Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Mukhtar Hussain is active.

Publication


Featured researches published by Mukhtar Hussain.


information security and assurance | 2009

Hardware-Based Random Number Generation in Wireless Sensor Networks(WSNs)

Rabia Latif; Mukhtar Hussain

A wireless sensor network (WSN) is an emerging area and almost all of its major security issues are currently in research. The Security of mobile sensor networks relies on cryptographic protocols. The strength of cryptographic protocols depends on the strength of secret key used. Therefore it is critical that the generated key be highly random and difficult to guess. Cryptographic requirement for random numbers and the inadequacies of software methods have created a need for inexpensive and secure methods of generating random numbers. We present a hardware based technique for random number generation based on Received Signal Strength Indicator (RSSI), which is a function of transmission power. Analysis shows that this method provides cryptographically secure random numbers without the use of any additional hardware.


2009 Fifth International Conference on IT Security Incident Management and IT Forensics | 2009

An Automated User Transparent Approach to log Web URLs for Forensic Analysis

Muhammad Kamran Ahmed; Mukhtar Hussain; Asad Raza

This paper presents an automated approach to record web activity as the user connects to Internet. It includes monitoring and logging of web URLs visited by the user. The distinctive features of this approach are a) it starts automatically, b) it is transparent to users, c) it is robust against intentional or un-intentional process kill, and d) it is robust against intentional or un-intentional corruption or deletion of log file. The first feature is achieved as the program/application will run with svchost.exe service which is initiated automatically. Transparency is achieved by storing the log file to a default hidden location defined by system variables as well as at a third location (logging server) on the network. Process killing is prevented through dependencies of this application on essential service required to connect to network and thus World Wide Web. The last feature determines that a log activity is also stored in logging server (not accessible to users) even if a user deletes or corrupts it from his local system. The log file contains important information of client, username, date and time of activity and URLs visited. The approach can give vital and potential evidential information of corporate web policy violations, employee monitoring, and law enforcement agencies (digital forensics investigators). This paper also carries out a comparative analysis of the performance and security of proposed scheme against some existing Web forensic and antiforensic tools.


Eurasip Journal on Wireless Communications and Networking | 2012

Modeling interaction using trust and recommendation in ubiquitous computing environment

Naima Iltaf; Abdul Ghafoor; Mukhtar Hussain

To secure computing in pervasive environment, an adaptive trust and recommendation based access control model (based on human notion of trust) is proposed. The proposed model provides support to calculate direct as well as indirect trust based on recommendations. It handles situations (by itself) both in which the requesting entity has a past experience with the service and a stranger entity requesting to access the service without any past interaction with the service. It encompasses the ability to reason human cognitive behavior and has the capability to adjust in accordance with behavioral pattern changes. X-bar control chart is used to handle malicious recommendation. The defense mechanisms incorporated by proposed model against attacks such as bad mouthing attack, oscillating behavior attack and conflicting behavior attack are also demonstrated.


Wireless Personal Communications | 2014

An Effective Model for Indirect Trust Computation in Pervasive Computing Environment

Naima Iltaf; Abdul Ghafoor; Usman Zia; Mukhtar Hussain

The performance of indirect trust computation models (based on recommendations) can be easily compromised due to the subjective and social-based prejudice of the provided recommendations. Eradicating the influence of such recommendation remains an important and challenging issue in indirect trust computation models. An effective model for indirect trust computation is proposed which is capable of identifying dishonest recommendations. Dishonest recommendations are identified by using deviation based detecting technique. The concept of measuring the credibility of recommendation (rather than credibility of recommender) using fuzzy inference engine is also proposed to determine the influence of each honest recommendation. The proposed model has been compared with other existing evolutionary recommendation models in this field, and it is shown that the model is more accurate in measuring the trustworthiness of unknown entity.


information security and assurance | 2009

A Secure Group Rekeying Scheme with Compromised Node Revocation in Wireless Sensor Networks

Asma Khalid; Mukhtar Hussain

Security is one of the core concerns in group communication in wireless sensor networks (WSNs). Secure group key management schemes are responsible for secure distribution of group keys among valid nodes in a group. We are representing a secure group re-keying scheme with compromised nodes revocation in WSNs. This scheme represents function of joining and leaving of nodes in a group. As WSNs are exposed to threats, so compromised node revocation is a challenging task. Our main focus is revocation of compromised nodes from a group without re-grouping. And also when a compromised node is revoked; it is unable to join any new group in future. In the scheme, we are updating the pre-deployed keys as well as current group keying material. Thus compromised node is unable to continue with current and future groups. Scheme is examined for verification of its computational and security requirement.


