Khaled Salah

Khaled Salah
  • Ph.D. in Computer Science
  • Professor (Full) at Khalifa University

About

415
Publications
533,164
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
20,813
Citations
Introduction
Khaled Salah is a professor at the ECE Department, Khalifa University of Science, Technology and Research (KUSTAR). Khaled has over 170 publications in areas related to IoT, blockchain, cybersecurity, and cloud computing. He is a senior member of IEEE, and is on editorial boards of a number of WOS-listed journals including IET Networks, IET Comms, Wiley’s SCN, Wiley’s IJNM, Elsevier’s JNCA, J.UCS, and AJSE.
Current institution
Khalifa University
Current position
  • Professor (Full)
Additional affiliations
January 2010 - August 2016
Khalifa University
Position
  • Professor (Full)
August 2010 - present
Khalifa University
Position
  • Professor (Associate)
August 2010 - present
Khalifa University
Position
  • Professor (Associate)

Publications

Publications (415)
Article
In recent years, the global demand for dairy products has reached unprecedented levels in the food and beverage market. Despite being produced in large quantities to meet daily needs, high organic content in milk causes it to expire quickly, leading to food waste. Current dairy supply chain management systems lack traceability, auditability, and tr...
Article
The current Unmanned Aerial Vehicle (UAV) systems lack traceable, secure, private, and trustworthy automated assurance that UAV operations comply with regulatory rules and regulations. In this paper, we propose a blockchain-based solution to ensure that the operations of UAVs comply with critical regulatory parameters such as geofencing and operati...
Article
Full-text available
Non-fungible tokens (NFTs) are unique digital assets stored on blockchains. NFTs are ideally suited for tokenizing genomic data, as they empower individuals with complete control over them. Next-generation sequencing (NGS) technology creates repositories of sequenced data from individuals’ raw genomic data, which raises challenges related to data o...
Article
Backfilling refers to the practice of allowing small jobs to be completed ahead of schedule as long as they do not cause the first job in the line to wait. Users are expected to offer estimates of how long jobs will take to complete in order to make these decisions possible, and these projections are often based on historical data. However, predict...
Article
Peer-to-peer (P2P) energy trading offers a promising solution to incentivize decentralized non-conventional energy generation and address the rising energy demand. Creating a free market for trading is crucial for efficient P2P transactions, ensuring reliability, transparency, security, and privacy of information. Traditional P2P trading system fac...
Article
Full-text available
Digital twins (DTs) have been introduced as valuable tools for digitally representing physical objects or assets. However, developing comprehensive and accurate DTs remains challenging due to the complexity of adding diverse data sources, creating realistic models, and enabling real-time synchronization. In this paper, we propose a DT framework tha...
Article
The aviation industry's carbon emissions are forecast to rise to 22% by 2050, posing a significant challenge to the goal of achieving Net Zero Emissions by the same year. Regardless of the structural or agentic strategies implemented to reduce these emissions, ensuring effective traceability of emissions in airline operations is crucial, as it enab...
Article
Full-text available
Child labor has been on the rise in recent years, which necessitates improved identification and reporting mechanisms. Current labor management systems, which are often manual or paper-based, lack traceability, audit, privacy, security, and trust features. This leads to challenges in detecting and reporting violations, particularly in large or remo...
Article
Current conventional agricultural practices have exacerbated the depletion of soil, loss of biodiversity, and intensified the substantial challenges of food security including monoculture dependence, resource intensiveness, access and distribution issues. This has raised consumers awareness towards monitoring the resources of their food consumption...
Article
Full-text available
Efforts to combat environmental degradation and tackle climate change have gained significant global recognition. Many advocate that all consumable products should carry sustainability labels to inform consumers about their production methods, resources, and disposal practices. However, the lack of standardized sustainability labels and limited sco...
Article
Full-text available
Guaranteeing steel quality is a crucial step in the steel manufacturing process. Many manufacturing industries still resort to manual visual inspection, which is inefficient and time-consuming. Industries have not fully adopted automated visual inspection due to inaccuracies, the variability of real-world manufacturing environments, and a lack of f...
