
Riaz Ahmed Shaikh- PhD
- Professor (Associate) at University of East Anglia
Riaz Ahmed Shaikh
- PhD
- Professor (Associate) at University of East Anglia
About
67
Publications
33,360
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,503
Citations
Introduction
Current institution
Additional affiliations
April 2012 - August 2017
September 2017 - July 2022
October 2009 - January 2012
Education
September 2005 - August 2009
August 2003 - June 2005
January 1999 - December 2002
Publications
Publications (67)
Technological advancement drives the growth of the Internet of Things (IoT) applications in many fields, such as smart homes, smart cities, smart grids, and healthcare. IoT in healthcare is called the Internet of Medical Things (IoMT), which provides remote patient treatment using information and communications technology. This new telemedicine tec...
Smart electronic devices and telemedicine are widely used in humans' daily lives. This provides remote treatment of patients using information and communications technology. New telemedicine technologies, such as the Internet of Medical Things (IoMT), make it easier for medical and computing devices to communicate regularly and effectively. Critica...
This paper presents a high-reliability Grouping-Based communications trust model in Vehicular Ad-hoc Networks (VANET). The proposed solution consists of two distinct components: First, the Dynamic Group Head Selection (DGHS) scheme to improve the Group Head’s (GH) stability by considering the reliability of the communication link with the Road Side...
Despite numerous efforts, developing an authentication scheme that offers strong security while offering memorability and usability remains a grand challenge. In this paper, we propose a textual-graphical hybrid authentication scheme that improves the security, memorability and usability inadequacies of existing authentication schemes. This has bee...
Nowadays, 5G is playing a significant role in the efficiency of network security and creating more and faster channels for communication. 5G is evolving industries such as healthcare, education, marketing, transportation, and V2X (Vehicle-to-everything). In addition, 5G considers a new radio access technology that is adding new applications like th...
Vehicular Ad-Hoc Networks (VANETs) are key enablers for intelligent transportation systems (ITSs). In VANETs, vehicles are capable of communicating among others, and with roadside infrastructure. Nodes exchange messages via short-range communication to improve road safety and enhance traffic efficiency. To tackle VANETs security: Cryptography-based...
The advent of 5G which strives to connect more devices with high speed and low latencies has aided the growth IoT network. Despite the benefits of IoT, its applications in several facets of our lives such as smart health, smart homes, smart cities, etc. have raised several security concerns such as Distributed Denial of Service (DDoS) attacks. In t...
A vehicular ad hoc network (VANETs) is transforming public transport into a safer wireless network, increasing its safety and efficiency. The VANET consists of several nodes which include RSU (Roadside Units), vehicles, traffic signals, and other wireless communication devices that are communicating sensitive information in a network. Nevertheless,...
The advancement in IoT has prompted its application in areas such as smart homes, smart cities, etc., and this has aided its exponential growth. However, alongside this development, IoT networks are experiencing a rise in security challenges such as botnet attacks, which often appear as network anomalies. Similarly, providing security solutions has...
Vehicular ad-hoc networks allow vehicles to exchange messages pertaining to safety and road efficiency. Building trust between nodes can, therefore, protect vehicular ad-hoc networks from malicious nodes and eliminate fake messages. Although there are several trust models already exist, many schemes suffer from varied limitations. For example, many...
The Internet of Things (IoT) is on the rise and it is giving a new shape to several fields such as smart cities, smart homes, smart health, etc. as it facilitates the connection of physical objects to the internet. However, this advancement comes along with new challenges in terms of security of the devices in the IoT networks. Some of these challe...
Many user authentication schemes are developed to resolve security issues of traditional textual password scheme. However, only Android unlock scheme gets wide acceptance among users in the domain of smartphones. Although Android unlock scheme has many security issues, it is widely used due to usability advantages. Different models and frameworks a...
Vehicular networks play a key role in building intelligent transport systems for smart cities. For the purpose of achieving traffic efficiency, road safety, and traveler comfort, vehicles communicate and collaborate with each other as well as with the fixed infrastructure. In practice, not all vehicles are trustworthy. A faulty or malicious vehicle...
Description:
Interest in developing smart cities has grown exponentially over the years with many governments across the world hoping to initiate these projects in their own countries. One of the key challenges for the success of any smart city project is the assurance of smart security and privacy of the citizens. Due to the use of a wide range o...
Inconsistency in access control policies exists when at least two rules present in the policy set lead to the contradictory decisions. It makes difficult for the system to decide which rule is applicable to the current scenario and hence make the system vulnerable to the unauthorized use. Various inconsistency detection methods have been proposed b...
Access control policies may contain anomalies such as incompleteness and inconsistency, which can result in security vulnerabilities. Detecting such anomalies in large sets of complex policies automatically is a difficult and challenging problem. In this paper, we propose a novel method for detecting inconsistency and incompleteness in access contr...
