haqi khalid | UPM - Universiti Putra Malaysia (original) (raw)
Papers by haqi khalid
The Cyber-Physical Systems (CPS) are complicated networked systems which compriseof computing and... more The Cyber-Physical Systems (CPS) are complicated networked systems which compriseof computing and communicating cyber components and interact closely with physicalcomponents, such as sensors and actuators. The integration of CPS, on the other hand, presentsadditional threats that might be catastrophic for society. However, this study intends to examinethe efforts of researchers in response to CPS-based current industrial applications ' new andharmful tech, map the literature-based research landscape, and determine the essential features ofthis growing research. This research also examines the desire behind the use of Cyber-physicalsystems in various industrial environments and the Open challenges that negatively affect thistechnology's usefulness. The study of this offers the use of Cyber-Physical System / IndustrialCPS valuable recommendations by designers/developers, researchers, and industries/factories.Finally, the whole study contributes to this field of research by off...
PeerJ Computer Science
In heterogeneous wireless networks, the industrial Internet of Things (IIoT) is an essential cont... more In heterogeneous wireless networks, the industrial Internet of Things (IIoT) is an essential contributor to increasing productivity and effectiveness. However, in various domains, such as industrial wireless scenarios, small cell domains, and vehicular ad hoc networks, an efficient and stable authentication algorithm is required (VANET). Specifically, IoT vehicles deal with vast amounts of data transmitted between VANET entities in different domains in such a large-scale environment. Also, crossing from one territory to another may have the connectivity services down for a while, leading to service interruption because it is pervasive in remote areas and places with multipath obstructions. Hence, it is vulnerable to specific attacks (e.g., replay attacks, modification attacks, man-in-the-middle attacks, and insider attacks), making the system inefficient. Also, high processing data increases the computation and communication cost, leading to an increased workload in the system. Thus...
Machine-type Communication (MTC) is a form of data communication which involves one or more entit... more Machine-type Communication (MTC) is a form of data communication which involves one or more entities that do not necessarily need human interaction, which has become the hotspot in industry area. Furthermore, Machine-Type Communication (MTC) has shown the advantages, including better coverage and lower network deployment cost, which makes it become the hotspot in industry area. However, the current cellular network is designed for human-to-human communication (H2H), and less optimal for machine-to-machine, machine-tohuman or human-to-machine applications. In addition, current cellular network is less optimal for MTC applications, and now facing some urgent issues, e.g. congestion and overload caused by the access of masses of MTC devices. This paper shows the techniques that used in MTC for LTE/LTE-A networks to enhance the authentication protocols with reduce signaling overhead and computational cost. Furthermore, this work discussed the problems that causing signaling overload in ...
Energies
Connected vehicles have emerged as the latest revolution in the automotive industry, utilizing th... more Connected vehicles have emerged as the latest revolution in the automotive industry, utilizing the advent of the Internet of Things (IoT). However, most IoT-connected cars mechanisms currently depend on available network services and need continuous network connections to allow users to connect to their vehicles. Nevertheless, the connectivity availability shortcoming in remote or rural areas with no network coverage makes vehicle sharing or any IoT-connected device problematic and undesirable. Furthermore, IoT-connected cars are vulnerable to various passive and active attacks (e.g., replay attacks, MiTM attacks, impersonation attacks, and offline guessing attacks). Adversaries could all use these attacks to disrupt networks posing a threat to the entire automotive industry. Therefore, to overcome this issue, we propose a hybrid online and offline multi-factor authentication cross-domain authentication method for a connected car-sharing environment based on the user’s smartphone. T...
2020 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE)
Car sharing provides consumers a flexible peer-to-peer service or station service. However, the c... more Car sharing provides consumers a flexible peer-to-peer service or station service. However, the connectivity problems are pervasive in remote areas and places with multi-path obstructions with no clear line-of-sight (LoS). In this scenario, availability of the network can be intermittent and is not always guaranteed, especially for untethered wireless networks consisting of mobile vehicles. A conventional online authentication scheme; therefore, is not an effective solution when it comes to securing the vehicles. Also, the malicious attackers could gain access to the vehicles using a replay of the user signal, that is known as a “replay attack” In order to provide an effective authentication approach, we propose an offline authentication approach based on a Time-based One-time Password (TOTP) algorithm. OTP is chosen due to its protection against the notorious replay attack that is popular against keyless start vehicles. It also utilized an additional security biometric factor to enhance the security of the driver’s authentication. The new proposed scheme is divided into online and offline schemes to provide a secure solution. The novelty is that it can enable the authorized drivers to securely start and operate during offline duration just by using their mobile devices. The other car-sharing maintenance operations including registration, booking, telematics monitoring, and location tracking can be performed or synchronized whenever the network is back in connection and reachable within the wireless coverage area.
