Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Quratulain Arshad is active.

Publication


Featured researches published by Quratulain Arshad.


IEEE Communications Surveys and Tutorials | 2013

Mobile Phone Sensing Systems: A Survey

Wazir Zada Khan; Yang Xiang; Mohammed Y Aalsalem; Quratulain Arshad

Mobile phone sensing is an emerging area of interest for researchers as smart phones are becoming the core communication device in peoples everyday lives. Sensor enabled mobile phones or smart phones are hovering to be at the center of a next revolution in social networks, green applications, global environmental monitoring, personal and community healthcare, sensor augmented gaming, virtual reality and smart transportation systems. More and more organizations and people are discovering how mobile phones can be used for social impact, including how to use mobile technology for environmental protection, sensing, and to leverage just-in-time information to make our movements and actions more environmentally friendly. In this paper we have described comprehensively all those systems which are using smart phones and mobile phone sensors for humans good will and better human phone interaction.


ieee international radar conference | 2016

Oil and Gas monitoring using Wireless Sensor Networks: Requirements, issues and challenges

Wazir Zada Khan; Mohammed Y Aalsalem; Wajeb Gharibi; Quratulain Arshad

Wireless Sensor Networks (WSNs) involve top potential technologies that will dramatically change the way of human living and working. Many scientific, industrial and environmental applications require real time information related to physical events like pressure, temperature or humidity. In the past the only way to transfer the sensed data to control center was through cumbersome, costly wires. But recent advancement in wireless networking enables WSNs to communicate the sensed real time event data wirelessly. WSNs have capabilities of sensing, processing and communicating which make them most suitable for monitoring different oil and gas industries upstream, midstream and downstream operations which help to increase production, decrease the accidents, maintenance cost and malfunctioning. The contributions of this paper are threefold. First, we highlight various characteristics of both WSNs and Oil and Gas Industrial environment. Second, we present major requirements of Oil and Gas industrial operations in the three sectors upstream, midstream and downstream. Third, we present the important issues and challenges specific to Oil and Gas industrial environment which affects the working and efficacy of WSNs. These issues and challenges should be considered by the researchers and developers who are planning to design a WSNs based solution for Oil and Gas monitoring.


Archive | 2016

Enabling Consumer Trust Upon Acceptance of IoT Technologies Through Security and Privacy Model

Wazir Zada Khan; Mohammed Y Aalsalem; Muhammad Khurram Khan; Quratulain Arshad

Internet of Things (IoT) has become a popular paradigm by digitizing our physical world, bringing appealing level of conveniences to community. Besides that consumers embrace potential IoT benefits to them, they are much more concerned about the security and privacy of their data. Since, the increased connectivity between devices and the internet in IoT presents security and privacy related challenges, and the data breach of sensitive personal information can be exploited to harm the consumers; the trust of these consumers on the IoT can be tampered. The success of IoT ultimately depends upon the consumer perceptions about security and privacy in IoT and the level of digital trust of its consumers. Since trust has been an important element to influence consumer’s behavior, thus, it can be stimulated by increased consumer perceptions of both security and privacy of IoT. In this paper we contribute to identify the evolving features of IoT and identify important security and privacy requirements from consumer perspectives. We propose a conceptual security and privacy model and highlighting important threats and challenges on various stages of this model.


ieee international radar conference | 2016

Mobile RFID in Internet of Things: Security attacks, privacy risks, and countermeasures

Wazir Zada Khan; Hussein Mohammed Zangoti; Mohammed Y Aalsalem; Muhammad Zahid; Quratulain Arshad

The Internet of Things (IoTs) is an emerging technological paradigm that entails interconnected smart objects in order to sense, communicate and interact autonomously, finally providing advanced services. This innovative phenomenon makes the smart objects capable of seeing, hearing, thinking and performing jobs by sharing information and coordinating decisions. The potential growth of IoTs is highly dependent upon enabling technologies like RFID technology, Sensor technology, smart technologies and nanotechnology. RFID is the first communication technology that apprehends the concept of M2M, enabling the machines to identify objects, understanding their status, communicating information and taking necessary actions. In this paper we highlight important security and privacy risks/issues, challenges and countermeasures involved in the mobile RFID when it is used in IoTs. The risk mitigation is also pointed out for the attacks and problems involved.


international conference on algorithms and architectures for parallel processing | 2011

A hybrid graphical password based system

Wazir Zada Khan; Yang Xiang; Mohammed Y Aalsalem; Quratulain Arshad

In this age of electronic connectivity, where we all face viruses, hackers, eavesdropping and electronic fraud, there is indeed no time when security is not critical. Passwords provide security mechanism for authentication and protection services against unwanted access to resources. A graphical based password is one promising alternatives of textual passwords. According to human psychology, humans are able to remember pictures easily. In this paper, we have proposed a new hybrid graphical password based system, which is a combination of recognition and recall based techniques that offers many advantages over the existing systems and may be more convenient for the user. Our scheme is resistant to shoulder surfing attack and many other attacks on graphical passwords. This resistant scheme is proposed for small mobile devices (like smart phones i.e. ipod, iphone, PDAs etc) which are more handy and convenient to use than traditional desktop computer systems.


Journal of Network and Computer Applications | 2018

Wireless Sensor Networks in oil and gas industry: Recent advances, taxonomy, requirements, and open challenges

Mohammed Y Aalsalem; Wazir Zada Khan; Wajeb Gharibi; Muhammad Khurram Khan; Quratulain Arshad

Abstract The industrial world of oil and gas involves critical processes and machinery for the exploration, extraction, refining, transporting and marketing petroleum products. Oil and gas companies need to control, monitor, maintain and secure the processes and industrial assets in an efficient manner. To resolve the critical challenges of pipeline condition, corrosion and integrity monitoring, gas leak detection, and other related problems, Wireless Sensor Networks (WSN) provide promising solutions. WSN is the most prevalent technology used in oil and gas industry that has provided remote facilities to detect and report the anomalous events like the positions of leakage, corrosion or any other damage. A few existing studies in the literature do not cover the recent WSN based systems and techniques and only review the pipeline monitoring systems. These surveys lack the recent WSN based systems developed for monitoring and detecting damages to pipelines as well as other assets of oil and gas industry. In this paper we present a comprehensive review and detailed comparison of the most recent systems or techniques developed for monitoring various anomalous events that are involved in the three sectors (upstream, midstream, downstream) of oil and gas industry. We also describe the important requirements of WSNs to be deployed in the oil and gas industry. Finally, we highlight critical challenges of oil and gas industry.


International Journal of Wireless and Microwave Technologies | 2012

The Selective Forwarding Attack in Sensor Networks: Detections and Countermeasures

Wazir Zada Khan; Yang Xiang; Mohammed Y Aalsalem; Quratulain Arshad


International Journal of Computer Network and Information Security | 2011

Comprehensive Study of Selective Forwarding Attack in Wireless Sensor Networks

Wazir Zada Khan; Yang Xiang; Mohammed Y Aalsalem; Quratulain Arshad


Computers & Electrical Engineering | 2017

When social objects collaborate

Wazir Zada Khan; Mohammed Y Aalsalem; Muhammad Khurram Khan; Quratulain Arshad


frontiers of information technology | 2009

[COMSCAN]: an optical music recognition system

Muhammad Sharif; Quratulain Arshad; Mudassar Raza; Wazir Zada Khan

Collaboration


Dive into the Quratulain Arshad's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Yang Xiang

Swinburne University of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Mudassar Raza

COMSATS Institute of Information Technology

View shared research outputs
Top Co-Authors

Avatar

Muhammad Sharif

COMSATS Institute of Information Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge