- Vehicular Ad Hoc Networks (VANETs)
- Advanced Authentication Protocols Security
- Autonomous Vehicle Technology and Safety
- Network Security and Intrusion Detection
- IoT and Edge/Fog Computing
- Anomaly Detection Techniques and Applications
- User Authentication and Security Systems
- Advanced Malware Detection Techniques
- Internet Traffic Analysis and Secure E-voting
- Privacy-Preserving Technologies in Data
- Cryptographic Implementations and Security
- Internet of Things and AI
- Wireless Communication Networks Research
- Security in Wireless Sensor Networks
- IPv6, Mobility, Handover, Networks, Security
- Experimental Learning in Engineering
- Healthcare Technology and Patient Monitoring
- Generative Adversarial Networks and Image Synthesis
- Digital Media Forensic Detection
- Peer-to-Peer Network Technologies
- Blockchain Technology Applications and Security
- Wireless Body Area Networks
- ECG Monitoring and Analysis
- Advanced MIMO Systems Optimization
- Traffic control and management
Alsalam University College
2019-2024
Imam Alkadhim University College
2023-2024
Huazhong University of Science and Technology
2019
Vehicles in a vehicular ad-hoc network (VANET) broadcast beacons giving safety-related and traffic information. In an open-access environment, this means that the VANET is susceptible to security privacy issues. paper, we propose new pseudo-identity-based scheme for conditional anonymity with integrity authentication VANET. The proposed uses pseudonym joining process road-side unit (RSU) protect real identity even from RSU, case it compromised. All previous identity-based schemes have been...
Vehicle Ad-hoc Networks (VANETs) have recently become an active research area. This is because of its important applications in the transportation field which vehicles severe position during activities daily living persons. In this paper, basic background VANET from Intelligent Transportation System (ITS), Mobile (MANETs), standard and characteristics are discussed. Second, architecture components communications system presented. Then, critical challenges future perspectives comprehensively...
Recently, Vehicle Ad Hoc Networks (VANETs) have been increasingly developed in Intelligent Transportation Systems (ITSs). However, VANETs are vulnerable to security issues because of the open-medium nature Vehicle-To-Vehicle (V2V) and Vehicle-To-Infrastructure (V2I) communication. many studies proposed schemes address these issues. massive computational overheads, especially process batch verification method, which verifies multiple messages simultaneously. In this article, a Lightweight...
Abstract: The Fifth Generation (5G) networks have enabled the development of smart cities in which massive amounts data are collected, stored and disseminated. ultimate objective these is to cut costs improve security performance. In this environment, Internet Vehicles (IoV) helps connect vehicles, pedestrians, control rooms, some roadside infrastructure. Owing insecure nature communication channel utilized IoV exchange information, it important develop practical techniques preserve...
Recently, vehicular ad hoc networks (VANETs) have been garnering significant inter-est from the people involved in transportation field. Nowadays automotive manufactur-ers already supplying vehicles with multitude of road sensors that provides many useful characteristics. VANET communication not only offers drivers and passen-gers various safety related services but also a wide range valuable applications. However, inherent openness wireless medium used by VANETs exposes to security privacy...
In the last few years, increasing development of various tools to make fake videos from real has been raised. Thus, several models/approaches have constructed detect and reveals video. Consequently, this research is conducted propose a new model based on combining Convolutional Neural Networks (CNN), Recurrent (RNN), image preprocessing techniques classify find video To implement evaluate proposed model, MATLAB simulator used. The deepFake Images dataset used for evaluations. This contains...
Numerous privacy-preserving authentication schemes have been proposed but vehicular ad hoc networks (VANETs) still suffer from security and privacy issues as well computation communication overheads.In this paper, we a robust conditional privacypreserving scheme based on pseudonym root with cuckoo filter to meet requirements reduce our scheme, used new idea generate pseudonyms for vehicles where each on-board unit (OBU) saves one pseudonym, named "pseudonym root," generates all the same...
Recently, a huge effort has been pushed to the wireless broadcasting nature in open area. However, vehicular ad hoc network (VANET) is disposed various kinds of attacks. Hence, keeping security VANET most critical issue because related human life. Thus, we propose robust and lightweight key agreement-based identity protocol LSKA-ID for communication. Our utilizes elliptic curve cryptography, Chinese reminder theorem, (ID)-based cryptosystem resolve issues found previously proposed schemes,...
Intrusion detection in network systems is a critical challenge due to the ever-increasing volume and complexity of cyber-attacks. Traditional methods often struggle with high-dimensional data need for real-time detection. This paper proposes comprehensive intrusion method utilizing novel wrapped feature selection approach combined long short-term memory classifier optimized whale optimization algorithm address these challenges effectively. The proposed introduces technique using multi-layer...
In addition to the security and privacy challenges in vehicular ad hoc network (VANET), computational communicational costs are huge challenges, since they increase latency, thus casing reduce network's communication efficiency, providing attacker with an opportunity penetrate network. this paper, we propose a new scheme eliminate mentioned VANET systems. first part of scheme, initialize register On-Board Units (OBUs) Road Side (RSUs). second part, exchange between RSU OBU mutual...
Opinion mining and emotion detection are two important techniques in natural language processing that have gained significant attention recent years. is the process of identifying extracting subjective information from text, such as opinions, attitudes, emotions, while emotions text. These a wide range applications various domains, including social media analysis, customer feedback product reviews. This paper provides an overview opinion processing. We discuss approaches methods used...
Cybercrimes are becoming a bigger menace to both people and corporations. It poses serious challenge the modern digital world. According Cybersecurity Ventures, global cost of cybercrime will reach ${\$}$10.5 trillion annually by 2025, which is significantly more than annual damage caused all-natural disasters profitable trade in all major illegal narcotics put together. Botnets most common have significant negative impact on any civilization among malware programs. As result, this study...
Here, we depict the ongoing 3GPP Delivery 16 particularly for situating in 5G organizations, which is currently being developed. To address issues of an extensive variety administrative, business, and modern use cases, detail indicates signals, estimations, methods, framework engineering. Accordingly, when contrasted with what was beforehand conceivable LTE, essentially advances capacities. Utilizing reenactment situations that have been settled upon, demonstrative execution assessed, it...
This article investigates the cloud computing models and their advantages disadvantages, discussing association between them web-apps of healthcare monitoring systems. Also, we present major integration mechanism some already developed medical MATLAB modules such as an innovative ECG diagnosis algorithm within a system that has been using C# language Visual studio environment. A comparative performance analysis based on call function durations security aspects also introduced for both...
After business hours and at night, the majority of office buildings educational facilities often feature a small selection food, unless consumer buys takeout. Only unhealthily marketed drinks snacks are typically available on-site vending machines. Freshly prepared food is scarce while restaurants closed. The idea for vending-based system that provides wholesome, freshly in recognizable style presented. This paper proposes intelligent software machine systems by using cloud IoT. proposal...
An Intrusion detection system IDS is a key component of the security management infrastructure. The goal to monitor processes prevailing in network and analyze them for signs any possible deviations. Because large volume data, gets expansion with false alarm rate intrusion, accuracy decreased. It one main problems unknown attacks on experiences. basic aim was develop also reduce (FAR). We will design an Adaptive Neuro-Fuzzy based identify intrusion activities within effectively. Honey Badger...
E-learning involves numerous virtual courses offered by primary universities or schools. Traditional prepared in a brick-and-mortar school facility are compared with online learning programs delivered through the internet. Existing works on whiteboard-based software have shown some limitations terms of response time and high complexity. Therefore, this paper, we proposed an interactive flexible widget-based whiteboard platform to improve performance E-learning. Technically, employed advanced...