scispace - formally typeset
Search or ask a question
Author

Adnan Nadeem

Bio: Adnan Nadeem is an academic researcher from Islamic University. The author has contributed to research in topics: Wireless sensor network & Mobile ad hoc network. The author has an hindex of 12, co-authored 59 publications receiving 801 citations. Previous affiliations of Adnan Nadeem include Federal Urdu University & Government College University, Faisalabad.


Papers
More filters
Journal ArticleDOI
TL;DR: A survey of the main types of attack at the network layer, and a review of intrusion detection and protection mechanisms that have been proposed in the literature are presented.
Abstract: In the last decade, mobile ad hoc networks (MANETs) have emerged as a major next generation wireless networking technology. However, MANETs are vulnerable to various attacks at all layers, including in particular the network layer, because the design of most MANET routing protocols assumes that there is no malicious intruder node in the network. In this paper, we present a survey of the main types of attack at the network layer, and we then review intrusion detection and protection mechanisms that have been proposed in the literature. We classify these mechanisms as either point detection algorithms that deal with a single type of attack, or as intrusion detection systems (IDSs) that can deal with a range of attacks. A comparison of the proposed protection mechanisms is also included in this paper. Finally, we identify areas where further research could focus.

210 citations

Journal ArticleDOI
TL;DR: A comparative analysis of core blockchain architecture, its fundamental concepts, and its applications in three major areas: the Internet-of-Things (IoT), healthcare, business and vehicular industry.
Abstract: In the past few years, the implementation of blockchain technology for various applications has been widely discussed in the research community and the industry. There are sufficient number of articles that discuss the possibility of applying blockchain technology in various areas, such as, healthcare, IoT, and business. However, in this article, we present a comparative analysis of core blockchain architecture, its fundamental concepts, and its applications in three major areas: the Internet-of-Things (IoT), healthcare, business and vehicular industry. For each area, we discuss in detail, challenges and solutions that have been proposed from the research community and industry. This research studies also presented the complete ecosystem of blockchain of all the papers we reviewed and summarized. Moreover, analysis is performed of various blockchain platforms, their consensus models, and applications. Finally, we discuss key aspects that are required for the widespread future adoption of blockchain technology in these major areas.

156 citations

Journal ArticleDOI
TL;DR: A comprehensive survey of blockchain technology's evolution, architecture, development frameworks, and security issues is presented in this paper, where the authors present a comparative analysis of frameworks, classification of consensus algorithms, and analysis of security risks & cryptographic primitives that have been used in the blockchain.
Abstract: Blockchain is a revolutionary technology that is making a great impact on modern society due to its transparency, decentralization, and security properties. Blockchain gained considerable attention due to its very first application of Cryptocurrencies e.g., Bitcoin. In the near future, Blockchain technology is determined to transform the way we live, interact, and perform businesses. Recently, academics, industrialists, and researchers are aggressively investigating different aspects of Blockchain as an emerging technology. Unlike other Blockchain surveys focusing on either its applications, challenges, characteristics, or security, we present a comprehensive survey of Blockchain technology’s evolution, architecture, development frameworks, and security issues. We also present a comparative analysis of frameworks, classification of consensus algorithms, and analysis of security risks & cryptographic primitives that have been used in the Blockchain so far. Finally, this paper elaborates on key future directions, novel use cases and open research challenges, which could be explored by researchers to make further advances in this field.

95 citations

Journal ArticleDOI
01 Feb 2014
TL;DR: An intrusion detection & adaptive response mechanism for MANETs that detects a range of attacks and provides an effective response with low network degradation and an analysis of the impact shows that it allows a flexible approach to management of threats and demonstrates improved network performance with a low network overhead.
Abstract: Mobile ad hoc networks are vulnerable to a variety of network layer attacks such as black hole, gray hole, sleep deprivation & rushing attacks. In this paper we present an intrusion detection & adaptive response mechanism for MANETs that detects a range of attacks and provides an effective response with low network degradation. We consider the deficiencies of a fixed response to an intrusion; and we overcome these deficiencies with a flexible response scheme that depends on the measured confidence in the attack, the severity of attack and the degradation in network performance. We present results from an implementation of the response scheme that has three intrusion response actions. Simulation results show the effectiveness of the proposed detection and adaptive response mechanisms in various attack scenarios. An analysis of the impact of our proposed scheme shows that it allows a flexible approach to management of threats and demonstrates improved network performance with a low network overhead.

