Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Imran Memon is active.

Publication


Featured researches published by Imran Memon.


Wireless Personal Communications | 2015

Travel Recommendation Using Geo-tagged Photos in Social Media for Tourist

Imran Memon; Ling Chen; Abdul Majid; Mingqi Lv; Ibrar Hussain; Gencai Chen

In recent years, million geo-tagged photos are available in online web service like Flickr, panoramio, etc. People contributing geo-tagged photo and share their travel experiences these media. The photo itself has important information sharing reveals like location, time, tags, title, and weather. We recommend the new method locations travel for tourists according their time and their preference. We get travel user preference according his/her past time in one city and recommendation another city. We examine our technique collect dataset from Flickr publically available and taken different cities of china. Experiment results show that our travel recommendation method according to tourist time capable to predict tourist location recommendation famous places or new places more precise and give better recommendation compare to state of art landmarks recommendation method and personalized travel method.


Wireless Personal Communications | 2015

Enhanced Privacy and Authentication: An Efficient and Secure Anonymous Communication for Location Based Service Using Asymmetric Cryptography Scheme

Imran Memon; Ibrar Hussain; Rizwan Akhtar; Gencai Chen

Past few years, the mobile technology and location based services have experienced a great increment in number of its users. The privacy issues related to these services are becoming main concerns because of the leakage of users’ private information and contents. To prevent revelation of private information, many researchers have proposed several secure and authentication schemes which apply various technologies to provide integral security properties, such as symmetric encryption, digital signature, timestamp, etc. Unfortunately, some of these schemes still exhibit security and efficiency issues. In this research paper, we proposed an efficient and secure anonymous communication for location based service using asymmetric cryptography scheme over the wireless system was attempted missing some system detail. We also proposed the prevent user private information and secure communication by asymmetric cryptography scheme. We solved the wireless communication problem in A3 algorithm such as eavesdropping and this problem solved by asymmetric cryptography scheme because of its robustness against this type of attack by providing mutual authentication make the system more secure. Finally, performance and cost analysis show our scheme is more suitable for low-power and resource limited wireless system and thus availability for real implementation. According to our security analysis and performance, we can prove that our proposed asymmetric cryptography scheme is able to improve wireless communication system security and enhance efficiency in comparison to previous schemes.


Wireless Personal Communications | 2015

A Secure and Efficient Communication Scheme with Authenticated Key Establishment Protocol for Road Networks

Imran Memon

The authentication protocols are trusted components in a communication system in order to protect sensitive information against a malicious adversary in the road network environment by means of providing a variety of services including users’ privacy and authentication. Authenticated key agreement protocol is a useful cryptographic primitive, which can be used to protect the confidentiality, integrity and authenticity for transmitted data over insecure networks. From the point of view of the management of pre-shared secrets, one of the advantages of three-party authenticated key agreement protocols is that they are more suitable for use in a network with large numbers of users compared with two-party authenticated key agreement protocols. Using smart cards is a practical, secure measure to protect the secret private keys of a user. In this paper, we introduce an Authentication key establishment protocol for IPv6-based Road networks. In this architecture, a mobile vehicle obtains a unique address from a neighbor mobile vehicle or a road side unit without duplicate address detection, and the leaving mobile vehicle’s address space can be automatically reclaimed for reassignment. If the next mobile vehicle located is in transmission range, then the mobile vehicle forwards the packets; if not, then it carries the packets until meeting. The carry mostly occurs on sparsely populated road segments; with long carry distances having long end-to-end packet delays. On the other hand, we also describe a new authentication method based on a cryptographic protocol including a zero-knowledge proof that each node must use to convince another node on the possession of certain secret without revealing anything about it, which allows encrypted communication during authentication. The proposed protocol featured with the following characteristics: Firstly, it offers anonymous authentication: a message issuer can authenticate itself. Secondly, it provides confidential: the secrecy of the communication content can be protected. The address configuration scheme must lower the cost in order to enhance the scalability. Thirdly, it is efficient: it achieves low storage requirements, fast message verification and cost-effective identity tracking in case of a dispute. In this paper, we evaluate the performance of this protocol. The data results show that protocol effectively improves the address configuration performance and our scheme is secure against passive and active attacks. Our scheme provides high security along with low computational and communication costs. As a result, our scheme is practically suitable for mobile devices in the road network environment as compared to other related schemes in the literature.


Wireless Personal Communications | 2015

Architecture of Hybrid Mobile Social Networks for Efficient Content Delivery

Rizwan Akhtar; Supeng Leng; Imran Memon; Mushtaq Ali; Liren Zhang

Content delivery is one of the most important technologies used in Mobile Social Networks (MSNs). Smart devices could enable mobile users to create and use a rich set of services through available resources in the surrounding environment opportunistically. This paper presents the framework of distributed buffer storage aided hybrid Mobile Social Networks (MSN). Based on this, we propose a new scheme with distributed storage for efficient end-to-end content delivery in intermittently connected MSNs. Our proposed hybrid architecture is able to offer fast and reliable delivery services by distributing buffer storage located close to mobile users of the opportunistic MSN. Simulation experiments are conducted to evaluate the performance of the proposed method, which indicate that it is helpful to improve network performance in terms of content delivery ratio, throughput and end-to-end delays.


Wireless Personal Communications | 2015

Authentication User's Privacy: An Integrating Location Privacy Protection Algorithm for Secure Moving Objects in Location Based Services

Imran Memon

Location based services (LBSs) are gaining importance due to the advancement in mobile networks and positioning technologies. The proliferation of location-based services in recent years has highlighted the need to consider location privacy. This has led to the development of methods enhancing location privacy, and to the investigation of reasons for sharing location information. While computational attacks on location privacy and their prevention have attracted a lot of research, attacks based on humans strategies and tactics have mostly been considered implicitly. Nevertheless, in querying LBSs, a user send its exact locations to their location service providers but in the process, location information of the users are misused either purposefully or otherwise by service providers creating privacy issues for users. It has therefore become important that mechanisms necessary to protect the privacy of users are adopted when querying location based services. It’s on this premise that we introduced a novel query privacy algorithm called the authentication speed dynamic transportation mode cloaking algorithm for continuous query LBSs that considers users’ similarity in speed, direction and travelling with the same transport mode for cloaking for anonymization. Experimental evaluation of the algorithm on a real world map shows that our model ensures total privacy for users, enhanced privacy guarantee, improves quality of service significantly and achieved an excellent performance measure also we compare our method with existing privacy protection methods such as V-DCA, DSDCA, AVD-DCA,D-TC and GCA.


Multimedia Tools and Applications | 2017

GEO matching regions: multiple regions of interests using content based image retrieval based on relative locations

Muhammad Hammad Memon; Jian-Ping Li; Imran Memon; Qasim Ali Arain

Information retrieval systems are getting more attention in the era of multimedia technologies such as an image, video, audio and text files. The large numbers of images are challenges in computer systems field to store, manage data effectively and efficiently. The shape retrieval feature of different objects in the image also remains a difficult problem due to distinct angle view of different objects in a scene only; few studies have reported solution to the problem of finding relative locations of ROIs. In this paper, we proposed three methods such as1. Geolocation-based image retrieval (GLBIR), 2.Unsupervised feature technique Principal component analysis (PCA) and 3.multiple region-based image retrieval. The first proposed (GLBIR) method identifies geo location an image using visual attention based mechanism and its color layout descriptors. These features are extracted from geo-location of query image from Flickr database. Our proposed model does not fully semantic understanding of image content, uses visual metrics for example; the proximity ,color contrast, size and nearness to image’s boundaries to locate viewer’s attention. We analyzed results and compared with state of art CBIR Systems and GLBIR Technique. Our second method to refine images exploiting and fusing by unsupervised feature technique using principal component analysis (PCA). The visually similar images clustering together with analyses image retrieval process and remove outliers initially retrieved image set by PCA. To evaluation our proposed approach, we used thousands of images downloaded from Flickr and CIFAR-10 databases using Flickr public API. Finally, we determinately proposed a system for image retrieval based on region. It provides a user interface for availing to designate the watershed ROI within an input image. During the retrieval of images, regions’ feature vectors having codes of region homogeneous to a region of input image are utilized for comparison. Standard datasets are used for evaluation of proposed approach. The experiment demonstrates and effectiveness of the proposed method to achieve higher annotation performance increases accuracy and reduces image retrieval time. We evaluated our proposed approach on images dataset from Flickr and CIFAR-10.


Wireless Personal Communications | 2014

Design and Implementation to Authentication over a GSM System Using Certificate-Less Public Key Cryptography (CL-PKC)

Imran Memon; Mohammed Ramadan Mohammed; Rizwan Akhtar; Hina Memon; Muhammad Hammad Memon; Riaz Ahmed Shaikh

Recent years, the mobile technology has experienced a great increment in the number of its users. The GSM’s architecture provides different security features like authentication, data/signaling confidentiality and secrecy of user yet the channel is susceptible to replay and interleaved. It always remains relevant as it is important in all types of application. Global system for mobile (GSM) communications has become the most popular standard for digital cellular communication. The GSM security system depends on encryption, authentication algorithms and information from SIM card. In this research paper, we proposed the design and implementation of a new authentication scheme by using certificate-less public key cryptography (CL-PKC) over the GSM system was attempted to miss some system detail. This research paper, we also proposed the GSM system and its security and public key cryptography with a focus in the CL-PKC; the CL-PKC is a simple, useful and robust security scheme designed and implemented over GSM. Our approach is more efficient than other competing topologies. We solved the GSM problem in A3 algorithm such as eavesdropping and this problem solved by CL-PKC because of its robustness against this type of attack by providing mutual authentication make the system more secure.


Wireless Personal Communications | 2017

Clustering Based Energy Efficient and Communication Protocol for Multiple Mix-Zones Over Road Networks

Qasim Ali Arain; Muhammad Aslam Uqaili; Zhongliang Deng; Imran Memon; Jichao Jiao; Muhammad Akram Shaikh; Asma Zubedi; Aisha Ashraf; Usman Ali Arain

The collection of information is one of the most crucial processes in many internet-enabled applications for multiple mix-zones over road networks. It is essential to use road networks for prolonged time duration in an energy efficient manner. However, network life time increases in response of reducing the stability period (i.e. time required before first node dies).The stability period reduces due to the high energy variance of nodes. In this paper, we present a protocol named as clustering based energy efficient and communication protocol (CEECP) for multiple mix-zones over road networks, which is proposed to reduce the loop holes of prevailing clustering protocols. Additionally, we present a novel CEECP for chain scenario to connect with the road side units for gaining benefits of V2V as well as, V2I communication for Cooperative Traffic Information Systems. The stability period is responsible to preserve coverage properties of the network. It analysis that as the stability period increases, the trustworthiness of the network increases. Hence, it is indispensable to articulate a clustering protocol that shall be energy efficient, low energy variant and of high stability. It has been proved that our scheme outperforms SEECP and VBN as well as, includes its variants with respect to stability period and energy variance.


International Journal of Communication Systems | 2017

Search me if you can: Multiple mix zones with location privacy protection for mapping services

Imran Memon; Qasim Ali Arain; Muhammad Hammad Memon; Farman Ali Mangi; Rizwan Akhtar

Summary The mobile vehicle is gaining popularity nowadays using map services like Google Maps and other mapping services. However, map services users have to expose sensitive information like geographic locations (GPS coordinates) or address to personal privacy concerns as users share their locations and queries to obtain desired services. Existing mix zones location privacy protection methods are most general purposed and theoretical value while not applicable when applied to provide location privacy for map service users. In this paper, we present new (multiple mix zones location privacy protection) MMLPP method specially designed for map services on mobile vehicles over the road network. This method enables mobile vehicle users to query a route between 2 endpoints on the map, without revealing any confidential location and queries information. The basic idea is to strategically endpoints to nearby ones, such that (1) the semantic meanings encoded in these endpoints (eg, their GPS coordinates) change much, ie, location privacy is protected; (2) the routes returned by map services little change, ie, services usability are maintained. Specifically, a mobile client first privately retrieves point of interest close to the original endpoints, and then selects 2 points of interest as the shifted endpoints satisfying the property of geoindistinguishability. We evaluate our MMLPP approach road network application for GTMobiSim on different scales of map services and conduct experiments with real traces. Results show that MMLPP strikes a good balance between location privacy and service usability.


Wireless Personal Communications | 2017

Privacy Preserving Dynamic Pseudonym-Based Multiple Mix-Zones Authentication Protocol over Road Networks

Qasim Ali Arain; Deng Zhongliang; Imran Memon; Salman Arain; Faisal Kareem Shaikh; Asma Zubedi; Mukhtiar Ali Unar; Aisha Ashraf; Roshan Shaikh

In this paper, we propose an efficient dynamic pseudonymous based multiple mix-zones authentication protocol for privacy preservation to enhance security over road networks. Most of the existing protocols either utilize pseudonym based approaches with certificate revocation list that cause significant communicational and storage overhead or they use group signature based approaches, which are computationally expensive. In this paper, we present a dynamic pseudonymous based multiple mix-zones authentication protocol that only requires mobile vehicles to communicate with reported server for registration and dynamic pseudonym change. Furthermore, we formulate a mechanism to provide users with dynamic pseudonyms named as; base pseudonyms and short time pseudonyms, to achieve users’ privacy. Finally, we analyze our protocol by determining the communication cost as well as various attack scenarios to prove that our approach is most efficient and robust as compared to existing techniques.

Collaboration


Dive into the Imran Memon's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Farman Ali Mangi

University of Electronic Science and Technology of China

View shared research outputs
Top Co-Authors

Avatar

Muhammad Hammad Memon

University of Electronic Science and Technology of China

View shared research outputs
Top Co-Authors

Avatar

Jian-Ping Li

University of Electronic Science and Technology of China

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Deedar Ali Jamro

University of Electronic Science and Technology of China

View shared research outputs
Top Co-Authors

Avatar

Ghulam Fatima Kakepoto

University of Electronic Science and Technology of China

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge