This page has only limited features, please log in for full access.

Dr. Shehzad Ashraf Chaudhry
Department of Computer Engineering, Faculty of Engineering and Architecture, Istanbul Gelisim University Istanbul, 34310, Turkey

Basic Info

Basic Info is private.

Research Keywords & Expertise

0 Authentication
0 Cryptography
0 Internet of Things
0 Authenticated Encryption
0 Blockchains

Honors and Awards

The user has no records in this section


Career Timeline

The user has no records in this section.


Short Biography

The user biography is not available.
Following
Followers
Co Authors
The list of users this user is following is empty.
Following: 0 users

Feed

Journal article
Published: 16 July 2021 in Digital Communications and Networks
Reads 0
Downloads 0

With the advent of state-of-art technologies, the Telecare Medicine Information System (TMIS) now offers expedite and convenient healthcare services to patients at their doorsteps. However, this architecture engenders new risks and challenges to patients’ and the server’s confidentiality, integrity and security. In order to avoid any resource abuse and malicious attack, employing an authentication scheme is widely considered as the most effective approach for the TMIS to verify the legitimacy of patients and the server. Therefore, several authentication protocols have been proposed to this end. Very recently, Chaudhry et al. identified that there are vulnerabilities of impersonation attacks in Islam et al’s scheme. Therefore, they introduced an improved protocol to mitigate those security flaws. Later, Qiu et al. proved that these schemes are vulnerable to the man-in-the-middle, impersonation and offline password guessing attacks. Thus, they introduced an improved scheme based on the fuzzy verifier techniques, which overcome all the security flaws of Chaudhry et al.’s scheme. However, there are still some security flaws in Qiu et al.’s protocol. In this article, we prove that Qiu et al.’s protocol has an incorrect notion of perfect user anonymity and is vulnerable to user impersonation attacks. Therefore, we introduce an improved protocol for authentication, which reduces all the security flaws of Qiu et al.’s protocol. We also make a comparison of our protocol with related protocols, which shows that our introduced protocol is more secure and efficient than previous protocols.

ACS Style

Salman Shamshad; Muhammad Faizan Ayub; Khalid Mahmood; Saru Kumari; Shehzad Ashraf Chaudhry; Chien-Ming Chen. An enhanced scheme for mutual authentication for healthcare services. Digital Communications and Networks 2021, 1 .

AMA Style

Salman Shamshad, Muhammad Faizan Ayub, Khalid Mahmood, Saru Kumari, Shehzad Ashraf Chaudhry, Chien-Ming Chen. An enhanced scheme for mutual authentication for healthcare services. Digital Communications and Networks. 2021; ():1.

Chicago/Turabian Style

Salman Shamshad; Muhammad Faizan Ayub; Khalid Mahmood; Saru Kumari; Shehzad Ashraf Chaudhry; Chien-Ming Chen. 2021. "An enhanced scheme for mutual authentication for healthcare services." Digital Communications and Networks , no. : 1.

Journal article
Published: 09 June 2021 in ACM Transactions on Internet Technology
Reads 0
Downloads 0

The advancements in the internet of things (IoT) require specialized security protocols to provide unbreakable security along with computation and communication efficiencies. Moreover, user privacy and anonymity has emerged as an integral part, along with other security requirements. Unfortunately, many recent authentication schemes to secure IoT-based systems were either proved as vulnerable to different attacks or prey of inefficiencies. Some of these schemes suffer from a faulty design that happened mainly owing to undue emphasis on privacy and anonymity alongside performance efficiency. This article aims to show the design faults by analyzing a very recent hash functions-based authentication scheme for cloud-based IoT systems with misunderstood privacy cum efficiency tradeoff owing to an unadorned design flaw, which is also present in many other such schemes. Precisely, it is proved in this article that the scheme of Wazid et al. cannot provide mutual authentication and key agreement between a user and a sensor node when there exists more than one registered user. We then proposed an improved scheme and proved its security through formal and informal methods. The proposed scheme completes the authentication cycle with a minor increase in computation cost but provides all security goals along with privacy.

ACS Style

Shehzad Ashraf Chaudhry; Azeem Irshad; Khalid Yahya; Neeraj Kumar; Mamoun Alazab; Yousaf Bin Zikria. Rotating behind Privacy: An Improved Lightweight Authentication Scheme for Cloud-based IoT Environment. ACM Transactions on Internet Technology 2021, 21, 1 -19.

AMA Style

Shehzad Ashraf Chaudhry, Azeem Irshad, Khalid Yahya, Neeraj Kumar, Mamoun Alazab, Yousaf Bin Zikria. Rotating behind Privacy: An Improved Lightweight Authentication Scheme for Cloud-based IoT Environment. ACM Transactions on Internet Technology. 2021; 21 (3):1-19.

Chicago/Turabian Style

Shehzad Ashraf Chaudhry; Azeem Irshad; Khalid Yahya; Neeraj Kumar; Mamoun Alazab; Yousaf Bin Zikria. 2021. "Rotating behind Privacy: An Improved Lightweight Authentication Scheme for Cloud-based IoT Environment." ACM Transactions on Internet Technology 21, no. 3: 1-19.

