Muhammad Asghar Khan

Muhammad Asghar Khan
Hamdard University Islamabad Campus · Electrical Engineering

PhD
Information Security, 5G/B5G/6G Networks, UAVs/Drones

About

99
Publications
184,400
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
786
Citations
Additional affiliations
August 2013 - present
Hamdard University Islamabad Campus
Position
  • Lecturer
September 2012 - present
Hamdard University Islamabad Campus
Position
  • Lecturer
Description
  • Teaching, Research and Innovation
Education
September 2015 - June 2021
Isra University, Pakistan
Field of study
  • Electronic Engineering
April 2012 - May 2014
Center For Advanced Studies In Engineering
Field of study
  • Electrical Engineering
May 2003 - June 2007
Iqra University Karachi
Field of study
  • Electronic Engineering

Publications

Publications (99)
Article
Full-text available
Recently, the demand for a faster , low-latency, and full-coverage Maritime Communication Network (MCN) has gained attention as marine operations have increased substantially. Using modern information network technologies and integrating space, air, ground, and sea network segments, MCN may be able to offer worldwide coverage and diverse Quality-of...
Article
Full-text available
The COVID-19 pandemic, caused by a new coronavirus, has affected economic and social standards as governments and healthcare regulatory agencies throughout the world expressed worry and explored harsh preventative measures to counteract the disease's spread and intensity. Several academics and experts are primarily concerned with halting the contin...
Article
Industrial Internet of Things (IIoT) community is concerned about the security of wireless communications in connected industries and autonomous systems. Providing a cyber-security scheme for the IIoT helps you to gain a thorough grasp of the whole spectrum of securing linked industries, from the edge to the cloud. Numerous security schemes have be...
Article
Full-text available
The Internet of Drones (IoD) has recently gained popularity in several military, commercial, and civilian applications due to its unique characteristics, such as high mobility, Three Dimensional (3D) movement, and ease of deployment. Drones, on the other hand, communicate over an un-encrypted wireless link and have little computational capability i...
Article
Full-text available
In recent decades, wireless power transfer (WPT) has gained significant interest from both academic and industrial experts. It possesses natural electrical isolation between transmitter and receiver components, ensuring a secure charging mechanism in an underwater scenario. This groundbreaking technology has also enabled power transmission in the d...
Article
Full-text available
A blockchain based scheme is proposed in the underlying work for performing registration, mutual authentication, data sharing and nonrepudiation in internet of wireless sensor things. The nodes are divided into three types in the proposed scheme: sensor nodes, cluster heads and coordinators. Moreover, a consortium blockchain, deployed on the coordi...
Article
With the introduction of 4G/5G internet and the increase in the number of users, the malicious cyberattacks on computing devices has been increased making them vulnerable to external threats. High availability windows servers are designed to ensure delivery of consistent services such as business activities and e-services to their customers without...
Article
Full-text available
An intelligent reflecting surface (IRS) can intelligently configure wavefronts such as amplitude , frequency, phase, and even polarization through passive reflections and without requiring any radio frequency (RF) chains. It is predicted to be a revolutionizing technology with the capability to alter wireless communication to enhance both spectrum...
Article
Full-text available
Radio frequency (RF) spectrum is highly occupied and adding further broadband channels to fulfill the exiting user requirements has become difficult. Optical free-space communication can be regarded a possible alternative as it offers several potential advantages such as reliable connectivity, secure link, higher data rates, and large bandwidth. Co...
Article
Full-text available
The groundbreaking Unmanned Aerial Vehicles (UAVs) technology has gained significant attention from both academia and industrial experts due to several applications, such as military missions, power lines inspection, precision agriculture, remote sensing, delivery services, traffic monitoring and many more. UAVs are expected to become a mainstream...
Article
Full-text available
Recently, unmanned aerial vehicles (UAVs), also known as drones, have come in a great diversity of several applications such as military, construction, image and video mapping, medical, search and rescue, parcel delivery, hidden area exploration, oil rigs and power line monitoring, precision farming, wireless communication and aerial surveillance....
Article
Full-text available
Internet of Vehicles (IoV) is an emerging area of advanced transportation systems, in which the functionality of traditional vehicular Ad-hoc Networks (VANET) combined with the internet of things (IoT). This technology allows vehicle users and drivers to interact in real time from anywhere and anytime. However, until recently, the major two problem...
Article
Full-text available
COVID-19, mobility, socio-social changes have transferred to the world of social media communication, purchasing activities, the use of services. Corporate social media has been created to support clients in using various services, give them the possibility of easy communication without time and local barriers. Unfortunately, they still very rarely...
Article
Full-text available
A Vehicular Ad-Hoc Network (VANET) is a subset of Mobile Ad-Hoc Network (MANET) that allows vehicles to communicate with each other and with roadside stations to offer efficient and safe transportation. Furthermore, when VANET is used in connection with Internet of Things (IoT) devices and sensors, it can help with traffic management and road safet...
Cover Page
Full-text available
Micro aerial vehicles (MAVs) are gaining a lot of attention in research groups and industries all over the world, due to the blooming number of military and civilian applications including industrial inspection, Search and Rescue, commodity transportation, resource exploration, civilian surveillance, and precision agriculture. Over the past decade,...
Article
The recent pandemic outbreaks have completely transformed the health system, and the healthcare industry is rapidly adopting Internet of Medical Things (IoMT) based health solutions. Information is typically exchange over an open channel in IoMT based systems, which lacks a proper defense mechanism to combat attacks and save critical data of patien...
Article
Full-text available
Signcryption is the method of combining a digital signature with encryption in a single logical step to get the cryptographic primitives of a public key. However, in addition to signcryption, we sometimes require anonymity and delegation of rights. In this paper, we propose a scheme called proxy promised signcryption to address all of these objecti...
Article
Full-text available
The Internet of Things (IoT) has revolutionized practically every industry, including agriculture, due to its fast expansion and integration into other industries. The application of IoT in agriculture motivates farmers to use their resources wisely and allows for better field monitoring and decision-making, resulting in increased agricultural prod...
Article
Full-text available
DDoS (Distributed Denial of Service) attacks have drastically effected the functioning of Internet-based services in recent years. Following the release of the Mirai botnet source code on GitHub, the scope of these exploitations has grown. The attackers have been able to construct and launch variations of the Mirai botnet thanks to the open-sourcin...
Article
Full-text available
Coupled with the issues such as inefficient encryption architectures, non-standard formats of image datasets, weak randomness of chaos based Pseudo Random Number Generators (PRNGs), omitted S-boxes and unconvincing security metrics leading to increased computational time and inadequate security level of chaos and Deoxyribonucleic Acid (DNA) based i...
Article
Full-text available
Signcryption is the method of combining a digital signature with encryption in a single logical step to get the cryptographic primitives of a public key. However, in addition to signcryption, we sometimes require anonymity and delegation of rights. In this paper, we propose a scheme called proxy promised signcryption to address all of these objecti...
Article
Full-text available
The Smart Grid-Enabled Industrial Internet of Things (SG-IIoT) is a hybrid data communications network connected with the power grid that collects and analyses data from transmission lines, distribution substations, and consumers. In the IIoT setting, SG provides predictive information to its supplier and customers on how to effectively manage the...
Article
Full-text available
Managing the consumer's knowledge is a factor that is difficult to measure and not easy to achieve, but it is the basis for building trust in energy sources, including alternative ones. Social and ecological attitudes, as well as the economic situation, force consumers to acquire knowledge and shape their views and knowledge about household energy...
Article
Full-text available
Being one of the finest applications of the IoT, smart homes (SHs) with an aim to improve quality of life are taking over the traditional lifestyles. The entities within a SH communicate with each other and with the environment including the users to transform daily life seamlessly enjoyable and easy. However, owing to the public communication infr...
