Search Results - "Ayub, Muhammad Faizan"
-
1
Lightweight authentication protocol for e-health clouds in IoT-based applications through 5G technology
Published in Digital communications and networks (01-05-2021)“…Modern information technology has been utilized progressively to store and distribute a large amount of healthcare data to reduce costs and improve medical…”
Get full text
Journal Article -
2
An enhanced scheme for mutual authentication for healthcare services
Published in Digital communications and networks (01-04-2022)“…With the advent of state-of-art technologies, the Telecare Medicine Information System (TMIS) now offers fast and convenient healthcare services to patients at…”
Get full text
Journal Article -
3
Lightweight and Secure Multi-Factor Authentication Scheme in VANETs
Published in IEEE transactions on vehicular technology (01-11-2023)“…The idea of a smart city and the utilization of vehicles are emerging rapidly. For inter-vehicular communication, this progression builds Vehicular Ad-Hoc…”
Get full text
Journal Article -
4
Secure Consumer-Centric Demand Response Management in Resilient Smart Grid as Industry 5.0 Application With Blockchain-Based Authentication
Published in IEEE transactions on consumer electronics (01-02-2024)“…The development of the industrial Internet of Things and smart grid networks has emphasized the importance of secure smart grid communication for the future of…”
Get full text
Journal Article -
5
An Efficient and Physically Secure Privacy-Preserving Key-Agreement Protocol for Vehicular Ad-Hoc Network
Published in IEEE transactions on intelligent transportation systems (01-09-2023)“…The popularity of vehicles promotes the evolution of smart cities. This development makes vehicular ad-hoc network (VANET) a widely used inter-vehicular…”
Get full text
Journal Article -
6
A seamless anonymous authentication protocol for mobile edge computing infrastructure
Published in Computer communications (15-03-2022)“…Mobile Edge Computing (MEC) accommodates processing and data storage and manipulation capabilities across the scope of wireless network. In MEC environment,…”
Get full text
Journal Article -
7
Design of Provably Secure Authentication Protocol for Edge-Centric Maritime Transportation System
Published in IEEE transactions on intelligent transportation systems (01-12-2023)“…The epidemic growth of the Internet of Things (IoT) objects have revolutionized Maritime Transportation Systems (MTS). Though, it becomes challenging for the…”
Get full text
Journal Article -
8
An Efficient and Provably Secure Certificateless Protocol for Industrial Internet of Things
Published in IEEE transactions on industrial informatics (01-11-2022)“…The Internet of Things (IoT) has a wide range of applications that influence the life of people expeditiously. In recent years, IoT becomes an emerging…”
Get full text
Journal Article -
9
Provably Secure Conditional-Privacy Access Control Protocol for Intelligent Customers-Centric Communication in VANET
Published in IEEE transactions on consumer electronics (01-02-2024)“…Globally, the development of Intelligent Cyber-Physical Transportation Systems (ICTS) aims to tackle several challenges, including reducing traffic accidents…”
Get full text
Journal Article -
10
An Identity Based Authentication Protocol for Smart Grid Environment Using Physical Uncloneable Function
Published in IEEE transactions on smart grid (01-09-2021)“…Smart grid plays an important role in managing demand response management in modern smart city using Information and Communication Technologies (ICTs). In…”
Get full text
Journal Article -
11
A Provably Secure Two-Factor Authentication Scheme for USB Storage Devices
Published in IEEE transactions on consumer electronics (01-11-2020)“…Universal Serial Bus (USB) is widely used, for example to facilitate hot-swapping and plug-and-play. However, USB ports can be exploited by an adversary to…”
Get full text
Journal Article -
12
An access control scheme in IoT-enabled Smart-Grid systems using blockchain and PUF
Published in Internet of things (Amsterdam. Online) (01-07-2023)“…IoT-enabled Smart Grid (IoT-SG) is an emerging paradigm that enables the bi-direction communication of IoT devices and hardware to efficiently collect and…”
Get full text
Journal Article -
13
Fuzzy extraction and PUF based three party authentication protocol using USB as mass storage device
Published in Journal of information security and applications (01-12-2020)“…Due to the rapid advancement in on-demand communication and information technologies, the peripheral connection of computers through Universal Serial Bus (USB)…”
Get full text
Journal Article -
14
An Identity-Based Authentication Protocol for the Telecare Medical Information System (TMIS) Using a Physically Unclonable Function
Published in IEEE systems journal (01-09-2022)“…Telecare Medical Information System (TMIS) encourages patients to securely exchange their health data with a remote medical server for real-time remote…”
Get full text
Journal Article -
15
An access control protocol for IoT‐based critical infrastructure in smart grid environment
Published in International journal of communication systems (25-05-2022)“…Summary Information and communication technology (ICT) can add appealing attributes such as transparency, energy conservation, cost reduction, reliability, and…”
Get full text
Journal Article -
16
On the Security of a Lightweight Privacy-Preserving Authentication Protocol for VANETs
Published in 2021 International Conference on Artificial Intelligence and Smart Systems (ICAIS) (25-03-2021)“…The extensive use of vehicles evolved the concept of smart city, due to which the Vehicular Ad-hoc Network (VANET) is broadly acknowledged for the…”
Get full text
Conference Proceeding