Shehzad Ashraf | International Islamic University Islamabad (original) (raw)

Shehzad Ashraf

Address: Islamabad, Pakistan

less

Uploads

Papers by Shehzad Ashraf

Research paper thumbnail of Cryptanalysis and improvement of an improved two factor authentication protocol for telecare medical information systems

Research paper thumbnail of An authenticated key agreement with rekeying for secured body sensor networks based on hybrid cryptosystem

In recent years personal health monitoring Body Sensor Network (BSN) have got significant importa... more In recent years personal health monitoring Body Sensor Network (BSN) have got significant importance. Due to its sensitive and constrained nature, health data should be transported / kept confidentially, therefore, lightweight cryptographic technique and key management schemes are required in BSN. In this paper we have proposed a hybrid authenticated key agreement with rekeying for Body Sensor Network. Our scheme is based on Symmetric and Elliptic Curve Cryptography. The proposed scheme reduces seventy four percent memory requirements for keys storage, eighty seven percent Computation Cost and sixty one percent Communication Overhead.

Research paper thumbnail of Structure modeling and mutational analysis of gap junction beta 2 (GJB2

Research paper thumbnail of Signcryption schemes with forward secrecy based on hyperelliptic curve cryptosystem

Security of transmitted information is a key element for any communication system it becomes more... more Security of transmitted information is a key element for any communication system it becomes more important as for as resource constrained and wireless/mobile networks are concerned, as security is an energy, memory and processing extensive application while securing resource constrained networks a care must be taken regarding usage of energy, memory and processing, as technology grows the need of securing data in resource constrained networks is getting more importance. Hyper elliptic curve cryptosystem can ensure confidentiality and authenticity by the use of digital signatures and encryption. HECC is the right choice for resource constrained networks, it provides high efficiency and shorter key size while providing same level of security as other public key cryptosystems provides. In this paper, we proposed two resource efficient Signcryption Schemes with forward secrecy based on Hyperelliptic Curve Cryptosystem The proposed schemes not only provide message confidentiality, authentication, integrity, unforgeability, and non-repudiation, but also forward secrecy.

Research paper thumbnail of Analyzing performance of ad hoc network mobility models in a peer-to-peer network application over mobile ad hoc network

Mobile ad hoc network and peer-to-peer networks are most advancing and emerging research areas in... more Mobile ad hoc network and peer-to-peer networks are most advancing and emerging research areas in the recent years. Both of these networks are based on the same phenomenon like self-configuration and self-organization. Although, peer-to-peer network was firstly designed for wired network but now a days it may be deployed over mobile ad hoc network. When P2P networks are deployed over ad hoc network, it faces different problems due to dynamic topology and limited resources like memory, bandwidth and battery life of mobile nodes. In mobile ad hoc network nodes are continuously moving in a certain direction so network topology is changing from time to time. Node mobility is an important issue in these networks. Most of the researchers used only one mobility model in evaluation of routing protocols in mobile peer-to-peer network. As mobility models plays an important role in evaluation of the performance of different protocols, so other mobility models should also be used. We consider two mobility models probabilistic random walk and freeway mobility model in this network and we also compare these results with already used random waypoint mobility model. We used an ad hoc routing protocol Ad hoc On Demand Distance Vector routing under a peer-to-peer network application to evaluate the performance under prescribed mobility model. The results have been validated using network simulator (NS-2) and this helped in choosing proper mobility model for specific environment.

Research paper thumbnail of Hierarchal Hash Based Secure Network File System for Wireless Networks

Research paper thumbnail of Secure Mechanism for Handling Targeted Attacks in Infrastructure Based Wireless Mesh Networks

Infrastructure based Wireless mesh networks allow heterogeneous types of networks to be connected... more Infrastructure based Wireless mesh networks allow heterogeneous types of networks to be connected at a time through wireless mesh routers. Since the nodes of every network have different processing power, bandwidth, amount of energy etc. so this situation can lead to targeted attacks. An Internet connected node can easily generate flood over a node of sensor network. So to handle these types of attacks we in this paper introduced a new secure authentication mechanism that works when a potential of attack is detected. Moreover we also authorized the nodes of the wireless mesh network to demand data according to their capacity by using pull data traffic control mechanism. We applied this solution first on mesh routers to discourage targeted attacks and secondly we applied the solution on an individual node that lies in between a node and mesh router.

Research paper thumbnail of Ensuring reliability and freshness for Data Aggregation in Wireless Sensor Networks

Research paper thumbnail of Efficient signcryption schemes based on Hyperelliptic curve cryptosystem

Research paper thumbnail of Efficient Time Synchronization in Wireless Sensor Networks

The time synchronization is an important problem for wireless sensor networks. There has been man... more The time synchronization is an important problem for wireless sensor networks. There has been many time synchronization methods proposed in the literature, such as. The purpose of them was to synchronize the whole network, which cost much time and energy. In this paper, an efficient time synchronization scheme for wireless sensor networks is proposed. According to the specific application purpose of the network, only a few nodes of the network are selected to synchronize to each other. Performance analyses and simulations are presented in this paper, and demonstrate that our proposed scheme has higher time-efficiency and energy-efficiency than the traditional schemes in the literature.

Research paper thumbnail of Cryptanalysis and improvement of an improved two factor authentication protocol for telecare medical information systems

Research paper thumbnail of An authenticated key agreement with rekeying for secured body sensor networks based on hybrid cryptosystem

In recent years personal health monitoring Body Sensor Network (BSN) have got significant importa... more In recent years personal health monitoring Body Sensor Network (BSN) have got significant importance. Due to its sensitive and constrained nature, health data should be transported / kept confidentially, therefore, lightweight cryptographic technique and key management schemes are required in BSN. In this paper we have proposed a hybrid authenticated key agreement with rekeying for Body Sensor Network. Our scheme is based on Symmetric and Elliptic Curve Cryptography. The proposed scheme reduces seventy four percent memory requirements for keys storage, eighty seven percent Computation Cost and sixty one percent Communication Overhead.

Research paper thumbnail of Structure modeling and mutational analysis of gap junction beta 2 (GJB2

Research paper thumbnail of Signcryption schemes with forward secrecy based on hyperelliptic curve cryptosystem

Security of transmitted information is a key element for any communication system it becomes more... more Security of transmitted information is a key element for any communication system it becomes more important as for as resource constrained and wireless/mobile networks are concerned, as security is an energy, memory and processing extensive application while securing resource constrained networks a care must be taken regarding usage of energy, memory and processing, as technology grows the need of securing data in resource constrained networks is getting more importance. Hyper elliptic curve cryptosystem can ensure confidentiality and authenticity by the use of digital signatures and encryption. HECC is the right choice for resource constrained networks, it provides high efficiency and shorter key size while providing same level of security as other public key cryptosystems provides. In this paper, we proposed two resource efficient Signcryption Schemes with forward secrecy based on Hyperelliptic Curve Cryptosystem The proposed schemes not only provide message confidentiality, authentication, integrity, unforgeability, and non-repudiation, but also forward secrecy.

Research paper thumbnail of Analyzing performance of ad hoc network mobility models in a peer-to-peer network application over mobile ad hoc network

Mobile ad hoc network and peer-to-peer networks are most advancing and emerging research areas in... more Mobile ad hoc network and peer-to-peer networks are most advancing and emerging research areas in the recent years. Both of these networks are based on the same phenomenon like self-configuration and self-organization. Although, peer-to-peer network was firstly designed for wired network but now a days it may be deployed over mobile ad hoc network. When P2P networks are deployed over ad hoc network, it faces different problems due to dynamic topology and limited resources like memory, bandwidth and battery life of mobile nodes. In mobile ad hoc network nodes are continuously moving in a certain direction so network topology is changing from time to time. Node mobility is an important issue in these networks. Most of the researchers used only one mobility model in evaluation of routing protocols in mobile peer-to-peer network. As mobility models plays an important role in evaluation of the performance of different protocols, so other mobility models should also be used. We consider two mobility models probabilistic random walk and freeway mobility model in this network and we also compare these results with already used random waypoint mobility model. We used an ad hoc routing protocol Ad hoc On Demand Distance Vector routing under a peer-to-peer network application to evaluate the performance under prescribed mobility model. The results have been validated using network simulator (NS-2) and this helped in choosing proper mobility model for specific environment.

Research paper thumbnail of Hierarchal Hash Based Secure Network File System for Wireless Networks

Research paper thumbnail of Secure Mechanism for Handling Targeted Attacks in Infrastructure Based Wireless Mesh Networks

Infrastructure based Wireless mesh networks allow heterogeneous types of networks to be connected... more Infrastructure based Wireless mesh networks allow heterogeneous types of networks to be connected at a time through wireless mesh routers. Since the nodes of every network have different processing power, bandwidth, amount of energy etc. so this situation can lead to targeted attacks. An Internet connected node can easily generate flood over a node of sensor network. So to handle these types of attacks we in this paper introduced a new secure authentication mechanism that works when a potential of attack is detected. Moreover we also authorized the nodes of the wireless mesh network to demand data according to their capacity by using pull data traffic control mechanism. We applied this solution first on mesh routers to discourage targeted attacks and secondly we applied the solution on an individual node that lies in between a node and mesh router.

Research paper thumbnail of Ensuring reliability and freshness for Data Aggregation in Wireless Sensor Networks

Research paper thumbnail of Efficient signcryption schemes based on Hyperelliptic curve cryptosystem

Research paper thumbnail of Efficient Time Synchronization in Wireless Sensor Networks

The time synchronization is an important problem for wireless sensor networks. There has been man... more The time synchronization is an important problem for wireless sensor networks. There has been many time synchronization methods proposed in the literature, such as. The purpose of them was to synchronize the whole network, which cost much time and energy. In this paper, an efficient time synchronization scheme for wireless sensor networks is proposed. According to the specific application purpose of the network, only a few nodes of the network are selected to synchronize to each other. Performance analyses and simulations are presented in this paper, and demonstrate that our proposed scheme has higher time-efficiency and energy-efficiency than the traditional schemes in the literature.

Log In