- Chaos-based Image/Signal Encryption
- Cryptographic Implementations and Security
- Cryptography and Data Security
- Coding theory and cryptography
- Cloud Computing and Resource Management
- Software-Defined Networks and 5G
- Cryptography and Residue Arithmetic
- Advanced Steganography and Watermarking Techniques
- Network Security and Intrusion Detection
- Graph Labeling and Dimension Problems
- Advanced Malware Detection Techniques
- IoT and Edge/Fog Computing
- Internet Traffic Analysis and Secure E-voting
- User Authentication and Security Systems
- Graph theory and applications
- Software System Performance and Reliability
- Underwater Vehicles and Communication Systems
- Mobile Ad Hoc Networks
- Interconnection Networks and Systems
- Water Quality Monitoring Technologies
- Topic Modeling
- Parallel Computing and Optimization Techniques
- Spam and Phishing Detection
- Energy Efficient Wireless Sensor Networks
- Advanced Authentication Protocols Security
University of Tabuk
2018-2025
SRM Institute of Science and Technology
2023
Qatar University
2021
University of Colorado Colorado Springs
2015-2020
Information Technology University
2018-2020
Concordia University of Edmonton
2011-2012
Since communications in the Underwater Wireless Sensor Networks (UWSNs) have limited resources and capabilities, designing an efficient reliable Media Access Control (MAC) protocol for UWSNs faces many challenges. bandwidth, power, memory, long propagation delay, high Bit Error Rate (BER), unreliable communication. Current MAC protocols that been designed Terrestrial (TWSNs) are not suitable UWSNs. While software-based mechanisms promise benefits to TWSN, few proposal designs introduced...
The incidence of COVID-19, a virus that is responsible for infections in the upper respiratory tract and lungs, witnessed daily rise fatalities throughout pandemic. timely identification COVID-19 can contribute to formulation strategies control disease selection an appropriate treatment pathway. Given necessity broader diagnosis, researchers have developed more advanced, rapid, efficient detection methods. By conducting initial comparative analysis various widely used convolutional neural...
Wireless body area networks ( <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">WBAN</i> ) are essential components of intelligent healthcare monitoring techniques. Especially, when the number and datatype in increases. In , secure multidimensional data aggregation received a lot attention. However, related schemes consume more computational communication overhead to encrypt/decrypt health reports. this paper, blockchain-assisted scalable...
In this article, we present an encryption technique that can encrypt any digital data. The proposed scheme basically depends on a substitution-permutation network. Two separate bijective maps are used in the algorithm. Firstly, substitution boxes to perform process. This uses elliptic curves (ECs) create several with good cryptographic properties. generated utilized replace arrange data produces most uncertainty plain image Further, permutation process generate strong randomness technique....
According to the standard paradigm, white box cryptographic primitives are used block black attacks and protect sensitive information. This is performed safeguard protected information keys against assaults. An adversary in such a setting aware of method can analyze many system inputs outputs, but blind specifics how critical instantiation primitive implemented. focus white-box solutions, which designed withstand that come from execution environment. significant because an attacker may...
Researchers concentrate on data security using cryptography, different approaches to protect confidential data, such as digital images holding private information. They use cryptography techniques, frequently elliptic curves and chaotic structures for secure transmission. This paper introduces a novel technique constructing S-boxes their application in color image encryption. The utilization of discrete maps results low computational complexity, which is crucial high-speed communication...
We propose a hardware-optimized design that implements Montgomery Elliptic-curve point multiplication Algorithm over <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">GF</i> (2 <sup xmlns:xlink="http://www.w3.org/1999/xlink">233</sup> ) using Lopez-Dahab projective coordinates. Moreover, we digit-parallel modular multiplier, which reduces clock cycles and improves throughput. Also, provided how to use our proposed multiplier for post-quantum...
Many encryption algorithms are designed to decrease the probability of cyberattacks by assuring data security as well system and participant authentication. However, in development computer resources cryptanalytical techniques have been developed performed competitively information with good results. In this paper, we reported flaws recently offered technique based on a chaotic map for Internet Health Things (IoHT) security. The scheme was new map, modified Mandelbrot set, conditional shift...
In recent years, numerous image encryption schemes have been developed that demonstrate different levels of effectiveness in terms robust security and real-time applications. While a few them outperform security, others perform well for applications where less processing time is required. Balancing these two aspects poses challenge, aiming to achieve efficient without compromising security. To address this the proposed research presents data approach encrypting grayscale images, comprising...
The Internet of Things (IoT), which is characteristic the current industrial revolutions, connection physical devices through different protocols and sensors to share information. Even though IoT provides revolutionary opportunities, its for smart cities brings new opportunities security threats, especially with appearance threats like quantum computing. Current approaches protect data are not immune attacks designed offer best management city applications. Thus, post-quantum cryptography...
As the internet of things (IoT) continues to proliferate, need for efficient and secure data encryption has become increasingly critical, particularly resource-constrained devices. Existing methods offer adequate security digital data; however, they often fall short when applied IoT This research introduces a novel lightweight algorithm optimized with metaheuristic techniques, incorporating quantum encryption, confusion diffusion operations, discrete wavelet transform (DWT), multiple chaotic...
The IoT sensor applications have grown in extreme numbers, generating a large amount of data, and it requires very effective data analysis procedures. However, the different infrastructures device layers possess protocol limitations transmitting receiving messages which generate obstacles developing smart applications. This difficulty prohibited existing implementations from adapting to other In this article, we study analyze how produces for big analytics, also highlights challenges...
In terms of growth, effect, and capability, the 5G-enabled Internet Things (IoT) is incredible. The volume data distributed processed by IoT (Internet Things) systems that trust connectivity coverage raises some security problems. As technology directly used in our daily lives, threats present cyberspace may grow more prominent globally. Extended network life, coverage, are all required for securing IoT-based 5G devices. a result these failures, there flaws lead to breaches. Because...
Preference analysis is a significant component in decision-making (DM) when selecting an optimal alternative. By comparing any two alternatives pairwise, preference relations (PRs) effectively depict the degrees of decision-makers (DMrs). The rough set theory (RST) has been applied to cope with by swapping equivalence relation (Er) dominance (DR). In this study, we propose new transfer functions construct alternatives' upward/downward fuzzy degree (FPD) for evaluating upward and downward PRs...
NFC has emerged as a critical technology in IoET ecosystems, facilitating seamless data exchange proximity-based systems. However, the security and privacy challenges associated with NFC-enabled IoT devices remain significant, exposing them to various threats such eavesdropping, relay attacks, spoofing. This paper introduces DC-NFC, novel deep learning framework designed enhance of communications within environments. The proposed integrates three innovative components: CE for capturing...
<title>Abstract</title> With the growing demand for highly secure medical data transmission, this research introduces a fused cryptography framework that integrates mathematical quantum computing operations with advanced classical encryption techniques. The proposed method incorporates principles, including walks, quantum-based cyclic shift operators, XOR operations, and key image generation methods such as bit-plane extraction hyperchaotic system-based scrambling. A map (HCM) generates...
Traditionally, incident responders and digital forensic examiners have predominantly relied on live response for volatile data acquisition. While this approach is popular, memory capacity has rapidly changed, making a valuable resource investigation, by revealing not only running tasks, but also terminated cached processes. This research presents the impact limitations of conventional method, response, in comparison to alternative image analysis. The experiment's results demonstrate we...
Abstract The internet has become one of the main sources news spread as it unleashed information dissemination space, where websites express opinions on entities while also reporting recent or unusual security risks. Recently, many research studies have focused sentimental reflection views and impressions people utilising natural language processing analytical linguistics. Therefore, we collected corpus from popular Arabic that publish articles related to issues, provide light weight...
The fifth-generation (5G) wireless network is commercialized. need to integrate massive devices in 5G and sensor networks (WSN) provide several convenient services for users becomes imperative. However, there are growing concerns that 5G-WSNs pose new security threats sensitive user information. User authentication key agreement have been provided secure end-to-end communication. stricter techniques required as billions of being networked collect process complex data real-time. Therefore,...
Polynomial multiplications based on the number theoretic transform (NTT) are critical in lattice-based post-quantum cryptography algorithms. Therefore, this paper presents a platform-agnostic unified hardware accelerator design (Unif-NTT) to compute forward and inverse operations of NTT for CRYSTALS-Kyber algorithm. Moreover, (Unif-BU) Cooley-Tukey Gentleman-Sande butterflies is presented using two adders, multipliers, subtractors, routing multiplexers barret-based modular reduction units....
Finite fields are well-studied algebraic structures with enormous efficient properties which have applications in the of cryptology and coding theory. In this study, we proposed a lossless binary Galois field extension-based algorithm for digital audio encryption. The architecture hired special type curve diffusion module depends on elliptic arithmetic operations. So, it generates good quality pseudo-random numbers (PRN) slight computational efforts, produces optimum encrypted files. For...
Knowledge representation is considered one of the main challenges in knowledge-based system. Currently, knowledge graph most modern model, which has been utilized critical based systems. On other hand, Entity Relationship Diagram (ERD) for relational database used model information In this paper, an efficient approach mapping ERD to presented with a case study demonstrating process. First, tables have represented by graph, then reification implemented convert base. Eventually, extracting...