Article
Full-text available
The Industrial Internet of Things (IIoT) is a technology that uses the Internet of Things (IoT) infrastructure to sense, process, and communicate real-time events in the industrial system to cut down on unnecessary operating costs and to speed up industrial automation of internal and external working processes. Since the IIoT system inherits the sa...
Article
A Smart Community (SC) is an essential part of the Internet of Energy (IoE), which helps to integrate Electric Vehicles (EVs) and distributed renewable energy sources in a smart grid. As a result of the potential privacy and security challenges in the distributed energy system, it is becoming a great problem to optimally schedule EVs' charging with...
Article
Full-text available
A Smart Community (SC) is an essential part of the Internet of Energy (IoE), which helps to integrate Electric Vehicles (EVs) and distributed renewable energy sources in a smart grid. As a result of the potential privacy and security challenges in the distributed energy system, it is becoming a great problem to optimally schedule EVs' charging with...
Article
Full-text available
Internet of drones (IoD) is a network of small drones that leverages IoT infrastructure to deliver real-time data communication services to users. On the one hand, IoD is an excellent choice for a number of military and civilian applications owing to key characteristics like agility, low cost, and ease of deployment; on the other hand, small drones...
Article
Full-text available
Since around 1980, a new generation of wireless technology has arisen approximately every 10 years. First-generation (1G) and second-generation (2G) began with voice and eventually introduced more and more data in third-generation (3G) and became highly popular in the fourth-generation (4G). To increase the data rate along with low latency and mass...
Article
Full-text available
Unmanned Aerial Vehicles (UAVs) are expected to play a key role in improving the safety and reliability of transportation systems, particularly where data traffic is non-homogeneous and non-stationary. However, heterogeneous data sharing raises plenty of security and privacy concerns, which may keep UAVs out of future Intelligent Transportation Sys...
Article
Full-text available
Telecommunications among unmanned aerial vehicles (UAVs) have emerged recently due to rapid improvements in wireless technology, low-cost equipment, advancement in networking communication techniques, and demand from various industries that seek to leverage aerial data to improve their business and operations. As such, UAVs have started to become e...
Article
Full-text available
Internet of Drones (IoD) is a network of small drones that leverages IoT infrastructure to deliver real-time data communication services to users. On the one hand, IoD is an excellent choice for a number of military and civilian applications owing to key characteristics like as agility, low cost, and ease of deployment; on the other hand, small dro...
Article
Full-text available
The Sixth-Generation (6G) mobile network has the potential to provide not only traditional communication services but also additional processing, caching, sensing, and control capabilities to a massive number of Internet of Things (IoT) devices. Meanwhile, a 6G mobile network may provide global coverage and diverse quality-of-service provisioning t...
Article
Full-text available
Cellular mobile technology has witnessed tremendous growth in recent times. One of the challenges facing the operators to extend the coverage of the networks to meet the rising demand for cellular mobile services is the power sources used to supply cellular towers with energy, especially in remote. Thus, switch from the conventional sources of ener...
Article
Full-text available
The Internet of things (IoT) has emerged into a revolutionary technology that enables a wide range of features and applications given the proliferation of sensors and actuators embedded in everyday objects, as well as the ubiquitous availability of high-speed Internet. When nearly everything is connected to the Internet, security and privacy concer...
Article
Full-text available
This article deals with the application of differential geometry to the array manifolds of non-uniform linear antenna array (NULA) when estimating the direction of arrival (DOA) of multiple sources present in an environment using far field approximation. In order to resolve this issue, we utilized a doublet linear antenna array (DLA) comprising two...
Article
Full-text available
Thanks to recent advancements in biomedical sensors, wireless networking technologies, and information networks, traditional healthcare methods are evolving into a new healthcare infra-structure known as the Internet of Medical Things (IoMT). It enables patients in remote areas to obtain preventative or proactive healthcare services at a cheaper co...
Article
Full-text available
Cloud computing aims to provide reliable, customized, and quality of service (QoS) guaranteed dynamic computing environments for end-users. However, there are applications such as e-health and emergency response monitoring that require quick response and low latency. Delays caused by transferring data over the cloud can seriously affect the perform...
