- Energy Efficient Wireless Sensor Networks
- Network Security and Intrusion Detection
- Advanced Malware Detection Techniques
- Indoor and Outdoor Localization Technologies
- Underwater Vehicles and Communication Systems
- Advanced Authentication Protocols Security
- Energy Harvesting in Wireless Networks
- Blockchain Technology Applications and Security
- Anomaly Detection Techniques and Applications
- Mobile Ad Hoc Networks
- IoT and Edge/Fog Computing
- Smart Grid Security and Resilience
- IoT-based Smart Home Systems
- Software-Defined Networks and 5G
- Cryptography and Data Security
- Digital Marketing and Social Media
- Opportunistic and Delay-Tolerant Networks
- Technology Adoption and User Behaviour
- Analytic Number Theory Research
- Environmental Sustainability in Business
- Digital and Cyber Forensics
- Mobile and Web Applications
- UAV Applications and Optimization
- Security in Wireless Sensor Networks
- User Authentication and Security Systems
Al Baha University
2017-2025
Dalhousie University
2012-2017
Android has become the leading mobile ecosystem because of its accessibility and adaptability. It also primary target widespread malicious apps. This situation needs immediate implementation an effective malware detection system. In this study, explainable system was proposed using transfer learning visual features. For detection, our technique leverages both textual First, a pre-trained model called Bidirectional Encoder Representations from Transformers (BERT) designed to extract trained...
The Internet of Drones (IoD) has recently gained popularity in several military, commercial, and civilian applications due to its unique characteristics, such as high mobility, three-dimensional (3D) movement, ease deployment. Drones, on the other hand, communicate over an unencrypted wireless link have little computational capability a typical IoD environment, making them exposed wide range cyber-attacks. Security vulnerabilities systems include man-in-the-middle attacks, impersonation,...
The smart grid relies on Advanced Metering Infrastructure (AMI) to function. Because of the significant packet loss and slow transmission rate wireless connection between meters in AMI, these infrastructures are considered Low-power Lossy Networks (LLNs). routing protocol an AMI network is crucial for ensuring availability timeliness data transfer. IPv6 Routing Protocol lossy networks (RPL) excellent option communication configuration. However, it highly at risk against many external...
In many applications of wireless sensor networks (WSNs), node location is required to locate the monitored event once occurs. Mobility-assisted localization has emerged as an efficient technique for localization. It works on optimizing a path planning location-aware mobile node, called anchor (MA). The task MA traverse area interest (network) in way that minimizes error while maximizing number successful localized nodes. For simplicity, models assume sufficient source energy and time,...
Mobile anchor path planning techniques have provided as an alternative option for node localization in wireless sensor networks (WSNs). In such context, is a movement pattern where mobile node’s designed order to achieve maximum ratio possible with minimum error rate. Typically, the mobility advance, which applicable when has sufficient sources of energy and time. However, restricted or limited, dynamic design needed. This paper proposes novel distributed range-free mechanism...
Recently, the spectacular innovations in fields of wireless body area networks (WBAN) and Internet Things (IoT) have made e-Care services rise as a promising application domain, which significantly advances quality medical system, however, due to openness environment privacy people’s physiological data, WBAN IoT are prone various cyber-attacks. There is significant need for an efficient highly secured cryptographic scheme that can meet requirements resource-constrained devices. Therefore,...
This research is an attempt to explore the drivers of sustainable consumption and their impact on online purchase intentions (OPI) for agricultural products. To this aim, social influence (SI) quality assurance (QA) were identified as leading formation OPI. The input from technology acceptance model (TAM) unified theory use (UTAUT) has been incorporated develop a that explains Primary data collected 612 respondents subjected partial least square (PLS) analysis. SI QA OPI was found be...
Internet of Things (IoT) allows the integration physical world with network devices for proper privacy and security in a healthcare system. IoT system is vulnerable to spoofing attacks that can easily represent themselves as legal entity network. It passive attack access Medium Access Control address some valid users continue malicious activities. In this paper, an algorithm proposed detecting using Received Signal Strength (RSS) Number Connected Neighbors (NCN). Firstly, detected, located...
