Noor Ul Amin
Hazara University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Noor Ul Amin.
international conference on networking sensing and control | 2012
Noor Ul Amin; Muhammad Asad; Nizamuddin; Shehzad Ashraf Chaudhry
In recent years personal health monitoring Body Sensor Network (BSN) have got significant importance. Due to its sensitive and constrained nature, health data should be transported / kept confidentially, therefore, lightweight cryptographic technique and key management schemes are required in BSN. In this paper we have proposed a hybrid authenticated key agreement with rekeying for Body Sensor Network. Our scheme is based on Symmetric and Elliptic Curve Cryptography. The proposed scheme reduces seventy four percent memory requirements for keys storage, eighty seven percent Computation Cost and sixty one percent Communication Overhead.
international conference on networking sensing and control | 2013
Hizbullah Khattak; N. Nizamuddin; F. Khurshid; Noor Ul Amin
A mobile ad hoc network (MANETs) is a set of mobile nodes where every node communicates with each other without any predefined infrastructure and centralized administration. Due to the openness of its nature it is vulnerable to various kinds of threats. Ad hoc on demand distance vector (AODV) is a routing protocol being used for wireless ad hoc network. Black hole and gray hole are the imminent attacks that are launched on AODV. Both the attacks claim the shortest route to the destination and exploit this later by dropping the packets. In our proposed scheme, we use the second optimal route for data packets transmission and hash function for black and gray holes attacks avoidance and data integrity.
international conference on digital information management | 2013
Mohib Ullah; Arif Iqbal Umar; Noor Ul Amin; Nizamuddin
Electronic voting system provides convenience and access to the electorate without the geographical restrictions. Mobile phone is one of the emerging technologies to perform e-voting with democratic norms and privacy concern. In this paper we suggest a mobile phone voting protocol based on hybrid cryptosystem. Protocol consists of three phases: online registration; vote casting and vote collecting and result phase. Proposed protocol provides secure and efficient online vote casting and can also be implemented parallel with paper ballot voting system. Proposed protocol has efficiency, security and deployable in developing countries due to its reliance on SMS messaging without requiring internet connectivity.
2013 2nd National Conference on Information Assurance (NCIA) | 2013
Jawaid Iqbal; Nizamuddin; Noor Ul Amin; Arif Iqbal Umar
Wireless Body Area Network (WBAN) has become imperative due to rapid advancement in medical technology. However, WBAN faces different security issues due to open air communication of information. In this paper, we have proposed a lightweight smart crypto solution using authenticated key exchange coupled with cluster head formation and selection for the security of WBAN. Our proposed solution logically combines cluster head selection with key agreement that fulfills the security requirement of wireless body area network, efficient in term of resource utilization.
Zeitschrift für Physikalische Chemie | 2018
Mohib Ullah; Luqman Ali Shah; Murtaza Sayed; Muhammad Siddiq; Noor Ul Amin
Abstract This study pertains to theoretical aspect of membrane and surfactant supported ultrafiltration technique followed by experimental evaluation of rejection percentage (R%) and permeate flux (J). The organic dye malachite green (MG) was removed from water samples with help of micellar solution of sodium dodecyl sulfate (SDS) surfactant on account of effective surfactant-dye interaction. The MG removal from water was result of electrostatic force of attraction between Stern layer of SDS micelles and cationic MG in addition to hydrophobic-hydrophobic interaction. The regenerated cellulose membrane was used to retain enhanced MG-SDS micellar complex from polluted water in stirred ultrafiltration cell. R% of MG increases from 79.3%, 77%, 76% to 97.5%, 95%, 90% for 0.01, 0.1 and 0.2 mM concentrations, respectively. “J” decreases throughout the experiment on account of membrane plugging or concentration polarization. Hydrodynamic radius (Rh) of SDS surfactant was also determined at its post micellar concentrations by dynamic laser light scattering (DLLS) that shows high rejection percentage with increased Rh values.
International Journal of Advanced Computer Science and Applications | 2018
Hizbullah Khattak; Noor Ul Amin; Ikram ud Din; Insafullah; Jawaid Iqbal
Information-Centric Networking is a name based internet architecture and is considered as an alternate of IP base internet architecture. The in-network caching feature used in ICN has attracted research interests as it reduces network traffic, server overload and minimizes latency experienced by end users. Researchers have proposed different caching policies for ICN aiming to optimize performance metrics, such as cache hits, diversity and eviction operations. In this paper, we propose a novel caching strategy of LeafPopDown for ICN that significantly reduces eviction operation and enhances cache hits and diversity in ICN.
International Journal of Advanced Computer Science and Applications | 2017
Jawaid Iqbal; Noor Ul Amin; Arif Iqbal Umar; Nizamud Din
Technological evolvement of Wireless Sensor Networks (WSNs) gave birth to an attractive research area for health monitoring called Body Sensor Network (BSN). In BSN tiny sensor nodes sense physiological data of patients under medical health care and transmit this data to Base Station (BS) and then forward to Medical Server (MS). BSN is exposed to security threats due to vulnerable wireless channel. Protection of human physiological data against adversaries is a major addressable issue while keeping constrained resources of BSN under consideration. Our proposed scheme consists of three stages. In first stage deployment of initial secret key by the ward Medical Officer (MO), in second stage secure key exchange and node authentication, in third stage secure data communication are performed. We have compared our proposed scheme with three existing schemes. Our scheme is efficient in computation cost, communication overhead and storage as compared to existing schemes while providing enough security against the adversaries.
International Journal of Advanced Computer Science and Applications | 2016
Muhammad Ali Khan; Arif Iqbal Umar; Babar Nazir; Noor Ul Amin; Shaukat Mehmood; Kaleem Habib
In this research an efficient data gathering scheme is presented using mobile sink as data collector with Clustering as sensor organizer in a randomly organized sensors in sensing field for wireless sensor network. The scheme not only extends the network lifetime through clustering process but also improves the data gathering mechanism through efficient and simplified mobile sink movement scheme. The cluster heads selection is based on both energy and data weight, which gathering all the data from the nodes within a cluster and then delivers it to the sink. The single mobile sink which visits the cluster heads as per defined path gathers data periodically. The scheme is organized through “Mobile Sink based Data Gathering Protocol (MSDGP)” which combines single message energy efficient clustering and data gathering process. For performance evaluation, the protocol is extensively simulated for different performance metrics, namely Residual energy consumption, Number of dead nodes during variable number of rounds and Network lifetime. The results proves that MSDGP is successful in achieving the defined objectives of energy efficiency and is capable of extending the network lifetime by increasing the number of rounds. Therefore, proposed protocol is more suitable for scenarios where sensor nodes generate variable amount of data.
International Journal of Advanced Computer Science and Applications | 2016
Muhammad Shoaib; Zakir Khan; Danish Shehzad; Tamer Dag; Arif Iqbal Umar; Noor Ul Amin
Audio steganography is used to hide secret information inside audio signal for the secure and reliable transfer of information. Various steganography techniques have been proposed and implemented to ensure adequate security level. The existing techniques either focus on the payload or security, but none of them has ensured both security and payload at same time. Data Dependency in existing solution was reluctant for the execution of steganography mechanism serially. The audio data and secret data pre-processing were done and existing techniques were experimentally tested in Matlab that ensured the existence of problem in efficient execution. The efficient least significant bit steganography scheme removed the pipelining hazard and calculated Steganography parallel on distributed memory systems. This scheme ensures security, focuses on payload along with provisioning of efficient solution. The result depicts that it not only ensures adequate security level but also provides better and efficient solution.
Information Assurance and Cyber Security (CIACS), 2014 Conference on | 2014
Riaz Ullah; Nizamuddin; Arif Iqbal Umar; Noor Ul Amin
In this paper blind signcryption using elliptic curves cryptosystem is presented. It satisfies the functionalities of Confidentiality, Message Integrity, Unforgeability, Signer Non-repudiation, Message Unlink-ability, Sender anonymity and Forward Secrecy. The proposed scheme has low computation and communication overhead as compared to existing blind Signcryption schemes and best suited for mobile phone voting and m-commerce.