hussain, Sajid; Chaudhry, Shehzad AshrafVery recently, Das et al. (IEEE Internet of Things Journal, pp. 4900–4913, 5(6), DOI: 10.1109/JIOT.2018.2877690, 2018) presented a biometric-based solution for security and privacy in Industrial Internet of Things architecture. Das et al. claimed that their protocol is secure against known attacks. However, this comment shows that their protocol is defenseless against stolen verifier, stolen smart device, and traceability attacks. The attacker having access to public parameters and any of the verifier and parameters stored in smart device can easily expose the session key shared among the user and the smart device. Moreover, their protocol fails to provide perfect forward secrecy. Finally, this article also provides some necessary guidelines on attack resilience for the authentication schemes based on merely the symmetric key primitives, which are overlooked by Das et al.Öğe Correcting "PALK: Password-based anonymous lightweight key agreement framework for smart grid"(ELSEVIER SCI LTD, THE BOULEVARD, LANGFORD LANE, KIDLINGTON, OXFORD OX5 1GB, OXON, ENGLAND, 2021) Chaudhry, Shehzad AshrafVery recently in 2020, Khan et al. proposed an authentication scheme (PALK) for the smart grid infrastructure. Based on elliptic curve cryptography (ECC), symmetric hash functions and block cipher based encryption/ decryption operations, the scheme was argued to work efficiently and securely in smart grid based infrastructure. However, in this paper, we prove that PALK has incorrect login and authentication phase; mainly, due to a superficial ECC operation involving the multiplication of two points over the curve. Moreover, in the scheme of Khan et al. the responding entity without knowing any clue of the initiator, uses the public key of the initiator for the completion of the authentication process, which is also not possible in the presence of multiple communicating devices. These design flaws lead to the situation, where the smart grid entities are unable to complete even a single cycle of authentication. Finally, we propose a quick solution to fix the pertinent flaws of the PALK. The security and correctness of the proposed solution iPALK is proved using formal BAN logic, automated tool ProVerif along with a brief discussion on the correctness of the scheme. The performance comparisons also show that the iPALK not only provides the correctness, but it is more efficient in terms of computation and communication costs.Öğe Correcting design flaws: An improved and cloud assisted key agreement scheme in cyber physical systems(ELSEVIER, RADARWEG 29, 1043 NX AMSTERDAM, NETHERLANDS, 2020) Chaudhry, Shehzad Ashraf; Shon, Taeshik; Al-Turjman, Fadi; Alsharif, Mohammed H.The on demand availability of resources in Cyber physical system (CPS) has emerged as a viable service providing platform to improve the resource usability and reducing the infrastructure costs. Nevertheless, the development recompenses can only be realized after avoiding security and privacy issues. A secure and reliable CPS can offer improved efficiency, usability and reliability along with autonomy. To secure such systems, in 2018 Challa a al. (2018) proposed a security system to extend an authenticated key agreement between a user and a cloud server via trusted authority; as an application, they also customized their system to work with autonomous smart meter and cloud server. Challa a al. then claimed the security of their proposed scheme through formal, informal and automated validations. However, this paper unveils the weaknesses of their scheme and shows that their scheme cannot facilitate in forming a session key between the user/smart meter and the cloud server. Precisely, in the presence of more than one registered users/smart meters, the latter in their scheme may never receive a response message because of a critical design error. Moreover, their scheme lacks the untraceable anonymity and the lack of request verification on cloud server side may also lead to replay and/or denial of services attack. The article then introduces an improved and secure authentication system free of correctness issues, to facilitate a key agreement between user and cloud server via trusted authority. As an application, the proposed system also works for smart meter and cloud server to reach a key agreement. Based on the hardness assumption of Elliptic Curve Decisional Diffi-Hellman Problem (ECDDHP), the formal Random oracle model proves the security of the proposed scheme. Moreover, the robustness of the scheme is explained through informal analysis. The proposed system while providing all known security features has slightly increased the computation and communication costs as compared with the scheme of Challa a al. The proposed scheme completes a cycle of authentication by exchanging 2080 bits in just 13.4066 ms.Öğe DAWM: Cost-Aware Asset Claim Analysis Approach on Big Data Analytic Computation Model for Cloud Data Centre(WILEY-HINDAWI, ADAM HOUSE, 3RD FL, 1 FITZROY SQ, LONDON WIT 5HE, ENGLAND, 2021) Mekala, M. S.; Patan, Rizwan; Islam, S. K. Hafizul; Samanta, Debabrata; Mallah, Ghulam Ali; Chaudhry, Shehzad AshrafThe heterogeneous resource-required application tasks increase the cloud service provider (CSP) energy cost and revenue by providing demand resources. Enhancing CSP profit and preserving energy cost is a challenging task. Most of the existing approaches consider task deadline violation rate rather than performance cost and server size ratio during profit estimation, which impacts CSP revenue and causes high service cost. To address this issue, we develop two algorithms for profit maximization and adequate service reliability. First, a belief propagation-influenced cost-aware asset scheduling approach is derived based on the data analytic weight measurement (DAWM) model for effective performance and server size optimization. Second, the multiobjective heuristic user service demand (MHUSD) approach is formulated based on the CPS profit estimation model and the user service demand (USD) model with dynamic acyclic graph (DAG) phenomena for adequate service reliability. The DAWM model classifies prominent servers to preserve the server resource usage and cost during an effective resource slicing process by considering each machine execution factor (remaining energy, energy and service cost, workload execution rate, service deadline violation rate, cloud server configuration (CSC), service requirement rate, and service level agreement violation (SLAV) penalty rate). The MHUSD algorithm measures the user demand service rate and cost based on the USD and CSP profit estimation models by considering service demand weight, tenant cost, and energy cost. The simulation results show that the proposed system has accomplished the average revenue gain of 35%, cost of 51%, and profit of 39% than the state-of-the-art approaches.Öğe Designing an Efficient and Secure Message Exchange Protocol for Internet of Vehicles(WILEY-HINDAWI, ADAM HOUSE, 3RD FL, 1 FITZROY SQ, LONDON WIT 5HE, ENGLAND, 2021) Chaudhry, Shehzad AshrafIn the advancements in computation and communication technologies and increasing number of vehicles, the concept of Internet of Vehicles (IoV) has emerged as an integral part of daily life, and it can be used to acquire vehicle related information including road congestion, road description, vehicle location, and speed. Such information is very vital and can benefit in a variety of ways, including route selection. However, without proper security measures, the information transmission among entities of IoV can be exposed and used for wicked intentions. Recently, many authentication schemes were proposed, but most of those authentication schemes are prone to insecurities or suffer from heavy communication and computation costs. Therefore, a secure message authentication protocol is proposed in this study for information exchange among entities of IoV (SMEP-IoV). Based on secure symmetric lightweight hash functions and encryption operations, the proposed SMEP-IoV meets IoV security and performance requirements. For formal security analysis of the proposed SMEP-IoV, BAN logic is used. The performance comparisons show that the SMEP-IoV is lightweight and completes the authentication process in just 0.198 ms.Öğe Designing an Enhanced User Authenticated Key Management Scheme for 6G-Based Industrial Applications(Institute of Electrical and Electronics Engineers Inc., 2022) Darman, Ijaz; Mahmood, Musaria Karim; Chaudhry, Shehzad Ashraf; Khan, Sajjad Ahmad; Lim, HuhnkukIn the Sixth Generation (6G) mobile system, the importance of security increases even more in the communication system. One of the potential technologies of 6G is the Network in a Box (NIB). The 6G-enabled NIB is a multi-generational, easily and quickly installable technology used for communication. It is based on both hardware and software. The main features of a 6G-enabled NIB include low latency and a high level of flexibility. In addition, it provides connectivity services to the applications used in unusual situations such as battlefields or natural disasters in the industry. However, most of the applications used in the 6G-enabled NIB are not appropriately secured. There are chances of several active and passive attacks due to the insecure channel. Therefore, a novel remote user authentication and key management scheme is presented in this paper. This scheme is the modified and improved version of UAKMS-NIB and is renamed as the improved User Authentication and Management Scheme to secure the 6G-enabled NIB (iUAKMS-NIB) that can be used in industrial applications. Hence, the proposed scheme provides the best security solution against the possible attacks on the 6G communication system. The analytical results show that the proposed scheme performs better compared to the existing schemes. © 2013 IEEE.Öğe Designing secure and lightweight user access to drone for smart city surveillance(ELSEVIER, RADARWEG 29, 1043 NX AMSTERDAM, NETHERLANDS, 2022) Hussain, Sajid; Mahmood, Khalid; Khan, Muhammad Khurram; Chen, Chien-Ming; Alzahrani, Bander A.; Chaudhry, Shehzad AshrafThe Internet of drones (IoD) is a very useful application of the Internet of things (IoT) and it can help the daily life comfort through various functions including the smart city surveillance. The IoD can enhance the comfort to reach inaccessible and hard to access sites and can save lot of effort, time and cost. However, in addition to traditional threats, the IoD may suffer from new threats and requires customized methods to combat the security weaknesses. Very recently, Wazid et al. proposed a security solution for securing IoD application scenario and claimed its security. However, in this paper we show that their scheme cannot resist stolen verifier and traceability attacks. Moreover, an attacker with access to the verifier, can impersonate any user, drone or server of the system. An enhanced scheme is then proposed to cope with these weaknesses. The security claims of proposed scheme are endorsed by formal and informal security analysis. Moreover, the performance and security comparisons show that proposed scheme completes a cycle of authentication with a slight increase in computation time, but it offers all the required security features as compared with the scheme of Wazid et al.