About
59
Publications
48,254
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,067
Citations
Introduction
Current institution
Additional affiliations
June 2003 - December 2007
January 2012 - present
Publications
Publications (59)
The rapid evolution of the Smart-everything movement and Artificial Intelligence (AI) advancements have given rise to sophisticated cyber threats that traditional methods cannot counteract. Cyber threats are extremely critical in financial technology (FinTech) as a data-centric sector expected to provide 24/7 services. This paper introduces a novel...
Smart city infrastructure and the related theme of critical national infrastructure have attracted growing interest in recent years in academic literature, notably how cyber-security can be effectively applied within the environment, which involves using cyber-physical systems. These operate cross-domain and have massively improved functionality an...
With its potential, extensive data analysis is a vital part of biomedical applications and of medical practitioner interpretations, as data analysis ensures the integrity of multidimensional datasets and improves classification accuracy; however, with machine learning, the integrity of the sources is compromised when the acquired data pose a signif...
Achieving secure communication between an Implantable Medical Device (IMD) and a gateway or programming device outside the body has showed its criticality in recent reports of vulnerabilities in cardiac devices, insulin pumps and neural implants, amongst others. The use of asymmetric cryptography is typically not a practical solution for IMDs due t...
Scientists have long looked to nature and biology in order to understand and model solutions for complex real-world problems. The study of bionics bridges the functions, biological structures and functions and organizational principles found in nature with our modern technologies, numerous mathematical and metaheuristic algorithms have been develop...
A wireless sensor network (WSN) is defined as a set of spatially distributed and interconnected sensor nodes. WSNs allow one to monitor and recognize environmental phenomena such as soil moisture, air pollution, and health data. Because of the very limited resources available in sensors, the collected data from WSNs are often characterized as unrel...
Wireless sensor networks (WSNs) consist of small sensors with limited computational and communication capabilities. Reading data in WSN is not always reliable due to open environmental factors such as noise, weakly received signal strength, and intrusion attacks. The process of detecting highly noisy data is called anomaly or outlier detection. The...
Cloud is transmigrating to network edge where they are seen as virtualized resources called “Fog Computing” that expand the idea of Cloud Computing perspective to the network edge. This chapter proposes an integrated resource allocation model for energy-efficient Infrastructure as a Service (IaaS) that extends from the network edge of the Fog to th...
Cloud computing is a systematic delivery of computing resources as services to the consumers via the Internet. Infrastructure as a Service (IaaS) is the capability provided to the consumer by enabling smarter access to the processing, storage, networks, and other fundamental computing resources, where the consumer can deploy and run arbitrary softw...
Cloud computing has attracted significant interest due to the increasing service demands from organizations offloading computationally intensive tasks to datacenters. Meanwhile, datacenter infrastructure comprises hardware resources that consume high amount of energy and give out carbon emissions at hazardous levels. In cloud datacenter, Virtual Ma...
Recently, Underwater Wireless Sensor Networks
(UWSNs) has witnessed significant attention from both
academia and industries in research and development, due
to the growing number of applications for wide range of
purposes including commercial, scientific, environmental
and military. Some of the major applications include pollution
monitoring, tacti...
Achieving secure communication between an Implantable Medical Device (IMD) inside the body and a gateway outside the body has showed its criticality with recent reports of hackings. The use of asymmetric cryptography is not a practical solution for IMDs due to the scarce computational and power resources, symmetric key cryptography is preferred. On...
File type identification (FTI) is the problem of determining the file type from its content. FTI, as a computer forensic challenge, has been studied extensively with many solutions provided by researchers. One of the most popular methodologies to do so is the mathematical analysis, which examines the distribution of bytes to explore the file type [...
File type identification (FTI) is the problem of determining the file type from its content. FTI, as a computer forensic challenge, has been studied extensively with many solutions provided by researchers. One of the most popular methodologies to do so is the mathematical analysis, which examines the distribution of bytes to explore the file type [...
In the past decade, pairing-based schemes have been proposed extensively for the cryptographic primitives including key agreement. However, recently researchers have shown an increased interest in Pairing-Free cryptography because of high computational cost of Bilinear Pairings. In this study, we could propose a new two-party pairing-free identity-...
Objectives: To present the state of the art on energy efficient frameworks in cloud computing environments Methods/ Statistical Analysis: To propose a conceptual framework for energy efficient IaaS (Infrastructure as a Service) of single and multi-cloud data centre. Findings: The approach is based on virtualization and consolidation technique that...
The underwater wireless sensor network (UWSN) is considered a promising technology for collecting valuable data from underwater areas, particularly for aiding military operations and environmental predictions. UWSNs consist of underwater sensor nodes that have limited energy and use acoustics for communication. Routing in underwater sensor nodes is...
