Sherali Zeadally's research while affiliated with University of Kentucky and other places

Publications (528)

Article
In the study, we propose a double blockchain based vehicular system for optimizing data storage and securing communication in Internet of Vehicles (IoV) networks. We propose an incentive mechanism and a reputation system to reduce the selfish and distrustful behavior of IoV nodes. Moreover, we propose an encryption technique to protect the proposed...
Article
Recently, the Internet of things (IoT) paradigm has proliferated all aspect of life. The improvements IoT has made in business and industry has raised the possibility of extending its use to underwater environments, which also impacts human life. Consequently, Internet of Underwater Things (IoUT) research is intensifying. As in IoT, to deploy a suc...
Article
In the context of new emerging infectious diseases, it is more secure for old patients to be confined to their homes while still having medical assistance. Most existing facilities use Radio Frequency (RF) devices to monitor and measure vital signs of a patient and send them to appropriate medical services. But this technology can have bad side eff...
Conference Paper
Full-text available
Wearables today play a key role in E-Health computing , with investments expected to exceed $70 billion by 2024. With the massive use of apps on wearable devices, it is crucial to improve safety when using wearables, considering that important information about user information is stored on these devices. We present SOMEONE ensemble learning, a set...
Article
Conventional data collection methods that use Wireless Sensor Networks (WSNs) suffer from disadvantages such as deployment location limitation, geographical distance, as well as high construction and deployment costs of WSNs. Recently, various efforts have been promoting mobile crowd-sensing (such as a community with people using mobile devices) as...
Article
Full-text available
Unmanned Aerial Vehicles (UAVs) have seen a significant increase in their commercial application because of various technological breakthroughs. As UAVs are typically used in open environments for purposes such as military applications, surveillance, and delivery of commodities, they rely primarily on the visual signals recorded by the flying UAV....
Article
Full-text available
Cellular vehicle-to-everything (V2X) communication is emerging as a feasible and cost-effective solution to support applications such as vehicle platooning, blind spot detection, parking assistance, and traffic management. To support these features, an increasing number of sensors are being deployed along the road in the form of roadside objects. H...
Article
Excessive speed is the leading cause of accidents on highways. The use of fixed road-side surveillance systems has proven ineffective because people take caution around only those locations. With more advanced technologies and exceptional manoeuvring capabilities, Unmanned Aerial Vehicles (UAVs) is a promising candidate for real-time monitoring of...
Article
Full-text available
Over the last few years, the explosive growth of Internet of Things (IoT) has revolutionized the way we live and interact with each other as well as with various types of systems and devices which form part of the Information Communication Technology (ICT) infrastructure. IoT is having a significant impact on various application domains including h...
Preprint
Digital twins, being the virtual replicas of their physical counterparts, share the expected functional requirements and operational behavior of the underlying systems. Due to this fact, digital twins may act as a potential source of data breaches. Attackers may exploit the valuable knowledge about the system accessible through digital twins to put...
Preprint
Full-text available
There is an urgent need to control global warming caused by humans to achieve a sustainable future. $CO_2$ levels are rising steadily and while countries worldwide are actively moving toward the sustainability goals proposed during the Paris Agreement in 2015, we are still a long way to go from achieving a sustainable mode of global operation. The...
Article
Full-text available
There is an urgent need to control global warming caused by humans to achieve a sustainable future. CO 2 levels are rising steadily and while countries worldwide are actively moving toward the sustainability goals proposed during the Paris Agreement in 2015, we are still a long way to go from achieving a sustainable mode of global operation. The in...
Article
The advent of Blockchain and smart contracts is empowering many technologies and systems to automate commerce and facilitate the exchange, tracking and the provision of goods, data and services in a reliable and auditable way. Crowdsensing systems is one type of systems that have been receiving a lot of attention in the past few years. In crowdsens...
Article
Full-text available
The introduction of sensor technology in our daily lives has brought comfort, convenience, and improved health over the past few decades. Technological advances further expanded the use of medical sensors by reducing their size and costs. Medical sensors improve the intelligence and capabilities of healthcare services including, remote health monit...
Article
Full-text available
In the context of current smart cities, Cooperative Intelligent Transportation Systems (C-ITS) represent one of the main use case scenarios that aim to improve peoples’ daily lives. Thus, during the last few years, numerous standards have been adopted to regulate such networks. Within a C-ITS, a large number of messages are exchanged continuously i...
Article
Full-text available
Long Range Wide Area Network (LoRaWAN) emerges to connect devices that require long-range and low-cost (bandwidth and power) communication services. In this context, the adoption of this technology brings new challenges due to the densification of IoT devices, which causes signal interference and affects the QoS directly. On the other hand, the LoR...
Article
Software defined networks (SDNs) have dramatically simplified network management. However, enabling pure SDNs to respond in real-time while handling massive amounts of data still remains a challenging task. In contrast, fog computing has strong potential to serve large surges of data in real time. SDN control plane enables innovation, and greatly s...
Article
As the amount of data generated by scaled systems in Electronic Medical Records (EMRs) and the Industrial Internet of Things (IIoT) keeps increasing, third-party servers are essential for data storage and manipulation, and with them come privacy concerns. Encrypting the uploaded data strips the server’s ability to search over it for keywords: a hig...
Article
Wireless Sensor Network (WSN) plays a vital role in dealing with the challenging tasks of information management in Intelligent Transportation Systems (ITS). Current research has shown that the ever growing number of vehicles on the roads is making congestion worse, and many safety concerns are being addressed comprehensively by the WSN-based ITS....
Article
The path towards next-generation IoT is fundamentally characterized by artificial intelligence-based sensors. However, there are still some open issues, such as efficiency, accuracy, privacy, data trustworthiness, quality etc., that need to be addressed. Therefore, this special issue aims to solicit original papers to solve these issues. Finally, s...
Article
Full-text available
Over the years, software applications have captured a big market ranging from smart devices (smartphones, smart wearable devices) to enterprise resource management including Enterprise Resource Planning, office applications, and the entertainment industry (video games and graphics design applications). Protecting the copyright of software applicati...
Article
Full-text available
Software defined networks (SDNs) have dramatically simplified network management. However, enabling pure SDNs to respond in real-time while handling massive amounts of data still remains a challenging task. In contrast, fog computing has strong potential to serve large surges of data in real time. SDN control plane enables innovation, and greatly s...
Article
Trust is a critical characteristic of computer systems, but the traditional approach of evaluating systems has failed to deliver the required levels of confidence. We review the emerging zero trust paradigm and propose a new set of zero trust tenets and an enhanced zero trust model.
Article
Insecure cloud-native applications (CNAs) will continue to experience security compromises including data breaches due to their dynamic, complex, and varied threat landscape. We review current application security techniques, examine their benefits and shortcomings in the context of CNAs, and point out future research opportunities.
Article
Full-text available
Wearable sensing technologies are having a worldwide impact on the creation of novel business opportunities and application services that are benefiting the common citizen. By using these technologies, people have transformed the way they live, interact with each other and their surroundings, their daily routines, and how they monitor their health...
Article
Full-text available
Various Distributed Ledger Technologies (DLTs), such as Blockchain, have evolved significantly in recent years. These technologies provide a robust and effective solution for providing confidentiality, integrity, non-repudiation, authentication and transparency. While Blockchain has many advantages, it has various limitations as well, such as compl...
Article
Most IoT devices are battery powered and have limited power supplies. To ensure communication between two nodes, multi-hop transmissions over relays could be used. However, this communication cannot be achieved if the Signal-to-Noise Ratio (SNR) at the destination does not reach a reasonable threshold. Different relay selection approaches have been...
Article
Unmanned aerial vehicles (UAVs) are widely used in various applications such as surveillance, healthcare, rescue, and crowdsensing. However, the network management of these applications is quite challenging given the mobility of UAVs. In this scenario, network softwarization, which decouples the hardware from the network control functions, becomes...
Article
Advances in communications, smart transportation systems, and computer systems have recently opened up vast possibilities of intelligent solutions for traffic safety, convenience, and effectiveness. Artificial Intelligence (AI) is currently being used in various application domains because of its strong potential to help enhance conventional data-d...
Article
Full-text available
Medical health insurance fraud has been a major concern for the healthcare industry and governmental institutions. In the United States, the health insurance companies recorded a loss of tens of billions yearly due to healthcare fraud. Some types of fraud are at the risk of the patient’s health. This is because the system that performs the manual p...
Article
Full-text available
Fake check scam is one of the most common attacks used to commit fraud against consumers. This fraud is particularly costly for victims because they generally lose thousands of dollars as well as being exposed to judicial proceedings. Currently, there is no existing solution to authenticate checks and detect fake ones instantly. Instead, banks must...
Article
Over the years, the healthcare industry has transformed from being hospital-centric to patient-centric. This shift is mainly due to the convergence of emergent technologies such as Internet-of-Things (IoT)-based healthcare, Fifth-Generation (5G) assisted networking, and data-driven analytics through Artificial Intelligence (AI). The convergence, te...
Article
Full-text available
LoRaWAN is the most adopted communication technology for the Internet of Things (IoT) applications for enabling flexible, cost-effective long-range communication with low power consumption. The deployment of a wide range of IoT devices brings many benefits to many applications, but new challenges arise from the network point of view with this deplo...
Article
Today, there is a crucial need for precise monitoring and prediction of energy consumption at the building level using the latest technologies including Internet of Things (IoT) and data analytics to determine and enhance energy usage. Data-driven models could be used for energy consumption prediction. However, due to high non-linearity between the...