Android malware detection remains a critical issue for mobile security. Cybercriminals target since it is the most popular smartphone operating system (OS). Malware detection, analysis, and classification have become diverse research areas. This paper presents smart sensing model based on large language models (LLMs) developing classifying network traffic-based malware. The traffic that constantly connects apps may contain harmful components damage these apps. However, one of main challenges...
Blockchain-enabled Internet of Things (IoT) envisions a world with rapid development and implementations to change our everyday lives based on smart devices. These devices are attached the internet that can communicate each other without human interference. A well-known wireless network in blockchain-enabled IoT frameworks is Low Power Lossy Network (LLN) uses novel protocol known as Routing for low power lossy networks (RPL) provide effective energy-efficient routing. LLNs run RPL...
The increase in internet connectivity has led to an increased usage of the Internet Things (IoT) and devices on internet. These IoT are becoming backbone Industry 4.0. dependence made them vulnerable cyber-attacks. often deployed harsh conditions, challenged with less computational costs, starved energy. All these limitations make it tough deploy accurate intrusion detection systems (IDSs) critical ecosystem more susceptible A new lightweight IDS a novel feature selection algorithm...
Organizations of every size and industry are facing a new normal. Adversaries have become more sophisticated persistent than ever before. Every network is never-ending onslaughts. Yet many organizations continue to rely on signature-based reactive threat detection mitigation solutions as the primary line defense against new-age, cutting-edge attacks. Even conventional attacks can bypass such security solutions. This means legacy protection leave organization’s data vulnerable damage,...
The Industrial Internet of Things (IIoT) community is concerned about the security wireless communications between interconnected industries and autonomous systems. Providing a cyber-security framework for IIoT offers thorough comprehension whole spectrum securing industries, from edge to cloud. Several signcryption schemes based on either identity-based or certificateless configurations are available in literature address IIoT's concerns. Due identity-based/certificateless nature schemes,...
An extensive body of research has been accumulated on finding alternative methods for supplying nodes with their locations in Wireless Sensor Networks (WSNs). Although some path planning models two-dimensional (2D) regions have proposed recent years, many WSNs' realistic applications are applied three-dimensional (3D) regions. In this paper, we introduce a model mobile anchor-assisted localization WSNs. Our offers higher performance terms accuracy lower error rate comparison to other models.
A variety of wireless sensor network (WSN) applications have been proposed. However, the efficiency WSNs, as well their ability to interact with different environments, varies. Many challenges and problems be solved remain. Overcoming these requires a protocol that will design provide highly efficient system, thus helping WSN transmit data in suitable time. In WSNs Mobile Elements (MEs), task is first find an effective way minimize length tour ME follows for gathering. minimized should still...
Localization is essential to consider in relation wireless sensor networks issues. Establishing mobility the localization process creates improvements various regards. Static path planning one of a number models that are used networks. Most static depend on trilateration or triangulation concepts direct connection fashion between unknown nodes and anchors for successful node localization; however, such methods insufficient cases discontinuity. Considering scenarios where mobile anchor has...
In this paper we present a new data collection scheme using mobile actors in large scale wireless sensor network (WSN). A actor, or for convenience, M-actor is node that has powerful energy source, computation, and communication features. The able to move freely through the deployment, traversing radio transmission range of nodes collect sensed data. Once from all sensors collected, returns base station off-load collected This makes two contributions. First, heuristic compute points,...
The incidence of malicious threats to computer systems has increased with the increasing use Android devices and high-speed Internet. Malware visualization mechanism can analyze a whenever software or system crash occurs because activity. This paper presents new malware classification approach recognize such device families by capturing suspicious processes in form different size color images. Important local global characteristics images are extracted through combined feature descriptor...
This paper addresses the computational methods and challenges associated with prime number generation, a critical component in encryption algorithms for ensuring data security. The generation of numbers efficiently is challenge various domains, including cryptography, theory, computer science. quest to find more effective driven by increasing demand secure communication storage need efficient solve complex mathematical problems. Our goal address this presenting two novel generating numbers:...
The preservation of the lifetime a wireless sensor network (WSN) depends on energy efficiency with which nodes operate as they collect and transmit data for decisions. importance conservation calls need optimization solutions, among is clustering to reduce consumption. This study aims present novel Sine Cosine Algorithm based model (SCC) optimizing distances within clusters enhance elongation. algorithm used implement solution through steps cluster formation, head (CH) selection,...