Adnan Noor Mian

Adnan Noor Mian
  • PhD in Computer Science and Engineering
  • PostDoc Position at University of Cambridge

About

83
Publications
46,287
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,058
Citations
Current institution
University of Cambridge
Current position
  • PostDoc Position

Publications

Publications (83)
Preprint
Full-text available
Many approaches have been proposed to share data in a decentralized manner using blockchain, which solves many security and data management issues but has some limitations, such as transaction fees, mining time, power consumption, etc. The alternative to a traditional blockchain is using IOTA, a directed acyclic graph (DAG) based system, but this a...
Article
The popularity of ethereum for cryptocurrency transactions attracts malicious actors to engage in illegal activities like phishing, ponzi, and gambling. Previous studies have focused mainly on phishing due to the large number of phishing addresses. However, there is no work done on ponzi or gambling classification due to the limited availability of...
Article
The advent of the internet of things (IoT) in the global communication network has made everything interconnected and accessible. Therefore, the fields of medicine and diagnosis have emerging trend of using heterogeneous Internet of Medical Things (IoMT). The IoMT makes use of wearable health devices to transfer a huge amount of sensitive medical d...
Preprint
Full-text available
This paper is the first to present a novel, non-contact method that utilizes orthogonal frequency division multiplexing (OFDM) signals (of frequency 5.23 GHz, emitted by a software defined radio) to radio-expose the pulmonary patients in order to differentiate between five prevalent respiratory diseases, i.e., Asthma, Chronic obstructive pulmonary...
Article
Vehicle‐to‐grid (V2G) network has a clear advantage in terms of economic advantages, it has attracted the interest of electric vehicle (EV) and power grid users. However, numerous security concerns limit its further progress. In existing V2G protocols a trusted third party independently generates the master key of the system, so if the adversary co...
Article
Full-text available
Phishing is an identity theft that employs social engineering methods to get confidential data from unwary users. A phisher frequently attempts to trick the victim into clicking a URL that leads to a malicious website. Many phishing attack victims lose their credentials and digital assets daily. This study demonstrates how the performance of tradit...
Article
We report a novel noncontact method for dehydration monitoring. We utilize a transmit software-defined radio (SDR) that impinges a wideband radio-frequency (RF) signal (of frequency 5.23 GHz) onto either the chest or the hand of a subject who sits nearby. Furthermore, another SDR in the closed vicinity collects the reflected RF signals. The two SDR...
Article
Full-text available
Fog-based vehicular communication has received a huge interest due to rise in vehicular traffic and numerous services, like transferring messages among vehicles in an emergency and other scenarios. Secure storage, password protection, authorization, accessibility, and an authentic summary of the data flow are required in existing centralized approa...
Article
Full-text available
A large number of survey papers are being published in blockchain since the first survey appeared in 2016. A person entering into the field of blockchain is faced with the issue of which blockchain surveys to read and why?, Who is publishing these surveys and what is the nature of these surveys?, Which of the publishers are publishing more such sur...
Article
Data centers today host a number of computational resources to support the increasing demand for computation and storage. Understanding how these physical and virtual machines transition between different states of operation (referred to as machine lifecycle) enables more efficient data center operation management. Furthermore, it helps data center...
Article
This work performs the statistical QoS analysis of a Rician block-fading reconfigurable intelligent surface (RIS)-assisted D2D link in which the transmit node operates under delay QoS constraints. First, we perform mode selection for the D2D link, in which the D2D pair can either communicate directly by relaying data from RISs or through a base sta...
Article
The number of Internet-of-Things (IoT) devices is expected to reach 64 billion by 2025. These IoT devices will mostly use cellular networks for transferring a huge amount of IoT data to the cloud for machine learning (ML) based forecasting. Keeping in view a large number of application scenarios for highly resource constraint IoT devices connected...
Article
Due to the stringent computational capabilities of low-cost RFID tags, several lightweight secure authentication protocols have been proposed for an RFID-based supply chain using bitwise operations. In this paper, we study the vulnerabilities associated with bitwise operations by doing cryptanalysis of a secure lightweight authentication protocol f...
Article
Intrusion detection systems (IDSs) must be implemented across the network to identify and avoid attacks to counter the emerging tactics and techniques employed by hackers. In this research, we propose a lightweight IDS for improving IDS efficiency and reducing attack detection execution time. We use an RF algorithm to rank features in order of impo...
