Vincent O. Nyangaresi

Vincent O. Nyangaresi
University of Nairobi | UON · School of Computing and Informatics

Doctor of Philosophy
https://authors.elsevier.com/a/1fyJU_VTeu%7EJiu

About

105
Publications
111,994
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
628
Citations
Citations since 2016
91 Research Items
599 Citations
20162017201820192020202120220100200300400500
20162017201820192020202120220100200300400500
20162017201820192020202120220100200300400500
20162017201820192020202120220100200300400500
Introduction
An enthusiast of artificial intelligence deployments in communication networks and bio-informatics.
Additional affiliations
May 2015 - September 2020
Kisii University
Position
  • Lecturer
Education
February 2011 - June 2014
Jomo Kenyatta University of Agriculture and Technology
Field of study
  • Telecommunication Engineering

Publications

Publications (105)
Article
Full-text available
The advancement of systems with the capacity to compress audio signals and simultaneously secure is a highly attractive research subject. This is because of the need to enhance storage usage and speed up the transmission of data, as well as securing the transmission of sensitive signals over limited and insecure communication channels. Thus, many r...
Chapter
Full-text available
Internet of Things (IoT) security is a major concern owing to the sensitive data that flows in these networks. The fifth generation (5G) network provides high bandwidth, endearing it as an ideal underlying network for IoT communication. In addition, 5G can facilitate seamless integration of 2G, 3G, 4G, and WiFi to realize faster services,high capac...
Chapter
Full-text available
The beyond 5G networks (B5G) are characterized by high throughputs at extremely low latencies and better energy consumptions. This has seen them being deployed as the backbone of numerous Internet of Things (IoT) application domains such as smart homes, smart cities and in intelligent transport systems. Massive and private data flows in these ultra...
Chapter
Full-text available
Wireless healthcare networks facilitate real-time patient monitoring and permit timely intervention when required. In so doing, they reduce healthcare costs as well enhancing the quality of patient lives. However, sensitive and private patient data is exchanged over wireless public channels. As such, numerous attacks can be launched against the col...
Chapter
Full-text available
The fifth generation (5G) networks have been deployed in some countries to offer high data rate connectivity, ultra-low latencies and increased capacities. However, security, efficiency and privacy are major issues affecting these deployments. Although a myriad of intelligent target cell section protocols has been developed, their main focus is on...
Article
Full-text available
Web applications, which dominate the internet, act as communication media between customers and service providers. Web applications are an internet innovation that provide customer services such as e-banking, e-commerce and e-booking. Developing web applications has become increasingly complicated because of security threats and service issues that...
Article
The communication channel between the smart home devices and the remote users is susceptible to numerous privacy and security compromise attacks. To address these issues, many authentication protocols have been developed. However, majority of these security schemes have vulnerabilities that may still be exploited to wreck havoc in smart homes. For...
Article
Full-text available
Data security can involve embedding hidden images, text, audio, or video files within other media to prevent hackers from stealing encrypted data. Existing mechanisms suffer from a high risk of security breaches or large computational costs, however. The method proposed in this work incorporates low-complexity encryption and steganography mechanism...
Chapter
Full-text available
The traditional power grid systems are being replaced with smart grids so as to offer the required levels of flexibility, reliability, efficiency and dynamic power adjustments. However, security and privacy challenges are serious issues in smart grid environment due to a myriad of heterogeneous appliances that interconnect with the grid system. Con...
Article
Full-text available
Deep learning models on the same database have varied accuracy ratings; as such, additional parameters, such as pre-processing, data augmentation and transfer learning, can influence the models' capacity to obtain higher accuracy. In this paper, a fully automated model is designed using deep learning algorithm to capture images from patients and pr...
Chapter
Full-text available
Wearable devices are pervasive computing devices that have been heavily deployed in wireless body area networks for remote patient monitoring. These networks convey sensitive and private data items that are exchanged between the sensors and medical servers over public channels. Some of the transmitted data include heart rate, blood oxygen, body tem...
Article
Full-text available
Wireless networks have continued to evolve to offer connectivity between users and smart devices such as drones and wireless sensor nodes. In this environment, insecure public channels are deployed to link the users to their remote smart devices. Some of the application areas of these smart devices include military surveillance and healthcare monit...
