Riaz Ahmed Shaikh

Riaz Ahmed Shaikh
Verified
Riaz verified their affiliation via an institutional email.
Verified
Riaz verified their affiliation via an institutional email.
  • PhD
  • Professor (Associate) at University of East Anglia

About

67
Publications
33,360
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,503
Citations
Current institution
University of East Anglia
Current position
  • Professor (Associate)
Additional affiliations
April 2012 - August 2017
King Abdulaziz University
Position
  • Professor (Assistant)
September 2017 - July 2022
King Abdulaziz University
Position
  • Professor (Associate)
October 2009 - January 2012
Université du Québec en Outaouais
Position
  • PostDoc Position
Education
September 2005 - August 2009
Kyung Hee University
Field of study
  • Computer Engineering
August 2003 - June 2005
National University of Sciences and Technology
Field of study
  • Information Technology
January 1999 - December 2002
Sir Syed University of Engineering and Technology
Field of study
  • Computer Engineering

Publications

Publications (67)
Article
Full-text available
Technological advancement drives the growth of the Internet of Things (IoT) applications in many fields, such as smart homes, smart cities, smart grids, and healthcare. IoT in healthcare is called the Internet of Medical Things (IoMT), which provides remote patient treatment using information and communications technology. This new telemedicine tec...
Preprint
Full-text available
Smart electronic devices and telemedicine are widely used in humans' daily lives. This provides remote treatment of patients using information and communications technology. New telemedicine technologies, such as the Internet of Medical Things (IoMT), make it easier for medical and computing devices to communicate regularly and effectively. Critica...
Article
Full-text available
This paper presents a high-reliability Grouping-Based communications trust model in Vehicular Ad-hoc Networks (VANET). The proposed solution consists of two distinct components: First, the Dynamic Group Head Selection (DGHS) scheme to improve the Group Head’s (GH) stability by considering the reliability of the communication link with the Road Side...
Article
Full-text available
Despite numerous efforts, developing an authentication scheme that offers strong security while offering memorability and usability remains a grand challenge. In this paper, we propose a textual-graphical hybrid authentication scheme that improves the security, memorability and usability inadequacies of existing authentication schemes. This has bee...
Article
Nowadays, 5G is playing a significant role in the efficiency of network security and creating more and faster channels for communication. 5G is evolving industries such as healthcare, education, marketing, transportation, and V2X (Vehicle-to-everything). In addition, 5G considers a new radio access technology that is adding new applications like th...
Chapter
Vehicular Ad-Hoc Networks (VANETs) are key enablers for intelligent transportation systems (ITSs). In VANETs, vehicles are capable of communicating among others, and with roadside infrastructure. Nodes exchange messages via short-range communication to improve road safety and enhance traffic efficiency. To tackle VANETs security: Cryptography-based...
Article
Full-text available
The advent of 5G which strives to connect more devices with high speed and low latencies has aided the growth IoT network. Despite the benefits of IoT, its applications in several facets of our lives such as smart health, smart homes, smart cities, etc. have raised several security concerns such as Distributed Denial of Service (DDoS) attacks. In t...
Article
Full-text available
A vehicular ad hoc network (VANETs) is transforming public transport into a safer wireless network, increasing its safety and efficiency. The VANET consists of several nodes which include RSU (Roadside Units), vehicles, traffic signals, and other wireless communication devices that are communicating sensitive information in a network. Nevertheless,...
Article
Full-text available
The advancement in IoT has prompted its application in areas such as smart homes, smart cities, etc., and this has aided its exponential growth. However, alongside this development, IoT networks are experiencing a rise in security challenges such as botnet attacks, which often appear as network anomalies. Similarly, providing security solutions has...
Article
Full-text available
Vehicular ad-hoc networks allow vehicles to exchange messages pertaining to safety and road efficiency. Building trust between nodes can, therefore, protect vehicular ad-hoc networks from malicious nodes and eliminate fake messages. Although there are several trust models already exist, many schemes suffer from varied limitations. For example, many...
Article
Full-text available
The Internet of Things (IoT) is on the rise and it is giving a new shape to several fields such as smart cities, smart homes, smart health, etc. as it facilitates the connection of physical objects to the internet. However, this advancement comes along with new challenges in terms of security of the devices in the IoT networks. Some of these challe...
Article
Many user authentication schemes are developed to resolve security issues of traditional textual password scheme. However, only Android unlock scheme gets wide acceptance among users in the domain of smartphones. Although Android unlock scheme has many security issues, it is widely used due to usability advantages. Different models and frameworks a...
