Khurram Khan

Khurram Khan
Dadabhoy Institute of Higher Education · Microbiology

About

436
Publications
173,713
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
16,769
Citations
Citations since 2017
186 Research Items
13381 Citations
201720182019202020212022202305001,0001,5002,0002,5003,000
201720182019202020212022202305001,0001,5002,0002,5003,000
201720182019202020212022202305001,0001,5002,0002,5003,000
201720182019202020212022202305001,0001,5002,0002,5003,000

Publications

Publications (436)
Article
Internet of Vehicles (IoV) has become an indispensable technology to bridge vehicles, persons and infrastructures, and is promising to make our cities smarter and more connected. It enables vehicles to exchange vehicular data ( e.g. , GPS, sensors, and brakes) with different entities nearby. However, sharing these vehicular data over the air raises...
Preprint
Full-text available
Cyber threats in online banking services are increasing with the improvements in internet-aided communications and extended services. The threats gather personal and transactional information from the users from which illegitimate services are handled. For providing secure service-based risk mitigation, this article introduces a Volatile Transactio...
Article
Social cybermedia has greatly changed the world’s perspective on information sharing and propagation. These platforms build virtual user communities in the form of followings or followers that can spread positive or negative content. These virtual communities play a vital role in the spread of hate content, which may create a severe law-and-order s...
Article
Emerging edge computing (EEC) has been introduced as an innovative paradigm for the healthcare applications of the Internet of Things (IoT) that aims to distribute the network resources at the network edges to improve security, communication, and decision-making processes. The operation of healthcare IoT applications typically needs the presence of...
Article
Security enhancement via trustworthy identity authentication in Internet-of-Things (IoT) has soared recently. Biometrics offers a promising remedy to improve the security and utility of IoT and play a role in securing a variety of low-power and limited computing capability IoT devices to address identity management challenges. This paper proposes a...
Article
Intelligent transport systems amalgamated with advanced technologies are an important element of the automotive industry, including critical infrastructure and transportation. Internet of Vehicles (IoV) is the modern technological framework designed for intelligent transportation. IoV creates a network of information relations among vehicles, thus...
Article
Full-text available
Direct usage of original biometric features/templates definitely leads to serious privacy leakage. In biometric cryptosystems, a biometric key is generated and then strictly protected with a one-way function. However, it is highly difficult to balance the template size and accuracy. Palmprint has many remarkable strengths, so it is considered as a...
Article
Voting allows the people to elect their representative and express their preferences. In modern day democracy, voting is one fundamental and most important tool for election. To strengthen this process, efforts must be made to achieve a confirmable and transparent voting system. Naturally, the veracity of the election process is of ultimate importa...
Article
As the technology era progresses, many opportunities are brought to the healthcare industry. With the support of technology and Internet of Things platforms, e-healthcare is now more common than ever. However, the sensitive nature of healthcare records makes them vulnerable to many attacks. Therefore, a privacy-enabled framework for cloud-based e-h...
Article
Human society has drastically changed as a result of the widespread application of Internet of Things (IoT) technology, particularly in various industrial fields. In spite of the advantages brought by IoT services, the underlying security challenges cannot be underestimated. Cloud-based IoT data collection poses a number of challenges, including ho...
Article
Full-text available
In the last few decades, there has been an increase in food safety and traceability issues. To prevent accidents and misconduct, it became essential to establish Food Safety Traceability System (FSTS) to trace the food from producer to consumer. The traceability systems can help track food in supply chains from farms to retail. Numerous technologie...
Article
Prosanta and Biplab presented a lightweight two-factor authentication scheme for the Internet of Things (IoT) devices based on the physical unclonable function (PUF). Their presented scheme was based on the fuzzy extractor and analyzed various security reasonings, such as mutual authentication, session key agreement, privacy and protection against...
Article
Indoor vehicle localization is an underlying technology for realizing Autonomous Valet Parking (AVP), which demands high accuracy and reliability. However, existing localization technologies, such as GPS, WiFi, Bluetooth, suffer from either low availability or high cost, which are not practical in the real world. In order to put AVP into practice,...
