Adel R. Alharbi's research while affiliated with University of Tabuk and other places

Publications (35)

Article
The use of Internet of Things devices has lately increased significantly, leading to the management of a diverse set of nodes and a vast number of data. Most Internet of Things nodes have limited resources and are vulnerable to a variety of threats and failures. Therefore, numerous novel techniques have been conducted to secure resource-constrained...
Article
Full-text available
The decoding algorithm for the correction of errors of arbitrary Mannheim weight has discussed for Lattice constellations and codes from quadratic number fields. Following these lines, the decoding algorithms for the correction of errors of n = p−1 2 length cyclic codes (C) over quaternion integers of Quaternion Mannheim (QM) weight one up to two c...
Article
Full-text available
The new IoT apps will not be able to inspire people to utilize them and may ultimately lose all their potential if an interoperable and trustworthy ecosystem is not provided. IoT has its extra security difficulties such as information storage, administration, privacy concerns, and authentication. The presently deployed IoT apps have encountered var...
Article
Full-text available
Through the use of blockchain technology, sensitive information may be securely communicated without the need to replicate it, which can assist in decreasing medical record mistakes and saving time by eliminating the need to duplicate information. Furthermore, the information is timestamped, which further enhances the security of the data even furt...
Article
Full-text available
A radio communication sensor system is a collection of sensor modules that are connected to one another through wireless communication. It is common for them to be battery-powered and responsive to a nearby controller, referred to as the base station. They are capable of doing basic computations and transferring information to the base station in m...
Article
Full-text available
With the increasing volume of data transmission through insecure communication channels, big data security has become one of the important concerns in the cybersecurity domain. To address these concerns and keep data safe, a robust privacy-preserving cryptosystem is necessary. Such a solution relies on chaos encryption algorithms over standard cryp...
Article
Full-text available
Sustainable smart healthcare applications are those in which health services can be provided to remotely located patients through the Internet without placing extra burden on environmental resources. They should be operated with minimum power consumption using biodegradable, recyclable, and environmentally friendly healthcare equipment and products...
Article
Full-text available
This article presents an efficient crypto processor architecture for point multiplication acceleration of side-channel secured Binary Huff Curves (BHC) on FPGA (field-programmable gate array) over GF(2233). We have implemented six finite field polynomial multiplication architectures, i.e., (1) schoolbook, (2) hybrid Karatsuba, (3) 2-way-karatsuba,...
Article
Full-text available
The Human-Centered Internet of Things (HC-IoT) is fast becoming a hotbed of security and privacy concerns. Two users can establish a common session key through a trusted server over an open communication channel using a three-party authenticated key agreement. Most of the early authenticated key agreement systems relied on pairing, hashing, or modu...
Article
Full-text available
In the modern world, the security of the digital image is vital due to the frequent communication of digital products over the open network. Accelerated advancement of digital data exchange, the importance of information security in the transmission of data, and its storage has emerged. Multiple uses of the images in the security agencies and the i...
Article
Full-text available
The commercialization of the fifth-generation (5G) wireless network has begun. Massive devices are being integrated into 5G-enabled wireless sensor networks (5G WSNs) to deliver a variety of valuable services to network users. However, there are rising fears that 5G WSNs will expose sensitive user data to new security vulnerabilities. For secure en...
Article
Full-text available
In recent years, there has been a lot of research interest in analyzing chaotic constructions and their associated cryptographic structures. Compared with the essential combination of encryption and signature, the signcryption scheme has a more realistic solution for achieving message confidentiality and authentication simultaneously. However, the...
Article
Full-text available
In this article, we present an encryption technique that can encrypt any digital data. The proposed scheme basically depends on a substitution-permutation network. Two separate bijective maps are used in the proposed algorithm. Firstly, the substitution boxes are used to perform the substitution process. This technique uses elliptic curves (ECs) to...
Article
Full-text available
Transmission of multimedia data such as images, videos, and audio over the Internet is risky due to cyberattacks. To overcome the security issues, several encryption schemes are proposed over the last few decades which also possess few vulnerabilities such as time inefficiency and weak security. In this research, to provide the highest level of sec...
Article
Full-text available
This paper presents a Point Multiplication (PM) architecture of Elliptic-Curve Cryptography (ECC) over GF(2163) with a focus on the optimization of hardware resources and latency at the same time. The hardware resources are reduced with the use of a bit-serial (traditional schoolbook) multiplication method. Similarly, the latency is optimized with...
Article
Full-text available
This paper presents the employment of a DPA attack on the NIST (National Institute of Standards and Technology) standardized AES (advance encryption standard) protocol for key retrieval and prevention. Towards key retrieval, we applied the DPA attack on AES to obtain a 128-bit secret key by measuring the power traces of the computations involved in...
Article
Full-text available
Abstract The internet has become one of the main sources of news spread as it unleashed the information dissemination space, where the news websites express opinions on entities while also reporting on recent or unusual security risks. Recently, many research studies have focused on sentimental reflection on the views and impressions of people util...
Preprint
Full-text available
The place of public key cryptography (PKC) in guaranteeing the security of wireless networks under human-centered IoT environments cannot be overemphasized. PKC uses the idea of paired keys that are mathematically dependent but independent in practice. In PKC, each communicating party needs the public key and the authorized digital certificate of t...
Article
Full-text available
Signcryption schemes leveraging chaotic constructions have garnered significant research interest in recent years. These schemes have proffered practical solutions towards addressing the vast security vulnerabilities in Electronic Cash Systems (ECS). The schemes can seamlessly perform message confidentiality and authentication simultaneously. Still...
Article
Full-text available
The IoT sensor applications have grown in extreme numbers, generating a large amount of data, and it requires very effective data analysis procedures. However, the different IoT infrastructures and IoT sensor device layers possess protocol limitations in transmitting and receiving messages which generate obstacles in developing the smart IoT sensor...
Article
Full-text available
In terms of growth, effect, and capability, the 5G-enabled Internet of Things (IoT) is incredible. The volume of data distributed and processed by IoT (Internet of Things) systems that trust connectivity and coverage raises some security problems. As IoT technology is directly used in our daily lives, the threats of present cyberspace may grow more...
Article
Full-text available
The fifth-generation (5G) wireless network is commercialized. The need to integrate massive devices in 5G and wireless sensor networks (WSN) to provide several convenient services for network users becomes imperative. However, there are growing concerns that 5G-WSNs pose new security threats to sensitive user information. User authentication and ke...
Article
Full-text available
This work presents an Elliptic-curve Point Multiplication (ECP) architecture with a focus on low latency and low area for radio-frequency-identification (RFID) applications over GF(2163). To achieve low latency, we have reduced the clock cycles by using: (i) three-shift buffers in the datapath to load Elliptic-curve parameters as well as an initial...
Article
Full-text available
In a channel shared by several nodes, the scheduling algorithm is a key factor to avoiding collisions in the random access-based approach. Commonly, scheduling algorithms can be used to enhance network performance to meet certain requirements. Therefore, in this paper we propose a Delay-Aware Media Access Control (DAMAC) protocol for monitoring tim...
Article
Full-text available
Many encryption algorithms are designed to decrease the probability of cyberattacks by assuring data security as well as system and participant authentication. However, in the development of computer resources cryptanalytical techniques have been developed and performed competitively in information security with good results. In this paper, we repo...
Article
Full-text available
Auscultation, the listening process for lung sound using acoustic stethoscope, is the first physical examination used to detect any disorder in heartbeat system. Unlike sophisticated tools, stethoscope is not beyond the reach of rural hospitals and clinics. However, the use of acoustic stethoscope needs specialized and well-experienced physicians....
Conference Paper
Full-text available
The exposure to the electromagnetic fields is well known phenomenon. During the 20th century, environmental exposure to man-made electromagnetic fields has been gradually increasing as growing electricity demand. Every advance technology is posing the challenges in social behavior and created more artificial sources of exposure to the electromagnet...
Article
Full-text available
The problem of eliminating the inadequacy that arises during by using develop ontologies is solved by modifying the development model of fuzzy ontologies. We propose a modified model of the development of ontologies in time, as well as a formal model of intensive development, which makes it possible to efficiently solve the problems of analysis and...
Article
Full-text available
Recent studies have proposed different approaches to mitigate the risk of overload and failure in Software-Defined Networks (SDNs). Some of these approaches have proven effective but only in specific use cases, making it potentially difficult to generalize their application. Furthermore, network failure detection and recovery by the SDN control pla...
Article
Full-text available
Twitter is one of the most popular online social networks for spreading propaganda and words in the Arab region. Spammers are now creating rogue accounts to distribute adult content through Arabic tweets that Arabic norms and cultures prohibit. Arab governments are facing a huge challenge in the detection of these accounts. Researchers have extensi...
Conference Paper
Network configurations and policy updates are common operations carried out by the network operating system. However, the frequency of these network updates may lead to inconsistent network operations if not properly monitored. In this paper, we propose UpdateShim, a fast, efficient two-stage mechanism that collaboratively handles update processes...

Citations

... Wired communication is more protected and secured as compared to wireless communication, due to the fact that the broadcast nature of a wireless interface is open to everyone even for the client and also for an unauthorized person, whereas wired communication acts like peer-to-peer communication because only the concerned devices or users are connected to each other through wires [26]. That means that with the advancement of technology and living standards, we are becoming more and more exposed to hackers over the internet, and our data is not as secure as it used to be [27]. ...
... While such algorithms could be comprised of multiple components, an S-box is usually the sole non-linear component which enhances sensitive data security [74,75]. State-of-the-art symmetric ciphers usually employ S-boxes which introduce a high level of confusion for attackers [49,[76][77][78][79]. ...
... Some of them can be used for specific purposes. For instance, the scheme proposed in [47] is useful to encrypt the image properly that can resist several security attacks, but it is not suitable for low-profile or real-time applications. Therefore, using the encryption scheme proposed in [47] is not the right choice when anyone wants to encrypt the image faster. ...
... For PM computation, (1) an initial point P on the curve and (2) an integer k whose size is equal to the size of the field which is under consideration [22] are required. Then, the PM is performed by adding the k copies of point P, i.e., Q = k.P = P + P + P. A variety of PM algorithms are available as state-of-the-art. ...
... To address the flaws inherent in the traditional schemes, Zheng [11] proposed signcryption, which combines encryption and signature in a single stage. The scheme is built on the public key infrastructure (PKI) [2]. However, the procedure has certain drawbacks, such as certificate distribution, limited storage, and production issues. ...
... Moreover, clients observed the information using the web application on the internet from anywhere. When the information of the SN surpassed the specified range, a notification was sent to the clients insisting on the environmental setup being altered accordingly [24][25][26]. Energy is a critical issue in WSNs and the IoT, specifically when deployed in smart city applications and this was discussed briefly in [27][28][29][30]. ...
... In this system, a patient can connect using video calls with the physician that enhances the interaction between doctor and patients. The quality of the medical care and safety of the patients is the main challenge in the telemedicine system [36]. The crucial role of telecardiology in telemedicine was described. ...
... The various remote sensor devices available at present are increasingly diverse; the associated systems may also require that image data are transmitted in real-time. To address these issues, the wireless sensor network system proposed in this paper uses 5G communication for data transmission [1,2]. In Figure 1, the sensors of the system are placed at the far end. ...
... The latter offers equivalent security with shorter key lengths, which result in low hardware resource utilization, low power consumption and low bandwidth requirement. Due to these benefits, ECC is now an attractive choice for area-and power-constrained cryptographic applications such as radio frequency identification networks (RFID) [4,5], wireless sensor nodes (WSNs) [6], etc. Consequently, the ECC is standardized by many organizations, including the National Institute of Standards and Technology (NIST) [7]. ...
... Wang et al. [30] suggested an image encryption mathematical model based on neural network perceptron patterns. However, the lack of a link between the key and the plain picture raises the risk of differential attacks [31,32]. ...