Saeed Mahfooz
University of Peshawar
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Saeed Mahfooz.
IEEE Access | 2018
Amjad Mehmood; Akbar Khanan; Abdul Hakim H. M. Mohamed; Saeed Mahfooz; Houbing Song; Salwani Abdullah
The vehicular ad hoc network (VANET) is one of the promising and encouraging technologies, and it is going to attract great attention in the near future. VANET has turned into a main module of the intelligent transport system. It is a self-controlled, wheeled network (also called network on wheels), and a wider and stimulating class of mobile ad hoc network (MANET). VANETs raise many innovative challenges because of their high-class and unique features, such as high-node mobility, dynamic topology changes, wireless links breakage, network constancy, and network scalability. A well-organized routing protocol is one of the most challenging matters of such networks. In this paper, we propose an intelligent naïve Bayesian probabilistic estimation practice for traffic flow to form a stable clustering in VANET, briefly named ANTSC. The proposed scheme aims to improve routing by employing awareness of the current traffic flow as well as considering the blend of several factors, such as speed difference, direction, connectivity level, and node distance from its neighbors by using the intelligent technique. The proposed technique has proven to be more strong, stable, robust, and scalable than existing ones.
Vehicular Communications | 2018
Shahid Latif; Saeed Mahfooz; Bilal Jan; Naveed Ahmad; Yue Cao; Muhammad Asif
Abstract Vehicular Ad Hoc Networks (VANETs) are becoming the favorable option for the Intelligent Transportation Systems (ITS). The efficient distribution of information in the form of data packets, is essential in order to support the vision of smart ITS. In VANETs, vehicles communicate with other vehicles directly or through existing infrastructure for sharing traffic information. Th data distribution is usually done using broadcast method. Data broadcast in VANETs is a challenging issue since high mobility vehicles with varying density have to share and route the safety critical information to other intended vehicles in real time. Thus, it needs to be addressed by the existing and new solutions for the same. Keeping this in mind, this study presents a detailed description of the existing data broadcast protocol for VANETs with an objective of selecting a particular scheme for a particular application with respect to its benefits over the others. This study reviews and compares numerous existing multi-hop data broadcast protocols in terms of various attributes such as data forwarding strategies, objectives, type of architecture, application scenarios, assumptions, evaluation metrics, simulation platform. Furthermore, an original taxonomy of these protocols is introduced based upon the road scenarios with critical discussion on each categorization with respect to its strengths, weaknesses and important constraints. Finally, various perspectives, challenges and shortcomings of the existing research work are discussed.
Mathematical Problems in Engineering | 2017
Shahid Latif; Saeed Mahfooz; Bilal Jan; Naveed Ahmad; Haleem Farman; Murad Khan; Huma Javed
Vehicular ad hoc network (VANET) is a wireless emerging technology that aims to provide safety and communication services to drivers and passengers. In VANETs, vehicles communicate with other vehicles directly or through road side units (RSU) for sharing traffic information. The data dissemination in VANETs is a challenging issue as the vehicles have to share safety critical information in real time. The data distribution is usually done using broadcast method resulting in inefficient use of network resources. Therefore, to avoid the broadcast storm and efficiently use network resources, next forwarder vehicle (NFV) is selected to forward data to nearby vehicles. The NFV selection is based on certain parameters like direction, distance, and position of vehicles, which makes it a multicriteria decision problem. In this paper, analytical network process (ANP) is used as a multicriteria decision tool to select the optimal vehicle as NFV. The stability of alternatives (candidate vehicles for NFV selection) ranking is checked using sensitivity analysis for different scenarios. Mathematical formulation shows that ANP method is applicable for NFV selection in VANETs. Simulation results show that the proposed scheme outperforms other state-of-the-art data dissemination schemes in terms of reachability, latency, collisions, and number of transmitted and duplicate data packets.
Security and Communication Networks | 2015
Muhammad Zubair; Xiangwei Kong; Saeed Mahfooz
Traditional centralized approaches toward mobility management such as MIPv6 and its variants suffer because of the performance issues like single-point failure, non-optimal routing, low scalability, authentication latency, and signaling messages overhead of the mobility protocols. In this paper, we propose a novel network-based Distributed Mobility and Authentication Mechanism DMAM to focus on these issues. DMAM decomposes centralized mobility functions into Home Address Allocation, mobility routing MR, and location management LM. A new entity is introduced in DMAM, called Location and Mobility Manager that distributes MR and LM among multiple routers to which mobile node can be attached. Furthermore, DMAM offers strong authentication mechanism based on symmetric cryptographic and collision-free one-way hash function. The performance of proposed scheme is analyzed and compared with existing approaches in terms of handover latency, handover blocking probability, packet loss, communication overhead, and computational cost. The conducted numerical results demonstrate that DMAM outperforms the existing approaches. Copyright
Journal of Communications | 2014
Muhammad Zubair; Xiangwei Kong; Saeed Mahfooz
Abstract—In this paper we propose a novel Cross-layer Localized Authentication Mechanism (CLAM) to secure mobility in Next Generation Networks. The proposed mechanism integrates Proxy MIPv6 and Session Initiation Protocol (SIP) to handle the authentication locally in real-time and non-real-time communications. The design objectives of CLAM are three fold: i) handover latency is minimized by the local management of authentication; ii) simple to implement in mobile devices because of symmetric cryptographic and one-way hash operations; iii) possesses important security properties such as resistance against various attacks, user anonymity, mutual authentication, user friendly, one-time session key agreement, backward secrecy, forward secrecy, and confidentiality. We analyze and compare the performance of CLAM with existing schemes in terms of handover latency, signaling cost, communication overhead, computational cost, and packet loss. The numerical and simulation results demonstrate that our proposed scheme outperforms the existing schemes.