Article
Full-text available
Elliptic Curve Cryptography (ECC)-based authenti-cation schemes for the Radio-frequency identification (RFID) environment have emerged as a very safe, secure, and robust candidate of mutual authentication. However, the limited resource availability in a passive tag makes such schemes difficult to realize in practice. Public/private key pair generat...
Article
The development of secure and reliable voting mechanism has attracted more and more attention from academia and industry. Many researchers are trying to design a secure and reliable voting system. However, many existing blockchain-based proposals have more or less problems, such as limited number of participants, weak fault-tolerant mechanisms and...
Article
Full-text available
Fog computing has revolutionized the computing domain by enabling resource sharing, such as online storage, and providing applications and software as services in near vicinity to the edge nodes through the Internet. Small-to large-sized companies, like Amazon, Google, Facebook, Twitter, and LinkedIn, have started switching to fog-computing-enabled...
Article
Full-text available
Fog computing is a computing structure which is distributed in nature. Low latency, reasonably low communication overhead and ability to support real time applications are the reasons for which fog computing approach said to provide better performance than cloud computing. Although, it is an extension of the cloud computing. Fog computing also inhe...
Article
A cheating-free (t, n) threshold secret sharing scheme using Blockchain is presented, where Shamir's technique is followed and the Blockchain vulnerabilities due to PoW/PoS (Proof-of-Work/Stake) consensus, are removed. We address the shares’ cheating issues and design a Blockchain based SS scheme, in which the participants’ shares are recorded secr...
Article
Full-text available
Medical image analysis plays a very indispensable role in providing the best possible medical support to a patient. With the rapid advancements in modern medical systems, these digital images are growing exponentially and reside in discrete places. These images help a medical practitioner in understanding the problem and then the best suitable trea...
Preprint
Internet of Things (IoT) vision has astoundingly transcended the environmental sensing with integrated computing systems and smart devices, providing seamless connectivity among humans, machines and their environment to cooperate for convenience and economical benefits. Apart from all the tremendous benefits of IoT, this paradigm still suffers from...
Preprint
Internet of Things (IoT) vision has astoundingly transcended the environmental sensing with integrated computing systems and smart devices, providing seamless connectivity among humans, machines and their environment to cooperate for convenience and economical benefits. Apart from all the tremendous benefits of IoT, this paradigm still suffers from...
Article
In the era of smart healthcare, Internet of Medical Things (IoMT) based Cyber-Physical Systems (CPS) plays an important role, while accessing, monitoring, assessing, and prescribing patients ubiquitously. Efficient authentication and secure data transmission are the influential impediments of these networks to be addressed to maintain credence amid...
Article
In this paper, we propose H-IDFS, a Histogram-based Intrusion Detection and Filtering framework, which assembles the CAN packets into windows, and computes their corresponding histograms. The latter are fed to a multi-class IDS classifier to identify the class of the traffic windows. If the window is found malicious, the filtering system is invoked...
Article
Full-text available
Volunteer Computing provision of seamless connectivity that enables convenient and rapid deployment of greener and cheaper computing infrastructure is extremely promising to complement next-generation distributed computing systems. Undoubtedly, without tactile Internet and secure VC ecosystems, harnessing its full potentials and making it an altern...
Article
Full-text available
Objects/tags are generally passes through multiple readers before achieving the final destination within the IoT network. Hence, object identification is a significant issue as some bogus objects may take part for malicious access. Considering this situation, RFID can be used for unique identification and validation of IoT objects. However, it reco...
Article
Security and privacy are considered as two main challenges in Vehicular Ad Hoc Network (VANET). To cope with these challenges and in order to improve the safety of VANET, we propose a secure and privacy-preserving authentication scheme. In the proposed scheme, Quotient Filter (QF) is used to address node authentication while message authentication...
Article
Full-text available
A large portion of the global population generates various multimedia data such as texts, images, videos, etc. One of the most common categories which infuences the public at large is visual multimedia content. Due to the diferent social media platforms (e.g., Whatsapp, Twitter, Facebook, Instagram, and YouTube), these materials are passed without...
Article
The booming Internet of Things makes smart healthcare a reality, while cloud-based medical storage systems solve the problems of large-scale storage and real-time access of medical data. The integrity of medical data outsourced in cloud-based medical storage systems has become crucial since only complete data can make a correct diagnosis, and publi...
Article
Full-text available
The Internet of Medical Things (IoMT) is a unification of smart healthcare devices, tools, and software, which connect various patients and other users to the healthcare information system through the networking technology. It further reduces unnecessary hospital visits and the burden on healthcare systems by connecting the patients to their health...
Article
Since 2002, hundreds of thousands of vessels have equipped the Automatic Identification System (AIS), which continuously broadcasts its identity and location information for vessel collision avoidance. To utilize these scattered AIS data for further analysis, there are multiple AIS data platforms collecting AIS data from vessels around the world th...
Article
Vehicular Ad-hoc Networks (VANETs) have potential applications in improving the efficiency and safety for intelligent transportation systems. The openness of VANETs, however, also introduces privacy and security implications. Despite a number of conditional privacy-preserving authentication (CPPA) schemes with anonymity and conditional traceability...
Article
Cloud storage services need cost-effective, independent, and scalable functionality to manage data. Cloud repositories provide an opportunity to manage and access essential data conveniently. This article proposes a secure authentication protocol to resolve these issues. To add a convenient sharing of data controlled by a data delegator, we use sym...
Article
Industrial Internet of Things (IIoT) is revolutionizing plenty of industrial applications by utilizing large-scale smart devices in manufacturing and industrial processes. However, IIoT is facing the disclosure of identity privacy. The identity information is precious and critical, thereby inspiring a line of follow-up privacy-preserving studies,...
Article
Vehicle-to-Grid (V2G) networks are emerging as an outstanding technique for alleviating energy and environmental concerns. Whereas, malicious attackers thirst for private information from frequent electricity/service exchanges between electric vehicles (EVs) and smart grids (SG) in V2G networks. Several attempts have been made to use ring signature...
Article
Coronavirus (COVID-19) is an ecumenical pandemic that has affected the whole world drastically by raising a global calamitous situation. Due to this pernicious disease, millions of people have lost their lives. The scientists are still far from knowing how to tackle the coronavirus due to its multiple mutations found around the globe. Standard test...
Article
The Internet of Medical Things (IoMT), which integrates medical sensors with Internet of things, is helpful for providing remote diagnosis and real-time decision making. Massive data collected by medical and healthcare monitoring sensors in the IoMT involves sensitive patient information. It brings some security challenges to validate the legitimac...
Article
Fake news is a major threat to democracy (e.g., influencing public opinion), and its impact cannot be understated particularly in our current socially and digitally connected society. Researchers from different disciplines (e.g., computer science, political science, information science, and linguistics) have also studied the dissemination, detectio...
Article
Security is paramount in protecting critical infrastructures such as healthcare, power, water distribution, and transport system. Modern critical infrastructures are increasingly turning into distributed, complex Cyber-Physical systems that enable data monitoring in near real-time conditions. With the advancement in distributed IoT systems, the mag...
Article
With the rapidly growing user experience and traffic growth requirements in the Mobile Edge Computing (MEC) environment, the conventional security protocols are no longer capable of meeting the modern demand. In order to cope with this demand, novel security solution such as identity-based cryptography, which does not require complex calculations,...
Article
Public Acceptance is a prerequisite forgaining the intended benefits of Connected and Au-tonomous Vehicles (CAVs). This paper proposes anidea of digital labels for CAVs so as to increaseconsumers trust and awareness regarding the se-curity level of their vehicle. We come up with anarchitecture named Cybersecurity Box (CSBox) inwhich digital labels...
Article
The Internet of things (IoT) is a framework of various services and smart technologies that mutually communicate information between mobile devices and users or just between devices with the help of Internet connectivity. The dramatic progression of IoT helps numerous network applications and communication technologies to introduce state-of-the-art...
Article
In this paper, we present a supervised machine learning multipath and administrative distance-based load balancing algorithm for an Agriculture Internet of Things (AG-IoT) network. The proposed algorithm is known as an AI-enabled multi-hop and administrative distance-based opportunistic routing (MHADBOR) algorithm, which processes the collected inf...
Article
Full-text available
Searchable encryption performs satisfactorily in protecting the privacy of outsourced data in cloud storage scenarios because it encrypts data and provides a secure way of searching on the ciphertext. Dynamic searchable encryption is designed to support the insertion and deletion of outsourced data. However, insertion may cause information leakage...
Article
The continuous innovation and progression in hardware, software and communication technologies helped the expansion and accelerated growth in Internet of Things based drone networks (IoD), for the devices, applications and people to communicate and share data. IoD can enhance comfort in many applications including, daily life, commercial, and milit...
Article
The COVID-19 pandemic has witnessed a huge surge in the number of ransomware attacks. Different institutions such as healthcare, financial, and government have been targeted. There can be numerous reasons for such a sudden rise in attacks, but it appears working remotely in home-based environments (which is less secure compared to traditional insti...
Article
As an emerging technology, cloud-based Vehicular Ad-Hoc Network (VANET) can significantly improve the efficiency of transportation systems by alleviating traffic congestion and optimizing resource management. However, since the information transmitted in VANET is distributed in an open-access environment, security and privacy are now becoming vital...
Article
Software-defined networking (SDN) is an emerging architecture used in many applications because of its flexible architecture. It is expected to become an essential enabler for the Internet of Things (IoTs). It decouples the control plane from the data plane, and the controller manages the whole underlying network. SDN has been used in wireless sens...
Article
In an Intelligent Precision Agriculture (IPA), several Internet of Things (IoT) smart devices and drones can be deployed to monitor an agricultural environment. The drones can be further utilized to collect the data from smart devices and send to the Ground Station Server (GSS). However, insecure communication among the smart devices, drones and th...
Article
The Internet of drones (IoD) is a very useful application of the Internet of things (IoT) and it can help the daily life comfort through various functions including the smart city surveillance. The IoD can enhance the comfort to reach inaccessible and hard to access sites and can save lot of effort, time and cost. However, in addition to traditiona...
Article
Full-text available
The world has changed dramatically since the outbreak of COVID-19 pandemic. This has not only affected the humanity, but has also badly damaged the world’s socio-economic system. Currently, people are looking for a magical solution to overcome this pandemic. Similarly, scientists across the globe are working to find remedies to overcome this challe...
Article
Full-text available
In these days, satellite communication networks are playing a significant role in facilitating the crucial infrastructural services that include environmental monitoring, electronic surveillance, public safety, intelligence operations for law enforcement, government agencies, and the military. However, security researchers have uncovered that many...
Article
Full-text available
In recent times, Wireless Sensor Network (WSN) technology has received significant attention owing to its numerous applications in various mission critical services, such as healthcare, military monitoring, public safety systems, and forest monitoring. However, sensor node’s low computational power and inadequate advancements in battery design hind...
Article
Internet of Things (IoT)-enabled smart grids can achieve more reliable and high-frequency data collection and transmission compared with existing grids. However, this frequent data processing may consume a lot of bandwidth, and even put the user’s privacy at risk. Although many privacy-preserving data aggregation schemes have been proposed to solve...
Article
Full-text available
Mobile payments makeup one of the fastest-growing mobile services available today and are widely used by smartphones for utility payments, bill payments, and online shopping, among other applications. Mobile payments are playing a vital role in the fast growth of online markets and are revolutionizing the supply chain of businesses and industries....
Article
Full-text available
In wireless sensor network (WSN), the secure communication and exchange of confidential information between nodes is a challenging task. To eliminate the security flaws WSN adopts authenticated cryptography mechanisms. The authenticated key agreement protocol guarantees the reality of the users and negotiates the shared session key. In the past yea...
Preprint
Coronavirus (COVID-19) is an ecumenical pandemic that has affected the whole world drastically by raising a global calamitous situation. Due to this pernicious disease, millions of people have lost their lives. The scientists are still far from knowing how to tackle the coronavirus due to its multiple mutations found around the globe. Standard test...
Article
Internet of Things (IoT) enables terminal devices connecting with the internet and provides various intelligent applications by analyzing devices data. As a typical IoT technique, edge computing provides a three-tier architecture to reduce communications and improve efficiency. Specifically, edge nodes are responsible for collecting and aggregating...
Article
Full-text available
Blockchain is a revolutionary technology that is making a great impact on modern society due to its transparency, decentralization, and security properties. Blockchain gained considerable attention due to its very first application of Cryptocurrencies e.g., Bitcoin. In the near future, Blockchain technology is determined to transform the way we liv...
Conference Paper
Full-text available
The novel coronavirus 2019 (COVID-19) first appeared in Wuhan province of China and spread quickly around the globe and became a pandemic. The gold standard for confirming COVID-19 infection is through Reverse Transcription-Polymerase Chain Reaction (RT-PCR) assay. The lack of sufficient RT-PCR testing capacity, false negative results of RT-PCR, ti...
Article
Full-text available
Wireless sensor networks (WSNs) accomplish a key aspect in the Industrial Internet of Things (IIoT) that has turned out to be the most flourishing perception for computerizations in an industrial maneuver. IIoT environment is a significant application of the Internet of Things (IoT) that facilitate the professionals related to industries for remote...
Article
Full-text available
Agriculture is a fundamental pillar of society, bearing a crucial role in shaping the economy of the country and provides huge financial prospects and the possibility of employment to the large mass of the country. Thus, the incorporation of modern technology would lead to amplification in productivity and economic escalation. In this perspective,...
Article
The Social Internet of Things (SIoT) paradigm incorporates social networking concepts with the Internet of Things (IoT) solutions to support novel services. The massive amount of data (big data) produced by SIoT necessitates efficient information processing frameworks to exploit social relationships and comprehend actionable information from real-w...
Article
Full-text available
Medical images with various modalities have become an integral part of the diagnosis and treatment of several diseases. The medical practitioners often use previous case studies to deal with the current medical condition of any particular patient. In such circumstance, they need to securely access medical images of various cases which are generally...
Article
Recent advancements in internet technology and the infrastructure have attracted more people and organizations to do everything online. Internet technologies have provided amazing and smooth ease for electronic sales and purchases. However, many people have refused to use these internet technologies in electronic purchases because of unstable and i...
Article
Full-text available
In this article, a secure image retrieval scheme is proposed, which focuses on providing satisfactory retrieval results, and the framework searches relevant images even in an encrypted domain without compromising the performance of the retrieval process. Initially, bit‐level features have been endeavored from the luminance component of the image, f...
Article
Recent advances in Low Power Wide Area Network (LPWAN) are expected to augment the already prodigious proliferation of Industrial Internet of Things (IIoT). However, this unrepresented growth is tinged by the uncertainty of possible challenges in security and privacy. In this work, we propose a novel blockchain-envisioned fine grained user access c...
Article
Patient care is a key element of healthcare practices. The use of Healthcare IoT could enhance the lives of patients and the quality of services provided by medical practitioners, nurses, clinicians, and pharmaceutical companies and government in general. Wireless healthcare monitoring systems tremendously used in hospitals and other healthcare pra...
Preprint
Full-text available
Internet of things (IoT) is a contemporary technology, which links a tremendous number of devices with each other to ease the life via many useful services such as information exchange, monitoring, and control. IoT comprises different types of entities such as sensors and RFID tags, which mostly deployed in unattended, sensitive, and hostile territ...