Khairul Azmi Abu Bakar - Academia.edu (original) (raw)

Papers by Khairul Azmi Abu Bakar

Research paper thumbnail of Defining The Beauty Of Cyber Hygiene: A Retrospective Look

IEEE engineering management review, 2024

The Internet's widespread influence, especially during the COVID-19 pandemic, has led to ... more The Internet's widespread influence, especially during the COVID-19 pandemic, has led to a surge in remote work and increased online activities, simultaneously amplifying the risk of cyberattacks. In response to this global shift, cyber hygiene emerges as a crucial asset in preventing cybercrimes at individual and organizational levels. This paper provides a comprehensive definition of cyber hygiene, emphasizing its role in promoting online health through ingrained practices, knowledge, behavior, and attitudes. Distinguishing cyber hygiene from cybersecurity, it situates the former as an integral facet within the broader cybersecurity framework. The study categorizes cyber hygiene into two primary dimensions: data privacy, protection, and prevention, and online safety measures. It highlights the benefits of adopting robust cyber hygiene practices, including safeguarding personal information, preventing cyberattacks, protecting digital assets, and fostering a positive online reputation. The research underscores the manifold advantages of prioritizing cyber hygiene. Central to the argument is the pivotal role of cyber hygiene in mitigating the escalating risks associated with increased Internet reliance. It emphasizes the transformative impact of seamlessly integrating cyber hygiene into daily routines, advocating its incorporation into individual and organizational cybersecurity practices. The recommendations stress the critical role of cyber hygiene in minimizing system compromises, building trust in collaborative engineering environments, and safeguarding invaluable information. In navigating an era defined by heightened connectivity, understanding and actively implementing resilient cyber hygiene practices stand as imperative measures for fortifying the security of our digital landscape.

Research paper thumbnail of A Model of Electronic Customer Relationship Management System Adoption In Telecommunication Companies

Revista Amazonía investiga, Dec 28, 2020

Un modelo de adopción del sistema electrónico de gestión de relaciones con el cliente en empresas... more Un modelo de adopción del sistema electrónico de gestión de relaciones con el cliente en empresas de telecomunicaciones

Research paper thumbnail of Explicit Routing for Popular Content in Named Data Network

Research paper thumbnail of Challenges in data representation for efficient execution of encryption operation

Bulletin of Electrical Engineering and Informatics, Apr 1, 2024

Research paper thumbnail of Exploring Service Quality Dimensions of IT Shared Services in the Malaysian Public Sector

International journal of advanced trends in computer science and engineering, Sep 15, 2019

Sharing services is an increasingly viable business strategy involving the consolidation of suppo... more Sharing services is an increasingly viable business strategy involving the consolidation of support functions managed by one agency or known as a shared service organization or shared service center. The intention is to provide a more effective and efficient service to the organization. In order to ensure that the service quality of the shared services is consistently excellent, customer satisfaction is one of the best tools to measure the performance level of the services provided. There have been few studies on shared services relating to the Information Systems domain. Thus, there are many research opportunities, especially for the outcome and evaluation phases. For this research, we need to know the relevant quality dimension for shared services. This paper explores the dimensions and factors of service quality for IT Shared Services. It then develops the service quality model for measuring IT shared services customer satisfaction based on past studies and interviews with shared services IT managers in MAMPU. Three case studies on IT infrastructure shared services in the public sector of Malaysia are used. This article recommends nine (9) dimensions, namely tangibles, reliability, responsiveness, assurance, empathy, continuous service improvement, change management, technology availability and security. The dimensions identified will assist the shared service organization in giving priority attention to improving service quality delivery.

