Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Murad Khalid is active.

Publication


Featured researches published by Murad Khalid.


Journal of Networks | 2011

An Efficient Mutual Authentication and Access Control Scheme for Wireless Sensor Networks in Healthcare

Xuan Hung Le; Murad Khalid; Ravi Sankar; Sungyoung Lee

Wireless sensor networks (WSNs) will play an active role in the 21th Century Healthcare IT to reduce the healthcare cost and improve the quality of care. The protection of data confidentiality and patient privacy are the most critical requirements for the ubiquitous use of WSNs in healthcare environments. This requires a secure and lightweight user authentication and access control. Symmetric key - based access control is not suitable for WSNs in healthcare due to dynamic network topology, mobility, and stringent resource constraints. In this paper, we propose a secure, lightweight public key - based security scheme, Mutual Authentication and Access Control based on Elliptic curve cryptography (MAACE). MAACE is a mutual authentication protocol where a healthcare professional can authenticate to an accessed node (a PDA or medical sensor) and vice versa. This is to ensure that medical data is not exposed to an unauthorized person. On the other hand, it ensures that medical data sent to healthcare professionals did not originate from a malicious node. MAACE is more scalable and requires less memory compared to symmetric key-based schemes. Furthermore, it is much more lightweight than other public key-based schemes. Security analysis and performance evaluation results are presented and compared to existing schemes to show advantages of the proposed scheme.


IEEE Transactions on Vehicular Technology | 2011

Two-Relay-Based Cooperative MAC Protocol for Wireless Ad hoc Networks

Murad Khalid; Yufeng Wang; In-Ho Ra; Ravi Sankar

The cooperative communication approach promises improved throughput and delay performance by effective use of spatial diversity in wireless ad hoc networks. The CoopMAC I protocol proposed by Liu picks either a direct path or a relay path based on rate comparison to enhance average throughput and delay performances. However, its performance deteriorates under fading conditions due to lower direct path or relay path reliability. UtdMAC, which was proposed by Agarwal , performs better than CoopMAC I in terms of average throughput and delay performances due to improved transmission reliability provided by the backup relay path. Although it is better than CoopMAC I, UtdMAC does not fully benefit from higher throughput relay path (compared with the direct path) since it uses relay path only as a secondary backup path. In this paper, a new cooperative medium access control (MAC) protocol, which is termed the 2rcMAC protocol, is proposed for a small-sized network. The protocol makes use of two cooperating nodes to achieve superior throughput and delay performances, compared with the existing cooperative MAC protocols. The secondary relay path is invoked as a backup path for better transmission reliability and higher throughput through the relay path. Moreover, handshaking and single-bit feedbacks resolve contentions among relay nodes in proximity at the time and further provide the source node with rate information on source-to-destination, source-to-relay, and relay-to-destination links. Performance gains achieved by the 2rcMAC protocol under fast-fading conditions over the existing cooperative MAC protocols are compared and discussed. Simulation results clearly show an average throughput improvement of 7% and 25% and an average delay improvement of 94.8% and 98.9%, compared with UtdMAC and CoopMAC I, respectively.


Information Sciences | 2010

Activity-oriented access control to ubiquitous hospital information and services

Xuan Hung Le; Sungyoung Lee; Young Koo Lee; Heejo Lee; Murad Khalid; Ravi Sankar

In hospital information systems, protecting the confidentiality of health information, whilst at the same time allowing authorized physicians to access it conveniently, is a crucial requirement. The need to deliver health information at the point-of-care is a primary factor to increase healthcare quality and cost efficiency. However, current systems require considerable coordination effort of hospital professionals to locate relevant documents to support a specific activity. This paper presents a flexible and dynamic access control model, Activity-Oriented Access Control (AOAC), which is based on user activity to authorize access permissions. A user is allowed to perform an activity if he/she holds a number of satisfactory attributes (i.e. roles, assignments, etc.) under a specified condition (e.g. time, location). Results of AOAC implementation in a realistic healthcare scenario have shown to meet two important requirements: protecting confidentiality of health information by denying an unauthorized access, and allowing physicians to conveniently browse medical data at the point-of-care. Furthermore, the average execution time was 0.078s which allows AOAC to work in real-time.


