Izza Zubair

Center For Advanced Studies In Engineering, Islāmābād, Islāmābād, Pakistan

Are you Izza Zubair?

Claim your profile

Publications (6)0 Total impact

  • M.H. Islam · Sanaa Waheed · Izza Zubair
    [Show abstract] [Hide abstract]
    ABSTRACT: Overlay networks have emerged as a means to enhance end-to-end application performance and availability. Network topology plays an important role in utilizing resources in peer-to-peer systems. Epidemic algorithms are potentially effective solutions for disseminating information in large scale and dynamic systems. P2P networks are popular for their dynamicity, but they are easy to deploy, robust and provide high resilience to failures. They proactively fight random process and network failures and do not need any reconfiguration when failures occur. This characteristic is particularly useful in P2P systems deployed on Internet or ad-hoc networks. In this paper we propose a new efficient gossip based algorithm for intelligent node selection (INS) and local view maintenance of a node. We also argue that the random node selection leads to data duplication which results in increasing bandwidth utilization. However, when selecting nodes on INS basis the bandwidth utilization has been reduced significantly. By using INS in application-level gossip multi-cast protocol the routing path will converge rapidly. For INS a distinctive overlay network which closely matches the Internet topology is constructed by combining different network topology-aware technique. The P2P system based on this structure is not only highly efficient for routing, but also keeps maintenance overhead very low even under highly dynamic environment, like ad-hoc networks.
    No preview · Conference Paper · Jul 2009
  • [Show abstract] [Hide abstract]
    ABSTRACT: Security has become a primary concern in order to provide protected communication between mobile nodes in ad hoc networks. In the case of ad hoc networks, in which possibly all nodes can be mobile, partitioning (partitioning) the nodes into groups is quite complex and challenging. In this research our focus is on the selection of DNs which will perform the function of detection of anomalous behaviour, in addition to connectivity, battery power can be a very important factor. Because it is better to have network monitoring for longer duration of time with larger node then to have for shorter duration with less number of DN that too with more updates.
    No preview · Conference Paper · Jul 2009
  • S. Saeed · I. Zubair · M. H. Islam
    [Show abstract] [Hide abstract]
    ABSTRACT: P2P applications are primarily used for sharing data (music/video) among large number of users, which requires a high level of accessibility of required resources. Distributed co-operation among users is a vital factor for the success of these networks. Any presences of selfish node can greatly degrade the performance. A selfish node preserves its own resources while uses the services of others and consumes their resources. In this paper the behavior of selfish nodes is analyzed, keeping in view the routing functionality of unstructured networks using GNUtella protocol v0.4. Oversight nodes/Trusted nodes were created to detect selfish nodes from unstructured network. Main purpose of these trusted nodes was to maintain download information of each regular node in network. By creating oversight nodes prevention from selfish nodes were done effectively and efficiently.
    No preview · Article · Jan 2009
  • S. Akram · I. Zubair · M. H. Islam
    [Show abstract] [Hide abstract]
    ABSTRACT: MANET (Mobile ad-hoc network) is particularly vulnerable due to its fundamental characteristics, such as open medium, dynamic topology, frequent route updation, distributed cooperation, and constrained capability. Any node with in the network can perform malicious activities. Mobile ad-hoc networks are particularly vulnerable to denial of service (DOS) attacks launched through compromised nodes or intruders. In this research work I have presented a distributed dynamically configurable firewall architecture that uses the ingress and aggress filtering to resist the DOS (i.e. data flooding attack). In DOS attacks attacker tries to make a connection for a long to disturb the network with its malicious activities. The firewall architecture performs some checks and tries to restrict the malicious user to disturb the network. When the intruder sends many attacking DATA packets to the victim node firewall detects the intruder node and after that, intruder will be restricted by the firewall module for some specified time. When a node is declared as black list user MPR exchanges the black list with other MPRs. Entries in the firewall table are maintained at run time.
    No preview · Article · Jan 2009
  • I. Nazir · I. Zubair · M. H. Islam
    [Show abstract] [Hide abstract]
    ABSTRACT: To provide adequate authentication to users is a constant problem, especially with mobile devices such as personal digital assistants (PDAs). However, these devices are also being used extensively by government agencies, hospitals and military and in businesses so there is a security risk not only because they contain sensitive information but they may also present means to access information on wireless networks. So user authentication is a main question for the security of mobile devices that may be caught by unauthorized individual. However traditional alphanumeric passwords do not provide high security level to mobile devices as they are more vulnerable to brute force and dictionary attacks. To overcome this problem visual authentication techniques were introduced. In this research paper we are going to analyze several visual techniques for authentication of mobile device users. And in the end we will describe our own technique which uses an alphanumeric string with pictures as passwords.
    No preview · Article · Jan 2009
  • Izza Zubair · M. Hasan Islam
    [Show abstract] [Hide abstract]
    ABSTRACT: P2P networks are the most popular network used for data sharing and dissemination of important information. Increasing popularity of P2P networks have exposed number of problems regarding security. These problems also include the problem of finding a trustworthy peer for the dissemination of information. In this paper, a trust management scheme for unstructured P2P networks is proposed that analyzes the trustworthiness of a peer using reputation-based trust mechanism. We used gossip protocol for the dissemination of reputation or trust information. Gossip, or epidemic, protocols are the most reliable scalable and resilient network systems for the information distribution. They give us the guarantee that our information or data will be distributed across the network. We also calculated correctness and performance of each node and based on performance of each node our node selection module will select whether to communicate with that node or not. The trust-aware management scheme is capable of filtering out warnings and messages sent by untrusted or low quality peers and also capable of avoiding communication with low quality or malicious nodes.
    No preview · Conference Paper · Nov 2008

Publication Stats

6 Citations

Top Journals


  • 2009
    • Center For Advanced Studies In Engineering
      Islāmābād, Islāmābād, Pakistan
  • 2008
    • Fatima Jinnah Women University
      Ralalpindi, Punjab, Pakistan