Change search
Link to record
Permanent link

Direct link
BETA
Nawaz, Omer
Publications (5 of 5) Show all publications
Irshad, A., Sher, M., Nawaz, O., Chaudhry, S. A., Khan, I. & Kumari, S. (2017). A secure and provable multi-server authenticated key agreement for TMIS based on Amin et al. scheme. Multimedia tools and applications, 76(15), 16463-16489
Open this publication in new window or tab >>A secure and provable multi-server authenticated key agreement for TMIS based on Amin et al. scheme
Show others...
2017 (English)In: Multimedia tools and applications, ISSN 1380-7501, E-ISSN 1573-7721, Vol. 76, no 15, p. 16463-16489Article in journal (Refereed) Published
Abstract [en]

The security for Telecare Medicine Information Systems (TMIS) has been crucial for reliable dispensing of the medical services to patients at distant locations. Security and privacy element needs to be there for any physician or caregiver to make certain an appropriate diagnosis, medical treatment or any other exchange of critical information. In this connection, many relevant TMIS-based authentication schemes have been presented, however various forms of attacks and inefficiencies render these schemes inapplicable for a practical scenario. Lately, Amin et al. proposed a scheme based on a multi-server authentication for TMIS. However, the Amin et al., scheme has been found vulnerable to user and server impersonation attacks. We have proposed an improved model with higher performance and efficiency, as evident from the forthcoming sections. Besides, the scheme has been backed up by formal security analysis using BAN logic to ensure the resilience of the proposed scheme.

Place, publisher, year, edition, pages
Springer, 2017
Keywords
Aluminum; Authentication; Biometrics; Computer circuits; Diagnosis; Medical computing; Reconfigurable hardware, Attack; BAN logic; Cryptanalysis; Remote authentication; TMIS Security, Medical information systems
National Category
Communication Systems Computer Sciences
Identifiers
urn:nbn:se:bth-13314 (URN)10.1007/s11042-016-3921-1 (DOI)000404609100018 ()2-s2.0-84990946646 (Scopus ID)
Available from: 2016-11-01 Created: 2016-11-01 Last updated: 2018-01-13Bibliographically approved
Nawaz, O., Minhas, T. N. & Fiedler, M. (2017). QoE based comparison of H.264/AVC and WebM/VP8 in an error-prone wireless network. In: Chemouil P.,Simoes P.,Madeira E.,Secci S.,Monteiro E.,Gaspary L.P.,dos Santos C.R.P.,Charalambides M. (Ed.), Proceedings of the IM 2017 - 2017 IFIP/IEEE International Symposium on Integrated Network and Service Management: . Paper presented at 15th IFIP/IEEE International Symposium on Integrated Network and Service Management, IM 2017, Lisbon (pp. 1005-1010). Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>QoE based comparison of H.264/AVC and WebM/VP8 in an error-prone wireless network
2017 (English)In: Proceedings of the IM 2017 - 2017 IFIP/IEEE International Symposium on Integrated Network and Service Management / [ed] Chemouil P.,Simoes P.,Madeira E.,Secci S.,Monteiro E.,Gaspary L.P.,dos Santos C.R.P.,Charalambides M., Institute of Electrical and Electronics Engineers (IEEE), 2017, p. 1005-1010Conference paper, Published paper (Refereed)
Abstract [en]

Quality of Experience (QoE) management is a prime topic of research community nowadays as video streaming, online gaming and security applications are completely reliant on the network service quality. Moreover, there are no standard models to map Quality of Service (QoS) into QoE. HTTP media streaming is primarily used for such applications due to its coherence with the Internet and simplified management. The most common video codecs used for video streaming are H.264/AVC and Google's VP8. In this paper, we have analyzed the performance of these two codecs from the perspective of QoE. The most common end-user medium for accessing video content is via home based wireless networks. We have emulated an error-prone wireless network with different scenarios involving packet loss, packet delay and delay variation. The focus of this paper is evaluating the end user satisfaction with the multimedia content by subjective assessment using Mean Opinion Score (MOS). We have observed the overall superiority of H.264/AVC but the VP8 codec strongly gains ground in highly error-prone networks in terms of user satisfaction. © 2017 IFIP.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2017
Keywords
H.264/AVC, Multimedia communication, QoE management, Quality of Experience, WebM(VP8), Errors, HTTP, Human computer interaction, Media streaming, Motion Picture Experts Group standards, Multimedia systems, Packet networks, Video signal processing, Video streaming, Wireless networks, Multi-media communications, Qoe managements, Quality of experience (QoE), Quality of service
National Category
Communication Systems
Identifiers
urn:nbn:se:bth-15217 (URN)10.23919/INM.2017.7987426 (DOI)2-s2.0-85029430735 (Scopus ID)9783901882890 (ISBN)
Conference
15th IFIP/IEEE International Symposium on Integrated Network and Service Management, IM 2017, Lisbon
Available from: 2017-09-29 Created: 2017-09-29 Last updated: 2017-09-29Bibliographically approved
Farash, M. S., Nawaz, O., Mahmood, K., Chaudhry, S. A. & Khan, M. K. (2016). A Provably Secure RFID Authentication Protocol Based on Elliptic Curve for Healthcare Environments. Journal of medical systems, 40(7), Article ID 165.
Open this publication in new window or tab >>A Provably Secure RFID Authentication Protocol Based on Elliptic Curve for Healthcare Environments
Show others...
2016 (English)In: Journal of medical systems, ISSN 0148-5598, E-ISSN 1573-689X, Vol. 40, no 7, article id 165Article in journal (Refereed) Published
Abstract [en]

To enhance the quality of healthcare in the management of chronic disease, telecare medical information systems have increasingly been used. Very recently, Zhang and Qi (J. Med. Syst. 38(5):47, 32), and Zhao (J. Med. Syst. 38(5):46, 33) separately proposed two authentication schemes for telecare medical information systems using radio frequency identification (RFID) technology. They claimed that their protocols achieve all security requirements including forward secrecy. However, this paper demonstrates that both Zhang and Qi’s scheme, and Zhao’s scheme could not provide forward secrecy. To augment the security, we propose an efficient RFID authentication scheme using elliptic curves for healthcare environments. The proposed RFID scheme is secure under common random oracle model.

