- Advanced Database Systems and Queries
- Mobile Ad Hoc Networks
- Opportunistic and Delay-Tolerant Networks
- Data Management and Algorithms
- Caching and Content Delivery
- Energy Efficient Wireless Sensor Networks
- Security in Wireless Sensor Networks
- Distributed systems and fault tolerance
- Semantic Web and Ontologies
- Peer-to-Peer Network Technologies
- Web Data Mining and Analysis
- Privacy-Preserving Technologies in Data
- Cryptography and Data Security
- Advanced Data Storage Technologies
- Network Security and Intrusion Detection
- Service-Oriented Architecture and Web Services
- IoT and Edge/Fog Computing
- Cloud Data Security Solutions
- Data Mining Algorithms and Applications
- Cloud Computing and Resource Management
- Vehicular Ad Hoc Networks (VANETs)
- Human Mobility and Location-Based Analysis
- Parallel Computing and Optimization Techniques
- Indoor and Outdoor Localization Technologies
- Anomaly Detection Techniques and Applications
Missouri University of Science and Technology
2016-2025
Meharry Medical College
2023
University of Minho
2022
Committee on Publication Ethics
2022
Centre National de la Recherche Scientifique
2022
University of Florence
2022
Hong Kong Polytechnic University
2022
Michigan State University
2022
Universidade Federal da Bahia
2022
United States Air Force Research Laboratory
2012
Advances in hardware and wireless network technologies have created low-cost, low-power, multifunctional miniature sensor devices. These devices make up hundreds or thousands of ad hoc tiny nodes spread across a geographical area. collaborate among themselves to establish sensing network. A can provide access information anytime, anywhere by collecting, processing, analyzing disseminating data. Thus, the actively participates creating smart environment.
Newer models for interacting with wireless sensors such as Internet of Things and Sensor Cloud aim to overcome restricted resources efficiency. The Missouri S&T (science technology) sensor cloud enables different networks, spread in a huge geographical area, connect together be employed simultaneously by multiple users on demand. Virtual sensors, which are at the core this architecture, assist creating multiuser environment top resource-constrained physical can help supporting applications.
In ad hoc networks, due to frequent network partition, data accessibility is lower than that in conventional fixed networks. this paper, we solve problem by replicating items on mobile hosts. First, propose three replica allocation methods assuming each item not updated. these methods, take into account the access frequency from hosts and status of connection. Then, extend proposed considering aperiodic updates integrating user profiles consisting users' schedules, behavior, read/write...
IoT devices produce a lot of valuable and sensitive data that is often shared with external parties to provide different kinds useful services. Traditional access control systems are centralized do not include all the stakeholders in decision making process. To fill this gap, we propose permissioned blockchain based system for where phase like creating policy happens on consensus stakeholders. be more specific, design implement Attribute Based Access Control (ABAC) called Hyperledger Fabric...
In a mobile ad hoc network, data replication drastically improves availability. However, since hosts' mobility causes frequent network partitioning, consistency management of operations on replicas becomes crucial issue. such an environment, the global is not desirable by many applications. Thus, new maintenance based local conditions as location and time need to be investigated. This paper attempts classify different levels according requirements from applications provides protocols realize...
A sensor cloud consists of various heterogeneous wireless networks (WSNs). These WSNs may have different owners and run a wide variety user applications on demand in communication medium. Hence, they are susceptible to security attacks. Thus, need exists formulate effective efficient measures that safeguard these impacted from attack the cloud. However, analyzing impact attacks their cause-consequence relationship is prerequisite before can be either developed or deployed. In this paper, we...
<title>Abstract</title> Underground mines are susceptible to occasional roof falls and cave-ins, temporarily destroying the existing wireless communications telemetry infrastructure. During this temporary outage, intermittent provision of electrical energy wirelessly already deployed low-power area networks (LPWAN) Internet Things (IoT) devices assumes a fundamental requirement. In article, we propose design long-range far-field radio frequency (RF) power transfer (WPT) testbed LPWAN IoT at...
In a distributed sensor network, large number of sensors deployed which communicate among themselves to self-organize wireless ad hoc network. We propose an energy-efficient level-based hierarchical system. compromise between the energy consumption and shortest path route by utilizing neighbors (NBR) its level in clustering. addition, we design Secure Routing Protocol for Sensor Networks ( SRPSN ) safeguard data packet passing on networks under different types attacks. build secure from...
Every activity in disaster management demands accurate and up-to-date information to allow a quick, easy, cost-effective response reduce the possible loss of lives properties. It is challenging complex task acquire from different regions disaster-affected area timely fashion. The extensive spread reach social media networks such as Twitter people share real-time. However, gathering valuable requires series operations (1) processing each tweet for text classification, (2) location...
Industry 4.0 is a new industry trend which relies on data driven business model to set the productivity requirements of cyber physical system. To meet this requirement, systems need be highly scalable, adaptive, real-time, and reliable. Recent successful industrial wireless standards such as WirelessHART appeared feasible approach for systems. For reliable real-time communication in unreliable environments, they adopt high degree redundancy. While redundancy crucial control, it causes huge...
Due to cost-efficiency and less hands-on management, data owners are outsourcing their the cloud which can provide access as a service. However, by cloud, lose control over provider becomes third party. At first, encrypting owner then exporting it seems be good approach. there is potential efficiency problem with outsourced encrypted when revokes some of users' privileges. An existing solution this based on symmetric key encryption scheme so not secure revoked user rejoins system different...
In this paper, we present a secure routing protocol for sensor networks (SecRout) to safeguard under different types of attacks. The SecRout uses the symmetric cryptography messages, and small cache in nodes record partial path (previous next nodes) destination. It guarantees that destination will be able identify discard tampered messages ensure received are not tampered. Comparing performance with non-secure AODV (ad hoc on demand distance vector routing), only has byte overhead (less than...
Communication in wireless sensor networks uses the majority of a sensor's limited energy. Using aggregation network reduces overall communication cost. Security entails many different challenges. Traditional end-to-end security is not suitable for use with in-network aggregation. A corrupted has access to data and can falsify results. Additively homomorphic encryption allows encrypted values, result being same as when unencrypted was aggregated. public key cryptography, digital signatures be...
Most of the organizations using cloud-based data sharing platforms are multi-group in nature. The existing directly revocable attribute-based encryption (ABE) schemes though seem to be a good fit, but they fail provide any effective solution for secure scenarios. To bridge this gap, we first propose <bold xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">Re</b> vocable xmlns:xlink="http://www.w3.org/1999/xlink">ABE</b> with...