Article
Full-text available
The evolution of Flying Ad-hoc Networks (FANETs) marks the paradigm shift from a single large drone to multiple small drones linked together in an ad-hoc fashion. To maintain the Quality of Service (QoS) in the multi-hop networking schema, FANETs utilize the available resources efficiently. However, due to open wireless boundary and high mobility o...
Article
Full-text available
Plant diseases pose a severe threat to crop yield. This necessitates the rapid identification of diseases affecting various crops using modern technologies. Many researchers have developed solutions to the problem of identifying plant diseases, but it is still considered a critical issue due to the lack of infrastructure in many parts of the world....
Article
Full-text available
Big data has recently been a prominent topic of research due to the exponential growth of data every year. This massive growth of data is causing problems with resource management. The available literature does not address this problem in depth. Therefore, in this article, we aim to cover the topic of resource management for big data in detail. We...
Article
Full-text available
Internet of Vehicles (IoV) is a specialized breed of Vehicular Ad-hoc Networks (VANETs) in which each entity of the system can be connected to the internet. In the provision of potentially vital services, IoV transmits a large amount of confidential data through networks, posing various security and privacy concerns. Moreover, the possibility of cy...
Article
The deaf-mutes population always feeling helpless when they are not understood by others and vice versa. To fill this gap, this study implements a CNN based neural network, Convolutional Based Attention Module (CBAM) to recognise Malaysian Sign language in image and video recognition. This study has created 2071 videos for 19 dynamic signs. Two dif...
Article
— The Internet of Vehicles (IoV) is considered an enhancement of existing vehicular ad-hoc networks, which helps connect mobile vehicles to the Internet of Things (IoT) with the support of 5G networks. To assure the quality-of-service demand by the users, the edge computing paradigm of 5G networks can be incorporated in the IoV environment for supp...
Article
Full-text available
Scalability is one of the most important quality attribute of software-intensive systems, because it maintains an effective performance parallel to the large fluctuating and sometimes unpredictable workload. In order to achieve scalability, thread pool system (TPS) (which is also known as executor service) has been used extensively as a middleware...
Article
Full-text available
Currently, Hyper Elliptic Curve Cryptography (HECC) got attractions towards low power devices like the Industrial Internet of Things (IIoT). As we all know that it has the capability of utilizing low key size, which can suitable for IIoT environment. Inspiring by the aforementioned property of HECC, we proposed an efficient scheme for IIoT using ce...
Article
Full-text available
Internet of Health Things (IoHT) is a hot topic of research presently, which provides a reliable and intelligent healthcare system for monitoring the physical conditions of the patients over the Internet from anywhere and anytime. The ease of time-independent interaction from geographically remote areas is a core advantage of the IoHT system, which...
Article
Full-text available
One of the most commonly reported disabilities is vision loss, which can be diagnosed by an ophthalmologist in order to determine the visual system of a patient. This procedure, however, usually requires an appointment with an ophthalmologist, which is both time-consuming and expensive process. Other issues that can arise include a lack of appropri...
Article
Full-text available
Internet of Drones (IoD) is a decentralized networking architecture that makes use of the internet for uniting drones to enter controlled airspace in a coordinated manner. On the one hand, this new clan of interconnected drones has ushered in a new era of real-world applications; Small drones, on the other hand, are generally not designed with secu...
Article
Full-text available
This paper presents a stochastic heuristic approach to solve numerically nonlinear differential equation (NLDE) governing the thin film flow of a third grade fluid (TFF-TGF) on a moving belt. Moreover, the impact on velocity profile due to fluid attribute is also investigated. The estimate solution of the given NLDE is achieved by using the linear...
Article
Full-text available
Linear antenna arrays (LAs) can be used to accurately predict the direction of arrival (DOAs) of various targets of interest in a given area. However, under certain conditions, LA suffers from the problem of ambiguities among the angles of targets, which may result in misinterpretation of such targets. In order to cope up with such ambiguities, var...