Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Basit Qureshi is active.

Publication


Featured researches published by Basit Qureshi.


Computer Communications | 2012

A distributed reputation and trust management scheme for mobile peer-to-peer networks

Basit Qureshi; Geyong Min; Demetres D. Kouvatsos

In peer-to-peer (P2P) networks, trust ratings aggregation and peer ranking are unreliable, time-consuming and space-demanding operations. The swift expansion of emerging P2P techniques towards the domain of mobile computing poses significant challenges for trust and security management. Several trust management schemes have been proposed recently to counter the security threat on P2P systems. However, due to the difficulties caused by system mobility and dynamic network topology, there is an increasing requirement of decentralized and distributed trust management schemes. In this paper, we initially investigate and analyze four typical decentralized and distributed trust management schemes. Based on the findings of this analysis, a robust distributed reputation and trust management scheme, referred to as M-trust, is proposed for mobile P2P networks. The new scheme utilizes confidence in reputation, based on interactions among peers, to reduce the computation complexity. Furthermore, distributed algorithms are presented for accurate and reliable trust ratings aggregation and space management. The performance of M-trust is evaluated in comparison to the existing schemes using extensive simulation experiments. The results demonstrate that M-trust possesses the excellent overall performance in terms of accuracy, reliability, convergence speed, and detection rate under various constraints of mobility, trust threshold and network out-degree.


computer and information technology | 2010

Collusion Detection and Prevention with FIRE+ Trust and Reputation Model

Basit Qureshi; Geyong Min; Demetres D. Kouvatsos

Recently many decentralized methods for trust management have been proposed. FIRE trust and reputation model presents a modular approach to trust and reputation from different information sources, according to availability, interaction trust, role-based trust, witness reputation, and certified reputation. However, FIRE model does not consider malicious activity and possible collusive behavior in the network nodes and is therefore susceptible to collusion attacks. In this paper we present a trust management approach to detecting collusion in direct and witness interactions among nodes based on history of interactions among nodes. Various interaction policies are defined to detect and prevent collaborative behavior in colluding nodes. Finally a multidimensional trust model FIRE+ is proposed for avoiding collusion attacks in direct and witness based interactions.


advanced information networking and applications | 2010

An Adaptive Content Sharing Protocol for P2P Mobile Social Networks

Basit Qureshi; Geyong Min; Demetres D. Kouvatsos; Mohammad Ilyas

In Mobile Social Networks (MSN) users can participate in communication based on their mutual interests. Typical implementations of Social Networks involve client/server architecture where a user needs to subscribe to a server for content sharing with other clients. Popular Online Social Network providers have recently extended the web based service into the mobile domain. However due to mobility and connectivity issues this architecture is in-adequate in providing peer to peer content sharing services to mobile users. Many solutions for Mobile Ad Hoc networks have been proposed however content based communication in partially or intermittently connected MANETs has been a recent research area. In this paper we present an adaptive protocol to facilitate implementation of a Mobile Social Network based on peer to peer content driven communication when end-to-end connectivity is not possible. The proposed protocol takes into account the information about users interests, content based data storing and forwarding, and host mobility in a disconnected, delay tolerant MANET.


Computer Networks | 2016

Cyber-physical systems clouds

Rihab Chaâri; Fatma Ellouze; Anis Koubâa; Basit Qureshi; Nuno Pereira; Habib Youssef; Eduardo Tovar

Cyber-Physical Systems (CPSs) represent systems where computations are tightly coupled with the physical world, meaning that physical data is the core component that drives computation. Industrial automation systems, wireless sensor networks, mobile robots and vehicular networks are just a sample of cyber-physical systems. Typically, CPSs have limited computation and storage capabilities due to their tiny size and being embedded into larger systems. With the emergence of cloud computing and the Internet-of-Things (IoT), there are several new opportunities for these CPSs to extend their capabilities by taking advantage of the cloud resources in different ways. In this survey paper, we present an overview of research efforts on the integration of cyber-physical systems with cloud computing and categorize them into three areas: (1) remote brain, (2) big data manipulation, (3) and virtualization. In particular, we focus on three major CPSs namely mobile robots, wireless sensor networks and vehicular networks.


Concurrency and Computation: Practice and Experience | 2012

Trusted information exchange in peer-to-peer mobile social networks

Basit Qureshi; Geyong Min; Demetres D. Kouvatsos

Social networks have recently been gaining popularity. In a peer‐to‐peer mobile social network (MSN), users with similar interests establish groups or communities and share information without relying on a centralized infrastructure. Users socially interact with each other using handheld mobile devices and membership in a group/community of MSNs is granted by a pre‐existing group member. However, it is possible that a group of malicious users can collude to promote another untrustworthy user in becoming a group member. Moreover, revoking membership without the existence of a central authority in a group is also a grant challenge. To address these problems in peer‐to‐peer MSNs, we propose a decentralized framework and the related algorithms for trusted information exchange and social interaction among users based on the dynamicity aware graph relabeling system. In contrast to the existing implementations of social networks based on a client/server paradigm, the proposed framework utilizes a lightweight trust model for identifying trustworthy users and aims at creating communities of trusted users while isolating and reducing interactions with untrustworthy users. Simulation results demonstrated the effectiveness of the proposed framework compared with the traditional dynamicity aware graph relabeling system algorithm.Copyright


international conference on mobile and ubiquitous systems: networking and services | 2009

Poster: An adaptive content sharing protocol for P2P Mobile Social Networks

Basit Qureshi; Mohammad Ilyas; Geyong Min; Demetres D. Kouvatsos

In Mobile Social Networks (MSN) users can participate in communication based on their mutual interests. Many solutions for Mobile Ad Hoc networks have been proposed however content based communication in partially or intermittently connected MANETs has been a recent research area. In this paper we present an adaptive protocol to facilitate implementation of a Mobile Social Network based on peer to peer content driven communication when end-to-end connectivity is not possible. The proposed protocol takes into account the information about users interests, content based data storing and forwarding, and host mobility in a disconnected, delay tolerant MANET.


embedded and ubiquitous computing | 2010

M-Trust: A Trust Management Scheme for Mobile P2P Networks

Basit Qureshi; Geyong Min; Demetres D. Kouvatsos

The rapid growth of emerging techniques for mobile resource sharing, content sharing, mobile social networks, and complex cyber-physical systems poses significant challenges for trust and security management. Several trust management schemes have been proposed recently to counter the security threat on Peer-to-Peer (P2P) systems. However, due to the difficulties caused by system mobility, wireless communications, pervasive devices and dynamic network topology, there is an increasing requirement of decentralized and distributed trust management schemes. In this paper, we first investigate and analyze various existing decentralized and distributed trust management schemes. Based on the analytical results, an efficient, accurate, robust and scalable light weight trust ratings aggregation scheme, referred to as M-trust, is proposed for mobile P2P networks. Extensive simulation results show that this proposed scheme can decrease the time required to compute the list of trust ratings and reduce the required storage space. The comparison to other schemes demonstrates that M-trust possesses the excellent overall performance in terms of accuracy, reliability, convergence speed, and detection rate under various constraints of mobility, trust threshold and network out-degree.


Procedia Computer Science | 2014

Five Traits of Performance Enhancement Using Cloud Robotics: A Survey

Basit Qureshi; Anis Koubâa

Abstract Recently, robots and automation systems have been at the front of research with the majority of systems still operating indepen- dently using onboard computation, memory manipulation and communication. With improvements in communication technology and the increasing availability of network, new approaches where robot and automation processing is performed remotely with access to large scale datasets, support a range of functions. Cloud Robotics supplements performance enhancement of robotics and autonomous systems by providing a global infrastructure in innovative ways. This paper summarizes recent research into five traits of Cloud Robotics for performance enhancement in robotics and autonomous systems: 1) Remote Brain, 2) Big Data and Shared Knowledge-base, 3) Collective Learning, 4) Intelligence and Behavior, and 5) Cloud architectures. Towards the end, in this survey, we present future directions for research in cloud robotics.


computer and information technology | 2010

A Framework for Building Trust Based Communities in P2P Mobile Social Networks

Basit Qureshi; Geyong Min; Demetres D. Kouvatsos

Trust management in applications for peer-to-peer (P2P) mobile networks has recently gained enormous interests. In a P2P mobile social network, users interact with each other to share information without relying on a centralized infrastructure. Users with similar interests establish groups or communities thus encouraging sharing of information such as interest profiles, personal information, documents, audio or video files etc. Gaining membership in a group/community in a mobile social network is based on recommendation from a pre-existing member of a group; revoking membership of a user from a group could be a challenging task without the existence of a central authority. In contrast to the existing implementations of social networks based on a client/server paradigm, we propose a decentralized (P2P) framework for trusted information exchange and social interaction among users based on the Dynamicity Aware Graph Relabeling System (DA-GRS). The proposed framework utilizes a light weight trust model for identifying trustworthy users and aims at creating communities of trusted users while isolating and reducing interactions with untrustworthy users. Simulations in three different environments show the effectiveness of the framework compared to the original DA-GRS algorithm.


International Journal of Healthcare Technology and Management | 2008

A Bluetooth-enabled mobile intelligent remote healthcare monitoring system: analysis and design issues

Mohamed Tounsi; Basit Qureshi

Many studies have shown that mobile phones are in great demand; smart phones in particular have an ever-growing market. It is evident that with greater number of mobile users, people can be facilitated with mobile accessible applications. Of many beneficial applications one such application is providing remote healthcare on mobile devices. Much work has been done in this area of research; however using Bluetooth enabled smart phones with Wireless Application Protocol (WAP) technology implementing an intelligent remote healthcare system has been proposed. A rule based expert system can identify diagnosis for remotely located patients to off location expert physicians and subsequent analysis can be delivered to the patient relieving her from frequent visits to healthcare service provider thus reducing the load of patients on existing infrastructure. This paper presents design and implementation of Mobile Intelligent Remote Healthcare Monitoring System (MIRHMS) and discusses issues.

Collaboration


Dive into the Basit Qureshi's collaboration.

Top Co-Authors

Avatar

Anis Koubaa

Prince Sultan University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Yasir Javed

Prince Sultan University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Mohamed Tounsi

Prince Sultan University

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge