scispace - formally typeset
Search or ask a question
Author

Tariq Ahamed Ahanger

Bio: Tariq Ahamed Ahanger is an academic researcher from Salman bin Abdulaziz University. The author has contributed to research in topics: Computer science & Medicine. The author has an hindex of 5, co-authored 24 publications receiving 148 citations.

Papers published on a yearly basis

Papers
More filters
Journal ArticleDOI
TL;DR: This survey guides the reader through a comprehensive discussion of the main characteristics of SDN and NFV technologies, and provides a thorough analysis of the different classifications, use cases, and challenges related to UAV-assisted systems.
Abstract: Unmanned Aerial Vehicles (UAVs) have become increasingly important in assisting 5G and beyond 5G (B5G) mobile networks. Indeed, UAVs have all the potentials to both satisfy the ever-increasing mobile data demands of such mobile networks and provide ubiquitous connectivity to different kinds of wireless devices. However, the UAV assistance paradigm faces a set of crucial issues and challenges. For example, the network management of current UAV-assisted systems is time consuming, complicated, and carried out manually, thus causing a multitude of interoperability issues. To efficiently address all these issues, Software-Defined Network (SDN) and Network Function Virtualization (NFV) are two promising technologies to efficiently manage and improve the UAV assistance for the next generation of mobile networks. In the literature, no clear guidelines are describing the different use cases of SDN and NFV in the context of UAV assistance to terrestrial networks, including mobile networks. Motivated by this fact, in this survey, we guide the reader through a comprehensive discussion of the main characteristics of SDN and NFV technologies. Moreover, we provide a thorough analysis of the different classifications, use cases, and challenges related to UAV-assisted systems. We then discuss SDN/NFV-enabled UAV-assisted systems, along with several case studies and issues, such as the involvement of UAVs in cellular communications, monitoring, and routing, to name a few. We furthermore present a set of open research challenges, high-level insights, and future research directions related to UAV-assisted systems.

137 citations

Proceedings ArticleDOI
08 May 2018
TL;DR: An overview of the present existing issues and challenges in fog computing is provided.
Abstract: The paradigm of fog computing has set new trends and heights in the modern world networking and have overcome the major technical complexities of cloud computing. It is not a replacement of cloud computing technology but it just adds feasible advanced characteristics to existing cloud computing paradigm.fog computing not only provide storage, networking and computing services but also provide a platform for IoT (internet of things). However, the fog computing technology also arise the threat to privacy and security of the data and services. The existing security and privacy mechanisms of the cloud computing cannot be applied to the fog computing directly due to its basic characteristics of large-scale geo-distribution, mobility and heterogeneity. This article provides an overview of the present existing issues and challenges in fog computing.

53 citations

Journal ArticleDOI
TL;DR: The AIoT-H application is likely to be explored in this research article due to its potential to aid with existing and different technologies, as well as bring useful solutions to healthcare security challenges.
Abstract: A significant study has been undertaken in the areas of health care and administration of cutting-edge artificial intelligence (AI) technologies throughout the previous decade. Healthcare professionals studied smart gadgets and other medical technologies, along with the AI-based Internet of Things (IoT) (AIoT). Connecting the two regions makes sense in terms of improving care for rural and isolated resident individuals. The healthcare industry has made tremendous strides in efficiency, affordability, and usefulness as a result of new research options and major cost reductions. This includes instructions (AIoT-based) medical advancements can be both beneficial and detrimental. While the IoT concept undoubtedly offers a number of benefits, it also poses fundamental security and privacy concerns regarding medical data. However, resource-constrained AIoT devices are vulnerable to a number of assaults, which can significantly impair their performance. Cryptographic algorithms used in the past are inadequate for safeguarding IoT-enabled networks, presenting substantial security risks. The AIoT is made up of three layers: perception, network, and application, all of which are vulnerable to security threats. These threats can be aggressive or passive in nature, and they can originate both within and outside the network. Numerous IoT security issues, including replay, sniffing, and eavesdropping, have the ability to obstruct network communication. The AIoT-H application is likely to be explored in this research article due to its potential to aid with existing and different technologies, as well as bring useful solutions to healthcare security challenges. Additionally, every day, several potential problems and inconsistencies with the AIoT-H technique have been discovered.

