Muhammad Asghar KhanPrince Mohammad bin Fahd University · Electrical
Muhammad Asghar Khan
Doctor of Engineering
looking for potential collaborators in the following fields:
Information Security, 5G/B5G/6G Networks, UAVs/Drones,AI/ML
About
136
Publications
252,685
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
3,679
Citations
Introduction
For ongoing Special Issues, visit my website:
https://sites.google.com/view/muhammad-asghar-khan
Additional affiliations
September 2012 - December 2021
August 2013 - December 2022
Education
September 2015 - June 2021
April 2012 - May 2014
May 2003 - June 2007
Iqra University Karachi
Field of study
- Electronic Engineering
Publications
Publications (136)
Unmanned aerial vehicles (UAVs) have enabled numerous inventive solutions to multiple problems, considerably facilitating our daily lives; however, UAVs frequently rely on an open wireless channel for communication, making them susceptible to cyber-physical threats. Also, UAVs cannot execute complicated cryptographic algorithms due to their limited...
Unmanned Aerial Vehicles (UAVs) are increasingly recognized for their pivotal role in military and civilian applications, serving as essential technology for transmitting, evaluating, and gathering information. Unfortunately, this crucial process often occurs through unsecured wireless connections, exposing it to numerous cyber-physical attacks. Fu...
Unmanned aerial vehicles (UAVs) in beyond 5G (B5G) are crucial for revolutionizing various industries, including surveillance, agriculture, and logistics, by enabling high-speed data transfer, ultra-low latency communication, and ultra-reliable connectivity. However, integrating UAVs into B5G networks poses various security and privacy concerns. Th...
The evolving paradigm of private edge computing seamlessly incorporates the more extensive functionalities of cloud computing with localized processing. This paradigm eliminates the requirement for unmanned aerial vehicles (UAVs) to transmit large volumes of data to a centralized cloud, thereby reducing response times. UAVs' dynamic nature and depe...
Unmanned Aerial Vehicles (UAVs), commonly known as drones, are increasingly being employed across a broad spectrum of applications, ranging from military operations to commercial purposes. However, as UAVs become more integrated into everyday life, security and privacy concerns are similarly escalating due to vulnerabilities arising from operating...
UAV networks have gained widespread recognition across multiple industries due to their remarkable adaptability, prompting a fundamental transformation in operational procedures. However, utilizing the open wireless communication channel has consistently brought about significant privacy concerns as a prominent aspect within these networks. Moreove...
Fifth-generation (5G) cellular networks have led to the implementation of beyond 5G (B5G) networks, which are capable of incorporating autonomous services to swarm of unmanned aerial vehicles (UAVs). They provide capacity expansion strategies to address massive connectivity issues and guarantee ultra-high throughput and low latency, especially in e...
The Internet of Vehicles (IoVs) is a wireless network of intelligent and autonomous vehicles and Roadside Units (RSUs), which work together to improve transportation services. On the one hand, this revolutionary mode of transportation optimizes traffic efficiency and reduces congestion and accidents; on the other hand, it raises security and privac...
Thanks to the widespread availability of Fifth Generation (5G) wireless connectivity, it is now possible to provide preventative or proactive healthcare services from any location and at any time. As a result of this technological improvement, Wireless Body Area Networks (WBANs) have emerged as a new study of research in the field of healthcare in...
This Topic Issue mainly aims to shed some light on current research initiatives from
scientific experts and industrialists from diversified interests and various fields to unlock promising application scenarios, address recent breakthroughs, explore research novelties, and investigate technical uncertainties. Fifty-six articles were submitted for c...
The Internet of Things (IoT) is a fast-growing technology that enable existing systems to communicate with one another by using new devices such as sensors and other smart devices. The IoT devices such as wireless sensors and other smart devices are often very cheap, very small, and have limited power sources, memories, and processing capabilities....
Vehicular ad-hoc networks (VANETs) have become an essential part of the intelligent transportation system because they provide secure communication among the vehicles, enhance vehicle safety, and improve the driving experience. However, due to the openness and vulnerability of wireless networks, the participating vehicles in a VANET system are pron...
This study introduces a monopole 4 × 4 Ultra-Wide-Band (UWB) Multiple-Input Multiple-Output (MIMO) antenna system with a novel structure and outstanding performance. The proposed design has triple-notched characteristics due to CSRR etching and a C-shaped curve. The notching occurs in 4.5 GHz, 5.5 GHz, and 8.8 GHz frequencies in the C-band, WLAN ba...
This article introduces a monopole 4x4 Ultra-Wide-Band (UWB) Multiple Input Multiple Output (MIMO) antenna system with a novel structure and outstanding performance. The proposed design has triple-notched characteristics due to CSRR etching and a C-shaped curve. The notching occurs in 4.5 GHz, 5.5 GHz, and 8.8 GHz frequencies in the C-band, WLAN ba...
The Internet of Medical Things (IoMT) overcomes the flaws in the traditional healthcare system by enabling remote administration, more effective use of resources, and the mobility of medical devices to fulfil the patient’s needs. The IoMT makes it simple to review the patient’s cloud-based medical history in addition to allowing the doctor to keep...
On the one hand, the Internet of Medical Things (IoMT) in healthcare systems has emerged as a promising technology to monitor patients' health and provide reliable medical services, especially in remote and underserved areas. On the other hand, in disaster scenarios, the loss of communication infrastructure can make it challenging to establish reli...
The integration of the Internet of Things (IoT) and the telecare medical information system (TMIS) enables patients to receive timely and convenient healthcare services regardless of their location or time zone. Since the Internet serves as the key hub for connection and data sharing, its open nature presents security and privacy concerns and shoul...
Security and privacy issues have long been a subject of concern with drones from the past few years. This is due to the lack of security and privacy considerations in the design of the drone, which includes unsecured wireless channels and insufficient computing capability to perform complex cryptographic algorithms. Owing to the extensive real-time...
The intelligent reflecting surface (IRS) is a cutting-edge technology for cost-effectively achieving future spectrum- and energy-efficient wireless communication. In particular, an IRS comprises many low-cost passive devices that can independently reflect the incident signal with a configurable phase shift to produce three-dimensional (3D) passive...
Recently, Micro Air Vehicles (MAVs) have been receiving a significant amount of attention from research organizations and businesses worldwide due to their unique characteristics, including high mobility, three-dimensional (3D) movement, and ease of deployment [...]
Artificial intelligence (AI) has provided significant help in many fields of life. This study proposed a framework that helped in understanding customers’ attitudes about the adoption of Robo-advisors. The role of the Technology Readiness Index moderated as one of the primary relationships. A total of 208 potential users of Robo-advisor services pr...
The Sixth-Generation (6G) mobile network has the potential to provide not only traditional communication services but also additional processing, caching, sensing, and control capabilities to a massive number of Internet of Things (IoT) devices. Meanwhile, a 6G mobile network may provide global coverage and diverse quality-of-service provisioning t...
As an extension of the wired network, the use of the wireless communication network has con-siderably boosted users’ productivity at work and in their daily lives. The most notable aspect of the wireless communication network is that it overcomes the constraints of the wired network, reduces the amount of cost spent on wire maintenance, and distrib...
Recently, unmanned aerial vehicles (UAVs) or drones have emerged as a ubiquitous and integral part of our society. They appear in great diversity in a multiplicity of applications for economic, commercial, leisure, military, and academic purposes. The drone industry has seen a sharp uptake in the last decade as a model to manufacture and deliver co...
This paper presents the design of an arc-shaped near-isotropic self-complementary antenna for spectrum sensing application. An arc-shaped dipole with horizontal and vertical arms is used to achieve a near isotropic radiation pattern. The radiation pattern improved by adjusting the horizontal and vertical arm lengths. Simulated and experimental resu...
Oceans cover more than 70% of the Earth's surface. For various reasons, almost 95% of these areas remain unexplored. Underwater wireless communication (UWC) has widespread applications , including real-time aquatic data collection, naval surveillance, natural disaster prevention, archaeological expeditions, oil and gas exploration, shipwreck explor...
The Internet of Drones (IoD) is a network of drones that utilizes existing Internet of Things (IoT) infrastructure to facilitate mission fulfilment through real-time data transfer and navigation services. IoD deployments, on the other hand, are often done in public wireless settings, which raises serious security and privacy concerns. A key source...
Early clinical diagnosis and treatment of disease rely heavily on measuring the many various types of medical information that are scattered throughout the body. Continuous and accurate monitoring of the human body is required in order to identify abnormal medical signals and to locate the factors that contribute to their occurrence in a timely man...
