About
153
Publications
46,859
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,016
Citations
Citations since 2017
Introduction
Publications
Publications (153)
Blockchain technology is based on the idea of a distributed, consensus ledger, which it employs to create a secure, immutable data storage and management system. It is a publicly accessible and collectively managed ledger enabling unprecedented levels of trust and transparency between business and individual collaborations. It has both robust crypt...
This paper introduces a computational strategic game model capable of mitigating the
adversarial impact of node misbehaviour in large-scale Internet of Things (IoT) deployments. This security model’s central concept is to preclude the participation of misbehaving nodes during the routing process within the ad hoc environment of mobile IoT nodes. Th...
Mobile ad hoc networks are susceptible to various security threats due to their open media nature and mobility, making them a top priority for security measures. This paper provides an in-depth examination of MANET security issues. Some of the most critical aspects of mobile ad hoc networks, including their applications, have been discussed. This i...
Present study was carried to determine the sand fly species composition, breeding sites ecology, seasonal abundance, and spatial distribution in district Malakand, Khyber Pakhtunkhwa, Pakistan. In addition, risk factors associated with cutaneous leishmaniasis (CL) were also evaluated. Survey of indoor and outdoor habitats was carried out using stic...
By and large, authentication systems employed for web-based applications primarily utilize conventional username and password-based schemes, which can be compromised easily. Currently, there is an evolution of various complex user authentication schemes based on the sophisticated encryption methodology. However, many of these schemes suffer from ei...
The rapid advancement of technologies has enabled businesses to carryout their activities seamlessly and revolutionised communications across the globe. There is a significant growth in the amount and complexity of Internet of Things devices that are deployed in a wider range of environments. These devices mostly communicate through Wi-Fi networks...
Mobile Adhoc Network (MANET) has been a core topic of research since the last decade. Currently, this form of networking paradigm is increasingly being construed as an integral part of upcoming urban applications of Internet-of-Things (IoT), consisting of massive connectivity of diverse types of nodes. There is a significant barrier to the applicab...
The Mobile Ad-Hoc Network (MANET) incorporates a collaborative networking scenario, where dynamic host movement results in frequent topology changes. In MANET, nodes cooperate during route establishment, and the data packet must travel from source to destination through multi-hop intermediate links. The nodes in a MANET can be localized in a restri...
The current era of smart computing and enabling technologies encompasses the Internet of Things (IoT) as a network of connected, intelligent objects where objects range from sensors to smartphones and wearables. Here, nodes or objects cooperate during communication scenarios to accomplish effective throughput performance. Despite the deployment of...
The progressively ubiquitous connectivity in the present information systems poses newer challenges to security. The conventional security mechanisms have come a long way in securing the well-defined objectives of confidentiality, integrity, authenticity and availability. Nevertheless, with the growth in the system complexities and attack sophistic...
Currently, Mobile Ad hoc Networks (MANETs) have evolved as one of the essential next-generation wireless network technologies. MANET comprises of mobile nodes that are self-configurable, and every mobile node behaves as a router for every other node allowing data to move by making use of multi-hop network routes. MANETs signify a networking class t...
The exponential growth observed as well as predicted in the development and deployment of the Internet of Things (IoT) based applications in every walk of our life brings forth the mandatory requirement of the secure communication system which is seamless yet effective in the highly heterogeneous and resource-constrained network. The core philosoph...
A growing trend exerted by current users in accessing sensitive data and performing critical data exchanges predominantly highlights the proliferation usage of mobile phone devices by users for accessibility. There exists a demand for a security solution capable of thwarting the existing threats while offering extended support, at the same time con...
The methods to achieve efficient routing in energy constrained wireless sensor networks (WSNs) is a fundamental issue in networking research. A novel approach of ant colony optimization (ACO) algorithm for discovering the optimum route for information transmission in the WSNs is proposed here for optimization and enhancement. The issue of path sele...
Game Theory is a useful tool for exploring the issues concerning Mobile Ad-Hoc Network (or MANET) security. In MANETs, coordination among the portable nodes is more significant, which encompasses their vulnerability challenges to several security assaults and the inability to run securely, when storing its resources and manage secure routing betwee...
The Internet of Things (IoT) in the context of this paper can be defined as the control of manually operated objects through the means of internet and wireless sensors and IOT enabling devices. This report presents an overall idea of IoT, development of it and the state of IoT in Malaysia.