Sensors
The development of the industrial Internet of Things (IIoT) promotes the integration of the cross... more The development of the industrial Internet of Things (IIoT) promotes the integration of the cross-platform systems in fog computing, which enable users to obtain access to multiple application located in different geographical locations. Fog users at the network’s edge communicate with many fog servers in different fogs and newly joined servers that they had never contacted before. This communication complexity brings enormous security challenges and potential vulnerability to malicious threats. The attacker may replace the edge device with a fake one and authenticate it as a legitimate device. Therefore, to prevent unauthorized users from accessing fog servers, we propose a new secure and lightweight multi-factor authentication scheme for cross-platform IoT systems (SELAMAT). The proposed scheme extends the Kerberos workflow and utilizes the AES-ECC algorithm for efficient encryption keys management and secure communication between the edge nodes and fog node servers to establish s...
The Nine Pillars of Technologies for Industry 4.0
Electronics
Several wireless devices and applications can be connected through wireless communication technol... more Several wireless devices and applications can be connected through wireless communication technologies to exchange data in future intelligent health systems (e.g., the Internet of Medical Things (IoMT)). Smart healthcare requires ample bandwidth, reliable and effective communications networks, energy-efficient operations, and quality of service support (QoS). Healthcare service providers host multi-servers to ensure seamless services are provided to the end-users. By supporting a multi-server environment, healthcare medical sensors produce many data transmitted via servers, which is impossible in a single-server architecture. To ensure data security, secure online communication must be considered since the transmitted data are sensitive. Hence, the adversary may try to interrupt the transmission and drop or modify the message. Many researchers have proposed an authentication scheme to secure the data, but the schemes are vulnerable to specific attacks (modification attacks, replay a...
The Cyber-Physical Systems (CPS) are complicated networked systems which compriseof computing and... more The Cyber-Physical Systems (CPS) are complicated networked systems which compriseof computing and communicating cyber components and interact closely with physicalcomponents, such as sensors and actuators. The integration of CPS, on the other hand, presentsadditional threats that might be catastrophic for society. However, this study intends to examinethe efforts of researchers in response to CPS-based current industrial applications ' new andharmful tech, map the literature-based research landscape, and determine the essential features ofthis growing research. This research also examines the desire behind the use of Cyber-physicalsystems in various industrial environments and the Open challenges that negatively affect thistechnology's usefulness. The study of this offers the use of Cyber-Physical System / IndustrialCPS valuable recommendations by designers/developers, researchers, and industries/factories.Finally, the whole study contributes to this field of research by off...
PeerJ Computer Science
In heterogeneous wireless networks, the industrial Internet of Things (IIoT) is an essential cont... more In heterogeneous wireless networks, the industrial Internet of Things (IIoT) is an essential contributor to increasing productivity and effectiveness. However, in various domains, such as industrial wireless scenarios, small cell domains, and vehicular ad hoc networks, an efficient and stable authentication algorithm is required (VANET). Specifically, IoT vehicles deal with vast amounts of data transmitted between VANET entities in different domains in such a large-scale environment. Also, crossing from one territory to another may have the connectivity services down for a while, leading to service interruption because it is pervasive in remote areas and places with multipath obstructions. Hence, it is vulnerable to specific attacks (e.g., replay attacks, modification attacks, man-in-the-middle attacks, and insider attacks), making the system inefficient. Also, high processing data increases the computation and communication cost, leading to an increased workload in the system. Thus...
Machine-type Communication (MTC) is a form of data communication which involves one or more entit... more Machine-type Communication (MTC) is a form of data communication which involves one or more entities that do not necessarily need human interaction, which has become the hotspot in industry area. Furthermore, Machine-Type Communication (MTC) has shown the advantages, including better coverage and lower network deployment cost, which makes it become the hotspot in industry area. However, the current cellular network is designed for human-to-human communication (H2H), and less optimal for machine-to-machine, machine-tohuman or human-to-machine applications. In addition, current cellular network is less optimal for MTC applications, and now facing some urgent issues, e.g. congestion and overload caused by the access of masses of MTC devices. This paper shows the techniques that used in MTC for LTE/LTE-A networks to enhance the authentication protocols with reduce signaling overhead and computational cost. Furthermore, this work discussed the problems that causing signaling overload in ...
Energies
Connected vehicles have emerged as the latest revolution in the automotive industry, utilizing th... more Connected vehicles have emerged as the latest revolution in the automotive industry, utilizing the advent of the Internet of Things (IoT). However, most IoT-connected cars mechanisms currently depend on available network services and need continuous network connections to allow users to connect to their vehicles. Nevertheless, the connectivity availability shortcoming in remote or rural areas with no network coverage makes vehicle sharing or any IoT-connected device problematic and undesirable. Furthermore, IoT-connected cars are vulnerable to various passive and active attacks (e.g., replay attacks, MiTM attacks, impersonation attacks, and offline guessing attacks). Adversaries could all use these attacks to disrupt networks posing a threat to the entire automotive industry. Therefore, to overcome this issue, we propose a hybrid online and offline multi-factor authentication cross-domain authentication method for a connected car-sharing environment based on the user’s smartphone. T...
2020 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE)
Car sharing provides consumers a flexible peer-to-peer service or station service. However, the c... more Car sharing provides consumers a flexible peer-to-peer service or station service. However, the connectivity problems are pervasive in remote areas and places with multi-path obstructions with no clear line-of-sight (LoS). In this scenario, availability of the network can be intermittent and is not always guaranteed, especially for untethered wireless networks consisting of mobile vehicles. A conventional online authentication scheme; therefore, is not an effective solution when it comes to securing the vehicles. Also, the malicious attackers could gain access to the vehicles using a replay of the user signal, that is known as a “replay attack” In order to provide an effective authentication approach, we propose an offline authentication approach based on a Time-based One-time Password (TOTP) algorithm. OTP is chosen due to its protection against the notorious replay attack that is popular against keyless start vehicles. It also utilized an additional security biometric factor to enhance the security of the driver’s authentication. The new proposed scheme is divided into online and offline schemes to provide a secure solution. The novelty is that it can enable the authorized drivers to securely start and operate during offline duration just by using their mobile devices. The other car-sharing maintenance operations including registration, booking, telematics monitoring, and location tracking can be performed or synchronized whenever the network is back in connection and reachable within the wireless coverage area.
Sensors
The development of the industrial Internet of Things (IIoT) promotes the integration of the cross... more The development of the industrial Internet of Things (IIoT) promotes the integration of the cross-platform systems in fog computing, which enable users to obtain access to multiple application located in different geographical locations. Fog users at the network’s edge communicate with many fog servers in different fogs and newly joined servers that they had never contacted before. This communication complexity brings enormous security challenges and potential vulnerability to malicious threats. The attacker may replace the edge device with a fake one and authenticate it as a legitimate device. Therefore, to prevent unauthorized users from accessing fog servers, we propose a new secure and lightweight multi-factor authentication scheme for cross-platform IoT systems (SELAMAT). The proposed scheme extends the Kerberos workflow and utilizes the AES-ECC algorithm for efficient encryption keys management and secure communication between the edge nodes and fog node servers to establish s...
The Nine Pillars of Technologies for Industry 4.0
Electronics
Several wireless devices and applications can be connected through wireless communication technol... more Several wireless devices and applications can be connected through wireless communication technologies to exchange data in future intelligent health systems (e.g., the Internet of Medical Things (IoMT)). Smart healthcare requires ample bandwidth, reliable and effective communications networks, energy-efficient operations, and quality of service support (QoS). Healthcare service providers host multi-servers to ensure seamless services are provided to the end-users. By supporting a multi-server environment, healthcare medical sensors produce many data transmitted via servers, which is impossible in a single-server architecture. To ensure data security, secure online communication must be considered since the transmitted data are sensitive. Hence, the adversary may try to interrupt the transmission and drop or modify the message. Many researchers have proposed an authentication scheme to secure the data, but the schemes are vulnerable to specific attacks (modification attacks, replay a...