Journal of Communications | 2014
Muhammad Zubair; Xiangwei Kong; Saeed Mahfooz
Next Generation Networks (NGNs) are aiming to integrate different access technologies for the accessibility of heterogeneous platform under the control of IP protocol. In such a complex environment, the availability of high data rates, high bandwidth, security, and end-to-end QoS are major challenges. In this paper cross-layer localized mobility management based on Session Initiation Protocol (SIP) and Hierarchical MIPv6 (HMIPv6) is proposed to support the providence of the end-to- end QoS; network and session mobility; reduce latency; and proper bandwidth management. The proposed scheme handles the mobility locally to minimize latency. Further, QoS manager is used for proper management of bandwidth. Performance analysis and numerical results demonstrate the efficiency and feasibility of proposed scheme for real time communication in terms of latency, packet loss, and traffic load. Index Terms—Next generation networks, hierarchical mobile IPv6, session initiation protocol, End-to-End QoS
International Conference on Computer Networks and Information Technology | 2011
Muhammad Zubair; Saeed Mahfooz; Attaullah Khan; Waheed ur Rehman
Next Generation Networks (NGNs) promise Always Best Connection in heterogeneous networks. Providing end-to-end QoS in such environment is a challenging task. Since applications requirements and users expectations are increasing, QoS gains the significance in NGNs. In order to provide end-to-end QoS in NGNs, this paper proposes a new protocol Combined SIP HMIPv6 (CSH) with a module QoS manager. Unlike other QoS mechanisms, CSH focuses on both core and edge networks. The achievements of CSH will include better session and terminal mobility, network mobility, proper bandwidth management, good resource reservation, user authentication and less delay while establishing multimedia traffic.
International Conference on Computer Networks and Information Technology | 2011
Madeeha Aman; Saeed Mahfooz; Waheed ur Rehman
In todays world of communication, everything is going wireless. The licensed and unlicensed bands of the Radio Frequency (RF) spectrum play a key role in wireless communication. Considering the tremendous growth in wireless applications and devices, the RF spectrum can be thought of as a sacred resource as it is the vital component which makes wireless communication possible. In addition, RF spectrum is a limited resource which makes it even more important to utilize it efficiently. Cognitive Radio (CR) technology is considered a solution for the efficient usage of RF spectrum. Keeping the significance of RF spectrum in mind, this paper describes a concept of using the guard channels in the spectrum mobility process which will help in preventing the scarcity of spectrum usage. Further more it will mitigate the handoff delay resulting in high-speed service times.
International Conference on Computer Networks and Information Technology | 2011
Shaukat Ali; Azhar Rauf; Saeed Mahfooz
Data is a critical asset for every organization. Data of organizations are normally stored in database, therefore, database security is important. Encryption is one of the strong security layers in database security, but SQL has a limitation that its queries cannot be run directly on encrypted data. When some update is needed in an encrypted column of table so the entire column needs to be decrypted before updation process, this degrades system performance. This paper proposes a new technique to update value directly although the conditioned column is in encrypted form. It does not need to decrypt the entire conditioned column for update process. This improves system performance.
international conference on future information technology | 2010
Zahoor Jan; Muhammad Tahir Shah; Azhar Rauf; Mohd Amir Khan; Saeed Mahfooz
Web applications have gained an enormous increase in popularity for providing various facilities online, such as e-shopping, e-banking, e-ticketing, e-learning etc. As the use of web applications grow, there is an increase in the attacks on web applications as well. Among these attacking techniques, SQL Injection has been emerging as one of the most dangerous threats to web applications. SQL Injection technique is mostly an attack on data driven web applications. By providing especially built user input through the web form fields, the attacker can access and modify the contents of the underlying database of a web application. This research work presents a technique, which will be used for the detection and prevention from SQL Injection. The parameterized cursor is used to implement the concept. The user session information will be passed as a parameter to cursor. If the user is an authorized user then the cursor will fetch the desired tuples else will fail to execute. This research work can easily be adopted and implemented in any platform and database. An example application is developed in Oracle Internet Developer suite 10g and Oracle Database 10g to test the performance against SQL Injection.