- Network Security and Intrusion Detection
- Internet Traffic Analysis and Secure E-voting
- Privacy-Preserving Technologies in Data
- Spam and Phishing Detection
- Advanced Malware Detection Techniques
- Blockchain Technology Applications and Security
- IoT and Edge/Fog Computing
- Privacy, Security, and Data Protection
- Cryptography and Data Security
- IPv6, Mobility, Handover, Networks, Security
- Vehicular Ad Hoc Networks (VANETs)
- Access Control and Trust
- Cybercrime and Law Enforcement Studies
- Information and Cyber Security
- Complex Network Analysis Techniques
- Advanced Authentication Protocols Security
- User Authentication and Security Systems
- COVID-19 Digital Contact Tracing
- Software-Defined Networks and 5G
- Energy Efficient Wireless Sensor Networks
- Opportunistic and Delay-Tolerant Networks
- Cloud Data Security Solutions
- Wireless Communication Networks Research
- Smart Grid Security and Resilience
- Security in Wireless Sensor Networks
Birmingham City University
2022-2024
University of Derby
2019-2023
University of Warwick
2018
Newcastle University
2016-2018
Universidade do Porto
2011-2016
INESC TEC
2013-2015
Institute for Systems Engineering and Computers
2013
International Islamic University, Islamabad
2009-2010
Today's smartphones are equipped with a large number of powerful value-added sensors and features, such as low-power Bluetooth sensor, embedded sensors, the digital compass, accelerometer, GPS Wi-Fi capabilities, microphone, humidity health tracking camera, etc. These have revolutionized lives human being in many ways, patients movement doctors, employees manufacturing units, monitoring environment, could also be used for large-scale personal, group, community sensing applications especially...
The Internet of Things (IoT) is the network connected computing devices that have ability to transfer valued data between each other via without requiring human intervention. In such a environment, social IoT (SIoT) has become an emerging trend where multiple owned by users support communication within circle. Trust management in SIoT imperative as trusting information from compromised could lead serious compromises network. It important mechanism and their evaluate trustworthiness before...
The connected or smart environment is the integration of devices (sensors, IoT devices, actuator) into Internet Things (IoT) paradigm, in which a large number are connected, monitoring physical and processes transmitting centralized database for advanced analytics analysis. This integrated setup allows greater levels automation systems than possible with just Internet. While delivering services to different application within systems, these perform an impeccably device-to-device...
The zero-trust (ZT) model assumes that all users, devices, and network traffic should not considered as trusted until proven. Zero-trust emphasizes the importance of verifying authenticating every user device, limiting access to resources based on principle least privilege. Under model, devices are granted after they have been successfully presented with their authentication credentials rights different factors, such identity, device health, location, behaviour. Access controls then...
Internet of Things (IoT) represent a network resource-constrained sensor devices connected through the open Internet, susceptible to misuse by intruders. Traditional standalone intrusion detection systems (IDS) are tasked with monitoring device behaviours identify malicious activities. These not only require extensive and system resources but also cause delays in detecting actor due unavailability comprehensive view intruder's Collaboration among IoT enables considering knowledge from...
Cognitive Radio Network (CRN) is considered as a viable solution on Internet of Vehicle (IoV) where objects equipped with cognition make decisions intelligently through the understanding both social and physical worlds. However, spectrum availability data sharing/transferring among vehicles are critical improving services driving safety metrics presence Malicious Devices (MD) further degrade network performance. Recently, blockchain technique in CRN-based IoV has been introduced to prevent...
The Internet of Vehicles is the network connected vehicles and transport infrastructure units [roadside (RSUs)], which utilizes emerging wireless systems (4G, 5G, LTE) for communication sharing information. enables users to disseminate critical information about events happening on road (for example, accidents, traffic congestions, hazards). exchange between RSUs could improve driving experience safety, as well help drivers identify hazardous safe routes in a timely manner. advantageous...
Most current access control models are rigid, as they designed using static policies that always give the same outcome in different circumstances. In addition, cannot adapt to environmental changes and unpredicted situations. With dynamic systems such Internet of Things (IoT) with billions things distributed everywhere, these obsolete. Hence, required. These utilize not only but also contextual real-time information determine decision. One is risk-based model. This model estimates security...
Abstract The Internet of Things (IoT) is the network smart devices, sensors, and machines that continuously monitored surrounding environment execute meaningful decisions on data or information it receives. Internet‐enabled devices could facilitate computer‐mediated strategies for various tasks, example, health care, managing cities factories, manufacturing, automating home business, etc. IoT commonly uses technology establishing communication among thus inherits all security threats are...
Blockchain technology has gained significant attention in recent years for its potential to revolutionize various sectors, including finance, supply chain management, and digital forensics. While blockchain’s decentralization enhances security, it complicates the identification tracking of illegal activities, making challenging link blockchain addresses real-world identities. Also, although immutability protects against tampering, introduces challenges forensic investigations as prevents...
Abstract Wireless sensor network enables remote connectivity of technological devices such as smart mobile with the internet. Due to its low cost well easy availability data sharing and accessing devices, Internet Things (IoT) has grown exponentially during past few years. The these plays a remarkable role in new era mHealth. In mHealth, sensors generate enormous amounts context‐aware computing proven collect manage data. context aware is domain be involved devices. playing very significant...
In recent years, there has been a notable surge in both the complexity and volume of targeted cyber attacks, largely due to heightened vulnerabilities widely adopted technologies. The Prediction detection early attacks are vital mitigating potential risks from network resilience. With rapid increase digital data increasing big become crucial tool for intrusion forecasting. By leveraging capabilities unstructured data, forecasting systems can more effective detecting preventing anomalies....
Reputation systems are an important means to facilitate trustworthy interactions between on-and off-chain services and users. However, contemporary reputation typically dependent on a trusted central authority preserve privacy of raters or adding noise into the user feedback. Moreover, accuracy values relies integrity feedback input; this should not be tampered with misused for other purposes. This paper presents blockchain-based system named REPUTABLE (A Decentralized System Ecosystems),...