Search Results - "Naveed Aman, Muhammad"
-
1
Securing Synchrophasors Using Data Provenance in the Quantum Era
Published in IEEE open journal of the Communications Society (2024)“…Trust in the fidelity of synchrophasor measurements is crucial for the correct operation of modern power grids. While most of the existing research on data…”
Get full text
Journal Article -
2
A Privacy-Preserving and Scalable Authentication Protocol for the Internet of Vehicles
Published in IEEE internet of things journal (15-01-2021)“…One of the most important and critical requirements for the Internet of Vehicles (IoV) is security under strict latency. Typically, authentication protocols…”
Get full text
Journal Article -
3
Dynamic Resource Optimization for Energy-Efficient 6G-IoT Ecosystems
Published in Sensors (Basel, Switzerland) (12-05-2023)“…The problem of energy optimization for Internet of Things (IoT) devices is crucial for two reasons. Firstly, IoT devices powered by renewable energy sources…”
Get full text
Journal Article -
4
Command Injection Attacks in Smart Grids: A Survey
Published in IEEE open journal of industry applications (01-01-2024)“…Cybersecurity is important in the realization of various smart grid technologies. Several studies have been conducted to discuss different types of…”
Get full text
Journal Article -
5
A Fuzzy-Logic-Based Smart Irrigation Controller for Precision Agriculture
Published in IEEE internet of things journal (15-11-2024)“…Precision irrigation utilizing sensors and IoT devices was introduced for efficient utilization of natural water resources in the agriculture sector. Most…”
Get full text
Journal Article -
6
Token-Based Security for the Internet of Things With Dynamic Energy-Quality Tradeoff
Published in IEEE internet of things journal (01-04-2019)“…In this paper, token-based security protocols with dynamic energy-security level tradeoff for Internet of Things (IoT) devices are explored. To assure…”
Get full text
Journal Article -
7
A Light-Weight Technique to Detect GPS Spoofing Using Attenuated Signal Envelopes
Published in IEEE open journal of the Computer Society (2023)“…Global Positioning System (GPS) spoofing attacks have attracted more attention as one of the most effective GPS attacks. Since the signals from an authentic…”
Get full text
Journal Article -
8
Co-Existence With IEEE 802.11 Networks in the ISM Band Without Channel Estimation
Published in IEEE open journal of the Computer Society (2023)“…Any new deployment of networks in the industrial, scientific, and medical (ISM) band, even though it is license-free, has to co-exist with IEEE 802.11…”
Get full text
Journal Article -
9
Unveiling the Connection Between Malware and Pirated Software in Southeast Asian Countries: A Case Study
Published in IEEE open journal of the Computer Society (01-01-2024)“…Pirated software is an attractive choice for cybercriminals seeking to spread malicious software, known as malware. This paper attempts to quantify the…”
Get full text
Journal Article -
10
Dynamic Low Voltage Ride through Detection and Mitigation in Brushless Doubly Fed Induction Generators
Published in Energies (Basel) (01-08-2021)“…Brushless doubly-fed induction generators have higher reliability, making them an attractive choice for not only offshore applications but also for remote…”
Get full text
Journal Article -
11
An Improved Algorithm for Optimal Load Shedding in Power Systems
Published in Energies (Basel) (01-07-2018)“…A blackout is usually the result of load increasing beyond the transmission capacity of the power system. A collapsing system enters a contingency state before…”
Get full text
Journal Article -
12
Investigating the impact of solar PV and wind energy systems on the strength of a longitudinal power grid
Published in e-Prime (01-06-2024)“…•This study investigates the integration of inverter-based generation (IBG) like solar PV and wind energy system into the Nigerian grid.•The Network Response…”
Get full text
Journal Article -
13
Speech Enhancement Framework with Noise Suppression Using Block Principal Component Analysis
Published in Acoustics (Basel, Switzerland) (01-06-2022)“…With the advancement in voice-communication-based human–machine interface technology in smart home devices, the ability to decompose the received speech signal…”
Get full text
Journal Article -
14
A Scalable Protocol for Driving Trust Management in Internet of Vehicles With Blockchain
Published in IEEE internet of things journal (01-12-2020)“…Recent developments in IoT have facilitated advancements in the Internet of Vehicles (IoV) with autonomous vehicles and roadside infrastructure as its key…”
Get full text
Journal Article -
15
Mutual Authentication in IoT Systems Using Physical Unclonable Functions
Published in IEEE internet of things journal (01-10-2017)“…The Internet of Things (IoT) represents a great opportunity to connect people, information, and things, which will in turn cause a paradigm shift in the way we…”
Get full text
Journal Article -
16
Machine and Representation Learning-Based GNSS Spoofing Detectors Utilizing Feature Set From Generic GNSS Receivers
Published in IEEE transactions on consumer electronics (01-02-2024)“…The Global Navigation Satellite System (GNSS) plays critical role in providing precise timing and positioning information for various applications. However,…”
Get full text
Journal Article -
17
ATT-Auth: A Hybrid Protocol for Industrial IoT Attestation With Authentication
Published in IEEE internet of things journal (01-12-2018)“…This paper addresses the problem of developing attestation techniques for Industrial Internet of Things systems. To ensure hardware security, the proposed…”
Get full text
Journal Article -
18
DrivMan: Driving Trust Management and Data Sharing in VANETs with Blockchain and Smart Contracts
Published in 2019 IEEE 89th Vehicular Technology Conference (VTC2019-Spring) (01-04-2019)“…The development of Internet of Things (IoT) has paved way for the Internet of Vehicles (IoV) and intelligent transportation systems (ITS). Vehicular ad-hoc…”
Get full text
Conference Proceeding -
19
IoT-Proctor: A Secure and Lightweight Device Patching Framework for Mitigating Malware Spread in IoT Networks
Published in IEEE systems journal (01-09-2022)“…Traditional malware propagation control schemes do not prevent device-to-device (D2D) malware spread, have high time cost, and may result in low probability of…”
Get full text
Journal Article -
20
Exploiting Correlation Among GPS Signals to Detect GPS Spoofing in Power Grids
Published in IEEE transactions on industry applications (01-01-2022)“…Global positioning systems (GPS) are the major source to provide time synchronization information for phasor measurement units (PMUs) used in modern wide-area…”
Get full text
Journal Article