Sohail Abbas

Sohail Abbas
  • PhD
  • Professor (Associate) at University of Sharjah

About

67
Publications
27,584
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,406
Citations
Introduction
Sohail Abbas currently works at the Department of Computer Science, University of Sharjah. Sohail does research in Computer Security and Reliability and Computer Communications (Networks).
Current institution
University of Sharjah
Current position
  • Professor (Associate)
Additional affiliations
January 2008 - September 2011
Liverpool John Moores University
Position
  • Researcher

Publications

Publications (67)
Article
Intelligent Transportation Systems (ITS) generate massive amounts of Big Data through both sensory and non-sensory platforms. The data support batch processing as well as stream processing, which are essential for reliable operations on the roads and connected vehicles in ITS. Despite the immense potential of Big Data intelligence in ITS, autonomou...
Article
Full-text available
This paper presents a systematic examination and experimental comparison of the prominent Federated Learning (FL) frameworks FedML, Flower, Substra, and OpenFL. The frameworks are evaluated experimentally by implementing Federated Learning over a varying number of clients, emphasizing a thorough analysis of scalability and key performance metrics....
Article
Full-text available
Rapid growth and technological improvement in wireless communication, driven by engineers from various disciplines, have reached significant milestones. Unmanned Aerial vehicles (UAVs) and flying ad hoc networks (FANET) have undergone one of the biggest innovations. UAVs have drawn a lot of attention from research institutions. They are increasingl...
Preprint
Full-text available
This paper presents a systematic examination and experimental comparison of the prominent Federated Learning (FL) frameworks FedML, Flower, Substra, and OpenFL. The frameworks are evaluated experimentally by implementing federated learning over a varying number of clients, emphasizing a thorough analysis of scalability and key performance metrics....
Article
The Consumer Internet of Things (CIoT), a key aspect of the IoT, aims to integrate smart technologies into everyday life. In order to improve the spectral efficiency and provide massive connectivity to IoT networks, non-orthogonal multiple access (NOMA) variants like semi-grant-free (SGF) NOMA are employed. This paper aims to maximize secrecy energ...
Article
In the Internet of Vehicles (IoV), privacypreservation is a major challenge due to the mobility of vehicles and their resource-constrained nature. The limited resources of on-board units (OBUs) and embedded sensors lure the adversaries to launch various types of attacks. Thus, lightweight but reliable authentication schemes need to be designed to c...
Article
Full-text available
The Internet of Things (IoT) paradigm and the advanced wireless technologies of 5G and beyond are expected to enable diverse applications such as autonomous driving, industrial automation, and smart cities. These applications bring together a vast and diverse IoT device population that occupy radio frequency spectrum. Such a large number of wireles...
Article
Full-text available
As cloud services expand, the need to improve the performance of data center infrastructure becomes more important. High-performance computing, advanced networking solutions, and resource optimization strategies can help data centers maintain the speed and efficiency necessary to provide high-quality cloud services. Running containerized applicatio...
Article
Full-text available
Blockchain technology in the healthcare industry has potential to enable enhanced privacy, increased security, and an interoperable data record. Blockchain technology is being implemented in dental care systems to store and share medical information, improve insurance claims, and provide innovative dental data ledgers. Because the healthcare sector...
Article
The security of a community is its topmost priority; hence, governments must take proper actions to reduce the crime rate. Consequently, the application of artificial intelligence (AI) in crime prediction is a significant and well-researched area. This study investigates AI strategies in crime prediction. We conduct a systematic literature review (...
Chapter
Virtualization, the process of allowing efficient utilization of physical computer hardware, is the core of many new technologies. With this comes the importance of understanding the related security aspects to avoid the compromise of underlying resources and services. In this paper, we provide an overview on the two main virtualization architectur...
Chapter
Recently, a variety of heavy applications emerged, such as augmented reality, virtual reality, online gaming and data analysis, which demand resources higher than the capabilities of the end devices and require high response. To provide feasible distributed computing scheme, fog computing networks are employed. However, fog nodes and edge devices h...
Article
Full-text available