Place, publisher, year, edition, pages
Springer-Verlag New York, 2016
Keywords
Authentication; Elliptic curve; Random oracle model; RFID; Telecare medical information systems; Untraceable privacy
National Category
Media and Communication Technology
Identifiers
urn:nbn:se:bth-13100 (URN)10.1007/s10916-016-0521-6 (DOI)000378895600009 ()2-s2.0-84971513899 (Scopus ID)
Available from: 2016-10-04 Created: 2016-10-03 Last updated: 2018-01-14Bibliographically approved
Nawaz, O., Minhas, T. N. & Fiedler, M. (2014). Optimal MTU for Realtime Video Broadcast with Packet Loss - A QoE Perspective. In: 2014 9TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST): . Paper presented at International Conference for Internet Technology and Secured Transactions*, DEC 08-10, 2014, London, ENGLAND (pp. 396-401). IEEE
Open this publication in new window or tab >>Optimal MTU for Realtime Video Broadcast with Packet Loss - A QoE Perspective
2014 (English)In: 2014 9TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), IEEE , 2014, p. 396-401Conference paper, Published paper (Refereed)
Abstract [en]

Multimedia applications have become the prime source of Internet traffic in recent years due to high bandwidth offered by almost all access mechanisms. This highlights the need of intense research efforts to improve the already demanding user perception levels for high-performance video delivery networks. Quality of Experience (QoE) based metrics are often used to quantify user satisfaction levels regarding an application or service. In this paper, we have analyzed the impact of variable frame sizes at link layer with different packet loss scenarios to evaluate the performance degradation of H.264 based live video streams from the end user perspective using subjective tests. We have focused on both subjective and objective quantitative measures to analyze the myth that smaller packets provide better quality in error-prone networks. We found that this assumption may not be true for some cases with a considerable packet loss ratio. Moreover, we observed that full-reference video assessment software like PEVQ predicts QoE to an acceptable extent, which allows cutting cost and effort coming with subjective evaluations. Keywords-Quality of Experience, Multimedia communication, Streaming media

Place, publisher, year, edition, pages
IEEE, 2014
Series
International Conference for Internet Technology and Secured Transactions, ISSN 2164-7046
National Category
Other Electrical Engineering, Electronic Engineering, Information Engineering
Identifiers
urn:nbn:se:bth-14580 (URN)000380428300061 ()978-1-908320-39-1 (ISBN)
Conference
International Conference for Internet Technology and Secured Transactions*, DEC 08-10, 2014, London, ENGLAND
Available from: 2017-06-19 Created: 2017-06-19 Last updated: 2017-06-19Bibliographically approved
Nawaz, O., Gehrmann, C. & Fiedler, M. (2012). Secure Mobile Social Networks using USIM in a Closed Environment. In: : . Paper presented at 7th International Conference for Internet Technology and Secured Transactions (ICITST). London: IEEE
Open this publication in new window or tab >>Secure Mobile Social Networks using USIM in a Closed Environment
2012 (English)Conference paper, Published paper (Refereed)
Abstract [en]

Online social networking and corresponding mobile based applications are gaining popularity and now considered a well-integrated service within mobile devices. Basic security mechanisms normally based on passwords for the authentication of social-network users are widely deployed and poses a threat for the user security. In particular, for dedicated social groups with high confidentiality and privacy demands, stronger and user friendly principles for the authentication and identification of group members are needed. On the other hand, most of the mobile units already provide strong authentication procedures through the USIM/ISIM module. This paper explores how to build an architectural framework for secure enrolment and identification of group members in dedicated closed social groups using the USIM/SIM authentication and in particular, the 3GPP Generic Authentication Architecture (GAA), which is built upon the USIM/SIM capabilities. One part of the research is to identify the marketable use-cases with corresponding security challenges to fulfil the requirements that extend beyond the online connectivity. This paper proposes a secure identification design to satisfy the security dimensions for both online and offline peers. We have also implemented an initial proof of the concept prototype to simulate the secure identification procedure based on the proposed design. Our implementation has demonstrated the flexibility of the solution to be applied independently for applications requiring secure identification.

Place, publisher, year, edition, pages
London: IEEE, 2012
Keywords
Mobile Social Networks, Information Security, Secure Identification
National Category
Telecommunications
Identifiers
urn:nbn:se:bth-6946 (URN)000317120000069 ()oai:bth.se:forskinfoF798F6A7CE17293CC1257B9B00284380 (Local ID)978-1-4673-5325-0 (ISBN)oai:bth.se:forskinfoF798F6A7CE17293CC1257B9B00284380 (Archive number)oai:bth.se:forskinfoF798F6A7CE17293CC1257B9B00284380 (OAI)
External cooperation:
Conference
7th International Conference for Internet Technology and Secured Transactions (ICITST)
Available from: 2013-07-01 Created: 2013-07-01 Last updated: 2016-09-07Bibliographically approved
Organisations

Search in DiVA

Show all publications