Browsing by Author "Anwar, Farhat"
Now showing 1 - 4 of 4
Results Per Page
Sort Options
Item Open Access Analysis of Packet Reordering Delay for Bandwidth Aggregation in Heterogeneous Wireless Networks(Department of Computer Science, Nasarawa State University Keffi, 2018-07-06) Anwar, Farhat; Masud, Mosharrof H.; Islam Khan, Burhan UI; Olanrewaju, Rashidah F.; Latif, Suhaimi A.Bandwidth aggregation in heterogeneous wireless networks (HWN) can be one of the effective solutions in providing quality data transmission for real-time applications. However, transmitting the data through multiple networks create packet reordering issues that result in transmission delay and degrades the overall quality of services. This paper addresses packet reordering issues both for single and multiple paths with a reordering delay in the transmission system. An algorithm has proposed to mitigate the associated delay that has been simulated in network simulator 3 (NS3). The simulation results have benchmarked with the well known Earliest Delivery Path First (EDPF) method and shown better performance over the EDPF results. Moreover, the simulation has been done to analyze the packet scheduling including to measuring packet reordering delay, and reordering entropy. CBR and VBR applications have been transmitted for 1800ms from sender to receiver in a heterogeneous wireless environment created in NS3. The results show the proposed method achieved to reduce the reordering delay and reordering entropy both for CBR and VBR applications.Item Open Access Bandwidth Allocation Policy using the Game Theory Model in Heterogeneous Wireless Networks(Department of Computer Science, Nasarawa State University Keffi, 2018-07-06) Anwar, Farhat; Masud, Mosharrof H.; Islam Khan, Burhan UI; Olanrewaju, Rashidah F.; Latif, Suhaimi A.In Heterogeneous Wireless Network (WHN), a Mobile Device (MD) can be connected with multiple access technologies available in a particular geographical area. Selection of appropriate access technology is a challenge for the MD where game theory policy can be applied. Shapley Value is one of the game-theoretic models that can be applied to allocate appropriate bandwidth for i number of users for k number of services from N access technologies. It proposes the fairest allocation of the collectively gained profits among the collaborative players in the game. The primary focus is to find the relative contribution of every player in a cooperative game. This paper has drawn a numerical analysis of Shapley Value for three wireless access technologies, namely WiFi, Cellular and WiMAX. It has been shown how much bandwidth can be allocated from an access technology for a required bandwidth for a specific service. It can be noted from the results that 225Kbps, 141.67Kbps and 233.33Kbps can be allocated from WiFi, Cellular and WiMAX respectively to transmit the 600Kbps data in an HWN network.Item Open Access A critical insight into the effectiveness of research methods evolved to secure IoT ecosystem(Department of Computer Science, Nasarawa State University Keffi, 2020-03-03) Islam Khan, Burhan UI; Olanrewaju, Rashidah F.; Anwar, Farhat; Roohie, Naaz Mir; Najeeb, Rahman AthaurIncreasing proliferation of IoT has led to an evolution of various devices for realising the smart features of ubiquitous applications. However, the inclusion of such a massive pool of devices with different computational capabilities, network protocols, hardware configurations, etc. also causes a higher number of security threats. Security professionals, organisations, and researchers are consistently investigating the security problems associated with IoT ecosystem and are coming up with different forms of solution sets. This paper presents a snapshot of the existing research work being carried out towards the security of IoT and assesses their strengths and weaknesses. The paper also explores the current research trend and presents the latest security methods being implemented and outlines the open research issues associated with it. The paper contributes to offering an accurate picture of the effectiveness of the existing security system in IoT.Item Open Access Secure Annihilation of Out-of-Band Authorization for Online Transactions(Department of Computer Science, Nasarawa State University Keffi, 2018-02-02) Hussain, Sabahat; Islam Khan, Burhan UI; Anwar, Farhat; Olanrewaju, Rashidah F.Objectives: In this paper, an approach to online banking authorization using one-time passwords has been illustrated. Methods/Statistical Analysis: The algorithm presented in this paper provides an infinite as well as forward One-Time- Password (OTP) generation mechanism employing two Secure Hash Algorithms viz. SHA3 and SHA2, followed by dynamic truncation to produce human-readable OTP. An inimitable authentication scheme has been presented in which a unique initial seed is used for generating a series of OTPs on the user’s handheld gadget (i.e. a mobile phone). Findings: The proposed scheme demonstrated better results than the previous schemes of authorization after a security analysis was conducted on it. This is attributed to the eradication of cellular network within the authorization process. A high level of performance and efficiency in authentication and authorization was evident from the results that are vital for transacting online. Applications/Improvements: In the proposed system, the inherent features of the user’s device (mobile phone) are utilized to form the initial seed. The application of hash functions to that seed eliminates the necessity to send one time passwords to the users via Short Message Service and decreases the limitations posed by out-of-band systems, thus making it suitable to be employed in online banking and other financial organizations