Article
Preventative maintenance is imperative for ensuring the longevity and reliability of diagnostic medical imaging equipment. However, conventional maintenance systems face challenges related to centralization, fragmented information, and ineffective tracking mechanisms. In response to these challenges, this research presents a blockchain-based soluti...
Conference Paper
Full-text available
Digital twins have immense potential to enhance the planning, management, and optimization of smart cities across diverse domains. A digital twin represents a real-world physical component through an integrated multiphysics, multiscale, and probabilistic simulation. By leveraging digital twins, smart cities can visualize designs in 3D, conduct virt...
Article
Purpose Quality 4.0 (Q4.0) leverages new emerging technologies to achieve operational excellence and enhance performance. Implementing Q4.0 in digital manufacturing can bring about reliable, flexible and decentralized manufacturing. Emerging technologies such as Non-Fungible Tokens (NFTs), Blockchain and Interplanetary File Storage (IPFS) can all b...
Article
Full-text available
OpenID Connect (OIDC) is one of the most widely used delegated authentication protocols in web and mobile applications providing a single sign-on experience. It allows third-party applications, called Relying Parties (RP), to securely request and receive information about authenticated sessions and end-users from an identity provider. The OIDC spec...
Article
Full-text available
The year 2020 has witnessed the emergence of coronavirus (COVID-19) that has rapidly spread and adversely affected the global economy, health, and human lives. The COVID-19 pandemic has exposed the limitations of existing healthcare systems regarding their inadequacy to timely and efficiently handle public health emergencies. A large portion of tod...
Preprint
Full-text available
p>The year 2020 has witnessed the emergence of coronavirus (COVID-19) that has rapidly spread and adversely affected the global economy, health, and human lives. The COVID-19 pandemic has exposed the limitations of existing healthcare systems regarding their inadequacy to timely and efficiently handle public health emergencies. A large portion of t...
Article
Full-text available
A digital twin (DT) is an exact digital replica of a physical world object or asset that aids in managing, controlling, or monitoring the real object. The current systems used for managing DTs are centralized and not easily accessible. Typically, a DT is built by the original equipment manufacturer (OEM) and becomes hard to access and manage once i...
Preprint
Full-text available
p>The distribution, traceability, and management of shipping container logistics require secure data flow and trusted transactions. Digital Twins (DTs) can realize these features by offering shipping tracking and traceability, process flow and status monitoring, and management of the physical containers all in a remote manner. However, the data of...
Preprint
Full-text available
p>The distribution, traceability, and management of shipping container logistics require secure data flow and trusted transactions. Digital Twins (DTs) can realize these features by offering shipping tracking and traceability, process flow and status monitoring, and management of the physical containers all in a remote manner. However, the data of...
Article
Full-text available
Software licenses are legal agreements of sale and usage among software developers and clients. Such legal agreements are crucial to effectively manage ownership and protect the rights of involved parties. Today’s software licensing mechanisms are mostly centralized and do not address the ever-increasing issues and complexities of modern software t...
Article
Full-text available
The authenticity, traceability, and management of expensive food products require trusted, secure, and transparent end-to-end data provenance and transactions. In today’s systems, transactions and data related to managing and tracing the origins and history of food products are typically stored in segregated data repositories, and controlled and ma...
Article
Full-text available
Ranking systems have proven to improve the quality of education and help build the reputation of academic institutions. Each of the current academic ranking systems is based on different methodologies, criteria, and standards of measurement. Academic and employer reputations are subjective indicators of some rankings determined through surveying th...
Article
Full-text available
Medical devices play a crucial role in the global healthcare system, but their high cost has led to the increasing adoption of refurbished medical devices as a sustainable alternative for hospitals and patients around the world. The repositioning of refurbished devices into the market, however, is accompanied by a number of challenges, including co...
Article
Full-text available
Healthcare credentialing plays a vital role in ensuring the competence and integrity of healthcare professionals. However, the current credentials verification process suffers from time-consuming procedures due to the large number of intermediaries, limited information access, data fragmentation and the persistent risk of fraudulent credentials, le...
