- Advanced Authentication Protocols Security
- User Authentication and Security Systems
- Cryptographic Implementations and Security
- Security in Wireless Sensor Networks
- IoT and Edge/Fog Computing
- Advanced Malware Detection Techniques
- QR Code Applications and Technologies
- Wireless Body Area Networks
- RFID technology advancements
- Smart Grid Security and Resilience
- Cryptography and Data Security
- Blockchain Technology Applications and Security
- Vehicular Ad Hoc Networks (VANETs)
- IoT Networks and Protocols
- Chaos-based Image/Signal Encryption
- Digital Media Forensic Detection
- Digital Rights Management and Security
- Network Security and Intrusion Detection
- graph theory and CDMA systems
- Mobile Ad Hoc Networks
- Biometric Identification and Security
- Physical Unclonable Functions (PUFs) and Hardware Security
- IPv6, Mobility, Handover, Networks, Security
- Advanced Steganography and Watermarking Techniques
- Energy Efficient Wireless Sensor Networks
Halmstad University
2019-2025
Mid Sweden University
2018
King Saud University
2010-2015
Alexandria University
2011
The accelerated move toward the adoption of Industrial Internet-of-Things (IIoT) paradigm has resulted in numerous shortcomings as far security is concerned. One IIoT affecting critical threats what termed false data injection (FDI) attack. FDI attacks aim to mislead industrial platforms by falsifying their sensor measurements. have successfully overcome classical threat detection approaches. In this article, we present a novel method attack using autoencoders (AEs). We exploit correlation...
The Internet of Things (IoT) is rapidly becoming an integral component the industrial market in areas such as automation and analytics, giving rise to what termed Industrial IoT (IIoT). IIoT promises innovative business models various domains by providing ubiquitous connectivity, efficient data analytics tools, better decision support systems for a competitiveness. However, deployments are vulnerable variety security threats at levels connectivity communications infrastructure. complex...
Two-factor authentication (2FA) provides improved protection, since users are prompted to provide something they know and have. This method delivers a higher-level of assurance, which is essential for online banking security. Many systems have satisfied the2FA requirements by sending One Time Password (OTP), possessed, through an SMS the user's phone device. Unfortunately, international roaming costs delays put restrictions on this system reliability. paper presents novel two-factor scheme...
The deployment of the Internet Things (IoT) in industry, called Industrial IoT (IIoT), is supporting introduction very desirable improvements, such as increasing production flexibility, self-organization, and real-time quick response to events. However, security privacy challenges are still be well addressed. IIoT requires different properties achieve secure reliable systems these requirements create extra considering limited processing communication power available field devices. In this...
We see a shift from todays Internet-of-Things(IoT) to include more industrial equipment and metrology systems, forming the Industrial Internet of Things (IIoT). However, this leads many concerns related confidentiality, integrity, availability, privacy non-repudiation. Hence, there is need secure IIoT in order cater for future with smart grids, metering, factories, cities, manufacturing. It therefore important research technologies create chaos, especially when it comes securing...
Achieving key agreement in wireless sensor networks (WSN) is a very hard problem. Many schemes come with shortage of considering addition, revocation, and also rekeying. This paper proposes distribution protocol based on the public cryptography, RSA, DHECC. The proposed does not trust individual sensors, partially Gateway. Our establishes pair-wise keys between nodes according to specific routing algorithm after deployment, instead loading full into each node. So node doesn't have share all...
ABSTRACT Static password authentication has security drawbacks. In two‐factor (2FA,) each user carries a device, called token, to generate passwords that are valid only one time. 2FA based on one‐time (OTPs) provides improved protection because users prompted provide something they know (i.e., PIN) and have token). Many systems satisfied the requirements by sending an OTP through SMS user's phone device. Unfortunately, international roaming, costs, delays, put restrictions this system...
In document authentication, the context refers to ability trace origins of a given person, device that produced it, or time and/or place it was produced. Forgeries pose significant dangers in terms authentication and trust. Therefore, is essential maintain integrity important documents prevent content modification by an intruder. Here, we explain possibility adding two-dimensional (2D)barcode contains required information ensure verification, original confidentiality hardcopy formats. We...
Secure broadcasting is an essential feature for critical operations in wireless sensor network (WSNs). However, due to the limited resources of networks, verifying authenticity broadcasted messages a very difficult issue. μTESLA broadcast authentication protocol, which uses network-wide loose time synchronization with one-way hashed keys provide verification. it suffers from several flaws considering delay tolerance, and chain length restriction. In this paper, we propose protocol provides...
With the new, state-of-the-art printing devices and equipment, there has been rapid growth in counterfeiting of banknotes. Traditional security features on banknotes are easy targets for counterfeiters, they can easily imitate original with fake ones. Conventional methods validating currency require specialized authentication However, cost lack mobility sophisticated banknote validation big problems general consumers. Modern digital solutions attempting to complement traditional through...
This paper has been retracted on 15 August 2011. A Retraction note is published in Sensors, 2011, 11, 7992
Password-based authentication has been used extensively as a one of techniques. Wu et al. presented robust password technique, in which they can face guessing, stolen-verifier, replaying, and impersonation attacks. However, this paper, we are going to show that protocol is vulnerable theft attack consequentially construct modified scheme prevent the shortcomings recovery. Proposed technique maintains al's security features well remedies its weakness.
Nowadays, instant messaging (IM) represents the most used service for both home and corporate users. IM is in many different application fields. Thus, it an effective easy means of network-based communication. Unfortunately, this technology does not provide built-in support security features. This paper proposes a new secure protocol centralized communication group. utilizes ElGamal cryptosystem, RSA algorithm, Chinese Remainder Theorem (CRT.) CRT takes responsibility renewing users' private...
Internet of Things (IoT) technology has drawn the attention industry, where it been able to, and still can, solve many industrial intractable issues. However, emerging suffers from severe security shortcomings. Authentication is a cornerstone IoT security, as presents measures checking legitimacy communication entities. The Industrial (IIoT) special conditions, resulting lack resources shortage skills. As far we can tell, literature, IIoT user authentication not studied extensively. In 2017...
Recently, removable (external USB) mass storage devices are finding widespread utilization for transferring and backing up data. They even can be used as bootable devices. have brought us great convenience, yet, simultaneously, they very vulnerable to the extraction of private confidential data from computer systems. Some access authentication schemes been proposed media means ensuring security For most part, such use an Internet connection a main server trusted third party, which generally...
The boom of Internet Things (IoT) devices has brought along new security concerns which earlier were not thought of. This expanded the potential for digital forensic investigators to gather rich evidence from these sources. data on IoT is easily accessible due lack proper techniques investigate such devices. paper presents a sophisticated non-invasive method software activities running device can be inspected by observing electromagnetic radiation emitted during process. objective this...
Due to cyber attacks targeting RFID systems, this paper briefly summarizes parts 3 and 4 of the ISO/IEC 14443 standard, which specify initialization, selection, trans-mission protocols in high-frequency smart-card reader communication. The communication has been modeled, two experiments have performed using a security protocol ana-lyzer tool called Scyther. verification results shows that implementing Random UID can prevent many attacks, such as eavesdropping replay successfully protect...