Research paper thumbnail of Security and Privacy Challenges in Cloud Computing

Cloud computing plays a crucial role in supporting the virtualization synergy as there is a large... more Cloud computing plays a crucial role in supporting the virtualization synergy as there is a large-scale demand among users in adopting cloud solutions. However, preserving the security of storage while maintaining users’ privacy brings new challenges in protecting cloud computing from illegal access and shared network environment. Thus, Risk-Adaptable Access Control (RAdAC) is known within privacy-preserving perspective as a flexible prospect in managing exceptional access request and reacting to suspicious user. However, most of the previous work on the cloud security focused on storage security rather than anonymity of user nor identity. This paper explores the fundamental concept of cloud computing architecture and identifies the security requirements in cloud. In this work, the prerequisite elements in RAdAC framework has been discussed precisely and ambiguity factor is found in protecting privacy of user. Thus, we proposed the viable two-factor authentication scheme in RAdAC for future road ahead in cloud industry.

Research paper thumbnail of Enhanced Buffer Management Policy and Packet Prioritization for Wireless Sensor Network

International Journal on Advanced Science, Engineering and Information Technology, Sep 30, 2018

Limited storage of the sensor node is one of the main causes of packet drop in the Wireless senso... more Limited storage of the sensor node is one of the main causes of packet drop in the Wireless sensor network (WSN). Frequent link disconnection is also another cause of packet drop. Due to lack of continues end-to-end connection; neighbouring nodes might not be able to connect with one another. Hence, communication may be setup with the help of store and forward approach between the source and destination. In that case, the sensor node may not be capable of storing a chunk of data since the buffer is available in a small amount. In order to store the data packets in the buffer when the link is down, an effective buffer management scheme is highly needed to keep the data packets for a long time until the link is re-established. This paper proposes a new buffer management scheme called Packet Priority Heterogonous Queue (PPHQ), which based on prioritizing and classifying the packets into different categories to minimize the loss of important packets. Unlike the existing Multi-layer WSN, that treats the data packets differently; we considered the data packets such as; temperature, humidity, and pressure to be same. However, the classification of different packet types is based on the sensor's information value. We completely divide the whole buffer into different queues, and thus the newly arrived packets are inserted in their corresponding queue. The buffer will then prioritize and schedule on which packet to be stored or transmit first when the buffer is overloaded. Our result exhibits that PPHQ scheme indeed provides minimum packet drop as well as maximum throughput compared to existing Multi-layer WSN buffer management schemes.

Research paper thumbnail of Towards Secure Risk-Adaptable Access Control in Cloud Computing

International Journal of Advanced Computer Science and Applications, 2018

The emergence of pervasive cloud computing has supported the transition of physical data and mach... more The emergence of pervasive cloud computing has supported the transition of physical data and machine into virtualization environment. However, security threat and privacy have been identified as a challenge to support the widespread adoption of cloud among user. Moreover, user awareness on the importance of cloud computing has increase the needs to safeguard the cloud by implementing access control that works on dynamic environment. Therefore, the emergence of Risk-Adaptable Access Control (RAdAC) as a flexible medium in handling exceptional access request is a great countermeasure to deal with security and privacy challenges. However, the rising problem in safeguarding users' privacy in RAdAC model has not been discussed in depth by other researcher. This paper explores the architecture of cloud computing and defines the existing solutions influencing the adoption of cloud among user. At the same time, the obscurity factor in protecting privacy of user is found within RAdAC framework. Similarly, the two-tier authentication scheme in RAdAC has been proposed in responding to security and privacy challenges as shown through informal security analysis.

Research paper thumbnail of Battery Measurement on Experimental Testbed for Wireless Communication through Xbee

Many Zigbee-based wireless sensor networks have been developed for agriculture monitoring. The ma... more Many Zigbee-based wireless sensor networks have been developed for agriculture monitoring. The main attractiveness of Zigbee wireless technology is in its potential to set up self-organizing network that requires no network backbone and extremely low cost with low-power wireless networking. This paper provides experimental test results on actual voltage measurement using Zigbee protocol devices when communicating temperature, humidity and soil moisture data. The nodes are capable of relaying data up to 143 meters outdoor on unobstructed line of sights with requirement 5% data loss is fulfilled. The results can be used for battery lifetime prediction and suggest the suitability for Zigbee wireless communication for short-range outdoor applications.