Article
Full-text available
Crop insurance serves as a crucial risk mitigation strategy for farmers facing uncertainties stemming from unpredictable weather conditions and vulnerabilities within the agricultural production process. Unfortunately, the prevailing traditional methods of crop insurance are laden with complexities, high costs, and, more critically, a lack of trust...
Article
Full-text available
Medical errors are recognized as major threats to patient safety worldwide. Lack of streamlined communication and an inability to share and exchange data are among the contributory factors affecting patient safety. To address these challenges, blockchain can be utilized to ensure a secure, transparent and decentralized data exchange among stakehold...
Article
Full-text available
Mobile health (mHealth) is playing a key role in facilitating health services for patients. Such services may include remote diagnostics and monitoring, chronic conditions management, preventive medicine, and health promotion. While mHealth has gained significant traction during the COVID-19 pandemic, they may pose safety risks to patients. This en...
Article
Full-text available
Metaverse has the potential to reshape and transform the way people interact and perform their daily tasks. A metaverse is a virtual, digital, and three-dimensional universe formed by integrating different cutting-edge technologies and virtual places. In this paper, we discuss how the metaverse can be utilized in healthcare. We provide insightful d...
Article
Full-text available
Industrialization and the rapid increase in the world population have led to the generation of a large amount of plastic waste. Efficient recycling of such waste and fairly rewarding the general public for their services and efforts are two challenging problems. A large portion of today's systems and technologies that are leveraged for managing pla...
Preprint
Full-text available
Today's wireless systems are posing key challenges in terms of quality of service and quality of physical experience. Metaverse has the potential to reshape, transform, and add innovations to the existing wireless systems. A metaverse is a collective virtual open space that can enable wireless systems using digital twins, digital avatars, and inter...
Article
Full-text available
The COVID-19 pandemic caused disruption in the healthcare market, which resulted in shortages of essential healthcare products. The pandemic exacerbated the problems that already existed in the healthcare supply chain, such as poor data availability, transparency, and accessibility. Such problems necessitate the introduction of a solution that is c...
Article
The digital transformation has changed how stake-holders communicate and interact within the supply chain. Personal computers, mobile devices, Inter-net of Things (IoT), 3D printing, drones, robotics, wearables, self-driving cars, smartwatches and smart-phones are examples of technological innovations that change the way people exchange and process...
Article
Full-text available
Non-Fungible Tokens (NFTs) have recently received widespread attention as their market has experienced massive growth since early 2021. NFTs are blockchain-based tokens used to represent ownership of digital and physical assets in a manner that is transparent, traceable, tamper-proof, secure, and trustworthy. Although NFTs have enabled new applicat...
Article
Full-text available
Fine jewelry is a unique class of ornaments composed of precious metals and gemstones. Premium-grade metals such as gold, platinum, and sliver, and gemstones such as pearls, diamonds, rubies, and emeralds are used use to make fine jewelry. Paper-based certificates are typically issued by retailers and producers for fine jewelry and gemstones as a p...
Article
Full-text available
Digital data has enabled organizations to anticipate future threats, opportunities, and trends. However, digital data owners do not know how their data is accessed, shared, and monitized. In this paper, we propose using blockchain technology and non-fungible tokens (NFTs) to enable time-bound access and monitization of private data. Our approach al...
Article
Coronavirus 2019 (COVID-19) vaccines have been produced on a large scale since 2020. However, large-scale vaccine production has led to two forms of waste; namely, overproduction and underutilization. Most of today’s systems and technologies used to manage waste data related to COVID- 19 vaccines fall short of providing transparency, traceability,...
Article
Full-text available
Efficient traceability management is necessary for managing products in the fishery supply chain. Any negligence in products’ traceability can result in food fraud that may adversely affect the consumer’s health. Monitoring and tracking of the fishery supply chain operations can assist system stakeholders in identifying the origins and causes of pr...
Article
Full-text available
Non-fungible tokens (NFTs) have emerged as one of the most popular digital assets in recent years. They represent ownership of unique items that are stored on a blockchain and cannot be changed, replaced, and copied. Digital exchanges sell and trade NFT-minted assets that can only have one official owner at a time. NFTs are entering all sectors, fr...
Article
Full-text available
Billions of dollars lost have been recorded over the past decade due to the overproduction and underconsumption of medical supplies. The overproduction and underconsumption are usually due to the lack of accountability, transparency, traceability, audit, assessment, security, and trust features in the current healthcare supply chain systems. It is...
Article
Full-text available
Today's healthcare data management systems are facing key challenges in terms of data transparency, traceability, immutability, audit, data provenance, flexible access, trust, privacy, and security. Also, a large portion of existing healthcare systems leveraged for managing data are centralized that pose potential risks of single point of failures...
Article
Full-text available
Purpose: The purpose of this research is to study and analyze the literature that integrates Lean Six Sigma (LSS) approach with blockchain technology in different sectors for improved quality management. Design/Methodology/Approach: This study presents a scoping review on the application of integrated LSS and blockchain technology in the manufact...
Article
Full-text available
In many production clouds, with the notable exception of Google, aggregation-based VM placement policies are used to provision datacenter resources energy and performance efficiently. However, if VMs with similar workloads are placed onto the same machines, they might suffer from contention, particularly, if they are competing for similar resources...
Article
Full-text available
Deep learning has gained huge traction in recent years because of its potential to make informed decisions. A large portion of today's deep learning systems are based on centralized servers and fall short in providing operational transparency, traceability, reliability, security, and trusted data provenance features. Also, training deep learning mo...
Article
Industrial processes rely on sensory data for decision-making processes, risk assessment, and performance evaluation. Extracting actionable insights from the collected data calls for an infrastructure that can ensure the dissemination of trustworthy data. For the physical data to be trustworthy, it needs to be cross-validated through multiple senso...
Article
The COVID-19 pandemic has severely impacted many industries, in particular the healthcare sector exposing systemic vulnerabilities in emergency preparedness, risk mitigation, and supply chain management. A major challenge during the pandemic was related to the increased demand for Personal Protective Equipment (PPE), resulting in critical shortages...
Article
Today's systems, approaches, and technologies leveraged for managing oil and gas supply chain operations fall short of providing operational transparency, traceability, audit, security, and trusted data provenance features. Also, a large portion of the existing systems are centralized, manual, and highly disintegrated, which make them vulnerable to...
Article
Full-text available
Healthcare has evolved significantly in recent years primarily due to the advancements in and increasing adoption of technology in healthcare processes such as data collection, storage, diagnostics, and treatment. The emergence of the industrial internet of things (IIoT) has further evolved e-Health by facilitating the development of connected heal...
Article
Full-text available
Today’s resource-constrained IoT streaming devices generate large amounts of data which is stored, processed, analyzed for value creation, and accessed using centralized systems, technologies, platforms, and services. Most existing systems leveraged for storing and accessing IoT streaming data fall short in providing transparency, traceability, rel...
Article
Full-text available
Today’s organ donation and transplantation systems pose different requirements and challenges in terms of registration, donor-recipient matching, organ removal, organ delivery, and transplantation with legal, clinical, ethical, and technical constraints. Therefore, an end-to-end organ donation and transplantation system is required to guarantee a f...
Article
Full-text available
Non-Fungible Tokens (NFTs) have recently received immense popularity in the digital art industry. An NFT represents ownership of a unique item that is stored on the blockchain and cannot be changed, replaced, and copied. The current NFT ecosystem falls short in trust features and is prone to illegitimate users, threats, and vulnerabilities. In this...
Article
Full-text available
The demand for high-quality Artificial Intelligence (AI) models is ever-increasing in this digital era. However, most of the existing methods leveraged for managing the ownership, trading, and access of AI models fall short of providing traceability, transparency, audit, security, and trustful features. In this paper, we propose a solution based on...
Article
Full-text available
The current legacy system used in processing health insurance claims causes a huge amount of financial loss every year due to fraud claims. It is also highly prone to privacy and security threats due to the use of traditional methods. Health insurance claims for prescription drugs are one such claim that is highly prone to being tampered with. Also...