Chapter
Full-text available
Unmanned aerial vehicles have been deployed for surveillance in highly sensitive domains such as in the military. As such, the data exchanged between the operators and these aerial vehicles must be protected as any malicious access may lead to leakages and adversarial control of the drones. To achieve this, many schemes have been developed based on...
Article
Full-text available
Driven by the requirements for entirely low communication latencies, high bandwidths, reliability and capacities, the Fifth Generation (5G) networks has been deployed in a number of countries. One of the most prevalent application scenarios of 5G networks is the Internet of Things (IoT) that can potentially boost convenience and energy savings. How...
Article
Full-text available
High volumes of private and sensitive data are transmitted in intelligent Internet of Things (IoT) e-health systems environment. As such, proper protection should be accorded to these networks owing to the devastating effects of any successful compromise. Consequently, numerous security protocols have been presented over the recent past. Unfortunat...
Article
Full-text available
Wireless body area networks and medical servers exchange sensitive and private patient data that should be protected from malicious entities. To achieve this, numerous security solutions have been presented in literature. However, some of these security protocols have many security vulnerabilities that expose the wireless body area networks to atta...
Article
Full-text available
The many devices connected in smart homes increase the attack surfaces from which adversaries can invade the network. In addition, majority of these smart devices have numerous vulnerabilities that can be exploited to wreck havoc in smart homes. As such, a myriad of security schemes have been presented based on technologies such as bilinear pairing...
Article
Full-text available
The deployment of many base stations within a small network coverage area can potentially increase network capacities. However, this implies frequent handoffs as the users move within the small tracking areas. An effective handoff strategy is therefore required to boost quality of service and quality of experience during the handoff process. Unfort...
Article
Full-text available
The study clarified spatial single mode laser interaction with measured pulse based parabolic index multimode fiber. Peak power level margin, maximum/minimum signal amplitude margin after parabolic index multimode fiber are measured with core radius of 25 µm, cladding thickness of 10 µm, refractive index peak of 1.4142, length of 300 m, and refract...
Preprint
Citation: Alsamhi, S.H.; Shvetsov, A.V.; Kumar, S.; Shvetsova, S.V.; Alhartomi, M.; Hawbani, A.; Rajput, N. S.; Srivastava, S.; Saif, A.; Nyangaresi, V.O. UAV Computing-Assisted Search and Rescue Mission Framework for Disaster and Harsh Environment Mitigation. Drones 2021, 1, 0. https://doi.org/
Conference Paper
Full-text available
Although many smart grid authentication protocols have been presented in literature, majority of them remain susceptible to numerous attacks. In addition, some of these protocols are based on computationally intensive cryptographic primitives, which render them inefficient. To address some of these challenges, a protocol based on masked symmetric k...
Conference Paper
Full-text available
Critical patient data collected by body sensor units and transmitted over public wireless communication channels is exposed to numerous privacy and security attacks. As such, there is need for deployment of robust security solutions to uphold integrity, confidentiality and availability. In addition, the resource constrained nature of sensor nodes r...
Conference Paper
Full-text available
Massive private and sensitive data flows between body sensor units and hospital medical servers in wireless body area networks. Any successful compromise of the transmitted data can have devastating effects, such as malicious automatic injection of drugs into the bloodstream. As such, it is important that strong security and privacy protection be a...
Chapter
Full-text available
Device to device (D2D) communication offers numerous benefits such as low latencies, high throughputs, spectral efficiency boosting, and base station energy reduction. However, lack of encryption and authentication during device discovery, link setup, and data transmission exposes the transmitted data to numerous security and privacy threats. To co...
Article
Full-text available
The aim and scope of the paper is to simulate the signal propagation parameters estimation through designed multi-layer fibre with higher dominant modes by using OptiFibre simulation software. The multi-layer fibre profile has a length of 1000 m is designed and clarified with six layers. RI difference profile variations are clarified with radial di...
Article
Full-text available
The Fifth Generation (5G) networks deploy base station ultra- densification to boost data rates, capacities, reliability, energy efficiency as well as the reduction of communication latencies. To increase quality of service as well as quality of experience, a large number of Internet of Things (IoT) communications are relayed over 5G networks. For...
Article
Base station ultra-densification in 5G networks offer high bandwidths, data rates and extremely low delay budgets in line with the ITU specifications. However, high mobility among subscribers imply frequent crossing of cell boundaries. For increased security protection, these handoffs must be authenticated. Although many AKA protocols have been des...
Article
Security issues in B5G networks center around de-synchronization that may be be deployed a vector to launch further attacks in the core network. Although many schemes have been put forward for security improvement in these networks, eradicating timing attacks has been a major problem. Another significant issue is the long delay budget of most of th...
Article
The beyond 5G (B5G) networks deploy base station ultra-densification in mmWave communication. Due to the utilization of very high frequency signals, attenuation is a big problem that requires urgent attention. In addition, the extremely small tracking area footprint of the base stations necessitate frequent handoffs especially for high mobility use...
Article
Device to device (D2) communication can potentially address single point of failure problems in typical centralized communication architectures. In this communication environment, the devices exchange packets directly with one another, and hence servers may not be a bottleneck during peak hours. However, the processing capacity limitations of these...
Conference Paper
Full-text available
Security and privacy issues in 5G networks center around traceability, de-synchronization, impersonation, man-in-the-middle, linkability, message replays among others. Although 5G authentication and key agreement (5G-AKA), Extensible Authentication Protocol AKA (EAP-AKA) and EAP Transport Layer Security (EAP-TLS) have been introduced to boost secur...
Conference Paper
Full-text available
Smart grid networks require sufficient protection so as to safeguard the sensitive data that is exchanged among the smart meter, gateway node, data aggregators and utility service providers. To this end, numerous schemes have been presented based on a myriad of techniques such as public key cryptography, bilinear pairing operations, device identiti...
Article
Full-text available
The information exchanged over the smart grid networks is sensitive and private. As such, proper mechanisms must be put in place to protect these messages from security and privacy violations. Although many schemes have been presented in literature to address these challenges, a number of them rarely consider concurrent authentication of smart mete...
Article
Full-text available
The fifth generation (5G) networks are characterized with ultra-dense deployment of base stations with limited footprint. Consequently, user equipment’s handover frequently as they move within 5G networks. In addition, 5G requirements of ultra-low latencies imply that handovers should be executed swiftly to minimize service disruptions. To preserve...
Chapter
Full-text available
The security and privacy protection of smart grid data exchanged over the open and public wireless communication channels is critical yet challenging in this environment. Conventionally, public key cryptography, group signatures, blind signatures, identity based schemes and elliptic curve cryptography could provide the much needed security and priv...
Poster
Full-text available
Contribution to the 7th International Congress on Information and Communication Technology Date : February 21- 24 2022 Conference Venue : London, United Kingdom
Conference Paper
Full-text available
Wireless sensor networks (WSNs) find applications in critical domains where they are deployed to collect mission critical data. The transmission of this private and sensitive data over untrusted communication channels exposes it to several security and privacy attacks. To curb these threats, security schemes have been presented that employ machine...
Article
Full-text available
The World Wide Web is experiencing a daily increase in data transmission because of developments in multimedia technologies. Consequently, each user should prioritize preventing illegal access of this data by encrypting it before moving it over the Internet. Numerous color image encryption schemes have been developed to protect data security and pr...
Article
Full-text available
Data security pressing issue, particularly in terms of ensuring secure and reliable data transfer over a network. Encryption and seganography play a fundamental role in the task of securing data exchanging. In this article, both steganography and cryptography were combined to produce a powerful hybrid securing stego-system. Firstly, a text message...
Article
Full-text available
Machine learning algorithms have been deployed in numerous optimization, prediction and classification problems. This has endeared them for application in fields such as computer networks and medical diagnosis. Although these machine learning algorithms achieve convincing results in these fields, they face numerous challenges when deployed on imbal...
Article
Full-text available
Machine learning algorithms have been deployed in numerous optimization, prediction and classification problems. This has endeared them for application in fields such as computer networks and medical diagnosis. Although these machine learning algorithms achieve convincing results in these fields, they face numerous challenges when deployed on imbal...
Article
Full-text available
Effective role of optical duobinary transmitter with optical coherent quadrature amplitude modulation (QAM) receiver based on light amplifiers measured is stimulated by using optisystem simulation software version 13. Signal, noise power levels are stimulated after long haul fiber optic range up to 350 km distance. Measured light amplifiers, optica...
Chapter
Full-text available
Smart grid networks offer two-way communication between the smart meters and the utility service providers (USPs). This enables the USPs to analyze real-time data emanating from the consumers and offer dynamic adjustments to the power generation and transmission. However, the periodical transmission of consumption reports from the smart meters towa...
Article
Full-text available
Wireless sensor networks (WSNs) are crucial components of internet of things (IoT) and have been deployed in fields such as battlefield surveillance, intrusion detection, environmental monitoring and healthcare. The exploitation of broadcasts in WSNs renders these networks less reliable, failure-prone and susceptible to attacks such as on-off attac...
Chapter
Full-text available
To ensure secure access to the data held in internet of things, many lightweight authentication schemes have been developed using approaches such as symmetric cryptography or hashing operations. Although these schemes achieve forward key secrecy and user anonymity, de-synchronization is a major problem in these protocols. As such, many other scheme...
Article
Full-text available
Abstract: Applications for document similarity detection are widespread in diverse communities, including institutions and corporations. However, currently available detection systems fail to take into account the private nature of material or documents that have been outsourced to remote servers. None of the existing solutions can be described as...
Article
Full-text available
Unmanned Aerial Vehicles (UAVs) convey secret data that belongs to the military, individual or organizations. As such, privacy and security protection of this data is critical. To accomplish this, many protocols have been presented based on techniques such as dynamic keys, Rivest-Shamir-Adleman (RSA), Elliptic Curve Cryptography (ECC), public key c...
Conference Paper
Full-text available
The Fifth Generation (5G) networks support various service delivery models such as Device to Device (D2D) communication, Unmanned Aerial Vehicles (UAVs) and Vehicular Ad Hoc Networks (VANETS) among others. In these networks, massive personal and private data items are being exchanged among numerous heterogeneous devices. As such, security and priva...
Conference Paper
Full-text available
The 5G mmWave networks support massive number of devices and offer salient features such as very low communication latencies and signal stability. This has seen these networks being deployed to support service delivery models such as device to device communication (D2D) and internet of things (IoT). Owing to the broadcast nature of the communicatio...
Conference Paper
Full-text available
Smart home networks convey sensitive user private data that requires adequate protection. However, lack of standard security and privacy architectures for smart meters or failure of smart device manufacturers to incorporate security in their designs endear smart home networks as launching pads for attacks such as denial of service. To curb this, te...
Chapter
Full-text available
The packet exchanges over open communication channels expose ad hoc networks data to numerous security and privacy attacks. To address this issue, many schemes have been developed based on public key infrastructure, tamper proof devices, bilinear pairings or trusted authorities. However, these techniques still have a number of security and privacy...
Article
The fifth generation (5G) and beyond 5G (B5G) networks offer ultra-low latencies, higher reliability, scalability, data rates and capacities to support applications such as vehicular communications, internet of everything (IoE) and device to device (D2D) communication. In spite of these excellent features, user privacy, resource management and hand...
Conference Paper
Full-text available
the fifth generation (5G) networks exhibit high data rates and capacities that endear them to applications such as internet of things (IoT) and mobile banking. Due to sensitivity of data exchanged in these applications, security and privacy preservation schemes are essential for their deployments. The Third Generation Partnership Project (3GPP) has...
Conference Paper
Full-text available
sensitive and private information flows over smart home networks and it is therefore paramount that proper authentication be accomplished among the communicating entities. To achieve this, schemes based on techniques such as elliptic curve cryptography, public key cryptosystem, digital certificates, blockchains and bilinear pairing operations have...
Article
Full-text available
Wireless sensor networks convey mission critical data that calls for adequate privacy and security protection. To accomplish this objective, numerous intrusion detection schemes based on machine learning approaches have been developed. In addition, authentication and key agreements techniques have been developed using techniques such as elliptic cu...
Conference Paper
Full-text available
Smart homes security has attracted a lot of attention from both the industry and academia, leading to the development of numerous schemes for both key management and authentication. However, most of these schemes are either inefficient due to both high communication and computational costs, or do not fully offer the required levels of both privacy...
Conference Paper
The transmission of consumer energy consumption reports from smart meters to the power management centers over insecure public communication channels exposes this data to numerous privacy and security attacks. This has seen the development of many authentications and key agreement (AKA) protocols to offer protection to the transmitted data. However...
Conference Paper
Full-text available
The transmission of consumer energy consumption reports from smart meters to the power management centers over insecure public communication channels exposes this data to numerous privacy and security attacks. This has seen the development of many authentications and key agreement (AKA) protocols to offer protection to the transmitted data. However...
Conference Paper
Full-text available
Multiple Input Multiple Output (MIMO) technology is widely implemented in a 5G telecommunications networks to enhance the overall network performance. Outage probability (Pout) of a MIMO system with L-branch selection combining (SC) receiver is analysed in this paper. SC receiver is used to reduce the effects of multipath fading to the system outag...
Conference Paper
Full-text available
the internet of drones (IoD) sensors collect sensitive and private data that can have adverse consequences if captured by adversaries. To address this issue, many authentication and key agreement protocols have been introduced in literature. However, most of these schemes fail to protect the exchanged data against most common IoD attack models or e...
Conference Paper
Full-text available
the transmission of smart grid data over public networks exposes it to numerous privacy and security violations. To curb these threats, a number of authentication protocols have been developed. However, majority of them are sophisticated and still susceptible to privacy as well as security attacks. In addition, some of them have performance issues...
Conference Paper
The MQV is an authenticated key agreement protocol which does not use any one-way hash functions in its block design, and it is standardized in (IEEE, ANSI, and ISO). However, its two-pass form cannot withstand an unknown key share attack. Krawczyk proposed a hashed version of MQV (HMQV) to overcome the attack on MQV, but HMQV is vulnerable to smal...
Conference Paper
Full-text available
smart grids networks carry critical and private data that may be employed by adversaries in learning about services running at home or its occupancy. It is therefore vital that robust protection be accorded to these complex infrastructures to thwart cyber-physical attacks. Although numerous cryptographic protocols have been developed for smart grid...
Conference Paper
Full-text available
Security issues in drone communication include man-inthe- middle attacks, packet replays and forgery. On the other hand, privacy issues include location tracing and lack of user anonymity. Consequently, drone communication security and privacy is critical and as such, numerous schemes have been proposed to address these issues. However, most of the...
Chapter
The initial signaling and data exchanges over open wireless transmission channels in vehicular ad hoc networks (VANETs) renders these networks susceptible to security and privacy violation attacks such as impersonation and packet replays. To curb this, a number of protocols have been proposed such as Public Key Infrastructure (PKI) based schemes, i...
Conference Paper
Full-text available
The initial signaling and data exchanges over open wireless transmission channels in vehicular ad hoc networks (VANETs) renders these networks susceptible to security and privacy violation attacks such as impersonation and packet replays. To curb this, a number of protocols have been proposed such as Public Key Infrastructure (PKI) based schemes, i...
Chapter
Full-text available
Technical network challenges in 5G relates to handover authentication, user privacy protection and resource management. Due to interoperability requirements among the heterogeneous networks (Hetnets), the security requirements for 5G are high compared to 2G, 3G and 4G. The current 5G handover protocols are based on either fuzzy logic (FL), artifici...
Conference Paper
Blockchain technology has attracted the attention of the public owing to its numerous strengths such as security, faster transactions, reduced costs, anonymity and data integrity. The success of Bitcoin has led to the adoption of this blockchain technology in many areas such as financial market, IOT, supply chain, voting, medical treatment and stor...
Conference Paper
Full-text available
The fifth generation (5G) networks exhibit extremely low latency, extremely high bandwidth, and high density connections that are salient features for the support of vehicle to everything (V2X) services. Although a lot of research efforts have been directed towards addressing 5G technical issues for the support of V2X communications, these research...
Article
Technical network challenges in 5G relates to handover authentication, user privacy protection and resource management. Due to interoperability requirements among the heterogenous networks (Hetnets), the security requirements for 5G are high compared to 2G, 3G and 4G. The current 5G handover protocols are based on either fuzzy logic (FL), artificia...
Conference Paper
Full-text available
Smart grids improve the management of various power network components as well as the monitoring of power flows. Their deployments require very fast communication channels, which can be facilitated by 5G networks. However, 5G’s ultra-densification boost system capacity and spectrum efficiency but introduce vulnerabilities due to the incorporation o...
Article
Full-text available
Accurate mobility prediction enables efficient and faster paging services in these networks. This in turn facilitates the attainment of higher bandwidths and execution of activities such as handovers at low latencies. The conventional mobility prediction models operate on unrealistic assumptions that make them unsuitable for cellular network mobile...