Wireless sensor networks have emerged as a key technology which is used in many safety critical applications. The sensors in wireless sensor network have to be deployed in hostile, harsh and unattended environments for long periods of time. This creates a great challenge in providing a good quality of service. This results in introductions of fault...
A vehicular ad hoc network (VANET) is an emerging technology that has the potential to improve road safety and traveler comfort. In VANETs, mobile vehicles communicate with each other for the purpose of sharing various kinds of information. This information is very useful for preventing road accidents and traffic jams. On Contrary, bogus and inaccu...
A vehicular ad hoc network (VANET) is the emerging technology that allows the drivers to keep the road safety throughout the journey. In VANETs, vehicles can collaborate with each other by exchanging the messages. When these messages are incorrect, drivers will have to face many serious problems which include traffic congestion and minor to fatal r...
Wireless Sensor Networks (WSNs) are typically formed by the collaboration of the large amount of partial sensor nodes, which are connected through a wireless medium. In wireless sensor network, security is an essential aspect because of its usage in applications like monitoring, tracking, controlling, surveillance etc. Secure communication is extre...
Vehicular ad hoc networks (VANETs) have emerged as a promising technology with several applications that may have a deep impact on our society. In the past few years, we have witnessed a tremendous growth in this field, with several new techniques and standards having been proposed with the objective of making it easier and safer to drive and trans...
With the emergence of wireless sensor networks and its usage in sensitive monitoring and tracking applications, the need of ensuring complete security is gaining more importance than ever before. Complete security can only be ensured by adding privacy, cryptographic-based security and trust management aspects in a security solution. However, integr...
Most of the existing trust models that are proposed for wireless sensor networks are based on the assumption that the sensor nodes have unique identities. Evaluating trust in an identity anonymous resource constraint environment is an open research problem. In this work, we propose a first novel hop-by-hop trust evaluation algorithm (H-TEA) that op...
Consistency and/or completeness of access control policy sets may be validated and/or verified. An access control policy set may be received. The access control policy set may include access control policies that allow or disallow access to computing resources. Individual ones of the access control policies may include one or more attributes. The o...
Validation and verification of security policies is a critical and important task to ensure that access control policies are error free. The two most common problems present in access control policies are: inconsistencies and incompleteness. In order to detect such problems, various access control policy validation mechanisms are proposed by the re...
In vehicular ad hoc networks, peers make decisions on the basis of the information provided by the other peers. If the received information is fake, then the result could be catastrophic, such as road accidents. Therefore, many researchers use the concept of trust to evaluate the trustworthiness of the received data. However, existing trust managem...
Inconsistency in access control policies exists when two or more than two rules defined in the policy set lead to the contradictory decisions. It makes it difficult for the system to decide which rule is applicable to the current scenario and hence make the system vulnerable to the unauthorized use. Different inconsistency detection methods have be...
Inconsistency in access control policies exists when two or more than two rules defined in the policy set lead to the contradictory decisions. It makes it difficult for the system to decide which rule is applicable to the current scenario and hence make the system vulnerable to the unauthorized use. Different inconsistency detection methods have be...
In vehicular ad hoc networks, evaluating trustworthiness of data is utmost necessary for the receiver to make reliable decisions that are very crucial in safety and traffic-efficiency related applications. Existing trust management schemes that have been proposed so far for the vehicular networks has suffered from various limitations. For example,...
In traditional multi-level security systems, trust and risk values are pre-computed. Any change in these values requires manual intervention of an administrator. In many dynamic environments, however, these values should be auto-adaptive, and auto-tunable according to the usage history of the users. Moreover, occasional exceptions on resource needs...
Traditional security and access control systems, such as MLS/Bell-LaPadula, RBAC are rigid and do not contain automatic mechanisms through which a system can increase or decrease users' access to classified information. Therefore, in this paper, we propose a risk-based decision method for an access control system. Firstly, we dynamically calculate...
In enterprise environments, the task of assigning access control rights to subjects for resources is not trivial. Because of their complexity, distribution and size, access control policies can contain anomalies such as inconsistencies, which can result in security vulnerabilities. A set of access control policies is inconsistent when, for specific...
In a set of access control policies, incompleteness is the existence of situations for which no policy applies. Some of these situations can be exploited by attackers, to obtain unintended access or to compromise integrity. Such cases can be difficult to foresee, since typical policy sets consist of thousands of rules. In this paper, we adopt data...
Full network level privacy has often been categorized into four sub-categories: Identity, Route, Location and Data privacy. Achieving full network level privacy is a critical and challenging problem due to the constraints imposed by the sensor nodes (e.g., energy, memory and computation power), sensor networks (e.g., mobility and topology) and QoS...
Energy consumption is one of the most important parameters for evaluation of a scheme proposed for wireless sensor networks (WSNs) because of their resource constraint nature. Comprehensive comparative analysis of proposed reputation-based trust management schemes of WSNs from this perspective is currently not available in the literature. In this p...
