Hasan Tahir's research while affiliated with National University of Sciences and Technology and other places

Publications (31)

Article
Full-text available
Aircraft are complex systems that rely heavily on monitoring and real-time communications with the base station. During aviation and flight operations, diverse data are gathered from different sources, including the Cockpit Voice Recorder (CVR), Flight Data Recorder (FDR), logbook, passenger data, passenger manifest etc. Given the high sensitivity...
Article
The concept of Smart Airport is emerging in the Aviation sector because of the industry 4.0 revolution. To provide the best facility to the air travelers, most of the airports have enhanced their infrastructure using smart automation and Cloud Services (CS), etc. which play a significant role in increasing the revenue of the aviation industry. As t...
Article
Autonomous vehicles are taking a leap forward by performing operations without human intervention through continuous monitoring of their surroundings using multiple sensors. Images gathered through vehicle mounted cameras can be large, requiring specialized storage such as cloud. However, cloud data centres can be prone to security and privacy chal...
Chapter
Deteriorating health conditions under a pandemic force governments and authorities to consider enforcing lockdown protocols to limit the spread of a disease. Once a lockdown protocol is enforced, many verticals are instantly impacted by the lack of available workforce and other issues. Critical infrastructures, information systems, integrated IT sy...
Article
It has been noted with concern that the ability of a password to keep an information system secure is diminishing. Increasingly sophisticated attack vectors and low memorability associated with complicated passwords are among the leading reasons limiting security provisioned by passwords. Cryptographic keys suffer from issues including lack of memo...
Article
Full-text available
Globally, the surge in disease and urgency in maintaining social distancing has reawakened the use of telemedicine/telehealth. Amid the global health crisis, the world adopted the culture of online consultancy. Thus, there is a need to revamp the conventional model of the telemedicine system as per the current challenges and requirements. Security...
Article
Searchable symmetric encryption (SSE) is a technology that enables clients to outsource sensitive data in the cloud. The vast usage of cloud and rapid growth in file sharing over the cloud has forced researchers into devising newer searchable encryption (SE) systems that are more secure and robust. This paper explores the effects of leakage of acce...
Article
Full-text available
The security of IoT devices is a major concern that needs to be addressed for their wide adoption. Users are constantly seeking devices that are faster and capable of holding large amounts of data securely. It is purported that water has memory of its own and the ability to retain memory of the substances that are dissolved into it, even after bein...
Article
Full-text available
Smartphones and Internet have become prevalent in our society with various applications in businesses, education, healthcare, gaming, and research. One of the major issues with the Internet today is its lack of security since an eavesdropper can potentially intercept the communication. This has contributed towards an increased number of cyber-crime...
Article
The Integrated Circuit Metric (ICMetric) technology is a novel trust basis that uses the system features to create an identification of a device. The ICMetric of the device is used for the provision of security services, thereby addressing the issue of trust associated with device identity. The ICMetric technology can be adapted to function with va...
Article
Full-text available
The outbreak of the COVID-19 virus has caused widespread panic and global initiatives are geared towards treatment and limiting its spread. With technological advancements, several mechanisms and mobile applications have been developed that attempt to trace the physical contact made by a person with someone who has been tested COVID-19 positive. Wh...
Article
Full-text available
Consumer electronics manufacturers have been incorporating support for 4G/5G communication technologies into many electronic devices. Thus, highly capable Internet of Things (IoT)-ready versions of electronic devices are being purchased which will eventually replace traditional consumer electronics. With the goal of creating a smart environment, th...
Article
Full-text available
Healthcare is a multi-actor environment that requires independent actors to have a different view of the same data, hence leading to different access rights. Ciphertext Policy- Attribute-based Encryption (CP-ABE) provides one-to-many access control mechanism by defining an attribute's policy over ciphertext. Although, all users satisfying the polic...
Article
Full-text available
Internet of Things (IoT) devices are well-connected; they generate and consume data which involves transmission of data back and forth among various devices. Ensuring security of the data is a critical challenge as far as IoT is concerned. Since IoT devices are inherently low-power and do not require a lot of compute power, a Network Intrusion Dete...
Article
Full-text available
Internet of Things (IoT) devices are well-connected; they generate and consume data which involves transmission of data back and forth among various devices. Ensuring security of the data is a critical challenge as far as IoT is concerned. Since IoT devices are inherently low-power and do not require a lot of compute power, a Network Intrusion Dete...
Article
Full-text available
Person re-identification (re-ID) is among the essential components that play an integral role in constituting an automated surveillance environment. Majorly, the problem is tackled using data acquired from vision sensors using appearance-based features, which are strongly dependent on visual cues such as color, texture, etc., consequently limiting...
Article
Full-text available
The goal of this study is to extend the guarantees provided by the secure transmission protocols such as Secure Sockets Layer (SSL) or Transport Layer Security (TLS) and apply them to the application layer. This paper proposes a comprehensive scheme that allows the unification of multiple security mechanisms, thereby removing the burden of authenti...
Preprint
Full-text available
Owing to adoption of connected sensors and actuators, smart devices are finding inroads into daily life. Internet of Things (IoT) authentication is rapidly transforming from classical cryptographic user-centric knowledge based approaches to device signature based automated methodologies to corroborate identity between claimant and a verifier. Physi...
Conference Paper
Full-text available
With ubiquitous adoption of connected sensors, actuators and smart devices are finding inroads into daily life. Internet of Things (IoT) authentication is rapidly transforming from classical cryptographic user-centric knowledge based approaches to device signature based automated methodologies to corroborate identity between claimant and a verifier...
Data
Simulation data is available in spreadsheet file titled S1_File.xlsx. (XLSX)
Article
Full-text available
Miniaturization of computer hardware and the demand for network capable devices has resulted in the emergence of a new class of technology called wearable computing. Wearable devices have many purposes like lifestyle support, health monitoring, fitness monitoring, entertainment, industrial uses, and gaming. Wearable devices are hurriedly being mark...
Conference Paper
Wearable devices are an important part of internet of things (IoT)with many applications in healthcare. Prevalent security concerns create a compelling case for a renewed approach by incorporating the ICMetric technology in IoT healthcare. The ICMetric technology is a novel security approach and uses the features of a device to form the basis of cr...
Article
Full-text available
Convergence of technologies from several domains of computing and healthcare have aided in the creation of devices that can help health professionals in monitoring their patients remotely. An increase in networked healthcare devices has resulted in incidents related to data theft, medical identity theft and insurance fraud. In this paper, we discus...
Conference Paper
Security schemes are rendered impractical if their cryptographic keys are compromised. ICMetric technology is an innovation in the field of cryptography that generates a device identification based on the inherent features of a device. Devices in the internet of things (IoT) are cyber physical systems with varying purpose and platforms. Since these...
Article
Secure group communications present a unique environment where there can be multiple clients and hosts are trying to communicate securely within the group. As the number of clients and hosts increases the complexity of the communication security also increases. Group communications are based on a dynamic environment where the clients may join or le...
Conference Paper
The security of a system cannot be certified unless there are formal methods of admission control. Many techniques and protocol have been proposed that try to provide security yet do not focus on the most important question about who has access to the system. When considering group communications it is more important to understand this problem as t...
Conference Paper
Secure group communications are more prone to attacks as compared to the conventional one to one communication. Every client in a group can be seen as a single source of attack, therefore it is important to design a robust security scheme that will protect all the individual clients and hence the entire group. In this paper a novel security archite...
Conference Paper
This paper proposes a novel architecture that offers features for a truly interactive yet private document archival cloud. The proposed secure document archival system has been specifically designed for the elimination of paper based systems in organization. The architecture attempts to shift paper based systems to an electronic archival system whe...

