
Onome Blaise Ohwo- Doctor of Philosophy
- Lecturer at Babcock University
Onome Blaise Ohwo
- Doctor of Philosophy
- Lecturer at Babcock University
About
27
Publications
22,901
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
92
Citations
Introduction
Skills and Expertise
Current institution
Additional affiliations
January 2020 - November 2020
WordBin Limited
Position
- Consultant
Education
January 2023 - April 2024
January 2020 - December 2023
Publications
Publications (27)
The rise of the Internet of Things (IoT) devices in
smart homes has raised concerns about privacy breaches and
unauthorized access to sensitive data. However, traditional
access control mechanisms often fail to address these issues that
infringes on the privacy of the users of this technology. This
study proposes a privacy-preserving access control...
Information Technology (IT) networks have become a cornerstone of business communication, evolving alongside the Internet, which now facilitates the interconnection of independent IT infrastructures. This interconnectedness has increased the risks of information disclosure and privacy violations, presenting ethical challenges for information securi...
The Domain Name System (DNS) is a critical component of the Internet, and its disruption can significantly affect service quality. To enhance security and protect user privacy, encrypted protocols, such as DNS over TLS (DoT), DNS over Quick UDP Internet Connections (DoQ), and DNS over HTTPS (DoH), have been introduced. This study evaluates the perf...
The rapid industrialization and technological advancements of recent decades have significantly improved various facets of human life but have also intensified air pollution through the emission of harmful gases. Accurate detection of these pollutants, including Carbon Monoxide (CO), Ammonia (NH₃), and Sulfur Dioxide (SO₂), is critical for mitigati...
The present study endeavors to enhance DNS over TLS performance via the development of an Adaptive Transport Layer Security Model (ad-TLSM). DNS over TLS, which employs TLS encryption to safeguard communication between clients and DNS recursive resolvers, suffers from performance issues that pose significant challenges. In response to these issues,...
The Domain Name System (DNS) is an essential component of the internet infrastructure. Due to its
importance, securing DNS becomes a necessity for current and future networks. Various DNS security architecture
have been developed in order to provide security services; such as DNS over HTTPS (DoH), DNS over TLS (DoT),
and DNS over QUIC (DoQ). Unfort...
The goal of gamification is the deployment of game mechanics in real-world context for non-gaming scenarios, to drive motivation and performance regarding a given activity. Preceding research, mostly supports the hypothesis fundamental to this aim. Till date, gamification has continued to find its application in various industries and sectors. Amon...
Global warming, pollution and costs of power production are the major environmental and economic issues faced by the planet today. Many research works have been done and are ongoing to reduce the adverse effects that may arise due to these issues. With these issues plaguing much of the planet, the rapid proliferation of the Internet of Things (IoT)...
Cloud computing is a groundbreaking technique that provides a whole lot of facilities such as storage, memory, and CPU as well as facilities such as servers and web service. It allows businesses and individuals to subcontract their computing needs as well as trust a network provider with its data warehousing and processing. The fact remains that cl...
The security architecture of 4G LTE standardized by Third Generation Partnership Project (3GPP) may deceive Mobile Network Operators (MNOs) into a sense that the network is completely free of threats and risks. 4G LTE has known security and privacy vulnerabilities in its specifications. The 3GPP deferred these threats and risks to the MNO. MNOs are...
Edge computing is currently evolving how information and data is being processed, stored and also delivered to millions of devices digitally connected to the cyber-space. The rise of Internet of Things we now have various devices actively communicating and also sharing, delivering information. Edge computing brings computation and data storage clos...
Cloud Computing is a groundbreaking technique which provides lots of facilities such as
storage, memory, CPU and facilities like serve and web service. It allows businesses and
individuals to subcontract their computing needs and trust a network provider with its
data warehousing and processing. The fact still remains that cloud computing is a
reso...
In the beginning, computers were merely standalone systems that could repeat basic computations in a fixed number of times. Later, computers were tailored to compute answers to problems. Algorithms understandable by computers were developed and the task of determining which worked better with respect to run-time and complexity was left to the compu...
Digital communications surveillance is a major security concern in the world at large. End-to-End (E2E) encryption in mobile communication applications delivers confidentiality between users, defending messages against snooping. Several widespread communication tools (WhatsApp, Signal, Telegram, iMessage) have implemented end-to-end encryption, as...
Automata Theory, a theoretical branch of computer science, helps "to understand how machines compute functions and solve problems. An automaton is any machine that uses a specific, repeatable process to convert information into different forms. Gamification is an example of an automaton. The goal of gamification is the implementation of game mechan...
In this paper we have focused a variety of Data mining techniques, approaches and applications areas which has been helpful in the important field of data mining Technologies. Organizations are operated from various geographical locations, and such operation may generate large volumes of data. The data is warehoused and used by corporate decision m...
Brute-force attack is unavoidable in any environment where weak passwords are used to secure sensitive information. In accessing resources via the Internet, the most common means of security is the user's identity and a secret passphrase known as a password. Various means have been researched and developed to mitigate or limit brute-force attack. T...
Mobile broadband utilizing Long-Term Evolution (LTE) has advanced the field of data transmission; with networks capable of providing broadband speeds to mobile broadband users. There has been a sporadic increase in the utilization of Long-Term Evolution (LTE) networks, but due to the rapid growth and utilization of network links and network service...
Communication Systems can be Wired or Wireless and the medium used for communication can be Guided or Unguided. In wired technology, communication or transmission of information is done via a medium (also called guided medium) such as co-axial cables, twisted pair cables and optical fiber links; which guides the propagation from one point to anothe...
Game theory is a mathematical model which deals with interactions between various entities by analyzing the strategies and choices. In today's world, Game Theory is being extensively used in fields like computer science, economics, sociology, political science, and so on, due to its versatile nature and applications in numerous conflicts and proble...
With an end goal to move the computing and networking industries from the present manual arrangement to automated solutions that are coordinated with the rest of the infrastructure, there have been a few developing technologies in the past couple of years, among them are cloud computing and network functions virtualization (NFV). "Comprehensively,...
Cyber-Physical Systems (CPS) will revolutionize how humans relate with the physical world around us. Many grand challenges await the economically vital domains of transportation, health-care, manufacturing, agriculture, energy, defence, aerospace and buildings. Exploration of these potentialities around space and time would create applications whic...
In telecommunications, Content Delivery Networks (CDN) main objective is to overcome the essential challenges of the Internet. The core principal at the foundation of this technology is the geographical distribution of contents from servers on the network edge closer to the customers, improving the customer's perceived performance while restricting...
The measure of computerized information being created and put away is expanding at a disturbing rate. This information is classified and handled to distil and convey data to clients crossing various businesses for example, finance, online networking, gaming and so forth. This class of workloads is alluded to as throughput computing applications. Mu...
The occurrence of earthquakes in oceanic trenches can pose a tsunami threat to lives and properties in active seismic zones. Therefore, the knowledge of focal depth, magnitude, and time distribution of earthquakes along the trenches is needed to investigate the future occurrence of earthquakes in the zones. The oceanic trenches studied, were locate...