A mobile ad hoc network (MANET) is a group of nodes constituting a network of mobile nodes without predefined and pre-established architecture where mobile nodes can communicate without any dedicated access points or base stations. In MANETs, a node may act as a host as well as a router. Nodes in the network can send and receive packets through int...
Article
Full-text available
Wireless Sensor Network (WSN) is considered to be one of the fundamental technologies employed in the Internet of things (IoT); hence, enabling diverse applications for carrying out real-time observations. Robot navigation in such networks was the main motivation for the introduction of the concept of landmarks. A robot can identify its own locatio...
Article
Full-text available
Internet of Vehicles (IoV) has emerged as an advancement over the traditional Vehicular Ad-hoc Networks (VANETs) towards achieving a more efficient intelligent transportation system that is capable of providing various intelligent services and supporting different applications for the drivers and passengers on roads. In order for the IoV and VANETs...
Article
Full-text available
Security is one of the primary concerns when designing wireless networks. Along detecting user identity, it is also important to detect the devices at the hardware level. The identity create-and-discard process at higher layers of the protocol stack alone is not sufficient to effectively counter security threats, such as masquerading and Sybil atta...
Chapter
Blockchain technology is evolving rapidly; it has proved to be capable of solving many of the issues encountered by industries such as banking, supply chain management, and healthcare. However, several challenges must be overcome for it to reach its full potential and be adopted on a large scale. In a blockchain context, interoperability is the abi...
Article
Full-text available
Automatic gunshot detection technology allows incidence response system to counteract the potential of crimes. However, the surveillance systems suffer from various detection problems , such as difficulty in differentiating gunshot, fire work and other similar sounds. To improves the accuracy and reduces processing time, we have proposed hybrid alg...
Article
Wireless Body Area Network (WBAN) is a wireless network of wearable sensing and computing devices connected through a wireless communication channel, thereby offering a plethora of enticing applications in the area of remote health monitoring, sports, and entertainment. However, WBANs nodes are highly resource-constrained; therefore, energy-efficie...
Article
Full-text available
The network capability to accomplish its functions in a timely fashion under failures and attacks is known as survivability. Ad hoc routing protocols have been studied and extended to various domains, such as Intelligent Transport Systems (ITSs), Unmanned Aerial Vehicles (UAVs), underwater acoustic networks, and Internet of Things (IoT) focusing on...
Article
Full-text available
Wireless Sensor Network (WSN) is one of the fundamental technologies used in the Internet of Things (IoT) which is deployed for diverse applications to carry out precise real-time observations. The limited resources of WSN with massive volume of fast-flowing IoT data make the aggregation and analytics of data more challenging. Recently, data mining...
Article
At the advent of advanced wireless technology and contemporary computing paradigms, Distributed Denial of Service (DDoS) attacks on Web-based services have not only increased exponentially in number, but also in the degree of sophistication; hence the need for detecting these attacks within the ocean of communication packets is extremely important....
Article
The technological evolution of the smart grids is going to take its shape in the form of a new paradigm called the Internet of Energy (IoE); which is considered to be the convergence of internet, communication, and energy. Like other evolved technologies, the IoE inherits security vulnerabilities from its constituents that need to be addressed. Int...
Article
Full-text available
The tremendous advancement in embedded systems, miniaturization, and wireless technology had allowed Wireless Body Area Networks (WBAN) to have overwhelming applications in e-healthcare, entertainment, sports/games training, etc. WBAN is a special type of wireless sensor network where bio-sensors are attached or embedded to a single human-body desi...
Article
Full-text available
Latest technologies of voice over IP (VoIP) and mobile messaging for smartphones messengers such as WhatsApp, Viber, Skype, etc., ooer free-of-charge facilities of worldwide SMS, MMS, and voice calls to their users, unlike the traditional and expensive cellular or telephone networks' services. Customers of the formerly mentioned messengers are esti...
Article
Mobile Ad Hoc Networks (MANETs) represent distributed and self-arranging wireless networks, which are set up by a collection of mobile nodes (MNs) capable of moving from one location to another location. These networks are widely identified by their unique characteristics such as lack of infrastructure, mobility and multi-hop communication. Unlike...
Chapter
Full-text available
The threat of cyber attacks continue to grow with the increasing number of sophisticated and successful targeted cyber attacks throughout the globe. To address this issue, there is a dire need for cybersecurity professionals with adequate motivation and skills to prevent, detect, respond, or even mitigate the effect of such threats. To this end, se...
Chapter
The Internet of Things paradigm is about to emerge in full scale but various security vulnerabilities are still to be addressed. One of these is the threat of Sybil attacks. A Sybil attacker creates and controls more than one identity on its physical device. These illegitimate identities of the Sybil attacker may be used for numerous malicious acti...
Conference Paper
Internet of Things (IoT) devices industry is rapidly growing, with an accelerated increase in the list of manufacturers offering a wide range of smart devices selected to enhance endusers’ standard of living. Security remains an after-thought in these devices resulting in vulnerabilities. While there exists a cryptographic protocol designed to solv...
Article
Full-text available
The Internet of Things (IoT) is an emerging paradigm branded by heterogeneous technologies composed of smart ubiquitous objects that are seamlessly connected to the Internet. These objects are deployed as Low power and Lossy Networks (LLN) to provide innovative services in various application domains such as smart cities, smart health, and smart co...
Article
Full-text available
Accurate and efficient image registration, based on interested common sub-regions is still a challenging task in medical image analysis. This paper presents an automatic features based approach for the rigid and deformable registration of medical images using interested common sub-regions. In the proposed approach, interested common sub-regions in...
Article
Full-text available
This paper is about the selection of a scheduling algorithm for a real-time system. In this paper, we compared different scheduling algorithms and from these comparisons, we get another algorithm which is good in performance as compared to the existing one. First, we compare ACO (Ant Colony Optimization) and EDF (Earliest Deadline First) but both h...
Article
Full-text available
Currently, the popularity of Internet-of-Vehicles technology and self-driving cars are increasing rapidly. Several companies are investing in this field and are competing to release the latest and safest autonomous cars. However, this rapid Internet-of-Vehicles development also creates many security problems, which are considered a significant thre...
Article
Full-text available
Due to lack of centralized identity management and the broadcast nature, wireless ad hoc networks are always a palatable target for masquerading attacks. The attackers can spoof identities of privileged legitimate users for various malicious reasons, such as to launch DoS or DDoS attacks, to access unauthorized information, and to evade the detecti...
Article
Full-text available
Wireless Sensor Network (WSN) is composed of few to several hundred nodes that coordinate to perform a specific action. Data is propagated in multihop fashion from sources to sink(s). Security is an important issue in WSNs, especially when they are used to protect or monitor critical situations. The WSNs require a unique identity per node in order...
Article
Full-text available
Due to the lack of centralized identity management and the broadcast nature of wireless ad hoc networks, identity attacks are always tempting. The attackers can create multiple illegitimate (arbitrary or spoofed) identities on their physical devices for various malicious reasons, such as to launch Denial of Service attacks and to evade detection an...
Article
Full-text available
Secure information sharing has become very popular in immigration, military applications, healthcare, education and foreign affairs for the past few years. The security and privacy of such type of information cannot easily be compromised because the secure communication utilizes both wireless and wired communication media for exchanging sensitive i...
Article
Mobile ad-hoc Networks (MANETs) represent self-organizing, infrastructure-less and dynamic networks that are made of mobile devices, which transmit information using wireless channels. Furthermore, each mobile node can act as a router to receive and forward data packets. Intermediate nodes are used to forward data packets if a destination node is o...
Conference Paper
Mobile Ad Hoc Networks (MANETs) are self-arranging, dynamic, infrastructure-less and multi-hop networks formed by a group(s) of mobile nodes (MNs), which transmit information via wireless channels. The broadcast nature of the wireless medium makes MANETs vulnerable to various types of attacks (e.g., masquerading attack, node replication attack, Syb...
Article
Full-text available
Lightweight authentication is one of the solutions proposed in order to reduce the time required for authentication during vertical handoff across heterogeneous networks. Reducing the handoff latency is considered to be a challenging issue. It arises when a user requires maintaining its service continuity while traveling across heterogeneous networ...
Conference Paper
Mobile ad hoc Networks (MANETs) are created by a collection of mobile nodes (MNs), which communicate and exchange information with each other via wireless links. These networks are widely known by their unique characteristics such as mobility, changing topology, multi-hop communication and lack of infrastructure. In the last few years, various rout...
Conference Paper
The interactions between Active Queue Management (AQM) algorithms and TCP have been extensively investigated in the last few years. However, majority of the studies are conducted without considering the consequences of different attacks on TCP flows. This research work aims to investigate the performance of TCP flows under Low-Rate Denial-of-Servic...
Article
Full-text available
Mobile ad-hoc network is a collection of mobile nodes that are connected wirelessly forming random topology through decentralized administration. In Mobile ad-hoc networks, multicasting is one of the important mechanisms which can increase network efficiency and reliability by sending multiple copies in a single transmission without using several u...
Article
A mobile ad hoc network (MANET) is a group of mobile wireless nodes without pre established infrastructure or central management with frequent changing topology. In the last few years, various routing protocols are targeted specially at MANET have been proposed however little data is available about the effect of various parameters on the performan...
Article
In multihop networks such as mobile ad hoc networks selfish or misbehaving nodes can degrade network performance. Reputation and trust-based schemes have been proposed in order to enforce cooperation and to discourage misbehaving nodes. These schemes detect and isolate selfish nodes and maintain network throughput by enabling nodes to construct pat...
Article
Full-text available
Fully self-organized mobile ad hoc networks (MANETs) represent complex distributed systems that may also be part of a huge complex system, such as a complex system-of-systems used for crisis management operations. Due to the complex nature of MANETs and its resource constraint nodes, there has always been a need to develop lightweight security solu...
Article
Full-text available
In the last decade, many security solutions have been proposed to fulfil the security requirements of wireless sensor networks (WSNs). However, these solutions are specifically designed for particular security issues, based on different assumptions, and limited to certain WSNs applications. Can these security solutions work together to handle multi...
Article
Full-text available
___ In multihop networks such as mobile ad hoc networks selfish or misbehaving nodes can degrade network performance. Reputation based models have been developed to enforce cooperation and to discourage node misbehaviour. These schemes detect and isolate selfish nodes and maintain network throughput by enabling nodes to construct paths that only in...
Conference Paper
Full-text available
___ In multihop networks such as mobile ad hoc networks selfish or misbehaving nodes can disrupt the whole network and severely degrade network performance. Reputation, credit and trust based schemes have been developed to enforce cooperation and discourage node misbehaviour. These models are vulnerable to two types of attack. First, a node having...
Conference Paper
Full-text available
In multihop networks such as mobile ad hoc networks (MANETs), a node can misbehave by selfishly dropping others' packets to save battery life. This selfishness or misbehaviour can disrupt the whole network functionality and can severely degrade network performance. Reputation based models have been developed to discourage node misbehaviour. However...
Article
Full-text available
Signal Strength based position verification is more promising as compared to other Sybil attack detection techniques because it is lightweight and does not require centralisation. Nodes can locally determine their locations through received signal strength variations and inform neighbours about location updates accordingly. In position verification...
Article
Full-text available
___ In multihop networks such as mobile ad hoc networks selfish or misbehaving nodes can disrupt the whole network and severely degrade network performance. Reputation, credit and trust based models have been developed to enforce cooperation and discourage node misbehaviour. These models are vulnerable to two types of attack. Whitewashing occurs wh...
Article
Full-text available
___ In multihop networks such as mobile ad hoc networks selfish or misbehaving nodes can disrupt the whole network and severely degrade network performance. Reputation, or trust based models are one of the most promising approaches to enforce cooperation and discourage node misbehaviour. Reputation is calculated through direct interactions with the...

Network

Cited By