Citations

... The authors of [12] suggested a method for the high-security level of information in cloud computing by using deployed data on the public cloud platform "Contabo" and testing it on real-world aviation data using a single keyword searchable encryption (SKSE) scheme, which is implemented using the Paillier encryption algorithm. ...
... Homomorphic encryption: This method allows for computations to be conducted on encrypted data without the necessity of decryption. As such, a third-party system could analyze and work with the received data while preserving the privacy of the raw data [190,191]. ...
... Not knowing the new solution, suspicions were raised at the beginning of its use, but as the authentication method was used and understood, the number of those who gained confidence and wanted to use it increased. The main cause of data breaches in business is default or weak passwords [34]. The highest percentage of company data breaches is due to weak passwords, according to Verizon's 2021 Report on Data Breach Investigations [35]. ...
... This table serves as a complete resource for identifying and accessing the works that were analyzed in this study, ensuring transparency and facilitating future references. [52] x x x [53] x x x [54] x x h x [55] x x h x [56] x x h x [57] x x h x [11] x x x [58] x ...
... There are different data encryption schemes in the literature designed for the application of data outsourcing. Orderpreserving encryption (OPE) schemes [1,2] and searchable encryption schemes [3][4][5] are developed to perform, respectively, range queries and keyword search queries at the server side efficiently. Partially homomorphic encryption schemes [6,7] are designed to support a limited number of operations on the ciphertexts. ...
... It was later released as a general user version in 2004 and is currently maintained by the Electronic Frontier Foundation (EFF). The Tor system has gained popularity among government departments, social organizations, and individual users seeking anonymous communication and internet access [9]. Apart from anonymous access to legitimate websites on the surface web, the Tor system also supports hidden services. ...
... Accurate and effective diagnostic techniques are still absolutely necessary in the ongoing battle against the COVID-19 epidemic that is taking place all over the globe. Studies have shown that chest CT images can provide an alternative and supplementary technique for identifying COVID-19 scenarios [16,17,18]. This is in contrast to the diagnostic method known as RT-PCR, which is still the gold standard for discovering SARS-CoV-2. ...
... Therefore multiple avenues are created by hackers for leveraging cellular networks as well as Wi-Fi for exploiting all vulnerabilities. Danger is not only in cars rather its occupants and systems as well who runs cars [31]. On other hand, devices at least network by establishing connectivity with cars such as enterprise networks and home networks as well. ...
... Data lock-in [21] refers to the inability of being able to move/migrate data between different storage data structures and the cloud. The movement of data from one storage to another is a necessary requirement when one is switching vendors, performing data backup or is involved in any migration-related activity. ...
... There has not been enough research done on the patients' capability to set access rules over their private medical information. Since patients have no control over their own sensitive data, they need put their trust in the medical facility and the medical staff to handle it responsibly, one such for example is [18] in which medical record access control having patient-centric policy update is discussed depends on number of attributes involved. The major objective is to eliminate away with the requirement for third authority and instead provide patients complete control over medical data via a user-controlled Healthcare Manager. ...