Hassan Chizari

Hassan Chizari
University of Gloucestershire · Cyber Security

PhD in Computer Science

About

54
Publications
27,068
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
602
Citations
Additional affiliations
January 2012 - present
Universiti Teknologi Malaysia
Position
  • Professor (Associate)
June 2003 - December 2007
Imam Khomeini International University
Position
  • Lecturer

Publications

Publications (54)
Article
Full-text available
With its potential, extensive data analysis is a vital part of biomedical applications and of medical practitioner interpretations, as data analysis ensures the integrity of multidimensional datasets and improves classification accuracy; however, with machine learning, the integrity of the sources is compromised when the acquired data pose a signif...
Article
Achieving secure communication between an Implantable Medical Device (IMD) and a gateway or programming device outside the body has showed its criticality in recent reports of vulnerabilities in cardiac devices, insulin pumps and neural implants, amongst others. The use of asymmetric cryptography is typically not a practical solution for IMDs due t...
Article
Full-text available
Scientists have long looked to nature and biology in order to understand and model solutions for complex real-world problems. The study of bionics bridges the functions, biological structures and functions and organizational principles found in nature with our modern technologies, numerous mathematical and metaheuristic algorithms have been develop...
Article
Full-text available
A wireless sensor network (WSN) is defined as a set of spatially distributed and interconnected sensor nodes. WSNs allow one to monitor and recognize environmental phenomena such as soil moisture, air pollution, and health data. Because of the very limited resources available in sensors, the collected data from WSNs are often characterized as unrel...
Article
Full-text available
Wireless sensor networks (WSNs) consist of small sensors with limited computational and communication capabilities. Reading data in WSN is not always reliable due to open environmental factors such as noise, weakly received signal strength, and intrusion attacks. The process of detecting highly noisy data is called anomaly or outlier detection. The...
Chapter
Full-text available
Cloud is transmigrating to network edge where they are seen as virtualized resources called “Fog Computing” that expand the idea of Cloud Computing perspective to the network edge. This chapter proposes an integrated resource allocation model for energy-efficient Infrastructure as a Service (IaaS) that extends from the network edge of the Fog to th...
Article
Full-text available
Cloud computing is a systematic delivery of computing resources as services to the consumers via the Internet. Infrastructure as a Service (IaaS) is the capability provided to the consumer by enabling smarter access to the processing, storage, networks, and other fundamental computing resources, where the consumer can deploy and run arbitrary softw...
Article
Full-text available
Cloud computing has attracted significant interest due to the increasing service demands from organizations offloading computationally intensive tasks to datacenters. Meanwhile, datacenter infrastructure comprises hardware resources that consume high amount of energy and give out carbon emissions at hazardous levels. In cloud datacenter, Virtual Ma...
Article
Full-text available
Recently, Underwater Wireless Sensor Networks (UWSNs) has witnessed significant attention from both academia and industries in research and development, due to the growing number of applications for wide range of purposes including commercial, scientific, environmental and military. Some of the major applications include pollution monitoring, tacti...
Preprint
Achieving secure communication between an Implantable Medical Device (IMD) inside the body and a gateway outside the body has showed its criticality with recent reports of hackings. The use of asymmetric cryptography is not a practical solution for IMDs due to the scarce computational and power resources, symmetric key cryptography is preferred. On...
Article
Full-text available
File type identification (FTI) is the problem of determining the file type from its content. FTI, as a computer forensic challenge, has been studied extensively with many solutions provided by researchers. One of the most popular methodologies to do so is the mathematical analysis, which examines the distribution of bytes to explore the file type [...
Article
Full-text available
File type identification (FTI) is the problem of determining the file type from its content. FTI, as a computer forensic challenge, has been studied extensively with many solutions provided by researchers. One of the most popular methodologies to do so is the mathematical analysis, which examines the distribution of bytes to explore the file type [...
Article
In the past decade, pairing-based schemes have been proposed extensively for the cryptographic primitives including key agreement. However, recently researchers have shown an increased interest in Pairing-Free cryptography because of high computational cost of Bilinear Pairings. In this study, we could propose a new two-party pairing-free identity-...
Article
Full-text available
Objectives: To present the state of the art on energy efficient frameworks in cloud computing environments Methods/ Statistical Analysis: To propose a conceptual framework for energy efficient IaaS (Infrastructure as a Service) of single and multi-cloud data centre. Findings: The approach is based on virtualization and consolidation technique that...
Article
Full-text available
The underwater wireless sensor network (UWSN) is considered a promising technology for collecting valuable data from underwater areas, particularly for aiding military operations and environmental predictions. UWSNs consist of underwater sensor nodes that have limited energy and use acoustics for communication. Routing in underwater sensor nodes is...
Article
Full-text available
Due to the absence of infrastructure support, secure data dissemination is a challenging task in scalable mobile ad hoc networks (MANETs) environment. In most of the traditional routing techniques for MANETs, either security has not been taken into account or only one aspect of security concern has been addressed without optimizing the routing perf...
Article
Full-text available
Sensor nodes in wireless sensor networks are deployed to observe the surroundings for some phenomenon of interest. The fundamental issue in observing such environments is the area coverage which reflects how well the region is monitored. The nonuniform sensor nodes distribution in a certain region caused by random deployment might lead to coverage...
Article
Full-text available
Recently, some two-party Authenticated Key Agreement protocols over elliptic curve based algebraic groups, in the context of Identity-Based cryptography have been proposed. The main contribution of this category of protocols is to reduce the complexity of performing algebraic operations through eliminating the need to using Bilinear Pairings. In th...
Article
Full-text available
Due to the importance of key in providing secure communication, various Key Agreement protocols have been proposed in the recent years. The latest generation of Public Key Cryptosystems (PKC) called Certificateless PKC played an important role in the transformation of Key Agreement protocols. In this scientific area, several Key Agreement protocols...
Article
Recently, a large variety of Identity-Based Key Agreement protocols have tried to eliminate the use of Bilinear Pairings in order to decrease complexity of computations through performing group operations over Elliptic Curves. In this paper we propose a novel pairing-free Key Agreement protocol over elliptic curve based algebraic groups. The result...
Conference Paper
Full-text available
Identifying fragmented and deleted files from scattered digital storage become crucial needs in computer forensic. Storage media experience regular space fragmentation which gives direct consequence to the files system series. This paper specifies a case where the jpeg files are heavily fragmented with absent file header which contains maximum info...
Article
Full-text available
Topology control is one of the most important techniques used in wireless sensor networks; to some extent it can reduce energy consumption in which each node is capable of minimizing its transmission power level while preserving network connectivity. Reducing energy consumption has been addressed through different aspects till now. In this paper, w...
Article
Full-text available
Underwater wireless sensor networks (UWSNs) are similar to the terrestrial sensor networks. Nevertheless, there are different characteristics among them such as low battery power, limited bandwidth and high variable propagation delay. One of the common major problems in UWSNs is determining an efficient and reliable routing between the source node...
Article
Full-text available
Recently, various pairing-based and pairing-free two party Key Agreement protocols in the context of Identity-Based and Certificateless cryptosystems have been published. The pairing-free Key Agreement protocols could improve the efficiency by eliminating the high expense of pairing maps. In this paper, we proposed several secure and efficient Iden...
Article
Full-text available
Due to the applicability of a wide range of cryptosystems in recently proposed applications, a large variety of cryptographic schemes have been developed. It can be claimed that proposing a cryptographic protocol to satisfy security and efficiency requirements is one of the significant challenging issues. Nevertheless, cryptographic research commun...
Article
Full-text available
Because of the nature of wireless channels, Mobile Ad-Hoc Networks (MANETs) are vulnerable against many threats and attacks. Beside of this, the mobility of the network nodes made the security of routing protocols one of the most interesting research areas over Ad-Hoc networks. Moreover, Rushing attack became one of the common attacks against routi...
Chapter
Due to the high computation cost of bilinear pairings, pairing-free cryptosystems have received widespread attention recently. Various pairing-free two-party key agreement protocols in the context of public key cryptography (PKC) have been studied. To avoid complex certificate management in traditional PKC and key escrow problem in identity-based o...
Chapter
Many Identity-Based two-party Key Agreement protocols have been proposed in recent years. Some of them are built on pairing maps, whereas some others could eliminate the pairings in order to decrease the complexity of computation. In this paper, we proposed a secure pairing-free Identity-Based two-party Key Agreement protocol which besides supporti...
Article
Full-text available
This paper intends to highlight the good and bad of social media sharing applications and websites. In the current age of technology advancement, these social media sharing sites are blooming like mushrooms, especially when newcomers to the social media world are trying to repeat the success story of Facebook, Friendster, MySpace, YouTube and Twitt...
Article
Full-text available
A smart card is a card embedded with chip that runs dedicated applications. There are an issues related to the security in authenticity and integrity. The weaknesses of existing authentication scheme such as password and PIN number caused the leakage of information stored in ATM smartcard which lead to the lost of money in bank account and private...
Article
Full-text available
Protected from threats that can Information assets is the lifeblood for every organization and also for individual. These assets must be jeopardized the confidentiality, integrity and availability of the information. This is why the information security is important. Since the introduction of Internet and ICT, the information has been digitized for...
Article
Coverage preservation during a mission is a crucial issue for wireless sensor networks (WSNs). There are numerous methods to measure the coverage globally, such as circular, grid and non-circular models, but only a few algorithms can be used to measure the coverage locally, using a sensor. A local coverage measurement algorithm uses only the locati...
Article
Full-text available
This study presents a novel method to develop kleene operators on a Binary Tree-Based Directed Graph (BTDG) to improve expressibility and performance of our developed complex event processing system. Complex Event Processing (CEP) systems are widely employed to notify opportunities and threats, which many of these situations are discovered through...
Article
Full-text available
There are many applications for using wireless sensor networks (WSN) in ocean science; however, identifying the exact location of a sensor by itself (localization) is still a challenging problem, where global positioning system (GPS) devices are not applicable underwater. Precise distance measurement between two sensors is a tool of localization an...
Article
Full-text available
Wireless sensor networks (WSNs) include sensor nodes in which each node is able to monitor the physical area and send collected information to the base station for further analysis. The important key of WSNs is detection and coverage of target area which is provided by random deployment. This paper reviews and addresses various area detection and c...
Article
Full-text available
A model based on cellular automata to analyze malware propagation is enhanced to simulate malware response using self-propagating software updates. The model maintains the characteristics of wireless sensor networks while adding states and behavior. The simulation tests variable update sources and variable distances between infection and update sou...
Article
Full-text available
A wireless ad hoc network is composed of several tiny and inexpensive device such as wireless sensor networks (WSNs) which have limited energy. In this network energy, efficiency is one of the most crucial requirements. Data transmitting in minimum power level is one way of maximizing energy efficiency. Thus, transmission power level of nodes shoul...
Conference Paper
Full-text available
Active RFID devices are gaining popularity in usage in many applications such as building evacuation, disaster monitoring, cargo tracking and so on. Equipped with batter cells and ability to send and receive signals distinguished active RFIDs from passive ones and convert them to smart network devices. Power tag is one of a kind in active RFID devi...
Conference Paper
Full-text available
Sensors are becoming more popular in many applications with the mission of sending and receiving information from the monitoring environment. However coverage and prolonging the network lifetime are challenging issues in disaster monitoring application. In this paper Sensors and RFID's are integrated together not only to reduce the cost of deployme...
Article
Full-text available
Reducing building evacuation time is a challenging research, which has been studied from any aspects up to now. In many of these researches to evaluate the proposed method a simulation has been used. Simulating building evacuation is cost effective and very accessible to all. However, the reality of the results of the simulation environment is very...
Article
Full-text available
Public art as an element of urban project is created, selected and located in public spaces by designers. Being in a public domain, another group, which has an interest for public art, is the lay-public or the non-designers. The differences, which do exist between the aesthetic appraisal of designers and non-designers, have created a disparity of a...
Article
Full-text available
Vast landscapes are prone to different types of disasters in our environment which need to be monitored. Sensors play a vital role in environmental monitoring where its main function in a mission such as environmental monitoring is to collect information from the monitoring field. Monitoring in our environment against any type of disaster is crucia...
Article
Full-text available
MultiPoint Relay (MPR) selection algorithm is a flooding technique for propagating a broadcast message inside an ad-hoc network which reduces the number of unnecessary broadcast messages in order to save more energy in the network, minimize the number of packet collisions, and speed up the propagation time. In this paper, we demonstrate that MPR se...
Article
Full-text available
Sensing and communication coverage are among the most important trade-offs in Wireless Sensor Network (WSN) design. A minimum bound of sensing coverage is vital in scheduling, target tracking and redeployment phases, as well as providing communication coverage. Some methods measure the coverage as a percentage value, but detailed information has be...
Article
Full-text available
Localization is an important stage in Wireless Sensor Networks (WSNs) in order to make the collected information meaningful. For Underwater Wireless Sensor Networks (UWSNs), received signal strength (RSS) has been used for distance measurement through the state-of-the-art Lambert function [1]. In this work, a hybrid RSS-based localization mechanism...
Article
Full-text available
Sensing coverage is one of the principal trade-off factors in Wireless Sensor Network design. It is necessary to have a minimum bound of sensing coverage in a sensor network in various aspects like scheduling, target tracking or redeployment phases. There are several methods to determine the sensing coverage. However, a system to provide detailed i...
Article
Full-text available
Fast and accurate distance measurement is crucial for target tracking and node localization in Wireless Sensor Networks. For short-range Underwater Acoustic Sensor Networks (UASNs), received signal strength (RSS) can give distance between acoustic devices. An extensive study on the application of the Lambert W function over RSS for distance estimat...
Article
Full-text available
Promising a suitable coverage is one of the problems in Wireless Sensor Network where a random deployment make it very difficult to measure. In this paper, a novel equation base on Gaussian distribution is proposed to estimate the deployment density. This function uses the α-Covering value and coverage percentage as inputs. Simulation results show...
Article
Full-text available
Multi-Point Relay (MPR) mechanism is a selection algorithm to reduce the number of control packets in ad-hoc network routing protocols. This study presents a new MPR selection method using genetic algorithm (GA) while the MPR sets follow the maximal independent concept. Although original greedy algorithm works well in sparse networks, as MPR select...
Article
Full-text available
The problem of assigning locomotives to trains consists of determining the number of locomotives of different types that provide sufficient power to pull trains on fixed schedules. The objective is to minimize the fixed and operational locomotive costs. The locomotive assignment problem is defined for cyclic and non cyclic problems. In this paper,...

Network

Cited By

Projects

Projects (6)
Project
Dear Colleagues, Cybersecurity has been a prominent research area for many years, and it has evolved and changed to address the raised gaps and concerns in the field. Among the many areas of cyber security, however, medical applications have received less treatment, even though the cybersecurity risk in them is quite high. There are many specific features for human health and medical device cybersecurity, such as extensive usage of legacy devices (e.g., windows XP-operated MRI machines), priority of health to privacy and confidentiality (e.g., sharing unprotected patients’ data with nurses on a USB stick), the concept of an emergency situation (e.g., overriding all cybersecurity measures in such an event) and cryptography for extreme devices (e.g., medical implants). The fast-paced environment with rotary shifts, part-time or hourly paid staffs and sharing devices among many operators adds more complexity to this problem. Although attacks such as WannaCry demonstrated how vulnerable this area of cybersecurity is, there is still a big gap in research to define and address the problems specified to human health and medical devices. In this Special Issue, researchers and scholars are invited to submit their work on the following topics focused on human health and medical devices to the journal: standards and regulations, privacy and accessibility, attack vectors, threat modelling, use cases and abuse cases, cryptography and confidentiality, blockchain, homomorphic encryption and other related topics.
Project
In this Special Issue, researchers and scholars are invited to submit their work on the following topics focused on human health and medical devices to the journal: standards and regulations, privacy and accessibility, attack vectors, threat modelling, use cases and abuse cases, cryptography and confidentiality, blockchain, homomorphic encryption and other related topics.
Project
The purpose of this project is to study and propose different techniques for outlier detection in Wireless Sensor Networks (WSNs).