Sherali Zeadally's research while affiliated with University of Kentucky and other places
What is this page?
This page lists the scientific contributions of an author, who either does not have a ResearchGate profile, or has not yet added these contributions to their profile.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
Publications (528)
In the study, we propose a double blockchain based vehicular system for optimizing data storage and securing communication in Internet of Vehicles (IoV) networks. We propose an incentive mechanism and a reputation system to reduce the selfish and distrustful behavior of IoV nodes. Moreover, we propose an encryption technique to protect the proposed...
Recently, the Internet of things (IoT) paradigm has proliferated all aspect of life. The improvements IoT has made in business and industry has raised the possibility of extending its use to underwater environments, which also impacts human life. Consequently, Internet of Underwater Things (IoUT) research is intensifying. As in IoT, to deploy a suc...
In the context of new emerging infectious diseases, it is more secure for old patients to be confined to their homes while still having medical assistance. Most existing facilities use Radio Frequency (RF) devices to monitor and measure vital signs of a patient and send them to appropriate medical services. But this technology can have bad side eff...
Wearables today play a key role in E-Health computing , with investments expected to exceed $70 billion by 2024. With the massive use of apps on wearable devices, it is crucial to improve safety when using wearables, considering that important information about user information is stored on these devices. We present SOMEONE ensemble learning, a set...
Conventional data collection methods that use Wireless Sensor Networks (WSNs) suffer from disadvantages such as deployment location limitation, geographical distance, as well as high construction and deployment costs of WSNs. Recently, various efforts have been promoting mobile crowd-sensing (such as a community with people using mobile devices) as...
Unmanned Aerial Vehicles (UAVs) have seen a significant increase in their commercial application because of various technological breakthroughs. As UAVs are typically used in open environments for purposes such as military applications, surveillance, and delivery of commodities, they rely primarily on the visual signals recorded by the flying UAV....
Cellular vehicle-to-everything (V2X) communication is emerging as a feasible and cost-effective solution to support applications such as vehicle platooning, blind spot detection, parking assistance, and traffic management. To support these features, an increasing number of sensors are being deployed along the road in the form of roadside objects. H...
Excessive speed is the leading cause of accidents on highways. The use of fixed road-side surveillance systems has proven ineffective because people take caution around only those locations. With more advanced technologies and exceptional manoeuvring capabilities, Unmanned Aerial Vehicles (UAVs) is a promising candidate for real-time monitoring of...
Over the last few years, the explosive growth of Internet of Things (IoT) has revolutionized the way we live and interact with each other as well as with various types of systems and devices which form part of the Information Communication Technology (ICT) infrastructure. IoT is having a significant impact on various application domains including h...
Digital twins, being the virtual replicas of their physical counterparts, share the expected functional requirements and operational behavior of the underlying systems. Due to this fact, digital twins may act as a potential source of data breaches. Attackers may exploit the valuable knowledge about the system accessible through digital twins to put...
There is an urgent need to control global warming caused by humans to achieve a sustainable future. $CO_2$ levels are rising steadily and while countries worldwide are actively moving toward the sustainability goals proposed during the Paris Agreement in 2015, we are still a long way to go from achieving a sustainable mode of global operation. The...
There is an urgent need to control global warming caused by humans to achieve a sustainable future. CO 2 levels are rising steadily and while countries worldwide are actively moving toward the sustainability goals proposed during the Paris Agreement in 2015, we are still a long way to go from achieving a sustainable mode of global operation. The in...
The advent of Blockchain and smart contracts is empowering many technologies and systems to automate commerce and facilitate the exchange, tracking and the provision of goods, data and services in a reliable and auditable way. Crowdsensing systems is one type of systems that have been receiving a lot of attention in the past few years. In crowdsens...
The introduction of sensor technology in our daily lives has brought comfort, convenience, and improved health over the past few decades. Technological advances further expanded the use of medical sensors by reducing their size and costs. Medical sensors improve the intelligence and capabilities of healthcare services including, remote health monit...
In the context of current smart cities, Cooperative Intelligent Transportation Systems (C-ITS) represent one of the main use case scenarios that aim to improve peoples’ daily lives. Thus, during the last few years, numerous standards have been adopted to regulate such networks. Within a C-ITS, a large number of messages are exchanged continuously i...
Long Range Wide Area Network (LoRaWAN) emerges to connect devices that require long-range and low-cost (bandwidth and power) communication services. In this context, the adoption of this technology brings new challenges due to the densification of IoT devices, which causes signal interference and affects the QoS directly. On the other hand, the LoR...
Software defined networks (SDNs) have dramatically simplified network
management. However, enabling pure SDNs to respond in real-time while handling
massive amounts of data still remains a challenging task. In contrast, fog
computing has strong potential to serve large surges of data in real time. SDN
control plane enables innovation, and greatly s...
As the amount of data generated by scaled systems in Electronic Medical Records (EMRs) and the Industrial Internet of Things (IIoT) keeps increasing, third-party servers are essential for data storage and manipulation, and with them come privacy concerns. Encrypting the uploaded data strips the server’s ability to search over it for keywords: a hig...
Wireless Sensor Network (WSN) plays a vital role in dealing with the challenging tasks of information management in Intelligent Transportation Systems (ITS). Current research has shown that the ever growing number of vehicles on the roads is making congestion worse, and many safety concerns are being addressed comprehensively by the WSN-based ITS....
The path towards next-generation IoT is fundamentally characterized by artificial intelligence-based sensors. However, there are still some open issues, such as efficiency, accuracy, privacy, data trustworthiness, quality etc., that need to be addressed. Therefore, this special issue aims to solicit original papers to solve these issues. Finally, s...
Over the years, software applications have captured a big market ranging from smart devices (smartphones, smart wearable devices) to enterprise resource management including Enterprise Resource Planning, office applications, and the entertainment industry (video games and graphics design applications). Protecting the copyright of software applicati...
Software defined networks (SDNs) have dramatically simplified network management. However, enabling pure SDNs to respond in real-time while handling massive amounts of data still remains a challenging task. In contrast, fog computing has strong potential to serve large surges of data in real time. SDN control plane enables innovation, and greatly s...
Trust is a critical characteristic of computer systems, but the traditional approach of evaluating systems has failed to deliver the required levels of confidence. We review the emerging zero trust paradigm and propose a new set of zero trust tenets and an enhanced zero trust model.
Insecure cloud-native applications (CNAs) will continue to experience security compromises including data breaches due to their dynamic, complex, and varied threat landscape. We review current application security techniques, examine their benefits and shortcomings in the context of CNAs, and point out future research opportunities.
Wearable sensing technologies are having a worldwide impact on the creation of novel business opportunities and application services that are benefiting the common citizen. By using these technologies, people have transformed the way they live, interact with each other and their surroundings, their daily routines, and how they monitor their health...
Various Distributed Ledger Technologies (DLTs), such as Blockchain, have evolved significantly in recent years. These technologies provide a robust and effective solution for providing confidentiality, integrity, non-repudiation, authentication and transparency. While Blockchain has many advantages, it has various limitations as well, such as compl...
Most IoT devices are battery powered and have limited power supplies. To ensure communication between two nodes, multi-hop transmissions over relays could be used. However, this communication cannot be achieved if the Signal-to-Noise Ratio (SNR) at the destination does not reach a reasonable threshold. Different relay selection approaches have been...
Unmanned aerial vehicles (UAVs) are widely used in various applications such as surveillance, healthcare, rescue, and crowdsensing. However, the network management of these applications is quite challenging given the mobility of UAVs. In this scenario, network softwarization, which decouples the hardware from the network control functions, becomes...
Advances in communications, smart transportation systems, and computer systems have recently opened up vast possibilities of intelligent solutions for traffic safety, convenience, and effectiveness. Artificial Intelligence (AI) is currently being used in various application domains because of its strong potential to help enhance conventional data-d...
Medical health insurance fraud has been a major concern for the healthcare industry and governmental institutions. In the United States, the health insurance companies recorded a loss of tens of billions yearly due to healthcare fraud. Some types of fraud are at the risk of the patient’s health. This is because the system that performs the manual p...
Fake check scam is one of the most common attacks used to commit fraud against consumers. This fraud is particularly costly for victims because they generally lose thousands of dollars as well as being exposed to judicial proceedings. Currently, there is no existing solution to authenticate checks and detect fake ones instantly. Instead, banks must...
Over the years, the healthcare industry has transformed from being hospital-centric to patient-centric. This shift is mainly due to the convergence of emergent technologies such as Internet-of-Things (IoT)-based healthcare, Fifth-Generation (5G) assisted networking, and data-driven analytics through Artificial Intelligence (AI). The convergence, te...
LoRaWAN is the most adopted communication technology for the Internet of Things (IoT) applications for enabling flexible, cost-effective long-range communication with low power consumption. The deployment of a wide range of IoT devices brings many benefits to many applications, but new challenges arise from the network point of view with this deplo...
Today, there is a crucial need for precise monitoring and prediction of energy consumption at the building level using the latest technologies including Internet of Things (IoT) and data analytics to determine and enhance energy usage. Data-driven models could be used for energy consumption prediction. However, due to high non-linearity between the...
Internet of Things (IoT)-enabled smart grids can achieve more reliable and high-frequency data collection and transmission compared with existing grids. However, this frequent data processing may consume a lot of bandwidth, and even put the user’s privacy at risk. Although many privacy-preserving data aggregation schemes have been proposed to solve...
CALL FOR PAPER:
The workshop aims at bringing together scholars from academia and industry to discuss and present the latest research and findings on all the aspects of connectivity and interaction between moving objects/things.
I encourage you to consider submitting a paper and joining us next year if this interests you.
The COVID-19 pandemic has affected all parts of our daily lives, including the way we interact, work, educate, travel, conduct business, deliver healthcare services, and many other activities. COVID-19 has resulted in millions of deaths and severely impacted the economies of many nations worldwide. The significant global impact of the pandemic thro...
The Internet of Things (IoT) comprises physical/virtual networked objects that collect and exchange data with each other via the public Internet. As this exchange often takes place over public networks, many security attacks in an IoT environment are possible. First, we briefly review the security issues in the IoT environment. Next, we focus on re...
Software Defined Networks (SDNs) have dramatically simplified network management. However, enabling pure SDNs to respond in real-time while handling massive amounts of data still remains a challenging task. In contrast, fog computing has strong potential to serve large surges of data in real-time. SDN control plane enables innovation, and greatly s...
Hash functions have always attracted a lot of attention in modern cryptography because of their hard to invert nature. However, all previous constructions of cryptographic primitives face the threat of being broken by the recent advancements in quantum technology. The focus has thus shifted to developing cryptographic primitives on mathematical str...
A major objective of vehicular networking is to improve road safety and reduce traffic congestion. The experience of individual vehicles on traffic conditions and travel situations can be shared with other vehicles for improving their route planning and driving decisions. Nevertheless, the frequent occurrence of adversary vehicles in the network ma...
Long-Range Wide-Area Network (LoRaWAN) enables flexible long-range service communications with low power consumption which is suitable for many IoT applications. The densification of LoRaWAN, which is needed to meet a wide range of IoT networking requirements, poses further challenges. For instance, the deployment of gateways and IoT devices are wi...
The ever-growing trend of making the traditional power grids smarter than before has resulted in their gradual evolution to more sophisticated grids, referred to as Smart Grids (SGs) Cyber-Physical Systems with complex networking technologies. The integration of Information and Communication Technologies with power grids fosters seamless data shari...
Intrabody Nanonetworks (IBN) are composed of nanosensors that have tremendous potential to enable cellular level monitoring and precision in drug delivery and diagnosis. Nanoscale communication using Electromagnetic (EM) waves propagation in the Terahertz (THz) band suffers from molecular absorption noise that has been regarded as the leading cause...
Fog computing is a promising technology that can provide storage and computational services to future 6G networks. To support the massive Internet of Things (IoT) applications in 6G, fog computing will play a vital role. IoT devices and fog nodes have energy limitations and hence, energy-efficient techniques are needed for storage and computation s...
The rapid growth of the Internet of Things (IoT) has accelerated strong interests in the development of low-power wireless sensors. Today, wireless sensors are integrated within IoT systems to gather information in a reliable and practical manner to monitor processes and control activities in areas such as transportation, energy, civil infrastructu...
The emergence of the fifth generation network (5G) has stimulated strong interest from academia and industry in enabling technologies such as vehicular networks. Despite the benefits of 5G, including ultra-low latency, flexibility, increased bandwidth, and scalability, 5G security is still a topic of debate to figure out whether it can fully suppor...
Intelligent Transportation Systems (ITS) help improve the ever‐increasing vehicular flow and traffic efficiency in urban traffic to reduce the number of accidents. The generation of massive amounts of data generated by all the digital devices connected to the transportation network enables the creation of datasets to perform an in‐depth analysis of...
Cloud computing is a network model of on-demand access for sharing configurable computing resource pools.
Compared with traditional services’ architectures, cloud computing introduces new security challenges in
secure service management and control, privacy protection, data integrity protection in distributed databases,
data backup, and synchroniza...
Recent advances in networking and mobile technologies such as 5G, long-term evolution (LTE), LiFi, wireless broadband (WiBro), WiFi-Direct, Bluetooth Low Energy (BLE) have paved the way for intelligent and smart services. With an average of more than 6.5 devices per person, a plethora of applications are being developed especially related to health...
The emergence of highly productive Cyber-Physical Manufacturing systems has motivated researchers to focus on minimizing communication overheads and saving computing resources. Traditional building virtual machine methods using the web-service and sensor techniques require a lot of system resources and incur high overheads, which make these techniq...
Sensors play a vital role in our daily lives and are an essential component for Internet of Things (IoT) based systems as they enable the IoT to collect data to take smart and intelligent decisions. Recent advances in IoT systems, applications, and technologies, including industrial Cyber-Physical Systems (CPSs), are being supported by a wide range...
Revocation management is one of the main tasks of the Public Key Infrastructure (PKI). It is also critical to the security of any PKI. As a result of the increase in the number and sizes of networks as well as the adoption of novel paradigms such as the Internet of Things and their usage of the web, current revocation mechanisms are vulnerable to s...
Vehicular networks are an indispensable component of future autonomous and intelligent transport systems. Today, many vehicular networking applications are emerging, and therefore , efficient data computation, storage, and retrieval solutions are needed. Vehicular Edge Computing (VEC) is a promising technique that uses Road Side Units (RSUs) to act...
Traffic accidents have become a major issue for researchers, academia, government and vehicle manufacturers over the last few years. Many accidents and emergency situations frequently occur on the road. Unfortunately, accidents lead to health injuries, destruction of some infrastructure, bad traffic flow, and more importantly these events cause dea...
It is an irrefutable fact that the Internet of Things (IoT) will eventually change our daily lives because its applications and relevant technologies have been or will be penetrating our daily lives. Also, the IoT is aimed to connect all the things (e.g., devices and systems) together via the Internet, thus making it easy to collect the data of use...
In the last few years, we have witnessed an explosive growth of fake content on the Internet which has significantly affected the veracity of information on many social platforms. Much of this disruption has been caused by the proliferation of advanced machine and deep learning methods. In turn, social platforms have been using the same technologic...
Smart Healthcare is an integral part of Smart Cities. Modern medical devices are becoming increasingly software dependent. Doctors and patients are now using their smart-phones to control and monitor Implantable Medical Devices (IMDs) such as cardiac implants, insulin pumps, deep brain neurostimulators, etc. via the Internet or Bluetooth connection...
Blockchain is a game-changer for many applications such as storage, consensus, authentication, and many others. Although blockchain’s contribution is undeniable, but it is not always the best solution. Professionals struggle to decide whether to adopt blockchain and when they do, they are faced with another challenge to choose the suitable type. De...
The privacy of users and information are becoming increasingly important with the growth and pervasive use of mobile devices such as wearables, mobile phones, drones, and Internet of Things (IoT) devices. Today many of these mobile devices are equipped with cameras which enable users to take pictures and record videos anytime they need to do so. In...
The two-party authenticated key agreement (2PAKA) protocol establishes a secure channel over the Internet between two users. This secure channel helps to transfer messages between them in the presence of an adversary. The invention of Shor’s algorithms makes current 2PAKA protocols vulnerable to quantum attacks. To mitigate quantum attacks, we desi...
The vast areas of applications for IoTs in future smart cities, smart transportation systems, and so on represent a thriving surface for several security attacks with economic, environmental and societal impacts. This survey paper presents a review of the security challenges of emerging IoT networks and discusses some of the attacks and their count...
The Internet of Things (IoT) applications have grown in exorbitant numbers, generating a large amount of data required for intelligent data processing. However, the varying IoT infrastructures (i.e., cloud, edge, fog) and the limitations of the IoT application layer protocols in transmitting/receiving messages become the barriers in creating intell...
Smart grid systems are widely used across the world for providing demand response management between users and service providers. In most of the energy distributions scenarios, the traditional grid systems use the centralised architecture which results in large transmission losses and high overheads during power generation. Moreover , due to the pr...
On-demand data sensing and Wireless Power Transfer (WPT) can provide sustainability and robust operations in large-scale industrial Internet of Things (IoT) networks. The efficiency of on-demand data collection and WPT can be increased by efficient scheduling of IoT nodes and dedicated energy transmitters respectively. We propose an energy-aware mo...
Purpose
The purpose of this paper is to design a sustainable development platform for water and energy peer-to-peer trading that is financially and economically feasible. Water and other resources are becoming scarcer every day, and developing countries are the neediest for an immediate intervention. Water, as a national need, is considered to be o...
Internet of Vehicles have attracted a lot of attention in the automotive industry and academia recently. We are witnessing rapid advances in vehicular technologies which comprise many components such as On-Board Units (OBUs) and sensors. These sensors generate a large amount of data, which can be used to inform and facilitate decision making (for e...