Ali BaratiDezful Branch, Islamic Azad University, Dezful, Iran · Department of Computer Engineering
Ali Barati
About
42
Publications
14,298
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
768
Citations
Introduction
Publications
Publications (42)
The rapid development and expansion of Internet of Things (IoT) systems have brought about increasingly complex security challenges due to the multi-layered structure of IoT, where attackers can exploit vulnerabilities at various layers. Traditional intrusion detection systems (IDS) often fail to detect novel attacks efficiently, especially in reso...
Medical Internet of Things (IoMT) is the next frontier in the digital revolution and is utilized in healthcare. In this context, IoT enables individuals to remotely manage their essential activities with minimal interaction. However, the limitations of network resources and the challenges of establishing a secure channel, as well as sharing and col...
The Internet of Things (IoT) is a network where physical objects with unique addresses can connect and communicate with each other through the Internet and telecommunications networks. However, the current methods of user authentication in this environment have limitations due to the need for a lightweight authentication process and limited resourc...
The internet of things (IoT) refers to the interconnection of various devices through the internet. With the help of IoT, different applications and devices can interact with each other and even with humans through the internet. However, the widespread use of IoT in homes, offices, and private companies has raised concerns about privacy and securit...
Today, many users' extensive use of the Internet of Things (IoT) has made authentication an inevitable issue in the IoT. The currently existing authentication methods are subjected to many challenges by various factors such as the limited resources, the lack of authorization, and the need for a light-weighted authentication process. Therefore, it i...
Internet of Things (IoT) means connecting different devices through the Internet. The Internet of things enables humans to remotely manage and control the objects they use with the Internet infrastructure. After the advent of the Internet of Things in homes, organizations, and private companies, privacy and information security are the biggest conc...
Today, the Internet of Things (IoT) is extending due to a wide range of applications and services. The variety of devices connected to the internet, the discussion of security on these networks is a challenging issue. Security includes diverse aspects such as botnets. Botnets are a set of devices such as smartphones, computers, and others polluted...
The Internet of Things (IoT) is a novel concept in the technology and communication world. Briefly, the “Internet of Things” is a modern technology in which any entity such as humans, animals, or objects can transmit data through communication networks like, the Internet or the Intranet. These networks have very important challenges such as energy...
Maintaining coverage, power consumption, and network lifetime are the most fundamental challenges for wireless sensor networks. Since it is impossible to replace or recharge the battery of the sensor nodes, discharging the battery will end the sensor node’s life. With the death of some sensor nodes and disconnecting, the network coverage is also vi...
Due to the big data exchange on the Internet of Things, proper routing and selecting the best routes for fast data transmission improve network performance. There are major challenges, like high delay, when cloud computing is used. Therefore, one solution is to use other schemes, such as fog computing. In fog computing, all data is not sent to the...
Internet of things (IoT) is a modern technology where data can be transmitted to any things (human, animal, or object) over communications networks, whether internet or intranet. Congestion occurs when the input data rate to the node was higher than the output data rate of node. Congestion control in computer network modulates traffic entry into a...
Routing is challenging in vehicular ad hoc networks due to their features, such as high mobility of nodes and unstable wireless communication links. Therefore, it is an interesting issue for researchers. In addition, it is very important to design an authentication mechanism between the source node and the destination node because these networks ar...
Fog computing integrates cloud and edge resources. According to an intelligent and decentralized method, this technology processes data generated by IoT sensors to seamlessly integrate physical and cyber environments. Internet of Things uses wireless and smart objects. They communicate with each other, monitor the environment, collect information,...
In wireless sensor networks, sensor nodes are typically distributed in harsh environments for continuous monitoring and data collection. All sensor nodes send the collected data directly or through other sensor nodes to the base station. Due to the nature and range of applications of these networks, maintaining security has always been one of the m...
A wireless sensor network (WSN) consists of a set of sensor nodes that are widely scattered in inaccessible areas. When deployed in large areas, WSNs generate a large volume of the data. Therefore, efficient methods are needed to process the data. One solution to minimize traffic on large-scale wireless sensor networks is to use data aggregation sc...
Wireless sensor networks include a large number of sensor nodes, which monitor an environment. These networks have many applications in Internet of Things (IoT) and Industrial IoT (IIoT). In wireless sensor networks, data aggregation methods are known as a suitable solution that can reduce energy consumption. In addition, these networks are subject...
Routing is one of the major challenges in wireless sensor networks (WSNs). Unbalanced energy consumption in the routing process of data packets is one of the main issues in WSNs. The issue needs consideration, because the energy level of sensor nodes is limited. Multipath routing methods reduce energy consumption, improve scalability and provide lo...
The vehicular ad hoc network (VANET) is a promising technology to improve the comfort and safety of passengers, roads and urban traffic. Applications applied to VANETs require efficient routing protocols. Urban environments include tunnels, subways, overpasses, and multilevel highways, which indicate the multilevel information environment and speci...
Considering the great growth of IoT networks and the need for highly reliable networks and also considering the manufacturing divides of IoT equipment which are highly limited by their memory, processing power and battery; we need a highly efficient routing for guaranteeing our network's high life span. So, this paper has suggested an efficient ene...