Research paper thumbnail of Symbol time offset synchronization based on training sequence

Orthogonal Frequency Division Multiplexing (OFDM) is a modulation structure of digital multi- car... more Orthogonal Frequency Division Multiplexing (OFDM) is a modulation structure of digital multi- carriers that spreads the idea of a single subcarrier modulation within the same single channel by using multiple subcarriers. OFDM utilizes numerous carefully diverged orthogonal subcarriers, which are parallel transmitted. However, OFDM systems are very sensitive to synchronization errors that reduces orthogonality between sub-carriers, thereby degrading performance significantly. The synchronization problem can lead to two other problems: Carrier Frequency Offset (CFO), which leads to inter-carrier interference (ICI), and Symbol Time Offset (STO), which results in inter-symbol interference (ISI). In this research, a modified method is proposed for STO estimation using a training sequence (TS). The comparison shows that it was better than previously used methods, such as cyclic prefix (CP) by autocorrelation, CP by square difference, and ordinary TS.

Research paper thumbnail of Development of iDISPATCH system

iDispatch is a courier system used to manage local deliveries and handle issues with the current ... more iDispatch is a courier system used to manage local deliveries and handle issues with the current delivery method. By using the system, the seller could ensure that the dispatcher would deliver the product to the right buyer by using QR Code. The system also could show the delivery tracking status by displaying the current location of the dispatcher in a real time so that the buyer can view the current location and estimate the time for the dispatcher to arrive. iDispatch can help small and medium size businesses to improve their delivery methods and increase the trust between the sellers, buyers and dispatcher.

Research paper thumbnail of A New Method for Battery Lifetime Estimation Using Experimental Testbed for Zigbee Wireless Technology

International Journal on Advanced Science, Engineering and Information Technology, Dec 30, 2018

Many Zigbee-based wireless sensor networks have been developed for outdoor applications such as a... more Many Zigbee-based wireless sensor networks have been developed for outdoor applications such as agriculture monitoring. The main attractiveness of Zigbee wireless module is in its potential to set up self-organizing network that requires no network backbone and extremely low cost with low-power wireless networking. Many simulations have been performed for testing the capabilities of wireless communication device and the battery lifetime. However, the results from the simulation do not capture the actual environment effects and the simulators allow users to isolate certain factors by tuning to different parameters. This paper provides experimental results on actual voltage drop using Zigbee protocol devices when communicating temperature, humidity and soil moisture data using a 900mAh battery both in indoor and outdoor environments. It is observed that the wireless nodes are capable of relaying data up to 143 meters on unobstructed line of sights in an outdoor environment with some observation of packet drop. The results differ from previous researches that perform the experiments on shorter range which only covers 50 cm distance between transmitter node and receiver node for 2 bytes of data transfer. The paper proposes a new method for battery lifetime estimation which is derived from number of times data packet can be transmitted. This study also suggests to conduct experiment by including the environmental factors to capture the actual performance of wireless device and the impact to packet drop. The experiment concludes the suitability of Zigbee wireless communication for short-range applications of up to 143 meters which is significantly farther than other reported experiments.

Research paper thumbnail of IDTracS: an Interest-Data-flow tracking-based forwarding scheme for vehicular named data networks

The Journal of Supercomputing

Research paper thumbnail of Machine Learning-Based Intrusion Detection Approaches for Secured Internet of Things

Research paper thumbnail of An Integrated Cloud and Blockchain Enabled Platforms for Biomedical Research

Research paper thumbnail of GeoISA: A new road-topology-assisted geo-based content discovery scheme for vehicular named data networking

Vehicular Communications

Content discovery represents a key foundation in realizing the promising vehicular named data net... more Content discovery represents a key foundation in realizing the promising vehicular named data networking (VNDN). The highly dynamic topology of VNDN prevents content discovery from becoming a straightforward task. In the VNDN literature, vehicle-to-vehicle content discovery mainly has flooding and time-contention-based (TCB) schemes. However, these schemes have transmission overhead issues or/and do not guarantee Interest forwarding in multiple directions. Thus, the likelihood of packet loss and retransmission is high, or/and the likelihood of locating content sources opportunities is low. Therefore, we proposed a new road-topology-assisted geo-based content discovery scheme for VNDN, termed GeoISA, to address the problems mentioned. In GeoISA, we first designed a new Interest forwarding suppression control mechanism named Interest suppression area (ISA). ISA demarcates an Interest forwarding suppression geo-area to determine the nodes' forwarding direction similarity and ensure forwarding Interest over different forwarding directions. Each road's pathway direction is considered a different Interest forwarding direction. The nodes' geo-position and traveling direction and the road's number of lanes and lane identifiers are involved in ISA demarcation. Second, an ISA-assisted distance-based TCB Interest forwarding strategy (GIDiS) was proposed to mitigate broadcast concerns. Finally, we conducted a simulation-based evaluation to compare GeoISA performance with the performance of four state-of-the-art solutions in an urban area scenario. Results demonstrate that GeoISA outperforms the other considered solutions regarding the Interest satisfaction ratio and the delay and path length (hops count) of the content delivery at the expense of a moderate transmission overhead. GeoISA can help ensure widespread Interest forwarding in many directions to boost the discovery of content sources and network topology in TCB schemes and intelligent context-aware forwarding solutions.

Research paper thumbnail of Achieving liveness in validators' performance efficiency consensus (VPEC) based blockchain system using the Zakat principles

2022 International Conference on Cyber Resilience (ICCR)

Research paper thumbnail of Private blockchain-based encryption framework using computational intelligence approach

Egyptian Informatics Journal

Research paper thumbnail of Lightweight Security Mechanism over MQTT Protocol for IoT Devices

International Journal of Advanced Computer Science and Applications, 2020

Security is one of the main concerns with regard to the Internet of Things (IoT) networks. Since ... more Security is one of the main concerns with regard to the Internet of Things (IoT) networks. Since most IoT devices are restricted in resource and power consumption, it is not easy to implement robust security mechanisms. There are different methods to secure network communications; however, they are not applicable to IoT devices. In addition, most authentication methods use certificates in which signing and verifying certificates need more computation and power. The main objective of this paper is to propose a lightweight authentication and encryption mechanism for IoT constrained devices. This mechanism uses ECDHE-PSK which is the Transport Layer Security (TLS) authentication algorithm over Message Queuing Telemetry Transport (MQTT) Protocol. This authentication algorithm provides a Perfect Forward Secrecy (PFS) feature that makes an improvement in security. It is the first time that this TLS authentication algorithm is implemented and evaluated over the MQTT protocol for IoT devices. To evaluate resource consumption of the proposed security mechanism, it was compared with the default security mechanism of the MQTT protocol and the ECDHE-ECDSA that is a certificate-based authentication algorithm. They were evaluated in terms of CPU utilization, execution time, bandwidth, and power consumption. The results show that the proposed security mechanism outperforms the ECDHE-ECDSA in all tests.

Research paper thumbnail of Optimum energy harvesting model for bidirectional cognitive radio networks

EURASIP Journal on Wireless Communications and Networking, 2021

Wireless devices’ energy efficiency and spectrum shortage problem has become a key concern worldw... more Wireless devices’ energy efficiency and spectrum shortage problem has become a key concern worldwide as the number of wireless devices increases at an unparalleled speed. Wireless energy harvesting technique from traditional radio frequency signals is suitable for extending mobile devices’ battery life. This paper investigates a cognitive radio network model where primary users have their specific licensed band, and secondary users equipped with necessary hardware required for energy harvesting can use the licensed band of the primary user by smart sensing capability. Analytical expressions for considered network metrics, namely data rate, outage probability, and energy efficiency, are derived for uplink and downlink scenarios. In addition, optimal transmission power and energy harvesting power are derived for maximum energy efficiency in downlink and uplink scenarios. Numerical results show that outage probability improves high transmission power in the downlink scenario and high h...

Research paper thumbnail of Defining The Beauty Of Cyber Hygiene: A Retrospective Look

IEEE engineering management review, 2024

The Internet's widespread influence, especially during the COVID-19 pandemic, has led to ... more The Internet's widespread influence, especially during the COVID-19 pandemic, has led to a surge in remote work and increased online activities, simultaneously amplifying the risk of cyberattacks. In response to this global shift, cyber hygiene emerges as a crucial asset in preventing cybercrimes at individual and organizational levels. This paper provides a comprehensive definition of cyber hygiene, emphasizing its role in promoting online health through ingrained practices, knowledge, behavior, and attitudes. Distinguishing cyber hygiene from cybersecurity, it situates the former as an integral facet within the broader cybersecurity framework. The study categorizes cyber hygiene into two primary dimensions: data privacy, protection, and prevention, and online safety measures. It highlights the benefits of adopting robust cyber hygiene practices, including safeguarding personal information, preventing cyberattacks, protecting digital assets, and fostering a positive online reputation. The research underscores the manifold advantages of prioritizing cyber hygiene. Central to the argument is the pivotal role of cyber hygiene in mitigating the escalating risks associated with increased Internet reliance. It emphasizes the transformative impact of seamlessly integrating cyber hygiene into daily routines, advocating its incorporation into individual and organizational cybersecurity practices. The recommendations stress the critical role of cyber hygiene in minimizing system compromises, building trust in collaborative engineering environments, and safeguarding invaluable information. In navigating an era defined by heightened connectivity, understanding and actively implementing resilient cyber hygiene practices stand as imperative measures for fortifying the security of our digital landscape.

Research paper thumbnail of A Model of Electronic Customer Relationship Management System Adoption In Telecommunication Companies

Revista Amazonía investiga, Dec 28, 2020

Un modelo de adopción del sistema electrónico de gestión de relaciones con el cliente en empresas... more Un modelo de adopción del sistema electrónico de gestión de relaciones con el cliente en empresas de telecomunicaciones

Research paper thumbnail of Explicit Routing for Popular Content in Named Data Network

Research paper thumbnail of Challenges in data representation for efficient execution of encryption operation

Bulletin of Electrical Engineering and Informatics, Apr 1, 2024

Research paper thumbnail of Exploring Service Quality Dimensions of IT Shared Services in the Malaysian Public Sector

International journal of advanced trends in computer science and engineering, Sep 15, 2019

Sharing services is an increasingly viable business strategy involving the consolidation of suppo... more Sharing services is an increasingly viable business strategy involving the consolidation of support functions managed by one agency or known as a shared service organization or shared service center. The intention is to provide a more effective and efficient service to the organization. In order to ensure that the service quality of the shared services is consistently excellent, customer satisfaction is one of the best tools to measure the performance level of the services provided. There have been few studies on shared services relating to the Information Systems domain. Thus, there are many research opportunities, especially for the outcome and evaluation phases. For this research, we need to know the relevant quality dimension for shared services. This paper explores the dimensions and factors of service quality for IT Shared Services. It then develops the service quality model for measuring IT shared services customer satisfaction based on past studies and interviews with shared services IT managers in MAMPU. Three case studies on IT infrastructure shared services in the public sector of Malaysia are used. This article recommends nine (9) dimensions, namely tangibles, reliability, responsiveness, assurance, empathy, continuous service improvement, change management, technology availability and security. The dimensions identified will assist the shared service organization in giving priority attention to improving service quality delivery.

