Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Aneel Rahim is active.

Publication


Featured researches published by Aneel Rahim.


Sensors | 2010

Sensor Based Framework for Secure Multimedia Communication in VANET

Aneel Rahim; Zeeshan Shafi Khan; Fahad T. Bin Muhaya; Muhammad Sher; Tai-Hoon Kim

Secure multimedia communication enhances the safety of passengers by providing visual pictures of accidents and danger situations. In this paper we proposed a framework for secure multimedia communication in Vehicular Ad-Hoc Networks (VANETs). Our proposed framework is mainly divided into four components: redundant information, priority assignment, malicious data verification and malicious node verification. The proposed scheme jhas been validated with the help of the NS-2 network simulator and the Evalvid tool.


international conference on information security | 2010

Performance Evaluation of Video Streaming in Vehicular Adhoc Network

Aneel Rahim; Zeeshan Shafi Khan; Fahad Bin Muhaya

In Vehicular Ad-Hoc Networks (VANETs) wireless-equipped vehicles form a temporary network for sharing information among vehicles. Secure Multimedia communication enhances the safety of passenger by providing visual picture of accidents and danger situations. In this paper we will evaluate the performance of multimedia data in VANETS scenario and consider the impact of malicious node using NS-2 and Evalvid video evaluation tool.


Information Security Journal: A Global Perspective | 2009

A Three-Layer Secure Architecture for IP Multimedia Subsystem-Based Instant Messaging

Zeeshan Shafi Khan; Muhammad Sher; Khalid Rashid; Aneel Rahim

ABSTRACT A packet-based network to provide telecommunication services independent from the underlying access and transport technologies is known as a next generation network. An IP multimedia subsystem (IMS) provides an architectural framework for the next generation networks and includes variety of services such as presence, instant messaging, push-to-talk over cellular, multiparty conference, and so forth. IMS-based instant messaging is available in two flavors (immediate messaging and session-based messaging). Both flavors are subject to different types of security threats. An attacker can generate an immediate messaging flood by sending enormous number of messages to deny the services to a group of users or to an individual. Session-based messaging is facing threats such as invite flooding attack, session modification attack, and session teardown attack. In this paper, we developed a security mechanism, consisting of three layers, to secure the messaging service from flooding attacks and session-based attacks and the like. The simulation results show a good improvement in the existing security mechanism of the IMS-based instant messaging service.


FGIT-SecTech/DRBC | 2010

Discovering the Botnet Detection Techniques

Aneel Rahim; Fahad Bin Muhaya

Botnet is a network of compromised computers. It just fellow the master slave concept. Bots are comprised computers and do the tasks what ever their master orders them. Internet Relay Chat (IRC) is used for the communication between the master and bots. Information is also encrypted to avoid the effect of third party. In this paper we discuss the Botnets detection techniques and comparative analysis of these techniques on the basis of DNS query, History data and group activity.


Computers & Mathematics With Applications | 2010

Realization of Call-Back Authentication (CBA) for secure web to cellular phone SMS communication

Zeeshan Shafi Khan; Khalid Rashid; Fahad Bin Muhaya; Qutbuddin; Aneel Rahim

In order to provide essential data services, the cellular networks have opened interface with Internet enabling communication with the users beyond the coverage of their wireless signals across the globe. Besides economical expansion of the global system for mobile communication (GSM) services, this interface has given birth to new security challenges. Especially recent research has divulged that an adversary equipped with little more than a cable modem can block all voice communication in a metropolitan area or even in entire country of the size of USA by sending enormous short message service (SMS) traffic via Internet. To overcome this threat in particular and other client-server communication problems in general, a new secure protocol, Call-Back Authentication (CBA), for web to phone SMS communication is proposed. The protocol introduces two-tier server architecture and pulls data traffic control (PDTC) mechanism for secure communication. The protocol is aimed to throat-knot malicious traffic at GSM-Internet interface gateway. The results show that the CBA protocol secures all GSM services from Internet originated SMS floods. Moreover the authentication mechanism of the CBA protocol identifies and blocks the spoofed as well as the zombie requests. The CBA server requires lesser resources to deliver SMS as compared to existing mechanism.


Multimedia Tools and Applications | 2013

Editorial Secure Multimedia Communication in Vehicular Adhoc Network

Aneel Rahim; Muhammad Sher; Zeeshan Shafi Khan; Fahad Bin Muhaya

Multimedia Communication enhances the safety of passenger by providing visual picture of accidents and danger situations in Vehicular Adhoc Networks (VANETs). Security, High speed of vehicles, dynamic topology and low bandwidth etc. are main challenges for multimedia traffic in VANETs. Multimedia Communication in VANETs is prone to security attack due to lack of infrastructure, mobility and dynamic network topology as compare to any other network Several Security attacks are possible on multimedia application, which includes Denial of Service, Masquerade, fake information, false position information and ID disclosure. Vehicular Multimedia Communication also has vulnerabilities which include Jamming, Forgery, Traffic Tampering, Impersonation, Privacy Violation and On-board Tampering etc. We conducted this special issue on the topic of Secure Multimedia Communication in Vehicular Adhoc Network. The call for paper is distributed among a lot of research groups, at number of different portals, websites, forums, etc. We got a very good response and receive many high quality research articles from all around the world. The high quality of the articles puts all the reviewers in difficulty to decide what to accept and what to not accept. The review process was very tough and it was very difficult to select few articles among the received dozen of articles. We are very thankful to the reviewers and we appreciate their efforts that they put to make this issue successful. First paper that is accepted in this issue is written by R. Arshad et al. and titled as “Elliptic curve cryptography based mutual authentication scheme for session initiation protocol”. In this article, they perform a cryptanalysis of Tsai’s scheme and consider the vulnerabilities like password guessing attack and stolen-verifier attack. Moreover, Tsai’s scheme does not Multimed Tools Appl (2013) 66:161–164 DOI 10.1007/s11042-013-1495-8


international conference on information security | 2010

Secure Mechanism for Handling Targeted Attacks in Infrastructure Based Wireless Mesh Networks

Aneel Rahim; Fahad Bin Muhaya; Shehzad Ashraf; Muhammad Sher

Infrastructure based Wireless mesh networks allow heterogeneous types of networks to be connected at a time through wireless mesh routers. Since the nodes of every network have different processing power, bandwidth, amount of energy etc. so this situation can lead to targeted attacks. An Internet connected node can easily generate flood over a node of sensor network. So to handle these types of attacks we in this paper introduced a new secure authentication mechanism that works when a potential of attack is detected. Moreover we also authorized the nodes of the wireless mesh network to demand data according to their capacity by using pull data traffic control mechanism. We applied this solution first on mesh routers to discourage targeted attacks and secondly we applied the solution on an individual node that lies in between a node and mesh router.


international conference on future information technology | 2010

A Mechanism for Handling Internal Threats of IMS Based Push to Talk and Push to Multimedia Service

Zeeshan Shafi Khan; Aneel Rahim; Fahad Bin Muhaya

Capabilities like Instant Messaging (IM), real-time video transfer and file transfer converts the Push to Talk (PTT) Service into a new one, known as Push to Multimedia (PTM). In PTT and PTM an authenticated user can be deleted from the session by the session administrator (initiator). Deletion of an authenticated user by a single authority may results in dispute among the remaining authenticated members. So in this paper we present a distributed mechanism to delete an authenticated user (who starts to act maliciously after authentication) from an ongoing session. Moreover a user may use the floor for the long period of time. No mechanism is defined to preset the maximum time for the floor use in a single turn. In this paper we also give a mechanism to define the maximum time for floor use at the start of the session. This time can vary from user to user. These features on one side secure the PTT and PTM service and on the other side enrich these services.


International Conference on Security Technology | 2009

Impact of Malicious Node on Broadcast Schemes

Aneel Rahim; Fahad bin Muyaha

Broadcast is frequently used operation in vehicular adhoc network (VANETs) for sharing traffic, weather, and safety information among vehicles. Relevance based approach forward high priority traffic for information sharing and removes the redundant and surplus messages. The relevance based approach depends upon the intermediate nodes and consider ideal scenario where there is no selfish and malicious node but it is not possible in real life scenario. We in this paper simulate the relevance based approach using NS-2 in a real scenario and consider the impact of malicious node and determine how much throughput of network is affected by malicious node.


Archive | 2009

A COMPARATIVE STUDY OF MOBILE AND VEHICULAR ADOC NETWORKS

Aneel Rahim; I. Ahmad; Zeeshan Shafi Khan; Muhammad Sher; M. Shoaib; A. Javed; R. Mahmood

Collaboration


Dive into the Aneel Rahim's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Khalid Rashid

COMSATS Institute of Information Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Tai-Hoon Kim

Sungshin Women's University

View shared research outputs
Top Co-Authors

Avatar

I. Ahmad

COMSATS Institute of Information Technology

View shared research outputs
Top Co-Authors

Avatar

Imran Ahmad

University of Engineering and Technology

View shared research outputs
Top Co-Authors

Avatar

Mehboob Yasin

COMSATS Institute of Information Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge