Skip to main content

Showing 1–8 of 8 results for author: Haider, Z

Searching in archive cs. Search in all archives.
.
  1. arXiv:2411.04731  [pdf, other

    cs.CE

    MISGUIDE: Security-Aware Attack Analytics for Smart Grid Load Frequency Control

    Authors: Nur Imtiazul Haque, Prabin Mali, Mohammad Zakaria Haider, Mohammad Ashiqur Rahman, Sumit Paudyal

    Abstract: Incorporating advanced information and communication technologies into smart grids (SGs) offers substantial operational benefits while increasing vulnerability to cyber threats like false data injection (FDI) attacks. Current SG attack analysis tools predominantly employ formal methods or adversarial machine learning (ML) techniques with rule-based bad data detectors to analyze the attack space. H… ▽ More

    Submitted 7 November, 2024; originally announced November 2024.

    Comments: 12 page journal

  2. arXiv:2002.05093  [pdf, other

    cs.CR cs.IT eess.SP

    On the Effective Capacity of an Underwater Acoustic Channel under Impersonation Attack

    Authors: Waqas Aman, Zeeshan Haider, S. Waqas H. Shah, M. Mahboob Ur Rahman, Octavia A. Dobre

    Abstract: This paper investigates the impact of authentication on effective capacity (EC) of an underwater acoustic (UWA) channel. Specifically, the UWA channel is under impersonation attack by a malicious node (Eve) present in the close vicinity of the legitimate node pair (Alice and Bob); Eve tries to inject its malicious data into the system by making Bob believe that she is indeed Alice. To thwart the i… ▽ More

    Submitted 12 February, 2020; originally announced February 2020.

    Comments: This paper is accepted for presentation at IEEE International Conference on Communications (ICC) 2020

  3. arXiv:1911.07764  [pdf

    cs.NI

    Novel Relay Selection Protocol for Cooperative Networks

    Authors: Muhammad Asam, Zeeshan Haider, Tauseef Jamal, Kashif Ghuman, Aleena Ajaz

    Abstract: Extensive research has been done to achieve better throughput and reliability in wireless networks, with focus on multiple-input multiple-output systems. Recently, cooperative networking techniques have been investigated to increase the performance of low-cost wireless systems by using the diversity created by different single antenna devices. However, cooperative networking requires a medium acce… ▽ More

    Submitted 15 November, 2019; originally announced November 2019.

    Report number: PIEAS-11-2019

  4. arXiv:1911.04330  [pdf

    cs.NI

    Security Issues in WBANs

    Authors: Muhammad Asam, Tauseef Jamal, Aleena Ajaz, Zeeshan Haider, Shariq Aziz Butt

    Abstract: Wireless Body Area Network (WBAN) refers to short-range, wireless communications near or inside a human body. WBAN is emerging solution to cater the needs of local and remote health care related facility. Medical and non-medical applications have been revolutionarily under consideration for providing a healthy and gratify service to the humanity. Being very critical in communication from body it f… ▽ More

    Submitted 7 November, 2019; originally announced November 2019.

    Report number: PIEAS-11-2019

  5. arXiv:1812.04935  [pdf

    cs.NI

    DoS Attacks at Cooperative MAC

    Authors: Zeeshan Haider, Kiramat Ullah, Tauseef Jamal

    Abstract: Cooperative networking brings performance improvement to most of the issues in wireless networks, such as fading or delay due to slow stations. However, due to cooperation when data is relayed via other nodes, there network is more prone to attacks. Since, channel access is very important for cooperation, most of the attacks happens at MAC. One of the most critical attack is denial of service, whi… ▽ More

    Submitted 30 November, 2018; originally announced December 2018.

    Comments: 15 pages, 10 figures

    Report number: AAU-13-11-2018

  6. arXiv:1810.13164  [pdf

    cs.NI

    Analysis of Interference in Wireless Networks

    Authors: Zeeshan Haider, Muhammad Saleem, T. Jamal

    Abstract: As wireless systems grow rapidly worldwide, one of the most important things, wireless systems designers and service providers faces is interference. Interference decreases coverage, capacity [1], and limits the effectiveness of both new and existing systems. It is very difficult to avoid because wireless communications systems must exist together in extremely complex signal environments. These en… ▽ More

    Submitted 31 October, 2018; originally announced October 2018.

    Comments: 9 pages, 2 figures

    Report number: DCIS 2018-10/31

  7. arXiv:1810.11070  [pdf

    cs.NI

    Denial of Service Attack in Cooperative Networks

    Authors: Tauseef Jamal, Zeeshan Haider, Shariq Aziz Butt, Assim Chohan

    Abstract: In Denial of Service (DoS) attack the network resources are either delayed or refused to be assigned to the requested user [1]. This may occurs due to verity of reasons, could be intentionally or unintentionally. The unintentional case is quite hard to mitigate. In this paper we will refer the former case in context of cooperative networks. In cooperative networks we relay the data via intermediat… ▽ More

    Submitted 15 October, 2018; originally announced October 2018.

    Comments: Cooperative relaying and DoS attack

    Report number: DCIS-1012/18

  8. arXiv:1807.01556  [pdf, other

    cs.IT

    Maximizing Secrecy Rate of an OFDM-based Multi-hop Underwater Acoustic Sensor Network

    Authors: Waqas Aman, M. Mahboob Ur Rahman, Zeeshan Haider, Junaid Qadir, M. Wasim Nawaz, Guftaar Ahmad Sardar Sidhu

    Abstract: In this paper, we consider an eavesdropping attack on a multi-hop, UnderWater Acoustic Sensor Network (UWASN) that consists of $M+1$ underwater sensors which report their sensed data via Orthogonal Frequency Division Multiplexing (OFDM) scheme to a sink node on the water surface. Furthermore, due to the presence of a passive malicious node in nearby vicinity, the multi-hop UnderWater Acoustic (UWA… ▽ More

    Submitted 19 July, 2020; v1 submitted 4 July, 2018; originally announced July 2018.

    Comments: This paper has been accepted for publication in Transactions on Emerging Telecommunications Technologies (ETT), 2020