Article
Internet of Things (IoT)-enabled smart grids can achieve more reliable and high-frequency data collection and transmission compared with existing grids. However, this frequent data processing may consume a lot of bandwidth, and even put the user’s privacy at risk. Although many privacy-preserving data aggregation schemes have been proposed to solve...
Poster
Full-text available
CALL FOR PAPER: The workshop aims at bringing together scholars from academia and industry to discuss and present the latest research and findings on all the aspects of connectivity and interaction between moving objects/things. I encourage you to consider submitting a paper and joining us next year if this interests you.
Article
The COVID-19 pandemic has affected all parts of our daily lives, including the way we interact, work, educate, travel, conduct business, deliver healthcare services, and many other activities. COVID-19 has resulted in millions of deaths and severely impacted the economies of many nations worldwide. The significant global impact of the pandemic thro...
Article
The Internet of Things (IoT) comprises physical/virtual networked objects that collect and exchange data with each other via the public Internet. As this exchange often takes place over public networks, many security attacks in an IoT environment are possible. First, we briefly review the security issues in the IoT environment. Next, we focus on re...
Preprint
Full-text available
Software Defined Networks (SDNs) have dramatically simplified network management. However, enabling pure SDNs to respond in real-time while handling massive amounts of data still remains a challenging task. In contrast, fog computing has strong potential to serve large surges of data in real-time. SDN control plane enables innovation, and greatly s...
Article
Hash functions have always attracted a lot of attention in modern cryptography because of their hard to invert nature. However, all previous constructions of cryptographic primitives face the threat of being broken by the recent advancements in quantum technology. The focus has thus shifted to developing cryptographic primitives on mathematical str...
Article
A major objective of vehicular networking is to improve road safety and reduce traffic congestion. The experience of individual vehicles on traffic conditions and travel situations can be shared with other vehicles for improving their route planning and driving decisions. Nevertheless, the frequent occurrence of adversary vehicles in the network ma...
Article
Full-text available
Long-Range Wide-Area Network (LoRaWAN) enables flexible long-range service communications with low power consumption which is suitable for many IoT applications. The densification of LoRaWAN, which is needed to meet a wide range of IoT networking requirements, poses further challenges. For instance, the deployment of gateways and IoT devices are wi...
Article
The ever-growing trend of making the traditional power grids smarter than before has resulted in their gradual evolution to more sophisticated grids, referred to as Smart Grids (SGs) Cyber-Physical Systems with complex networking technologies. The integration of Information and Communication Technologies with power grids fosters seamless data shari...
Article
Intrabody Nanonetworks (IBN) are composed of nanosensors that have tremendous potential to enable cellular level monitoring and precision in drug delivery and diagnosis. Nanoscale communication using Electromagnetic (EM) waves propagation in the Terahertz (THz) band suffers from molecular absorption noise that has been regarded as the leading cause...
Article
Full-text available
Fog computing is a promising technology that can provide storage and computational services to future 6G networks. To support the massive Internet of Things (IoT) applications in 6G, fog computing will play a vital role. IoT devices and fog nodes have energy limitations and hence, energy-efficient techniques are needed for storage and computation s...
Article
Full-text available
The rapid growth of the Internet of Things (IoT) has accelerated strong interests in the development of low-power wireless sensors. Today, wireless sensors are integrated within IoT systems to gather information in a reliable and practical manner to monitor processes and control activities in areas such as transportation, energy, civil infrastructu...
Article
The emergence of the fifth generation network (5G) has stimulated strong interest from academia and industry in enabling technologies such as vehicular networks. Despite the benefits of 5G, including ultra-low latency, flexibility, increased bandwidth, and scalability, 5G security is still a topic of debate to figure out whether it can fully suppor...
Article
Full-text available
Intelligent Transportation Systems (ITS) help improve the ever‐increasing vehicular flow and traffic efficiency in urban traffic to reduce the number of accidents. The generation of massive amounts of data generated by all the digital devices connected to the transportation network enables the creation of datasets to perform an in‐depth analysis of...
Article
Cloud computing is a network model of on-demand access for sharing configurable computing resource pools. Compared with traditional services’ architectures, cloud computing introduces new security challenges in secure service management and control, privacy protection, data integrity protection in distributed databases, data backup, and synchroniza...
Article
Recent advances in networking and mobile technologies such as 5G, long-term evolution (LTE), LiFi, wireless broadband (WiBro), WiFi-Direct, Bluetooth Low Energy (BLE) have paved the way for intelligent and smart services. With an average of more than 6.5 devices per person, a plethora of applications are being developed especially related to health...
Article
The emergence of highly productive Cyber-Physical Manufacturing systems has motivated researchers to focus on minimizing communication overheads and saving computing resources. Traditional building virtual machine methods using the web-service and sensor techniques require a lot of system resources and incur high overheads, which make these techniq...
Article
Full-text available
Sensors play a vital role in our daily lives and are an essential component for Internet of Things (IoT) based systems as they enable the IoT to collect data to take smart and intelligent decisions. Recent advances in IoT systems, applications, and technologies, including industrial Cyber-Physical Systems (CPSs), are being supported by a wide range...
Article
Full-text available
Revocation management is one of the main tasks of the Public Key Infrastructure (PKI). It is also critical to the security of any PKI. As a result of the increase in the number and sizes of networks as well as the adoption of novel paradigms such as the Internet of Things and their usage of the web, current revocation mechanisms are vulnerable to s...
Article
Full-text available
Vehicular networks are an indispensable component of future autonomous and intelligent transport systems. Today, many vehicular networking applications are emerging, and therefore , efficient data computation, storage, and retrieval solutions are needed. Vehicular Edge Computing (VEC) is a promising technique that uses Road Side Units (RSUs) to act...
Article
Full-text available
Traffic accidents have become a major issue for researchers, academia, government and vehicle manufacturers over the last few years. Many accidents and emergency situations frequently occur on the road. Unfortunately, accidents lead to health injuries, destruction of some infrastructure, bad traffic flow, and more importantly these events cause dea...
Article
It is an irrefutable fact that the Internet of Things (IoT) will eventually change our daily lives because its applications and relevant technologies have been or will be penetrating our daily lives. Also, the IoT is aimed to connect all the things (e.g., devices and systems) together via the Internet, thus making it easy to collect the data of use...
Article
Full-text available
In the last few years, we have witnessed an explosive growth of fake content on the Internet which has significantly affected the veracity of information on many social platforms. Much of this disruption has been caused by the proliferation of advanced machine and deep learning methods. In turn, social platforms have been using the same technologic...
Article
Full-text available
Smart Healthcare is an integral part of Smart Cities. Modern medical devices are becoming increasingly software dependent. Doctors and patients are now using their smart-phones to control and monitor Implantable Medical Devices (IMDs) such as cardiac implants, insulin pumps, deep brain neurostimulators, etc. via the Internet or Bluetooth connection...
Article
Blockchain is a game-changer for many applications such as storage, consensus, authentication, and many others. Although blockchain’s contribution is undeniable, but it is not always the best solution. Professionals struggle to decide whether to adopt blockchain and when they do, they are faced with another challenge to choose the suitable type. De...
Article
Full-text available
The privacy of users and information are becoming increasingly important with the growth and pervasive use of mobile devices such as wearables, mobile phones, drones, and Internet of Things (IoT) devices. Today many of these mobile devices are equipped with cameras which enable users to take pictures and record videos anytime they need to do so. In...
Article
The two-party authenticated key agreement (2PAKA) protocol establishes a secure channel over the Internet between two users. This secure channel helps to transfer messages between them in the presence of an adversary. The invention of Shor’s algorithms makes current 2PAKA protocols vulnerable to quantum attacks. To mitigate quantum attacks, we desi...
Article
Full-text available
The vast areas of applications for IoTs in future smart cities, smart transportation systems, and so on represent a thriving surface for several security attacks with economic, environmental and societal impacts. This survey paper presents a review of the security challenges of emerging IoT networks and discusses some of the attacks and their count...
Article
Full-text available
The Internet of Things (IoT) applications have grown in exorbitant numbers, generating a large amount of data required for intelligent data processing. However, the varying IoT infrastructures (i.e., cloud, edge, fog) and the limitations of the IoT application layer protocols in transmitting/receiving messages become the barriers in creating intell...
Article
Full-text available
Smart grid systems are widely used across the world for providing demand response management between users and service providers. In most of the energy distributions scenarios, the traditional grid systems use the centralised architecture which results in large transmission losses and high overheads during power generation. Moreover , due to the pr...
Article
On-demand data sensing and Wireless Power Transfer (WPT) can provide sustainability and robust operations in large-scale industrial Internet of Things (IoT) networks. The efficiency of on-demand data collection and WPT can be increased by efficient scheduling of IoT nodes and dedicated energy transmitters respectively. We propose an energy-aware mo...
Article
Purpose The purpose of this paper is to design a sustainable development platform for water and energy peer-to-peer trading that is financially and economically feasible. Water and other resources are becoming scarcer every day, and developing countries are the neediest for an immediate intervention. Water, as a national need, is considered to be o...
Article
Internet of Vehicles have attracted a lot of attention in the automotive industry and academia recently. We are witnessing rapid advances in vehicular technologies which comprise many components such as On-Board Units (OBUs) and sensors. These sensors generate a large amount of data, which can be used to inform and facilitate decision making (for e...