Sajaad Ahmed Lone

Work place: Department of Computer Science and Engineering, Islamic University of Science and Technology, Awantipura-192122, Pulwama, Jammu & Kashmir, India

E-mail:

Website:

Research Interests: Ubiquitous Computing, Computer Networks, Network Architecture, Network Security, Image Processing, Data Structures and Algorithms

Biography

Sajaad Ahmad Lone is an Assistant Professor at working as an Assistant Professor at Islamic University of Science and Technology, Awantipura, Pulwama, Jammu & Kashmir, India. He received M.Tech degree in information Technology from Guru Gobind Singh Inderprastha University, New Delhi, and currently pursuing PhD from National Institute of Technology Srinagar. The areas that interest him are mobile Adhoc networks, image processing. Network security, Adhoc and sensor networks and Ubiquitous Computing.

Author Articles
Smartphone-based Biometric Authentication Scheme for Access Control Management in Client-server Environment

By Sajaad Ahmed Lone Ajaz Hussain Mir

DOI: https://doi.org/10.5815/ijitcs.2022.04.04, Pub. Date: 8 Aug. 2022

As the information put together by the blend of smartphones, the cloud, the IOT, and ubiquitous computing continue to expand at an alarming rate, a data breach increases. Today, users' strong authentication and authorization approaches are increasingly important to secure sensitive, confidential, secret information. Possession and knowledge-based authentication techniques for computers, the internet, email accounts, etc., are commonly used to access vital information; they do not link a user to an established identity, resulting in most security vulnerabilities. Biometric authentication, on the other hand, has the privilege of being more reliable than traditional authentication as biometric characteristics of a person can’t be lost; they are tough to distribute, exchange or duplicate; and it requires the user to be present during the authentication process, thereby relating the users to established identities. Biometrics provides a higher level of assurance that the individual attempting to ascertain is the individual in question. Thus, resulting in a more reliable, usable, and cost-effective model with a higher level of protection to deter an attacker from obtaining entry to a computer or network and gaining access to confidential data. This paper introduces a novel fingerprint-based authentication scheme for mobile environments, enabling user authentication based on fingerprint features using a challenge-response-based authentication process. In this study, the proposed authentication system has been developed on a real Android-based smartphone, tested on actual users, and performance analysis has been carried out; empirical results reveal that the proposed authentication scheme achieves increased performance. Moreover, a usability analysis has been done to determine efficiency, effectiveness, and user satisfaction. The evaluation results indicate its feasibility to use it as an effective authentication mechanism for mobile phone environments.

[...] Read more.
GSM based Monitoring and Control of Systems

By Saima Maqbool Sajaad Ahmed Lone

DOI: https://doi.org/10.5815/ijwmt.2015.04.02, Pub. Date: 26 Jul. 2015

In this paper we have proposed a method to make a base for the monitoring and Control of systems. The monitoring and Control of systems could be from monitoring of movements in any particular area to the monitoring of any external electrical, mechanical device. Every person is pocketed with the cell. So, taking the advantage of the same we developed the system for the monitoring and Control system using GSM technology. This will provide the owner, manager of the system to know about the working or any kind of default in the system. Also the system is controlled which is needed in special circumstances and is be implemented with the help of complete circuitry which is a different module (DTMF module) has a specific code as input through GSM encoder that is processed by decoder circuitry of our system. The goal is to find an improvement over the previous surveillance systems .The maintainability of the new and improved is quite efficient as it is easy to handle it by simple software demo. The facilities provided by it such as easy handling, a secrecy support, an immediate action are granted. A prototype is built in the Windows platform using C# to demonstrate the functioning of the entire system.

[...] Read more.
Other Articles