Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Zeeshan Shafi Khan is active.

Publication


Featured researches published by Zeeshan Shafi Khan.


Sensors | 2010

Sensor Based Framework for Secure Multimedia Communication in VANET

Aneel Rahim; Zeeshan Shafi Khan; Fahad T. Bin Muhaya; Muhammad Sher; Tai-Hoon Kim

Secure multimedia communication enhances the safety of passengers by providing visual pictures of accidents and danger situations. In this paper we proposed a framework for secure multimedia communication in Vehicular Ad-Hoc Networks (VANETs). Our proposed framework is mainly divided into four components: redundant information, priority assignment, malicious data verification and malicious node verification. The proposed scheme jhas been validated with the help of the NS-2 network simulator and the Evalvid tool.


international conference on information security | 2010

Performance Evaluation of Video Streaming in Vehicular Adhoc Network

Aneel Rahim; Zeeshan Shafi Khan; Fahad Bin Muhaya

In Vehicular Ad-Hoc Networks (VANETs) wireless-equipped vehicles form a temporary network for sharing information among vehicles. Secure Multimedia communication enhances the safety of passenger by providing visual picture of accidents and danger situations. In this paper we will evaluate the performance of multimedia data in VANETS scenario and consider the impact of malicious node using NS-2 and Evalvid video evaluation tool.


The Scientific World Journal | 2014

A Group Based Key Sharing and Management Algorithm for Vehicular Ad Hoc Networks

Zeeshan Shafi Khan; Mohammed Morsi Moharram; Abdullah Alaraj; Farzana Azam

Vehicular ad hoc networks (VANETs) are one special type of ad hoc networks that involves vehicles on roads. Typically like ad hoc networks, broadcast approach is used for data dissemination. Blind broadcast to each and every node results in exchange of useless and irrelevant messages and hence creates an overhead. Unicasting is not preferred in ad-hoc networks due to the dynamic topology and the resource requirements as compared to broadcasting. Simple broadcasting techniques create several problems on privacy, disturbance, and resource utilization. In this paper, we propose media mixing algorithm to decide what information should be provided to each user and how to provide such information. Results obtained through simulation show that fewer number of keys are needed to share compared to simple broadcasting. Privacy is also enhanced through this approach.


Information Security Journal: A Global Perspective | 2009

A Three-Layer Secure Architecture for IP Multimedia Subsystem-Based Instant Messaging

Zeeshan Shafi Khan; Muhammad Sher; Khalid Rashid; Aneel Rahim

ABSTRACT A packet-based network to provide telecommunication services independent from the underlying access and transport technologies is known as a next generation network. An IP multimedia subsystem (IMS) provides an architectural framework for the next generation networks and includes variety of services such as presence, instant messaging, push-to-talk over cellular, multiparty conference, and so forth. IMS-based instant messaging is available in two flavors (immediate messaging and session-based messaging). Both flavors are subject to different types of security threats. An attacker can generate an immediate messaging flood by sending enormous number of messages to deny the services to a group of users or to an individual. Session-based messaging is facing threats such as invite flooding attack, session modification attack, and session teardown attack. In this paper, we developed a security mechanism, consisting of three layers, to secure the messaging service from flooding attacks and session-based attacks and the like. The simulation results show a good improvement in the existing security mechanism of the IMS-based instant messaging service.


international conference on computational science and its applications | 2011

Presence based secure instant messaging mechanism for IP multimedia subsystem

Zeeshan Shafi Khan; Muhammad Sher; Khalid Rashid

Presence and instant messaging are the two important services offered on top of IP Multimedia subsystem. Instant messages can be session based or immediate. In both cases there are some security threats like session modification, session termination, invite flooding and message flooding, etc. In this paper, a presence based solution to mitigate the effect of these attacks is proposed. Results show that the proposed solution performs well to secure the instant messaging.


Computers & Mathematics With Applications | 2010

Realization of Call-Back Authentication (CBA) for secure web to cellular phone SMS communication

Zeeshan Shafi Khan; Khalid Rashid; Fahad Bin Muhaya; Qutbuddin; Aneel Rahim

In order to provide essential data services, the cellular networks have opened interface with Internet enabling communication with the users beyond the coverage of their wireless signals across the globe. Besides economical expansion of the global system for mobile communication (GSM) services, this interface has given birth to new security challenges. Especially recent research has divulged that an adversary equipped with little more than a cable modem can block all voice communication in a metropolitan area or even in entire country of the size of USA by sending enormous short message service (SMS) traffic via Internet. To overcome this threat in particular and other client-server communication problems in general, a new secure protocol, Call-Back Authentication (CBA), for web to phone SMS communication is proposed. The protocol introduces two-tier server architecture and pulls data traffic control (PDTC) mechanism for secure communication. The protocol is aimed to throat-knot malicious traffic at GSM-Internet interface gateway. The results show that the CBA protocol secures all GSM services from Internet originated SMS floods. Moreover the authentication mechanism of the CBA protocol identifies and blocks the spoofed as well as the zombie requests. The CBA server requires lesser resources to deliver SMS as compared to existing mechanism.


Telecommunication Systems | 2014

Attack containment in mobile ad-hoc networks through fair distribution of processing resources

Farzana Azam; Zeeshan Shafi Khan; Muhammad Sher; Khaled Alghathbar; Muhammad Khurram Khan

Due to frequent joining and leaving of nodes and better performance, use of flooding algorithms is always proffered in Mobile Ad-hoc Networks (MANETs). A single query transmitted by a node can be received by hundreds of nodes at 3rd or 4th hop. But it is also fact that flooding algorithms provide an opportunity to attackers for launching query flooding attacks. On one side these query flooding attacks results in wastage of valuable processing resources and on the other side they cause in starvation and delay at legitimate user’s end. To solve this problem we proposed attack containment techniques by providing a fair share of processing resources to every node. Fair distribution is achieved by designing different query distribution techniques based on mathematical models. Results obtained through network simulator 2 prove that the proposed solution is resilient against various types of flooding attacks.


FGIT-SecTech/DRBC | 2010

Issues of Security and Network Load in Presence – A Survey

Zeeshan Shafi Khan; Khaled Alghathbar; Muhammad Sher; Khalid Rashid

Presence is a service that provides dynamic up-to-date status information of other users. Since presence is highly dynamic so it puts heavy load on the core network as well as on air interface of the access network. Security is another issue that needs to be address carefully because presence service is subject to various types of security threats. We, in this paper, conducted a detailed survey on issues of security and network load in presence. At the end we discussed few open issues related to security of presence service.


2010 International Conference on Wireless Communication and Sensor Computing (ICWCSC) | 2010

An Energy efficient, Modified Hybrid Adaptive Intra Cluster Routing for wireless sensor networks

Bashir Ahmad; Zeeshan Shafi Khan; Adeel Akhtar

As devices in sensor network are energy limited so energy efficiency is the most critical parts of this network. To have energy efficient network, efficient routing plays very important role. In this paper, an Energy efficient modified Hybrid Adaptive Intra Cluster Routing is proposed which provides best solution for the problem offered by traditional and simple adaptive routing algorithms. Quantitative analysis reveals its energy efficiency over the previously published work


international conference on future information technology | 2010

A Mechanism for Handling Internal Threats of IMS Based Push to Talk and Push to Multimedia Service

Zeeshan Shafi Khan; Aneel Rahim; Fahad Bin Muhaya

Capabilities like Instant Messaging (IM), real-time video transfer and file transfer converts the Push to Talk (PTT) Service into a new one, known as Push to Multimedia (PTM). In PTT and PTM an authenticated user can be deleted from the session by the session administrator (initiator). Deletion of an authenticated user by a single authority may results in dispute among the remaining authenticated members. So in this paper we present a distributed mechanism to delete an authenticated user (who starts to act maliciously after authentication) from an ongoing session. Moreover a user may use the floor for the long period of time. No mechanism is defined to preset the maximum time for the floor use in a single turn. In this paper we also give a mechanism to define the maximum time for floor use at the start of the session. This time can vary from user to user. These features on one side secure the PTT and PTM service and on the other side enrich these services.

Collaboration


Dive into the Zeeshan Shafi Khan's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Khalid Rashid

COMSATS Institute of Information Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge