Adnan Nadeem
Federal Urdu University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Adnan Nadeem.
Telecommunication Systems | 2013
Adnan Nadeem; Michael P. Howarth
Mobile ad hoc networks (MANETs) are well known to be vulnerable to various attacks due to their lack of centralized control, and their dynamic topology and energy-constrained operation. Much research in securing MANETs has focused on proposals which detect and prevent a specific kind of attack such as sleep deprivation, black hole, grey hole, rushing or sybil attacks. In this paper we propose a generalized intrusion detection and prevention mechanism. We use a combination of anomaly-based and knowledge-based intrusion detection to secure MANETs from a wide variety of attacks. This approach also has the capability to detect new unforeseen attacks. Simulation results of a case study shows that our proposed mechanism can successfully detect attacks, including multiple simultaneous different attacks, and identify and isolate the intruders causing a variety of attacks, with an affordable network overhead. We also investigate the impact on the MANET performance of (a) the various attacks and (b) the type of intrusion response, and we demonstrate the need for an adaptive intrusion response.
Computer Networks | 2015
Adnan Nadeem; Muhammad Azhar Hussain; Obaidullah Owais; Abdul Salam; Sarwat Iqbal; Kamran Ahsan
The evolution of wearable computing and advances in wearable sensor devices has motivated various applications of Body Area Sensor Networks (BASN). In the last few years body areas sensor networks have emerged as a major type of wireless sensor networks (WSN). This emerging networking technology can be used in various walks of life. A number of surveys have been published on MAC or the physical layer mechanism of BASN but very few have focused on studying it from the application point of view. In this paper, we first review, from literature, existing use of body area sensor network and classify and then its application domain. Within these application domains of BASN, we propose a feasibility of scenarios where BASN can be used for both application and technical aspects. In addition, we classify the use of BASN from literature, based on certain parameters. Finally, we discuss and highlight issues where further research can be conducted in the future.
2012 15th International Multitopic Conference (INMIC) | 2012
Muhammad Azhar Hussain; Adnan Nadeem; O. Khan; Sarwat Iqbal; Abdul Salam
A Mobile Ad Hoc Network (MANET) is an infrastructureless network of autonomous devices formed dynamically. At network layer routing protocols in MANETs expect every node to cooperate in routing and data forwarding tasks. However, this cooperation leads towards a state in which nodes consumes their scarce resources for example battery power. Resource constraints of MANET nodes can derive dynamic selfish behavior in terms of not forwarding packets & not cooperating in routing operations. This can lead to degradation in network performance. In this paper, we first perform a simulation based study to evaluate the effects of selfish nodes on network performance. Then in contrast with most of the selfish node detection approaches in literature which are based on fully watchdog methods using promiscuous monitoring. We propose a proactive mechanism that first detects nodes that are exhibiting selfish behavior based on the factors which derives selfish behavior and then mitigate its effect on network performance. Initial simulation results of a case study shows that our method can detect & mitigate the effect of selfish behavior with an affordable overhead on the network.
Mehran University Research Journal of Engineering and Technology | 2017
Adnan Nadeem; Kamran Ahsan; Muhammad Sarim
MANETs (Mobile Ad Hoc Networks) have applications in various walks of life from rescue operations to battle fieled operations, personal and commercial. However, routing operations in MANETs are still vulnerable to anomalies and DoS (Denial of Service) attacks such as sleep deprivation. In SD (Sleep Deprivation) attack malicious node exploits the vulnerability in the route discovery function of the reactive routing protocol for example AODV (Ad Hoc On-Demand Distance Vector). In this paper, we first illustrate the SD anomaly in MANETs and then propose a SD detection and prevention algorithm which efficiently deals with this attack. We assess the performance of our proposed approach through simulation, evaluating its successfulness using different network scenarios.
Archive | 2014
Abdul Basit Shaikh; Muhammad Sarim; Sheikh Kashif Raffat; Kamran Ahsan; Adnan Nadeem; Muhammad Siddiq
Archive | 2014
Abdul Salam; Adnan Nadeem; Kamran Ahsan; Muhammad Sarim; Kashif Rizwan
Archive | 2014
Abdul Salam; Adnan Nadeem; Kamran Ahsan; Muhammad Sarim; Kashif Rizwan
Mehran University Research Journal of Engineering and Technology | 2017
Nadeem Mehmood; Syed Muhmmad Aqil Burney; Kashif Rizwan; Asadullah Shah; Adnan Nadeem
Journal of Basic and Applied Sciences | 2015
Muhammad Shahzad; Kamran Ahsan; Adnan Nadeem; Muhammad Sarim
Archive | 2014
Muhammad Amir Nisar; Amir Mehmood; Adnan Nadeem; Kamran Ahsan; Mmuhammad Sarim