Noor Ul Amin

  • Citations Per Year
Learn More
In recent years personal health monitoring Body Sensor Network (BSN) have got significant importance. Due to its sensitive and constrained nature, health data should be transported / kept confidentially, therefore, lightweight cryptographic technique and key management schemes are required in BSN. In this paper we have proposed a hybrid authenticated key(More)
The κ-Nearest Neighbors ( κNN) query is an important spatial query in mobile sensor networks. In this work we extend κNN to include a distance constraint, calling it a l-distant κ-nearest-neighbors (l-κNN) query, which finds the κ sensor nodes nearest to a query point that are also at or greater distance from each other. The query results indicate the(More)
Electronic voting system provides convenience and access to the electorate without the geographical restrictions. Mobile phone is one of the emerging technologies to perform e-voting with democratic norms and privacy concern. In this paper we suggest a mobile phone voting protocol based on hybrid cryptosystem. Protocol consists of three phases: online(More)
Wireless Body Area Network (WBAN) has become imperative due to rapid advancement in medical technology. However, WBAN faces different security issues due to open air communication of information. In this paper, we have proposed a lightweight smart crypto solution using authenticated key exchange coupled with cluster head formation and selection for the(More)
MANET is an independent and infrastructureless network comprising of self configurable mobile nodes connected via wireless links. MANET is susceptible to various attacks because of some loopholes present in MANET like dynamic topology, zero central administration, limited physical security etc. MANET is prone to numerous malicious attacks one such attack(More)
In this research an efficient data gathering scheme is presented using mobile sink as data collector with Clustering as sensor organizer in a randomly organized sensors in sensing field for wireless sensor network. The scheme not only extends the network lifetime through clustering process but also improves the data gathering mechanism through efficient and(More)
Audio steganography is used to hide secret information inside audio signal for the secure and reliable transfer of information. Various steganography techniques have been proposed and implemented to ensure adequate security level. The existing techniques either focus on the payload or security, but none of them has ensured both security and payload at same(More)
Secure multicast communication has application in growing number of applications. Forward secrecy is of prime importance and insures message con…dentiality even long-term private key compromised. We present an e¢ cient construction of multi message multi receiver signcryption with forward secrecy on elliptic curves. It provides con…dentiality, integrity,(More)
The transmission of voice and video packets through Internet suffers from delay which is needed to be minimized at the time of PlayOut. The packets are received from the network with a varying delay. This delay is called jitter. To surmount the mentioned problems, a system is designed in this work. This technique handles packets in the buffer at the(More)