Muhammad Asghar Khan

Muhammad Asghar Khan
Prince Mohammad bin Fahd University · Electrical

Doctor of Engineering
looking for potential collaborators in the following fields: Information Security, 5G/B5G/6G Networks, UAVs/Drones,AI/ML

About

136
Publications
252,685
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
3,679
Citations
Additional affiliations
September 2012 - December 2021
Hamdard University Islamabad Campus
Position
  • Lecturer
Description
  • Teaching, Research and Innovation
August 2013 - December 2022
Hamdard University Islamabad Campus
Position
  • Professor (Assistant)
Education
September 2015 - June 2021
Isra University
Field of study
  • Electronic Engineering
April 2012 - May 2014
Center For Advanced Studies In Engineering
Field of study
  • Electrical Engineering
May 2003 - June 2007
Iqra University Karachi
Field of study
  • Electronic Engineering

Publications

Publications (136)
Article
Unmanned aerial vehicles (UAVs) have enabled numerous inventive solutions to multiple problems, considerably facilitating our daily lives; however, UAVs frequently rely on an open wireless channel for communication, making them susceptible to cyber-physical threats. Also, UAVs cannot execute complicated cryptographic algorithms due to their limited...
Article
Unmanned Aerial Vehicles (UAVs) are increasingly recognized for their pivotal role in military and civilian applications, serving as essential technology for transmitting, evaluating, and gathering information. Unfortunately, this crucial process often occurs through unsecured wireless connections, exposing it to numerous cyber-physical attacks. Fu...
Article
Full-text available
Unmanned aerial vehicles (UAVs) in beyond 5G (B5G) are crucial for revolutionizing various industries, including surveillance, agriculture, and logistics, by enabling high-speed data transfer, ultra-low latency communication, and ultra-reliable connectivity. However, integrating UAVs into B5G networks poses various security and privacy concerns. Th...
Article
Full-text available
The evolving paradigm of private edge computing seamlessly incorporates the more extensive functionalities of cloud computing with localized processing. This paradigm eliminates the requirement for unmanned aerial vehicles (UAVs) to transmit large volumes of data to a centralized cloud, thereby reducing response times. UAVs' dynamic nature and depe...
Article
Full-text available
Unmanned Aerial Vehicles (UAVs), commonly known as drones, are increasingly being employed across a broad spectrum of applications, ranging from military operations to commercial purposes. However, as UAVs become more integrated into everyday life, security and privacy concerns are similarly escalating due to vulnerabilities arising from operating...
Article
Full-text available
UAV networks have gained widespread recognition across multiple industries due to their remarkable adaptability, prompting a fundamental transformation in operational procedures. However, utilizing the open wireless communication channel has consistently brought about significant privacy concerns as a prominent aspect within these networks. Moreove...
Article
Full-text available
Fifth-generation (5G) cellular networks have led to the implementation of beyond 5G (B5G) networks, which are capable of incorporating autonomous services to swarm of unmanned aerial vehicles (UAVs). They provide capacity expansion strategies to address massive connectivity issues and guarantee ultra-high throughput and low latency, especially in e...
Article
The Internet of Vehicles (IoVs) is a wireless network of intelligent and autonomous vehicles and Roadside Units (RSUs), which work together to improve transportation services. On the one hand, this revolutionary mode of transportation optimizes traffic efficiency and reduces congestion and accidents; on the other hand, it raises security and privac...
Article
Full-text available
Thanks to the widespread availability of Fifth Generation (5G) wireless connectivity, it is now possible to provide preventative or proactive healthcare services from any location and at any time. As a result of this technological improvement, Wireless Body Area Networks (WBANs) have emerged as a new study of research in the field of healthcare in...
Article
Full-text available
This Topic Issue mainly aims to shed some light on current research initiatives from scientific experts and industrialists from diversified interests and various fields to unlock promising application scenarios, address recent breakthroughs, explore research novelties, and investigate technical uncertainties. Fifty-six articles were submitted for c...
Article
Full-text available
The Internet of Things (IoT) is a fast-growing technology that enable existing systems to communicate with one another by using new devices such as sensors and other smart devices. The IoT devices such as wireless sensors and other smart devices are often very cheap, very small, and have limited power sources, memories, and processing capabilities....
Article
Full-text available
Vehicular ad-hoc networks (VANETs) have become an essential part of the intelligent transportation system because they provide secure communication among the vehicles, enhance vehicle safety, and improve the driving experience. However, due to the openness and vulnerability of wireless networks, the participating vehicles in a VANET system are pron...
Article
Full-text available
This study introduces a monopole 4 × 4 Ultra-Wide-Band (UWB) Multiple-Input Multiple-Output (MIMO) antenna system with a novel structure and outstanding performance. The proposed design has triple-notched characteristics due to CSRR etching and a C-shaped curve. The notching occurs in 4.5 GHz, 5.5 GHz, and 8.8 GHz frequencies in the C-band, WLAN ba...
Article
This article introduces a monopole 4x4 Ultra-Wide-Band (UWB) Multiple Input Multiple Output (MIMO) antenna system with a novel structure and outstanding performance. The proposed design has triple-notched characteristics due to CSRR etching and a C-shaped curve. The notching occurs in 4.5 GHz, 5.5 GHz, and 8.8 GHz frequencies in the C-band, WLAN ba...
Article
Full-text available
The Internet of Medical Things (IoMT) overcomes the flaws in the traditional healthcare system by enabling remote administration, more effective use of resources, and the mobility of medical devices to fulfil the patient’s needs. The IoMT makes it simple to review the patient’s cloud-based medical history in addition to allowing the doctor to keep...
Article
Full-text available
On the one hand, the Internet of Medical Things (IoMT) in healthcare systems has emerged as a promising technology to monitor patients' health and provide reliable medical services, especially in remote and underserved areas. On the other hand, in disaster scenarios, the loss of communication infrastructure can make it challenging to establish reli...
Article
Full-text available
The integration of the Internet of Things (IoT) and the telecare medical information system (TMIS) enables patients to receive timely and convenient healthcare services regardless of their location or time zone. Since the Internet serves as the key hub for connection and data sharing, its open nature presents security and privacy concerns and shoul...
Article
Full-text available
Security and privacy issues have long been a subject of concern with drones from the past few years. This is due to the lack of security and privacy considerations in the design of the drone, which includes unsecured wireless channels and insufficient computing capability to perform complex cryptographic algorithms. Owing to the extensive real-time...
Article
Full-text available
The intelligent reflecting surface (IRS) is a cutting-edge technology for cost-effectively achieving future spectrum- and energy-efficient wireless communication. In particular, an IRS comprises many low-cost passive devices that can independently reflect the incident signal with a configurable phase shift to produce three-dimensional (3D) passive...
Article
Full-text available
Recently, Micro Air Vehicles (MAVs) have been receiving a significant amount of attention from research organizations and businesses worldwide due to their unique characteristics, including high mobility, three-dimensional (3D) movement, and ease of deployment [...]
Article
Full-text available
Artificial intelligence (AI) has provided significant help in many fields of life. This study proposed a framework that helped in understanding customers’ attitudes about the adoption of Robo-advisors. The role of the Technology Readiness Index moderated as one of the primary relationships. A total of 208 potential users of Robo-advisor services pr...
Article
Full-text available
The Sixth-Generation (6G) mobile network has the potential to provide not only traditional communication services but also additional processing, caching, sensing, and control capabilities to a massive number of Internet of Things (IoT) devices. Meanwhile, a 6G mobile network may provide global coverage and diverse quality-of-service provisioning t...
Article
Full-text available
As an extension of the wired network, the use of the wireless communication network has con-siderably boosted users’ productivity at work and in their daily lives. The most notable aspect of the wireless communication network is that it overcomes the constraints of the wired network, reduces the amount of cost spent on wire maintenance, and distrib...
Article
Full-text available
Recently, unmanned aerial vehicles (UAVs) or drones have emerged as a ubiquitous and integral part of our society. They appear in great diversity in a multiplicity of applications for economic, commercial, leisure, military, and academic purposes. The drone industry has seen a sharp uptake in the last decade as a model to manufacture and deliver co...
Article
Full-text available
This paper presents the design of an arc-shaped near-isotropic self-complementary antenna for spectrum sensing application. An arc-shaped dipole with horizontal and vertical arms is used to achieve a near isotropic radiation pattern. The radiation pattern improved by adjusting the horizontal and vertical arm lengths. Simulated and experimental resu...
Article
Full-text available
Oceans cover more than 70% of the Earth's surface. For various reasons, almost 95% of these areas remain unexplored. Underwater wireless communication (UWC) has widespread applications , including real-time aquatic data collection, naval surveillance, natural disaster prevention, archaeological expeditions, oil and gas exploration, shipwreck explor...
Article
Full-text available
The Internet of Drones (IoD) is a network of drones that utilizes existing Internet of Things (IoT) infrastructure to facilitate mission fulfilment through real-time data transfer and navigation services. IoD deployments, on the other hand, are often done in public wireless settings, which raises serious security and privacy concerns. A key source...
Article
Full-text available
Early clinical diagnosis and treatment of disease rely heavily on measuring the many various types of medical information that are scattered throughout the body. Continuous and accurate monitoring of the human body is required in order to identify abnormal medical signals and to locate the factors that contribute to their occurrence in a timely man...