Game Theory acts as a suitable tool offering promising solutions to
security-related concerns in Mobile Ad Hoc Networks (i.e., MANETs). In
MANETs, security forms a prominent concern as it includes nodes which are
usually portable and require significant coordination between them. Further, the
absence of physical organisation makes such networks sus...
Internet-banking is a crucial service offered by financial Institutions and has gained popularity at a high pace. Owing to the increasing usage of this service, it is being frequently targeted by adversaries. The login process by the user is one of the main points that are at risk of this assault. Hence, a robust security mechanism is essential for...
Applications meant for exchanging cash, or individual data are becoming progressively common in mobile communications and on the Internet. The expansion of electronic banking services by utilizing various electronic channels provide added value to the users. As such, client authentication is required in these applications for affirming the legitima...
The applications based on IoT are ubiquitous in providing passive user involvement on the collective approach of sensor technology, embedded system, networking and communication convergence with analytical computing. The application framework of IoT comprises of devices that are highly heterogeneous and compute migrations from sensor to IoT gateway...
Numerous applications are available on the Internet for the exchange of personal information and money. All these applications need to authenticate the users to confirm their legitimacy. Currently, the most commonly employed credentials include static passwords. But people tend to behave carelessly in choosing their passwords to avoid the burden of...
In next-generation wireless networks, a Multi-Mode Device (MMD) can be connected with available Radio Access Technology (RAT) in a
Heterogeneous Wireless Network (HWN). The appropriate RAT selection is essential to achieve expected Quality of Service (QoS) in HWN. There are many factors to select an appropriate RAT in HWN including Data rate, Power...
In next-generation wireless networks, a user can be connected through Multi-Mode Device (MMD) to the multiple wireless networks in Heterogeneous Wireless Networks (HWN) considering several factors; including network technology, data service type, available bandwidth, Quality of Service (QoS), monetary cost, etc. To deal with all these multi attribu...
Mobile ad hoc networks or MANETs, also referred to as mobile mesh networks at times, are self-configuring networks of mobile devices that are joined using wireless channels. These represent convoluted distributed systems comprising of wireless mobile nodes which are free to move and self-organise dynamically into temporary and arbitrary, ad hoc top...
In Heterogeneous Wireless Network (WHN), a Mobile Device (MD) can be connected with multiple access technologies available in a particular geographical area. Selection of appropriate access technology is a challenge for the MD where game theory policy can be applied. Shapley Value is one of the game-theoretic models that can be applied to allocate...
Bandwidth aggregation in heterogeneous wireless networks (HWN) can be one of the effective solutions in providing quality data transmission for real-time applications. However, transmitting the data through multiple networks create packet reordering issues that result in transmission delay and degrades the overall quality of services. This paper ad...
Increasing proliferation of IoT has led to an evolution of various devices for realising the smart features of ubiquitous applications. However, the inclusion of such a massive pool of devices with different computational capabilities, network protocols, hardware configurations, etc. also causes a higher number of security threats. Security profess...
Objectives:
In this paper, an approach to online banking authorization using one-time passwords has been illustrated. Methods/Statistical Analysis: The algorithm presented in this paper provides an infinite as well as forward One-Time-Password (OTP) generation mechanism employing two Secure Hash Algorithms viz. SHA3 and SHA2, followed by dynamic tr...
In the era of Internet technology, new applications are developed everyday requiring continuous and seamless connections. This urges for access availability solutions to the new scenarios. One of the critical architecture is the Mobile Ad-Hoc Network Mobility (MANEMO). However, the integration of Ad-hoc and NEMO technologies came out with many comp...
Fire alarm systems have become increasingly an important lifesaving technology in many aspects, such as applications to detect, monitor and control any fire hazard. A large sum of money is being spent annually to install and maintain the fire alarm systems in buildings to protect property and lives from the unexpected spread of fire. Several method...
Vehicular Ad hoc networks (VANETs) combined with vehicle-to-vehicle and vehicle-to-infrastructure communications can be considered as the most suitable technology to enable ITS (Intelligent Transport System) application bestowed upon travellers with mobility, safety and productivity with human comfort. As a delay sensitive ITS application, handoff...
Recent trend of living is getting modernized rapidly by the involvement of automatic systems. Within the aviation industry, automatic systems had become heavily reliable by the end of the nineteen centuries. The systems usually require controllable devices with desired control algorithm known as controller. Controllers can be replaced with, almost...
Objectives: The goal of this paper is to comprehend the significance of adopting Cloud Computing (CC) in establishments of higher learning. This paper plots a portion of the advantages that can be conveyed to advanced education using cloud computing, analyzes probably the most imperative difficulties that can be faced by the academia due to its ado...
