Adil Bashir

Work place: Department of Computer Science &Engineering Islamic University of Science &Technology, Awantipora, India

E-mail: adilbashir.445@gmail.com

Website:

Research Interests: Network Engineering, Network Security, Network Architecture, Computer Networks, Embedded System, Computer Architecture and Organization, Computer systems and computational processes, Wireless Networks, , Sensor

Biography

Adil Bashir received his Bachelor of Technology (B.Tech) in Computer Science and Engineering from Islamic University of Science and Technology, Jammu & Kashmir, India in year 2011. He has done his Master of Technology (M.Tech) in Communication and Information Technology from National Institute of Technology (NIT) Srinagar, India in 2013. Presently he is Assistant Professor in Computer Science and Engineering department at IUST Awantipora, Jammu and Kashmir, India. His areas of interest are Internet of Things,Wireless Sensor Networks, Embedded Systems and Network Security

Author Articles
Cryptographic Resilience and Efficiency: A Comparative Study of NTRU and ECC Cryptographic Mechanisms for Internet of Medical Things

By Alina Pervaiz Adil Bashir Maheen Fayaz Numrena Farooq Ajaz Hussain Mir

DOI: https://doi.org/10.5815/ijwmt.2024.02.04, Pub. Date: 8 Apr. 2024

In the dynamic realm of Smart Healthcare Systems (SHS), the integration of IoT devices has revolutionized conventional practices, ushering in an era of real-time data collection and seamless communication across the healthcare ecosystem. Amidst this technological shift, the paramount concern remains the security of sensitive healthcare data within intricate networks. Several cryptographic algorithms have been proposed for smart healthcare systems for the protection of critical and sensitive data in SHS, however, the majority of newly proposed algorithms have shortcomings in terms of resource utilization and the level of security that they provide. Our research delves into the existing highly secure cryptographic algorithms and provides a comparative analysis of two popular and secure cryptographic algorithms viz N-th Degree Truncated Polynomial Ring (NTRU) and Elliptic Curve Cryptography (ECC) and verifies their applicability in SHS. Recognizing ECC's compact key sizes and its vulnerability to quantum computing threats, our study finds NTRU as a resilient and quantum-resistant alternative, providing a robust defense mechanism in the evolving landscape of healthcare cybersecurity. Key findings underscore the efficacy of NTRU in safeguarding healthcare data, emphasizing its superior performance compared to ECC, especially in the face of emerging quantum computing challenges. The comparative analysis depicts that ECC excels in key generation speed, delivering efficient and swift key creation. However, it requires larger keys to withstand potential quantum computing vulnerabilities. On the other hand, the key generation time in NTRU is slightly more than ECC but being quantum-resistant, it provides high security.

[...] Read more.
Resource Efficient Security Mechanism for Cloud of Things

By Adil Bashir Sahil Sholla

DOI: https://doi.org/10.5815/ijwmt.2021.04.05, Pub. Date: 8 Aug. 2021

Cloud of Things (CoT) relates to the convergence between Cloud Computing (CC) and the Internet of Things (IoT) and has significantly transformed the way services are delivered in the ubiquitous realm of devices. This integration has become essential because of the huge data being generated by IoT devices, requiring an infrastructure for storage and processing. Such infrastructure is provided by Cloud Computing services with massive space for data storage and exceptional platform to process complex data. IoT networks are vulnerable to multiple security breaches because of the growing usage of IoT devices in user personal systems. This leads to security and privacy threats that need to be addressed. IoT consists of resource limited devices which have feeble computing power, battery source and storage capacity. This paper addresses security issue by proposing usage of obfuscation and encryption techniques to scramble the data at IoT devices which is later on stored in encrypted form at the cloud server. The data at IoT devices is classified into highly critical or less critical and accordingly the appropriate technique between encryption and obfuscation is applied. The proposed mechanism is evaluated in terms of processing time for cryptographic operations at IoT devices. Evaluation results depict that the proposed mechanism is 1.17 times faster than [22] in terms of encryption and decryption times.

[...] Read more.
An Ontology based Approach for Context-Aware Security in the Internet of Things (IoT)

By Asifa Nazir Sahil Sholla Adil Bashir

DOI: https://doi.org/10.5815/ijwmt.2021.01.04, Pub. Date: 8 Feb. 2021

Due to increased number of IoT devices, the marketplace is showing significant growth of sensor deployments around the world. The context involved in any IoT environment needs proper storage, processing and interpretation to get deeper insights from it. Previous research has not focussed much on context-ware security in IoT environment and has primarily relied on context-ware computing methods. In this research paper we implement logical decisions among IoT nodes in healthcare system using ontological approach. With the help of ontological method collected data is transferred between various healthcare devices to the knowledge base thereby achieving security of context like patient data by providing deeper insights, so as to generate intelligent suggested solutions. Incorporation of context-aware rules based on common experience for specific healthcare scenario is done to get implicit insight among IoT nodes.  This work designs security ontology using Security Toolbox: Attacks & Countermeasures (STAC) framework that is implemented in Protégé 5. Moreover, Pellet (Incremental) reasoned is used to evaluate the ontology. Emergency ontology that can prove helpful at emergency times has also been designed.  Different parameters addressed in this work are authentication, access-control, authorization and privacy using context-awareness methodology that can enable naive users make informed security decision. 

[...] Read more.
Other Articles