- Energy Efficient Wireless Sensor Networks
- Energy Harvesting in Wireless Networks
- Vehicular Ad Hoc Networks (VANETs)
- Mobile Ad Hoc Networks
- Network Security and Intrusion Detection
- IoT and Edge/Fog Computing
- Advanced MIMO Systems Optimization
- Cognitive Radio Networks and Spectrum Sensing
- IoT-based Smart Home Systems
- Power Line Communications and Noise
- Opportunistic and Delay-Tolerant Networks
- Anomaly Detection Techniques and Applications
- Advanced Authentication Protocols Security
- Security in Wireless Sensor Networks
- Smart Agriculture and AI
- User Authentication and Security Systems
- UAV Applications and Optimization
- Distributed Sensor Networks and Detection Algorithms
- Real-Time Systems Scheduling
- Advanced Malware Detection Techniques
- Stroke Rehabilitation and Recovery
- Transportation Planning and Optimization
- Distributed and Parallel Computing Systems
- Retinal Imaging and Analysis
- Advanced Multi-Objective Optimization Algorithms
University of Malaya
2016-2025
Information Technology University
2014-2020
University of Technology Malaysia
2010-2012
Internet of Drones (IoD) is a decentralized network and management framework that links drones' access to the controlled airspace provides inter-location navigation services. The interconnection drones in IoD through Things (IoT). Hence vulnerable all security privacy threats affect IoT networks. It highly required safeguard good atmosphere free from get desired performance applications. Security issues have significantly restricted overall influence paradigm. There are existing survey...
The integration of simultaneous wireless information and power transfer (SWIPT) cooperative relay (CoR) techniques has evolved as a new phenomenon for the next-generation communication system. CoR is used to get energy spectral efficient network solve issues fading, path loss, shadowing, smaller coverage area. Relay nodes are battery-constrained or battery-less devices. They need some charging systems externally replacing recharging their batteries sometimes which not feasible convenient....
Extending the lifetime of wireless sensor networks (WSNs) and minimizing energy costs are two most significant concerns for data transmission. Sensor nodes powered by their own battery capacity, allowing them to perform critical tasks interact with other nodes. The quantity electricity saved from each together in a WSN has been strongly linked network’s longevity. Clustering conserves power transmission, but absence mechanism selecting suitable cluster head (CH) node increases complexity...
Internet of things (IoT) is considered as a collection heterogeneous devices, such sensors, Radio-frequency identification (RFID) and actuators, which form huge network, enabling non-internet components in the network to produce better world services, like smart home, city, transportation, industries. On other hand, security privacy are most important aspects IoT includes authentication, authorization, data protection, security, access control. Additionally, traditional cannot be directly...
Rapidly-exploring Random Trees (RRTs) are successful in single-query motion planning problems. The standard version of RRT grows a tree from start location and stops once it reached the goal configuration. RRT-Connect is bidirectional RRT, which two trees simultaneously. These try to establish connection stop searching. finds solutions faster than RRT. Following that, an asymptotically optimal called RRT*-Connect has been introduced. It not only rewires both while they growing, but also...
Prior 6LoWPAN intrusion detection system (IDS) utilized several features to detect various malicious activities. However, these IDS methods only specific attack but fails when the attacks are combined. In this paper, we propose an known as compression header analyzer (CHA-IDS) that analyzes data mitigate individual and combination routing attacks. CHA-IDS is a multi-agent framework capture manage raw for collection, analysis, actions. The proposed utilize best first greedy stepwise with...
Internet of Things (IoT) facilitates the integration between objects and different sensors to provide communication among them without human intervention. However, extensive demand for IoT its various applications has continued grow, coupled with need achieve foolproof security requirements. produces a vast amount data under several constraints such as low processor, power, memory. These constraints, along invaluable produced by devices, make vulnerable attacks. This paper presents an...
Sensor nodes heterogeneity if not properly utilized could lead to uneven energy consumption and load imbalanced across the network, which degrades performance of network. Routing algorithms should try achieve energy-efficiency load-balancing among heterogeneous prolong network lifetime. One solutions is by using duty-cycling in cluster-based routing such as Sleep-awake Energy Efficient Distributed (SEED) clustering algorithm minimize redundant transmission efficiency. However, this scheme...
