Mohammed Aldarwbi

ORCID: 0000-0002-5542-6231
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Quantum Information and Cryptography
  • Internet Traffic Analysis and Secure E-voting
  • Network Security and Intrusion Detection
  • Energy Efficient Wireless Sensor Networks
  • Quantum Mechanics and Applications
  • Advanced Steganography and Watermarking Techniques
  • Quantum Computing Algorithms and Architecture
  • Cryptography and Data Security
  • Spam and Phishing Detection
  • Control and Dynamics of Mobile Robots
  • Advanced Data Storage Technologies
  • Opportunistic and Delay-Tolerant Networks
  • IoT and Edge/Fog Computing
  • Robotics and Sensor-Based Localization
  • Anomaly Detection Techniques and Applications
  • Quantum-Dot Cellular Automata
  • Caching and Content Delivery
  • Distributed Control Multi-Agent Systems
  • Blockchain Technology Applications and Security
  • Chaos-based Image/Signal Encryption
  • Robotic Path Planning Algorithms
  • Water Quality Monitoring Technologies

York University
2022

University of New Brunswick
2019-2022

King Fahd University of Petroleum and Minerals
2015-2017

This article focuses on cyber-physical systems involving a set of robots and sensors that are interconnected through wireless links. In applications operate in harsh environments, robot networks (WSRNs) may suffer simultaneous failures, which lead to partitioning the WSRN into unconnected subnetworks. The loss connectivity often leads degrade performance inability fulfill application mission. To address this issue, several proposals have been made literature where node mobility is exploited...

10.1109/jsyst.2020.2970649 article EN IEEE Systems Journal 2020-06-16

While encryption is powerful at protecting information, it critically relies upon the mystery/private cryptographic key's security. Poor key management would compromise any robust algorithm. In this way, securing information reduced to issue of such keys from unauthorized access. work, KeyShield proposed, a scalable and quantum-safe scheme. provides highest security level as on impossibility finding unique solution an underdetermined linear system equations. achieves rekeying using single...

10.1109/ojcoms.2020.3046110 article EN cc-by IEEE Open Journal of the Communications Society 2020-12-21

Wireless sensor and actor networks (WSANs) deployed in a harsh environment may suffer simultaneous failures causing the network to be partitioned into disjointed parts. Connectivity restoration of these partitions is vital issue for reliability mission. Most existing works literature mainly focus on restoring connectivity take account number moving nodes, travelled distance, but not WSANs lifetime. In this paper, distributed node-repositioning algorithm based fuzzy logic (CoRFL) proposed...

10.1109/cit/iucc/dasc/picom.2015.217 article EN 2015-10-01

Path planning is extensively used in different fields not only robotics but also games, manufacturing, auto-motive applications, and so on. Robot path one of the major research issues area autonomous mobile robot. The critical step problem to find shortest from start position a defined goal through known, unknown, or partially known environment. Hazardous events that may devastate some parts intended convert those areas untraversable areas. These introduce topological constraints for robot...

10.1049/iet-csr.2019.0001 article EN cc-by IET Cyber-Systems and Robotics 2019-04-10

The rise of quantum computing presents a significant challenge to the security asymmetric cryptography, foundational element modern digital infrastructure. In order address this emerging vulnerability, variety post-quantum cryptographic algorithms have been proposed. study, we conduct systematic evaluation performance and practicality NIST's selected 4th round candidates specifically tailored for financial services applications, such as SWIFT Secure Signature Key (3SKey),...

10.2139/ssrn.4836780 preprint EN 2024-01-01

Quantum key distribution, in principle, provides information-theoretic security based on the laws of quantum mechanics. Entanglement swapping offers a unique ability to create entanglement between qubits that have not previously interacted. Entanglement-swapping setup helps building side-channel-free distribution. A receiver-device-independent distribution protocol this idea, QKeyShield, is proposed. It adopts use biased operator choice, thus, increasing rate generated bits. Several measures...

10.1109/access.2022.3212787 article EN cc-by IEEE Access 2022-01-01

Despite the huge advancements in Internet technologies, progress protecting copyright infringements has seen limited success. This is mainly due to current architecture that based on a content-blind network layer. We argue Information-Centric Networking can indeed help tackle this problem. Further, we propose scheme enforce copyrights distribution under ICN. The proposed demonstrated DONA architecture. proposal utilizes similarity hash function mechanism prevent of pirated material even if...

10.1109/menacomm46666.2019.8988556 article EN 2019-11-01

The advance of internet and multimedia allows for tremendous transferring digital media data the percentage time that users spend in online activity exchanging important information is increasing day by day. Besides that, simplicity editing transmitting files, makes them vulnerable stealing or disrupting. Therefore, it utmost importance to find an effective way sending sensitive without being noticed eavesdroppers hackers. Cryptography Steganography are considered main protection techniques...

10.14738/tnc.56.3766 article EN cc-by Transactions on Networks and Communications 2017-12-26

According to www.internetlivestats.com, there are over 1 billion websites on the world wide web (WWW) today while in 1991, were only one single website. Websites classification based traffic analysis has become a difficult problem due large number of within internet. All proposed approaches literature could not classify more than 100 which is very trivial compared total In this paper, two-level websites’ technique proposed. At first level, classified general category such as sports, news,...

10.14738/tnc.56.3767 article EN cc-by Transactions on Networks and Communications 2017-12-26

Abstract Quantum key distribution (QKD) protocols are unconditionally secure, providing that quantum devices truthful. Device-independent (DI-QKD) offer the prospect of distributing secret keys with minimal assumptions. The DI-QKD hard to implement using current technologies as they require all be uncharacterized. Measurement device independent (MDI-QKD) assume measurement not truthful; adversary might make them. MDI-QKD is secure but more challenging implement. Receiver-device-independent...

10.21203/rs.3.rs-2187816/v1 preprint EN cc-by Research Square (Research Square) 2022-10-25
Coming Soon ...