Blockchain-based multifactor authentication for future 6G cellular networks: A systematic review

J Asim, AS Khan, RM Saqib, J Abdullah, Z Ahmad… - Applied Sciences, 2022 - mdpi.com
There are continued advances in the internet and communication fields regarding the
deployment of 5G-based applications. It is expected that by 2030, 6G applications will …

Anomaly detection using deep neural network for IoT architecture

Z Ahmad, A Shahid Khan, K Nisar, I Haider, R Hassan… - Applied Sciences, 2021 - mdpi.com
The revolutionary idea of the internet of things (IoT) architecture has gained enormous
popularity over the last decade, resulting in an exponential growth in the IoT networks …

[PDF][PDF] Analysis and Intellectual Structure of the Multi-Factor Authentication in Information Security.

RM Saqib, AS Khan, Y Javed, S Ahmad… - … Automation & Soft …, 2022 - academia.edu
This study presents the current state of research on multi-factor authentication.
Authentication is one of the important traits in the security domain as it ensures that …

[PDF][PDF] Security issues in 5G device to device communication

AS Khan, Y Javed, J Abdullah, JM Nazim, N Khan - IJCSNS, 2017 - researchgate.net
Abstract 5G is a promising technology that will support high connectivity and device to
device communication. It also promises to improve the existing technologies and will support …

[PDF][PDF] Quantum-elliptic curve cryptography for multihop communication in 5G networks

S Khan, J Abdullah, N Khan, AA Julahi… - International Journal of …, 2017 - academia.edu
ABSTRACT The Internet of Things (IoT) depicts a giant network where every “thing” can be
interconnected through the communication network. The communication can be initiated …

Employing public key infrastructure to encapsulate messages during transport layer security handshake procedure

NA Khan, AS Khan, HA Kar, Z Ahmad… - 2022 Applied …, 2022 - ieeexplore.ieee.org
The Transport Layer ensures that data is sent transparently between end-users while also
enabling reliable data transfer services to the higher levels. Cryptographic protocols Secure …

PKI-Based security enhancement for IoT in 5G networks

NA Khan - … and Information Technologies: Proceedings of ICICIT …, 2022 - Springer
Abstract The Internet of Things (IoT) is a concept that includes physical devices, web-
enabled devices, and the entire network of connections that they use to communicate. The …

Quorum and non-quorum based hierarchical multi-authority access control scheme for secure data sharing in cloud based environment

SA Parte, R Thakur - Sādhanā, 2024 - Springer
In the present time, cloud platforms are gaining more popularity for outsourcing features. So,
many public or private organizations are fascinated towards cloud technology since it can …

[PDF][PDF] Authentication of IoT device with the enhancement of One-time Password (OTP)

Y Chan, Y Khoo, M Nafy - Journal of IT in Asia, 2021 - pdfs.semanticscholar.org
The Internet of Things (IoT) is an arising innovation and expected to give answers for
different modern fields. The IoT enable connection of physical devices all around the world …

[PDF][PDF] Secure and efficient distributed relay-based rekeying algorithm for group communication in mobile multihop relay network

AS Khan - International Journal of Communication Networks and …, 2014 - Citeseer
In mobile multihop relay (MMR) networks, Relay multicast rekeying algorithm (RMRA) is
meant to ensure secure multicast communication and selective updating of keys in MMR …