asia-pacific services computing conference | 2011

STEP-a: An Algorithmic Approach towards Trust Based Security in Pervasive Computing Environment

Naima Iltaf; Abdul Ghafoor; Mukhtar Hussain

-- To secure computing in pervasive environment, an adaptive algorithmic approach for access control (based on human notion of trust) is proposed. The proposed model provides support to calculate direct trust in situations when the requesting entity has a past experience with the service. It encompasses the ability to reason human cognitive behavior and has the capability to adjust in accordance with behavioral pattern changes. An adaptive policy based management is proposed to handle strategic malicious behavior. The defense mechanism incorporated by proposed model against strategic attack is also demonstrated. Finally we have compared our model with existing evolutionary models in this field.


network-based information systems | 2009

Secure Routing and Broadcast Authentication in Heterogeneous Sensor Networks

Aasma Abid; Mukhtar Hussain; Firdous Kausar

Security of sensor network communication architecture relies on its routing scheme. This paper presents a secure routing scheme for heterogeneous sensor networks (HSNs). HSNs have proven to be more secure and scalable as compared to homogeneous sensor networks which are prone to routing attacks due to resource constraints. In our proposed scheme, routing tables are generated with multipath routing. Base station generates inter-cluster routes and cluster head generates intra-cluster routes. This minimizes the computation load on cluster nodes. We also provide light-weight broadcast authentication used for secure routing table generation and data communication; and to reduce communication overhead. Further, proposed scheme introduces security architecture with in routing protocol. The analysis of proposed scheme shows that it is secure against routing attacks and tolerant to compromised nodes.


consumer communications and networking conference | 2012

An adaptive framework for trust based security in pervasive computing environment

Naima Iltaf; Abdul Ghafoor; Mukhtar Hussain

An adaptive trust based security architecture (based on human notion of trust) as a mechanism to secure computing in pervasive environment is proposed. The model encompasses the ability to reason human cognitive behavior and has the capability to adjust in accordance with behavioral pattern changes. This capability is currently lacking in the existing models as they rely only on mathematical calculation. A strategic attack-based analysis is used for evaluation of the proposed model. Finally we have compared our model with existing evolutionary models in this field.


asia-pacific services computing conference | 2011

On Trust Management for Multimedia P2P Applications in Autonomic Networking

Naima Iltaf; Abdul Ghafoor; Mukhtar Hussain

Trust management for multimedia P2P applications in autonomic networking, which is a mathematical evolutionary model and uses historical behaviour for trust calculation is critically analyzed. It is shown that this model is not attack resistant. Several critical remarks on its behaviour are given. An improvement is presented to overcome these shortcomings.


computer science and its applications | 2009

Evaluation of Framework for the Comparative Analysis of Symmetric Block Ciphers

Muhammad Junaid; Mukhtar Hussain; Ashraf Masood; Firdous Kausar; Ayesha Noreen; M. Arif Whala

The security and efficiency in terms of performance are the core requirements of cryptographic based algorithms. Recommendations proposed by the FIPS 140-2 standard emphasis on the correct implementations of the cryptographic algorithms after passing through a number of tests. Performance tests provide more security and efficient implementations on different operating systems and platforms (32 bits). The proposed work helps in selecting the best Block Cipher after performing various tests. This work is more focused on performing a comprehensive efficiency based analysis on different types of the most frequently used data in various formats like Text, Images, Audio/Video streams etc.

Collaboration


Dive into the Mukhtar Hussain's collaboration.

Top Co-Authors

Avatar

Abdul Ghafoor

National University of Sciences and Technology

View shared research outputs
Top Co-Authors

Avatar

Naima Iltaf

National University of Sciences and Technology

View shared research outputs
Top Co-Authors

Avatar

Firdous Kausar

National University of Sciences and Technology

View shared research outputs
Top Co-Authors

Avatar

Aasma Abid

National University of Sciences and Technology

View shared research outputs
Top Co-Authors

Avatar

Ashraf Masood

National University of Sciences and Technology

View shared research outputs
Top Co-Authors

Avatar

Rabia Latif

National University of Sciences and Technology

View shared research outputs
Top Co-Authors

Avatar

Asad Raza

National University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Asma Khalid

National University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Muhammad Kamran Ahmed

National University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Jong Hyuk Park

Seoul National University of Science and Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge