Syed Muhammad Mohsin

Syed Muhammad Mohsin
COMSATS University Islamabad | CUI · Department of Computer Sciences

PhD Scholar

About

31
Publications
16,301
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
246
Citations

Publications

Publications (31)
Article
This study presents an ambient intelligence oriented, topological robustness scheme for internet of things (IoT). The scheme primarily exploits the underlying geometric properties of scale-free IoT networks for a substantial improvement of genetic algorithm (GA) based state of the art robustness techniques. The geometrically optimized GA (Go-GA) is...
Article
The Internet of things (IoT) has made it possible for health institutions to have remote diagnosis, reliable, preventive and real-time decision making. However, the anonymity and privacy of patients are not considered in IoT. Therefore, this paper proposes a blockchain-based anonymous system, known as GarliMediChain, for providing anonymity and pri...
Article
Full-text available
Abstract]{Renewable Energy Resources (RERs) motivate electricity users to reduce their energy bills by taking benefit of self-generated green energy. Different studies have already pointed out that because of the absence of proper technical support and awareness, the energy users were not able to sufficiently take paybacks from the RERs. However, w...
Article
Full-text available
Road safety, optimized traffic management, and passenger comfort have always been the primary goals of the vehicle networking research community. Advances in computer and communication technology have made the dream of modern intelligent vehicles a reality through the use of smart sensors, cameras, networking devices, and storage capabilities. Auto...
Article
Internet of things (IoT) is one of the most emerging technologies nowadays and it is one of the key enablers of industrial cyber physical system (CPSs). It has started to participate in almost every aspect of our social life, ranging from financial transactions to the healthcare system, communication to national security, battlefield to smart homes...
Article
Full-text available
Microgrids have recently emerged as a building block for smart grids combining distributed renewable energy sources (RESs), energy storage devices, and load management methodologies. The intermittent nature of RESs brings several challenges to the smart microgrids, such as reliability, power quality, and balance between supply and demand. Thus, for...
Article
Full-text available
Mutual Authentication is the initial and the most significant line of defense in any open and trusted network system. Weaknesses in mutual authentication protocol may lead to eavesdropping, unauthorized access to the tag or reader data, Denial of Service attack, counterfeiting attack, de-synchronization attack, location tracking, cloning attack, ti...
Article
Full-text available
Based on energy demand, consumers can be broadly categorized into low energy consumers (LECs) and high energy consumers (HECs). HECs use heavy load appliances, e.g., electric heaters and air conditioners, and LECs do not use heavy load appliances. Thus, HECs demand more energy compared to LECs. The usage of high energy consumption appliances by HEC...
Article
Full-text available
Among several approaches to privacy-preserving cryptographic schemes, we have concentrated on noise-free homomorphic encryption. It is a symmetric key encryption that supports homomorphic operations on encrypted data. We present a fully homomorphic encryption (FHE) scheme based on sedenion algebra over finite Zn rings. The innovation of the scheme...
Presentation
Full-text available
Wireless Sensor Networks (WSNs) provide noteworthy advantages over conventional methods for various real-time applications, i.e., healthcare, temperature sensing, smart homes, homeland security, and environmental monitoring. However, limited resources, short life-time network constraints, and security vulnerabilities are the challenging issues in t...
Article
Full-text available
Conventional RSA algorithm, being a basis for several proposed cryptosystems, has remarkable security laps with respect to confidentiality and integrity over the internet which can be compromised by state-of-the-art attacks, especially, for different types of data generation, transmission, and analysis by IoT applications. This security threat hind...
Conference Paper
Full-text available
Wireless Sensor Networks (WSNs) provide noteworthy advantages over conventional methods for various real-time applications, i.e., healthcare, temperature sensing, smart homes, homeland security, and environmental monitoring. However, limited resources, short lifetime network constraints, and security vulnerabilities are the challenging issues in th...
Conference Paper
Full-text available
There is a cardinal infrastructure of application software's, protocols, and physical devices over different sort of wired and wireless networks, that need to communicate with each other, whether located not only on earth but also in the space. OSI seven-layers model has become an international standard to communicate securely and confidently among...
Conference Paper
Full-text available
The 5th generation (5G) of communication networks will facilitate innovative and emerging services and applications with lower latency requirements, increased energy efficiency and reliability. These characteristics of 5G make it capable to act as a potential underlying network for smart city services such as for implementation of demand response i...
Conference Paper
Full-text available
This study investigates the energy cost and carbon emission reduction problem in geographically distributed cloud data centers (DCs), where each DC is connected with its own renewable energy resources (RERs) for green energy generation. We consider four cloud DCs that are operated by a single cloud service provider. They consume energy from both RE...
Conference Paper
Full-text available
Number of networks and their sizes in terms of connected devices are increasing very rapidly. These devices are producing massive amount of raw data for different progressive purposes that need to be processed and stored somewhere. Local data storage and complete processing of massive data will not be possible by resource constrained Internet of Th...
Conference Paper
Full-text available
In the last few years, carbon emissions and energy demand have increased dramatically around the globe due to a surge in population and energy-consuming devices. The integration of renewable energy resources (RERs) in a power supply system provides an efficient solution in terms of low energy cost with lower carbon emissions. However, renewable sou...
Chapter
Demand side management (DSM) in smart grid (SG) makes users able to take informed decisions according to the power usage pattern of the electricity users and assists the utility in minimizing peak power demand in the duration of high energy demand slots. Where, this ultimately leads to carbon emission reduction, total electricity cost minimization...
Chapter
Full-text available
In this work, we propose a DSM scheme for electricity expenses and peak to average ratio (PAR) reduction using two well-known heuristic approaches: the cuckoo search algorithm (CSA) and strawberry algorithm (SA). In our proposed scheme, a smart home decides to buy or sell electricity from/to the commercial grid for minimizing electricity costs and...
Chapter
In smart grid (SG), demand side management (DSM) is a set or group of programs, allow consumers to play a vital role in transferring of their own load demand during peak time periods and minimizing their hourly based power consumption and total monetary cost of the electricity consumed and it also helps the electric utility in reducing higher power...
Article
Full-text available
With the emergence of the smart grid, both consumers and electricity providing companies can benefit from real-time interaction and pricing methods. In this work, a smart power system is considered, where consumers share a common energy source. Each consumer is equipped with a home energy management controller (HEMC) as scheduler and a smart meter....
Conference Paper
Data collection and transmission are the fundamental operations of WSNs. The performance of WSNs relies upon these essential tasks because data gathering directly affects the efficiency and lifetime of WSNs. This paper presents a data volume based data collection technique using Mobile Data Collector (MDC). In this technique, the MDC uses data volu...
Conference Paper
Full-text available
In this work, we propose a DSM scheme for electricity expenses and peak to average ratio (PAR) reduction using two well-known heuristic approaches: the cuckoo search algorithm (CSA) and strawberry algorithm (SA). In our proposed scheme, a smart home decides to buy or sell electricity from/to the commercial grid for minimizing electricity costs and...
Conference Paper
In this work, we propose a DSM scheme for electricity expenses and peak to average ratio (PAR) reduction using two well-known heuristic approaches: the cuckoo search algorithm (CSA) and strawberry algorithm (SA). In our proposed scheme, a smart home decides to buy or sell electricity from/to the commercial grid for minimizing electricity costs and...
Conference Paper
Demand side management (DSM) in smart grid (SG) makes users able to take informed decisions according to the power usage pattern of the electricity users and assists the utility in minimizing peak power demand in the duration of high energy demand slots. Where, this ultimately leads to carbon emission reduction, total electricity cost minimization...
Conference Paper
In smart grid (SG), demand side management (DSM) is a set or group of programs, allow consumers to play a vital role in transferring of their own load demand during peak time periods and minimizing their hourly based power consumption and total monetary cost of the electricity consumed and it also helps the electric utility in reducing higher power...
Conference Paper
Full-text available
Demand Side Management (DSM) is the strategy applied in smart grid domain for Home Energy Management (HEM) and balancing of electricity demand and supply. Numerous optimization techniques have been proposed by research community for HEM. In this study, we have implemented Elephant Herding Optimization (EHO) technique to achieve four objectives: cos...

Questions

Questions (3)
Question
How can I verify or test the mutual authentication algorithms? Do you have any simulation tool or other software tool that can be used for this purpose? Please guide.
Question
Show that MULT-SAT is NP-complete?
Question
I am working on RFID authentication protocols but I am facing a problem in the protocol testing. Can anyone suggest some means for RFID protocols testing?

Network

Cited By

Projects

Projects (2)
Project
Cloud resource optimization through simulations in cloudsim and cloudanalyst.