Due to the absence of infrastructure support, secure data dissemination is a challenging task in scalable mobile ad hoc networks (MANETs) environment. In most of the traditional routing techniques for MANETs, either security has not been taken into account or only one aspect of security concern has been addressed without optimizing the routing perf...
Sensor nodes in wireless sensor networks are deployed to observe the surroundings for some phenomenon of interest. The fundamental issue in observing such environments is the area coverage which reflects how well the region is monitored. The nonuniform sensor nodes distribution in a certain region caused by random deployment might lead to coverage...
Recently, some two-party Authenticated Key Agreement protocols over elliptic curve based algebraic groups, in the context of Identity-Based cryptography have been proposed. The main contribution of this category of protocols is to reduce the complexity of performing algebraic operations through eliminating the need to using Bilinear Pairings. In th...
Due to the importance of key in providing secure communication, various Key Agreement protocols have been proposed in the recent years. The latest generation of Public Key Cryptosystems (PKC) called Certificateless PKC played an important role in the transformation of Key Agreement protocols. In this scientific area, several Key Agreement protocols...
Recently, a large variety of Identity-Based Key Agreement protocols have tried to eliminate the use of Bilinear Pairings in order to decrease complexity of computations through performing group operations over Elliptic Curves. In this paper we propose a novel pairing-free Key Agreement protocol over elliptic curve based algebraic groups. The result...
Identifying fragmented and deleted files from scattered digital storage become crucial needs in computer forensic. Storage media experience regular space fragmentation which gives direct consequence to the files system series. This paper specifies a case where the jpeg files are heavily fragmented with absent file header which contains maximum info...
Due to the high computation cost of bilinear pairings, pairing-free cryptosystems have received widespread attention recently. Various pairing-free two-party key agreement protocols in the context of public key cryptography (PKC) have been studied. To avoid complex certificate management in traditional PKC and key escrow problem in identity-based o...
Many Identity-Based two-party Key Agreement protocols have been proposed in recent years. Some of them are built on pairing maps, whereas some others could eliminate the pairings in order to decrease the complexity of computation. In this paper, we proposed a secure pairing-free Identity-Based two-party Key Agreement protocol which besides supporti...
Topology control is one of the most important techniques used in wireless sensor networks; to some extent it can reduce energy consumption in which each node is capable of minimizing its transmission power level while preserving network connectivity. Reducing energy consumption has been addressed through different aspects till now. In this paper, w...
Underwater wireless sensor networks (UWSNs) are similar to the terrestrial sensor networks.
Nevertheless, there are different characteristics among them such as low battery power,
limited bandwidth and high variable propagation delay. One of the common major problems
in UWSNs is determining an efficient and reliable routing between the source node...
Recently, various pairing-based and pairing-free two party Key Agreement protocols in the context of Identity-Based and Certificateless cryptosystems have been published. The pairing-free Key Agreement protocols could improve the efficiency by eliminating the high expense of pairing maps. In this paper, we proposed several secure and efficient Iden...
Due to the applicability of a wide range of cryptosystems in recently proposed applications, a large variety of cryptographic schemes have been developed. It can be claimed that proposing a cryptographic protocol to satisfy security and efficiency requirements is one of the significant challenging issues. Nevertheless, cryptographic research commun...
Because of the nature of wireless channels, Mobile Ad-Hoc Networks (MANETs) are vulnerable against many threats and attacks. Beside of this, the mobility of the network nodes made the security of routing protocols one of the most interesting research areas over Ad-Hoc networks. Moreover, Rushing attack became one of the common attacks against routi...
This paper intends to highlight the good and bad of social media sharing applications and websites. In the current age of technology advancement, these social media sharing sites are blooming like mushrooms, especially when newcomers to the social media world are trying to repeat the success story of Facebook, Friendster, MySpace, YouTube and Twitt...
A smart card is a card embedded with chip that runs dedicated applications. There are an issues related to the security in authenticity and integrity. The weaknesses of existing authentication scheme such as password and PIN number caused the leakage of information stored in ATM smartcard which lead to the lost of money in bank account and private...
Protected from threats that can Information assets is the lifeblood for every organization and also for individual. These assets must be jeopardized the confidentiality, integrity and availability of the information. This is why the information security is important. Since the introduction of Internet and ICT, the information has been digitized for...
Coverage preservation during a mission is a crucial issue for wireless sensor networks (WSNs). There are numerous methods to measure the coverage globally, such as circular, grid and non-circular models, but only a few algorithms can be used to measure the coverage locally, using a sensor. A local coverage measurement algorithm uses only the locati...
This study presents a novel method to develop kleene operators on a Binary Tree-Based Directed Graph (BTDG) to improve expressibility and performance of our developed complex event processing system. Complex Event Processing (CEP) systems are widely employed to notify opportunities and threats, which many of these situations are discovered through...
There are many applications for using wireless sensor networks (WSN) in ocean science; however, identifying the exact location of a sensor by itself (localization) is still a challenging problem, where global positioning system (GPS) devices are not applicable underwater. Precise distance measurement between two sensors is a tool of localization an...
Wireless sensor networks (WSNs) include sensor nodes in which each node is able to monitor the physical area and send collected information to the base station for further analysis. The important key of WSNs is detection and coverage of target area which is provided by random deployment. This paper reviews and addresses various area detection and c...
A model based on cellular automata to analyze malware propagation is enhanced to simulate malware response using self-propagating software updates. The model maintains the characteristics of wireless sensor networks while adding states and behavior. The simulation tests variable update sources and variable distances between infection and update sou...
Active RFID devices are gaining popularity in usage in many applications such as building evacuation, disaster monitoring, cargo tracking and so on. Equipped with batter cells and ability to send and receive signals distinguished active RFIDs from passive ones and convert them to smart network devices. Power tag is one of a kind in active RFID devi...
Sensors are becoming more popular in many applications with the mission of sending and receiving information from the monitoring environment. However coverage and prolonging the network lifetime are challenging issues in disaster monitoring application. In this paper Sensors and RFID's are integrated together not only to reduce the cost of deployme...
Reducing building evacuation time is a challenging research, which has been studied from any aspects up to now. In many of these researches to evaluate the proposed method a simulation has been used. Simulating building evacuation is cost effective and very accessible to all. However, the reality of the results of the simulation environment is very...
Public art as an element of urban project is created, selected and located in public spaces by designers. Being in a public domain, another group, which has an interest for public art, is the lay-public or the non-designers. The differences, which do exist between the aesthetic appraisal of designers and non-designers, have created a disparity of a...
Vast landscapes are prone to different types of disasters in our environment which need to be monitored. Sensors play a vital role in environmental monitoring where its main function in a mission such as environmental monitoring is to collect information from the monitoring field. Monitoring in our environment against any type of disaster is crucia...
A wireless ad hoc network is composed of several tiny and inexpensive device such as wireless sensor networks (WSNs) which have limited energy. In this network energy, efficiency is one of the most crucial requirements. Data transmitting in minimum power level is one way of maximizing energy efficiency. Thus, transmission power level of nodes shoul...
MultiPoint Relay (MPR) selection algorithm is a flooding technique for propagating a broadcast message inside an ad-hoc network
which reduces the number of unnecessary broadcast messages in order to save more energy in the network, minimize the number
of packet collisions, and speed up the propagation time. In this paper, we demonstrate that MPR se...
Sensing and communication coverage are among the most important trade-offs in Wireless Sensor Network (WSN) design. A minimum bound of sensing coverage is vital in scheduling, target tracking and redeployment phases, as well as providing communication coverage. Some methods measure the coverage as a percentage value, but detailed information has be...
Localization is an important stage in Wireless Sensor Networks (WSNs) in order to make the collected information meaningful. For Underwater Wireless Sensor Networks (UWSNs), received signal strength (RSS) has been used for distance measurement through the state-of-the-art Lambert function [1]. In this work, a hybrid RSS-based localization mechanism...
Sensing coverage is one of the principal trade-off factors in Wireless Sensor Network design. It is necessary to have a minimum bound of sensing coverage in a sensor network in various aspects like scheduling, target tracking or redeployment phases. There are several methods to determine the sensing coverage. However, a system to provide detailed i...
Fast and accurate distance measurement is crucial for target tracking and node localization in Wireless Sensor Networks. For short-range Underwater Acoustic Sensor Networks (UASNs), received signal strength (RSS) can give distance between acoustic devices. An extensive study on the application of the Lambert W function over RSS for distance estimat...
Promising a suitable coverage is one of the problems in Wireless Sensor Network where a random deployment make it very difficult to measure. In this paper, a novel equation base on Gaussian distribution is proposed to estimate the deployment density. This function uses the α-Covering value and coverage percentage as inputs. Simulation results show...
Multi-Point Relay (MPR) mechanism is a selection algorithm to reduce the number of control packets in ad-hoc network routing protocols. This study presents a new MPR selection method using genetic algorithm (GA) while the MPR sets follow the maximal independent concept. Although original greedy algorithm works well in sparse networks, as MPR select...
The problem of assigning locomotives to trains consists of determining the number of locomotives of different types that provide sufficient power to pull trains on fixed schedules. The objective is to minimize the fixed and operational locomotive costs. The locomotive assignment problem is defined for cyclic and non cyclic problems. In this paper,...