Until recently, researchers have focused on the cry ptographic-based security issues more intensively t han the privacy and trust issues. However, without the incorporation of trust and privacy features, cryptographic-based security mechanisms are not capable of singlehandedly providing robustness, reliability and completeness in a security solutio...
Existing anomaly and intrusion detection schemes of wireless sensor networks have mainly focused on the detection of intrusions. Once the intrusion is detected, an alerts or claims will be generated. However, any unidentified malicious nodes in the network could send faulty anomaly and intrusion claims about the legitimate nodes to the other nodes....
Traditional trust management schemes developed for wired and wireless ad hoc networks are not well suited for sensor networks due to their higher consumption of resources such as memory and power. In this work, we propose a new lightweight group-based trust management scheme (GTMS) for wireless sensor networks, which employs clustering. Our approac...
Existing anomaly and intrusion detection schemes of wireless sensor networks have mainly focused on the detection of intrusions. Once the intrusion is detected, an alerts or claims will be generated. However, any unidentified malicious nodes in the network could send faulty anomaly and intrusion claims about the legitimate nodes to the other nodes....
Wireless Mesh Networks (WMN), this term was coined few years back in network research community. Due to its profound applicability, highly reliable connectivity, easy deployment, flexible interoperability with other networks drew much attention even within this short time. Although, lot of work is going on in this field but still issues like privac...
As the next generation networks promise to provide network convergence with services for both static and mobile networks, the recent research focus is converging in the direction of standardizing common infrastructure based on all-IP networks. IMS is a recent initiative, designed by 3GPP and TISPAN partnership, which outlines a service delivery pla...
We present variations and modifications of the image-feature based human identification protocol proposed by Jameel et al
with application to user authentication on mobile devices with limited display capabilities. The protocols introduced are
essentially reduced versions of the original protocol with a minor tradeoff between security and usability...
Recent research on ubiquitous computing has introduced a new concept of activity-based computing as a way of thinking about supporting human activities in ubiquitous computing environment. Existing access control approaches such as RBAC, became inappropriate to support this concept because they do not consider human activities. In this paper, we pr...
Any unidentified malicious nodes in the network could send faulty anomaly and intrusion claims about the legitimate nodes to the other nodes. Verifying the validity of such claims is a critical and challenging issue that is not considered in existing cooperative-based distributed anomaly and intrusion detection schemes of wireless sensor networks....
Full network level privacy spectrum comprises of identity, route, location and data privacy. Existing privacy schemes of wireless sensor networks only provide partial network level privacy. Providing full network level privacy is a critical and challenging problem due to the constraints imposed by the sensor nodes, sensor networks and QoS issues. I...
In ubiquitous computing environments, service servers play a central role of actively providing information about a person to help people determine whether he is available for contact or not. A tradeoff exists in these systems: the more sources of data and the higher fidelity in those sources which can improve people's decision, the more privacy re...
The task of developing protocols for humans to securely authenticate themselves to a remote server has been an interesting
topic in cryptography as a replacement for the traditional, less secure, password based systems. The protocols proposed in
literature are based on some underlying difficult mathematical problem, which are tuned so as to make th...
A research framework termed the Four Layer Ubiquitous Sensor Network research (4LUSN) model is proposed in this paper. The 4LUSN model is primarily intended to describe a research framework that organizes the current research conducted by our research team and at the same time provides guiding structure to enable anticipated future research. The mo...
Constraint specific wireless sensor networks need energy efficient and secure communication mechanisms. In this paper we propose Lightweight Security protocol (LSec) that fulfils both requirements. LSec provides authentication and authorization of sensor nodes with simple secure key exchange scheme. It also provides confidentiality of data and prot...
Sensor network security solutions that have been proposed so far are mostly built on the assumption of a trusted environment, which is not very realistic so we need trust management before deploying any other security solution. Traditional trust management schemes that have been developed for wired and wireless ad-hoc networks are not suitable for...
With the emergence of ubiquitous computing the role of sensor network is becoming more important which demands highest level security and energy efficiency. In this paper we have investigated the current available solutions and found that none of the solutions are completely meeting the basic security requirements such as authentication, access con...
In this paper, we propose an approach to collaboratively track motion of a moving target in a wide area utilizing camera-equipped visual sensor networks, which are expected to play an essential role in a variety of applications such as surveillance and monitoring. A genetic fitting method for efficient contour extraction is used as inter-scene appr...
Unified enterprise application security is a newly emerging approach for providing protection against application level attacks. Conventional application security approaches that embed security into each critical application results into scattered security mechanism, which is not only difficult to manage but also creates security loopholes. Therefo...
Unified Enterprise application security is a new emerging approach for providing protection against application level attacks. Conventional application security approach that consists of embedding security into each critical application leads towards scattered security mechanism that is not only difficult to manage but also creates security loophol...
Network anomalies usually refer to the conditions when network operations diverge from the normal behavior. Anomaly detection in an IP network is a very complex task, because it is dependent upon the nature of the data that is available for the analysis. In this paper we have given the overview of two statistical based anomaly detection algorithms...