Preprint
Full-text available
This work performs the statistical QoS analysis of a Rician block-fading reconfigurable intelligent surface (RIS)-assisted D2D link in which the transmit node operates under delay QoS constraints. First, we perform mode selection for the D2D link, in which the D2D pair can either communicate directly by relaying data from RISs or through a base sta...
Article
Proactive content caching has emerged as a promising solution to cope with exponentially increasing mobile data traffic. The popular user contents can be cached near the network edge for faster retrieval and processing. Current state-of-the-art approaches adopt a centralized model training mechanism that requires high communication and data exchang...
Article
Full-text available
Device-to-device (D2D) communication is a promising technique to enhance the spectral efficiency for 5G and beyond cellular networks. Traditionally, D2D communication was considered solely as communication directly between two closely-located devices, without any support from the available network infrastructure; however, this understanding limits...
Article
Exact location of an object is not required in some scenarios of indoor localization and all we need to know is the area or a cell where the object is present in a room or a hall. For instance, the object to be located is large and we are interested in knowing the locations of the cell in which the object lies, or we want to find the quadrant of a...
Preprint
Full-text available
Blockchain has become an emerging technology in the field of computer science and is used for asset security, anonymity, and verifiability, etc. Enormous use cases of blockchain, e.g., for making online payments, storing or sharing of private data in a tamper-proof way has attracted the research community in the past decade. In this regard, a lot o...
Article
Full-text available
Cellular networks are evolving into dynamic, dense, and heterogeneous networks to meet the unprecedented traffic demands which introduced new challenges for cell resource management. To address this, various cell association schemes have been proposed. However, the current schemes ignore users' mobility information, and as a result, their cell admi...
Article
This work does the statistical quality-of-service (QoS) analysis of a block-fading device-to-device (D2D) link in a multi-tier cellular network that consists of a macro-BS ( $BS_{_{MC}}$ ) and a micro-BS ( $BS_{_{mC}}$ ) which both operate in full-duplex (FD) mode. For the D2D link under consideration, we first formulate the mode selection proble...
Preprint
Full-text available
This work does the statistical quality-of-service (QoS) analysis of a block-fading device-to-device (D2D) link in a multi-tier cellular network that consists of a macro-BS (BSMC) and a micro-BS (BSmC) which both operate in full-duplex (FD) mode. For the D2D link under consideration, we first formulate the mode selection problem-whereby D2D pair cou...
Preprint
Full-text available
With the emergence of Internet-of-Things (IoT) and ever-increasing demand for the newly connected devices, there is a need for more effective storage and processing paradigms to cope with the data generated from these devices. In this study, we have discussed different paradigms for data processing and storage including Cloud, Fog, and Edge computi...
Preprint
Full-text available
Due to the stringent computational capabilities of low-cost RFID tags, several lightweight secure authentication protocols have been proposed for an RFID-based supply chain using bitwise operations. In this paper, we study the vulnerabilities associated with bitwise operations by doing cryptanalysis of a secure lightweight authentication protocol f...
Preprint
Full-text available
In the modern world, the connectivity-as-we-go model is gaining popularity. Internet-of-Things (IoT) envisions a future in which human beings communicate with each other and with devices that have identities and virtual personalities, as well as sensing, processing, and networking capabilities, which will allow the developing of smart environments...
Article
Full-text available
In the modern world, the connectivity-as-we-go model is gaining popularity. Internet-of-Things (IoT) envisions a future in which human beings communicate with each other and with devices that have identities and virtual personalities, as well as sensing, processing, and networking capabilities, which will allow the developing of smart environments...
Article
Full-text available
On an e-commerce platform, a buyer‘s decision about the purchase of products is highly dependent on the existing reviews of that product. These reviews provide a judgment metric about the quality of the products and the credibility of the sellers. Popular e-commerce platforms (like eBay, Amazon, etc.) receive and store a lot of customer reviews reg...
Article
Full-text available
Internet of Things (IoT) networks are mostly comprised of power-constrained devices, therefore the most important consideration in designing IoT applications, based on sensor networks is energy efficiency. Minor improvement in energy conservation methods can lead to a significant increase in the lifetime of IoT devices and overall network. To achie...
Article
Full-text available
Evolution of cellular networks into dynamic, dense, and heterogeneous networks have introduced new challenges for cell resource optimization, especially in the imbalanced traffic load regions. Numerous load balancing schemes have been proposed to tackle this issue; however, they operate in a reactive manner that confines their ability to meet the t...
Article
Full-text available
In this paper, we propose network-assisted device-to-device (D2D) communication in licensed and unlicensed spectrum interoperable networks, to improve D2D users’ throughput while alleviating the spectrum scarcity issue of cellular networks. The idea of licensed and unlicensed spectrum interoperability is based on the findings of the IEEE 1932.1 wor...
Article
Full-text available
The ACM Special Interest Group on Data Communications (SIG-COMM) has been a major research forum for fifty years. This community has had a major impact on the history of the Internet, and therefore we argue its exploration may reveal fundamental insights into the evolution of networking technologies around the globe. Hence, on the 50 t h anniversar...
Preprint
Full-text available
In the following, I discuss some of my thoughts on the issues in Higher Education (HE) and universities in Pakistan that I learned in the course of my career in higher education.
Preprint
Full-text available
This study uses the article content and metadata of four important computer networking periodicals-IEEE Communications Surveys and Tutorials (COMST), IEEE/ACM Transactions on Networking (TON), ACM Special Interest Group on Data Communications (SIGCOMM), and IEEE International Conference on Computer Communications (INFOCOM)-obtained using ACM, IEEE...
Preprint
This study uses the article content and metadata of four important computer networking periodicals-IEEE Communications Surveys and Tutorials (COMST), IEEE/ACM Transactions on Networking (TON), ACM Special Interest Group on Data Communications (SIGCOMM), and IEEE International Conference on Computer Communications (INFOCOM)-obtained using ACM, IEEE...
Article
Consider a device-to-device (D2D) link which utilizes the mode selection to decide between the direct mode and cellular mode. This paper investigates the impact of mode selection on effective capacity (EC)–the maximum sustainable constant arrival rate at a transmitter’s queue under statistical quality-of-service constraints–of a D2D link for both o...
Preprint
Full-text available
Consider a device to device (D2D) link which utilizes the mode selection to decide between the direct mode and cellular mode. This paper investigates the impact of mode selection on effective capacity (EC) (the maximum sustainable constant arrival rate at a transmitters queue under statistical quality of service constraints) of a D2D link for both...
Chapter
Mobile Ad-hoc Cloud (MAC) refers to the computation offloading of a mobile device among the multiple co-located mobile devices. However, it is difficult to convince the randomly participating mobile devices to offer their resources for performing the computation offloading of other mobile devices. These devices can be convinced for resource sharing...
Article
GraphQL can be used for reducing delays and energy consumption in duty cycled wireless sensor networks (DC-WSNs) in Internet of Things (IoTs) deployments. The authors evaluate GraphQL for DC-WSN based IoTs and Web of Things applications over Constrained Application Protocol (CoAP) and Hyper Text Transfer Protocol (HTTP), respectively.
Article
Full-text available
Ultra-dense multi-tier cellular networks have recently drawn the attention of researchers due to their potential efficiency in dealing with high-data rate demands in upcoming 5G cellular networks. These networks consist of multi-tier base stations including micro base stations with very high-system capacity and short inter-site distances, overlooke...
Conference Paper
Full-text available
The popularity of cellular internet of things (IoT) is increasing day by day and billions of IoT devices will be connected to the internet. Many of these devices have limited battery life with constraints on transmit power. High user power consumption in cellular networks restricts the deployment of many IoT devices in 5G. To enable the inclusion o...
Conference Paper
Full-text available
The growing subscriber Quality of Experience demands are posing significant challenges to the mobile cellular network operators. One such challenge is the autonomic detection of sleeping cells in cellular networks. Sleeping Cell (SC) is a cell degradation problem, and a special case in Cell Outage Detection (COD) because it does not trigger any ala...
Article
Wireless sensor networks are main enabling resource for realization of Internet of Things (IoT) to access the physical world information. A number of dynamic IoT applications with dense sensor deployments generate continuous and high rate data streams. Such a sensor network pose congestion and data loss challenges due to contention near the sink an...
Preprint
Full-text available
The popularity of cellular internet of things (IoT) is increasing day by day and billions of IoT devices will be connected to the internet. Many of these devices have limited battery life with constraints on transmit power. High user power consumption in cellular networks restricts the deployment of many IoT devices in 5G. To enable the inclusion o...
Article
Full-text available
Caching close to users in a radio access network (RAN) has been identified as a promising method to reduce a backhaul traffic load and minimize latency in 5G and beyond. In this paper, we investigate a novel community detection inspired by a proactive caching scheme for device-to-device (D2D) enabled networks. The proposed scheme builds on the idea...
Preprint
CoAP is an application layer protocol designed for resource-constrained devices in Internet-of-Things (IoT). Object Security of CoAP (OSCoAP) is an IETF draft for addressing security issues with CoAP messages that can arise with the use of intermediate proxies. These proxies are employed for better performance, scalability and offloading expensive...
Preprint
Recent exponential growth of data over cellular networks has cause the progression from conventional mobile communication networks to heterogeneous cellular networks (HetNets). Quality of experience (QoE)-aware traffic load balancing in such dense HetNets is considered a major problem. Current HetNets exploit reactive load balancing schemes that hi...
Article
CoAP is an application layer protocol designed for resource-constrained devices in Internet-of-Things (IoT). Object Security of CoAP (OSCoAP) is an IETF draft for addressing security issues with CoAP messages that can arise with the use of intermediate proxies. These proxies are employed for better performance, scalability and offloading expensive...
Article
Full-text available
Deploying and maintaining an Internet service in remote rural and mountainous areas is a challenging task specifically in developing countries. In this paper, we present a study to realize a low-cost sustainable Wireless Internet Service Provider (ISP) built for rural areas of developing countries. There was no Internet access in the area prior to...
Conference Paper
Full-text available
Wireless mesh networks have been considered as a cost effective means of extending coverage which is beyond the capability of a single wireless device. The license free IEEE 802.11 based Wi-Fi is one of the handy available technologies for building a wireless mesh network. The legacy Wi-Fi technology is however not designed for building mesh networ...
Conference Paper
MCC (Mobile Cloud Computing) performs computation offloading from mobile edge devices to centralized cloud services for achieving the reduction in resource consumption of mobile devices. MBaaS is considered as a new service model within the range of MCC and firebase by Google has been accepted as the most popular MBaaS. However, firebase has not ma...
Conference Paper
Full-text available
Seamless mobility in legacy multi-hop IEEE 802.11 Wi-Fi network is difficult to accomplish due to the lack of handoff mechanism. IEEE 802.11s MAC layer protocol adds the feature of mobile mesh networking to standard Wi-Fi by providing layer-2 routing and handoff mechanisms. With ubiquitous connectivity and seamless handoff, many applications requir...
Article
Full-text available
In higher educational institutes, many students have to struggle hard to complete different courses since there is no dedicated support offered to students who need special attention in the registered courses. Machine learning techniques can be utilized for students' grades prediction in different courses. Such techniques would help students to imp...
Conference Paper
Since the performance of educational institutions depends critically on their students, it is imperative that educational institutions deploy an efficient and reliable admission criteria. In the context of Pakistan, a variety of admission criteria has been developed—mostly in isolation—by different universities. Despite the importance of these admi...
Conference Paper
Full-text available
In low-power low-rate wireless networks, IEEE 802.15.4 is a standard protocol for communication. Devices in such networks are usually battery-operated so radio-transceiver component in such networks are typically of low range but mostpower consuming. Proper antenna orientation, distance between nodes and channel selection are among the ways to achi...
Article
Full-text available
Virtual Local Area Networks (VLANs) provide logical grouping in LANs that are used for many purposes including to limit broadcast traffic and to provide better traffic localization. For better traffic localization and broadcast containment, VLANs could perform well only when the VLAN memberships for nodes are optimized. We propose a Genetic Algorit...
Article
Full-text available
Traffic localization and broadcast containment is among the main objective of VLANs implementation. To maximize this objective, an efficient VLAN topology should be designed that maximizes traffic within and minimizes traffic flows between VLANs. In this paper we use strong component technique with statistically calculated traffic threshold to iden...
Article
Full-text available
Financial organizations communicate with each other using ISO 8583 or its derivatives to complete the request and response cycle of card originated transactions originated from an ATM, POS, or the web. ISO 8583 is a broad standard. Its implementations slightly vary due to the flexibility available within the standard. This paper discusses the probl...