Nowadays, machine learning (ML), which is one of the most rapidly growing technical tools, extensively used to solve critical challenges in various domains. Vehicular ad hoc network (VANET) expected be key role player reducing road casualties and traffic congestion. To ensure this role, a gigantic amount data should exchanged. However, current allocated wireless access for VANET inadequate handle such massive amounts. Therefore, faces spectrum scarcity issue. Cognitive radio (CR) promising...
Data collection is an essential part of sensor devices, particularly in such technologies like Internet Things (IoT), wireless networks (WSN), and cloud (SC). In recent years, various literature had been published these research areas to propose different models, architectures, contributions the domains. Due importance efficient data regarding reducing energy consumption, latency, network lifetime, general cost, a momentous volume has facilitate collection. Hence, review studies have...
Security and privacy are among the most critical challenges on internet of drones (IoD) network. The communication entities IoD network can communicate securely with use authenticated key agreement (AKA) based techniques. However, design such techniques must balance tradeoff between security lightweight features. Recently, Chen et al. proposed an authentication sharing scheme for deployment. It is, however, realized after scrutiny that technique is vulnerable to attacks under well-accepted...
Rapidly-exploring Random Trees (RRTs) have been widely used for motion planning problems due to their ability efficiently find solutions. Informed RRT* is an optimized version of RRT, which not only implements the rewiring process optimize tree but also limits search area a subset state space return near-optimal solutions faster. However, limiting function obtained shortest path so that before solution found, planner cannot limit subset. Moreover, unidirectional RRTs such as take more time...
Interference and energy holes formation in underwater wireless sensor networks (UWSNs) threaten the reliable delivery of data packets from a source to destination. also causes inefficient utilization limited battery power nodes that more is consumed retransmission lost packets. Energy are dead close surface water, their early death interrupts even when network has live nodes. This paper proposes localization-free interference minimization (LF-IEHM) routing protocol for UWSNs. The proposed...
This paper proposes a new meta-heuristic optimization approach, called "Sperm Swarm Optimization (SSO)". The underlying ideas and concepts behind the proposed method are inspired by sperm motility to fertilize egg. In SSO, swarm moves forward from low-temperature zone Cervix. During this direction, searches for high-temperature Fallopian Tubes where egg is waiting fertilization in zone, which area considered as optimal solution. SSO tested with optimizing several objective functions that...
Vehicular Ad Hoc Network (VANET) emerges to ameliorate road accident, traffic congestion, and infotainment. Cognitive radio (CR) is integrated with VANET (termed as CR-VANET) deal the spectrum scarcity problems. For better data transmission, routing very important in a highly dynamic CR-VANET environment. Routing has several challenges due vehicles' high-speed movements channel accessibility issues. This paper proposes 2-Hop algorithm based on Multi-Objective Harris Hawks Optimization...
In recent years, wireless sensor networks (WSNs) have been growing rapidly because of their ability to sense data, communicate wirelessly, and compute data efficiently. These contain small low-powered nodes that organize configure themselves carry out functions. Even though WSNs are cheap, easy deploy, flexible, efficient, there some challenges in terms energy efficiency network lifetime. Clustering is the most reliable solution for challenges, which grouped into few clusters, a cluster head...
The remarkable miniaturization of sensors has led to the production massive amounts data in smart communities. These cannot be efficiently collected and processed WSNs due weak communication capability these networks. This drawback can compensated for by amalgamating cloud computing obtain sensor clouds. In this article, we investigate, highlight, report recent premier advances clouds with respect collection. We categorize classify literature devising a taxonomy based on important...
Ubiquitous computing is foreseen to play an important role for data production and network connectivity in the coming decades. The Internet of Things (IoT) research which has capability encapsulate identification potential sensing capabilities, strives toward objective developing seamless, interoperable, securely integrated systems can be achieved by connecting with devices. This gives way evolution wireless energy harvesting (EH) power transmission using Radio frequency (RF) based...