Hizbullah Khattak - Academia.edu (original) (raw)

Papers by Hizbullah Khattak

Research paper thumbnail of Preventing black and gray hole attacks in AODV using optimal path routing and hash

2013 10th IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL (ICNSC), 2013

A mobile ad hoc network (MANETs) is a set of mobile nodes where every node communicates with each... more A mobile ad hoc network (MANETs) is a set of mobile nodes where every node communicates with each other without any predefined infrastructure and centralized administration. Due to the openness of its nature it is vulnerable to various kinds of threats. Ad hoc on demand distance vector (AODV) is a routing protocol being used for wireless ad hoc network. Black hole and gray hole are the imminent attacks that are launched on AODV. Both the attacks claim the shortest route to the destination and exploit this later by dropping the packets. In our proposed scheme, we use the second optimal route for data packets transmission and hash function for black and gray holes attacks avoidance and data integrity.

Research paper thumbnail of An Efficient and Provable Secure Certificate-Based Combined Signature, Encryption and Signcryption Scheme for Internet of Things (IoT) in Mobile Health (M-Health) System

Journal of Medical Systems

Research paper thumbnail of An Efficient and Secure Multi-message and Multi-receiver Signcryption Scheme for Edge Enabled Internet of Vehicles

IEEE Internet of Things Journal

Research paper thumbnail of Internet of Things-Based Smart Farming Monitoring System for Bolting Reduction in Onion Farms

Scientific Programming

According to the Pakistan Bureau of Statistics, Pakistan is amongst the top ten onion-producing c... more According to the Pakistan Bureau of Statistics, Pakistan is amongst the top ten onion-producing countries in the world. Though in Pakistan, most of the districts of Khyber Pakhtunkhwa produce onions, Malakand division lonely contributes 60% of the total onion production of the country. In onion farming, bolting is an insidious phenomenon that occurs in onion plants due to fluctuations in environmental factors such as temperature, humidity, and light intensity. Due to bolting, the flowering stem of an onion plant is produced before the crop is harvested, resulting in a poor-quality harvest and yield. Therefore, from a farmer’s perspective, it is highly desirable to monitor and control the environmental factors to avoid bolting. In this paper, we propose and design a new prototype, namely, a smart farming monitoring system (SFMS) for bolting reduction, which is based on the generic three-layered IoT architecture. By using IoT (Internet of things) technology and careful remote monitori...

Research paper thumbnail of Spatiotemporal Analysis of Residents in Shanghai by Utilizing Chinese Microblog Weibo Data

Mobile Information Systems

Mobile applications are really important nowadays due to providing the accurate check-in data for... more Mobile applications are really important nowadays due to providing the accurate check-in data for research. The primary goal of the study is to look into the impact of several forms of entertainment activities on the density dispersal of occupants in Shanghai, China, as well as prototypical check-in data from a location-based social network using a combination of temporal, spatial, and visualization techniques and categories of visitors’ check-ins. This article explores Weibo for big data assessment and its reliability in a variety of categories rather than physically obtained information by examining the link between time, frequency, place, class, and place of check-in based on geographic attributes and related implications. The data for this study came from Weibo, a popular Chinese microblog. It was preprocessed to extract the most important and associated results elements, then converted to geographical information systems format, appraised, and finally displayed using graphs, ta...

Research paper thumbnail of Secure Patient Authentication Framework in the Healthcare System Using Wireless Medical Sensor Networks

Journal of Healthcare Engineering

Biosensor is a means to transmit some physical phenomena, like body temperature, pulse, respirato... more Biosensor is a means to transmit some physical phenomena, like body temperature, pulse, respiratory rate, electroencephalogram (EEG), electrocardiogram (ECG), and blood pressure. Such transmission is performed via Wireless Medical Sensor Network (WMSN) while diagnosing patients remotely through Internet-of-Medical-Things (IoMT). The sensitive data transmitted through WMSN from IoMT over an insecure channel is vulnerable to several threats and needs proper attention to be secured from adversaries. In contrast to addressing the security of all associated entities involving patient monitoring in the healthcare system or ensuring the integrity, authorization, and nonrepudiation of information over the communication line, no one can guarantee its security without a robust authentication protocol. Therefore, we have proposed a lightweight and robust authentication scheme for the network-enabled healthcare devices (IoMT) that mitigate all the identified weaknesses posed in the recent liter...

Research paper thumbnail of Urdu Handwritten Characters Data Visualization and Recognition Using Distributed Stochastic Neighborhood Embedding and Deep Network

Complexity

In this paper, we make use of the 2-dimensional data obtained through t-Stochastic Neighborhood E... more In this paper, we make use of the 2-dimensional data obtained through t-Stochastic Neighborhood Embedding (t-SNE) when applied on high-dimensional data of Urdu handwritten characters and numerals. The instances of the dataset used for experimental work are classified in multiple classes depending on the shape similarity. We performed three tasks in a disciplined order; namely, (i) we generated a state-of-the-art dataset of both the Urdu handwritten characters and numerals by inviting a number of native Urdu participants from different social and academic groups, since there is no publicly available dataset of such type till date, then (ii) applied classical approaches of dimensionality reduction and data visualization like Principal Component Analysis (PCA), Autoencoders (AE) in comparison with t-Stochastic Neighborhood Embedding (t-SNE), and (iii) used the reduced dimensions obtained through PCA, AE, and t-SNE for recognition of Urdu handwritten characters and numerals using a deep...

Research paper thumbnail of Selection and Ranking of Fog Computing-Based IoT for Monitoring of Health Using the Analytic Network Approach

Complexity

Numerous raised areas are established in the field of fog computing (FC), applied for various pur... more Numerous raised areas are established in the field of fog computing (FC), applied for various purposes, and are evaluated for running analytics on various devices including devices of internet of things and many others in a disseminated way. FC progresses the prototype of cloud computing to network edge leading various possibilities and services. FC improves processing, decision, and intervention to take place through devices of IoT and communicate essential details. The idea of FC in healthcare based on frameworks of IoT is exploited by determining dispersed delegate layer of comprehension between the cloud and sensor hubs. The clouds suggested systems improved to overcome several challenges in ubiquitous frameworks of medical services such as energy efficiency, portability, adaptableness, and quality issues by accommodating right to take care of definite weights of the distant medical services group and sensor networks. The proposed research work has considered the analytic networ...

Research paper thumbnail of Lightweight and provable secure cross-domain access control scheme for internet of things (IoT) based wireless body area networks (WBAN)

Microprocessors and Microsystems

Research paper thumbnail of A Lightweight Identity-Based Signature Scheme for Mitigation of Content Poisoning Attack in Named Data Networking With Internet of Things

IEEE Access

Named Data Networking (NDN) is one of the future envisioned networking paradigm used to provide f... more Named Data Networking (NDN) is one of the future envisioned networking paradigm used to provide fast and efficient content dissemination with interest-based content retrieval, name-based routing and in-network content caching. On the one hand, this new breed of future Internet architecture is becoming a key technology for data dissemination in the IoT networks; on the other hand, NDN suffers from new challenges in terms of data security. Among them, a content poisoning attack is the most common data security challenge. The aim of this attack is to inject poisoned content with an invalid signature to the network. Therefore, to prevent NDN against possible content poisoning attack, a signature of the contents is appended to each data packet for verifications. In this paper, we propose an identity-based signature scheme for IoT-based NDN networks, with a special emphasis on content integrity and authenticity. The proposed scheme is based on the concept of the Hyperelliptic curves, which provide the same level of security as Rivest-Shamir-Adleman (RSA), Bilinear pairing and Elliptic Curve Cryptosystems (ECC) with lower-key size. The proposed scheme is subject to both formal and informal security analysis in order to show the feasibility of our scheme. Finally, the performance of the proposed scheme is analyzed via comparison with the relevant existing schemes that authenticates the superiority of our scheme in terms of security and efficiency. INDEX TERMS Content poisoning attack, named data networking (NDN), Internet of Things, identity-based signature.

Research paper thumbnail of A Lightweight Nature Heterogeneous Generalized Signcryption (HGSC) Scheme for Named Data Networking-Enabled Internet of Things

Wireless Communications and Mobile Computing

Internet of Things (IoT) is the collection of different types of smart objects like mobile phones... more Internet of Things (IoT) is the collection of different types of smart objects like mobile phones, sensors, cars, smart cities, smart buildings, and healthcare, which can provide a quality life to humans around the globe. These smart objects sense and produce a huge amount of data for distribution. The current hostcentric networking paradigm is not that scalable to provide a suitable solution to the idea of IoT. For scalable connectivity and efficient distribution, Named Data Networking (NDN) has been envisioned as a promising solution for future internet architecture. On the other hand, the significant issues regarding the adaptation of NDN with IoT possess security concerns such as authentication, confidentiality, integrity, and forward secrecy. As IoT is a heterogeneous environment, it demands a different type of security, according to the environmental situation such as public key infrastructure (PKI), identity-based cryptosystem (IBC), and certificateless cryptosystem (CLC). Th...

Research paper thumbnail of Multiaccess Edge Computing Empowered Flying Ad Hoc Networks with Secure Deployment Using Identity-Based Generalized Signcryption

Mobile Information Systems

A group of small UAVs can synergize to form a flying ad hoc network (FANET). The small UAVs are, ... more A group of small UAVs can synergize to form a flying ad hoc network (FANET). The small UAVs are, typically, prone to security lapses because of limited onboard power, restricted computing ability, insufficient bandwidth, etc. Such limitations hinder the applicability of standard cryptographic techniques. Thus, assuring confidentiality and authentication on part of small UAV remains a far-fetched goal. We aim to address such an issue by proposing an identity-based generalized signcryption scheme. The lightweight security scheme employs multiaccess edge computing (MEC) whereby the primary UAV, as a MEC node, provides offloading to the computationally fragile member UAVs. The scheme is based on the concept of the hyperelliptic curve (HEC), which is characterized by a smaller key size and is, therefore, suitable for small UAVs. The scheme is robust since it offers confidentiality and authentication simultaneously as well as singly. Formal as well as informal security analyses and the va...

Research paper thumbnail of A Lightweight and Formally Secure Certificate Based Signcryption With Proxy Re-Encryption (CBSRE) for Internet of Things Enabled Smart Grid

IEEE Access

A smart grid is a new ecosystem, which is made by combining a number of smart Internet of Things ... more A smart grid is a new ecosystem, which is made by combining a number of smart Internet of Things (IoT) devices that manage wide energy sources by increasing the efficiency and reliability of the smart energy systems. As the IoT devices in the smart grid ecosystem generate a gigantic amount of data that needs to be stored and managed in the cloud server. On the other hand, the stored data in the cloud server can be accessible to a number of data users, therefore the data need authenticity and secrecy. Here, to fulfill the security requirements of such type of communication, signcryption with proxy re-encryption technique is the most suitable option where a semi-trusted third party can alter a ciphertext that has been encrypted for one user into another ciphertext without seeing the original content of the message. However, the existing signcryption with proxy re-encryption schemes for the smart grid environment is suffering from more bandwidth space and greater computational time requirements. Thus, in this paper, we propose a lightweight certificate-based signcryption with a proxy re-encryption (CBSRE) scheme for smart grid based-IoT devices with the intention of reducing the computational and communicational costs. For the security and efficiency of the proposed CBSRE scheme, we used a hyperelliptic curve cryptosystem that uses small parameters with a key size of 80-bits. Furthermore, the proposed scheme provides the security requirements of confidentiality (IND-CBSRE-CCA2-I and IND-CBSRE-CCA2-II), unforgeability (EUF-CBSRE-CMA-I and EUF-CBSRE-CMA-II) and forward secrecy. Additionally, we compared our proposed CBSRE scheme with the existing proxy signcryption with re-encryption schemes and the final results show that the new scheme provides strong security with the expanse of minimal computational and communications resources.

Research paper thumbnail of Addendum: Ullah, I., et al. A Novel Provable Secured Signcryption Scheme PSSS: A Hyper-Elliptic Curve-Based Approach. Mathematics 2019, 7, 686

Mathematics

The authors wish to make the following corrections to this paper [...]

