ORCID "https://orcid.org/0000-0002-9321-6956" Web of Science ve Scopus Atıf Dizinlerindeki Yayınlar için listeleme
-
ITSSAKA-MS: An Improved Three-Factor Symmetric-Key Based Secure AKA Scheme for Multi-Server Environments
Ali, Zeeshan; Hussain, Sajid; Rehman, Rana Haseeb Ur; Munshi, Asmaa; Liaqat, Misbah; Kumar, Neeraj; Chaudhry, Shehzad Ashraf (IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 445 HOES LANE, PISCATAWAY, NJ 08855-4141, 2020)A variety of three-factor smart-card based schemes, specifically designed for telecare medicine information systems (TMIS) are available for remote user authentication. Most of the existing schemes for TMIS are customarily ... -
LAS-SG: An Elliptic Curve-Based Lightweight Authentication Scheme for Smart Grid Environments
Chaudhry, Shehzad Ashraf; Yahya, Khalid O. Moh.; Garg, Sahil; Kaddoum, Georges; Hassan, Mohammad Mehedi; Zikria, Yousaf Bin (IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 445 HOES LANE, PISCATAWAY, NJ 08855-4141, 2023)The communication among smart meters (SMs) and neighborhood area network (NAN) gateways is a fundamental requisite for managing the energy consumption at the consumer site. The bidirectional communication among SMs and ... -
A Lightweight and Robust User Authentication Protocol with User Anonymity for IoT-Based Healthcare
Chen, Chien-Ming; Liu, Shuangshuang; Chaudhry, Shehzad Ashraf; Chen, Yeh-Cheng; Khan, Muhammad Asghar (TECH SCIENCE PRESS, 871 CORONADO CENTER DR, SUTE 200, HENDERSON, NV 89052, 2022)With the rise of the Internet of Things (IoT), the word “intelligent medical care” has increasingly become a major vision. Intelligent medicine adopts the most advanced IoT technology to realize the interaction between ... -
A Lightweight Authentication Scheme for 6G-IoT Enabled Maritime Transport System
Chaudhry, Shehzad Ashraf; Irshad, Azeem; Khan, Muhammad Asghar; Khan, Sajjad Ahmad; Nosheen, Summera; AlZubi, Ahmad Ali; Zikria, Yousaf Bin (IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 445 HOES LANE, PISCATAWAY, NJ 08855-4141, 2023)The Sixth-Generation (6G) mobile network has the potential to provide not only traditional communication services but also additional processing, caching, sensing, and control capabilities to a massive number of Internet ... -
A low-cost privacy preserving user access in mobile edge computing framework
Irshad, Azeem; Chaudhry, Shehzad Ashraf; Ghani, Anwar; Mallah, Ghulam Ali; Bilal, Muhammad; Alzahrani, Bander A. (PERGAMON-ELSEVIER SCIENCE LTD, THE BOULEVARD, LANGFORD LANE, KIDLINGTON, OXFORD OX5 1GB, ENGLAND, 2022)The computational offloading from conventional cloud datacenter towards edge devices sprouted a new world of prospective applications in pervasive and Mobile Edge Computing (MEC) paradigm, leading to substantial gains in ... -
Machine Learning Algorithms for Smart Data Analysis in Internet of Things Environment: Taxonomies and Research Trends
Alsharif, Mohammed H.; Kelechi, Anabi Hilary; Chaudhry, Shehzad Ashraf (MDPI, ST ALBAN-ANLAGE 66, CH-4052 BASEL, SWITZERLAND, 2020)Machine learning techniques will contribution towards making Internet of Things (IoT) symmetric applications among the most significant sources of new data in the future. In this context, network systems are endowed with ... -
A Novel Pairing-Free Lightweight Authentication Protocol for Mobile Cloud Computing Framework
Irshad, Azeem; Chaudhry, Shehzad Ashraf; Alomari, Osama Ahmad; Yahya, Khalid O. Moh.; Kumar, Neeraj (IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 445 HOES LANE, PISCATAWAY, NJ 08855-4141, 2021)The mobile cloud computing (MCC) refers to an infrastructure that integrates cloud computing and mobile computing, and it has changed a great deal, the service provisioning of applications, which requires to get the data ... -
PASKE-IoD: Privacy-Protecting Authenticated Key Establishment for Internet of Drones
Tanveer, Muhammad; Khan, Abd Ullah; Shah, Habib; Chaudhry, Shehzad Ashraf; Naushad, Alamgir (IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 445 HOES LANE, PISCATAWAY, NJ 08855-4141, 2021)Unmanned aerial vehicles/drones are considered an essential ingredient of traffic motoring systems in smart cities. Interconnected drones, also called the Internet of Drones (IoD), gather critical data from the environmental ... -
PFLUA-DIoT: A Pairing Free Lightweight and Unlinkable User Access Control Scheme for Distributed IoT Environments
Chaudhry, Shehzad Ashraf; Farash, Mohammad Sabzinejad; Kumar, Neeraj; Alsharif, Mohammed H. (IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 445 HOES LANE, PISCATAWAY, NJ 08855-4141, 2022)The Internet of Things (IoT) connects enormous objects through various sensors to facilitate daily life by interconnecting the information space with the decision-makers. Security and privacy are, however, the main concerns ... -
A Privacy Enhanced Authentication Scheme for Securing Smart Grid Infrastructure
Chaudhry, Shehzad Ashraf; Nebhan, Jamel; Yahya, Khalid O. Moh.; Al-Turjman, Fadi (IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 445 HOES LANE, PISCATAWAY, NJ 08855-4141, 2022)The rapid advancements in smart grid (SG) technology extend a large number of applications including vehicle charging, smart buildings, and smart cities through the efficient use of advanced communication architecture ... -
