This page has only limited features, please log in for full access.
Wearable computing has a great prospect in smart healthcare applications. The emergence of the Internet of Things, Wireless Body Area Networks (WBANs), and big data processing open numerous challenges and opportunities. In healthcare, the monitoring is done by placing/implanting sensor nodes (resource-constrained devices) on a patient’s body to communicate data to a resource-rich node called a sink. The data transmission energy consumption is directly proportional to the distance between the sensor and the sink node. Therefore, it is vital to reduce the energy consumption of the sensor node due to data transmission. In this article, a new Dual Forwarder Selection Technique (DFST) has been proposed to prolong the network lifetime by reducing energy consumption and ultimately improving the stability period and throughput of the network. The DFST works by grouping sensor nodes on a body where both forwarder nodes have been selected through a cost function for relaying data to the sink. The proposed scheme’s efficiency has been evaluated using simulation results in terms of network stability, lifetime, and throughput. Energy consumption of sensor nodes minimized, which, as a result, increased residual network energy. The number of dead nodes of the DFST is about 50% less than that of its counterparts RE-ATTEMPT and iM-SIMPLE. The average throughput of the proposed scheme is 51% and 8% higher than the methods. Similarly, the residual energy of the DFST is approximately 200% and 120% more than iM-SIMPLE and RE-ATTEMPT, respectively.
Haseeb Ur Rahman; Anwar Ghani; Imran Khan; Naved Ahmad; S Vimal; Muhammad Bilal. Improving network efficiency in wireless body area networks using dual forwarder selection technique. Personal and Ubiquitous Computing 2021, 1 -14.
AMA StyleHaseeb Ur Rahman, Anwar Ghani, Imran Khan, Naved Ahmad, S Vimal, Muhammad Bilal. Improving network efficiency in wireless body area networks using dual forwarder selection technique. Personal and Ubiquitous Computing. 2021; ():1-14.
Chicago/Turabian StyleHaseeb Ur Rahman; Anwar Ghani; Imran Khan; Naved Ahmad; S Vimal; Muhammad Bilal. 2021. "Improving network efficiency in wireless body area networks using dual forwarder selection technique." Personal and Ubiquitous Computing , no. : 1-14.
Many Internet of Things (IoT) applications have been developed and implemented on unreliable wireless networks like the delay tolerant network (DTN); however, efficient data transfer in DTN is still an important issue for the IoT applications. One of the application areas of DTN is vehicular delay tolerant network (VDTN) where the network faces communication disruption due to lack of end‐to‐end relay route. It is challenging as some of the nodes show selfish behavior to preserve their resources like memory and energy and become noncooperative. In this article, an honesty‐based democratic scheme (HBDS) is introduced where vehicles with higher honesty level are elected as heads—during the process. Vehicles involved in the process would maximize their rewards (reputation) through active participation in the network activities, whereas vehicles with noncooperative selfish behavior are punished. The honesty level of the heads is analyzed using Vickrey, Clarke, and Groves (VCG) model. The mathematical model and algorithms developed in the proposed HBDS technique are simulated using the VDTNSim framework to evaluate their efficiency. The performance results show that the proposed scheme dominates current schemes in terms of packet delivery probability, packet delivery delay, number of packets drop, and overhead ratio.
Ghani Ur Rehman; Anwar Ghani; Muhammad Zubair; Shahbaz A. K. Ghayyure; Shad Muhammad. Honesty based democratic scheme to improve community cooperation for Internet of Things based vehicular delay tolerant networks. Transactions on Emerging Telecommunications Technologies 2020, 32, 1 .
AMA StyleGhani Ur Rehman, Anwar Ghani, Muhammad Zubair, Shahbaz A. K. Ghayyure, Shad Muhammad. Honesty based democratic scheme to improve community cooperation for Internet of Things based vehicular delay tolerant networks. Transactions on Emerging Telecommunications Technologies. 2020; 32 (1):1.
Chicago/Turabian StyleGhani Ur Rehman; Anwar Ghani; Muhammad Zubair; Shahbaz A. K. Ghayyure; Shad Muhammad. 2020. "Honesty based democratic scheme to improve community cooperation for Internet of Things based vehicular delay tolerant networks." Transactions on Emerging Telecommunications Technologies 32, no. 1: 1.
With limited resources, overutilization is a challenging issue in the emerging system of smart devices, resulting in higher costs, poor performance and low prices due to service level agreement (SLA) violations. These factors extremely annoy the customers as well as providers. External resources are hired to overcome the resources scalability challenges; however, external resources cause higher delay, running time, and transfer cost. The lift in delay explicitly means more cost and more customers dissatisfaction. The delay and transfer cost increases with geographical distance and overutilization. In this article, a mechanism is proposed to make efficient migration decisions to external cloud service providers (CSPs) to minimize the delay, running time, and transfer cost by searching an optimum data center (DC), where the resources may be taken with optimum conditions. The Cloud Analyst is extended to simulate the proposed framework. Results were calculated for three different phenomena, where hiring the resources from underutilized DC decreases the running time to 0.237 ms; however, the response time and transfer cost increases to 499 ms and 0.228 $, respectively; similarly, getting the resources of nearest DC drops the delay time and transfer cost to 80 ms and 0.065 $ respectively; however, the execution time increases to 0.500 ms. The proposed framework optimized the delay time, execution time and transfer cost to 50 ms, 0.237 ms, and 0.065 $, respectively.
Afzal Badshah; Anwar Ghani; Azeem Irshad; Husnain Naqvi; Saru Kumari. Smart workload migration on external cloud service providers to minimize delay, running time, and transfer cost. International Journal of Communication Systems 2020, 34, 1 .
AMA StyleAfzal Badshah, Anwar Ghani, Azeem Irshad, Husnain Naqvi, Saru Kumari. Smart workload migration on external cloud service providers to minimize delay, running time, and transfer cost. International Journal of Communication Systems. 2020; 34 (3):1.
Chicago/Turabian StyleAfzal Badshah; Anwar Ghani; Azeem Irshad; Husnain Naqvi; Saru Kumari. 2020. "Smart workload migration on external cloud service providers to minimize delay, running time, and transfer cost." International Journal of Communication Systems 34, no. 3: 1.
Gestures are one of the basic modes of human communication and are usually used to represent different actions. Automatic recognition of these actions forms the basis for solving more complex problems like human behavior analysis, video surveillance, event detection, and sign language recognition, etc. Action recognition from images is a challenging task as the key information like temporal data, object trajectory, and optical flow are not available in still images. While measuring the size of different regions of the human body i.e., step size, arms span, length of the arm, forearm, and hand, etc., provides valuable clues for identification of the human actions. In this article, a framework for classification of the human actions is presented where humans are detected and localized through faster region-convolutional neural networks followed by morphological image processing techniques. Furthermore, geometric features from human blob are extracted and incorporated into the classification rules for the six human actions i.e., standing, walking, single-hand side wave, single-hand top wave, both hands side wave, and both hands top wave. The performance of the proposed technique has been evaluated using precision, recall, omission error, and commission error. The proposed technique has been comparatively analyzed in terms of overall accuracy with existing approaches showing that it performs well in contrast to its counterparts.
Syed Muhammad Saqlain; Anwar Ghani; Imran Khan; Shahbaz Ahmed Khan Ghayyur; Shahaboddin Shamshirband; Narjes Nabipour; Manouchehr Shokri. Image Analysis Using Human Body Geometry and Size Proportion Science for Action Classification. Applied Sciences 2020, 10, 5453 .
AMA StyleSyed Muhammad Saqlain, Anwar Ghani, Imran Khan, Shahbaz Ahmed Khan Ghayyur, Shahaboddin Shamshirband, Narjes Nabipour, Manouchehr Shokri. Image Analysis Using Human Body Geometry and Size Proportion Science for Action Classification. Applied Sciences. 2020; 10 (16):5453.
Chicago/Turabian StyleSyed Muhammad Saqlain; Anwar Ghani; Imran Khan; Shahbaz Ahmed Khan Ghayyur; Shahaboddin Shamshirband; Narjes Nabipour; Manouchehr Shokri. 2020. "Image Analysis Using Human Body Geometry and Size Proportion Science for Action Classification." Applied Sciences 10, no. 16: 5453.
Smart and connected communities (SCC) is an emerging field of internet of things (IoT), and it has potential applications to improve human life. The improvement may be in terms of preservation, revitalization, livability, and sustainability of a community. The resources of the nodes and devices in the SCC have certain constraints that may not allow the devices and nodes to cooperate to save their resources such as memory, energy, and buffer, or simply maximize their performance. Thus, to stimulate the nodes to avoid selfish behavior, SSC needs a novel and well‐organized solution to motivate nodes for cooperation. This article aims to resolve the issue of selfish behaviors in SCC and to encourage the nodes for cooperation. A novel mechanism, socially omitting selfishness (SOS), has been proposed to manage/eradicate selfishness using a socially oriented election process. The election process elects different heads based on weight and cooperation (using Vickrey, Clarke, and Groves model). The election of heads and incentive mechanism encourages the nodes to show participation and behave as highly cooperative members of the community. Furthermore, an extended version of the Dempster Shafer model has been used to discourage the selfish behavior of the participating nodes in the SOS scheme. It uses different monitoring and gateway nodes to efficiently employ the proposed scheme. A mathematical model has been developed for the aforementioned aspects and simulated through NS2 simulation environment to analyze the performance of SOS. The results of the proposed scheme outperform the contemporary schemes in terms of average delivery delay, packet delivery ratio, throughput, and average energy.
Ghani Ur Rehman; Anwar Ghani; Muhammad Zubair; Muhammad Imran Saeed; Dhananjay Singh. SOS: Socially omitting selfishness in IoT for smart and connected communities. International Journal of Communication Systems 2020, e4455 .
AMA StyleGhani Ur Rehman, Anwar Ghani, Muhammad Zubair, Muhammad Imran Saeed, Dhananjay Singh. SOS: Socially omitting selfishness in IoT for smart and connected communities. International Journal of Communication Systems. 2020; ():e4455.
Chicago/Turabian StyleGhani Ur Rehman; Anwar Ghani; Muhammad Zubair; Muhammad Imran Saeed; Dhananjay Singh. 2020. "SOS: Socially omitting selfishness in IoT for smart and connected communities." International Journal of Communication Systems , no. : e4455.
The advancement in communication and computation technologies has paved a way for connecting large number of heterogeneous devices to offer specified services. Still, the advantages of this advancement are not realized completely due to inherent security issues. Most of the existing authentication mechanisms ensure the legitimacy of requesting user thorough single server leading towards multiple registrations and corresponding credentials storage on user side. Intelligent multimedia networks (IMN) may encompass wide range of networks and applications. However, the privacy and security of IMN cannot be apprehended through traditional multi sign on/single server authentication systems. The multi-server authentication systems can enable a user to acquire services from multiple servers using single registration and with single set of credentials (i.e.Password/smart card etc.) and can be accomplish IMN security and privacy needs. In 2018, Barman et al. proposed a multi-server authentication protocol using fuzzy commitment. The authors claimed that their protocol provides anonymity while resisting all known attacks. In this paper, we analyze that Barman et al.’s protocol is still vulnerable to anonymity violation attack and impersonation based on stolen smart card attack; moreover, it has incomplete login request and is prone to scalability issues. We then propose an enhanced protocol to overcome the security weaknesses of Barman et al.’s scheme. The security of the proposed protocol is verified using BAN logic and widely accepted automated AVISPA tool. The BAN logic and automated AVISPA along with the informal analysis ensure the robustness of the scheme against all known attacks.
Hafeez Ur Rehman; Anwar Ghani; Shehzad Ashraf Chaudhry; Mohammed H. Alsharif; Narjes Nabipour. A secure and improved multi server authentication protocol using fuzzy commitment. Multimedia Tools and Applications 2020, 80, 16907 -16931.
AMA StyleHafeez Ur Rehman, Anwar Ghani, Shehzad Ashraf Chaudhry, Mohammed H. Alsharif, Narjes Nabipour. A secure and improved multi server authentication protocol using fuzzy commitment. Multimedia Tools and Applications. 2020; 80 (11):16907-16931.
Chicago/Turabian StyleHafeez Ur Rehman; Anwar Ghani; Shehzad Ashraf Chaudhry; Mohammed H. Alsharif; Narjes Nabipour. 2020. "A secure and improved multi server authentication protocol using fuzzy commitment." Multimedia Tools and Applications 80, no. 11: 16907-16931.
Cloud Computing facilitates business by storing an enormous amount of data in the cloud transmitted over the Internet with seamless access to the data and no hardware compatibility limitations. However, data during transmission is vulnerable to man in middle, known plain text, chosen cipher text, related key and pollution attack.Therefore,uploading data on a single cloud may increase the risk of damage to the confidential data. Existing literature study uncovered multiple cryptography techniques such as SA-EDS, Reliable Framework for Data Administration (RFDA), Encryption and Splitting Technique (EST) to secure data storage over multi-cloud.However, existing methods are vulnerable to numerous attacks. This article emphasis on data security issues over multi cloud and proposes a Proficient Security over Distributed Storage (PSDS) method.PSDS divides the data is into two categories; normal and sensitive, further more the sensitive data is further divided into two parts. Each part is encrypted and distributed over multi-cloud whereas the normal data is uploaded on a single cloud in encrypted form. At the decryption stage, sensitive data is merged from multi-cloud. The PSDS is tested against multiple attacks and it has been concluded that it is resistant to related key attack, pollution attack, chosen ciphertext attack, and known plain text attack. Furthermore, PSDS has less computational time as compared to the STTN and RFD encryption method.
Fizza Shahid; Humaira Ashraf; Anwar Ghani; Shahbaz Ahmed Khan Ghayyur; Shahaboddin Shamshirband; Ely Salwana. PSDS–Proficient Security Over Distributed Storage: A Method for Data Transmission in Cloud. IEEE Access 2020, 8, 118285 -118298.
AMA StyleFizza Shahid, Humaira Ashraf, Anwar Ghani, Shahbaz Ahmed Khan Ghayyur, Shahaboddin Shamshirband, Ely Salwana. PSDS–Proficient Security Over Distributed Storage: A Method for Data Transmission in Cloud. IEEE Access. 2020; 8 ():118285-118298.
Chicago/Turabian StyleFizza Shahid; Humaira Ashraf; Anwar Ghani; Shahbaz Ahmed Khan Ghayyur; Shahaboddin Shamshirband; Ely Salwana. 2020. "PSDS–Proficient Security Over Distributed Storage: A Method for Data Transmission in Cloud." IEEE Access 8, no. : 118285-118298.
In wireless sensor networks, the sensors transfer data through radio signals to a remote base station. Sensor nodes are used to sense environmental conditions such as temperature, strain, humidity, sound, vibration, and position. Data security is a major issue in wireless sensor networks since data travel over the naturally exposed wireless channel where malicious attackers may get access to critical information. The sensors in wireless sensor networks are resource-constrained devices whereas the existing data security approaches have complex security mechanisms with high computational and response times affecting the network lifetime. Furthermore, existing systems, such as secure efficient encryption algorithm, use the Diffie–Hellman approach for key generation and exchange; however, Diffie–Hellman is highly vulnerable to the man-in-the-middle attack. This article introduces a data security approach with less computational and response times based on a modified version of Diffie–Hellman. The Diffie–Hellman has been modified to secure it against attacks by generating a hash of each value that is transmitted over the network. The proposed approach has been analyzed for security against various attacks. Furthermore, it has also been analyzed in terms of encryption/decryption time, computation time, and key generation time for different sizes of data. The comparative analysis with the existing approaches shows that the proposed approach performs better in most of the cases.
Shahwar Ali; A Humaria; M Sher Ramzan; Imran Khan; Syed M Saqlain; Anwar Ghani; J Zakia; Bander A Alzahrani. An efficient cryptographic technique using modified Diffie–Hellman in wireless sensor networks. International Journal of Distributed Sensor Networks 2020, 16, 1 .
AMA StyleShahwar Ali, A Humaria, M Sher Ramzan, Imran Khan, Syed M Saqlain, Anwar Ghani, J Zakia, Bander A Alzahrani. An efficient cryptographic technique using modified Diffie–Hellman in wireless sensor networks. International Journal of Distributed Sensor Networks. 2020; 16 (6):1.
Chicago/Turabian StyleShahwar Ali; A Humaria; M Sher Ramzan; Imran Khan; Syed M Saqlain; Anwar Ghani; J Zakia; Bander A Alzahrani. 2020. "An efficient cryptographic technique using modified Diffie–Hellman in wireless sensor networks." International Journal of Distributed Sensor Networks 16, no. 6: 1.
A community is sub-network inside P2P networks that partition the network into groups of similar peers to improve performance by reducing network traffic and high search query success rate. Large communities are common in online social networks than traditional file-sharing P2P networks because many people capture huge amounts of data through their lives. This increases the number of hosts bearing similar data in the network and hence increases the size of communities. This article presents a Memory Thread-based Communities for our Entity-based social P2P network that partition the network into groups of peers sharing data belonging to an entity–person, place, object or interest, having its own digital memory or be a part another memory. These connected peers having further similarities by organizing the network using linear orderings. A Memory-Thread is the collection of digital memories having a common reference key and organized according to some form of correlation. The simulation results show an increase in network performance for the proposed scheme along with a decrease in network overhead and higher query success rate compared to other similar schemes. The network maintains its performance even while the network traffic and size increase.
Haseeb Ur Rahman; Madjid Merabti; David Llewellyn-Jones; Sud Sudirman; Anwar Ghani. Structuring communities for sharing human digital memories in a social P2P network. Peer-to-Peer Networking and Applications 2020, 13, 1629 -1642.
AMA StyleHaseeb Ur Rahman, Madjid Merabti, David Llewellyn-Jones, Sud Sudirman, Anwar Ghani. Structuring communities for sharing human digital memories in a social P2P network. Peer-to-Peer Networking and Applications. 2020; 13 (5):1629-1642.
Chicago/Turabian StyleHaseeb Ur Rahman; Madjid Merabti; David Llewellyn-Jones; Sud Sudirman; Anwar Ghani. 2020. "Structuring communities for sharing human digital memories in a social P2P network." Peer-to-Peer Networking and Applications 13, no. 5: 1629-1642.
Various operational communication models are using Delay-Tolerant Network as a communication tool in recent times. In such a communication paradigm, sometimes there are disconnections and interferences as well as high delays like vehicle Ad hoc networks (VANETs). A new research mechanism, namely, the vehicle Delay-tolerant network (VDTN), is introduced due to several similar characteristics. The store-carry-forward mechanism in VDTNs is beneficial in forwarding the messages to the destination without end-to-end connectivity. To accomplish this task, the cooperation of nodes is needed to forward messages to the destination. However, we cannot be sure that all the nodes in the network will cooperate and contribute their computing resources for message forwarding without any reward. Furthermore, there are some selfish nodes in the network which may not cooperate to forward the messages, and are inclined to increase their own resources. This is one of the major challenges in VDTNs and incentive mechanisms are used as a major solution. This paper presents a detailed study of the recently proposed incentive schemes for VDTNs. This paper also gives some open challenges and future directions for interested researchers in the future.
Ghani-Ur Rehman; Anwar Ghani; Shad Muhammad; Madhusudan Singh; Dhananjay Singh. Selfishness in Vehicular Delay-Tolerant Networks: A Review. Sensors 2020, 20, 3000 .
AMA StyleGhani-Ur Rehman, Anwar Ghani, Shad Muhammad, Madhusudan Singh, Dhananjay Singh. Selfishness in Vehicular Delay-Tolerant Networks: A Review. Sensors. 2020; 20 (10):3000.
Chicago/Turabian StyleGhani-Ur Rehman; Anwar Ghani; Shad Muhammad; Madhusudan Singh; Dhananjay Singh. 2020. "Selfishness in Vehicular Delay-Tolerant Networks: A Review." Sensors 20, no. 10: 3000.
Finding rising stars (FRS) is a hot research topic investigated recently for diverse application domains. These days, people are more interested in finding people who will become experts shortly to fill junior positions than finding existing experts who can immediately fill senior positions. FRS can increase productivity wherever they join due to their vibrant and energetic behavior. In this paper, we assess the methods to find FRS. The existing methods are classified into ranking-, prediction-, clustering-, and analysis-based methods, and the pros and cons of these methods are discussed. Details of standard datasets and performance-evaluation measures are also provided for this growing area of research. We conclude by discussing open challenges and future directions in this prosperous area of research.
Ali Daud; Min Song; Malik Khizar Hayat; Tehmina Amjad; Rabeeh Ayaz Abbasi; Hassan Dawood; Anwar Ghani. Finding rising stars in bibliometric networks. Scientometrics 2020, 124, 633 -661.
AMA StyleAli Daud, Min Song, Malik Khizar Hayat, Tehmina Amjad, Rabeeh Ayaz Abbasi, Hassan Dawood, Anwar Ghani. Finding rising stars in bibliometric networks. Scientometrics. 2020; 124 (1):633-661.
Chicago/Turabian StyleAli Daud; Min Song; Malik Khizar Hayat; Tehmina Amjad; Rabeeh Ayaz Abbasi; Hassan Dawood; Anwar Ghani. 2020. "Finding rising stars in bibliometric networks." Scientometrics 124, no. 1: 633-661.
For inter and intra cluster communication, member nodes jointly build a mutual session key called cluster key to allow secure communication. Most existing schemes for cluster key management use messages exchange among the member nodes...
Eid Rehman; Muhammad Sher; Syed Husnain Abass Naqvi; Anwar Ghani. Polynomial Based Dynamic Key Management for Secure Cluster Communication in Wireless Mobile Sensor Network. Tehnicki vjesnik - Technical Gazette 2020, 27, 358 -367.
AMA StyleEid Rehman, Muhammad Sher, Syed Husnain Abass Naqvi, Anwar Ghani. Polynomial Based Dynamic Key Management for Secure Cluster Communication in Wireless Mobile Sensor Network. Tehnicki vjesnik - Technical Gazette. 2020; 27 (2):358-367.
Chicago/Turabian StyleEid Rehman; Muhammad Sher; Syed Husnain Abass Naqvi; Anwar Ghani. 2020. "Polynomial Based Dynamic Key Management for Secure Cluster Communication in Wireless Mobile Sensor Network." Tehnicki vjesnik - Technical Gazette 27, no. 2: 358-367.
Wireless Healthcare Sensor Network (WHSN) has become one of the major research fields over the past decades that play a very prominent role in the medical field. Due to the rapid growth of technology in wireless communication, different security challenges have been raised in WHSN. Authentication protocols are used to secure the information transferred over the public channels by WHSN. For this prospect recently, Liu & Chung proposed an authentication and data transmission mechanism for WHSN. However, Challa et al. identified that Liu-Chung’s scheme is vulnerable to stolen smart-card, offline password guessing, privileged insider, and user impersonation attacks. Challa et al. then proposed an enhanced scheme to overcome beforehand stated flaws. This paper denotes out that in accession to before mentioned attacks, Liu-Chung’s scheme is also prone to users’ private key leakage and user impersonation attacks towards sensors. Moreover, Challa et al.’s scheme suffers from incorrectness, broadcasting problem, lack of authentication between Trusted Authority (TA) and sensor nodes, replay attack, Denial of Service (DoS) attack, forgery attack and delay in communication due to the involvement of the TA. Using the elliptic curve cryptography and bilinear paring, an improved scheme is proposed in this paper, to mitigate the weaknesses of Challah et al. and Liu-Chang schemes. The formal security analysis using simulation tool AVISPA and BAN logic demonstrate that the proposed scheme is secure. The rigorous informal security analysis also attests that our scheme is safe against well-known attacks.
Zeeshan Ali; Anwar Ghani; Imran Khan; Shehzad Ashraf Chaudhry; Sk Hafizul Islam; Debasis Giri. A robust authentication and access control protocol for securing wireless healthcare sensor networks. Journal of Information Security and Applications 2020, 52, 102502 .
AMA StyleZeeshan Ali, Anwar Ghani, Imran Khan, Shehzad Ashraf Chaudhry, Sk Hafizul Islam, Debasis Giri. A robust authentication and access control protocol for securing wireless healthcare sensor networks. Journal of Information Security and Applications. 2020; 52 ():102502.
Chicago/Turabian StyleZeeshan Ali; Anwar Ghani; Imran Khan; Shehzad Ashraf Chaudhry; Sk Hafizul Islam; Debasis Giri. 2020. "A robust authentication and access control protocol for securing wireless healthcare sensor networks." Journal of Information Security and Applications 52, no. : 102502.
Cost, performance, and penalties are the key factors to revenue generation and customer satisfaction. They have a complex correlation, that gets more complicated when missing a proper framework that unambiguously defines these factors. Service-level agreement (SLA) is the initial document discussing selected parameters as a precondition to business initialisation. The clear definition and application of the SLA is of paramount importance as for modern as a Service online businesses no direct communication between provider and consumer is expected. For the proper implementation of SLA, there should be a satisfactory approach for measuring and monitoring quality of service metrics. This study investigated these issues and proposed performance-based SLA (PerSLA) framework for cost, performance, penalties and revenue optimisation. PerSLA optimises these parameters and maximises both provider revenue and customers satisfaction. Simulation results confirm that the proposed framework is adequate in revenue generation and customers satisfaction. Customers and providers monitor the business with respect to agreed terms and conditions. On violation, the provider is penalised. This agreement increases the trust in relationship between provider and consumer.
Afzal Badshah; Anwar Ghani; Shahaboddin Shamshirband; Giuseppe Aceto; Antonio Pescapè. Performance‐based service‐level agreement in cloud computing to optimise penalties and revenue. IET Communications 2020, 14, 1102 -1112.
AMA StyleAfzal Badshah, Anwar Ghani, Shahaboddin Shamshirband, Giuseppe Aceto, Antonio Pescapè. Performance‐based service‐level agreement in cloud computing to optimise penalties and revenue. IET Communications. 2020; 14 (7):1102-1112.
Chicago/Turabian StyleAfzal Badshah; Anwar Ghani; Shahaboddin Shamshirband; Giuseppe Aceto; Antonio Pescapè. 2020. "Performance‐based service‐level agreement in cloud computing to optimise penalties and revenue." IET Communications 14, no. 7: 1102-1112.
Social peer‐to‐peer (P2P) networks are usually designed by reflecting a user's interest/behavior for structuring the underlying network. Human interest is affected by various factors such as age, locality, and so on which changes after some time. The behavior when reflected in a network, results in peers moving within the network in order to connect the peer with peers of the same behavior/interest. Especially in community‐based schemes when a peer leaves a community the data that a peer was sharing will not be accessible in the same community anymore. It has an effect on the performance of the network due to the inaccessibility of data and the unavailability of connections, which affect network robustness. We address this issue by considering entities in data in the form of digital memories of a user and structuring network according to entity‐based communities. The simulation results for the proposed entity‐based community are demonstrated, which shows the effect on network performance during varying network size and traffic.
Haseeb Ur Rahman; Madjid Merabti; David Llewellyn‐Jones; Sud Sudirman; Anwar Ghani. A community‐based social P2P network for sharing human life digital memories. Transactions on Emerging Telecommunications Technologies 2020, 31, 1 .
AMA StyleHaseeb Ur Rahman, Madjid Merabti, David Llewellyn‐Jones, Sud Sudirman, Anwar Ghani. A community‐based social P2P network for sharing human life digital memories. Transactions on Emerging Telecommunications Technologies. 2020; 31 (4):1.
Chicago/Turabian StyleHaseeb Ur Rahman; Madjid Merabti; David Llewellyn‐Jones; Sud Sudirman; Anwar Ghani. 2020. "A community‐based social P2P network for sharing human life digital memories." Transactions on Emerging Telecommunications Technologies 31, no. 4: 1.
In the roaming-user based environment, services to authenticate the legitimate user are on the pinnacle. There are two main challenges carrying with the roaming-user authentication system which are the mobile's real identity that may reveal to an attacker and the traceability issue of mobility information of the user. To avoid such problems, many scientists put their valuable efforts to introduce secure authentication protocols. These protocols are still vulnerable to different attacks. This paper proposes a realistic lightweight authentication scheme for roaming-user, which is secure in terms of mutual communication, user anonymity, user un-traceability, perfect forward secrecy and resistible from all possible attacks. We performed a formal analysis by using ProVerif which concludes that our presented protocol can provide a secure mutual authentication between Foreign-Agent $FA$ , Mobile-Node $MN$ , and Home agent $HA$ in roaming-user based environment.
Malik Muhammad Sohail; Mehmood Hassan; Khwaja Mansoor; Anwar Ghani; Khwaja Jawad. An Improved Authentication Protocol for Global Mobility Network (GLOMONET). 2020 17th International Bhurban Conference on Applied Sciences and Technology (IBCAST) 2020, 401 -406.
AMA StyleMalik Muhammad Sohail, Mehmood Hassan, Khwaja Mansoor, Anwar Ghani, Khwaja Jawad. An Improved Authentication Protocol for Global Mobility Network (GLOMONET). 2020 17th International Bhurban Conference on Applied Sciences and Technology (IBCAST). 2020; ():401-406.
Chicago/Turabian StyleMalik Muhammad Sohail; Mehmood Hassan; Khwaja Mansoor; Anwar Ghani; Khwaja Jawad. 2020. "An Improved Authentication Protocol for Global Mobility Network (GLOMONET)." 2020 17th International Bhurban Conference on Applied Sciences and Technology (IBCAST) , no. : 401-406.
With limited resources, it is quite challenging for cloud providers to meet dynamic and massive customers' demands. Higher utilisation or refusing any service level agreement (SLA) may lead to penalties which play a crucial role in the cloud business. Overutilisation of resources, instead of maximizing the revenue, may lead to a decrease in revenue due to the SLA violations. Various studies have been conducted to investigate these issues; however, there is still room for improvement. In this study, the authors proposed a model to address the resource scalability and SLA violation issues by hiring external resources at low prices. However, in contrast to a federated cloud, the proposed model allows a provider to hire resources from any external provider with flexible terms and price. They designed algorithms to optimise providers' revenue by taking into account different parameters, including resource utilization, customer satisfaction, SLA violation, and prices. Simulation result shows that the proposed model is efficient in handling massive demands, and improves revenue generation and customer satisfaction. Offering joint pricing on customers' choice and outsourcing the extra workload to external resources leads to revenue maximization. Hiring external resources earns external revenue as well as it maximizes the total revenue.
Afzal Badshah; Anwar Ghani; Shahaboddin Shamshirband; Anthony Theodore Chronopoulos. Optimising infrastructure as a service provider revenue through customer satisfaction and efficient resource provisioning in cloud computing. IET Communications 2019, 13, 2913 -2922.
AMA StyleAfzal Badshah, Anwar Ghani, Shahaboddin Shamshirband, Anthony Theodore Chronopoulos. Optimising infrastructure as a service provider revenue through customer satisfaction and efficient resource provisioning in cloud computing. IET Communications. 2019; 13 (18):2913-2922.
Chicago/Turabian StyleAfzal Badshah; Anwar Ghani; Shahaboddin Shamshirband; Anthony Theodore Chronopoulos. 2019. "Optimising infrastructure as a service provider revenue through customer satisfaction and efficient resource provisioning in cloud computing." IET Communications 13, no. 18: 2913-2922.
Despite the many conveniences of Radio Frequency Identification (RFID) systems, the underlying open architecture for communication between the RFID devices may lead to various security threats. Recently, many solutions were proposed to secure RFID systems and many such systems are based on only lightweight primitives, including symmetric encryption, hash functions, and exclusive OR operation. Many solutions based on only lightweight primitives were proved insecure, whereas, due to resource-constrained nature of RFID devices, the public key-based cryptographic solutions are unenviable for RFID systems. Very recently, Gope and Hwang proposed an authentication protocol for RFID systems based on only lightweight primitives and claimed their protocol can withstand all known attacks. However, as per the analysis in this article, their protocol is infeasible and is vulnerable to collision, denial-of-service (DoS), and stolen verifier attacks. This article then presents an improved realistic and lightweight authentication protocol to ensure protection against known attacks. The security of the proposed protocol is formally analyzed using Burrows Abadi-Needham (BAN) logic and under the attack model of automated security verification tool ProVerif. Moreover, the security features are also well analyzed, although informally. The proposed protocol outperforms the competing protocols in terms of security.
Khwaja Mansoor; Anwar Ghani; Shehzad Ashraf Chaudhry; Shahaboddin Shamshirband; Shahbaz Ahmed Khan Ghayyur; Amir Mosavi. Securing IoT-Based RFID Systems: A Robust Authentication Protocol Using Symmetric Cryptography. Sensors 2019, 19, 4752 .
AMA StyleKhwaja Mansoor, Anwar Ghani, Shehzad Ashraf Chaudhry, Shahaboddin Shamshirband, Shahbaz Ahmed Khan Ghayyur, Amir Mosavi. Securing IoT-Based RFID Systems: A Robust Authentication Protocol Using Symmetric Cryptography. Sensors. 2019; 19 (21):4752.
Chicago/Turabian StyleKhwaja Mansoor; Anwar Ghani; Shehzad Ashraf Chaudhry; Shahaboddin Shamshirband; Shahbaz Ahmed Khan Ghayyur; Amir Mosavi. 2019. "Securing IoT-Based RFID Systems: A Robust Authentication Protocol Using Symmetric Cryptography." Sensors 19, no. 21: 4752.
Web content credibility implies finding credible and correct information on the web. Recent studies have shown there is an increasing trend of users turning towards the web for searching information related to a variety of topics including health, stocks, education, politics to name few. Information credibility is a critical factor in these domains for the decision makers. There is no limitation on the authorship of those articles and content. One criterion for evaluating credibility is to check the authority or source of information. However, there are situations when wrong information flows from credible sources. There are various approaches towards credibility assessment, broadly categorized into human-based and computational approaches. Computational approaches utilizing machine learning based techniques are computationally expensive. Reputation based approaches overcome this, however the latest work fails to take into account issue of negative referrals and utilizes simple summation as the calculation structure making it more resilient to attacks. This paper put forth verified hypothesis of direct relationship of credibility to the expertise of entity. Authors proposed a Bayesian based approach using feedback in the form of interaction among the entities to compute their expertise level, thereby showing improved results in terms of Precision, Correlation and Mean Average Error. The experiments are performed on two different datasets, one of the dataset is developed from a survey as the part of the research study. The results from the two experiments show that the reputation ranks are independent of the pattern of ratings and density of data, unlike previous techniques whose results were limited by these factors. The proposed technique gives 27% and 18% more precise results for the two experiments respectively compared to the baseline. The correlation results are also significant in both experiments for the proposed technique with significant values of 0.39 and 0.87 showing a linear relationship between predicted and original data. The paper also discusses the reputation attacks and proposes counter measures to tackle these attacks through simulation results.
Saba Mahmood; Anwar Ghani; Ali Daud; Shahaboddin Shamshirband. Reputation-Based Approach Toward Web Content Credibility Analysis. IEEE Access 2019, 7, 139957 -139969.
AMA StyleSaba Mahmood, Anwar Ghani, Ali Daud, Shahaboddin Shamshirband. Reputation-Based Approach Toward Web Content Credibility Analysis. IEEE Access. 2019; 7 (99):139957-139969.
Chicago/Turabian StyleSaba Mahmood; Anwar Ghani; Ali Daud; Shahaboddin Shamshirband. 2019. "Reputation-Based Approach Toward Web Content Credibility Analysis." IEEE Access 7, no. 99: 139957-139969.
Wireless sensor networks (WSN) consist of hundreds of miniature sensor nodes to sense various events in the surrounding environment and report back to the base station. Sensor networks are at the base of internet of things (IoT) and smart computing applications where a function is performed as a result of sensed event or information. However, in resource‐limited WSN authenticating a remote user is a vital security concern. Recently, researchers put forth various authentication protocols to address different security issues. Gope et al presented a protocol claiming resistance against known attacks. A thorough analysis of their protocol shows that it is vulnerable to user traceability, stolen verifier, and denial of service (DoS) attacks. In this article, an enhanced symmetric key‐based authentication protocol for IoT‐based WSN has been presented. The proposed protocol has the ability to counter user traceability, stolen verifier, and DoS attacks. Furthermore, the proposed protocol has been simulated and verified using Proverif and BAN logic. The proposed protocol has the same communication cost as the baseline protocol; however, in computation cost, it has 52.63% efficiency as compared with the baseline protocol.
Anwar Ghani; Khwaja Mansoor; Shahid Mehmood; Shehzad Ashraf Chaudhry; Arif Ur Rahman; Malik Najmus Saqib. Security and key management in IoT-based wireless sensor networks: An authentication protocol using symmetric key. International Journal of Communication Systems 2019, 32, e4139 .
AMA StyleAnwar Ghani, Khwaja Mansoor, Shahid Mehmood, Shehzad Ashraf Chaudhry, Arif Ur Rahman, Malik Najmus Saqib. Security and key management in IoT-based wireless sensor networks: An authentication protocol using symmetric key. International Journal of Communication Systems. 2019; 32 (16):e4139.
Chicago/Turabian StyleAnwar Ghani; Khwaja Mansoor; Shahid Mehmood; Shehzad Ashraf Chaudhry; Arif Ur Rahman; Malik Najmus Saqib. 2019. "Security and key management in IoT-based wireless sensor networks: An authentication protocol using symmetric key." International Journal of Communication Systems 32, no. 16: e4139.