Article
Full-text available
In recent years, the digital world has advanced significantly, particularly on the Internet, which is critical given that many of our activities are now conducted online. As a result of attackers’ inventive techniques, the risk of a cyberattack is rising rapidly. One of the most critical attacks is the malicious URL intended to extract unsolicited...
Article
Full-text available
The maritime industry is a complex multi-tiered sector that plays a major role in international shipping and trade. Seaborne transportation is responsible for 90% of goods moved globally, and containerized shipments account for more than 50% of those goods. This volume of movement requires efficient tracking and traceability methods that secure the...
Article
Full-text available
Healthcare supply chains have evolved drastically over time, with complex domestic and global networks and interactions across various organizations and entities. This gives rise to numerous challenges related to information and data pertaining to medical devices used within healthcare supply chain, including data integrity, provenance, traceabilit...
Article
Full-text available
An unprecedented amount of goods and commodities are shipped and transported globally each day through different modes of transport. Due to its complexity, the maritime industry suffers from a lack of trust and secure ownership evidence, protracted documentation procedures, and excessive data aggregation. These shortcomings are reflected in cargo p...
Article
Full-text available
Information sharing is essential for coordination and stakeholder integration and is crucial to achieving sustainable supply chain operations. Furthermore, improved information sharing assists retailers by reducing the time spent looking for alternative suppliers to meet the unexpected demand surge during pandemics. Recent advances in networking an...
Article
Full-text available
Product recall management in the automotive industry is a challenging problem that affects human lives and the safe operation of automobiles. Product recalls can assist in removing potentially unsafe products from the marketplace and minimizing a company’s responsibility for corporate negligence. Today’s systems and technologies leveraged for produ...
Article
Full-text available
The massive adoption of electric vehicles (EVs) has caused an increasing demand for electric energy to charge the vehicles. Efficiently managing energy trading between energy providers and energy consumers can lead to meet the high demand for charging EVs while reducing its cost compared to traditional power provided by the utility company. However...
Article
Full-text available
Today’s a large number of blood donation management systems fall short in providing traceability, immutability, transparency, audit, privacy, and security features. Also, they are vulnerable to the single point of failure problem due to centralization. In this paper, we propose a private Ethereum blockchain-based solution to automate blood donation...
Article
Full-text available
Today’s technologies, techniques, and systems leveraged for managing energy trading operations in electric vehicles fall short in providing operational transparency, immutability, fault tolerance, traceability, and trusted data provenance features. They are centralized and vulnerable to the single point of failure problem, and less trustworthy as t...
Article
Full-text available
Telehealth has gained a huge traction during the Coronavirus (COVID-19) pandemic. Telehealth enables physicians and medical care providers to remotely care for patients and monitor their symptoms. Today’s telehealth systems fall short in providing transparent, immutable, traceable, auditable, secure, and trustworthy services. In addition, they are...
Preprint
Full-text available
Today's technologies, techniques, and systems leveraged for managing energy trading operations in electric vehicles fall short in providing operational transparency, immutability, fault tolerance, traceability, and trusted data provenance features. They are centralized and vulnerable to the single point of failure problem, and less trustworthy as t...
Preprint
Full-text available
Today's technologies, techniques, and systems leveraged for managing energy trading operations in electric vehicles fall short in providing operational transparency, immutability, fault tolerance, traceability, and trusted data provenance features. They are centralized and vulnerable to the single point of failure problem, and less trustworthy as t...
Chapter
Full-text available
Adverse events pose significant threats to patient safety and quality in healthcare worldwide. To understand how and why such events occur, incident reporting and investigation gained an imperative role in healthcare operations. Therefore, healthcare organizations and national health services have implemented local and national-level incident repor...
Preprint
Full-text available
Deep learning has gained huge traction in recent years because of its potential to make informed decisions. A large portion of today's deep learning systems are based on centralized servers and fall short in providing operational transparency, traceability, reliability, security, and trusted data provenance features. Also, training deep learning mo...
Preprint
Full-text available
Deep learning has gained huge traction in recent years because of its potential to make informed decisions. A large portion of today's deep learning systems are based on centralized servers and fall short in providing operational transparency, traceability, reliability, security, and trusted data provenance features. Also, training deep learning mo...
Article
Full-text available
Controlled drugs are open to abuse, misuse, and diversion. Therefore, they are regulated and tracked across the healthcare sector to protect the health of the general public which is a highly prioritized rule in the health professional’s code of ethics. Healthcare centers that provide controlled medication to patients are still using manual papers...
Preprint
Full-text available
Today's systems, approaches, and technologies leveraged for managing oil and gas supply chain operations fall short in providing operational transparency, traceability, audit, security, and trusted data provenance features. Also, a large portion of the existing systems is centralized, manual, and highly disintegrated which make them vulnerable to m...
Preprint
Full-text available
Today's systems, approaches, and technologies leveraged for managing oil and gas supply chain operations fall short in providing operational transparency, traceability, audit, security, and trusted data provenance features. Also, a large portion of the existing systems is centralized, manual, and highly disintegrated which make them vulnerable to m...
Article
Full-text available
Coronavirus 2019 (COVID-19) has disclosed the deficiencies and limitations of the existing manufacturing and supply chain systems used for medical devices and supplies. It enforces the necessity to accelerate the shift towards decentralized digital manufacturing and supply chain networks. This paper proposes a blockchain-based solution for decentra...
Article
Full-text available
Resource-constrained blockchain clients and the Internet of Things (IoT) devices pose limitations in terms of processing and storing the entire blockchain ledger and mining blocks. Such clients and devices rely on a view of the blockchain provided by full nodes acting as gateways. However, gateway nodes sometimes can provide a distorted view of the...
Article
Full-text available
Smart cities have the potential to overcome environmental problems caused by improper waste disposal by improving human health, protecting the aquatic ecosystem, and reducing air pollution. However, today’s systems, approaches, and technologies leveraged for waste management are manual and centralized. This fact makes them vulnerable to manipulatio...
Article
Full-text available
Healthcare innovations are increasingly becoming reliant on high variety and standards-compliant (e.g., HIPAA, common data model) distributed data sets that enable predictive analytics. Consequently, health information systems need to be developed using cooperation and distributed trust principles to allow protected data sharing between multiple do...
Article
Blockchains are a key disruptive technology of recent times with applications across several application domains such as finance, supply chain, healthcare and Industry 4.0. With growing application types, scalability of blockchains has emerged as a key challenge in achieving the potential of this technology. This paper attempts to outline this chal...
Preprint
Full-text available
Blockchain technology has the potential to revolutionize industries by offering decentralized, transparent, data provenance, auditable, reliable, and trustworthy features. However, cross-chain interoperability is one of the crucial challenges preventing widespread adoption of blockchain applications. Cross-chain interoperability represents the abil...
Preprint
Full-text available
In many production clouds, with the notable exception of Google, aggregation-based VM placement policies are used to provision datacenter resources energy and performance efficiently. However, if VMs with similar workloads are placed onto the same machines, they might suffer from contention, particularly, if they are competing for similar resources...
Preprint
Full-text available
Blockchain technology has the potential to revolutionize industries by offering decentralized, transparent, data provenance, auditable, reliable, and trustworthy features. However, cross-chain interoperability is one of the crucial challenges preventing widespread adoption of blockchain applications. Cross-chain interoperability represents the abil...
Preprint
Full-text available
In many production clouds, with the notable exception of Google, aggregation-based VM placement policies are used to provision datacenter resources energy and performance efficiently. However, if VMs with similar workloads are placed onto the same machines, they might suffer from contention, particularly, if they are competing for similar resources...
Article
Full-text available
Blockchain technology has the potential to revolutionize industries by offering decentralized, transparent, data provenance, auditable, reliable, and trustworthy features. However, cross-chain interoperability is one of the crucial challenges preventing widespread adoption of blockchain applications. Cross-chain interoperability represents the abil...

Network

Cited By