Journal of Communications and Networks | 2009

An energy-efficient access control scheme for wireless sensor networks based on elliptic curve cryptography

Xuan Hung Le; Sungyoung Lee; Ismail Butun; Murad Khalid; Ravi Sankar; Miso Hyoung-Il Kim; Manhyung Han; Young-Koo Lee; Heejo Lee

For many mission-critical related wireless sensor network applications such as military and homeland security, users access restriction is necessary to be enforced by access control mechanisms for different access rights. Public key-based access control schemes are more attractive than symmetric-key based approaches due to high scalability, low memory requirement, easy key-addition/revocation for a new node, and no key pre-distribution requirement. Although Wang et al. recently introduced a promising access control scheme based on elliptic curve cryptography (ECC), it is still burdensome for sensors and has several security limitations (it does not provide mutual authentication and is strictly vulnerable to denial-of-service (DoS) attacks). This paper presents an energy-efficient access control scheme based on ECC to overcome these problems and more importantly to provide dominant energy-efficiency. Through analysis and simulation based evaluations, we show that the proposed scheme overcomes the security problems and has far better energy-efficiency compared to current scheme proposed by Wang et al.


wireless telecommunications symposium | 2010

Impact of mobility prediction on the performance of Cognitive Radio networks

Ismail Butun; A. Cagatay Talay; D. Turgay Altilar; Murad Khalid; Ravi Sankar

Wireless technology has enabled the development of increasingly diverse applications and devices resulting in an exponential growth in usage and services. These advancements made the radio frequency spectrum a scarce resource, and consequently, its efficient use is of the ultimate importance. To cope with the growing demand, network design focused on increasing the spectral efficiency by making use of advancement in Cognitive Radio technology. Cognitive Radio can reduce the spectrum shortage problem by enabling unlicensed users equipped with Cognitive Radios to reuse and share the licensed spectrum bands. Using the fact that a Cognitive Radio is capable of sensing the environmental conditions and automatically adapting its operating parameters in order to enhance network performance, we would like to make use of its knowledge to predict the mobility of Cognitive Radio users to improve the overall performance of the Cognitive Radio network. This study makes novel use of mobility prediction techniques to enhance reliability, bandwidth efficiency and scalability of the cognitive radio networks. Firstly, prediction techniques are evaluated and compared for prediction accuracy. Secondly, routing protocol reliability, efficiency and scalability performances are evaluated under different prediction techniques. Simulation results verify the performance improvements even with moderate accuracy predictors. Results clearly show that hybrid Markov CDF prediction performs the best. When compared with no prediction it significantly improves average reliability and efficiency by 11% and 8%, respectively.


Eurasip Journal on Wireless Communications and Networking | 2011

Coherence time-based cooperative MAC protocol 1 for wireless ad hoc networks

Murad Khalid; Yufeng Wang; Ismail Butun; Hyung Jin Kim; In-Ho Ra; Ravi Sankar

In this article, we address the goal of achieving performance gains under heavy-load and fast fading conditions. CoopMACI protocol proposed in Proceedings of the IEEE International Conference on Communications (ICC), Seoul, Korea, picks either direct path or relay path based on rate comparison to enhance average throughput and delay performances. However, CoopMACI performance deteriorates under fading conditions because of lower direct path or relay path reliability compared to UtdMAC (Agarwal et al. LNCS, 4479, 415-426, 2007). UtdMAC was shown to perform better than CoopMACI in terms of average throughput and delay performances because of improved transmission reliability provided by the backup relay path. Although better than CoopMACI, UtdMAC does not fully benefit from higher throughput relay path (compared to the direct path), since it uses relay path only as a secondary backup path. In this article, we develop a cooperative MAC protocol (termed as instantaneous relay-based cooperative MAC--IrcMAC) that uses channel coherence time and estimates signal-to-noise ratio (SNR) of source-to-relay, relay-to-destination, and source-to-destination links, to reliably choose between relay path or direct path for enhanced throughput and delay performances. Unique handshaking is used to estimate SNR and single bit feedbacks resolve contentions among relay nodes, which further provides source node with rate (based on SNR) information on source-to-destination, source-to-relay, and relay-to-destination links. Simulation results clearly show that IrcMAC significantly outperforms the existing CoopMACI and the UtdMAC protocols in wireless ad hoc network. Results show average throughput improvements of 41% and 64% and average delay improvementd of 98.5% and 99.7% compared with UtdMAC and CoopMACI, respectively.


ad hoc networks | 2013

Polarization-based cooperative directional MAC protocol for ad hoc networks

Murad Khalid; Xuan Hung Le; In-Ho Ra; Ravi Sankar

Numerous directional medium access control (DMAC) protocols have been developed to enhance the capacity of ad hoc networks using the underlying advanced physical layer techniques, such as beam-forming, multiuser detection (MUD), and multiple-input-multiple-output (MIMO). In this paper, we propose an innovative fully distributed DMAC protocol that cooperatively makes use of polarization diversity in low-mobility urban/suburban outdoor wireless ad hoc network environment. In the proposed cooperative polarization DMAC protocol (CPDMAC), each node directionally senses on both vertical and horizontal polarizations and dynamically adapts polarization that minimizes overall interference in the ad hoc network. Analysis is performed to establish relationship between vertically and horizontally polarized nodes in the network. Further, a theoretical lower bound is derived for probability of successful transmission to show capacity improvement as a function of cross polarization ratio (CPR). Simulation results confirm from 2% up to 400% improvement in average node throughput at data rate of 1.95Mbps when compared to the traditional DMAC protocol. Moreover, our study clearly shows that the average throughput difference increases with increasing node density when compared to the traditional DMAC protocol.


IEEE Communications Letters | 2010

ADMAC with Integrated Destination Discovery for Ad Hoc Networks

Murad Khalid; Xuan Hung Le; In-Ho Ra; Ravi Sankar

Directional antennas have shown to increase spatial reuse by allowing multiple transmitters and receivers to concurrently communicate using directional beams as long as they do not significantly interfere with each other. This appreciably increases average aggregate throughput of the network. Generally, for high throughput performance the directional MAC (Medium Access Control) protocols choose a random direction for destinations location and subsequent data transmissions. Under situations of heavy load, high mobility and narrow beam-width, frequent updates are required to track the destinations. However, frequent updates may degrade the effective throughput of the network. Hence, we propose a novel Adaptive Directional MAC (ADMAC) protocol with integrated destination discovery that estimates destinations possible search span and then initiates transmission in that search span direction. Another major contribution is the average throughput performance comparison between last sector (LS), random sector (RS) and search span approaches. Average throughput results show an improvement of up to 40 % and greater than 400 %, when compared to the LS and the RS based DMAC protocols, respectively.


2012 International Conference on Computing, Networking and Communications (ICNC) | 2012

Hybrid cooperative MAC protocol for wireless ad hoc networks

Murad Khalid; Yufeng Wang; In-Ho Ra; Ravi Sankar

In this paper, we propose hybrid cooperative medium access control (MAC) protocol that adaptively uses single relay path or two relay paths for enhanced throughput and delay performance under fast Rayleigh fading conditions. The proposed protocol, termed as 2rcMAC, invokes two best relay (cooperating) paths for improved spatial diversity that offer higher transmission rate compared to the direct transmission path. It transmits through primary relay path for higher throughput performance and uses secondary relay path for reliable backup transmission. In case, only one best relay path (with higher rate than the direct transmission path) is available, the 2rcMAC protocol transmits directly to the destination node and invokes the secondary relay path for backup transmission only. Furthermore, handshaking and single bit feedback in 2rcMAC protocol resolve contentions among relay nodes in close proximity at the time, and further provide source node with rate information on source-to-destination, source-to-relay and relay-to-destination links. Simulation results clearly show average throughput improvement of 7% and 25% and average delay improvement of 94.8% and 98.9% compared to UtdMAC and CoopMAC I, respectively [4], [5], [7].


embedded and ubiquitous computing | 2008

A Scenario-based Directional Communication Performance in Wireless Ad hoc Networks

Murad Khalid; In-Ho Ra; Young Hoon Joo; Ravi Sankar

Ad hoc wireless networks operate without any infrastructure where a node can be a source and a router at the same time. This indispensably requires high throughput and low delay performance throughout the wireless network coverage span, particularly under heavy traffic conditions. Recent research on using multiple antennas in beam-forming or multiplexing modes over a wireless channel has shown promising results in terms of high throughput and low delay. Directional antennas have shown to increase spatial reuse by allowing multiple transmitters and receivers to communicate using directional beams as long as they do not significantly interfere with each other. However, directional antenna performance asymptotically approaches the omni-directional performance in a high density ad hoc network. Simulation results in QualNet validate that average throughput and packet corruption ratio of directional antenna approach omni-directional performance.

Collaboration


Dive into the Murad Khalid's collaboration.

Top Co-Authors

Avatar

Ravi Sankar

University of South Florida

View shared research outputs
Top Co-Authors

Avatar

In-Ho Ra

Kunsan National University

View shared research outputs
Top Co-Authors

Avatar

Xuan Hung Le

University of South Florida

View shared research outputs
Top Co-Authors

Avatar

Yufeng Wang

University of South Florida

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Ismail Butun

University of South Florida

View shared research outputs
Top Co-Authors

Avatar

Young Hoon Joo

Kunsan National University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Hyung Jin Kim

Catholic University of Korea

View shared research outputs
Top Co-Authors

Avatar

In Ho Ra

Kunsan National University

View shared research outputs
Researchain Logo
Decentralizing Knowledge