Zeeshan Shafi Khan
International Islamic University, Islamabad
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Zeeshan Shafi Khan.
Sensors | 2010
Aneel Rahim; Zeeshan Shafi Khan; Fahad T. Bin Muhaya; Muhammad Sher; Tai-Hoon Kim
Secure multimedia communication enhances the safety of passengers by providing visual pictures of accidents and danger situations. In this paper we proposed a framework for secure multimedia communication in Vehicular Ad-Hoc Networks (VANETs). Our proposed framework is mainly divided into four components: redundant information, priority assignment, malicious data verification and malicious node verification. The proposed scheme jhas been validated with the help of the NS-2 network simulator and the Evalvid tool.
international conference on information security | 2010
Aneel Rahim; Zeeshan Shafi Khan; Fahad Bin Muhaya
In Vehicular Ad-Hoc Networks (VANETs) wireless-equipped vehicles form a temporary network for sharing information among vehicles. Secure Multimedia communication enhances the safety of passenger by providing visual picture of accidents and danger situations. In this paper we will evaluate the performance of multimedia data in VANETS scenario and consider the impact of malicious node using NS-2 and Evalvid video evaluation tool.
The Scientific World Journal | 2014
Zeeshan Shafi Khan; Mohammed Morsi Moharram; Abdullah Alaraj; Farzana Azam
Vehicular ad hoc networks (VANETs) are one special type of ad hoc networks that involves vehicles on roads. Typically like ad hoc networks, broadcast approach is used for data dissemination. Blind broadcast to each and every node results in exchange of useless and irrelevant messages and hence creates an overhead. Unicasting is not preferred in ad-hoc networks due to the dynamic topology and the resource requirements as compared to broadcasting. Simple broadcasting techniques create several problems on privacy, disturbance, and resource utilization. In this paper, we propose media mixing algorithm to decide what information should be provided to each user and how to provide such information. Results obtained through simulation show that fewer number of keys are needed to share compared to simple broadcasting. Privacy is also enhanced through this approach.
Information Security Journal: A Global Perspective | 2009
Zeeshan Shafi Khan; Muhammad Sher; Khalid Rashid; Aneel Rahim
ABSTRACT A packet-based network to provide telecommunication services independent from the underlying access and transport technologies is known as a next generation network. An IP multimedia subsystem (IMS) provides an architectural framework for the next generation networks and includes variety of services such as presence, instant messaging, push-to-talk over cellular, multiparty conference, and so forth. IMS-based instant messaging is available in two flavors (immediate messaging and session-based messaging). Both flavors are subject to different types of security threats. An attacker can generate an immediate messaging flood by sending enormous number of messages to deny the services to a group of users or to an individual. Session-based messaging is facing threats such as invite flooding attack, session modification attack, and session teardown attack. In this paper, we developed a security mechanism, consisting of three layers, to secure the messaging service from flooding attacks and session-based attacks and the like. The simulation results show a good improvement in the existing security mechanism of the IMS-based instant messaging service.
international conference on computational science and its applications | 2011
Zeeshan Shafi Khan; Muhammad Sher; Khalid Rashid
Presence and instant messaging are the two important services offered on top of IP Multimedia subsystem. Instant messages can be session based or immediate. In both cases there are some security threats like session modification, session termination, invite flooding and message flooding, etc. In this paper, a presence based solution to mitigate the effect of these attacks is proposed. Results show that the proposed solution performs well to secure the instant messaging.
Computers & Mathematics With Applications | 2010
Zeeshan Shafi Khan; Khalid Rashid; Fahad Bin Muhaya; Qutbuddin; Aneel Rahim
In order to provide essential data services, the cellular networks have opened interface with Internet enabling communication with the users beyond the coverage of their wireless signals across the globe. Besides economical expansion of the global system for mobile communication (GSM) services, this interface has given birth to new security challenges. Especially recent research has divulged that an adversary equipped with little more than a cable modem can block all voice communication in a metropolitan area or even in entire country of the size of USA by sending enormous short message service (SMS) traffic via Internet. To overcome this threat in particular and other client-server communication problems in general, a new secure protocol, Call-Back Authentication (CBA), for web to phone SMS communication is proposed. The protocol introduces two-tier server architecture and pulls data traffic control (PDTC) mechanism for secure communication. The protocol is aimed to throat-knot malicious traffic at GSM-Internet interface gateway. The results show that the CBA protocol secures all GSM services from Internet originated SMS floods. Moreover the authentication mechanism of the CBA protocol identifies and blocks the spoofed as well as the zombie requests. The CBA server requires lesser resources to deliver SMS as compared to existing mechanism.
Telecommunication Systems | 2014
Farzana Azam; Zeeshan Shafi Khan; Muhammad Sher; Khaled Alghathbar; Muhammad Khurram Khan
Due to frequent joining and leaving of nodes and better performance, use of flooding algorithms is always proffered in Mobile Ad-hoc Networks (MANETs). A single query transmitted by a node can be received by hundreds of nodes at 3rd or 4th hop. But it is also fact that flooding algorithms provide an opportunity to attackers for launching query flooding attacks. On one side these query flooding attacks results in wastage of valuable processing resources and on the other side they cause in starvation and delay at legitimate user’s end. To solve this problem we proposed attack containment techniques by providing a fair share of processing resources to every node. Fair distribution is achieved by designing different query distribution techniques based on mathematical models. Results obtained through network simulator 2 prove that the proposed solution is resilient against various types of flooding attacks.
FGIT-SecTech/DRBC | 2010
Zeeshan Shafi Khan; Khaled Alghathbar; Muhammad Sher; Khalid Rashid
Presence is a service that provides dynamic up-to-date status information of other users. Since presence is highly dynamic so it puts heavy load on the core network as well as on air interface of the access network. Security is another issue that needs to be address carefully because presence service is subject to various types of security threats. We, in this paper, conducted a detailed survey on issues of security and network load in presence. At the end we discussed few open issues related to security of presence service.
2010 International Conference on Wireless Communication and Sensor Computing (ICWCSC) | 2010
Bashir Ahmad; Zeeshan Shafi Khan; Adeel Akhtar
As devices in sensor network are energy limited so energy efficiency is the most critical parts of this network. To have energy efficient network, efficient routing plays very important role. In this paper, an Energy efficient modified Hybrid Adaptive Intra Cluster Routing is proposed which provides best solution for the problem offered by traditional and simple adaptive routing algorithms. Quantitative analysis reveals its energy efficiency over the previously published work
international conference on future information technology | 2010
Zeeshan Shafi Khan; Aneel Rahim; Fahad Bin Muhaya
Capabilities like Instant Messaging (IM), real-time video transfer and file transfer converts the Push to Talk (PTT) Service into a new one, known as Push to Multimedia (PTM). In PTT and PTM an authenticated user can be deleted from the session by the session administrator (initiator). Deletion of an authenticated user by a single authority may results in dispute among the remaining authenticated members. So in this paper we present a distributed mechanism to delete an authenticated user (who starts to act maliciously after authentication) from an ongoing session. Moreover a user may use the floor for the long period of time. No mechanism is defined to preset the maximum time for the floor use in a single turn. In this paper we also give a mechanism to define the maximum time for floor use at the start of the session. This time can vary from user to user. These features on one side secure the PTT and PTM service and on the other side enrich these services.