- Mobile Ad Hoc Networks
- IoT and Edge/Fog Computing
- Opportunistic and Delay-Tolerant Networks
- IPv6, Mobility, Handover, Networks, Security
- Energy Efficient Wireless Sensor Networks
- Network Security and Intrusion Detection
- Vehicular Ad Hoc Networks (VANETs)
- Cooperative Communication and Network Coding
- Advanced MIMO Systems Optimization
- IoT-based Smart Home Systems
- Advanced Wireless Communication Technologies
- Software-Defined Networks and 5G
- Caching and Content Delivery
- Network Packet Processing and Optimization
- Wireless Networks and Protocols
- Advanced Malware Detection Techniques
- IoT Networks and Protocols
- Blockchain Technology Applications and Security
- Network Traffic and Congestion Control
- Internet of Things and AI
- Millimeter-Wave Propagation and Modeling
- Energy Harvesting in Wireless Networks
- Mobile Agent-Based Network Management
- Telecommunications and Broadcasting Technologies
- Optical Wireless Communication Technologies
National University of Malaysia
2016-2025
Ajman University
2023-2024
Universiti of Malaysia Sabah
2023
Princess Nourah bint Abdulrahman University
2022
Imam Abdulrahman Bin Faisal University
2022
ORCID
2021
National Institutes of Biotechnology Malaysia
2019-2020
Jaypee University of Information Technology
2019
Jaypee Group (India)
2019
Punjab Technical University
2019
With the evolution of fifth-generation (5G) wireless network, Internet Things (IoT) has become a revolutionary technique that enables diverse number features and applications. It can able amount devices to be connected in order create single communication architecture. As it significantly expanded recent years, is fundamental study this trending technology detail take close look at its applications different domains. represents an enabler new possibilities between people things. The main...
Recently, interest in Internet of Vehicles’ (IoV) technologies has significantly emerged due to the substantial development smart automobile industries. technology enables vehicles communicate with public networks and interact surrounding environment. It also allows exchange collect information about other roads. IoV is introduced enhance road users’ experience by reducing congestion, improving traffic management, ensuring safety. The promised applications systems face many challenges, such...
Blockchain technology provides a data structure with inherent security properties that include cryptography, decentralization, and consensus, which ensure trust in transactions. It covers widely applicable usages, such as intelligent manufacturing, finance, the Internet of things (IoT), medicine health, many different areas, especially medical health privacy protection areas. Its natural attributes, contracts consensus mechanisms, have leading-edge advantages protecting confidentiality,...
In the modern technological world, wireless communication has taken a massive leap from conventional system to new radio network. The novel concept of Fifth Generation (5G) cellular networks brings combination diversified set devices and machines with great improvement in unique way compared previous technologies. To broaden user's experience, 5G technology provides opportunity meet people's potential necessities for efficient communication. Specifically, researchers have designed network...
Bloom's Taxonomy is a classification of learning objectives within education that educators set for students. The cognitive domain this taxonomy designed to verify student's level during written examination. Educators may sometimes face the challenge in analysing whether their examination questions comply requirements at different levels. This paper proposes an automated analysis exam determine appropriate category based on taxonomy. rule-based approach applies Natural Language Processing...
The Internet of Things (IoT) is shaping the current and next generation Internet. vision IoT to embed communication capabilities with a highly distributed, ubiquitous dense heterogeneous devices network. This includes adaptation secure mobile networks, anytime, anywhere, by anyone or anything new intelligent applications services. Many efforts have been made review literature related for benefit development. However, many issues need be addressed overtake full potential IoT. Therefore, this...
With an extensive growth in user demand for high throughput, large capacity, and low latency, the ongoing deployment of Fifth-Generation (5G) systems is continuously exposing inherent limitations system, as compared with its original premises. Such are encouraging researchers worldwide to focus on next-generation 6G wireless systems, which expected address constraints. To meet above demands, future radio network architecture should be effectively designed utilize maximum spectrum capacity....
The revolutionary idea of the internet things (IoT) architecture has gained enormous popularity over last decade, resulting in an exponential growth IoT networks, connected devices, and data processed therein. Since devices generate exchange sensitive traditional internet, security become a prime concern due to generation zero-day cyberattacks. A network-based intrusion detection system (NIDS) can provide much-needed efficient solution network by protecting entry points through constant...
Internet of Things (IoT) is proliferating in our real world, and it a promising technology that serves very comfortable service to the users. IoT's underlying connect central Cloud Computing (CC), which huge data center collecting generated by IoT devices, located different areas on demand. However, cloud computing lacks transmission because infrastructure limitations networks enormously decrease its performance. Therefore, new paradigm has been founded act as middleware between IoT, termed...
The price gouging or hike is a worldwide issue, and it related to inflation. Because of rising prices, people in various countries cannot afford nutritious food proper treatment. Sometimes shops, restaurants, transportation service providers charge more than the prescribed product from buyers. In addition, unauthorized VAT Tax taken on products that government exempts. Another reason for hikes bribery, occurs transporting delivering goods. This article introduces blockchain-based Internet...
The outright aim of Beyond Fifth Generation (B5G) communication is to bring a revolution in Quality Service (QoS) through enhanced Mobile Broadband (eMBB), Ultra-Reliable Low Latency Communication (URLLC), and massive Machine Type (mMTC). Thereby, due this expansion the paradigm, interference bound surface unexpected challenges wireless domain. Thus, mitigation foundational research paraphernalia B5G communication. Presently, Software Defined Networking (SDN) emerging empower with...
Challenges faced in network security have significantly steered the deployment timeline of Fifth Generation (5G) communication at a global level; therefore, research Sixth (6G) analysis is profoundly necessitated. The prerogative this paper to present survey on emerging 6G cellular paradigm highlight symmetry with legacy concepts along asymmetric innovative aspects such Artificial Intelligence (AI), Quantum Computing, Federated Learning, etc. We taxonomy threat model five concepts, including...
Mobile Ad Hoc Networks (MANETs) are generating a lot of interests due to 3G and 4G activities. The dynamic nature these networks demands new set network routing strategy protocols be implemented in order provide efficient end-to-end communication. Due the diverse applications that use MANETs, such as battlefield, emergency services, disaster discovery, MANETs offer many advantages organizations need wireless roaming. For timely use, synchronization essential. Both hot research topics MANETs....
Internet of Things (IoT) and Cloud Computing (CC) are considered as two the greatest technology revolutions in last few years. New raised recent years is known CloudIoT or (CoT), which integrates cloud computing internet things. Dynamic heterogeneous environment, energy efficiency, delay-sensitive major issues CoT. Energy efficiency one basic requirement IoT applications resources cloud, really challenging issue This paper proposes optimization scheme for CoT by applying genetic algorithm...
In mobile ad hoc networks (MANETs), devices connect with other wirelessly, where there is no central administration. They are prone to different types of attacks such as the black hole, insider, gray wormhole, faulty node, and packet drop, which considerably interrupt perform secure communication. This paper has implemented denial‐of‐service like hole on general‐purpose on‐demand distance vector (AODV) protocol. It uses three approaches: normal AODV, AODV (BH_AODV), detected (D_BH_AODV),...
The quantum leap in mobile data traffic and high density of wireless electronic devices, coupled with the advancements industrial radio monitoring autonomous systems, have created great challenges for smooth network operations. fifth-generation beyond (B5G) (also being referred to as sixth-generation (6G)) communication technologies, due their compatibility previous generations, are expected overcome these unparalleled challenges. Accompanied by traditional new techniques, massive multiple...
Smart grid networks face several cyber-attacks, where distributed denial-of-service (DDoS) attacks distract the network. The synchrophasor technique protects wide-area measurement system (WAMS) from complex problem and addresses different issues in a grid. DDoS attack detection strategy is complicated due to complexities, vendor specifications, communication standard protocols. Attacker target phasor unit (PMU) data on concentrator (PDC) database WAMS. However, during cyber-attack, framework...
Neighbor discovery protocol (NDP) is the core of Internet version 6 (IPv6) suite. The motive behind NDP to replace address resolution (ARP), router discovery, and redirect functions in 4. known as stateless it utilized by IPv6 nodes determine joined hosts well routers an network without need dynamic host configuration server. susceptible attacks due deficiency its authentication process. Securing extremely crucial prevalent nowadays widely used communal areas, for instance, airports, where...