Article
Recently, the demand for a faster , low-latency, and full-coverage Maritime Communication Network (MCN) has gained attention as marine operations have increased substantially. Using modern information network technologies and integrating space, air, ground, and sea network segments, MCN may be able to offer worldwide coverage and diverse Quality-of...
Cover Page
Full-text available
Networks beyond 5G (B5G) include the automation and intelligence of drones, as well as strategies for capacity expansion to address the massive connectivity problems and provide ultra-high throughput and low latency. On the other hand, security and privacy threats have always been a concern with drones. This is due to the absence of security and pr...
Cover Page
Full-text available
Nowadays, a variety of Unmanned Aerial Vehicles (UAVs) are commercially available and are widely used for several real-world tasks, such as environmental monitoring, construction site surveys, remote sensing data collection, vertical structure inspection, glaciology, smart agriculture, forestry, atmospheric research, disaster prevention, humanitari...
Article
Full-text available
Unmanned aerial vehicles (UAV) have emerged as prime technologies due to their compatible size and flexible architecture. UAV technology offers services in vast application such as inter-UAV communication, wireless sensors, and the future Internet of Things (IoT) due to its compatible architecture. A UAV’s speed varies while roaming, which may incr...
Article
Full-text available
Micro Aerial Vehicles (MAVs) are a type of UAV that are both small and fully autonomous, making them ideal for both civilian and military applications. Modern MAVs can hover and navigate while carrying several sensors, operate over long distances, and send data to a portable base station. Despite their many benefits, MAVs often encounter obstacles...
Article
Full-text available
Dengue is a mosquito-borne viral infection, found in tropical and sub-tropical climates worldwide, mostly in urban and semi-urban areas. Countries like Pakistan receive heavy rains annually resulting in floods in urban cities due to poor drainage systems. Currently, different cities of Pakistan are at high risk of dengue outbreaks, as multiple deng...
Article
Fifth-generation (5G) cellular networks have led to the implementation of beyond 5G (B5G) networks, which are capable of incorporating autonomous services to swarm of unmanned aerial vehicles (UAVs). They provide capacity expansion strategies to address massive connectivity issues and guarantee ultra-high throughput and low latency, especially in e...
Preprint
Fifth-generation (5G) cellular networks have led to the implementation of beyond 5G (B5G) networks, which are capable of incorporating autonomous services to swarm of unmanned aerial vehicles (UAVs). They provide capacity expansion strategies to address massive connectivity issues and guarantee ultra-high throughput and low latency, especially in e...
Article
Full-text available
With the introduction of 4G/5G internet and the increase in the number of users, the malicious cyberattacks on computing devices has been increased making them vulnerable to external threats. High availability windows servers are designed to ensure delivery of consistent services such as business activities and e-services to their customers without...
Article
Full-text available
The COVID-19 pandemic, caused by a new coronavirus, has affected economic and social standards as governments and healthcare regulatory agencies throughout the world expressed worry and explored harsh preventative measures to counteract the disease's spread and intensity. Several academics and experts are primarily concerned with halting the contin...
Article
Full-text available
Industrial Internet of Things (IIoT) community is concerned about the security of wireless communications in connected industries and autonomous systems. Providing a cyber-security scheme for the IIoT helps you to gain a thorough grasp of the whole spectrum of securing linked industries, from the edge to the cloud. Numerous security schemes have be...
Article
Full-text available
The Internet of Drones (IoD) has recently gained popularity in several military, commercial, and civilian applications due to its unique characteristics, such as high mobility, Three Dimensional (3D) movement, and ease of deployment. Drones, on the other hand, communicate over an un-encrypted wireless link and have little computational capability i...
Article
Full-text available
In recent decades, wireless power transfer (WPT) has gained significant interest from both academic and industrial experts. It possesses natural electrical isolation between transmitter and receiver components, ensuring a secure charging mechanism in an underwater scenario. This groundbreaking technology has also enabled power transmission in the d...
Article
Full-text available
A blockchain based scheme is proposed in the underlying work for performing registration, mutual authentication, data sharing and nonrepudiation in internet of wireless sensor things. The nodes are divided into three types in the proposed scheme: sensor nodes, cluster heads and coordinators. Moreover, a consortium blockchain, deployed on the coordi...
Article
Full-text available
An intelligent reflecting surface (IRS) can intelligently configure wavefronts such as amplitude , frequency, phase, and even polarization through passive reflections and without requiring any radio frequency (RF) chains. It is predicted to be a revolutionizing technology with the capability to alter wireless communication to enhance both spectrum...
Article
Radio frequency (RF) spectrum is highly occupied and adding further broadband channels to fulfill the exiting user requirements has become difficult. Optical free-space communication can be regarded a possible alternative as it offers several potential advantages such as reliable connectivity, secure link, higher data rates, and large bandwidth. Co...
Article
Full-text available
The groundbreaking Unmanned Aerial Vehicles (UAVs) technology has gained significant attention from both academia and industrial experts due to several applications, such as military missions, power lines inspection, precision agriculture, remote sensing, delivery services, traffic monitoring and many more. UAVs are expected to become a mainstream...
Article
Full-text available
Recently, unmanned aerial vehicles (UAVs), also known as drones, have come in a great diversity of several applications such as military, construction, image and video mapping, medical, search and rescue, parcel delivery, hidden area exploration, oil rigs and power line monitoring, precision farming, wireless communication and aerial surveillance....
Article
Full-text available
Internet of Vehicles (IoV) is an emerging area of advanced transportation systems, in which the functionality of traditional vehicular Ad-hoc Networks (VANET) combined with the internet of things (IoT). This technology allows vehicle users and drivers to interact in real time from anywhere and anytime. However, until recently, the major two problem...
Article
Full-text available
COVID-19, mobility, socio-social changes have transferred to the world of social media communication, purchasing activities, the use of services. Corporate social media has been created to support clients in using various services, give them the possibility of easy communication without time and local barriers. Unfortunately, they still very rarely...
Article
Full-text available
A Vehicular Ad-Hoc Network (VANET) is a subset of Mobile Ad-Hoc Network (MANET) that allows vehicles to communicate with each other and with roadside stations to offer efficient and safe transportation. Furthermore, when VANET is used in connection with Internet of Things (IoT) devices and sensors, it can help with traffic management and road safet...
Cover Page
Full-text available
Micro aerial vehicles (MAVs) are gaining a lot of attention in research groups and industries all over the world, due to the blooming number of military and civilian applications including industrial inspection, Search and Rescue, commodity transportation, resource exploration, civilian surveillance, and precision agriculture. Over the past decade,...
Article
The recent pandemic outbreaks have completely transformed the health system, and the healthcare industry is rapidly adopting Internet of Medical Things (IoMT) based health solutions. Information is typically exchange over an open channel in IoMT based systems, which lacks a proper defense mechanism to combat attacks and save critical data of patien...
Article
Full-text available
Signcryption is the method of combining a digital signature with encryption in a single logical step to get the cryptographic primitives of a public key. However, in addition to signcryption, we sometimes require anonymity and delegation of rights. In this paper, we propose a scheme called proxy promised signcryption to address all of these objecti...
Article
Full-text available
The Internet of Things (IoT) has revolutionized practically every industry, including agriculture, due to its fast expansion and integration into other industries. The application of IoT in agriculture motivates farmers to use their resources wisely and allows for better field monitoring and decision-making, resulting in increased agricultural prod...
Article
Full-text available
DDoS (Distributed Denial of Service) attacks have drastically effected the functioning of Internet-based services in recent years. Following the release of the Mirai botnet source code on GitHub, the scope of these exploitations has grown. The attackers have been able to construct and launch variations of the Mirai botnet thanks to the open-sourcin...
Article
Full-text available
Coupled with the issues such as inefficient encryption architectures, non-standard formats of image datasets, weak randomness of chaos based Pseudo Random Number Generators (PRNGs), omitted S-boxes and unconvincing security metrics leading to increased computational time and inadequate security level of chaos and Deoxyribonucleic Acid (DNA) based i...
Article
Full-text available
Signcryption is the method of combining a digital signature with encryption in a single logical step to get the cryptographic primitives of a public key. However, in addition to signcryption, we sometimes require anonymity and delegation of rights. In this paper, we propose a scheme called proxy promised signcryption to address all of these objecti...
Article
Full-text available
The Smart Grid-Enabled Industrial Internet of Things (SG-IIoT) is a hybrid data communications network connected with the power grid that collects and analyses data from transmission lines, distribution substations, and consumers. In the IIoT setting, SG provides predictive information to its supplier and customers on how to effectively manage the...
Article
Full-text available
Scalability is one of the utmost nonfunctional requirement of server applications, because it maintains an effective performance parallel to the large fluctuating and sometimes unpredictable workload. In order to achieve scalability, thread pool system (TPS) has been used extensively as a middleware service in server applications. The size of threa...
Article
Full-text available
Managing the consumer's knowledge is a factor that is difficult to measure and not easy to achieve, but it is the basis for building trust in energy sources, including alternative ones. Social and ecological attitudes, as well as the economic situation, force consumers to acquire knowledge and shape their views and knowledge about household energy...