Amir Hayat
COMSATS Institute of Information Technology
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Amir Hayat.
Computers & Electrical Engineering | 2015
Saad Mustafa; Babar Nazir; Amir Hayat; Atta ur Rehman Khan; Sajjad Ahmad Madani
Cloud computing has emerged as a popular computing paradigm for hosting large computing systems and services. Recently, significant research is carried out on Resource Management (RM) techniques that focus on the efficient sharing of cloud resources among multiple users. RM techniques in cloud are designed for computing and workload intensive applications that have different optimization parameters. This study presents a comprehensive review of RM techniques and elaborates their extensive taxonomy based on the distinct features. It highlights evaluation parameters and platforms that are used to evaluate RM techniques. Moreover, it presents design goals and research challenges that should be considered while proposing novel RM techniques.
Sensors | 2015
Amara Umar; Nadeem Javaid; Ashfaq Ahmad; Zahoor Ali Khan; Umar Qasim; Nabil Ali Alrajeh; Amir Hayat
Performance enhancement of Underwater Wireless Sensor Networks (UWSNs) in terms of throughput maximization, energy conservation and Bit Error Rate (BER) minimization is a potential research area. However, limited available bandwidth, high propagation delay, highly dynamic network topology, and high error probability leads to performance degradation in these networks. In this regard, many cooperative communication protocols have been developed that either investigate the physical layer or the Medium Access Control (MAC) layer, however, the network layer is still unexplored. More specifically, cooperative routing has not yet been jointly considered with sink mobility. Therefore, this paper aims to enhance the network reliability and efficiency via dominating set based cooperative routing and sink mobility. The proposed work is validated via simulations which show relatively improved performance of our proposed work in terms the selected performance metrics.
Journal of Network and Computer Applications | 2016
Adnan Akhunzada; Abdullah Gani; Nor Badrul Anuar; Ahmed Abdelaziz; Muhammad Khurram Khan; Amir Hayat; Samee Ullah Khan
The revolutionary concept of Software Defined Networks (SDNs) potentially provides flexible and well-managed next-generation networks. All the hype surrounding the SDNs is predominantly because of its centralized management functionality, the separation of the control plane from the data forwarding plane, and enabling innovation through network programmability. Despite the promising architecture of SDNs, security was not considered as part of the initial design. Moreover, security concerns are potentially augmented considering the logical centralization of network intelligence. Furthermore, the security and dependability of the SDN has largely been a neglected topic and remains an open issue. The paper presents a broad overview of the security implications of each SDN layer/interface. This paper contributes further by devising a contemporary layered/interface taxonomy of the reported security vulnerabilities, attacks, and challenges of SDN. We also highlight and analyze the possible threats on each layer/interface of SDN to help design secure SDNs. Moreover, the ensuing paper contributes by presenting the state-of-the-art SDNs security solutions. The categorization of solutions is followed by a critical analysis and discussion to devise a comprehensive thematic taxonomy. We advocate the production of secure and dependable SDNs by presenting potential requirements and key enablers. Finally, in an effort to anticipate secure and dependable SDNs, we present the ongoing open security issues, challenges and future research directions.
Journal of Network and Computer Applications | 2015
Adnan Akhunzada; Mehdi Sookhak; Nor Badrul Anuar; Abdullah Gani; Ejaz Ahmed; Muhammad Shiraz; Steven Furnell; Amir Hayat; Muhammad Khurram Khan
Man-At-The-End (MATE) attacks and fortifications are difficult to analyze, model, and evaluate predominantly for three reasons: firstly, the attacker is human and, therefore, utilizes motivation, creativity, and ingenuity. Secondly, the attacker has limitless and authorized access to the target. Thirdly, all major protections stand up to a determined attacker till a certain period of time. Digital assets range from business to personal use, from consumer devices to home networks, the public Internet, the cloud, and the Internet of Things - where traditional computer and network security are inadequate to address MATE attacks. MATE is fundamentally a hard problem. Much of the extant focus to deal with MATE attacks is purely technical; though security is more than just a technical issue. The main objective of the paper is to mitigate the consequences of MATE attacks through the human element of security and highlight the need for this element to form a part of a holistic security strategy alongside the necessary techniques and technologies. This paper contributes by taking software protection (SP) research to a new realm of challenges. Moreover, the paper elaborates the concept of MATE attacks, the different forms, and the analysis of MATE versus insider threats to present a thematic taxonomy of a MATE attack. The ensuing paper also highlights the fundamental concept of digital assets, and the core protection mechanisms and their qualitative comparison against MATE attacks. Finally, we present state-of-the-art trends and cutting-edge future research directions by taking into account only the human aspects for young researchers and professionals.
Journal of Medical Systems | 2015
Sana Akram; Nadeem Javaid; Ashfaq Ahmad; Zahoor Ali Khan; Muhammad Imran; Mohsen Guizani; Amir Hayat; Manzoor Ilahi
As players and soldiers preform strenuous exercises and do difficult and tiring duties, they are usually the common victims of muscular fatigue. Keeping this in mind, we propose FAtigue MEasurement (FAME) protocol for soccer players and soldiers using in-vivo sensors for Wireless Body Area Sensor Networks (WBASNs). In FAME, we introduce a composite parameter for fatigue measurement by setting a threshold level for each sensor. Whenever, any sensed data exceeds its threshold level, the players or soldiers are declared to be in a state of fatigue. Moreover, we use a vibration pad for the relaxation of fatigued muscles, and then utilize the vibrational energy by means of vibration detection circuit to recharge the in-vivo sensors. The induction circuit achieves about 68 % link efficiency. Simulation results show better performance of the proposed FAME protocol, in the chosen scenarios, as compared to an existing Wireless Soccer Team Monitoring (WSTM) protocol in terms of the selected metrics.
innovative mobile and internet services in ubiquitous computing | 2015
Hamza Fahim; Nadeem Javaid; Umar Qasim; Zahoor Ali Khan; Shumaila Javed; Amir Hayat; Zafar Iqbal; Ghazanfar Rehman
Many researcher has paid their to explore and monitor the under water environment. There are lot of application of Underwater WSNs like environment monitoring, exploration of under water surfaces, disaster preventions assisted navigation etc. Underwater sensors are totally different from the terrestrial sensors. Terrestrial sensor network uses the radio signal and underwater sensor network uses the acoustic signal. As the radio signal has not good strength that it can propagate in the water. The Radio signal can propagate over the large distance as compared to the acoustic signals. Therefore, acoustic signal are used. In this paper, we propose Energy Hole Repairing Depth based routing protocol (EHRDBR) and Interference-Bandwidth aware Depth based routing (IBDBR) protocol. In both protocols, nodes move toward the specific area where the other node dies and cover the energy hole. In EHRDBR, forwarder node is selected on the basis of the interference residual energy, and depth parameters. In IBDBR, interference, bandwidth, residual energy, and depth parameters are used to select the forward node. Our protocols have performed better in network lifetime, throughput and ene to end delay.
The Journal of Supercomputing | 2015
Naila Karim; Khalid Latif; Zahid Anwar; Sharifullah Khan; Amir Hayat
Growing size of Semantic Web data demands scalable semantic stores. Hadoop-based distributed and parallel processing frameworks such as HBase and Hive are becoming increasingly popular for storing and retrieving voluminous data. Hive, more specifically, supports complex analytical processing but the query interface does not support data exploration using SPARQL, a standard query language for Semantic Web. We propose a semantic preserving SPARQL to HiveQL translation scheme that provides a querying interface for Hive in an attempt to realize a scalable semantic web triplestore. Major contributions of our research include: semantic preserving SPARQL to HiveQL query translation algorithm and storage schema-independent querying mechanism that accommodates different storage schemes without impacting translation time. The results demonstrate efficient working of proposed translation algorithm and that it supports different types of SPARQL queries.
International Journal of Distributed Sensor Networks | 2013
Tamleek Ali; Muazzam A. Khan; Amir Hayat; Masoom Alam; Muhammad Ali
Wireless sensor and actor networks are fully automated. Actor nodes are inducted to communicate with sensor nodes directly and reduce the communication delay caused by base station or sink nodes. Sometimes, the actor node is directly accessible without the involvement of any control room. The actor node is responsible for taking a prompt action against the reported event by a sensor node. For secure communication, it is essential that sensor and actor nodes be aware of their existing location and the data must be encrypted before transmission. Due to energy constraints, secure localization in wireless sensor networks is a hot issue. To date, the researchers have proposed many approaches for localization of sensor nodes in the network. In this paper, we provide new insights for secure actor directed localization technique in wireless sensor and actor networks. A secure connectivity based localization (CBL) approach for sensor and actor nodes localization is presented. The proposed approach helps to locate a sensor node efficiently and effectively. We have also decreased the possibility of attacks and the registration of attacker nodes with other legitimate nodes in the network. The proposed technique prevents man-in-the-middle attacks and securely delivers data to the destination.
innovative mobile and internet services in ubiquitous computing | 2015
Hamza Fahim; Nadeem Javaid; Zahoor Ali Khan; Umar Qasim; Shumaila Javed; Amir Hayat; Zafar Iqbal; Ghazanfar Rehman
In order to increase network life time scalable, efficient and adaptive routing protocols are need of current time. Many energy efficient protocols have been proposed, the Clustering algorithm is also a basic technique used for energy efficiency. In this paper we propose an energy efficient routing protocol that is based on Artificial Bee Colony (ABC) algorithm of Bio Inspired. The presented protocol efficiently utilized characteristics of ABC algorithm such as foraging principle and waggle dance of honey bees. Waggle dance technique is used to find Routing Node (RN) that has maximum energy. Simulation results proves increase network life time and high throughput with minimum delay.
Applied Mathematics & Information Sciences | 2014
Ajaz Hussain; Khalid Latif; Aimal Tariq Rextin; Amir Hayat; Masoon Alam