Research paper thumbnail of A Lightweight and Provable Secured Certificateless Signcryption Approach for Crowdsourced IIoT Applications

Symmetry

Industrial Internet of Things (IIoT) is a new type of Internet of Things (IoT), which enables sen... more Industrial Internet of Things (IIoT) is a new type of Internet of Things (IoT), which enables sensors to merge with several smart devices to monitor machine status, environment, and collect data from industrial devices. On the other hand, cloud computing provides a good platform for storing crowdsourced data of IIoT. Due to the semi-trusted nature of cloud computing and communication through open channels, the IIoT environment needs security services such as confidentiality and authenticity. One such solution is provided by the identity-based signcryption. Unfortunately, the identity-based signcryption approach suffers from the key escrow problem. Certificateless signcryption is the alternative of identity-based signcryption that can resolve the key escrow problem. Here, we propose a lightweight certificateless signcryption approach for crowdsourced IIoT applications with the intention of enhancing security and decreasing the computational cost and communication overhead. The securi...

Research paper thumbnail of An Energy Efficient and Formally Secured Certificate-Based Signcryption for Wireless Body Area Networks with the Internet of Things

Electronics

Recently, the spectacular innovations in the fields of wireless body area networks (WBAN) and the... more Recently, the spectacular innovations in the fields of wireless body area networks (WBAN) and the Internet of Things (IoT) have made e-Care services rise as a promising application domain, which significantly advances the quality of the medical system, however, due to the openness of the wireless environment and privacy of people’s physiological data, WBAN and IoT are prone to various cyber-attacks. There is a significant need for an efficient and highly secured cryptographic scheme that can meet the requirements of resource-constrained devices. Therefore, in this paper, we propose a certificate-based signcryption (CB-SN) scheme for the IoT-enabled WBAN. The proposed scheme is based on the concept of hyper-elliptic curve cryptography (HECC) that offers the same level of security as the elliptic curve and bilinear pairing with lower-key size. The formal security verification using the Automated Validation of the Internet Security Protocols and Applications (AVISPA) tool along with in...

Research paper thumbnail of A Lightweight Multi-Message and Multi-Receiver Heterogeneous Hybrid Signcryption Scheme based on Hyper Elliptic Curve

International Journal of Advanced Computer Science and Applications

It is a suitable means for multi-messages to use hybrid encryption to make a safe communication. ... more It is a suitable means for multi-messages to use hybrid encryption to make a safe communication. Hybrid encryption confines encryption into two parts: one part uses public key systems to scramble a one-time symmetric key, and the other part uses the symmetric key to scramble the actual message. The quick advancement of the internet technology requires distinctive message communications over the more extensive territory to upgrade the heterogeneous system security. In this paper, we present a lightweight multi-message and multireceiver Heterogeneous hybrid signcryption scheme based on the hyper elliptic curve. We choose hyper elliptic curve for our scheme, because with 80 bits key give an equivalent level of security as contrasted and different cryptosystems like RSA and Bilinear pairing with 1024 bits key and elliptic curve with 160 bits key, respectively. Further, we validate these security requirements with our scheme, for example, confidentiality, resistance against reply attack, integrity, authenticity, nonrepudiation, public verifiability, forward secrecy and unforgeability through a well-known security validation tool called Automated Validation of Internet Security Protocols and Applications (AVISPA). In addition, our approach has low computational costs, which is attractive for low resources devices and heterogeneous environment.

Research paper thumbnail of LeafPopDown: Leaf Popular Down Caching Strategy for Information-Centric Networking

International Journal of Advanced Computer Science and Applications

Information-Centric Networking is a name based internet architecture and is considered as an alte... more Information-Centric Networking is a name based internet architecture and is considered as an alternate of IP base internet architecture. The in-network caching feature used in ICN has attracted research interests as it reduces network traffic, server overload and minimizes latency experienced by end users. Researchers have proposed different caching policies for ICN aiming to optimize performance metrics, such as cache hits, diversity and eviction operations. In this paper, we propose a novel caching strategy of LeafPopDown for ICN that significantly reduces eviction operation and enhances cache hits and diversity in ICN.

Research paper thumbnail of A hybrid approach for preventing Black and Gray hole attacks in MANET

Eighth International Conference on Digital Information Management (ICDIM 2013), 2013

Research paper thumbnail of A lightweight and provable secure identity-based generalized proxy signcryption (IBGPS) scheme for Industrial Internet of Things (IIoT)

Journal of Information Security and Applications

Research paper thumbnail of Preventing black and gray hole attacks in AODV using optimal path routing and hash

2013 10th IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL (ICNSC), 2013

A mobile ad hoc network (MANETs) is a set of mobile nodes where every node communicates with each... more A mobile ad hoc network (MANETs) is a set of mobile nodes where every node communicates with each other without any predefined infrastructure and centralized administration. Due to the openness of its nature it is vulnerable to various kinds of threats. Ad hoc on demand distance vector (AODV) is a routing protocol being used for wireless ad hoc network. Black hole and gray hole are the imminent attacks that are launched on AODV. Both the attacks claim the shortest route to the destination and exploit this later by dropping the packets. In our proposed scheme, we use the second optimal route for data packets transmission and hash function for black and gray holes attacks avoidance and data integrity.

Research paper thumbnail of An Efficient and Provable Secure Certificate-Based Combined Signature, Encryption and Signcryption Scheme for Internet of Things (IoT) in Mobile Health (M-Health) System

Journal of Medical Systems

Research paper thumbnail of An Efficient and Secure Multi-message and Multi-receiver Signcryption Scheme for Edge Enabled Internet of Vehicles

IEEE Internet of Things Journal

Research paper thumbnail of Internet of Things-Based Smart Farming Monitoring System for Bolting Reduction in Onion Farms

Scientific Programming

According to the Pakistan Bureau of Statistics, Pakistan is amongst the top ten onion-producing c... more According to the Pakistan Bureau of Statistics, Pakistan is amongst the top ten onion-producing countries in the world. Though in Pakistan, most of the districts of Khyber Pakhtunkhwa produce onions, Malakand division lonely contributes 60% of the total onion production of the country. In onion farming, bolting is an insidious phenomenon that occurs in onion plants due to fluctuations in environmental factors such as temperature, humidity, and light intensity. Due to bolting, the flowering stem of an onion plant is produced before the crop is harvested, resulting in a poor-quality harvest and yield. Therefore, from a farmer’s perspective, it is highly desirable to monitor and control the environmental factors to avoid bolting. In this paper, we propose and design a new prototype, namely, a smart farming monitoring system (SFMS) for bolting reduction, which is based on the generic three-layered IoT architecture. By using IoT (Internet of things) technology and careful remote monitori...

Research paper thumbnail of Spatiotemporal Analysis of Residents in Shanghai by Utilizing Chinese Microblog Weibo Data

Mobile Information Systems

Mobile applications are really important nowadays due to providing the accurate check-in data for... more Mobile applications are really important nowadays due to providing the accurate check-in data for research. The primary goal of the study is to look into the impact of several forms of entertainment activities on the density dispersal of occupants in Shanghai, China, as well as prototypical check-in data from a location-based social network using a combination of temporal, spatial, and visualization techniques and categories of visitors’ check-ins. This article explores Weibo for big data assessment and its reliability in a variety of categories rather than physically obtained information by examining the link between time, frequency, place, class, and place of check-in based on geographic attributes and related implications. The data for this study came from Weibo, a popular Chinese microblog. It was preprocessed to extract the most important and associated results elements, then converted to geographical information systems format, appraised, and finally displayed using graphs, ta...

Research paper thumbnail of Secure Patient Authentication Framework in the Healthcare System Using Wireless Medical Sensor Networks

Journal of Healthcare Engineering

Biosensor is a means to transmit some physical phenomena, like body temperature, pulse, respirato... more Biosensor is a means to transmit some physical phenomena, like body temperature, pulse, respiratory rate, electroencephalogram (EEG), electrocardiogram (ECG), and blood pressure. Such transmission is performed via Wireless Medical Sensor Network (WMSN) while diagnosing patients remotely through Internet-of-Medical-Things (IoMT). The sensitive data transmitted through WMSN from IoMT over an insecure channel is vulnerable to several threats and needs proper attention to be secured from adversaries. In contrast to addressing the security of all associated entities involving patient monitoring in the healthcare system or ensuring the integrity, authorization, and nonrepudiation of information over the communication line, no one can guarantee its security without a robust authentication protocol. Therefore, we have proposed a lightweight and robust authentication scheme for the network-enabled healthcare devices (IoMT) that mitigate all the identified weaknesses posed in the recent liter...

Research paper thumbnail of Urdu Handwritten Characters Data Visualization and Recognition Using Distributed Stochastic Neighborhood Embedding and Deep Network

Complexity

In this paper, we make use of the 2-dimensional data obtained through t-Stochastic Neighborhood E... more In this paper, we make use of the 2-dimensional data obtained through t-Stochastic Neighborhood Embedding (t-SNE) when applied on high-dimensional data of Urdu handwritten characters and numerals. The instances of the dataset used for experimental work are classified in multiple classes depending on the shape similarity. We performed three tasks in a disciplined order; namely, (i) we generated a state-of-the-art dataset of both the Urdu handwritten characters and numerals by inviting a number of native Urdu participants from different social and academic groups, since there is no publicly available dataset of such type till date, then (ii) applied classical approaches of dimensionality reduction and data visualization like Principal Component Analysis (PCA), Autoencoders (AE) in comparison with t-Stochastic Neighborhood Embedding (t-SNE), and (iii) used the reduced dimensions obtained through PCA, AE, and t-SNE for recognition of Urdu handwritten characters and numerals using a deep...

Research paper thumbnail of Selection and Ranking of Fog Computing-Based IoT for Monitoring of Health Using the Analytic Network Approach

Complexity

Numerous raised areas are established in the field of fog computing (FC), applied for various pur... more Numerous raised areas are established in the field of fog computing (FC), applied for various purposes, and are evaluated for running analytics on various devices including devices of internet of things and many others in a disseminated way. FC progresses the prototype of cloud computing to network edge leading various possibilities and services. FC improves processing, decision, and intervention to take place through devices of IoT and communicate essential details. The idea of FC in healthcare based on frameworks of IoT is exploited by determining dispersed delegate layer of comprehension between the cloud and sensor hubs. The clouds suggested systems improved to overcome several challenges in ubiquitous frameworks of medical services such as energy efficiency, portability, adaptableness, and quality issues by accommodating right to take care of definite weights of the distant medical services group and sensor networks. The proposed research work has considered the analytic networ...

Research paper thumbnail of Lightweight and provable secure cross-domain access control scheme for internet of things (IoT) based wireless body area networks (WBAN)

Microprocessors and Microsystems

Research paper thumbnail of A Lightweight Identity-Based Signature Scheme for Mitigation of Content Poisoning Attack in Named Data Networking With Internet of Things

IEEE Access

Named Data Networking (NDN) is one of the future envisioned networking paradigm used to provide f... more Named Data Networking (NDN) is one of the future envisioned networking paradigm used to provide fast and efficient content dissemination with interest-based content retrieval, name-based routing and in-network content caching. On the one hand, this new breed of future Internet architecture is becoming a key technology for data dissemination in the IoT networks; on the other hand, NDN suffers from new challenges in terms of data security. Among them, a content poisoning attack is the most common data security challenge. The aim of this attack is to inject poisoned content with an invalid signature to the network. Therefore, to prevent NDN against possible content poisoning attack, a signature of the contents is appended to each data packet for verifications. In this paper, we propose an identity-based signature scheme for IoT-based NDN networks, with a special emphasis on content integrity and authenticity. The proposed scheme is based on the concept of the Hyperelliptic curves, which provide the same level of security as Rivest-Shamir-Adleman (RSA), Bilinear pairing and Elliptic Curve Cryptosystems (ECC) with lower-key size. The proposed scheme is subject to both formal and informal security analysis in order to show the feasibility of our scheme. Finally, the performance of the proposed scheme is analyzed via comparison with the relevant existing schemes that authenticates the superiority of our scheme in terms of security and efficiency. INDEX TERMS Content poisoning attack, named data networking (NDN), Internet of Things, identity-based signature.

Research paper thumbnail of A Lightweight Nature Heterogeneous Generalized Signcryption (HGSC) Scheme for Named Data Networking-Enabled Internet of Things

Wireless Communications and Mobile Computing

Internet of Things (IoT) is the collection of different types of smart objects like mobile phones... more Internet of Things (IoT) is the collection of different types of smart objects like mobile phones, sensors, cars, smart cities, smart buildings, and healthcare, which can provide a quality life to humans around the globe. These smart objects sense and produce a huge amount of data for distribution. The current hostcentric networking paradigm is not that scalable to provide a suitable solution to the idea of IoT. For scalable connectivity and efficient distribution, Named Data Networking (NDN) has been envisioned as a promising solution for future internet architecture. On the other hand, the significant issues regarding the adaptation of NDN with IoT possess security concerns such as authentication, confidentiality, integrity, and forward secrecy. As IoT is a heterogeneous environment, it demands a different type of security, according to the environmental situation such as public key infrastructure (PKI), identity-based cryptosystem (IBC), and certificateless cryptosystem (CLC). Th...

Research paper thumbnail of Multiaccess Edge Computing Empowered Flying Ad Hoc Networks with Secure Deployment Using Identity-Based Generalized Signcryption

Mobile Information Systems

A group of small UAVs can synergize to form a flying ad hoc network (FANET). The small UAVs are, ... more A group of small UAVs can synergize to form a flying ad hoc network (FANET). The small UAVs are, typically, prone to security lapses because of limited onboard power, restricted computing ability, insufficient bandwidth, etc. Such limitations hinder the applicability of standard cryptographic techniques. Thus, assuring confidentiality and authentication on part of small UAV remains a far-fetched goal. We aim to address such an issue by proposing an identity-based generalized signcryption scheme. The lightweight security scheme employs multiaccess edge computing (MEC) whereby the primary UAV, as a MEC node, provides offloading to the computationally fragile member UAVs. The scheme is based on the concept of the hyperelliptic curve (HEC), which is characterized by a smaller key size and is, therefore, suitable for small UAVs. The scheme is robust since it offers confidentiality and authentication simultaneously as well as singly. Formal as well as informal security analyses and the va...

Research paper thumbnail of A Lightweight and Formally Secure Certificate Based Signcryption With Proxy Re-Encryption (CBSRE) for Internet of Things Enabled Smart Grid

IEEE Access

A smart grid is a new ecosystem, which is made by combining a number of smart Internet of Things ... more A smart grid is a new ecosystem, which is made by combining a number of smart Internet of Things (IoT) devices that manage wide energy sources by increasing the efficiency and reliability of the smart energy systems. As the IoT devices in the smart grid ecosystem generate a gigantic amount of data that needs to be stored and managed in the cloud server. On the other hand, the stored data in the cloud server can be accessible to a number of data users, therefore the data need authenticity and secrecy. Here, to fulfill the security requirements of such type of communication, signcryption with proxy re-encryption technique is the most suitable option where a semi-trusted third party can alter a ciphertext that has been encrypted for one user into another ciphertext without seeing the original content of the message. However, the existing signcryption with proxy re-encryption schemes for the smart grid environment is suffering from more bandwidth space and greater computational time requirements. Thus, in this paper, we propose a lightweight certificate-based signcryption with a proxy re-encryption (CBSRE) scheme for smart grid based-IoT devices with the intention of reducing the computational and communicational costs. For the security and efficiency of the proposed CBSRE scheme, we used a hyperelliptic curve cryptosystem that uses small parameters with a key size of 80-bits. Furthermore, the proposed scheme provides the security requirements of confidentiality (IND-CBSRE-CCA2-I and IND-CBSRE-CCA2-II), unforgeability (EUF-CBSRE-CMA-I and EUF-CBSRE-CMA-II) and forward secrecy. Additionally, we compared our proposed CBSRE scheme with the existing proxy signcryption with re-encryption schemes and the final results show that the new scheme provides strong security with the expanse of minimal computational and communications resources.

Research paper thumbnail of Addendum: Ullah, I., et al. A Novel Provable Secured Signcryption Scheme PSSS: A Hyper-Elliptic Curve-Based Approach. Mathematics 2019, 7, 686

Mathematics

The authors wish to make the following corrections to this paper [...]

Research paper thumbnail of A Lightweight and Provable Secured Certificateless Signcryption Approach for Crowdsourced IIoT Applications

Symmetry

Industrial Internet of Things (IIoT) is a new type of Internet of Things (IoT), which enables sen... more Industrial Internet of Things (IIoT) is a new type of Internet of Things (IoT), which enables sensors to merge with several smart devices to monitor machine status, environment, and collect data from industrial devices. On the other hand, cloud computing provides a good platform for storing crowdsourced data of IIoT. Due to the semi-trusted nature of cloud computing and communication through open channels, the IIoT environment needs security services such as confidentiality and authenticity. One such solution is provided by the identity-based signcryption. Unfortunately, the identity-based signcryption approach suffers from the key escrow problem. Certificateless signcryption is the alternative of identity-based signcryption that can resolve the key escrow problem. Here, we propose a lightweight certificateless signcryption approach for crowdsourced IIoT applications with the intention of enhancing security and decreasing the computational cost and communication overhead. The securi...

Research paper thumbnail of An Energy Efficient and Formally Secured Certificate-Based Signcryption for Wireless Body Area Networks with the Internet of Things

Electronics

Recently, the spectacular innovations in the fields of wireless body area networks (WBAN) and the... more Recently, the spectacular innovations in the fields of wireless body area networks (WBAN) and the Internet of Things (IoT) have made e-Care services rise as a promising application domain, which significantly advances the quality of the medical system, however, due to the openness of the wireless environment and privacy of people’s physiological data, WBAN and IoT are prone to various cyber-attacks. There is a significant need for an efficient and highly secured cryptographic scheme that can meet the requirements of resource-constrained devices. Therefore, in this paper, we propose a certificate-based signcryption (CB-SN) scheme for the IoT-enabled WBAN. The proposed scheme is based on the concept of hyper-elliptic curve cryptography (HECC) that offers the same level of security as the elliptic curve and bilinear pairing with lower-key size. The formal security verification using the Automated Validation of the Internet Security Protocols and Applications (AVISPA) tool along with in...

Research paper thumbnail of A Lightweight Multi-Message and Multi-Receiver Heterogeneous Hybrid Signcryption Scheme based on Hyper Elliptic Curve

International Journal of Advanced Computer Science and Applications

It is a suitable means for multi-messages to use hybrid encryption to make a safe communication. ... more It is a suitable means for multi-messages to use hybrid encryption to make a safe communication. Hybrid encryption confines encryption into two parts: one part uses public key systems to scramble a one-time symmetric key, and the other part uses the symmetric key to scramble the actual message. The quick advancement of the internet technology requires distinctive message communications over the more extensive territory to upgrade the heterogeneous system security. In this paper, we present a lightweight multi-message and multireceiver Heterogeneous hybrid signcryption scheme based on the hyper elliptic curve. We choose hyper elliptic curve for our scheme, because with 80 bits key give an equivalent level of security as contrasted and different cryptosystems like RSA and Bilinear pairing with 1024 bits key and elliptic curve with 160 bits key, respectively. Further, we validate these security requirements with our scheme, for example, confidentiality, resistance against reply attack, integrity, authenticity, nonrepudiation, public verifiability, forward secrecy and unforgeability through a well-known security validation tool called Automated Validation of Internet Security Protocols and Applications (AVISPA). In addition, our approach has low computational costs, which is attractive for low resources devices and heterogeneous environment.

Research paper thumbnail of LeafPopDown: Leaf Popular Down Caching Strategy for Information-Centric Networking

International Journal of Advanced Computer Science and Applications

Information-Centric Networking is a name based internet architecture and is considered as an alte... more Information-Centric Networking is a name based internet architecture and is considered as an alternate of IP base internet architecture. The in-network caching feature used in ICN has attracted research interests as it reduces network traffic, server overload and minimizes latency experienced by end users. Researchers have proposed different caching policies for ICN aiming to optimize performance metrics, such as cache hits, diversity and eviction operations. In this paper, we propose a novel caching strategy of LeafPopDown for ICN that significantly reduces eviction operation and enhances cache hits and diversity in ICN.

Research paper thumbnail of A hybrid approach for preventing Black and Gray hole attacks in MANET

Eighth International Conference on Digital Information Management (ICDIM 2013), 2013

Research paper thumbnail of A lightweight and provable secure identity-based generalized proxy signcryption (IBGPS) scheme for Industrial Internet of Things (IIoT)

Journal of Information Security and Applications