A Privacy Preserving Authentication Scheme for Roaming in IoT-Based Wireless Mobile Networks
Alzahrani, Bander A.; Chaudhry, Shehzad Ashraf; Alsharif, Mohammed H. (MDPI, ST ALBAN-ANLAGE 66, CH-4052 BASEL, SWITZERLAND, 2020)The roaming service enables a remote user to get desired services, while roaming in a foreign network through the help of his home network. The authentication is a pre-requisite for secure communication between a foreign ... -
A provably secure and lightweight mutual authentication protocol in fog-enabled social Internet of vehicles
Li, Zhen; Miao, Qingkai; Chaudhry, Shehzad Ashraf; Chen, Chien-Ming (SAGE PUBLICATIONS INC, 2455 TELLER RD, THOUSAND OAKS, CA 91320, 2022)The Internet of vehicles technology has developed rapidly in recent years and has become increasingly important. The social Internet of vehicles provides better resources and services for the development of the Internet ... -
REAS-TMIS: Resource-Efficient Authentication Scheme for Telecare Medical Information System
Tanveer, Muhammad; Khan, Abd Ullah; Alkhayyat, Ahmed; Chaudhry, Shehzad Ashraf; Bin Zikria, Yousaf; Kim, Sung Won (IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 445 HOES LANE, PISCATAWAY, NJ 08855-4141, 2022)The phenomenal growth of smartphones and wearable devices has begun crowd-sourcing applications for the Internet of Things (IoT). E-healthcare is considered the essential service for crowd-sourcing IoT applications that ... -
A resource friendly authentication scheme for space–air–ground–sea integrated Maritime Communication Network
Khan, Muhammad Asghar; Alzahrani, Bander A.; Barnawi, Ahmed; Al-Barakati, Abdullah; Irshad, Azeem; Chaudhry, Shehzad Ashraf (PERGAMON-ELSEVIER SCIENCE LTD, THE BOULEVARD, LANGFORD LANE, KIDLINGTON, OXFORD OX5 1GB, ENGLAND, 2022)Recently, the demand for a faster , low-latency, and full-coverage Maritime Communication Network (MCN) has gained attention as marine operations have increased substantially. Using modern information network technologies ... -
A Robust Access Control Protocol for the Smart Grid Systems
Tanveer, Muhammad; Khan, Abd Ullah; Kumar, Neeraj; Naushad, Alamgir; Chaudhry, Shehzad Ashraf (IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 445 HOES LANE, PISCATAWAY, NJ 08855-4141, 2022)Lightweight cryptography (LWC)-based authenticated encryption with associative data (AEAD) cryptographic primitives require fewer computational and energy resources than conventional cryptographic primitives as a single ... -
A seamless anonymous authentication protocol for mobile edge computing infrastructure
Mahmood, Khalid; Ayub, Muhammad Faizan; Hassan, Syed Zohaib; Ghaffar, Zahid; Lv, Zhihan; Chaudhry, Shehzad Ashraf (ELSEVIER, RADARWEG 29, 1043 NX AMSTERDAM, NETHERLANDS, 2022)Mobile Edge Computing (MEC) accommodates processing and data storage and manipulation capabilities across the scope of wireless network. In MEC environment, MEC servers along with the computing and storage capabilities ... -
A secure and improved multi server authentication protocol using fuzzy commitment
Rehman, Hafeez Ur; Ghani, Anwar; Chaudhry, Shehzad Ashraf; Alsharif, Mohammed H.; Nabipour, Narjes (SPRINGER, VAN GODEWIJCKSTRAAT 30, 3311 GZ DORDRECHT, NETHERLANDS, 2021)The advancement in communication and computation technologies has paved a way for connecting large number of heterogeneous devices to offer specified services. Still, the advantages of this advancement are not realized ... -
A secure and lightweight authentication scheme for next generation IoT infrastructure
Rana, Minahil; Shafiq, Akasha; Altaf, Izwa; Alazab, Mamoun; Mahmood, Khalid; Chaudhry, Shehzad Ashraf; Bin Zikria, Yousaf (ELSEVIER, RADARWEG 29, 1043 NX AMSTERDAM, NETHERLANDS, 2021)While the 6G/IoT transition is on the cards, the real advantage of this transition can be realized only if the user privacy and security are guaranteed. The smartcard and password based authentication protocols can help ... -
A Secure and Lightweight Drones-Access Protocol for Smart City Surveillance
Akram, Muhammad Wahid; Bashir, Ali Kashif; Shamshad, Salman; Saleem, Muhammad Asad; AlZubi, Ahmad Ali; Chaudhry, Shehzad Ashraf; Alzahrani, Bander A.; Bin Zikria, Yousaf (IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 445 HOES LANE, PISCATAWAY, NJ, 2022)The rising popularity of ICT and the Internet has enabled Unmanned Aerial Vehicle (UAV) to offer advantageous assistance to Vehicular Ad-hoc Network (VANET), realizing a relay node’s role among the disconnected segments ... -
A Secure and Reliable Device Access Control Scheme for IoT Based Sensor Cloud Systems
Chaudhry, Shehzad Ashraf; Yahya, Khalid O. Moh.; Al-Turjman, Fadi; Yang, Ming-Hour (IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 445 HOES LANE, PISCATAWAY, NJ 08855-4141, 2020)Among other security concerns, the reliable device to device direct communication is an important research aspect in sensor cloud system application of Internet of things (IoT). The access control mechanism can ensure ...