scispace - formally typeset
Search or ask a question
Author

Khawaja Muhammad Yahya

Bio: Khawaja Muhammad Yahya is an academic researcher from Pakistan Institute of Engineering and Applied Sciences. The author has contributed to research in topics: Hash-based message authentication code & Block cipher. The author has an hindex of 1, co-authored 3 publications receiving 29 citations.

Papers
More filters
Posted Content
TL;DR: This research work investigates different cryptographic techniques, and provides efficient techniques for communicating device, by selecting different comparison matrices that satisfies both the security and restricted resources in WSN environment.
Abstract: Wireless Sensor Networks (WSN) are becoming popular day by day, however one of the main issue in WSN is its limited resources. We have to look to the resources to create Message Authentication Code (MAC) keeping in mind the feasibility of technique used for the sensor network at hand. This research work investigates different cryptographic techniques such as symmetric key cryptography and asymmetric key cryptography. Furthermore, it compares different encryption techniques such as stream cipher (RC4), block cipher (RC2, RC5, RC6 etc) and hashing techniques (MD2, MD4, MD5, SHA, SHA1 etc). The result of our work provides efficient techniques for communicating device, by selecting different comparison matrices i.e. energy consumption, processing time, memory and expenses that satisfies both the security and restricted resources in WSN environment to create MAC.

29 citations

Journal ArticleDOI
TL;DR: A fully automated design to classify brain tumors by utilizing differential evaluation and particle swarm optimization algorithms and shows significant improvement over the state-of-the-art techniques in terms of computational overhead by maintaining approximately the same accuracy.
Abstract: Early detection of brain tumors can save precious human life. This work presents a fully automated design to classify brain tumors. The proposed scheme employs optimal deep learning features for the classification of FLAIR, T1, T2, and T1CE tumors. Initially, we normalized the dataset to pass them to the ResNet101 pretrained model to perform transfer learning for our dataset. This approach results in fine-tuning the ResNet101 model for brain tumor classification. The problem with this approach is the generation of redundant features. These redundant features degrade accuracy and cause computational overhead. To tackle this problem, we find optimal features by utilizing differential evaluation and particle swarm optimization algorithms. The obtained optimal feature vectors are then serially fused to get a single-fused feature vector. PCA is applied to this fused vector to get the final optimized feature vector. This optimized feature vector is fed as input to various classifiers to classify tumors. Performance is analyzed at various stages. Performance results show that the proposed technique achieved a speedup of 25.5x in prediction time on the medium neural network with an accuracy of 94.4%. These results show significant improvement over the state-of-the-art techniques in terms of computational overhead by maintaining approximately the same accuracy.

16 citations

Proceedings ArticleDOI
06 Dec 2012
TL;DR: This paper presents a method based on linear interpolation and least square error curve fitting to develop a phase compensation logic for the QDDFS that is more area efficient and time efficient than look up table based approaches and Coordinate Rotation Digital Computer (CORDIC) based approaches respectively.
Abstract: Quadrature Direct Digital Frequency Synthesis (QDDFS) is a device which can generate both sine and cosine simultaneously. This paper presents a method based on linear interpolation and least square error curve fitting to develop a phase compensation logic for the QDDFS. The architecture is suitable for VLSI implementation of QDDFS and is more area efficient and time efficient than look up table based approaches and Coordinate Rotation Digital Computer (CORDIC) based approaches respectively.

Cited by
More filters
01 Jul 1987

277 citations

Journal ArticleDOI
TL;DR: In this paper, the authors propose the adoption of dynamic countermeasures (which can be integrated within access control policies) changing along time to face variations in the risk level of every resource, bringing two main benefits, namely: (i) a suitable resource protection according to risk level (not under or over estimated) and (ii) an access control system granting/denying access depending on the fulfillment of a set of security controls applicable in an authorization access request.

22 citations

Journal ArticleDOI
TL;DR: A security solution based on digital watermarking is adopted to achieve the secure communications for wireless sensor networks in smart grid by data and entity authentications at a low cost of operation.
Abstract: As more and more wireless sensor nodes and networks are employed to acquire and transmit the state information of power equipment in smart grid, we are in urgent need of some viable security solutions to ensure secure smart grid communications. Conventional information security solutions, such as encryption/decryption, digital signature and so forth, are not applicable to wireless sensor networks in smart grid any longer, where bulk messages need to be exchanged continuously. The reason is that these cryptographic solutions will account for a large portion of the extremely limited resources on sensor nodes. In this article, a security solution based on digital watermarking is adopted to achieve the secure communications for wireless sensor networks in smart grid by data and entity authentications at a low cost of operation. Our solution consists of a secure framework of digital watermarking, and two digital watermarking algorithms based on alternating electric current and time window, respectively. Both watermarking algorithms are composed of watermark generation, embedding and detection. The simulation experiments are provided to verify the correctness and practicability of our watermarking algorithms. Additionally, a new cloud-based architecture for the information integration of smart grid is proposed on the basis of our security solutions.

17 citations

Journal ArticleDOI
TL;DR: Different asymmetric algorithms such as RSA, Diffie-Hellman, DSA, ECC, hybrid and DNA cryptography are compared based on their key size, strength, weakness, attacks and possible countermeasures in the form of table.
Abstract: The Wireless Sensor Networks (WSNs) have spread its roots in almost every application. Owing to their scattered nature of sensor nodes, they are more prone to attacks. There are certain applications e.g. military, where sensor data’s confidentiality requirement during transmission is essential. Cryptography has a vital role for achieving security in WSNs.WSN has resource constraints like memory size, processing speed and energy consumption which bounds the applicability of existing cryptographic algorithms for WSN. Any good security algorithms has higher energy consumption by the nodes, so it’s a need to choose most energy-efficient cryptographic encryption algorithms for WSNs. This paper surveys different asymmetric algorithms such as RSA, Diffie-Hellman, DSA, ECC, hybrid and DNA cryptography. These algorithms are compared based on their key size, strength, weakness, attacks and possible countermeasures in the form of table.

17 citations

01 Jan 2015
TL;DR: This paper presents a detailed study of symmetric encryption/decryption algorithms and its advantages and disadvantages.
Abstract: With the advancement of technology internet and various communication techniques that pass through it has grown in prominence each day. However along with this advancement has also grown the threat of hackers and malicious groups. There has been several passive and active attacks making the role of data security pretty important. Most of the time the data passed via internet might contain confidential or personal information which many people would want to be protected against attacks. Various data encryption algorithms has been developed to make sure that the data transmitted via internet is secure from any sort of hacking or attacks.Several cryptographic algorithms also have been developed for encryption and with each one having some advantages and disadvantages. This paper presents a detailed study of symmetric encryption/decryption algorithms and its advantages and disadvantages.

14 citations