Mohamed Hamdy Eldefrawy

ORCID: 0000-0001-6408-5152
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Authentication Protocols Security
  • User Authentication and Security Systems
  • Cryptographic Implementations and Security
  • Security in Wireless Sensor Networks
  • IoT and Edge/Fog Computing
  • Advanced Malware Detection Techniques
  • QR Code Applications and Technologies
  • Wireless Body Area Networks
  • RFID technology advancements
  • Smart Grid Security and Resilience
  • Cryptography and Data Security
  • Blockchain Technology Applications and Security
  • Vehicular Ad Hoc Networks (VANETs)
  • IoT Networks and Protocols
  • Chaos-based Image/Signal Encryption
  • Digital Media Forensic Detection
  • Digital Rights Management and Security
  • Network Security and Intrusion Detection
  • graph theory and CDMA systems
  • Mobile Ad Hoc Networks
  • Biometric Identification and Security
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • IPv6, Mobility, Handover, Networks, Security
  • Advanced Steganography and Watermarking Techniques
  • Energy Efficient Wireless Sensor Networks

Halmstad University
2019-2025

Mid Sweden University
2018

King Saud University
2010-2015

Alexandria University
2011

The accelerated move toward the adoption of Industrial Internet-of-Things (IIoT) paradigm has resulted in numerous shortcomings as far security is concerned. One IIoT affecting critical threats what termed false data injection (FDI) attack. FDI attacks aim to mislead industrial platforms by falsifying their sensor measurements. have successfully overcome classical threat detection approaches. In this article, we present a novel method attack using autoencoders (AEs). We exploit correlation...

10.1109/jiot.2020.2991693 article EN IEEE Internet of Things Journal 2020-05-01

The Internet of Things (IoT) is rapidly becoming an integral component the industrial market in areas such as automation and analytics, giving rise to what termed Industrial IoT (IIoT). IIoT promises innovative business models various domains by providing ubiquitous connectivity, efficient data analytics tools, better decision support systems for a competitiveness. However, deployments are vulnerable variety security threats at levels connectivity communications infrastructure. complex...

10.1109/access.2020.3016937 article EN cc-by IEEE Access 2020-01-01

Two-factor authentication (2FA) provides improved protection, since users are prompted to provide something they know and have. This method delivers a higher-level of assurance, which is essential for online banking security. Many systems have satisfied the2FA requirements by sending One Time Password (OTP), possessed, through an SMS the user's phone device. Unfortunately, international roaming costs delays put restrictions on this system reliability. paper presents novel two-factor scheme...

10.1109/itng.2011.64 article EN 2011-04-01

The deployment of the Internet Things (IoT) in industry, called Industrial IoT (IIoT), is supporting introduction very desirable improvements, such as increasing production flexibility, self-organization, and real-time quick response to events. However, security privacy challenges are still be well addressed. IIoT requires different properties achieve secure reliable systems these requirements create extra considering limited processing communication power available field devices. In this...

10.1109/jiot.2018.2865212 article EN IEEE Internet of Things Journal 2018-08-14

We see a shift from todays Internet-of-Things(IoT) to include more industrial equipment and metrology systems, forming the Industrial Internet of Things (IIoT). However, this leads many concerns related confidentiality, integrity, availability, privacy non-repudiation. Hence, there is need secure IIoT in order cater for future with smart grids, metering, factories, cities, manufacturing. It therefore important research technologies create chaos, especially when it comes securing...

10.1109/metroi4.2018.8428344 article EN 2018-04-01

Achieving key agreement in wireless sensor networks (WSN) is a very hard problem. Many schemes come with shortage of considering addition, revocation, and also rekeying. This paper proposes distribution protocol based on the public cryptography, RSA, DHECC. The proposed does not trust individual sensors, partially Gateway. Our establishes pair-wise keys between nodes according to specific routing algorithm after deployment, instead loading full into each node. So node doesn't have share all...

10.1109/icasid.2010.5551480 article EN International Conference on Anti-counterfeiting, Security, and Identification 2010-07-01

ABSTRACT Static password authentication has security drawbacks. In two‐factor (2FA,) each user carries a device, called token, to generate passwords that are valid only one time. 2FA based on one‐time (OTPs) provides improved protection because users prompted provide something they know (i.e., PIN) and have token). Many systems satisfied the requirements by sending an OTP through SMS user's phone device. Unfortunately, international roaming, costs, delays, put restrictions this system...

10.1002/sec.340 article EN Security and Communication Networks 2011-05-18

In document authentication, the context refers to ability trace origins of a given person, device that produced it, or time and/or place it was produced. Forgeries pose significant dangers in terms authentication and trust. Therefore, is essential maintain integrity important documents prevent content modification by an intruder. Here, we explain possibility adding two-dimensional (2D)barcode contains required information ensure verification, original confidentiality hardcopy formats. We...

10.1109/isbast.2012.16 article EN International Symposium on Biometrics and Security Technologies 2012-03-01

Secure broadcasting is an essential feature for critical operations in wireless sensor network (WSNs). However, due to the limited resources of networks, verifying authenticity broadcasted messages a very difficult issue. μTESLA broadcast authentication protocol, which uses network-wide loose time synchronization with one-way hashed keys provide verification. it suffers from several flaws considering delay tolerance, and chain length restriction. In this paper, we propose protocol provides...

10.3390/s100908683 article EN cc-by Sensors 2010-09-17

With the new, state-of-the-art printing devices and equipment, there has been rapid growth in counterfeiting of banknotes. Traditional security features on banknotes are easy targets for counterfeiters, they can easily imitate original with fake ones. Conventional methods validating currency require specialized authentication However, cost lack mobility sophisticated banknote validation big problems general consumers. Modern digital solutions attempting to complement traditional through...

10.1155/2015/264514 article EN Mathematical Problems in Engineering 2015-01-01

This paper has been retracted on 15 August 2011. A Retraction note is published in Sensors, 2011, 11, 7992

10.3390/s110605835 article EN cc-by Sensors 2011-05-31

Password-based authentication has been used extensively as a one of techniques. Wu et al. presented robust password technique, in which they can face guessing, stolen-verifier, replaying, and impersonation attacks. However, this paper, we are going to show that protocol is vulnerable theft attack consequentially construct modified scheme prevent the shortcomings recovery. Proposed technique maintains al's security features well remedies its weakness.

10.1109/cloudcom.2015.20 article EN 2015-11-01

Nowadays, instant messaging (IM) represents the most used service for both home and corporate users. IM is in many different application fields. Thus, it an effective easy means of network-based communication. Unfortunately, this technology does not provide built-in support security features. This paper proposes a new secure protocol centralized communication group. utilizes ElGamal cryptosystem, RSA algorithm, Chinese Remainder Theorem (CRT.) CRT takes responsibility renewing users' private...

10.1109/ntms.2011.5720590 article EN 2011-02-01

Internet of Things (IoT) technology has drawn the attention industry, where it been able to, and still can, solve many industrial intractable issues. However, emerging suffers from severe security shortcomings. Authentication is a cornerstone IoT security, as presents measures checking legitimacy communication entities. The Industrial (IIoT) special conditions, resulting lack resources shortage skills. As far we can tell, literature, IIoT user authentication not studied extensively. In 2017...

10.1109/wfcs.2019.8757984 article EN 2019-05-01

Recently, removable (external USB) mass storage devices are finding widespread utilization for transferring and backing up data. They even can be used as bootable devices. have brought us great convenience, yet, simultaneously, they very vulnerable to the extraction of private confidential data from computer systems. Some access authentication schemes been proposed media means ensuring security For most part, such use an Internet connection a main server trusted third party, which generally...

10.1109/itng.2014.13 article EN 2014-04-01

The boom of Internet Things (IoT) devices has brought along new security concerns which earlier were not thought of. This expanded the potential for digital forensic investigators to gather rich evidence from these sources. data on IoT is easily accessible due lack proper techniques investigate such devices. paper presents a sophisticated non-invasive method software activities running device can be inspected by observing electromagnetic radiation emitted during process. objective this...

10.1109/icirca48905.2020.9182814 article EN 2020 Second International Conference on Inventive Research in Computing Applications (ICIRCA) 2020-07-01

Due to cyber attacks targeting RFID systems, this paper briefly summarizes parts 3 and 4 of the ISO/IEC 14443 standard, which specify initialization, selection, trans-mission protocols in high-frequency smart-card reader communication. The communication has been modeled, two experiments have performed using a security protocol ana-lyzer tool called Scyther. verification results shows that implementing Random UID can prevent many attacks, such as eavesdropping replay successfully protect...

10.1109/coins57856.2023.10189283 article EN 2023-07-23
Coming Soon ...