Ruhma Tahir

Ruhma Tahir
University of Essex · School of Computer Science and Electronic Engineering

About

21
Publications
4,552
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
193
Citations
Citations since 2017
7 Research Items
141 Citations
201720182019202020212022202305101520253035
201720182019202020212022202305101520253035
201720182019202020212022202305101520253035
201720182019202020212022202305101520253035
Introduction
Skills and Expertise

Publications

Publications (21)
Article
Full-text available
Aircraft are complex systems that rely heavily on monitoring and real-time communications with the base station. During aviation and flight operations, diverse data are gathered from different sources, including the Cockpit Voice Recorder (CVR), Flight Data Recorder (FDR), logbook, passenger data, passenger manifest etc. Given the high sensitivity...
Article
Searchable symmetric encryption (SSE) is a technology that enables clients to outsource sensitive data in the cloud. The vast usage of cloud and rapid growth in file sharing over the cloud has forced researchers into devising newer searchable encryption (SE) systems that are more secure and robust. This paper explores the effects of leakage of acce...
Article
Full-text available
The security of IoT devices is a major concern that needs to be addressed for their wide adoption. Users are constantly seeking devices that are faster and capable of holding large amounts of data securely. It is purported that water has memory of its own and the ability to retain memory of the substances that are dissolved into it, even after bein...
Article
The Integrated Circuit Metric (ICMetric) technology is a novel trust basis that uses the system features to create an identification of a device. The ICMetric of the device is used for the provision of security services, thereby addressing the issue of trust associated with device identity. The ICMetric technology can be adapted to function with va...
Article
Full-text available
Miniaturization of computer hardware and the demand for network capable devices has resulted in the emergence of a new class of technology called wearable computing. Wearable devices have many purposes like lifestyle support, health monitoring, fitness monitoring, entertainment, industrial uses, and gaming. Wearable devices are hurriedly being mark...
Data
Simulation data is available in spreadsheet file titled S1_File.xlsx. (XLSX)
Conference Paper
Wearable devices are an important part of internet of things (IoT)with many applications in healthcare. Prevalent security concerns create a compelling case for a renewed approach by incorporating the ICMetric technology in IoT healthcare. The ICMetric technology is a novel security approach and uses the features of a device to form the basis of cr...
Article
Full-text available
Convergence of technologies from several domains of computing and healthcare have aided in the creation of devices that can help health professionals in monitoring their patients remotely. An increase in networked healthcare devices has resulted in incidents related to data theft, medical identity theft and insurance fraud. In this paper, we discus...
Conference Paper
Security schemes are rendered impractical if their cryptographic keys are compromised. ICMetric technology is an innovation in the field of cryptography that generates a device identification based on the inherent features of a device. Devices in the internet of things (IoT) are cyber physical systems with varying purpose and platforms. Since these...
Conference Paper
This paper proposes a novel architecture that offers features for a truly interactive yet private document archival cloud. The proposed secure document archival system has been specifically designed for the elimination of paper based systems in organization. The architecture attempts to shift paper based systems to an electronic archival system whe...
Conference Paper
This paper presents a scheme for the generation of strong session based ICMetrics key pairs for security critical embedded system applications. ICMetrics generates the security attributes of the sensor node based on measurable hardware and software characteristics of the integrated circuit. In the proposed scheme a random session ID is assigned by...
Conference Paper
Cryptography has become an essential for providing security in embedded system applications. The employed cryptographic primitives should provide strong protection such that the security of the system is not compromised at any point in the lifecycle of a secure operation. This particularly includes the secure generation and maintenance of cryptogra...
Conference Paper
Wireless Sensor Networks (WSNs) have the potential of being employed in a variety of applications ranging from battlefield surveillance to everyday applications such as smart homes and patient monitoring. Security is a major challenge that all applications based on WSNs are facing nowadays. Firstly, due to the wireless nature of WSNs, and secondly...
Conference Paper
The advent of embedded systems has completely transformed the information landscape. With the explosive growth in the use of interactive real-time technologies, this internet landscape aims to support an even broader range of application domains. The large amount of data that is exchanged by these applications has made them an attractive target for...
Conference Paper
This paper presents a scheme for the generation of strong high entropy keys based on ICMetrics. ICMetrics generates the security attributes of the sensor node based on measurable hardware and software characteristics of the integrated circuit. This work is based on key derivation functions to derive cryptographic key pairs from ICMetrics values. Th...
Conference Paper
Full-text available
In this paper we propose a lightweight encryption mechanism based on rabbit stream cipher referred to as LRSA for providing confidentiality in wireless sensor networks (WSNs). LRSA fulfils both requirements of security as well as energy efficiency. Our proposed security protocol is an idea for resource constrained WSNs, and can be widely used in th...
Conference Paper
Full-text available
In this paper, we propose a new lightweight authenticated encryption mechanism based on Rabbit stream cipher referred to as Rabbit-MAC, for wireless sensor networks (WSNs) that fulfils both requirements of security as well as energy efficiency. Our proposed scheme provides data authentication, confidentiality and integrity in WSNs. We construct a R...
Article
Full-text available
In this paper we propose a Lightweight Encryption Mechanism based on the Rabbit stream cipher for providing confidentiality in Wireless Sensor Networks (WSNs) that fulfils both requirements of security as well as energy efficiency. Our proposed security protocol is an idea for resource constrained WSNs, and can be widely used in the applications of...
Article
A major problem today for car owners is that they are in constant fear of having their vehicles stolen from a common parking lot, from outside their home or the vehicle could be snatched from them while they are driving. In this paper a methodology for defeating car theft is proposed referred to as BioFIM- Biometric Flash Identification Module. Our...

Network

Cited By