- IoT and Edge/Fog Computing
- Blockchain Technology Applications and Security
- Energy Efficient Wireless Sensor Networks
- Network Security and Intrusion Detection
- Caching and Content Delivery
- Smart Grid Security and Resilience
- Cloud Data Security Solutions
- Smart Grid Energy Management
- Advanced Malware Detection Techniques
- Privacy-Preserving Technologies in Data
- Vehicular Ad Hoc Networks (VANETs)
- Opportunistic and Delay-Tolerant Networks
- Microgrid Control and Optimization
- Security in Wireless Sensor Networks
- Mobile Ad Hoc Networks
- Monoclonal and Polyclonal Antibodies Research
- Cooperative Communication and Network Coding
- Distributed systems and fault tolerance
- Context-Aware Activity Recognition Systems
- User Authentication and Security Systems
- Internet Traffic Analysis and Secure E-voting
- Cloud Computing and Resource Management
- Energy Load and Power Forecasting
- Anomaly Detection Techniques and Applications
- Wireless Body Area Networks
King Saud University
2016-2025
King Saud bin Abdulaziz University for Health Sciences
2025
National Guard Health Affairs
2025
King Abdullah International Medical Research Center
2025
University of Haripur
2021-2024
ORCID
2017-2021
National University of Sciences and Technology
2021
Universidade Federal do Piauí
2021
King Saud Medical City
2019
King Khalid University Hospital
2005-2015
Supply chains are evolving into automated and highly complex networks becoming an important source of potential benefits in the modern world. At same time, consumers now more interested food product quality. However, it is challenging to track provenance data maintain its traceability throughout supply chain network. The traditional centralized they depend on a third party for trading. These systems lack transparency, accountability auditability. In our proposed solution, we have presented...
Traditional power grid and its demand-side management (DSM) techniques are centralized mainly focus on industrial consumers. The ignorance of residential commercial sectors in DSM activities degrades the overall performance a conventional grid. Therefore, concept demand response (DR) via sector makes smart (SG) superior over traditional In this context, paper proposes an optimized home energy system (OHEMS) that not only facilitates integration renewable source (RES) storage (ESS) but also...
Wireless sensor networks (WSNs) have demonstrated research and developmental interests in numerous fields, like communication, agriculture, industry, smart health, monitoring, surveillance. In the area of agriculture production, IoT-based WSN has been used to observe yields condition automate precision using various sensors. These sensors are deployed agricultural environment improve production through intelligent farming decisions obtain information regarding crops, plants, temperature...
Nowadays, telemedicine is an emerging healthcare service where the professionals can diagnose, evaluate, and treat a patient using telecommunication technology. To diagnose evaluate patient, need to access electronic medical record (EMR) of which might contain huge multimedia big data including X-rays, ultrasounds, CT scans, MRI reports. For efficient supporting mobility for both as well patients, EMR needs be kept in storage cloud. In spite popularity cloud, it faces different security...
In this paper, a blockchain-based data sharing and access control system is proposed, for communication between the Internet of Things (IoT) devices. The proposed intended to overcome issues related trust authentication in IoT networks. Moreover, objectives are achieve trustfulness, authorization, Multiple smart contracts such as Access Control Contract (ACC), Register (RC), Judge (JC) used provide efficient management. Where ACC manages overall system, RC authenticate users JC implements...
Local energy generation and peer to (P2P) trading in the local market can reduce consumption cost, emission of harmful gases (as renewable sources are used generate at user's premises) increase smart grid resilience. However, with peers have trust privacy issues. A centralized system be manage this but it increases overall cost also faces several In paper, implement a hybrid P2P market, blockchain-based is proposed. It fully decentralized allows members interact each other trade without...
Abstract The volume of data transferred across communication infrastructures has recently increased due to technological advancements in cloud computing, the Internet Things (IoT), and automobile networks. network systems transmit diverse heterogeneous dispersed environments as technology develops. communications using these networks daily interactions depend on security provide secure reliable information. On other hand, attackers have their efforts render susceptible. An efficient...
In recent years, demand side management (DSM) techniques have been designed for residential, industrial and commercial sectors. These are very effective in flattening the load profile of customers grid area networks. this paper, a heuristic algorithms-based energy controller is residential smart grid. essence, five algorithms (the genetic algorithm (GA), binary particle swarm optimization (BPSO) algorithm, bacterial foraging (BFOA), wind-driven (WDO) our proposed hybrid (GWD) algorithm)...
The infrastructure of wireless sensor networks (WSN) is structured in an ad-hoc manner and organized nodes reporting the events to Base Station (BS). A WSN integrated with smart technologies develop fast Internet Things (IoT) communications among different applications. Recently, many researchers proposed their solutions optimize IoT data transmissions energy efficient cost effective support. However, most have focused on design development static topologies overlooked dynamic structure...
For the last few years, computer-aided diagnosis (CAD) has been increasing rapidly. Numerous machine learning algorithms have developed to identify different diseases, e.g., leukemia. Leukemia is a white blood cells- (WBC-) related illness affecting bone marrow and/or blood. A quick, safe, and accurate early-stage of leukemia plays key role in curing saving patients' lives. Based on developments, consists two primary forms, i.e., acute chronic Each form can be subcategorized as myeloid...
Emotional health plays very vital role to improve people's quality of lives, especially for the elderly. Negative emotional states can lead social or mental problems. To cope with problems caused by negative emotions in daily life, we propose efficient facial expression recognition system contribute healthcare system. Thus, expressions play a key our communications, and recent years have witnessed great amount research works reliable (FER) systems. Therefore, evaluation analysis from video...
The current cellular technology and vehicular networks cannot satisfy the mighty strides of network demands. Resource management has become a complex challenging objective to gain expected outcomes in environment. 5G promises provide ultra-high-speed, reduced delay, reliable communications. development new technologies such as function virtualization (NFV) software defined networking (SDN) are critical enabling leveraging 5G. SDN-based can an excellent platform for autonomous vehicles...
Internet of Things (IoT) enables modern improvements in smart sensors, RFID, technologies, and communication protocols. Sensor nodes are treated as devices widely used to gather forward sensed information. However, besides intrinsic constraints on sensor nodes, they vulnerable a variety security threats. This paper presents an energy-aware secure multi-hop routing (ESMR) protocol by using secret sharing scheme increase the performance energy efficiency with data against malicious actions....
The trustworthiness of an industrial Internet Things (IIoT) network is important stakeholder expectation. Maintaining the such a crucial to void loss lives. A trustworthy IIoT system combines security characteristics IT trustworthiness-safety, security, privacy, reliability, and resilience. Conventional tools techniques are not enough safeguard platform due difference in protocols, limited upgrade opportunities, mismatch older versions operating used system. In this article, we propose...
Social networking sites engage millions of users around the world. The users' interactions with these social sites, such as Twitter and Facebook have a tremendous impact occasionally undesirable repercussions for daily life. prominent turned into target platform spammers to disperse huge amount irrelevant deleterious information. Twitter, example, has become one most extravagantly used platforms all times therefore allows an unreasonable spam. Fake send undesired tweets promote services or...
The pervasiveness of newly introduced Internet-of-Things (IoT) devices has opened up new opportunities in healthcare systems, for example facilitating remote patient monitoring. There are, however, security and privacy considerations the transmission data from these to backend server, across heterogeneous IoT networks. In this study, we propose a novel privacy-preserving scheme which is based on blockchain swarm exchange techniques facilitate seamless secure user (e.g., electronic health...
In the promising time of Internet, connected things have ability to communicate and share information. The Internet Things (IoT) cannot be implemented unless security-related concerns been resolved. Sharing information among different devices can compromise private users. Thus, a suitable mechanism is needed exclude risk malicious compromised nodes. As follows, trust has proposed in literature as useful technology maintain users' security. Prior studies diverse management mechanisms achieve...