Recently, the demand for a faster , low-latency, and full-coverage Maritime Communication Network (MCN) has gained attention as marine operations have increased substantially. Using modern information network technologies and integrating space, air, ground, and sea network segments, MCN may be able to offer worldwide coverage and diverse Quality-of...
Networks beyond 5G (B5G) include the automation and intelligence of drones, as well as strategies for capacity expansion to address the massive connectivity problems and provide ultra-high throughput and low latency. On the other hand, security and privacy threats have always been a concern with drones. This is due to the absence of security and pr...
Nowadays, a variety of Unmanned Aerial Vehicles (UAVs) are commercially available and are widely used for several real-world tasks, such as environmental monitoring, construction site surveys, remote sensing data collection, vertical structure inspection, glaciology, smart agriculture, forestry, atmospheric research, disaster prevention, humanitari...
Unmanned aerial vehicles (UAV) have emerged as prime technologies due to their compatible size and flexible architecture. UAV technology offers services in vast application such as inter-UAV communication, wireless sensors, and the future Internet of Things (IoT) due to its compatible architecture. A UAV’s speed varies while roaming, which may incr...
Micro Aerial Vehicles (MAVs) are a type of UAV that are both small and fully autonomous, making them ideal for both civilian and military applications. Modern MAVs can hover and navigate while carrying several sensors, operate over long distances, and send data to a portable base station. Despite their many benefits, MAVs often encounter obstacles...
Dengue is a mosquito-borne viral infection, found in tropical and sub-tropical climates
worldwide, mostly in urban and semi-urban areas. Countries like Pakistan receive heavy rains annually resulting in floods in urban cities due to poor drainage systems. Currently, different cities of Pakistan are at high risk of dengue outbreaks, as multiple deng...
Fifth-generation (5G) cellular networks have led to the implementation of beyond 5G (B5G) networks, which are capable of incorporating autonomous services to swarm of unmanned aerial vehicles (UAVs). They provide capacity expansion strategies to address massive connectivity issues and guarantee ultra-high throughput and low latency, especially in e...
Fifth-generation (5G) cellular networks have led to the implementation of beyond 5G (B5G) networks, which are capable of incorporating autonomous services to swarm of unmanned aerial vehicles (UAVs). They provide capacity expansion strategies to address massive connectivity issues and guarantee ultra-high throughput and low latency, especially in e...
With the introduction of 4G/5G internet and the increase in the number of users, the malicious cyberattacks on computing devices has been increased making them vulnerable to external threats. High availability windows servers are designed to ensure delivery of consistent services such as business activities and e-services to their customers without...
The COVID-19 pandemic, caused by a new coronavirus, has affected economic and social standards as governments and healthcare regulatory agencies throughout the world expressed worry and explored harsh preventative measures to counteract the disease's spread and intensity. Several academics and experts are primarily concerned with halting the contin...
Industrial Internet of Things (IIoT) community is concerned about the security of wireless communications in connected industries and autonomous systems. Providing a cyber-security scheme for the IIoT helps you to gain a thorough grasp of the whole spectrum of securing linked industries, from the edge to the cloud. Numerous security schemes have be...
The Internet of Drones (IoD) has recently gained popularity in several military, commercial, and civilian applications due to its unique characteristics, such as high mobility, Three Dimensional (3D) movement, and ease of deployment. Drones, on the other hand, communicate over an un-encrypted wireless link and have little computational capability i...
In recent decades, wireless power transfer (WPT) has gained significant interest from both academic and industrial experts. It possesses natural electrical isolation between transmitter and receiver components, ensuring a secure charging mechanism in an underwater scenario. This groundbreaking technology has also enabled power transmission in the d...
A blockchain based scheme is proposed in the underlying work for performing registration, mutual authentication, data sharing and nonrepudiation in internet of wireless sensor things. The nodes are divided into three types in the proposed scheme: sensor nodes, cluster heads and coordinators. Moreover, a consortium blockchain, deployed on the coordi...
An intelligent reflecting surface (IRS) can intelligently configure wavefronts such as amplitude , frequency, phase, and even polarization through passive reflections and without requiring any radio frequency (RF) chains. It is predicted to be a revolutionizing technology with the capability to alter wireless communication to enhance both spectrum...