Research article
Published: 28 May 2021 in Security and Communication Networks
Reads 0
Downloads 0

The heterogeneous resource-required application tasks increase the cloud service provider (CSP) energy cost and revenue by providing demand resources. Enhancing CSP profit and preserving energy cost is a challenging task. Most of the existing approaches consider task deadline violation rate rather than performance cost and server size ratio during profit estimation, which impacts CSP revenue and causes high service cost. To address this issue, we develop two algorithms for profit maximization and adequate service reliability. First, a belief propagation-influenced cost-aware asset scheduling approach is derived based on the data analytic weight measurement (DAWM) model for effective performance and server size optimization. Second, the multiobjective heuristic user service demand (MHUSD) approach is formulated based on the CPS profit estimation model and the user service demand (USD) model with dynamic acyclic graph (DAG) phenomena for adequate service reliability. The DAWM model classifies prominent servers to preserve the server resource usage and cost during an effective resource slicing process by considering each machine execution factor (remaining energy, energy and service cost, workload execution rate, service deadline violation rate, cloud server configuration (CSC), service requirement rate, and service level agreement violation (SLAV) penalty rate). The MHUSD algorithm measures the user demand service rate and cost based on the USD and CSP profit estimation models by considering service demand weight, tenant cost, and energy cost. The simulation results show that the proposed system has accomplished the average revenue gain of 35%, cost of 51%, and profit of 39% than the state-of-the-art approaches.

ACS Style

M. S. Mekala; Rizwan Patan; Sk Hafizul Islam; Debabrata Samanta; Ghulam Ali Mallah; Shehzad Ashraf Chaudhry. DAWM: Cost-Aware Asset Claim Analysis Approach on Big Data Analytic Computation Model for Cloud Data Centre. Security and Communication Networks 2021, 2021, 1 -16.

AMA Style

M. S. Mekala, Rizwan Patan, Sk Hafizul Islam, Debabrata Samanta, Ghulam Ali Mallah, Shehzad Ashraf Chaudhry. DAWM: Cost-Aware Asset Claim Analysis Approach on Big Data Analytic Computation Model for Cloud Data Centre. Security and Communication Networks. 2021; 2021 ():1-16.

Chicago/Turabian Style

M. S. Mekala; Rizwan Patan; Sk Hafizul Islam; Debabrata Samanta; Ghulam Ali Mallah; Shehzad Ashraf Chaudhry. 2021. "DAWM: Cost-Aware Asset Claim Analysis Approach on Big Data Analytic Computation Model for Cloud Data Centre." Security and Communication Networks 2021, no. : 1-16.

Research article
Published: 19 May 2021 in Security and Communication Networks
Reads 0
Downloads 0

In the advancements in computation and communication technologies and increasing number of vehicles, the concept of Internet of Vehicles (IoV) has emerged as an integral part of daily life, and it can be used to acquire vehicle related information including road congestion, road description, vehicle location, and speed. Such information is very vital and can benefit in a variety of ways, including route selection. However, without proper security measures, the information transmission among entities of IoV can be exposed and used for wicked intentions. Recently, many authentication schemes were proposed, but most of those authentication schemes are prone to insecurities or suffer from heavy communication and computation costs. Therefore, a secure message authentication protocol is proposed in this study for information exchange among entities of IoV (SMEP-IoV). Based on secure symmetric lightweight hash functions and encryption operations, the proposed SMEP-IoV meets IoV security and performance requirements. For formal security analysis of the proposed SMEP-IoV, BAN logic is used. The performance comparisons show that the SMEP-IoV is lightweight and completes the authentication process in just 0.198 ms .

ACS Style

Shehzad Ashraf Chaudhry. Designing an Efficient and Secure Message Exchange Protocol for Internet of Vehicles. Security and Communication Networks 2021, 2021, 1 -9.

AMA Style

Shehzad Ashraf Chaudhry. Designing an Efficient and Secure Message Exchange Protocol for Internet of Vehicles. Security and Communication Networks. 2021; 2021 ():1-9.

Chicago/Turabian Style

Shehzad Ashraf Chaudhry. 2021. "Designing an Efficient and Secure Message Exchange Protocol for Internet of Vehicles." Security and Communication Networks 2021, no. : 1-9.

Conference paper
Published: 04 March 2021 in Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Reads 0
Downloads 0

The exponential growth in the number of Internet of Things (IoT) devices, the sensitive nature of data they produce, and the simple nature of these devices makes IoT systems vulnerable to a wide range cyber-threats. Physical attacks are one of the major concerns for IoT device security. Security solutions for the IoT have to be accurate and quick since many real time applications depend on the data generated by these devices. In this article, we undertake the IoT authentication problem by proposing a fast protocol RapidAuth, which also restricts physical attacks. The proposed protocol uses Physical Unclonable Functions to achieve the security goals and requires the exchange of only two messages between the server and an IoT device. The analysis of RapidAuth proves its’ robustness against various types of attacks as well as its’ efficiency in terms of computation, communication, memory overheads and energy consumption.

ACS Style

Muhammad Naveed Aman; Shehzad Ashraf Chaudhry; Fadi Al-Turjman. RapidAuth: Fast Authentication for Sustainable IoT. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2021, 82 -95.

AMA Style

Muhammad Naveed Aman, Shehzad Ashraf Chaudhry, Fadi Al-Turjman. RapidAuth: Fast Authentication for Sustainable IoT. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. 2021; ():82-95.

