- Quantum Information and Cryptography
- Internet Traffic Analysis and Secure E-voting
- Network Security and Intrusion Detection
- Energy Efficient Wireless Sensor Networks
- Quantum Mechanics and Applications
- Advanced Steganography and Watermarking Techniques
- Quantum Computing Algorithms and Architecture
- Cryptography and Data Security
- Spam and Phishing Detection
- Control and Dynamics of Mobile Robots
- Advanced Data Storage Technologies
- Opportunistic and Delay-Tolerant Networks
- IoT and Edge/Fog Computing
- Robotics and Sensor-Based Localization
- Anomaly Detection Techniques and Applications
- Quantum-Dot Cellular Automata
- Caching and Content Delivery
- Distributed Control Multi-Agent Systems
- Blockchain Technology Applications and Security
- Chaos-based Image/Signal Encryption
- Robotic Path Planning Algorithms
- Water Quality Monitoring Technologies
York University
2022
University of New Brunswick
2019-2022
King Fahd University of Petroleum and Minerals
2015-2017
This article focuses on cyber-physical systems involving a set of robots and sensors that are interconnected through wireless links. In applications operate in harsh environments, robot networks (WSRNs) may suffer simultaneous failures, which lead to partitioning the WSRN into unconnected subnetworks. The loss connectivity often leads degrade performance inability fulfill application mission. To address this issue, several proposals have been made literature where node mobility is exploited...
While encryption is powerful at protecting information, it critically relies upon the mystery/private cryptographic key's security. Poor key management would compromise any robust algorithm. In this way, securing information reduced to issue of such keys from unauthorized access. work, KeyShield proposed, a scalable and quantum-safe scheme. provides highest security level as on impossibility finding unique solution an underdetermined linear system equations. achieves rekeying using single...
Wireless sensor and actor networks (WSANs) deployed in a harsh environment may suffer simultaneous failures causing the network to be partitioned into disjointed parts. Connectivity restoration of these partitions is vital issue for reliability mission. Most existing works literature mainly focus on restoring connectivity take account number moving nodes, travelled distance, but not WSANs lifetime. In this paper, distributed node-repositioning algorithm based fuzzy logic (CoRFL) proposed...
Path planning is extensively used in different fields not only robotics but also games, manufacturing, auto-motive applications, and so on. Robot path one of the major research issues area autonomous mobile robot. The critical step problem to find shortest from start position a defined goal through known, unknown, or partially known environment. Hazardous events that may devastate some parts intended convert those areas untraversable areas. These introduce topological constraints for robot...
The rise of quantum computing presents a significant challenge to the security asymmetric cryptography, foundational element modern digital infrastructure. In order address this emerging vulnerability, variety post-quantum cryptographic algorithms have been proposed. study, we conduct systematic evaluation performance and practicality NIST's selected 4th round candidates specifically tailored for financial services applications, such as SWIFT Secure Signature Key (3SKey),...
Quantum key distribution, in principle, provides information-theoretic security based on the laws of quantum mechanics. Entanglement swapping offers a unique ability to create entanglement between qubits that have not previously interacted. Entanglement-swapping setup helps building side-channel-free distribution. A receiver-device-independent distribution protocol this idea, QKeyShield, is proposed. It adopts use biased operator choice, thus, increasing rate generated bits. Several measures...
Despite the huge advancements in Internet technologies, progress protecting copyright infringements has seen limited success. This is mainly due to current architecture that based on a content-blind network layer. We argue Information-Centric Networking can indeed help tackle this problem. Further, we propose scheme enforce copyrights distribution under ICN. The proposed demonstrated DONA architecture. proposal utilizes similarity hash function mechanism prevent of pirated material even if...
The advance of internet and multimedia allows for tremendous transferring digital media data the percentage time that users spend in online activity exchanging important information is increasing day by day. Besides that, simplicity editing transmitting files, makes them vulnerable stealing or disrupting. Therefore, it utmost importance to find an effective way sending sensitive without being noticed eavesdroppers hackers. Cryptography Steganography are considered main protection techniques...
According to www.internetlivestats.com, there are over 1 billion websites on the world wide web (WWW) today while in 1991, were only one single website. Websites classification based traffic analysis has become a difficult problem due large number of within internet. All proposed approaches literature could not classify more than 100 which is very trivial compared total In this paper, two-level websites’ technique proposed. At first level, classified general category such as sports, news,...
Abstract Quantum key distribution (QKD) protocols are unconditionally secure, providing that quantum devices truthful. Device-independent (DI-QKD) offer the prospect of distributing secret keys with minimal assumptions. The DI-QKD hard to implement using current technologies as they require all be uncharacterized. Measurement device independent (MDI-QKD) assume measurement not truthful; adversary might make them. MDI-QKD is secure but more challenging implement. Receiver-device-independent...