Article
Full-text available
Vehicular networks play a key role in building intelligent transport systems for smart cities. For the purpose of achieving traffic efficiency, road safety, and traveler comfort, vehicles communicate and collaborate with each other as well as with the fixed infrastructure. In practice, not all vehicles are trustworthy. A faulty or malicious vehicle...
Book
Description: Interest in developing smart cities has grown exponentially over the years with many governments across the world hoping to initiate these projects in their own countries. One of the key challenges for the success of any smart city project is the assurance of smart security and privacy of the citizens. Due to the use of a wide range o...
Article
Full-text available
Inconsistency in access control policies exists when at least two rules present in the policy set lead to the contradictory decisions. It makes difficult for the system to decide which rule is applicable to the current scenario and hence make the system vulnerable to the unauthorized use. Various inconsistency detection methods have been proposed b...
Article
Full-text available
Access control policies may contain anomalies such as incompleteness and inconsistency, which can result in security vulnerabilities. Detecting such anomalies in large sets of complex policies automatically is a difficult and challenging problem. In this paper, we propose a novel method for detecting inconsistency and incompleteness in access contr...
Article
Full-text available
Wireless sensor networks have emerged as a key technology which is used in many safety critical applications. The sensors in wireless sensor network have to be deployed in hostile, harsh and unattended environments for long periods of time. This creates a great challenge in providing a good quality of service. This results in introductions of fault...
Article
Full-text available
A vehicular ad hoc network (VANET) is an emerging technology that has the potential to improve road safety and traveler comfort. In VANETs, mobile vehicles communicate with each other for the purpose of sharing various kinds of information. This information is very useful for preventing road accidents and traffic jams. On Contrary, bogus and inaccu...
Article
Full-text available
A vehicular ad hoc network (VANET) is the emerging technology that allows the drivers to keep the road safety throughout the journey. In VANETs, vehicles can collaborate with each other by exchanging the messages. When these messages are incorrect, drivers will have to face many serious problems which include traffic congestion and minor to fatal r...
Article
Full-text available
Wireless Sensor Networks (WSNs) are typically formed by the collaboration of the large amount of partial sensor nodes, which are connected through a wireless medium. In wireless sensor network, security is an essential aspect because of its usage in applications like monitoring, tracking, controlling, surveillance etc. Secure communication is extre...
Article
Full-text available
Vehicular ad hoc networks (VANETs) have emerged as a promising technology with several applications that may have a deep impact on our society. In the past few years, we have witnessed a tremendous growth in this field, with several new techniques and standards having been proposed with the objective of making it easier and safer to drive and trans...
Article
Full-text available
With the emergence of wireless sensor networks and its usage in sensitive monitoring and tracking applications, the need of ensuring complete security is gaining more importance than ever before. Complete security can only be ensured by adding privacy, cryptographic-based security and trust management aspects in a security solution. However, integr...
Article
Full-text available
Most of the existing trust models that are proposed for wireless sensor networks are based on the assumption that the sensor nodes have unique identities. Evaluating trust in an identity anonymous resource constraint environment is an open research problem. In this work, we propose a first novel hop-by-hop trust evaluation algorithm (H-TEA) that op...
Patent
Full-text available
Consistency and/or completeness of access control policy sets may be validated and/or verified. An access control policy set may be received. The access control policy set may include access control policies that allow or disallow access to computing resources. Individual ones of the access control policies may include one or more attributes. The o...
Article
Full-text available
Validation and verification of security policies is a critical and important task to ensure that access control policies are error free. The two most common problems present in access control policies are: inconsistencies and incompleteness. In order to detect such problems, various access control policy validation mechanisms are proposed by the re...
Article
Full-text available
In vehicular ad hoc networks, peers make decisions on the basis of the information provided by the other peers. If the received information is fake, then the result could be catastrophic, such as road accidents. Therefore, many researchers use the concept of trust to evaluate the trustworthiness of the received data. However, existing trust managem...
Conference Paper
Full-text available
Inconsistency in access control policies exists when two or more than two rules defined in the policy set lead to the contradictory decisions. It makes it difficult for the system to decide which rule is applicable to the current scenario and hence make the system vulnerable to the unauthorized use. Different inconsistency detection methods have be...
Conference Paper
Full-text available
Inconsistency in access control policies exists when two or more than two rules defined in the policy set lead to the contradictory decisions. It makes it difficult for the system to decide which rule is applicable to the current scenario and hence make the system vulnerable to the unauthorized use. Different inconsistency detection methods have be...
Conference Paper
Full-text available
In vehicular ad hoc networks, evaluating trustworthiness of data is utmost necessary for the receiver to make reliable decisions that are very crucial in safety and traffic-efficiency related applications. Existing trust management schemes that have been proposed so far for the vehicular networks has suffered from various limitations. For example,...
Article
In traditional multi-level security systems, trust and risk values are pre-computed. Any change in these values requires manual intervention of an administrator. In many dynamic environments, however, these values should be auto-adaptive, and auto-tunable according to the usage history of the users. Moreover, occasional exceptions on resource needs...
Conference Paper
Traditional security and access control systems, such as MLS/Bell-LaPadula, RBAC are rigid and do not contain automatic mechanisms through which a system can increase or decrease users' access to classified information. Therefore, in this paper, we propose a risk-based decision method for an access control system. Firstly, we dynamically calculate...
Conference Paper
Full-text available
In enterprise environments, the task of assigning access control rights to subjects for resources is not trivial. Because of their complexity, distribution and size, access control policies can contain anomalies such as inconsistencies, which can result in security vulnerabilities. A set of access control policies is inconsistent when, for specific...
Conference Paper
Full-text available
In a set of access control policies, incompleteness is the existence of situations for which no policy applies. Some of these situations can be exploited by attackers, to obtain unintended access or to compromise integrity. Such cases can be difficult to foresee, since typical policy sets consist of thousands of rules. In this paper, we adopt data...
Article
Full-text available
Full network level privacy has often been categorized into four sub-categories: Identity, Route, Location and Data privacy. Achieving full network level privacy is a critical and challenging problem due to the constraints imposed by the sensor nodes (e.g., energy, memory and computation power), sensor networks (e.g., mobility and topology) and QoS...
Article
Full-text available
Energy consumption is one of the most important parameters for evaluation of a scheme proposed for wireless sensor networks (WSNs) because of their resource constraint nature. Comprehensive comparative analysis of proposed reputation-based trust management schemes of WSNs from this perspective is currently not available in the literature. In this p...
Chapter
Full-text available
Until recently, researchers have focused on the cry ptographic-based security issues more intensively t han the privacy and trust issues. However, without the incorporation of trust and privacy features, cryptographic-based security mechanisms are not capable of singlehandedly providing robustness, reliability and completeness in a security solutio...
Preprint
Existing anomaly and intrusion detection schemes of wireless sensor networks have mainly focused on the detection of intrusions. Once the intrusion is detected, an alerts or claims will be generated. However, any unidentified malicious nodes in the network could send faulty anomaly and intrusion claims about the legitimate nodes to the other nodes....
Article
Full-text available
Traditional trust management schemes developed for wired and wireless ad hoc networks are not well suited for sensor networks due to their higher consumption of resources such as memory and power. In this work, we propose a new lightweight group-based trust management scheme (GTMS) for wireless sensor networks, which employs clustering. Our approac...
Article
Full-text available
Existing anomaly and intrusion detection schemes of wireless sensor networks have mainly focused on the detection of intrusions. Once the intrusion is detected, an alerts or claims will be generated. However, any unidentified malicious nodes in the network could send faulty anomaly and intrusion claims about the legitimate nodes to the other nodes....
Conference Paper
Full-text available
Wireless Mesh Networks (WMN), this term was coined few years back in network research community. Due to its profound applicability, highly reliable connectivity, easy deployment, flexible interoperability with other networks drew much attention even within this short time. Although, lot of work is going on in this field but still issues like privac...
Conference Paper
Full-text available
As the next generation networks promise to provide network convergence with services for both static and mobile networks, the recent research focus is converging in the direction of standardizing common infrastructure based on all-IP networks. IMS is a recent initiative, designed by 3GPP and TISPAN partnership, which outlines a service delivery pla...
Conference Paper
Full-text available
We present variations and modifications of the image-feature based human identification protocol proposed by Jameel et al with application to user authentication on mobile devices with limited display capabilities. The protocols introduced are essentially reduced versions of the original protocol with a minor tradeoff between security and usability...
Conference Paper
Full-text available
Recent research on ubiquitous computing has introduced a new concept of activity-based computing as a way of thinking about supporting human activities in ubiquitous computing environment. Existing access control approaches such as RBAC, became inappropriate to support this concept because they do not consider human activities. In this paper, we pr...
Conference Paper
Full-text available
Any unidentified malicious nodes in the network could send faulty anomaly and intrusion claims about the legitimate nodes to the other nodes. Verifying the validity of such claims is a critical and challenging issue that is not considered in existing cooperative-based distributed anomaly and intrusion detection schemes of wireless sensor networks....
Conference Paper
Full-text available
Full network level privacy spectrum comprises of identity, route, location and data privacy. Existing privacy schemes of wireless sensor networks only provide partial network level privacy. Providing full network level privacy is a critical and challenging problem due to the constraints imposed by the sensor nodes, sensor networks and QoS issues. I...
Conference Paper
Full-text available
In ubiquitous computing environments, service servers play a central role of actively providing information about a person to help people determine whether he is available for contact or not. A tradeoff exists in these systems: the more sources of data and the higher fidelity in those sources which can improve people's decision, the more privacy re...
Conference Paper
Full-text available
The task of developing protocols for humans to securely authenticate themselves to a remote server has been an interesting topic in cryptography as a replacement for the traditional, less secure, password based systems. The protocols proposed in literature are based on some underlying difficult mathematical problem, which are tuned so as to make th...
Conference Paper
Full-text available
A research framework termed the Four Layer Ubiquitous Sensor Network research (4LUSN) model is proposed in this paper. The 4LUSN model is primarily intended to describe a research framework that organizes the current research conducted by our research team and at the same time provides guiding structure to enable anticipated future research. The mo...
Conference Paper
Full-text available
Constraint specific wireless sensor networks need energy efficient and secure communication mechanisms. In this paper we propose Lightweight Security protocol (LSec) that fulfils both requirements. LSec provides authentication and authorization of sensor nodes with simple secure key exchange scheme. It also provides confidentiality of data and prot...
Conference Paper
Full-text available
Sensor network security solutions that have been proposed so far are mostly built on the assumption of a trusted environment, which is not very realistic so we need trust management before deploying any other security solution. Traditional trust management schemes that have been developed for wired and wireless ad-hoc networks are not suitable for...
Conference Paper
Full-text available
With the emergence of ubiquitous computing the role of sensor network is becoming more important which demands highest level security and energy efficiency. In this paper we have investigated the current available solutions and found that none of the solutions are completely meeting the basic security requirements such as authentication, access con...
Conference Paper
Full-text available
In this paper, we propose an approach to collaboratively track motion of a moving target in a wide area utilizing camera-equipped visual sensor networks, which are expected to play an essential role in a variety of applications such as surveillance and monitoring. A genetic fitting method for efficient contour extraction is used as inter-scene appr...
Conference Paper
Full-text available
Unified enterprise application security is a newly emerging approach for providing protection against application level attacks. Conventional application security approaches that embed security into each critical application results into scattered security mechanism, which is not only difficult to manage but also creates security loopholes. Therefo...
Conference Paper
Unified Enterprise application security is a new emerging approach for providing protection against application level attacks. Conventional application security approach that consists of embedding security into each critical application leads towards scattered security mechanism that is not only difficult to manage but also creates security loophol...
Conference Paper
Network anomalies usually refer to the conditions when network operations diverge from the normal behavior. Anomaly detection in an IP network is a very complex task, because it is dependent upon the nature of the data that is available for the analysis. In this paper we have given the overview of two statistical based anomaly detection algorithms...

Network

Cited By