Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
LanguageLanguage
-
SubjectSubject
-
Item TypeItem Type
-
DisciplineDiscipline
-
YearFrom:-To:
-
More FiltersMore FiltersIs Peer Reviewed
Done
Filters
Reset
28
result(s) for
"Rizvi, Sanam Shahla"
Sort by:
Collaborative Learning Based Sybil Attack Detection in Vehicular AD-HOC Networks (VANETS)
by
Bibi, Maryum
,
Rizvi, Sanam Shahla
,
Azam, Sofia
in
Algorithms
,
Automatic classification
,
Collaboration
2022
Vehicular Ad-hoc network (VANET) is an imminent technology having both exciting prospects and substantial challenges, especially in terms of security. Due to its distributed network and frequently changing topology, it is extremely prone to security attacks. The researchers have proposed different strategies for detecting various forms of network attacks. However, VANET is still exposed to several attacks, specifically Sybil attack. Sybil Attack is one of the most challenging attacks in VANETS, which forge false identities in the network to undermine communication between network nodes. This attack highly impacts transportation safety services and may create traffic congestion. In this regard, a novel collaborative framework based on majority voting is proposed to detect the Sybil attack in the network. The framework works by ensembling individual classifiers, i.e., K-Nearest Neighbor, Naïve Bayes, Decision Tree, SVM, and Logistic Regression in a parallel manner. The Majority Voting (Hard and Soft) mechanism is adopted for a final prediction. A comparison is made between Majority Voting Hard and soft to choose the best approach. With the proposed approach, 95% accuracy is achieved. The proposed framework is also evaluated using the Receiver operating characteristics curve (ROC-curve).
Journal Article
Decentralized trust optimization in VANETs: A blockchain-driven hybrid PoS-PBFT architecture for enhanced security and energy-efficient communication
2025
Vehicular Ad Hoc Networks (VANETs) are essential for the success of Intelligent Transportation Systems (ITS), providing real-time communication between vehicles and infrastructure. However, the highly dynamic and decentralized nature of VANETs introduces significant challenges in ensuring trust and security across the network, including security threats, communication overhead, and energy inefficiencies. This paper presents a novel blockchain-based trust management framework that addresses these issues by incorporating lightweight consensus mechanisms, optimized data propagation strategies, and energy-aware protocols. Our approach reduces communication overhead by selectively propagating trust updates, leading to a 35% decrease in overall network traffic compared to traditional broadcast-based systems. In terms of trust accuracy, our model achieves over 95% accuracy in detecting malicious nodes, significantly outperforming existing solutions. The proposed system demonstrates the identification and penalization of malicious behaviors such as Sybil attacks and false reporting with a 25% improvement in detection rate, while maintaining low latency (an average reduction of 30% compared to PoW-based systems) and efficient energy consumption, reducing energy use by up to 40%. The proposed model also incorporates a hybrid Proof of Stake (PoS) and Practical Byzantine Fault Tolerance (PBFT) consensus mechanism, which further enhances its scalability and fault tolerance. Simulation results show that our framework converges to accurate trust values faster than traditional methods, ensuring that reliable trust evaluations are made in real-time, even under high mobility conditions. The combination of these optimizations ensures that our framework is not only secure but also highly efficient, capable of supporting scalable and resilient VANET deployments. Furthermore, our decentralized approach ensures that trust decisions are made in real-time without the need for a centralized authority, making the system more adaptable to the high-mobility conditions of VANETs. This research offers a comprehensive solution for VANETs trust management, significantly improving communication efficiency, trust accuracy, and energy consumption while maintaining robust security and scalability. Our proposed blockchain-based trust management system provides a secure, energy-efficient, and scalable solution for VANETs, setting the stage for future developments in secure vehicular communication networks.
