Kurum Yazarı "Chaudhry, Shehzad Ashraf" İçin Listeleme
-
Adaptive Fault-Tolerant System and Optimal Power Allocation for Smart Vehicles in Smart Cities Using Controller Area Network
Biswal, Anil Kumar; Singh, Debabrata; Pattanayak, Binod Kumar; Samanta, Debabrata; Chaudhry, Shehzad Ashraf; Irshad, Azeem (WILEY-HINDAWI, ADAM HOUSE, 3RD FL, 1 FITZROY SQ, LONDON WIT 5HE, ENGLAND, 2021)Nowadays, the power consumption and dependable repeated data collection are causing the main issue for fault or collision in controller area network (CAN), which has a great impact for designing autonomous vehicle in smart ... -
Amassing the Security: An ECC-Based Authentication Scheme for Internet of Drones
Hussain, Sajid; Chaudhry, Shehzad Ashraf; Alomari, Osama Ahmad; Alsharif, Mohammed H.; Khan, Muhammad Khurram; Kumar, Neeraj (IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 445 HOES LANE, PISCATAWAY, NJ 08855-4141, 2021)The continuous innovation and progression in hardware, software and communication technologies helped the expansion and accelerated growth in Internet of Things based drone networks (IoD), for the devices, applications ... -
An anonymous device to device access control based on secure certificate for internet of medical things systems
Chaudhry, Shehzad Ashraf; Irshad, Azeem; Nebhen, Jamel; Bashir, Ali Kashif; Moustafa, Nour; Al-Otaibi, Yasser D.; Bin Zikria, Yousaf (ELSEVIER, RADARWEG 29, 1043 NX AMSTERDAM, NETHERLANDS, 2021)The Internet of Medical Things (IoMT) is structured upon both the sensing and communication infrastructure and computation facilities. The IoMT provides the convenient and cheapest ways for healthcare by aiding the ... -
Artificial intelligence technology for diagnosing COVID-19 cases: a review of substantial issues
Alsharif, Mohammed H.; Alsharif, Yahia H.; Chaudhry, Shehzad Ashraf; Albreem, Mahmoud A. M.; Jahid, Abu; Hwang, Eenjun (VERDUCI PUBLISHER, VIA GREGORIO VII, ROME 186-00165, ITALY, 2020)Today, the world suffers from the rapid spread of COVID-19, which has claimed thousands of lives. Unfortunately, its treatment is yet to be developed. Nevertheless, this phenomenon can be decelerated by diagnosing and ... -
Attacks and Solutions for a Two-Factor Authentication Protocol for Wireless Body Area Networks
Chen, Chien-Ming; Li, Zhen; Chaudhry, Shehzad Ashraf; Li, Long (WILEY-HINDAWI, ADAM HOUSE, 3RD FL, 1 FITZROY SQ, LONDON WIT 5HE, ENGLAND, 2021)As an extension of the 4G system, 5G is a new generation of broadband mobile communication with high speed, low latency, and large connection characteristics. It solves the problem of human-to-thing and thing-to-thing ... -
A clogging resistant secure authentication scheme for fog computing services
Ali, Zeeshan; Chaudhry, Shehzad Ashraf; Mahmood, Khalid; Garg, Sahil; Lv, Zhihan; Bin Zikria, Yousaf (ELSEVIER, RADARWEG 29, 1043 NX AMSTERDAM, NETHERLANDS, 2021)Fog computing (FC) is an infrastructure consisting of decentralized computing, where computing resources such as storage, applications, and data are scattered among the cloud and data source. Fog computing inherits ... -
Comments on “A Secure, Privacy-Preserving, and Lightweight Authentication Scheme for VANETs”
Chaudhry, Shehzad Ashraf (IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 445 HOES LANE, PISCATAWAY, NJ 08855-4141, 2022)Very recently in 2021, Nandy et al. proposed an authentication scheme (IEEE Sensors Journal, 21(18), pp. 20998-21011, DOI: 10.1109/JSEN.2021.3097172, 2021) using elliptic curve cryptography and symmetric key-based hash ... -
Comments on “Biometrics-Based Privacy-Preserving User Authentication Scheme for Cloud-Based Industrial Internet of Things Deployment”
Hussain, Sajid; Chaudhry, Shehzad Ashraf (IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 445 HOES LANE, PISCATAWAY, NJ 08855-4141, 2019)Very recently, Das et al. (IEEE Internet of Things Journal, pp. 4900–4913, 5(6), DOI: 10.1109/JIOT.2018.2877690, 2018) presented a biometric-based solution for security and privacy in Industrial Internet of Things ... -
Correcting "PALK: Password-based anonymous lightweight key agreement framework for smart grid"
Chaudhry, Shehzad Ashraf (ELSEVIER SCI LTD, THE BOULEVARD, LANGFORD LANE, KIDLINGTON, OXFORD OX5 1GB, OXON, ENGLAND, 2021)Very recently in 2020, Khan et al. proposed an authentication scheme (PALK) for the smart grid infrastructure. Based on elliptic curve cryptography (ECC), symmetric hash functions and block cipher based encryption/ decryption ... -
DAWM: Cost-Aware Asset Claim Analysis Approach on Big Data Analytic Computation Model for Cloud Data Centre
Mekala, M. S.; Patan, Rizwan; Islam, S. K. Hafizul; Samanta, Debabrata; Mallah, Ghulam Ali; Chaudhry, Shehzad Ashraf (WILEY-HINDAWI, ADAM HOUSE, 3RD FL, 1 FITZROY SQ, LONDON WIT 5HE, ENGLAND, 2021)The heterogeneous resource-required application tasks increase the cloud service provider (CSP) energy cost and revenue by providing demand resources. Enhancing CSP profit and preserving energy cost is a challenging task. ... -
Designing an Efficient and Secure Message Exchange Protocol for Internet of Vehicles
Chaudhry, Shehzad Ashraf (WILEY-HINDAWI, ADAM HOUSE, 3RD FL, 1 FITZROY SQ, LONDON WIT 5HE, ENGLAND, 2021)In the advancements in computation and communication technologies and increasing number of vehicles, the concept of Internet of Vehicles (IoV) has emerged as an integral part of daily life, and it can be used to acquire ... -
Designing secure and lightweight user access to drone for smart city surveillance
Hussain, Sajid; Mahmood, Khalid; Khan, Muhammad Khurram; Chen, Chien-Ming; Alzahrani, Bander A.; Chaudhry, Shehzad Ashraf (ELSEVIER, RADARWEG 29, 1043 NX AMSTERDAM, NETHERLANDS, 2022)The Internet of drones (IoD) is a very useful application of the Internet of things (IoT) and it can help the daily life comfort through various functions including the smart city surveillance. The IoD can enhance the ... -
Efficient Neighbour Feedback Based Trusted Multi Authenticated Node Routing Model for Secure Data Transmission
Bondada, Praveen; Samanta, Debabrata; Chaudhry, Shehzad Ashraf; Bin Zikria, Yousaf; Ishmanov, Farruh (MDPI, ST ALBAN-ANLAGE 66, CH-4052 BASEL, SWITZERLAND, 2021)The Mobile Ad Hoc Network (MANET) is a network that does not have a fixed infrastructure. Migratory routes and related hosts that are connected via wireless networks self-configure it. Routers and hosts are free to wander, ... -
An enhanced scheme for mutual authentication for healthcare services
Shamshad, Salman; Ayub, Muhammad Faizan; Mahmood, Khalid; Kumari, Saru; Chaudhry, Shehzad Ashraf; Chen, Chien-Ming (KEAI PUBLISHING LTD, 16 DONGHUANGCHENGGEN NORTH ST, BEIJING, DONGCHENG DISTRICT 100717, PEOPLES R CHINA, 2022)With the advent of state-of-art technologies, the Telecare Medicine Information System (TMIS) now offers fast and convenient healthcare services to patients at their doorsteps. However, this architecture engenders new ... -
GCACS-IoD: A certificate based generic access control scheme for Internet of drones
Chaudhry, Shehzad Ashraf; Yahya, Khalid O. Moh.; Karuppiah, Marimuthu; Kharel, Rupak; Bashir, Ali Kashif; Bin Zikria, Yousaf (ELSEVIER, RADARWEG 29, 1043 NX AMSTERDAM, NETHERLANDS, 2021)Internet of drones (IoD) has gained significant importance in recent times due to its applications in several critical domains ranging from commercial to defense and rescue operations. With several drones flying in different ... -
Guest Editorial: Introduction to the special section on security and privacy in the big data era (VSI-spbd)
Karuppiah, Marimuthu; Chaudhry, Shehzad Ashraf; Alsharif, Mohammed H. (PERGAMON-ELSEVIER SCIENCE LTD, THE BOULEVARD, LANGFORD LANE, KIDLINGTON, OXFORD OX5 1GB, ENGLAND, 2022)There is a rising need to secure data in the era of big data. But with the rapid development of technologies such as IoT and cloud computing, users’ security and privacy measures are under tremendous pressure. Big data ... -
An Improved Authentication Scheme for Digital Rights Management System
Hussain, Sajid; Bin Zikria, Yousaf; Mallah, Ghulam Ali; Chen, Chien-Ming; Alshehri, Mohammad Dahman; Ishmanov, Farruh; Chaudhry, Shehzad Ashraf (WILEY-HINDAWI, ADAM HOUSE, 3RD FL, 1 FITZROY SQ, LONDON WIT 5HE, ENGLAND, 2022)With the increasing number and popularity of digital content, the management of digital access rights has become an utmost important field. Through digital rights management systems (DRM-S), access to digital contents can ... -
An Improved SIP Authenticated Key Agreement Based on Dongqing et al.
Ul Hassan, Mahmood; Chaudhry, Shehzad Ashraf; Irshad, Azeem (SPRINGER, ONE NEW YORK PLAZA, SUITE 4600 , NEW YORK, NY 10004, UNITED STATES, 2020)The IP multimedia subsystem represents an architectural framework to support multimedia-based services using internet protocol over wired and wireless media. These IP-based multimedia services rely on session initiation ... -
ITSSAKA-MS: An Improved Three-Factor Symmetric-Key Based Secure AKA Scheme for Multi-Server Environments
Ali, Zeeshan; Hussain, Sajid; Rehman, Rana Haseeb Ur; Munshi, Asmaa; Liaqat, Misbah; Kumar, Neeraj; Chaudhry, Shehzad Ashraf (IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 445 HOES LANE, PISCATAWAY, NJ 08855-4141, 2020)A variety of three-factor smart-card based schemes, specifically designed for telecare medicine information systems (TMIS) are available for remote user authentication. Most of the existing schemes for TMIS are customarily ... -
A Lightweight and Robust User Authentication Protocol with User Anonymity for IoT-Based Healthcare
Chen, Chien-Ming; Liu, Shuangshuang; Chaudhry, Shehzad Ashraf; Chen, Yeh-Cheng; Khan, Muhammad Asghar (TECH SCIENCE PRESS, 871 CORONADO CENTER DR, SUTE 200, HENDERSON, NV 89052, 2022)With the rise of the Internet of Things (IoT), the word “intelligent medical care” has increasingly become a major vision. Intelligent medicine adopts the most advanced IoT technology to realize the interaction between ...