Papers by Dr Adnan Nadeem
-Most of the research in securing Mobile ad hoc networks (MANETs) has focused on proposals which ... more -Most of the research in securing Mobile ad hoc networks (MANETs) has focused on proposals which detect and prevent a specific kind of attack such as sleep deprivation, black hole, grey hole and rushing attacks. In this paper we broaden our previously develop algorithm AIDP and propose a generalized intrusion detection and prevention mechanism. We use a combination of anomalybased and knowledge-based intrusion detection. This approach not only secures the MANET from a wide variety of routing attacks but also has the capability to detect new unforeseen attacks. Simulation results of a case study shows that our proposed mechanism can successfully detect attacks, including multiple simultaneous different attacks, and identify and isolate the intruders causing a variety of attacks, with an affordable network overhead.

MANETs (Mobile Ad-hoc Networks) applications in various walks of life in the last two decades hav... more MANETs (Mobile Ad-hoc Networks) applications in various walks of life in the last two decades have resulted in introduction of its sub technologies such as VANETs (Vehicular Ad-hoc Network). In this paper, we focus on new ad hoc networking technology called FANET (Flying Ad-hoc Network). FANET introduces the ad hoc networking of flying UAVs to allow real time communication between them and control stations. Flying drones can also form FANET to establish real time communication to achieve their mission. FANET will help in handling of the circumstances like crisis, natural disaster, military combat zones, and package delivery. Efficient real-time routing is a major challenge in FANET because of the very high mobility which results in unpredictable dynamic topology. Routing along with medium access control is a major hurdle in their real time implementation. In this paper, we have first have first highlighted major research issues and challenges in FANET. Then we have performed an inve...

Pakistan Journal of Engineering and Applied Sciences, 2016
Wireless Body Area Sensor Network (WBAN) has emerged as special type of wireless sensor networks.... more Wireless Body Area Sensor Network (WBAN) has emerged as special type of wireless sensor networks. This emerging networking technology has applications in healthcare, sports & fitness, activity monitoring and disability assistance. Most of the work in literature in WBAN focuses on MAC and Physical layer. In contrast to this, in this paper, we present a study of self-organized routing (network layer issue). In this paper, we first highlight the routing issues and challenges in multi hop WBAN. We then review and classify the existing WBAN routing protocols from the literature, including self-organized routing. In addition we compare and analyse the proposed protocols based on certain key parameters. Finally, we have performed a simulation based case study to analyse the requirements and necessities of employing self-organizing in WBAN.
Mobile ad hoc Networks and Vehicular Ad Hoc networks have emerged as advanced wireless networks. ... more Mobile ad hoc Networks and Vehicular Ad Hoc networks have emerged as advanced wireless networks. These networks have their applications in various walks of life. Mobility of nodes in these networks is a major benefit for the end users. However, modeling the mobility of the nodes in these networks is a key for the researcher. In this paper, we first review and categorized the mobility models in MAENTs and VANETs. Then we analyze the performance of different types of existing mobility models of MANETs and VANETs through a case study. In the case study we analyze the performance of mobility models with varying mean speed of nodes. We have also varied the routing protocol to add another dimension in this analysis. The results of the analysis from the case study show the suitability of some key mobility models of MANETs and VANETs in various scenarios.

Wireless Body area sensor networks (WBASN) are an interesting and emerging application of wireles... more Wireless Body area sensor networks (WBASN) are an interesting and emerging application of wireless sensor networks. WBASN has a wide range of applications but health care is most beneficiary of this technology, which requires uninterrupted and reliable communication between sensors, Sinks and outside WBASN. This paper introduces the reliability aspect in intraBAN communication system at network layer. The proposed routing protocol is based on single hop for non-critical nodes while multi-hop for critical nodes and this routing protocol adopt pro-active reliable routing technique with manageable updates, Reliable Proactive Routing Protocol (RPRP). The methodology of RPRP is to build and maintain a routing table at each node in which two multi-hop path entries are present from critical nodes to sink device while single-hop is used for noncritical nodes. The selection of primary and alternate path for multi-hop scenario is based on the Received Signal Strength Indicator “RSSI” derived ...

Mobile Ad hoc Networks are one of the fast growing self organized networks, which has application... more Mobile Ad hoc Networks are one of the fast growing self organized networks, which has application in wider domains such as crisis management, battlefield, personal networking. However, due to cooperative nature of the network MANETs are vulnerable to various types of misbehaviour from both legitimate and malicious users. It is tricky to distinguish clearly between the normal behaviour and misbehaviour. Create a difference in those legal and illegal users are much difficult as we imagine. Mobility and flexibility are major advantages but presence of misbehaviour of nodes is one of the key factors of network performance degradation. In this paper, we first review and categorize possible misbehaviours in MANETs. We have also illustrated specific type of misbehaviours in this paper. We analyze the impact of misbehaving nodes on the network performance using a simulation based case study. Simulation results show the impact of misrouting and selfish misbehaviours of nodes by indicating th...

The word ‘Climate Change” is not as simple and small in meaning as it seen. It exhibits dangerous... more The word ‘Climate Change” is not as simple and small in meaning as it seen. It exhibits dangerous and alarming consequences. Climate changes is continuous process from East to West, North to South, Soil to Sky, Water to Air, Forest to Desert, Ocean to Mountains, in fact everywhere. Climate change Monitoring (CCM) is the phenomena to observe and record climate changes and put forward them for decision makers or domain experts to prevent environment, avoid or at least prepare for different kinds of natural disasters, to prevent contamination of various precious natural resources including water, air and soil etc. Rapid advancement of Information and Communication Technology (ICT) is blessing for mankind and incorporation of this revolutionary technology in serving mankind in diverse domain is remarkable. Use of ICT in climate change mitigation, adoption and monitoring not only replacing the conventional techniques and systems also adding great accuracy, reliability and flexibility als...

Journal of Basic and Applied Sciences, 2016
An enormous amount of data is being pooled through the use of social media which is being mined t... more An enormous amount of data is being pooled through the use of social media which is being mined to get benefits in different areas such as healthcare, business, and learning. Providing care to elderly at their home environment is understood as a complex problem and different types of systems are being proposed which can eliminate the presence of caregiver. Social media is acting as the superlative tool to provide elderly a mean of entertainment, communication and information exchange. The data contributed by them can be served to them after converting it into the knowledge. Healthcare professional are interested in the data of elderly so that they can propose solutions to assist them. The organization colleting health data needs the data of elderly activities so they can correlate with other types of activities for their betterment. This work aims to use social media as an assistive technology for elderly which can help them to spend a better life. Different views such as caregiver,...

The advancement of ICT has resulted in paradigm shift in educational learning concepts resulting ... more The advancement of ICT has resulted in paradigm shift in educational learning concepts resulting in change of role of teacher and learner. Technology enabled learning is fast replacing the traditional classroom learning. Learning Management System (LMS) is one of these technologies that offers teachers to organize, manage and deliver course materials. The LMS provide a wide variety of tools and services for teachers and students to enhance teaching and learning. LMSs like Blackboard, Moodle, EvalTool etc., have made great impact on teaching, learning and assessment by providing flexible schedules, superior content, secure access, delivery of content, discussions, chat, assignments, quiz, etc. Universities worldwide are now adopting these tools to support and deliver their courses which have resulted in improved and effective learning. Keeping in view the importance of this emerging technology, this paper discusses the general framework of a LMS, criteria for choosing the appropriate...

Wireless Body Area Sensor Networks (WBASNs) applications have emerged as major type of Wireless S... more Wireless Body Area Sensor Networks (WBASNs) applications have emerged as major type of Wireless Sensor Networks (WSN). It has a wide range of applications and plays a vital role in a society, particularly in health care system. Healthcare applications using WBASN required uninterrupted and reliable communication. In healthcare applications particularly in the monitoring of chronicle diseases patients data from critical sensors such as ECG needs to be delivered timely. Considering the requirement of QoS support in healthcare application of WBASN, this paper proposes a QoS algorithm for the provision of QoS support in WBASN on multi-hop topology; it increases the critical traffic data rate by ensuring a minimum delay of the data from critical sensors. The proposed algorithm provides QoS provisioning by defining three classes of services (i.e. guaranteed service, real time service, and best effort services). Data categorized into three classes using classifier and scheduled according t...