The present work appraises the phenolic profile of fruit extracts from two species (Solanum indicum and Solanum surattense) of Solanaceae. The bioactive components from both the species were extracted with different concentrations of acidified (hydrolysis) and aqueous methanol (non-hydrolyzed) and analyzed for the total phenolics calorimetrically....
To achieve the requirement of the improvement applications and guarantee the Internet access for mobile hosts and networks, the Internet Engineering Task Force (IETF) proposed Mobile Ad Hoc NEMO (MANEMO) architecture. However, the integration of NEMO and MANET introduces many challenges such as the redundant tunnel problem and Exit Router selection...
Cloud Computing is an emerging technology nowadays. Due to the accessibility, availability, and cost effectiveness, cloud computing has became essential computing system in both, private and public sectors. However, secure data transfer is still a big question where transferring link between user and server are not stabilized yet. As a result, many...
In modern computing, multitasking is the most favorable aspect. An un-pipelined instruction cycle (fetch-execute cycle) CPU processes instructions one after another increasing duration at lesser speed in completing tasks. With pipelined computer architecture, unprecedented improvement in size and speed are achievable. This work investigates the pos...
This study focuses on the means to ensure the security and success of electronic payments which form part and parcel of e-commerce. This paper also highlights the primary functions, purpose, and benefits attached with payment gateways besides discussing the essential pre-requisites for payment gateways to be qualified as strong payment gateways. Th...
This study focuses on the means to ensure the security and success of electronic payments which form part and parcel of e-commerce. This paper also highlights the primary functions, purpose, and benefits attached with payment gateways besides discussing the essential pre-requisites for payment gateways to be qualified as strong payment gateways. Th...
There is almost digitization of the entire educational system, as there is an abundant of digital materials available. The educational system is not left out from the global standardization as well as authorities are imposing certain standard at local and global level. As a result, these data which are getting generated in the context of educationa...
IEEE802.11e is a concrete challenge to providing quality of service (QoS) aimed at interactive multimedia (IMM) applications due to the resource allocation parameter for heterogeneous traffic flows. This parameter is fixed for different specific IMM traffic flows in the IEEE802.11e standard. However, due to the variation in traffic load on wireless...
With the fast proliferation of wireless devices e.g., cell phones, PDAs, laptops, wireless sensors, etc., the significance of wireless communication especially mobile adhoc networking is quite evident. The need to shun dependency on fixed infrastructure networks led to the evolution of Mobile Adhoc Network (MANET). MANETs have numerous advantages l...
Mobility considerations in multicast algorithm design usually focus issues of mobile receivers while few researches emphasize on mobile multicast sources issues. However, mobility of source is a critical issue causing global tree disruption. Furthermore, major research challenges in the delivery of group applications over Wireless Mesh Networks (WM...
Capparis decidua (C. decidua) is an important medicinal plant from the family Capparaceae. The present study explores the proximate (moisture, protein, crude fiber, dry matter) composition and minerals profile of various parts including stem bark, fruit shoot, root and flower of C. decidua harvested from Cholistan desert, Punjab, Pakistan in two se...
Wireless mesh networks (WMNs) can be considered as a key technology for next-generation wireless networking. However, field trials and experiments prove that the performance of WMNs still below expectations. Therefore, several challenging research issues need to be determined. The routing protocol is one of the important factors to be improved to b...
The wide use of the Internet-based many challenges to the researchers to guarantee th connections needed by the mobile hosts and provi access for them. One of proposed solutions by In Task Force (IETF) is to connect the local infrastructure-less Mobile Ad hoc Network (MAN structure. This connection is done through mult known as Internet Gateways. M...
A mobile ad-hoc network (MANET) is a self-configuring infrastructure-less network of mobile devices connected by wireless links where each node or mobile device is independent to move in any desired direction and thus the links keep moving from one node to another. In such a network, the mobile nodes are equipped with CSMA/CA (carrier sense multipl...
MANET or mobile adhoc network is infrastructure less network which does not require any centralized support. Equipped with CSMA/CA (carrier sense multiple access with collision avoidance) transceivers, mobile nodes communicate via radio. As network topology always changes due to mobility of nodes, routing as well as routing protocol selection is qu...
Mobile ad-hoc network (MANET) is a self-configuring infrastructure less network of mobile devices connected by Wireless and each node or mobile device is independent to move in any desired direction and thus link goes on changing from one node to a