Abdullah Alomari

ORCID: 0000-0003-3866-3048
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Energy Efficient Wireless Sensor Networks
  • Network Security and Intrusion Detection
  • Advanced Malware Detection Techniques
  • Indoor and Outdoor Localization Technologies
  • Underwater Vehicles and Communication Systems
  • Advanced Authentication Protocols Security
  • Energy Harvesting in Wireless Networks
  • Blockchain Technology Applications and Security
  • Anomaly Detection Techniques and Applications
  • Mobile Ad Hoc Networks
  • IoT and Edge/Fog Computing
  • Smart Grid Security and Resilience
  • IoT-based Smart Home Systems
  • Software-Defined Networks and 5G
  • Cryptography and Data Security
  • Digital Marketing and Social Media
  • Opportunistic and Delay-Tolerant Networks
  • Technology Adoption and User Behaviour
  • Analytic Number Theory Research
  • Environmental Sustainability in Business
  • Digital and Cyber Forensics
  • Mobile and Web Applications
  • UAV Applications and Optimization
  • Security in Wireless Sensor Networks
  • User Authentication and Security Systems

Al Baha University
2017-2025

Dalhousie University
2012-2017

Android has become the leading mobile ecosystem because of its accessibility and adaptability. It also primary target widespread malicious apps. This situation needs immediate implementation an effective malware detection system. In this study, explainable system was proposed using transfer learning visual features. For detection, our technique leverages both textual First, a pre-trained model called Bidirectional Encoder Representations from Transformers (BERT) designed to extract trained...

10.3390/s22186766 article EN cc-by Sensors 2022-09-07

The Internet of Drones (IoD) has recently gained popularity in several military, commercial, and civilian applications due to its unique characteristics, such as high mobility, three-dimensional (3D) movement, ease deployment. Drones, on the other hand, communicate over an unencrypted wireless link have little computational capability a typical IoD environment, making them exposed wide range cyber-attacks. Security vulnerabilities systems include man-in-the-middle attacks, impersonation,...

10.3390/drones6100264 article EN cc-by Drones 2022-09-20

The smart grid relies on Advanced Metering Infrastructure (AMI) to function. Because of the significant packet loss and slow transmission rate wireless connection between meters in AMI, these infrastructures are considered Low-power Lossy Networks (LLNs). routing protocol an AMI network is crucial for ensuring availability timeliness data transfer. IPv6 Routing Protocol lossy networks (RPL) excellent option communication configuration. However, it highly at risk against many external...

10.1109/access.2023.3286536 article EN cc-by-nc-nd IEEE Access 2023-01-01

In many applications of wireless sensor networks (WSNs), node location is required to locate the monitored event once occurs. Mobility-assisted localization has emerged as an efficient technique for localization. It works on optimizing a path planning location-aware mobile node, called anchor (MA). The task MA traverse area interest (network) in way that minimizes error while maximizing number successful localized nodes. For simplicity, models assume sufficient source energy and time,...

10.1109/access.2017.2787140 article EN cc-by-nc-nd IEEE Access 2017-12-25

Mobile anchor path planning techniques have provided as an alternative option for node localization in wireless sensor networks (WSNs). In such context, is a movement pattern where mobile node’s designed order to achieve maximum ratio possible with minimum error rate. Typically, the mobility advance, which applicable when has sufficient sources of energy and time. However, restricted or limited, dynamic design needed. This paper proposes novel distributed range-free mechanism...

10.3390/s17081904 article EN cc-by Sensors 2017-08-18

Recently, the spectacular innovations in fields of wireless body area networks (WBAN) and Internet Things (IoT) have made e-Care services rise as a promising application domain, which significantly advances quality medical system, however, due to openness environment privacy people’s physiological data, WBAN IoT are prone various cyber-attacks. There is significant need for an efficient highly secured cryptographic scheme that can meet requirements resource-constrained devices. Therefore,...

10.3390/electronics8101171 article EN Electronics 2019-10-16

This research is an attempt to explore the drivers of sustainable consumption and their impact on online purchase intentions (OPI) for agricultural products. To this aim, social influence (SI) quality assurance (QA) were identified as leading formation OPI. The input from technology acceptance model (TAM) unified theory use (UTAUT) has been incorporated develop a that explains Primary data collected 612 respondents subjected partial least square (PLS) analysis. SI QA OPI was found be...

10.3390/su14116563 article EN Sustainability 2022-05-27

Internet of Things (IoT) allows the integration physical world with network devices for proper privacy and security in a healthcare system. IoT system is vulnerable to spoofing attacks that can easily represent themselves as legal entity network. It passive attack access Medium Access Control address some valid users continue malicious activities. In this paper, an algorithm proposed detecting using Received Signal Strength (RSS) Number Connected Neighbors (NCN). Firstly, detected, located...

10.3390/math10193686 article EN cc-by Mathematics 2022-10-08

Android malware detection remains a critical issue for mobile security. Cybercriminals target since it is the most popular smartphone operating system (OS). Malware detection, analysis, and classification have become diverse research areas. This paper presents smart sensing model based on large language models (LLMs) developing classifying network traffic-based malware. The traffic that constantly connects apps may contain harmful components damage these apps. However, one of main challenges...