Research paper thumbnail of Security and Privacy Challenges in Cloud Computing

Cloud computing plays a crucial role in supporting the virtualization synergy as there is a large... more Cloud computing plays a crucial role in supporting the virtualization synergy as there is a large-scale demand among users in adopting cloud solutions. However, preserving the security of storage while maintaining users’ privacy brings new challenges in protecting cloud computing from illegal access and shared network environment. Thus, Risk-Adaptable Access Control (RAdAC) is known within privacy-preserving perspective as a flexible prospect in managing exceptional access request and reacting to suspicious user. However, most of the previous work on the cloud security focused on storage security rather than anonymity of user nor identity. This paper explores the fundamental concept of cloud computing architecture and identifies the security requirements in cloud. In this work, the prerequisite elements in RAdAC framework has been discussed precisely and ambiguity factor is found in protecting privacy of user. Thus, we proposed the viable two-factor authentication scheme in RAdAC for future road ahead in cloud industry.

Research paper thumbnail of Enhanced Buffer Management Policy and Packet Prioritization for Wireless Sensor Network

International Journal on Advanced Science, Engineering and Information Technology, Sep 30, 2018

Limited storage of the sensor node is one of the main causes of packet drop in the Wireless senso... more Limited storage of the sensor node is one of the main causes of packet drop in the Wireless sensor network (WSN). Frequent link disconnection is also another cause of packet drop. Due to lack of continues end-to-end connection; neighbouring nodes might not be able to connect with one another. Hence, communication may be setup with the help of store and forward approach between the source and destination. In that case, the sensor node may not be capable of storing a chunk of data since the buffer is available in a small amount. In order to store the data packets in the buffer when the link is down, an effective buffer management scheme is highly needed to keep the data packets for a long time until the link is re-established. This paper proposes a new buffer management scheme called Packet Priority Heterogonous Queue (PPHQ), which based on prioritizing and classifying the packets into different categories to minimize the loss of important packets. Unlike the existing Multi-layer WSN, that treats the data packets differently; we considered the data packets such as; temperature, humidity, and pressure to be same. However, the classification of different packet types is based on the sensor's information value. We completely divide the whole buffer into different queues, and thus the newly arrived packets are inserted in their corresponding queue. The buffer will then prioritize and schedule on which packet to be stored or transmit first when the buffer is overloaded. Our result exhibits that PPHQ scheme indeed provides minimum packet drop as well as maximum throughput compared to existing Multi-layer WSN buffer management schemes.

Research paper thumbnail of Towards Secure Risk-Adaptable Access Control in Cloud Computing

International Journal of Advanced Computer Science and Applications, 2018

The emergence of pervasive cloud computing has supported the transition of physical data and mach... more The emergence of pervasive cloud computing has supported the transition of physical data and machine into virtualization environment. However, security threat and privacy have been identified as a challenge to support the widespread adoption of cloud among user. Moreover, user awareness on the importance of cloud computing has increase the needs to safeguard the cloud by implementing access control that works on dynamic environment. Therefore, the emergence of Risk-Adaptable Access Control (RAdAC) as a flexible medium in handling exceptional access request is a great countermeasure to deal with security and privacy challenges. However, the rising problem in safeguarding users' privacy in RAdAC model has not been discussed in depth by other researcher. This paper explores the architecture of cloud computing and defines the existing solutions influencing the adoption of cloud among user. At the same time, the obscurity factor in protecting privacy of user is found within RAdAC framework. Similarly, the two-tier authentication scheme in RAdAC has been proposed in responding to security and privacy challenges as shown through informal security analysis.

Research paper thumbnail of Battery Measurement on Experimental Testbed for Wireless Communication through Xbee

Many Zigbee-based wireless sensor networks have been developed for agriculture monitoring. The ma... more Many Zigbee-based wireless sensor networks have been developed for agriculture monitoring. The main attractiveness of Zigbee wireless technology is in its potential to set up self-organizing network that requires no network backbone and extremely low cost with low-power wireless networking. This paper provides experimental test results on actual voltage measurement using Zigbee protocol devices when communicating temperature, humidity and soil moisture data. The nodes are capable of relaying data up to 143 meters outdoor on unobstructed line of sights with requirement 5% data loss is fulfilled. The results can be used for battery lifetime prediction and suggest the suitability for Zigbee wireless communication for short-range outdoor applications.

Research paper thumbnail of Symbol time offset synchronization based on training sequence

Orthogonal Frequency Division Multiplexing (OFDM) is a modulation structure of digital multi- car... more Orthogonal Frequency Division Multiplexing (OFDM) is a modulation structure of digital multi- carriers that spreads the idea of a single subcarrier modulation within the same single channel by using multiple subcarriers. OFDM utilizes numerous carefully diverged orthogonal subcarriers, which are parallel transmitted. However, OFDM systems are very sensitive to synchronization errors that reduces orthogonality between sub-carriers, thereby degrading performance significantly. The synchronization problem can lead to two other problems: Carrier Frequency Offset (CFO), which leads to inter-carrier interference (ICI), and Symbol Time Offset (STO), which results in inter-symbol interference (ISI). In this research, a modified method is proposed for STO estimation using a training sequence (TS). The comparison shows that it was better than previously used methods, such as cyclic prefix (CP) by autocorrelation, CP by square difference, and ordinary TS.

Research paper thumbnail of Development of iDISPATCH system

iDispatch is a courier system used to manage local deliveries and handle issues with the current ... more iDispatch is a courier system used to manage local deliveries and handle issues with the current delivery method. By using the system, the seller could ensure that the dispatcher would deliver the product to the right buyer by using QR Code. The system also could show the delivery tracking status by displaying the current location of the dispatcher in a real time so that the buyer can view the current location and estimate the time for the dispatcher to arrive. iDispatch can help small and medium size businesses to improve their delivery methods and increase the trust between the sellers, buyers and dispatcher.

Research paper thumbnail of A New Method for Battery Lifetime Estimation Using Experimental Testbed for Zigbee Wireless Technology

International Journal on Advanced Science, Engineering and Information Technology, Dec 30, 2018

Many Zigbee-based wireless sensor networks have been developed for outdoor applications such as a... more Many Zigbee-based wireless sensor networks have been developed for outdoor applications such as agriculture monitoring. The main attractiveness of Zigbee wireless module is in its potential to set up self-organizing network that requires no network backbone and extremely low cost with low-power wireless networking. Many simulations have been performed for testing the capabilities of wireless communication device and the battery lifetime. However, the results from the simulation do not capture the actual environment effects and the simulators allow users to isolate certain factors by tuning to different parameters. This paper provides experimental results on actual voltage drop using Zigbee protocol devices when communicating temperature, humidity and soil moisture data using a 900mAh battery both in indoor and outdoor environments. It is observed that the wireless nodes are capable of relaying data up to 143 meters on unobstructed line of sights in an outdoor environment with some observation of packet drop. The results differ from previous researches that perform the experiments on shorter range which only covers 50 cm distance between transmitter node and receiver node for 2 bytes of data transfer. The paper proposes a new method for battery lifetime estimation which is derived from number of times data packet can be transmitted. This study also suggests to conduct experiment by including the environmental factors to capture the actual performance of wireless device and the impact to packet drop. The experiment concludes the suitability of Zigbee wireless communication for short-range applications of up to 143 meters which is significantly farther than other reported experiments.

Research paper thumbnail of IDTracS: an Interest-Data-flow tracking-based forwarding scheme for vehicular named data networks

The Journal of Supercomputing

Research paper thumbnail of Machine Learning-Based Intrusion Detection Approaches for Secured Internet of Things

Research paper thumbnail of An Integrated Cloud and Blockchain Enabled Platforms for Biomedical Research

Research paper thumbnail of GeoISA: A new road-topology-assisted geo-based content discovery scheme for vehicular named data networking