81 citations

Journal ArticleDOI
TL;DR: A feasibility of scenarios where BASN can be used for both application and technical aspects is proposed and the use of BASN from literature is classified, based on certain parameters.

75 citations


Cited by
More filters
01 Jan 2016

950 citations

Journal ArticleDOI
TL;DR: In this review, different types of composting methods reportedly applied in waste management were explored and the major factors such as temperature, pH, C/N ratio, moisture, particle size, and relevant strategies to improve and optimize process effectiveness were addressed.

359 citations

Journal ArticleDOI
TL;DR: A four-layer HetIoT architecture consisting of sensing, networking, cloud computing, and applications is proposed, including self-organizing, big data transmission, privacy protection, data integration and processing in large-scale Het IoT.
Abstract: Heterogeneous Internet of Things (HetIoT) is an emerging research field that has strong potential to transform both our understanding of fundamental computer science principles and our future living. HetIoT is being employed in increasing number of areas, such as smart home, smart city, intelligent transportation, environmental monitoring, security systems, and advanced manufacturing. Therefore, relaying on strong application fields, HetIoT will be filled in our life and provide a variety of convenient services for our future. The network architectures of IoT are intrinsically heterogeneous, including wireless sensor network, wireless fidelity network, wireless mesh network, mobile communication network, and vehicular network. In each network unit, smart devices utilize appropriate communication methods to integrate digital information and physical objects, which provide users with new exciting applications and services. However, the complexity of application requirements, the heterogeneity of network architectures and communication technologies impose many challenges in developing robust HetIoT applications. This paper proposes a four-layer HetIoT architecture consisting of sensing, networking, cloud computing, and applications. Then, the state of the art in HetIoT research and applications have been discussed. This paper also suggests several potential solutions to address the challenges facing future HetIoT, including self-organizing, big data transmission, privacy protection, data integration and processing in large-scale HetIoT.

318 citations

Journal ArticleDOI
TL;DR: This study provides a review of the recent advances in remote healthcare and monitoring in both with-contact and contactless methods and discusses some issues available in most systems.
Abstract: Healthcare is a field that is rapidly developing in technology and services. A recent development in this area is remote monitoring of patients which has many advantages in a fast aging world population with increasing health complications. With relatively simple applications to monitor patients inside hospital rooms, the technology has developed to the extent that the patient can be allowed normal daily activities at home while still being monitored with the use of modern communication and sensor technologies. Sensors for monitoring essential vital signs such as electrocardiogram reading, heart rate, respiration rate, blood pressure, temperature, blood glucose levels and neural system activity are available today. Range of remote healthcare varies from monitoring chronically ill patients, elders, premature children to victims of accidents. These new technologies can monitor patients based on the illness or based on the situation. The technology varies from sensors attached to body to ambient sensors attached to the environment and new breakthroughs show contactless monitoring which requires only the patient to be present within a few meters from the sensor. Fall detection systems and applications to monitor chronical ill patients have already become familiar to many. This study provides a review of the recent advances in remote healthcare and monitoring in both with-contact and contactless methods. With the review, the authors discuss some issues available in most systems. The paper also includes some directions for future research.

282 citations

01 Jan 2016
TL;DR: The electromagnetic simulation using the fdtd method is universally compatible with any devices to read and is available in the book collection an online access to it is set as public so you can download it instantly.
Abstract: electromagnetic simulation using the fdtd method is available in our book collection an online access to it is set as public so you can download it instantly. Our digital library hosts in multiple locations, allowing you to get the most less latency time to download any of our books like this one. Kindly say, the electromagnetic simulation using the fdtd method is universally compatible with any devices to read.

243 citations