35 citations

Journal ArticleDOI
TL;DR: This paper has investigated the sparse Bayesian learning (SBL) framework for sparse multipath CE in FBMC/OQAM communications and proposed block SBL (BSBL) algorithm, which can achieve lower mean square error (MSE) and bit error rate (BER) than traditional least squares method and classical compressive sensing methods.

31 citations

Journal ArticleDOI
TL;DR: In this paper , a taxonomy of IoT vulnerabilities, corresponding attackers, and effects, threats that explore weak links, effective remedies, and organizational authentication technologies that are currently available to recognize and track such deficiencies.
Abstract: The data protection problem concerning the Internet of Things (IoT) paradigm has drawn the innovation community’s considerable attention. Several surveys have covered different IoT-centered issues, namely vulnerability simulation, intrusion detection systems, and state-of-the-art techniques were put forward for this purpose. In comparison, we concentrate exclusively on the emerging IoT vulnerabilities and related Artificial Techniques in the current research. This paper initializes the detailed categorization of recent research works, which explore different Machine Learning and Deep Learning techniques for the IoT paradigm. Additionally, a novel taxonomy is included based on IoT vulnerabilities, corresponding attackers, and effects, threats that explore weak links, effective remedies, and organizational authentication technologies that are currently available to recognize and track such deficiencies. This seeks to offer a multidimensional analysis viewpoint on IoT vulnerabilities to the reader, including the technological specifics and effects, which are intended to be leveraged for remediation goals. Inspired by the lack of IoT paradigm-related scientific (and malicious) evidence, the current study provides an emphasis on IoT manipulation from passive measurements. The current research illustrates the seriousness of the IoT problem while offering organizational knowledge resources that will inevitably assist in the mitigating mission in general. In addition to open issues and research concerns, informative conclusions, inferences, and results are revealed in the current research, which will lead to future research initiatives to resolve scientific concerns relevant to IoT security.

29 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: A comprehensive survey on UAV communication towards 5G/B5G wireless networks is presented in this article, where UAVs are expected to be an important component of the upcoming wireless networks that can potentially facilitate wireless broadcast and support high rate transmissions.
Abstract: Providing ubiquitous connectivity to diverse device types is the key challenge for 5G and beyond 5G (B5G). Unmanned aerial vehicles (UAVs) are expected to be an important component of the upcoming wireless networks that can potentially facilitate wireless broadcast and support high rate transmissions. Compared to the communications with fixed infrastructure, UAV has salient attributes, such as flexible deployment, strong line-of-sight (LoS) connection links, and additional design degrees of freedom with the controlled mobility. In this paper, a comprehensive survey on UAV communication towards 5G/B5G wireless networks is presented. We first briefly introduce essential background and the space-air-ground integrated networks, as well as discuss related research challenges faced by the emerging integrated network architecture. We then provide an exhaustive review of various 5G techniques based on UAV platforms, which we categorize by different domains including physical layer, network layer, and joint communication, computing and caching. In addition, a great number of open research problems are outlined and identified as possible future research directions.

566 citations

Journal ArticleDOI
07 Apr 2021
TL;DR: In this paper, the authors provide a comprehensive survey of the current developments towards 6G and elaborate the requirements that are necessary to realize the 6G applications, and summarize lessons learned from state-of-the-art research and discuss technical challenges that would shed a new light on future research directions toward 6G.
Abstract: Emerging applications such as Internet of Everything, Holographic Telepresence, collaborative robots, and space and deep-sea tourism are already highlighting the limitations of existing fifth-generation (5G) mobile networks. These limitations are in terms of data-rate, latency, reliability, availability, processing, connection density and global coverage, spanning over ground, underwater and space. The sixth-generation (6G) of mobile networks are expected to burgeon in the coming decade to address these limitations. The development of 6G vision, applications, technologies and standards has already become a popular research theme in academia and the industry. In this paper, we provide a comprehensive survey of the current developments towards 6G. We highlight the societal and technological trends that initiate the drive towards 6G. Emerging applications to realize the demands raised by 6G driving trends are discussed subsequently. We also elaborate the requirements that are necessary to realize the 6G applications. Then we present the key enabling technologies in detail. We also outline current research projects and activities including standardization efforts towards the development of 6G. Finally, we summarize lessons learned from state-of-the-art research and discuss technical challenges that would shed a new light on future research directions towards 6G.

273 citations

Journal ArticleDOI
TL;DR: This paper describes ARAN architecture and its fundamental features for the development of 6G networks, and introduces technologies that enable the success of ARAN implementations in terms of energy replenishment, operational management, and data delivery.
Abstract: Current access infrastructures are characterized by heterogeneity, low latency, high throughput, and high computational capability, enabling massive concurrent connections and various services. Unfortunately, this design does not pay significant attention to mobile services in underserved areas. In this context, the use of aerial radio access networks (ARANs) is a promising strategy to complement existing terrestrial communication systems. Involving airborne components such as unmanned aerial vehicles, drones, and satellites, ARANs can quickly establish a flexible access infrastructure on demand. ARANs are expected to support the development of seamless mobile communication systems toward a comprehensive sixth-generation (6G) global access infrastructure. This paper provides an overview of recent studies regarding ARANs in the literature. First, we investigate related work to identify areas for further exploration in terms of recent knowledge advancements and analyses. Second, we define the scope and methodology of this study. Then, we describe ARAN architecture and its fundamental features for the development of 6G networks. In particular, we analyze the system model from several perspectives, including transmission propagation, energy consumption, communication latency, and network mobility. Furthermore, we introduce technologies that enable the success of ARAN implementations in terms of energy replenishment, operational management, and data delivery. Subsequently, we discuss application scenarios envisioned for these technologies. Finally, we highlight ongoing research efforts and trends toward 6G ARANs.

136 citations

Journal ArticleDOI
TL;DR: In this paper, a comprehensive survey on security and privacy issues in the context of EC-assisted IoT is presented, including definitions, applications, architecture, advantages, and challenges, as well as several open challenges and future research directions for secure EC assisted IoT paradigm are also extensively provided.
Abstract: Internet of Things (IoT) is an innovative paradigm envisioned to provide massive applications that are now part of our daily lives. Millions of smart devices are deployed within complex networks to provide vibrant functionalities, including communications, monitoring, and controlling of critical infrastructures. However, this massive growth of IoT devices and the corresponding huge data traffic generated at the edge of the network created additional burdens on the state-of-the-art centralized cloud computing paradigm due to the bandwidth and resource scarcity. Hence, edge computing (EC) is emerging as an innovative strategy that brings data processing and storage near to the end users, leading to what is called the EC-assisted IoT. Although this paradigm provides unique features and enhanced Quality of Service (QoS), it also introduces huge risks in data security and privacy aspects. This article conducts a comprehensive survey on security and privacy issues in the context of EC-assisted IoT. In particular, we first present an overview of EC-assisted IoT, including definitions, applications, architecture, advantages, and challenges. Second, we define security and privacy in the context of EC-assisted IoT. Then, we extensively discuss the major classifications of attacks in EC-assisted IoT and provide possible solutions and countermeasures along with the related research efforts. After that, we further classify some security and privacy issues as discussed in the literature based on security services and based on security objectives and functions. Finally, several open challenges and future research directions for secure EC-assisted IoT paradigm are also extensively provided.

116 citations

Journal ArticleDOI
TL;DR: There are various routing techniques, real‐time applications of UAVs which are elaborated in this paper, namely, representative, cooperative, and noncooperative techniques, and collision avoidance techniques which are very important for the obstacle‐free environment.

112 citations