Journal Article
Decentralized trust optimization in VANETs: A blockchain-driven hybrid PoS-PBFT architecture for enhanced security and energy-efficient communication
by
Ullah, Zia
,
Rizvi, Sanam Shahla
,
Shah, Ibrar Ali
in
Comparative analysis
,
Energy conservation
,
Energy consumption
2025
Vehicular Ad Hoc Networks (VANETs) are essential for the success of Intelligent Transportation Systems (ITS), providing real-time communication between vehicles and infrastructure. However, the highly dynamic and decentralized nature of VANETs introduces significant challenges in ensuring trust and security across the network, including security threats, communication overhead, and energy inefficiencies. This paper presents a novel blockchain-based trust management framework that addresses these issues by incorporating lightweight consensus mechanisms, optimized data propagation strategies, and energy-aware protocols. Our approach reduces communication overhead by selectively propagating trust updates, leading to a 35% decrease in overall network traffic compared to traditional broadcast-based systems. In terms of trust accuracy, our model achieves over 95% accuracy in detecting malicious nodes, significantly outperforming existing solutions. The proposed system demonstrates the identification and penalization of malicious behaviors such as Sybil attacks and false reporting with a 25% improvement in detection rate, while maintaining low latency (an average reduction of 30% compared to PoW-based systems) and efficient energy consumption, reducing energy use by up to 40%. The proposed model also incorporates a hybrid Proof of Stake (PoS) and Practical Byzantine Fault Tolerance (PBFT) consensus mechanism, which further enhances its scalability and fault tolerance. Simulation results show that our framework converges to accurate trust values faster than traditional methods, ensuring that reliable trust evaluations are made in real-time, even under high mobility conditions. The combination of these optimizations ensures that our framework is not only secure but also highly efficient, capable of supporting scalable and resilient VANET deployments. Furthermore, our decentralized approach ensures that trust decisions are made in real-time without the need for a centralized authority, making the system more adaptable to the high-mobility conditions of VANETs. This research offers a comprehensive solution for VANETs trust management, significantly improving communication efficiency, trust accuracy, and energy consumption while maintaining robust security and scalability. Our proposed blockchain-based trust management system provides a secure, energy-efficient, and scalable solution for VANETs, setting the stage for future developments in secure vehicular communication networks.
Journal Article
An Enhanced Architecture to Resolve Public-Key Cryptographic Issues in the Internet of Things (IoT), Employing Quantum Computing Supremacy
by
Shamshad, Shuhab
,
Rizvi, Sanam Shahla
,
Riaz, Rabia
in
Algorithms
,
Cloud computing
,
Communication
2022
The Internet of Things (IoT) strongly influences the world economy; this emphasizes the importance of securing all four aspects of the IoT model: sensors, networks, cloud, and applications. Considering the significant value of public-key cryptography threats on IoT system confidentiality, it is vital to secure it. One of the potential candidates to assist in securing public key cryptography in IoT is quantum computing. Although the notion of IoT and quantum computing convergence is not new, it has been referenced in various works of literature and covered by many scholars. Quantum computing eliminates most of the challenges in IoT. This research provides a comprehensive introduction to the Internet of Things and quantum computing before moving on to public-key cryptography difficulties that may be encountered across the convergence of quantum computing and IoT. An enhanced architecture is then proposed for resolving these public-key cryptography challenges using SimuloQron to implement the BB84 protocol for quantum key distribution (QKD) and one-time pad (OTP). The proposed model prevents eavesdroppers from performing destructive operations in the communication channel and cyber side by preserving its state and protecting the public key using quantum cryptography and the BB84 protocol. A modified version is introduced for this IoT situation. A traditional cryptographic mechanism called “one-time pad” (OTP) is employed in hybrid management.
Journal Article
Toward blockchain based electronic health record management with fine grained attribute based encryption and decentralized storage mechanisms
2025
Current Electronic Health Record (EHR) systems exhibit several critical drawbacks, including significant vulnerabilities in security, privacy, and scalability. Traditional centralized databases are highly susceptible to cyber attacks, data breaches, and unauthorized access, posing severe risks to the confidentiality and integrity of sensitive patient information. In addition, these systems often face interoperability issues, which hinder seamless information sharing and access among healthcare providers. The absence of a unified and secure framework exacerbates these problems, leading to operational inefficiencies and increased administrative costs in the management of health records. This study introduces an innovative framework designed to overcome these challenges by integrating blockchain technology with the InterPlanetary File System (IPFS). The proposed EHRChain solution leverages attribute-based encryption to provide fine-grained access control, ensuring that only authorized users can retrieve and decrypt medical records. The IPFS framework eliminates single points of failure by storing encrypted data in a decentralized fashion, thus increasing the resilience of the system to cyber attacks. Incorporating blockchain technology ensures the immutability and traceability of medical data, significantly reducing the risks of data tampering. Performance evaluations using real data set simulation demonstrate the efficiency and feasibility of our framework, highlighting its potential to revolutionize the handling of electronic medical records. This study not only underscores the advantages of integrating blockchain with EHR systems but also presents a scalable and secure solution tailored to meet the demands of modern healthcare infrastructures. Our approach promises to improve data security, improve interoperability, and reduce operational inefficiencies, leading to a new standard in electronic health records.