Radio frequency (RF) spectrum is highly occupied and adding further broadband channels to fulfill the exiting user requirements has become difficult. Optical free-space communication can be regarded a possible alternative as it offers several potential advantages such as reliable connectivity, secure link, higher data rates, and large bandwidth. Co...
The groundbreaking Unmanned Aerial Vehicles (UAVs) technology has gained significant attention from both academia and industrial experts due to several applications, such as military missions, power lines inspection, precision agriculture, remote sensing, delivery services, traffic monitoring and many more. UAVs are expected to become a mainstream...
Recently, unmanned aerial vehicles (UAVs), also known as drones, have come in a great diversity of several applications such as military, construction, image and video mapping, medical, search and rescue, parcel delivery, hidden area exploration, oil rigs and power line monitoring, precision farming, wireless communication and aerial surveillance....
Internet of Vehicles (IoV) is an emerging area of advanced transportation systems, in which the functionality of traditional vehicular Ad-hoc Networks (VANET) combined with the internet of things (IoT). This technology allows vehicle users and drivers to interact in real time from anywhere and anytime. However, until recently, the major two problem...
COVID-19, mobility, socio-social changes have transferred to the world of social media communication, purchasing activities, the use of services. Corporate social media has been created to support clients in using various services, give them the possibility of easy communication without time and local barriers. Unfortunately, they still very rarely...
A Vehicular Ad-Hoc Network (VANET) is a subset of Mobile Ad-Hoc Network (MANET) that allows vehicles to communicate with each other and with roadside stations to offer efficient and safe transportation. Furthermore, when VANET is used in connection with Internet of Things (IoT) devices and sensors, it can help with traffic management and road safet...
Micro aerial vehicles (MAVs) are gaining a lot of attention in research groups and industries all over the world, due to the blooming number of military and civilian applications including industrial inspection, Search and Rescue, commodity transportation, resource exploration, civilian surveillance, and precision agriculture. Over the past decade,...
The recent pandemic outbreaks have completely transformed the health system, and the healthcare industry is rapidly adopting Internet of Medical Things (IoMT) based health solutions. Information is typically exchange over an open channel in IoMT based systems, which lacks a proper defense mechanism to combat attacks and save critical data of patien...
Signcryption is the method of combining a digital signature with encryption in a single logical step to get the cryptographic primitives of a public key. However, in addition to signcryption, we sometimes require anonymity and delegation of rights. In this paper, we propose a scheme called proxy promised signcryption to address all of these objecti...
The Internet of Things (IoT) has revolutionized practically every industry, including agriculture, due to its fast expansion and integration into other industries. The application of IoT in agriculture motivates farmers to use their resources wisely and allows for better field monitoring and decision-making, resulting in increased agricultural prod...
DDoS (Distributed Denial of Service) attacks have drastically effected the functioning of Internet-based services in recent years. Following the release of the Mirai botnet source code on GitHub, the scope of these exploitations has grown. The attackers have been able to construct and launch variations of the Mirai botnet thanks to the open-sourcin...
Coupled with the issues such as inefficient encryption architectures, non-standard formats of image datasets, weak randomness of chaos based Pseudo Random Number Generators (PRNGs), omitted S-boxes and unconvincing security metrics leading to increased computational time and inadequate security level of chaos and Deoxyribonucleic Acid (DNA) based i...
Signcryption is the method of combining a digital signature with encryption in a single logical step to get the cryptographic primitives of a public key. However, in addition to signcryption, we sometimes require anonymity and delegation of rights. In this paper, we propose a scheme called proxy promised signcryption to address all of these objecti...
The Smart Grid-Enabled Industrial Internet of Things (SG-IIoT) is a hybrid data communications network connected with the power grid that collects and analyses data from transmission lines, distribution substations, and consumers. In the IIoT setting, SG provides predictive information to its supplier and customers on how to effectively manage the...
Scalability is one of the utmost nonfunctional requirement of server applications, because it maintains an effective performance parallel to the large fluctuating and sometimes unpredictable workload. In order to achieve scalability, thread pool system (TPS) has been used extensively as a middleware service in server applications. The size of threa...
Managing the consumer's knowledge is a factor that is difficult to measure and not easy to achieve, but it is the basis for building trust in energy sources, including alternative ones. Social and ecological attitudes, as well as the economic situation, force consumers to acquire knowledge and shape their views and knowledge about household energy...