10.3390/s25010202 article EN cc-by Sensors 2025-01-01

Blockchain-enabled Internet of Things (IoT) envisions a world with rapid development and implementations to change our everyday lives based on smart devices. These devices are attached the internet that can communicate each other without human interference. A well-known wireless network in blockchain-enabled IoT frameworks is Low Power Lossy Network (LLN) uses novel protocol known as Routing for low power lossy networks (RPL) provide effective energy-efficient routing. LLNs run RPL...

10.1145/3511903 article EN ACM Transactions on Internet Technology 2022-03-28

The increase in internet connectivity has led to an increased usage of the Internet Things (IoT) and devices on internet. These IoT are becoming backbone Industry 4.0. dependence made them vulnerable cyber-attacks. often deployed harsh conditions, challenged with less computational costs, starved energy. All these limitations make it tough deploy accurate intrusion detection systems (IDSs) critical ecosystem more susceptible A new lightweight IDS a novel feature selection algorithm...

10.3390/computers11100142 article EN cc-by Computers 2022-09-20

Organizations of every size and industry are facing a new normal. Adversaries have become more sophisticated persistent than ever before. Every network is never-ending onslaughts. Yet many organizations continue to rely on signature-based reactive threat detection mitigation solutions as the primary line defense against new-age, cutting-edge attacks. Even conventional attacks can bypass such security solutions. This means legacy protection leave organization’s data vulnerable damage,...

10.3390/electronics11192992 article EN Electronics 2022-09-21

The Industrial Internet of Things (IIoT) community is concerned about the security wireless communications between interconnected industries and autonomous systems. Providing a cyber-security framework for IIoT offers thorough comprehension whole spectrum securing industries, from edge to cloud. Several signcryption schemes based on either identity-based or certificateless configurations are available in literature address IIoT's concerns. Due identity-based/certificateless nature schemes,...

10.1109/access.2022.3211257 article EN cc-by IEEE Access 2022-01-01

An extensive body of research has been accumulated on finding alternative methods for supplying nodes with their locations in Wireless Sensor Networks (WSNs). Although some path planning models two-dimensional (2D) regions have proposed recent years, many WSNs' realistic applications are applied three-dimensional (3D) regions. In this paper, we introduce a model mobile anchor-assisted localization WSNs. Our offers higher performance terms accuracy lower error rate comparison to other models.

10.1109/ccece.2017.7946681 article EN 2017-04-01

10.1016/j.compeleceng.2022.108437 article EN Computers & Electrical Engineering 2022-11-09

A variety of wireless sensor network (WSN) applications have been proposed. However, the efficiency WSNs, as well their ability to interact with different environments, varies. Many challenges and problems be solved remain. Overcoming these requires a protocol that will design provide highly efficient system, thus helping WSN transmit data in suitable time. In WSNs Mobile Elements (MEs), task is first find an effective way minimize length tour ME follows for gathering. minimized should still...

10.1109/wd.2014.7020793 article EN 2014-11-01

Localization is essential to consider in relation wireless sensor networks issues. Establishing mobility the localization process creates improvements various regards. Static path planning one of a number models that are used networks. Most static depend on trilateration or triangulation concepts direct connection fashion between unknown nodes and anchors for successful node localization; however, such methods insufficient cases discontinuity. Considering scenarios where mobile anchor has...

10.1109/csndsp.2016.7574010 article EN 2022 13th International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP) 2016-07-01

In this paper we present a new data collection scheme using mobile actors in large scale wireless sensor network (WSN). A actor, or for convenience, M-actor is node that has powerful energy source, computation, and communication features. The able to move freely through the deployment, traversing radio transmission range of nodes collect sensed data. Once from all sensors collected, returns base station off-load collected This makes two contributions. First, heuristic compute points,...

10.1109/icc.2012.6364936 article EN 2012-06-01

The incidence of malicious threats to computer systems has increased with the increasing use Android devices and high-speed Internet. Malware visualization mechanism can analyze a whenever software or system crash occurs because activity. This paper presents new malware classification approach recognize such device families by capturing suspicious processes in form different size color images. Important local global characteristics images are extracted through combined feature descriptor...

10.18280/ts.390326 article EN Traitement du signal 2022-06-30

This paper addresses the computational methods and challenges associated with prime number generation, a critical component in encryption algorithms for ensuring data security. The generation of numbers efficiently is challenge various domains, including cryptography, theory, computer science. quest to find more effective driven by increasing demand secure communication storage need efficient solve complex mathematical problems. Our goal address this presenting two novel generating numbers:...

10.1371/journal.pone.0311782 article EN cc-by PLoS ONE 2024-11-15

The preservation of the lifetime a wireless sensor network (WSN) depends on energy efficiency with which nodes operate as they collect and transmit data for decisions. importance conservation calls need optimization solutions, among is clustering to reduce consumption. This study aims present novel Sine Cosine Algorithm based model (SCC) optimizing distances within clusters enhance elongation. algorithm used implement solution through steps cluster formation, head (CH) selection,...

10.1109/icscge58152.2022.00010 article EN 2022-11-19
Coming Soon ...