Chicago/Turabian Style

Muhammad Naveed Aman; Shehzad Ashraf Chaudhry; Fadi Al-Turjman. 2021. "RapidAuth: Fast Authentication for Sustainable IoT." Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering , no. : 82-95.

Comment
Published: 23 February 2021 in IET Networks
Reads 0
Downloads 0

This comment is presented to identify the drawbacks in a recently demonstrated scheme by Maitra et al., SAS‐Cloud: doi:10.1049/iet-net.2019.0004, which adopted an ElGamal cryptosystem‐based technique for biometric authentication in cloud‐based IoT applications. In this protocol, the authors claim that their scheme provides mutual authentication. However, it is demonstrated in this article that the protocol merely supports unilateral authentication, which may result in clogging attack on the server's end. This is because the latter is unable to verify the authentication request in absolute terms, which might lead to resource clogging as well as denial of service attack affecting its Quality of Service (QoS).

ACS Style

Azeem Irshad; Shehzad Ashraf Chaudhry. Comment on ‘ElGamal cryptosystem‐based secure authentication system for cloud‐based IoT applications’. IET Networks 2021, 1 .

AMA Style

Azeem Irshad, Shehzad Ashraf Chaudhry. Comment on ‘ElGamal cryptosystem‐based secure authentication system for cloud‐based IoT applications’. IET Networks. 2021; ():1.

Chicago/Turabian Style

Azeem Irshad; Shehzad Ashraf Chaudhry. 2021. "Comment on ‘ElGamal cryptosystem‐based secure authentication system for cloud‐based IoT applications’." IET Networks , no. : 1.

Comment
Published: 11 November 2020 in IET Intelligent Transport Systems
Reads 0
Downloads 0
ACS Style

Azeem Irshad; Shehzad Ashraf Chaudhry. Further comments on ‘SFVCC: Chaotic map‐based security framework for vehicular cloud computing’. IET Intelligent Transport Systems 2020, 14, 1725 -1725.

AMA Style

Azeem Irshad, Shehzad Ashraf Chaudhry. Further comments on ‘SFVCC: Chaotic map‐based security framework for vehicular cloud computing’. IET Intelligent Transport Systems. 2020; 14 (12):1725-1725.

Chicago/Turabian Style

Azeem Irshad; Shehzad Ashraf Chaudhry. 2020. "Further comments on ‘SFVCC: Chaotic map‐based security framework for vehicular cloud computing’." IET Intelligent Transport Systems 14, no. 12: 1725-1725.

Original research
Published: 17 September 2020 in Journal of Ambient Intelligence and Humanized Computing
Reads 0
Downloads 0

In 2019, Banerjee et al. (IEEE Int Things J 6(5):8739–8752, 2019; https://doi.org/10.1109/JIOT.2019.2931372) proposed an authenticated key agreement scheme to facilitate the session establishment resulting into a session key between a user and a smart device for IoT based networks. As per their claim, the scheme of Banerjee et al. provides known security features and resist all known attacks using only lightweight symmetric key primitives. The analysis in this paper; however, shows that the scheme of Banerjee et al. cannot complete normally. The user in their scheme, after sending a request message may never receive the response from smart device. This incorrectness results into total in applicability of Banerjee et al.’s scheme. Moreover, it is also shown that their scheme has weaknesses against stolen verifier attack. Then an improved lightweight authentication scheme for IoT deployments (ILAS-IoT) is proposed in this article. ILAS-IoT performs the process correctly by increasing very little computation and communication overheads. The proposed ILAS-IoT also resists stolen verifier and all known attacks, which is evident from the formal and informal security analysis.

ACS Style

Bander A. Alzahrani; Shehzad Ashraf Chaudhry; Ahmed Barnawi; Wenjing Xiao; Min Chen; Abdullah Al-Barakati. ILAS-IoT: An improved and lightweight authentication scheme for IoT deployment. Journal of Ambient Intelligence and Humanized Computing 2020, 1 -13.

AMA Style

Bander A. Alzahrani, Shehzad Ashraf Chaudhry, Ahmed Barnawi, Wenjing Xiao, Min Chen, Abdullah Al-Barakati. ILAS-IoT: An improved and lightweight authentication scheme for IoT deployment. Journal of Ambient Intelligence and Humanized Computing. 2020; ():1-13.

Chicago/Turabian Style

Bander A. Alzahrani; Shehzad Ashraf Chaudhry; Ahmed Barnawi; Wenjing Xiao; Min Chen; Abdullah Al-Barakati. 2020. "ILAS-IoT: An improved and lightweight authentication scheme for IoT deployment." Journal of Ambient Intelligence and Humanized Computing , no. : 1-13.

Journal article
Published: 01 August 2020 in International Journal of Electrical and Computer Engineering (IJECE)
Reads 0
Downloads 0

This paper evaluates the impact of multi-5G small cell systems on the energy efficiency (EE) in a Fifth Generation (5G) of cellular networks. Both the proposed model and the analysis of the EE in this study take into account (i) the path losses, fading, and shadowing that affect the received signal at the user equipment (UE) within the same cell, and (ii) the interference effects of adjacent cells. In addition, the concepts of new technologies such as large MIMO in millimeter range communication have also been considered. The simulation results show that the interference from adjacent cells can degrade the EE of a multi-cell cellular network. With the high interference the number of bits that will be transferred per joule of energy is 1.29 Mb/J with a 0.25 GHz bandwidth and 16 transmit antennas. While, with a 1 GHz bandwidth the transfer rate increases to 5.17 Mb/J. Whereas, with 64 transmit antennas the EE improved to 5.17 Mb/J with a 0.25 GHz BW and 20.70 Mb/J with a 1 GHz BW. These results provide insight into the impact of the number of antennas in millimeter range communication and the interference from adjacent cells on achieving real gains in the EE of multi-5G small cells cellular network.

ACS Style

Mohammed H. Alsharif; Khalid Yahya; Shehzad Ashraf Chaudhry. Analyzing and evaluating the energy efficiency based on multi-5G small cells with a mm-waves in the next generation cellular networks. International Journal of Electrical and Computer Engineering (IJECE) 2020, 10, 3492 -3500.

AMA Style

Mohammed H. Alsharif, Khalid Yahya, Shehzad Ashraf Chaudhry. Analyzing and evaluating the energy efficiency based on multi-5G small cells with a mm-waves in the next generation cellular networks. International Journal of Electrical and Computer Engineering (IJECE). 2020; 10 (4):3492-3500.

Chicago/Turabian Style

Mohammed H. Alsharif; Khalid Yahya; Shehzad Ashraf Chaudhry. 2020. "Analyzing and evaluating the energy efficiency based on multi-5G small cells with a mm-waves in the next generation cellular networks." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 4: 3492-3500.

Journal article
Published: 27 July 2020 in IEEE Access
Reads 0
Downloads 0

Among other security concerns, the reliable device to device direct communication is an important research aspect in sensor cloud system application of Internet of things (IoT). The access control mechanism can ensure the reliability through secure communication among two IoT devices without mediation of intermediate agent. Mainly, it requires twofold strategy involving the authentication of each other and session key establishment. Quite recently, in 2019, Das et al. proposed a certificate based lightweight access control and key agreement scheme for IoT devices (LACKA-IoT) to ensure smooth and secure access control and claimed LACKA-IoT to withstand the several attacks. Specifically, it is claimed that LACKA-IoT can resist device impersonation and man in middle attacks. However, the proof in this article refutes their claim and it is shown here, that LACKA-IoT is insecure against both device impersonation and man in middle attacks. An adversary just by using public parameters and by listening the communication channel can impersonate any device. Moreover, the same can also launch successful man in middle attack using public parameters and listened messages from public channel. An improved protocol iLACKA-IoT is then proposed in the paper. The iLACKA-IoT provides resistance against various types of threats and provides the required level of security, for evidence both formal validation through random or real (ROR) model as well as the informal validation through discussion on attack resilience is provided. The iLACKA-IoT is not only better in security but also provides performance efficiency as compared with LACKA-IoT and related schemes.

ACS Style

Shehzad Ashraf Chaudhry; Khalid Yahya; Fadi Al-Turjman; Ming-Hour Yang. A Secure and Reliable Device Access Control Scheme for IoT Based Sensor Cloud Systems. IEEE Access 2020, 8, 139244 -139254.

AMA Style

Shehzad Ashraf Chaudhry, Khalid Yahya, Fadi Al-Turjman, Ming-Hour Yang. A Secure and Reliable Device Access Control Scheme for IoT Based Sensor Cloud Systems. IEEE Access. 2020; 8 (99):139244-139254.

Chicago/Turabian Style

Shehzad Ashraf Chaudhry; Khalid Yahya; Fadi Al-Turjman; Ming-Hour Yang. 2020. "A Secure and Reliable Device Access Control Scheme for IoT Based Sensor Cloud Systems." IEEE Access 8, no. 99: 139244-139254.

Article
Published: 01 July 2020 in Multimedia Tools and Applications
Reads 0
Downloads 0

The advancement in communication and computation technologies has paved a way for connecting large number of heterogeneous devices to offer specified services. Still, the advantages of this advancement are not realized completely due to inherent security issues. Most of the existing authentication mechanisms ensure the legitimacy of requesting user thorough single server leading towards multiple registrations and corresponding credentials storage on user side. Intelligent multimedia networks (IMN) may encompass wide range of networks and applications. However, the privacy and security of IMN cannot be apprehended through traditional multi sign on/single server authentication systems. The multi-server authentication systems can enable a user to acquire services from multiple servers using single registration and with single set of credentials (i.e.Password/smart card etc.) and can be accomplish IMN security and privacy needs. In 2018, Barman et al. proposed a multi-server authentication protocol using fuzzy commitment. The authors claimed that their protocol provides anonymity while resisting all known attacks. In this paper, we analyze that Barman et al.’s protocol is still vulnerable to anonymity violation attack and impersonation based on stolen smart card attack; moreover, it has incomplete login request and is prone to scalability issues. We then propose an enhanced protocol to overcome the security weaknesses of Barman et al.’s scheme. The security of the proposed protocol is verified using BAN logic and widely accepted automated AVISPA tool. The BAN logic and automated AVISPA along with the informal analysis ensure the robustness of the scheme against all known attacks.

ACS Style

Hafeez Ur Rehman; Anwar Ghani; Shehzad Ashraf Chaudhry; Mohammed H. Alsharif; Narjes Nabipour. A secure and improved multi server authentication protocol using fuzzy commitment. Multimedia Tools and Applications 2020, 80, 16907 -16931.

AMA Style

Hafeez Ur Rehman, Anwar Ghani, Shehzad Ashraf Chaudhry, Mohammed H. Alsharif, Narjes Nabipour. A secure and improved multi server authentication protocol using fuzzy commitment. Multimedia Tools and Applications. 2020; 80 (11):16907-16931.

Chicago/Turabian Style

Hafeez Ur Rehman; Anwar Ghani; Shehzad Ashraf Chaudhry; Mohammed H. Alsharif; Narjes Nabipour. 2020. "A secure and improved multi server authentication protocol using fuzzy commitment." Multimedia Tools and Applications 80, no. 11: 16907-16931.

Journal article
Published: 10 June 2020 in IEEE Access
Reads 0
Downloads 0

A variety of three-factor smart-card based schemes, specifically designed for telecare medicine information systems (TMIS) are available for remote user authentication. Most of the existing schemes for TMIS are customarily proposed for the single server-based environments and in a single-server environment. Therefore, there is a need for patients to distinctly register and login with each server to employ distinct services, so it escalates the overhead of keeping the cards and memorizing the passwords for the users. Whereas, in a multi-server environment, users only need to register once to resort various services for exploiting the benefits of a multi-server environment. Recently, Barman et al. proposed an authentication scheme for e-healthcare by employing a fuzzy commitment and asserted that the scheme can endure many known attacks. Nevertheless, after careful analysis, this paper presents the shortcoming related to its design. Furthermore, it proves that the scheme of Barman et al. is prone to many attacks including: server impersonation, session-key leakage, user impersonation, secret temporary parameter leakage attacks as well as its lacks user anonymity. Moreover, their scheme has the scalability issue. In order to mitigate the aforementioned issues, this work proposes an amended three-factor symmetric-key based secure authentication and key agreement scheme for multi-server environments (ITSSAKA-MS). The security of ITSSAKA-MS is proved formally under automated tool AVISPA along with a security feature discussion. Although, the proposed scheme requisites additional communication and computation costs. In contrast, the informal and automated formal security analysis indicate that only proposed scheme withstands several known attacks as compared to recent benchmark schemes.

ACS Style

Zeeshan Ali; Sajid Hussain; Rana Haseeb Ur Rehman; Asmaa Munshi; Misbah Liaqat; Neeraj Kumar; Shehzad Ashraf Chaudhry. ITSSAKA-MS: An Improved Three-Factor Symmetric-Key Based Secure AKA Scheme for Multi-Server Environments. IEEE Access 2020, 8, 107993 -108003.

AMA Style

Zeeshan Ali, Sajid Hussain, Rana Haseeb Ur Rehman, Asmaa Munshi, Misbah Liaqat, Neeraj Kumar, Shehzad Ashraf Chaudhry. ITSSAKA-MS: An Improved Three-Factor Symmetric-Key Based Secure AKA Scheme for Multi-Server Environments. IEEE Access. 2020; 8 ():107993-108003.

Chicago/Turabian Style

Zeeshan Ali; Sajid Hussain; Rana Haseeb Ur Rehman; Asmaa Munshi; Misbah Liaqat; Neeraj Kumar; Shehzad Ashraf Chaudhry. 2020. "ITSSAKA-MS: An Improved Three-Factor Symmetric-Key Based Secure AKA Scheme for Multi-Server Environments." IEEE Access 8, no. : 107993-108003.

Journal article
Published: 20 May 2020 in IEEE Access
Reads 0
Downloads 0

The edge computing infrastructure has enabled a massive amount of data in the smart grid environment by a large number of connected automated devices to be processed at the edge of the network in proximity to the data generation source. The demand response management is a fundamental requirement for an efficient and reliable smart grid environment, which can be accomplished by the transfer of data between smart devices and the utility center (UC) in a smart city, very frequently. However, this frequent data transfer is subject to multiple threats including the tempering. Several authentication schemes were proposed to secure smart grid environment. However, many such schemes are either insecure or lack the required efficiency. To counter the threats and to provide efficiency, a new authentication scheme for demand response management (DRMAS) is proposed in this paper. DRMAS provides all necessary security requirements and resists known attacks. The proposed DRMAS is provably secure under formal analysis supplemented by a brief discussion on attack resilience. Moreover, the DRMAS completes the authentication procedure in just 20.11 ms by exchanging only 2 messages.

ACS Style

Shehzad Ashraf Chaudhry; Hosam Alhakami; Abdullah Baz; Fadi Al-Turjman. Securing Demand Response Management: A Certificate-Based Access Control in Smart Grid Edge Computing Infrastructure. IEEE Access 2020, 8, 101235 -101243.

AMA Style

Shehzad Ashraf Chaudhry, Hosam Alhakami, Abdullah Baz, Fadi Al-Turjman. Securing Demand Response Management: A Certificate-Based Access Control in Smart Grid Edge Computing Infrastructure. IEEE Access. 2020; 8 (99):101235-101243.

Chicago/Turabian Style

Shehzad Ashraf Chaudhry; Hosam Alhakami; Abdullah Baz; Fadi Al-Turjman. 2020. "Securing Demand Response Management: A Certificate-Based Access Control in Smart Grid Edge Computing Infrastructure." IEEE Access 8, no. 99: 101235-101243.

Review
Published: 24 April 2020 in Symmetry
Reads 0
Downloads 0

The standardization activities of the fifth generation communications are clearly over and deployment has commenced globally. To sustain the competitive edge of wireless networks, industrial and academia synergy have begun to conceptualize the next generation of wireless communication systems (namely, sixth generation, (6G)) aimed at laying the foundation for the stratification of the communication needs of the 2030s. In support of this vision, this study highlights the most promising lines of research from the recent literature in common directions for the 6G project. Its core contribution involves exploring the critical issues and key potential features of 6G communications, including: (i) vision and key features; (ii) challenges and potential solutions; and (iii) research activities. These controversial research topics were profoundly examined in relation to the motivation of their various sub-domains to achieve a precise, concrete, and concise conclusion. Thus, this article will contribute significantly to opening new horizons for future research directions.

ACS Style

Mohammed H. Alsharif; Anabi Hilary Kelechi; Mahmoud A. Albreem; Shehzad Ashraf Chaudhry; M. Sultan Zia; Sunghwan Kim. Sixth Generation (6G) Wireless Networks: Vision, Research Activities, Challenges and Potential Solutions. Symmetry 2020, 12, 676 .

AMA Style

Mohammed H. Alsharif, Anabi Hilary Kelechi, Mahmoud A. Albreem, Shehzad Ashraf Chaudhry, M. Sultan Zia, Sunghwan Kim. Sixth Generation (6G) Wireless Networks: Vision, Research Activities, Challenges and Potential Solutions. Symmetry. 2020; 12 (4):676.

Chicago/Turabian Style

Mohammed H. Alsharif; Anabi Hilary Kelechi; Mahmoud A. Albreem; Shehzad Ashraf Chaudhry; M. Sultan Zia; Sunghwan Kim. 2020. "Sixth Generation (6G) Wireless Networks: Vision, Research Activities, Challenges and Potential Solutions." Symmetry 12, no. 4: 676.

Journal article
Published: 01 April 2020 in Journal of Information Security and Applications
Reads 0
Downloads 0

Wireless Healthcare Sensor Network (WHSN) has become one of the major research fields over the past decades that play a very prominent role in the medical field. Due to the rapid growth of technology in wireless communication, different security challenges have been raised in WHSN. Authentication protocols are used to secure the information transferred over the public channels by WHSN. For this prospect recently, Liu & Chung proposed an authentication and data transmission mechanism for WHSN. However, Challa et al. identified that Liu-Chung’s scheme is vulnerable to stolen smart-card, offline password guessing, privileged insider, and user impersonation attacks. Challa et al. then proposed an enhanced scheme to overcome beforehand stated flaws. This paper denotes out that in accession to before mentioned attacks, Liu-Chung’s scheme is also prone to users’ private key leakage and user impersonation attacks towards sensors. Moreover, Challa et al.’s scheme suffers from incorrectness, broadcasting problem, lack of authentication between Trusted Authority (TA) and sensor nodes, replay attack, Denial of Service (DoS) attack, forgery attack and delay in communication due to the involvement of the TA. Using the elliptic curve cryptography and bilinear paring, an improved scheme is proposed in this paper, to mitigate the weaknesses of Challah et al. and Liu-Chang schemes. The formal security analysis using simulation tool AVISPA and BAN logic demonstrate that the proposed scheme is secure. The rigorous informal security analysis also attests that our scheme is safe against well-known attacks.

ACS Style

Zeeshan Ali; Anwar Ghani; Imran Khan; Shehzad Ashraf Chaudhry; Sk Hafizul Islam; Debasis Giri. A robust authentication and access control protocol for securing wireless healthcare sensor networks. Journal of Information Security and Applications 2020, 52, 102502 .

AMA Style

Zeeshan Ali, Anwar Ghani, Imran Khan, Shehzad Ashraf Chaudhry, Sk Hafizul Islam, Debasis Giri. A robust authentication and access control protocol for securing wireless healthcare sensor networks. Journal of Information Security and Applications. 2020; 52 ():102502.

Chicago/Turabian Style

Zeeshan Ali; Anwar Ghani; Imran Khan; Shehzad Ashraf Chaudhry; Sk Hafizul Islam; Debasis Giri. 2020. "A robust authentication and access control protocol for securing wireless healthcare sensor networks." Journal of Information Security and Applications 52, no. : 102502.

Journal article
Published: 21 March 2020 in Electronics
Reads 0
Downloads 0

Two party authentication schemes can be good candidates for deployment in Internet of Things (IoT)-based systems, especially in systems involving fast moving vehicles. Internet of Vehicles (IoV) requires fast and secure device-to-device communication without interference of any third party during communication, and this task can be carried out after registration of vehicles with a trusted certificate issuing party. Recently, several authentication protocols were proposed to enable key agreement in two party settings. In this study, we analyze two recent protocols and show that both protocols are insecure against key compromise impersonation attack (KCIA) as well as both lack of user anonymity. Therefore, this paper proposes an improved protocol that does not only resist KCIA and related attacks, but also offers comparable computation and communication. The security of proposed protocol is tested under formal model as well as using well known Burrows–Abadi–Needham (BAN) logic along with a discussion on security features. While resisting the KCIA and related attacks, proposed protocol also provides comparable trade-of between security features and efficiency and completes a round of key agreement in just 13.42 ms, which makes it a promising candidate to be deployed in IoT environments.

ACS Style

Bander A. Alzahrani; Shehzad Ashraf Chaudhry; Ahmed Barnawi; Abdullah Al-Barakati; Taeshik Shon. An Anonymous Device to Device Authentication Protocol Using ECC and Self Certified Public Keys Usable in Internet of Things Based Autonomous Devices. Electronics 2020, 9, 520 .

AMA Style

Bander A. Alzahrani, Shehzad Ashraf Chaudhry, Ahmed Barnawi, Abdullah Al-Barakati, Taeshik Shon. An Anonymous Device to Device Authentication Protocol Using ECC and Self Certified Public Keys Usable in Internet of Things Based Autonomous Devices. Electronics. 2020; 9 (3):520.

Chicago/Turabian Style

Bander A. Alzahrani; Shehzad Ashraf Chaudhry; Ahmed Barnawi; Abdullah Al-Barakati; Taeshik Shon. 2020. "An Anonymous Device to Device Authentication Protocol Using ECC and Self Certified Public Keys Usable in Internet of Things Based Autonomous Devices." Electronics 9, no. 3: 520.

Journal article
Published: 02 March 2020 in IEEE Access
Reads 0
Downloads 0

The significance of the Internet of Drones (IoD) is increasing steadily and now IoD is being practiced in many military and civilian-based applications. IoD facilitates real-time data access to the users especially the surveillance data in smart cities using the current cellular networks. However, due to the openness of communication channel and battery operations, the drones and the sensitive data collected through drones are subject to many security threats. To cope the security challenges, recently, Srinivas et al. proposed a temporal credential based anonymous lightweight authentication scheme (TCALAS) for IoD networks. Contrary to the IoD monitoring framework proposed by Srinivas et al., their own scheme can work only when there is one and only one cluster/flying zone and is not scalable. Moreover, despite their claim of robustness, the investigation in this paper reveals that Srinivas et al.’s scheme cannot resist traceability and stolen verifier attacks. Using the lightweight symmetric key primitives and temporal credentials, an improved scheme (iTCALAS) is then proposed. The proposed scheme while maintaining the lightweightness provides security against many known attacks including traceability and stolen verifier. The proposed iTCALAS extends scalability and can work when there are several flying zone/clusters in the IoD environment. The formal security proof along with automated verification using ProVerif show robustness of proposed iTCALAS. Moreover, the security discussion and performance comparisons show that the iTCALAS provides the known security features and completes authentication in just 2.295 ms.

ACS Style

Zeeshan Ali; Shehzad Ashraf Chaudhry; Muhammad Sher Ramzan; Fadi Al-Turjman. Securing Smart City Surveillance: A Lightweight Authentication Mechanism for Unmanned Vehicles. IEEE Access 2020, 8, 43711 -43724.

AMA Style

Zeeshan Ali, Shehzad Ashraf Chaudhry, Muhammad Sher Ramzan, Fadi Al-Turjman. Securing Smart City Surveillance: A Lightweight Authentication Mechanism for Unmanned Vehicles. IEEE Access. 2020; 8 (99):43711-43724.

Chicago/Turabian Style

Zeeshan Ali; Shehzad Ashraf Chaudhry; Muhammad Sher Ramzan; Fadi Al-Turjman. 2020. "Securing Smart City Surveillance: A Lightweight Authentication Mechanism for Unmanned Vehicles." IEEE Access 8, no. 99: 43711-43724.

Journal article
Published: 15 February 2020 in Symmetry
Reads 0
Downloads 0

The roaming service enables a remote user to get desired services, while roaming in a foreign network through the help of his home network. The authentication is a pre-requisite for secure communication between a foreign network and the roaming user, which enables the user to share a secret key with foreign network for subsequent private communication of data. Sharing a secret key is a tedious task due to underneath open and insecure channel. Recently, a number of such schemes have been proposed to provide authentication between roaming user and the foreign networks. Very recently, Lu et al. claimed that the seminal Gopi-Hwang scheme fails to resist a session-specific temporary information leakage attack. Lu et al. then proposed an improved scheme based on Elliptic Curve Cryptography (ECC) for roaming user. However, contrary to their claim, the paper provides an in-depth cryptanalysis of Lu et al.’s scheme to show the weaknesses of their scheme against Stolen Verifier and Traceability attacks. Moreover, the analysis also affirms that the scheme of Lu et al. entails incorrect login and authentication phases and is prone to scalability issues. An improved scheme is then proposed. The scheme not only overcomes the weaknesses Lu et al.’s scheme but also incurs low computation time. The security of the scheme is analyzed through formal and informal methods; moreover, the automated tool ProVerif also verifies the security features claimed by the proposed scheme.

ACS Style

Bander A. Alzahrani; Shehzad Ashraf Chaudhry; Ahmed Barnawi; Abdullah Al-Barakati; Mohammed H. Alsharif. A Privacy Preserving Authentication Scheme for Roaming in IoT-Based Wireless Mobile Networks. Symmetry 2020, 12, 287 .

AMA Style

Bander A. Alzahrani, Shehzad Ashraf Chaudhry, Ahmed Barnawi, Abdullah Al-Barakati, Mohammed H. Alsharif. A Privacy Preserving Authentication Scheme for Roaming in IoT-Based Wireless Mobile Networks. Symmetry. 2020; 12 (2):287.

Chicago/Turabian Style

Bander A. Alzahrani; Shehzad Ashraf Chaudhry; Ahmed Barnawi; Abdullah Al-Barakati; Mohammed H. Alsharif. 2020. "A Privacy Preserving Authentication Scheme for Roaming in IoT-Based Wireless Mobile Networks." Symmetry 12, no. 2: 287.

Journal article
Published: 11 February 2020 in Computer Communications
Reads 0
Downloads 0

The on demand availability of resources in Cyber physical system (CPS) has emerged as a viable service providing platform to improve the resource usability and reducing the infrastructure costs. Nevertheless, the development recompenses can only be realized after avoiding security and privacy issues. A secure and reliable CPS can offer improved efficiency, usability and reliability along with autonomy. To secure such systems, in 2018 Challa et al. (2018) proposed a security system to extend an authenticated key agreement between a user and a cloud server via trusted authority; as an application, they also customized their system to work with autonomous smart meter and cloud server. Challa et al. then claimed the security of their proposed scheme through formal, informal and automated validations. However, this paper unveils the weaknesses of their scheme and shows that their scheme cannot facilitate in forming a session key between the user/smart meter and the cloud server. Precisely, in the presence of more than one registered users/smart meters, the latter in their scheme may never receive a response message because of a critical design error. Moreover, their scheme lacks the untraceable anonymity and the lack of request verification on cloud server side may also lead to replay and/or denial of services attack. The article then introduces an improved and secure authentication system free of correctness issues, to facilitate a key agreement between user and cloud server via trusted authority. As an application, the proposed system also works for smart meter and cloud server to reach a key agreement. Based on the hardness assumption of Elliptic Curve Decisional Diffi-Hellman Problem (ECDDHP), the formal Random oracle model proves the security of the proposed scheme. Moreover, the robustness of the scheme is explained through informal analysis. The proposed system while providing all known security features has slightly increased the computation and communication costs as compared with the scheme of Challa et al. The proposed scheme completes a cycle of authentication by exchanging 2080 bits in just 13.4066 ms.

ACS Style

Shehzad Ashraf Chaudhry; Taeshik Shon; Fadi Al-Turjman; Mohammed H. Alsharif. Correcting design flaws: An improved and cloud assisted key agreement scheme in cyber physical systems. Computer Communications 2020, 153, 527 -537.

AMA Style

Shehzad Ashraf Chaudhry, Taeshik Shon, Fadi Al-Turjman, Mohammed H. Alsharif. Correcting design flaws: An improved and cloud assisted key agreement scheme in cyber physical systems. Computer Communications. 2020; 153 ():527-537.

Chicago/Turabian Style

Shehzad Ashraf Chaudhry; Taeshik Shon; Fadi Al-Turjman; Mohammed H. Alsharif. 2020. "Correcting design flaws: An improved and cloud assisted key agreement scheme in cyber physical systems." Computer Communications 153, no. : 527-537.

Article
Published: 14 January 2020 in Wireless Personal Communications
Reads 0
Downloads 0

The IP multimedia subsystem represents an architectural framework to support multimedia-based services using internet protocol over wired and wireless media. These IP-based multimedia services rely on session initiation protocol (SIP) for creating, maintaining and terminating the communicative sessions, which underscores the efficiency and security of SIP protocol. Many SIP based authentication schemes have been put forward in the last decade, however with many limitations. Recently, Lu et al. and Chaudhary et al. presented SIP based authentication protocols. Then, Dongqing et al. discovered limitations in Lu et al. and Chaudhary et al. schemes, and presented an improved SIP authentication protocol. Nonetheless, we ascertain that Dongqing et al.’s protocol is prone to privileged insider attack, denial of service attack, and session specific ephemeral secret-leakage attack. Besides, this protocol assumes a strictly time synchronized system, which limits the practical effectiveness of the protocol for a real environment. We also propose an improved SIP authentication protocol that covers the limitations of Dongqing et al. protocol. Our scheme is formally proved as secure using BAN logic analysis. The performance analysis illustrates the comparison for related schemes with proposed scheme, which depicts the efficiency and robustness of the scheme over previous schemes.

ACS Style

Mahmood Ul Hassan; Shehzad Ashraf Chaudhry; Azeem Irshad. An Improved SIP Authenticated Key Agreement Based on Dongqing et al. Wireless Personal Communications 2020, 110, 2087 -2107.

AMA Style

Mahmood Ul Hassan, Shehzad Ashraf Chaudhry, Azeem Irshad. An Improved SIP Authenticated Key Agreement Based on Dongqing et al. Wireless Personal Communications. 2020; 110 (4):2087-2107.

Chicago/Turabian Style

Mahmood Ul Hassan; Shehzad Ashraf Chaudhry; Azeem Irshad. 2020. "An Improved SIP Authenticated Key Agreement Based on Dongqing et al." Wireless Personal Communications 110, no. 4: 2087-2107.