Yazar "Chaudhry, Shehzad Ashraf" için listeleme
-
Adaptive Fault-Tolerant System and Optimal Power Allocation for Smart Vehicles in Smart Cities Using Controller Area Network
Biswal, Anil Kumar; Singh, Debabrata; Pattanayak, Binod Kumar; Samanta, Debabrata; Chaudhry, Shehzad Ashraf; Irshad, Azeem (WILEY-HINDAWI, ADAM HOUSE, 3RD FL, 1 FITZROY SQ, LONDON WIT 5HE, ENGLAND, 2021)Nowadays, the power consumption and dependable repeated data collection are causing the main issue for fault or collision in controller area network (CAN), which has a great impact for designing autonomous vehicle in smart ... -
Amassing the Security: An ECC-Based Authentication Scheme for Internet of Drones
Hussain, Sajid; Chaudhry, Shehzad Ashraf; Alomari, Osama Ahmad; Alsharif, Mohammed H.; Khan, Muhammad Khurram; Kumar, Neeraj (IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 445 HOES LANE, PISCATAWAY, NJ 08855-4141, 2021)The continuous innovation and progression in hardware, software and communication technologies helped the expansion and accelerated growth in Internet of Things based drone networks (IoD), for the devices, applications ... -
An anonymous device to device access control based on secure certificate for internet of medical things systems
Chaudhry, Shehzad Ashraf; Irshad, Azeem; Nebhen, Jamel; Bashir, Ali Kashif; Moustafa, Nour; Al-Otaibi, Yasser D.; Bin Zikria, Yousaf (ELSEVIER, RADARWEG 29, 1043 NX AMSTERDAM, NETHERLANDS, 2021)The Internet of Medical Things (IoMT) is structured upon both the sensing and communication infrastructure and computation facilities. The IoMT provides the convenient and cheapest ways for healthcare by aiding the ... -
An Anonymous Device to Device Authentication Protocol Using ECC and Self Certified Public Keys Usable in Internet of Things Based Autonomous Devices
Alzahrani, Bander A.; Chaudhry, Shehzad Ashraf; Barnawi, Ahmed; Al-Barakati, Abdullah; Shon, Taeshik (MDPI, ST ALBAN-ANLAGE 66, CH-4052 BASEL, SWITZERLAND, 2020)Two party authentication schemes can be good candidates for deployment in Internet of Things (IoT)-based systems, especially in systems involving fast moving vehicles. Internet of Vehicles (IoV) requires fast and secure ... -
ARAP-SG: Anonymous and Reliable Authentication Protocol for Smart Grids
Tanveer, Muhammad; Khan, Abd Ullah; Shah, Habib; Alkhayyat, Ahmed; Chaudhry, Shehzad Ashraf; Ahmad, Musheer (IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 445 HOES LANE, PISCATAWAY, NJ 08855-4141, 2021)Internet of Things-enabled smart grid (SG) technology provides ample advantages to traditional power grids. In an SG system, the smart meter (SM) is the critical component that collects the power usage information related ... -
Artificial intelligence technology for diagnosing COVID-19 cases: a review of substantial issues
Alsharif, Mohammed H.; Alsharif, Yahia H.; Chaudhry, Shehzad Ashraf; Albreem, Mahmoud A. M.; Jahid, Abu; Hwang, Eenjun (VERDUCI PUBLISHER, VIA GREGORIO VII, ROME 186-00165, ITALY, 2020)Today, the world suffers from the rapid spread of COVID-19, which has claimed thousands of lives. Unfortunately, its treatment is yet to be developed. Nevertheless, this phenomenon can be decelerated by diagnosing and ... -
Attacks and Solutions for a Two-Factor Authentication Protocol for Wireless Body Area Networks
Chen, Chien-Ming; Li, Zhen; Chaudhry, Shehzad Ashraf; Li, Long (WILEY-HINDAWI, ADAM HOUSE, 3RD FL, 1 FITZROY SQ, LONDON WIT 5HE, ENGLAND, 2021)As an extension of the 4G system, 5G is a new generation of broadband mobile communication with high speed, low latency, and large connection characteristics. It solves the problem of human-to-thing and thing-to-thing ... -
A clogging resistant secure authentication scheme for fog computing services
Ali, Zeeshan; Chaudhry, Shehzad Ashraf; Mahmood, Khalid; Garg, Sahil; Lv, Zhihan; Bin Zikria, Yousaf (ELSEVIER, RADARWEG 29, 1043 NX AMSTERDAM, NETHERLANDS, 2021)Fog computing (FC) is an infrastructure consisting of decentralized computing, where computing resources such as storage, applications, and data are scattered among the cloud and data source. Fog computing inherits ... -
Comments on “A Secure, Privacy-Preserving, and Lightweight Authentication Scheme for VANETs”
Chaudhry, Shehzad Ashraf (IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 445 HOES LANE, PISCATAWAY, NJ 08855-4141, 2022)Very recently in 2021, Nandy et al. proposed an authentication scheme (IEEE Sensors Journal, 21(18), pp. 20998-21011, DOI: 10.1109/JSEN.2021.3097172, 2021) using elliptic curve cryptography and symmetric key-based hash ... -
Comments on “Biometrics-Based Privacy-Preserving User Authentication Scheme for Cloud-Based Industrial Internet of Things Deployment”
Hussain, Sajid; Chaudhry, Shehzad Ashraf (IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 445 HOES LANE, PISCATAWAY, NJ 08855-4141, 2019)Very recently, Das et al. (IEEE Internet of Things Journal, pp. 4900–4913, 5(6), DOI: 10.1109/JIOT.2018.2877690, 2018) presented a biometric-based solution for security and privacy in Industrial Internet of Things ... -
Correcting "PALK: Password-based anonymous lightweight key agreement framework for smart grid"
Chaudhry, Shehzad Ashraf (ELSEVIER SCI LTD, THE BOULEVARD, LANGFORD LANE, KIDLINGTON, OXFORD OX5 1GB, OXON, ENGLAND, 2021)Very recently in 2020, Khan et al. proposed an authentication scheme (PALK) for the smart grid infrastructure. Based on elliptic curve cryptography (ECC), symmetric hash functions and block cipher based encryption/ decryption ... -
Correcting design flaws: An improved and cloud assisted key agreement scheme in cyber physical systems
Chaudhry, Shehzad Ashraf; Shon, Taeshik; Al-Turjman, Fadi; Alsharif, Mohammed H. (ELSEVIER, RADARWEG 29, 1043 NX AMSTERDAM, NETHERLANDS, 2020)The on demand availability of resources in Cyber physical system (CPS) has emerged as a viable service providing platform to improve the resource usability and reducing the infrastructure costs. Nevertheless, the development ... -
DAWM: Cost-Aware Asset Claim Analysis Approach on Big Data Analytic Computation Model for Cloud Data Centre
Mekala, M. S.; Patan, Rizwan; Islam, S. K. Hafizul; Samanta, Debabrata; Mallah, Ghulam Ali; Chaudhry, Shehzad Ashraf (WILEY-HINDAWI, ADAM HOUSE, 3RD FL, 1 FITZROY SQ, LONDON WIT 5HE, ENGLAND, 2021)The heterogeneous resource-required application tasks increase the cloud service provider (CSP) energy cost and revenue by providing demand resources. Enhancing CSP profit and preserving energy cost is a challenging task. ... -
Designing an Efficient and Secure Message Exchange Protocol for Internet of Vehicles
Chaudhry, Shehzad Ashraf (WILEY-HINDAWI, ADAM HOUSE, 3RD FL, 1 FITZROY SQ, LONDON WIT 5HE, ENGLAND, 2021)In the advancements in computation and communication technologies and increasing number of vehicles, the concept of Internet of Vehicles (IoV) has emerged as an integral part of daily life, and it can be used to acquire ... -
Designing secure and lightweight user access to drone for smart city surveillance
Hussain, Sajid; Mahmood, Khalid; Khan, Muhammad Khurram; Chen, Chien-Ming; Alzahrani, Bander A.; Chaudhry, Shehzad Ashraf (ELSEVIER, RADARWEG 29, 1043 NX AMSTERDAM, NETHERLANDS, 2022)The Internet of drones (IoD) is a very useful application of the Internet of things (IoT) and it can help the daily life comfort through various functions including the smart city surveillance. The IoD can enhance the ... -
Efficient Neighbour Feedback Based Trusted Multi Authenticated Node Routing Model for Secure Data Transmission
Bondada, Praveen; Samanta, Debabrata; Chaudhry, Shehzad Ashraf; Bin Zikria, Yousaf; Ishmanov, Farruh (MDPI, ST ALBAN-ANLAGE 66, CH-4052 BASEL, SWITZERLAND, 2021)The Mobile Ad Hoc Network (MANET) is a network that does not have a fixed infrastructure. Migratory routes and related hosts that are connected via wireless networks self-configure it. Routers and hosts are free to wander, ... -
An enhanced scheme for mutual authentication for healthcare services
Shamshad, Salman; Ayub, Muhammad Faizan; Mahmood, Khalid; Kumari, Saru; Chaudhry, Shehzad Ashraf; Chen, Chien-Ming (KEAI PUBLISHING LTD, 16 DONGHUANGCHENGGEN NORTH ST, BEIJING, DONGCHENG DISTRICT 100717, PEOPLES R CHINA, 2022)With the advent of state-of-art technologies, the Telecare Medicine Information System (TMIS) now offers fast and convenient healthcare services to patients at their doorsteps. However, this architecture engenders new ... -
GCACS-IoD: A certificate based generic access control scheme for Internet of drones
Chaudhry, Shehzad Ashraf; Yahya, Khalid O. Moh.; Karuppiah, Marimuthu; Kharel, Rupak; Bashir, Ali Kashif; Bin Zikria, Yousaf (ELSEVIER, RADARWEG 29, 1043 NX AMSTERDAM, NETHERLANDS, 2021)Internet of drones (IoD) has gained significant importance in recent times due to its applications in several critical domains ranging from commercial to defense and rescue operations. With several drones flying in different ... -
Guest Editorial: Introduction to the special section on security and privacy in the big data era (VSI-spbd)
Karuppiah, Marimuthu; Chaudhry, Shehzad Ashraf; Alsharif, Mohammed H. (PERGAMON-ELSEVIER SCIENCE LTD, THE BOULEVARD, LANGFORD LANE, KIDLINGTON, OXFORD OX5 1GB, ENGLAND, 2022)There is a rising need to secure data in the era of big data. But with the rapid development of technologies such as IoT and cloud computing, users’ security and privacy measures are under tremendous pressure. Big data ... -
ILAS-IoT: An improved and lightweight authentication scheme for IoT deployment
Alzahrani, Bander A.; Chaudhry, Shehzad Ashraf; Barnawi, Ahmed; Xiao, Wenjing; Chen, Min; Al-Barakati, Abdullah (SPRINGER HEIDELBERG, TIERGARTENSTRASSE 17, D-69121 HEIDELBERG, GERMANY, 2020)In 2019, Banerjee et al. (IEEE Int Things J 6(5):8739-8752, 2019; 10.1109/JIOT.2019.2931372) proposed an authenticated key agreement scheme to facilitate the session establishment resulting into a session key between a ...