Vehicular Communications

Content discovery represents a key foundation in realizing the promising vehicular named data net... more Content discovery represents a key foundation in realizing the promising vehicular named data networking (VNDN). The highly dynamic topology of VNDN prevents content discovery from becoming a straightforward task. In the VNDN literature, vehicle-to-vehicle content discovery mainly has flooding and time-contention-based (TCB) schemes. However, these schemes have transmission overhead issues or/and do not guarantee Interest forwarding in multiple directions. Thus, the likelihood of packet loss and retransmission is high, or/and the likelihood of locating content sources opportunities is low. Therefore, we proposed a new road-topology-assisted geo-based content discovery scheme for VNDN, termed GeoISA, to address the problems mentioned. In GeoISA, we first designed a new Interest forwarding suppression control mechanism named Interest suppression area (ISA). ISA demarcates an Interest forwarding suppression geo-area to determine the nodes' forwarding direction similarity and ensure forwarding Interest over different forwarding directions. Each road's pathway direction is considered a different Interest forwarding direction. The nodes' geo-position and traveling direction and the road's number of lanes and lane identifiers are involved in ISA demarcation. Second, an ISA-assisted distance-based TCB Interest forwarding strategy (GIDiS) was proposed to mitigate broadcast concerns. Finally, we conducted a simulation-based evaluation to compare GeoISA performance with the performance of four state-of-the-art solutions in an urban area scenario. Results demonstrate that GeoISA outperforms the other considered solutions regarding the Interest satisfaction ratio and the delay and path length (hops count) of the content delivery at the expense of a moderate transmission overhead. GeoISA can help ensure widespread Interest forwarding in many directions to boost the discovery of content sources and network topology in TCB schemes and intelligent context-aware forwarding solutions.

Research paper thumbnail of Achieving liveness in validators' performance efficiency consensus (VPEC) based blockchain system using the Zakat principles

2022 International Conference on Cyber Resilience (ICCR)

Research paper thumbnail of Private blockchain-based encryption framework using computational intelligence approach

Egyptian Informatics Journal

Research paper thumbnail of Lightweight Security Mechanism over MQTT Protocol for IoT Devices

International Journal of Advanced Computer Science and Applications, 2020

Security is one of the main concerns with regard to the Internet of Things (IoT) networks. Since ... more Security is one of the main concerns with regard to the Internet of Things (IoT) networks. Since most IoT devices are restricted in resource and power consumption, it is not easy to implement robust security mechanisms. There are different methods to secure network communications; however, they are not applicable to IoT devices. In addition, most authentication methods use certificates in which signing and verifying certificates need more computation and power. The main objective of this paper is to propose a lightweight authentication and encryption mechanism for IoT constrained devices. This mechanism uses ECDHE-PSK which is the Transport Layer Security (TLS) authentication algorithm over Message Queuing Telemetry Transport (MQTT) Protocol. This authentication algorithm provides a Perfect Forward Secrecy (PFS) feature that makes an improvement in security. It is the first time that this TLS authentication algorithm is implemented and evaluated over the MQTT protocol for IoT devices. To evaluate resource consumption of the proposed security mechanism, it was compared with the default security mechanism of the MQTT protocol and the ECDHE-ECDSA that is a certificate-based authentication algorithm. They were evaluated in terms of CPU utilization, execution time, bandwidth, and power consumption. The results show that the proposed security mechanism outperforms the ECDHE-ECDSA in all tests.

Research paper thumbnail of Optimum energy harvesting model for bidirectional cognitive radio networks

EURASIP Journal on Wireless Communications and Networking, 2021

Wireless devices’ energy efficiency and spectrum shortage problem has become a key concern worldw... more Wireless devices’ energy efficiency and spectrum shortage problem has become a key concern worldwide as the number of wireless devices increases at an unparalleled speed. Wireless energy harvesting technique from traditional radio frequency signals is suitable for extending mobile devices’ battery life. This paper investigates a cognitive radio network model where primary users have their specific licensed band, and secondary users equipped with necessary hardware required for energy harvesting can use the licensed band of the primary user by smart sensing capability. Analytical expressions for considered network metrics, namely data rate, outage probability, and energy efficiency, are derived for uplink and downlink scenarios. In addition, optimal transmission power and energy harvesting power are derived for maximum energy efficiency in downlink and uplink scenarios. Numerical results show that outage probability improves high transmission power in the downlink scenario and high h...