Journal Article
Secure Healthcare Record Sharing Mechanism with Blockchain
by
Paul, Anand
,
Sayed, Toqeer Ali
,
Rizvi, Sanam Shahla
in
Access control
,
Access to information
,
Blockchain
2022
The transfer of information is a demanding issue, particularly due to the presence of a large number of eavesdroppers on communication channels. Sharing medical service records between different clinical jobs is a basic and testing research topic. The particular characteristics of blockchains have attracted a large amount of attention and resulted in revolutionary changes to various business applications, including medical care. A blockchain is based on a distributed ledger, which tends to improve cyber security. A number of proposals have been made with respect to the sharing of basic medical records using a blockchain without needing earlier information or the trust of patients. Specialist service providers and insurance agencies are not secure against data breaches. The safe sharing of clinical records between different countries, to ensure an incorporated and universal medical service, is also a significant issue for patients who travel. The medical data of patients normally reside on different healthcare units around the world, thus raising many concerns. Firstly, a patient’s history of treatment by different physicians is not accessible to the doctor in a single location. Secondly, it is very difficult to secure widespread data residing in different locations. This study proposed record sharing in a chain-like structure, in which every record is globally connected to the others, based on a blockchain under the suggestions and recommendations of the HL7 standards. This study focused on making medical data available, especially of patients who travel in different countries, for a specific period of time after validating the required authentication. Authorization and authentication are performed on the Shibboleth identity management system with the involvement of patient in the sanction process, thereby revealing the patient data for the specific period of time. The proposed approach improves the performance with respect to other record sharing systems, e.g., it reduces the time to read, write, delete, and revoke a record by a noticeable margin. The proposed system takes around three seconds to upload and 7.5 s to download 250 Mb of data, which can contain up to sixteen documents, over a stable network connection. The system has a latency of 413.76 ms when retrieving 100 records, compared to 447.9 and 459.3 ms in previous systems. Thus, the proposed system improved the performance and ensured seclusion by using a blockchain.
Journal Article
Short term demand forecasting of electric vehicle charging stations using context aware temporal transformer model
by
Hussain, Adil
,
Rizvi, Sanam Shahla
,
Lu, Qing-Chang
in
639/4077/4073/4071
,
639/705/1042
,
639/705/117
2025
The growing number of electric vehicles (EVs) on the road poses great challenges to the power supply and causes outages. Most existing research works focus on individual or aggregated charging station data at the city level. However, charging behaviors at different city locations might demonstrate different patterns and characteristics. This study proposed a Context-Aware Temporal Transformer (CAT-Former) model using Temporal and Contextual features for short-term EV charging demand forecasting of one hour and one day ahead using the public EV data from Boulder City, Colorado. The temporal and contextual features are important features, which help the model to understand the charging patterns of different periods over different locations. The charging data with different trends is crucial to train and test the proposed model performance. Therefore, this study chose the three locations with the highest number of sessions from the data. The performance of the proposed model, as well as the baseline models, including LSTM, BiLSTM, and hybrid models such as CNN-LSTM and CNN-BiLSTM, is assessed and compared using Mean Square Error (MSE) and Mean Absolute Error (MAE) on three locations. The proposed model is compared to the Simple and Hybrid Transformer models utilizing the LSTM-based Encoder-Decoder. The proposed model performed better than the baseline models for one hour and one day ahead of forecasting for the selected locations by achieving the lowest MSE and MAE values. The results show that the proposed CAT-Former model using temporal and contextual features can effectively forecast the charging demand using charging data from different locations for short-term periods, including one-hour and one-day ahead predictions.
Journal Article
Characterization of English Braille Patterns Using Automated Tools and RICA Based Feature Extraction Methods
2022
Braille is used as a mode of communication all over the world. Technological advancements are transforming the way Braille is read and written. This study developed an English Braille pattern identification system using robust machine learning techniques using the English Braille Grade-1 dataset. English Braille Grade-1 dataset was collected using a touchscreen device from visually impaired students of the National Special Education School Muzaffarabad. For better visualization, the dataset was divided into two classes as class 1 (1–13) (a–m) and class 2 (14–26) (n–z) using 26 Braille English characters. A position-free braille text entry method was used to generate synthetic data. N = 2512 cases were included in the final dataset. Support Vector Machine (SVM), Decision Trees (DT) and K-Nearest Neighbor (KNN) with Reconstruction Independent Component Analysis (RICA) and PCA-based feature extraction methods were used for Braille to English character recognition. Compared to PCA, Random Forest (RF) algorithm and Sequential methods, better results were achieved using the RICA-based feature extraction method. The evaluation metrics used were the True Positive Rate (TPR), True Negative Rate (TNR), Positive Predictive Value (PPV), Negative Predictive Value (NPV), False Positive Rate (FPR), Total Accuracy, Area Under the Receiver Operating Curve (AUC) and F1-Score. A statistical test was also performed to justify the significance of the results.
Journal Article
Cogent and Energy Efficient Authentication Protocol for WSN in IoT
by
Paul, Anand
,
Mahmood Butt, Tariq
,
Shahla Rizvi, Sanam
in
Authentication
,
Biometrics
,
Denial of service attacks
2021
Given the accelerating development of Internet of things (IoT), a secure and robust authentication mechanism is urgently required as a critical architectural component. The IoT has improved the quality of everyday life for numerous people in many ways. Owing to the predominantly wireless nature of the IoT, connected devices are more vulnerable to security threats compared to wired networks. User authentication is thus of utmost importance in terms of security on the IoT. Several authentication protocols have been proposed in recent years, but most prior schemes do not provide sufficient security for these wireless networks. To overcome the limitations of previous schemes, we propose an efficient and lightweight authentication scheme called the Cogent Biometric-Based Authentication Scheme (COBBAS). The proposed scheme is based on biometric data, and uses lightweight operations to enhance the efficiency of the network in terms of time, storage, and battery consumption. A formal security analysis of COBBAS using Burrows–Abadi–Needham logic proves that the proposed protocol provides secure mutual authentication. Formal security verification using the Automated Validation of Internet Security Protocols and Applications tool shows that the proposed protocol is safe against man-in-the-middle and replay attacks. Informal security analysis further shows that COBBAS protects wireless sensor networks against several security attacks such as password guessing, impersonation, stolen verifier attacks, denial-of-service attacks, and errors in biometric recognition. This protocol also provides user anonymity, confidentiality, integrity, and biometric recovery in acceptable time with reasonable computational cost.
Journal Article
Multiscale based nonlinear dynamics analysis of heart rate variability signals
2020
Acceleration change index (ACI) is a fast and easy to understand heart rate variability (HRV) analysis approach used for assessing cardiac autonomic control of the nervous systems. The cardiac autonomic control of the nervous system is an example of highly integrated systems operating at multiple time scales. Traditional single scale based ACI did not take into account multiple time scales and has limited capability to classify normal and pathological subjects. In this study, a novel approach multiscale ACI (MACI) is proposed by incorporating multiple time scales for improving the classification ability of ACI. We evaluated the performance of MACI for classifying, normal sinus rhythm (NSR), congestive heart failure (CHF) and atrial fibrillation subjects. The findings reveal that MACI provided better classification between healthy and pathological subjects compared to ACI. We also compared MACI with other scale-based techniques such as multiscale entropy, multiscale permutation entropy (MPE), multiscale normalized corrected Shannon entropy (MNCSE) and multiscale permutation entropy (IMPE). The preliminary results show that MACI values are more stable and reliable than IMPE and MNCSE. The results show that MACI based features lead to higher classification accuracy.
Journal Article