Article
Cloud computing is based on virtualization, where a single physical resource is virtualized into multiple virtual resources. Processor and network virtualization offer many advantages like saving in hardware cost, energy consumption, human effort and management of resources. In this paper we have evaluated the effect of network and processor virtua...
Article
Full-text available
Energy efficiency is an important design paradigm in Wireless Sensor Networks (WSNs) and its consumption in dynamic environment is even more critical. Duty cycling of sensor nodes is used to address the energy consumption problem. However, along with advantages, duty cycle aware networks introduce some complexities like synchronization and latency....
Conference Paper
Traffic density estimates on maps not only assist drivers to decide routes that are time and fuel economical due to less congestions and but also help in preventing accidents that may occur due to the lack of not being able to see far ahead. In this paper, we propose a protocol that exploit vehicle-to-vehicle ad hoc communication for the estimation...
Conference Paper
Full-text available
Ever since its inception VLAN (Virtual Local Area Network) technology remains a viable tool for logical segmentation and broadcast containment in switched or bridged networks. For better broadcast containment, Network administrators put those devices together in same VLAN which are expected to exchange more traffic together. Decisions which are not...
Article
Full-text available
Multiprotocol Label Switching (MPLS) is a differentiated and scalable framework introduced by IETF, which uses simple configuration & management to deliver end-to-end IP services. It enables the network devices to specify path based on Quality of Service (QoS) and bandwidth requested for those applications by changing the hop-by-hop paradigm. Fault...
Conference Paper
Random walk (RW) is simple to implement and has a better termination control. The Markov chain analysis informs that RW eventually visits all vertices of a connected graph. Due to such nice properties, RW is often proposed for information dissemination or collection from all or part of a large scale unstructured network. The random walker, which ca...
Article
Full-text available
Random walk (RW) based algorithms are often proposed to solve many problems in wireless networks. The implementation of such algorithms are usually done at the application layer so that many characteristics of the wireless transmissions are not exploited. In this paper, we show that we can greatly reduce the energy requirements to perform a RW by b...
Conference Paper
Full-text available
Service discovery in mobile ad hoc networks (MANETs) is a challenging issue. The nodes in a MANETs offer spontaneous and variable connectivity. Also the proximity of a given service as well as the kind and the number of services vary unpredictably with time. Traditional directory based architectural solutions can hardly cope with such a dynamic env...
Conference Paper
In this paper we propose an adaptive random walk for wireless networks. The lifetime of the walk is varied in such a way that at least a given fraction of nodes is covered, in expectation. The only parameter of the random walk, alpha, depends on the nominal network size N and on the required coverage. For sizes lower than N the required coverage is...
Article
Full-text available
Because service discovery enables cooperation among many resource-constrained mobile devices, it's a key research area in mobile ad hoc networks (manets). This comprehensive study analyzes service discovery protocols (SDPs) in multihop manets. The authors start with a general framework and then go into detail on the building blocks of multihop mane...
Conference Paper
Full-text available
Random walk (RW) based search algorithms are often suggested to solve a search problem, namely the need to locate a node with a given property in a network, e.g., a node providing a service. In order for this solution to be efficient, the number of steps the walker makes before hitting the target node should be low. This can be achieved exploiting...
Article
Full-text available
Mobile devices are inherently scarce in resources, necessitating the need to cooperate among them for performing tasks that cannot be done alone. This cooperation is in the form of services that are offered by other devices in the network. To get benefit from the services offered by other devices, they have to be discovered. Service Discovery Proto...
Conference Paper
Full-text available
Partitioning is one of the main problems in p2p group mem- bership. This problem rises when failures and dynamics of peer participa- tion, or churn, occur in the overlay topology created by a group member- ship protocol connecting the group of peers. Solutions based on Gossip- based Group Membership (GGM) cope well with the failures while sufier fr...
Article
Full-text available
Service discovery is an important field of research in Mobile Ad hoc Networks (MANETs) as it makes cooperation possible among many resource constraint mobile devices. This article gives a comprehensive study of multihop MANETs Service Discovery Protocols (SDPs). First we give a general framework and then discuss different building blocks of the MAN...
Article
This report gives the current state of author's research in the field of service discovery in Mobile Ad hoc Networks. Mobile devices need to cooperate to get benefit from the services offered by other devices and for this purpose these services have to be discovered using Service Discovery Protocols (SDPs). Twelve SDPs are selected for multihop mob...

Network

Cited By