The paper deals with a new reliable data transport protocol for wireless sensor networks, referred as RDTP. One of the most prominent challenges in wireless sensor networks is reliable transport of data from sensor nodes to sink node. For designing protocols for such networks hardware, some constraining factors associated with energy and processing...
Reliability and energy consumption are two of the main constraints in wireless sensor networks (WSNs). In this paper, a novel energy efficient and high speed error control scheme is introduced that is based on the Redundant Residue Number System (RRNS) allowing real-time application of WSNs. The proposed approach employs a new 3-moduli set {22n+1,...
In this paper, a new scheme using redundantresidue number system is proposed fordecreasing the total consumption power and thus, increasing the lifetime, and also to reacherror controllability to improve reliability of received data and therewithto obtain improvement in end-to-end delay in wireless sensor networks. The proposed scheme employs the n...
Watermarking is a method used to hide the owner’s data in the host signal in an inaudible way. The watermark signal must not reduce the quality of host signal. Furthermore, it must be resistant to various attacks. In this paper, we will propose an intelligent audio watermarking method in terms of collaborating QR decomposition (QR factorization) me...
Wireless sensor networks (WSN) consist of many nodes that are usually created to identify environmental incidents. Each of these nodes includes sensor, processor, communication components (antenna), small memory, and a source of energy. In wireless sensor networks' applications, faulty nodes always cause crucial problems and error in the network. F...
In this paper, a new 3-moduli set {22n+1+2n-1, 22n+1-1, 2n-1} with an efficient residue-to-binary converter using mixed radix conversion algorithm is presented. Moreover, by adding two redundant modulus {23n, 23n+1-1}, a new moduli set in redundant residue number system is provided that can correct up to (2n+2) error bits. Simulation results of the...
Applications of Wireless Sensor Networks (WSNs) in industrial and consumer applications cause to get the attention of most researchers in this field. Besides these applications, security and reliability of WSN are extremely important, as important data can be conveyed securely from senders to receivers. Security and reliability in the WSNs always c...
Wireless sensor networks include small nodes which have sensing ability; calculation and connection extend themselves everywhere soon. Such networks have source limitation on connection, calculation and energy consumption. So, since the nodes have limited energy in sensor networks, the optimized energy consumption in these networks is of more impor...
Wireless sensor networking remains one of the most exciting and challenging research domains of our time. Sensor nodes are arranged in the clusters and relay nodes could have been used as cluster head with more power, but this method has a Low Speed for networks with many sensors. In another method Storage and forwarding nodes are used to transfer...
The manner of organizing the sensors in the wireless sensor network for increasing the capability and optimized using of the sensors is of great importance. Hence considering coverage parameter in every Wireless Sensor Network (WSN) is extremely essential and critical. The matter of overlapping covered area by sensors in 2D space had been considere...
The failure in cluster at a high level can bring up great damages to the system in wireless sensor networks where clustering techniques are used. Certain methods have been reported in the literature in recovering the sensors from a failure cluster. One of the most important methods is to recover the sensors in run-time and without clustering. But i...
This paper presents a centralized fault detection algorithm for wireless sensor networks. Faulty sensor nodes are identified based on comparisons between neighboring nodes and own central node and dissemination of the decision made at each node. RNS system is used to tolerate transient faults in sensing and communication. In this system, arithmetic...
Wireless sensor networks (WSNs) are wireless ad hoc networks of tiny sensor nodes increasingly deployed for multiple civilian and military applications, including patient monitoring, wildlife monitoring, battlefield surveillance, enemy tracking, etc. Like other computer networks, WSNs must be provided of security services such as key management, co...
A routing algorithm defines a route which packet traverses to get to destination. In this research we study some kind of routing algorithms that are used in internal connections networks of multi-processor and multi-computers systems. Then we discuss about some routing algorithms which have been implemented network on chip architecture. First, we p...
This paper presents a novel CMOS four-transistor SRAM cell for very high density and low power embedded SRAM applications as well as for stand-alone SRAM applications. This cell retains its data with leakage current and positive feedback without refresh cycle. The new cell size is 20% smaller than a conventional six-transistor cell using same desig...
This paper proposes a low power SRAM based on five transistor SRAM cell. Proposed SRAM uses novel word-line decoding such that, during read/write operation, only selected cell connected to bit-line whereas, in conventional SRAM (CV-SRAM), all cells in selected row connected to their bit-lines, which in turn develops differential voltages across all...
The energy consumption and delay in read/write operation of conventional SRAM is investigated analytically as well as by simulation. Explicit analytical expressions for the energy consumption and delay in read and write operation as a function of device parameters and supply voltage are derived. The expressions are useful in predicting the effect o...
In this article, we are going to study switching techniques which are related to multiprocessor system. The switching techniques specify that when and hold internal switches are regulated until they connect routers input to their outputs and which one of the packets must be transferred along the route during a special time. The switching techniques...
Wireless sensor networks (WSNs) consist of hundreds or thousands tiny nodes called sensor that work together and connected to each other to do some special tasks. It is expected that WSNs will be used widely in many applications in the near future. Localisation and detecting node with faulty readings are the two challenging issues in WSNs, as all t...