Papers by Ayaz Hassan Moon

Research Square (Research Square), Apr 2, 2024
Sensory data emanating from IoT for mission-critical applications warrants proper authentication ... more Sensory data emanating from IoT for mission-critical applications warrants proper authentication and access control for its acceptance and usage. It becomes challenging to develop such efficient solutions to commensurate with the resource constraint nature of devices forming IoT. This paper presents an efficient scheme leveraging 3-factor authentication based upon user's smart card, password, and a fuzzy commitment. The mutual authentication attained between the key agents like remote user, Gateway node, and IoT device, with low overheads, adds novelty to our proposed scheme. The scheme provides a lightweight dynamic key exchange scheme to maintain forward secrecy and time stamps to thwart replay attacks. Implementation of the scheme using Elliptical curve cryptography over the primary field has kept it lightweight and hardens the scheme leveraging Elliptical Curve Discrete Logarithm Problem (ECDLP). Automated validation using the Scyther tool and Burrows-Abadi-Needham (BAN) logic validates that the scheme is resilient against attacks as claimed in the proposed scheme. The results have been further reinforced by simulation of the scheme over NS3. We evaluate our scheme's performance and compare it with other related schemes in respect of communication, computational and energy costs and find it efficient.
IoT in healthcare: a review of services, applications, key technologies, security concerns, and emerging trends
Multimedia tools and applications, Feb 27, 2024
Detection of seed users vis-Ã -vis social synchrony in online social networks using graph analysis
International Journal of Information Technology

A Concise Review on Internet of Things: Architecture, Enabling Technologies, Challenges, and Applications
International Journal of Sensors, Wireless Communications and Control
Background: With the advancements of ubiquitous computing, wireless sensor networks, and machine-... more Background: With the advancements of ubiquitous computing, wireless sensor networks, and machine-to-machine communication, the Internet of Things (IoT) has become a constantly growing concept. The IoT is a new paradigm that interconnects all smart physical devices to provide smart services to users. It effectively delivers user-required services by utilising internet connectivity, sensors, and various technologies and protocols for the analysis and collection of data. IoT is predicted to permeate practically every facet of daily life, from smart cities to health care, smart agriculture, logistics and retail, and even smart living and smart ecosystems. Since IoT systems are comprised of heterogeneous hardware and networking technologies, integrating them to the software/application level to extract information from massive amounts of data is a difficult task. Methods: In this survey, the definitions, elements, working, architecture, fundamental technologies, key challenges, and poten...
A Systematic Security Assessment and Review of Internet of Things in the Context of Authentication
Computers & Security
A Critical Insight of Contemporary Tools and Techniques in View of Social Synchrony
2020 8th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)
The evolvement of social networking generates the term social synchrony and its investigation for... more The evolvement of social networking generates the term social synchrony and its investigation for knowledge processing tasks as a challenge. This paper provides an attempt to contemplate the contemporary social networking analysis tools and techniques with regard to social synchrony has been performed. This paper summarizes some of the potential techniques and approaches, which play an important role in analyses of social synchrony in different OSN and discusses numerous challenges faced by each technique that hinders their usage and seeks attention of research community.
Image Encryption techniques:A Review
2020 10th International Conference on Cloud Computing, Data Science & Engineering (Confluence)
Transmission and distribution of multimedia data over public networks including internet and othe... more Transmission and distribution of multimedia data over public networks including internet and other insecure channels makes it prone to different kinds of active and passive attacks. The attacks could be mitigated by ensuring proper security measures in place. Multimedia data tends to be larger in size, more redundant and Multi-dimensional. Therefore Security requirements of multimedia data including image encryption techniques are different from that of conventional textural encryption schemes. In this paper we review and analyze different image encryption techniques in the context of security parameters used to prove efficiency of security algorithms.
Mapping Images Over Elliptic Curve For Encryption
2021 6th International Conference for Convergence in Technology (I2CT)
The emergence of Elliptic curve cryptography as a preferred cryptographic scheme using minimal co... more The emergence of Elliptic curve cryptography as a preferred cryptographic scheme using minimal computational resources is quite discernible. Its extension to the domain of image encryption using various mapping techniques has been analyzed in this paper. The efficiency of an encryption scheme based on ECC shall depend upon the appropriateness of mapping technique used to map pixels onto the Elliptic curve. Parameters like cost efficiency, Completeness, inversibility, and bandwidth used must be taken into consideration before designing any such mapping technique.
Number 13
Autopilot systems have been vital to flight control for several years and have been making flight... more Autopilot systems have been vital to flight control for several years and have been making flight easier and more effective. Nevertheless, these autopilot systems are complex devices that demand exact control and stability. In this paper, design PID controller to control pitch angle in longitudinal dynamic of the autopilot system for jet transport using MATLAB/SIMULINK. In this paper designed on automatic pilot with Multi Input Multi Output (MIMO) system. Also, we studied the effect of atmospheric disturbances when a PID controller has been applied the results shown how this controller with good tuning reducing the effect of atmospheric disturbance on the consistency of the autopilot.
Sensor nodes are resource constraint devices and are thus vulnerable to a variety of attacks, whi... more Sensor nodes are resource constraint devices and are thus vulnerable to a variety of attacks, which can compromise the security of an entire Wireless Sensor Network. Some of these attacks can be launched by a laptop class adversary equipped with relatively powerful resources. In this paper, we simulate and analyse Black Hole and DoS by Hello Flooding attack in Wireless Sensor Networks. A generic WSN model has been created in QualNet and necessary changes have been done in the code library to simulate the attacks. Various parameters like throughput, packets dropped, end to end delay have been recorded and the analysis has been carried out to understand the impact of these attacks.
Social Synchrony: An Analytical Contemplation of Contemporary State of Art Frameworks
2021 8th International Conference on Computing for Sustainable Global Development (INDIACom), 2021
An appraisal of recent studies conducted under the broad spectrum of social synchrony to measure ... more An appraisal of recent studies conducted under the broad spectrum of social synchrony to measure the information flow and its analytics. There is indeed requirement for social network analysis in static as well as dynamic environment. Social synchrony arises when large number of users mimic for the specific topic in specific time on the given online social networks. Subsequently, time and geographic incorporates dynamicity in social networks which affect the social synchrony. This paper focuses on social synchrony and its pattern using online social networks. The paper reports a systematic review on requirement of social synchrony, its effects, open challenges and future work for further analysis.

Wireless Sensor Network (WSN) suffer from many constraints including lower processing power, low ... more Wireless Sensor Network (WSN) suffer from many constraints including lower processing power, low battery life and small memory. Security turns into the primary concern to manage in such sort of systems as customary Public key cryptography (PKC) algorithms are computionaly expensive and hence not feasible for WSN. As key exchange is significant in every cryptographic primitive, requirement for a proficient and secure key exchange gets to be imperative. In this paper, an authenticated key exchange algorithm based on Elliptic Curve Cryptography (ECC) has been presented for wireless sensor networks. The algorithm builds up a mutual key between two communicating nodes in an authenticated manner. The protocol is resistant against Man in the Middle Attack. The Shared Key can further be utilized for achieving any cryptographic service like authentication, Confidentiality etc. The developed protocol has been simulated in TinyOS using Tossim simulator. The protocol has also been run on MicaZ ...
Journal of King Saud University - Computer and Information Sciences, 2021
This is a PDF file of an article that has undergone enhancements after acceptance, such as the ad... more This is a PDF file of an article that has undergone enhancements after acceptance, such as the addition of a cover page and metadata, and formatting for readability, but it is not yet the definitive version of record. This version will undergo additional copyediting, typesetting and review before it is published in its final form, but we are providing this version to give early visibility of the article. Please note that, during the production process, errors may be discovered which could affect the content, and all legal disclaimers that apply to the journal pertain.
Visibility Improvement in Hazy Conditions via a Deep Learning Based Image Fusion Approach
Communications in Computer and Information Science, 2021
Fuzzy extractor and chaos enhanced elliptic curve cryptography for image encryption and authentication
International Journal of System Assurance Engineering and Management, 2021

A Systematized Security and Communication Protocols Stack Review for Internet of Things
2020 IEEE International Conference for Innovation in Technology (INOCON), 2020
The paradigm of Internet of Things alludes to the ever- growing network of physical devices that ... more The paradigm of Internet of Things alludes to the ever- growing network of physical devices that is embedded with sensors, actuators, software and networking so that the devices can exchange information with centralized systems, connected devices or servers based on various communication infrastructures. The IoT data is transmitted over the internet to the cloud after collecting it from different sensors and nodes. While the number of devices connected to the internet is rising every day, several IoT vulnerabilities have come to the forefront. Therefore, security and privacy for resource-constrained IoT devices is a foremost important issue to resolve. The architecture of IoT mainly operates on a three-layer system consisting of a perception layer, an internet layer, and an application layer. The main aim of IoT security is to maintain confidentiality, integrity, data privacy, provide the user security along with the acceptable quality of service. This paper will analyze the security issues and possible attacks related to each layer of IoT architecture separately. Vulnerabilities of Message Queue Telemetry Transport, the application layer protocol has also been analyzed.
2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT), 2016

Light weight Authentication Framework for WSN
2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT), 2016
Primarily deployed for monitoring environmental parameters, WSN are now finding increased use in ... more Primarily deployed for monitoring environmental parameters, WSN are now finding increased use in commercial, domestic, military and health applications. There deployment in hostile terrains and for mission critical applications touching human lives call for addressing their security issue. Especially under IoT and smart city projects like Padova Smart City project, the range of applications envisioned to be developed, would be tightly coupled to the physical world where security aspects would be paramount. This paper presents a light weight Authentication Framework which supports node registration, entity authentication, key establishment, new node injection and broadcast authentication of messages diffusing from base towards nodes in WSN. The solution leverages the low computational overheads associated with cryptographically secure one-way hash chains and ECC without using any digital signature algorithm. The usage of hidden generator point derived by using hash-chains provides defence against man-in-the middle attack a prominent feature in ECDH. The proposed framework is compared with other similar Schemes like Novel Access Control Protocol for secure Sensor Networks (NACP).
2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT), 2016
Energy is a precious resource in Wireless Sensor Nodes. With each transmission/reception and comp... more Energy is a precious resource in Wireless Sensor Nodes. With each transmission/reception and computation, energy is being consumed and batteries get drained. The problem gets critical when the network is implemented under harsh environmental conditions like forests. Thus energy harvesting from environment becomes an important concern especially in case of WSN due to power concerns. In this paper a design is presented for the development of power management system in wireless sensor nodes. The design presented utilizes solar energy to improve the efficiency and duration of operation for sensor nodes. Experimental setup shall comprise of a PV based array simulator and a CPLD based power management module.

Procedia Computer Science, 2016
Digital Signatures are primarily employed to achieve data integrity, data origin authentication a... more Digital Signatures are primarily employed to achieve data integrity, data origin authentication and non-repudiation. In comparison to RSA-based digital signatures, the ECC (Elliptical Curve Cryptography) based Signature schemes like ECDSA (Elliptical Curve Digital Signature Algorithm) are more efficient and suited for a resource-constrained network like WSN. In a WSN, proper entity authentication is to be achieved before the sensor data is exchanged. The use of ECDSA is not suitable for achieving mutual authentication between the entities like the base station, cluster heads and nodes. Based on the study of ECDSA, the paper designs a mutual authentication protocol with the help of a computationally low signature scheme. To the best of our knowledge, this is the first digital signature based scheme which achieves mutual entity authentication. The paper also brings out performance parameters of the developed protocol.
Uploads
Papers by Ayaz Hassan Moon