Journal of Basic & Applied Sciences
Dysgraphia, a learning disability associated with writing skills, hinders students to put their t... more Dysgraphia, a learning disability associated with writing skills, hinders students to put their thought on paper and write correctly. Writing problems hit students most frequently that one third students become failed to acquire writing skill. Different IT based assistance solutions available for dysgraphia students but most of them are accommodations based or provides writing alternatives rather than developing writing skills of a dysgraphia student. Handwriting is an essential skill for academic life and developed handwriting skill helps student to protect their self-esteem and build student’s confidence to participate in other activities during class. Most of available writing assistance solutions do not provide interesting ways to acquire writing skills. To handle this problem, augmented reality (AR) based dysgraphia assistance solution has presented in this work. This study utilized AR to develop dysgraphia student’s interest in writing and used it to assist in writing activity by providing help in spellings. AR based dysgraphia assistance writing environment (AR-DAWE) modal use Google cloud API of speech-to-text and addressed one of the important issues of dysgraphia student that is associated with spelling mistakes.

Int. J. Netw. Secur., 2019
Wireless Body Area Sensors Networks (BAN) have emerged as new applied wireless networking technol... more Wireless Body Area Sensors Networks (BAN) have emerged as new applied wireless networking technology with the development of wearable and implanted sensors. BAN has novel application in healthcare, sports, human activity monitoring, disability assistance and entertainment. BAN is now using for real time monitoring and assistance of the patients. BAN operations are vulnerable to various security attacks, including basic and advance attacks. In this paper, we introduce and illustrate the sinkhole attack in a BAN. Then we propose our sinkhole detection algorithm that utilizes the information from data aggregation algorithm to detect a sink hole attacker. Finally, we analyze the performance of the BAN in terms of throughput, latency and packet breakdown and the performance of our detection algorithm. Simulation results show that this attack could severely degrade (up to 40%) the overall performance of the network. The propose detection algorithm has good performance in terms of high suc...

IEEE Access
Blockchain is a revolutionary technology that is making a great impact on modern society due to i... more Blockchain is a revolutionary technology that is making a great impact on modern society due to its transparency, decentralization, and security properties. Blockchain gained considerable attention due to its very first application of Cryptocurrencies e.g., Bitcoin. In the near future, Blockchain technology is determined to transform the way we live, interact, and perform businesses. Recently, academics, industrialists, and researchers are aggressively investigating different aspects of Blockchain as an emerging technology. Unlike other Blockchain surveys focusing on either its applications, challenges, characteristics, or security, we present a comprehensive survey of Blockchain technology's evolution, architecture, development frameworks, and security issues. We also present a comparative analysis of frameworks, classification of consensus algorithms, and analysis of security risks & cryptographic primitives that have been used in the Blockchain so far. Finally, this paper elaborates on key future directions, novel use cases and open research challenges, which could be explored by researchers to make further advances in this field. INDEX TERMS Evolution of blockchain, blockchain architecture, smart contracts, blockchain applications, development frameworks, blockchain security.
2018 1st International Conference on Computer Applications & Information Security (ICCAIS)
Procedia Computer Science
Mehran University Research Journal of Engineering and Technology
MANETs (Mobile Ad Hoc Networks) have applications in various walks of life from rescue operations... more MANETs (Mobile Ad Hoc Networks) have applications in various walks of life from rescue operations to battle fieled operations, personal and commercial. However, routing operations in MANETs are still vulnerable to anomalies and DoS (Denial of Service) attacks such as sleep deprivation. In SD (Sleep Deprivation) attack malicious node exploits the vulnerability in the route discovery function of the reactive routing protocol for example AODV (Ad Hoc On-Demand Distance Vector). In this paper, we first illustrate the SD anomaly in MANETs and then propose a SD detection and prevention algorithm which efficiently deals with this attack. We assess the performance of our proposed approach through simulation, evaluating its successfulness using different network scenarios.

July 2016
Almost all the human being real life concerned domains are taking advantage of latest technologie... more Almost all the human being real life concerned domains are taking advantage of latest technologies for enhancing their process, procedures and operations. This integration of technological innovations provides ease of access, flexibility, transparency, reliability and speed for the concerned process and procedures. Rapid growth of ICT (Information and Communication Technology) and MT (Mobile Technology) provides opportunity to redesign and reengineered the human routines’ life activities process and procedures. Technology integration and adoption in routine life activities may serves compensatory mechanism to assist the population in different manner such as monitoring older adults and children at homes, provides security assistance, monitoring and recording patients vital signs automatically, controlling and monitoring equipments and devices, providing assistance in shopping, banking and education as well. Disasters happened suddenly, destroy everything indiscriminately. Adoption a...
Journal of Basic & Applied Sciences
Ieee Communications Surveys Amp Tutorials, Mar 9, 2013
Uploads
Papers by Dr Adnan Nadeem