Cheikhrouhou Omar | Taif University, Kingdom of Saudi Arabia (original) (raw)
Papers by Cheikhrouhou Omar
Security and Communication Networks, 2021
The adoption of Internet of Things (IoT) technology across many applications, such as autonomous ... more The adoption of Internet of Things (IoT) technology across many applications, such as autonomous systems, communication, and healthcare, is driving the market’s growth at a positive rate. The emergence of advanced data analytics techniques such as blockchain for connected IoT devices has the potential to reduce the cost and increase in cloud platform adoption. Blockchain is a key technology for real-time IoT applications providing trust in distributed robotic systems running on embedded hardware without the need for certification authorities. There are many challenges in blockchain IoT applications such as the power consumption and the execution time. These specific constraints have to be carefully considered besides other constraints such as number of nodes and data security. In this paper, a novel approach is discussed based on hybrid HW/SW architecture and designed for Proof of Work (PoW) consensus which is the most used consensus mechanism in blockchain. The proposed architectur...
Cybersecurity is an inherent characteristic that should be addressed before the large deployment... more Cybersecurity is an inherent characteristic that should be addressed before the large deployment of smart city applications. Recently, Blockchain appears as a promising technology to provide several cybersecurity aspects of smart city applications. This paper provides a comprehensive review of the existing blockchain-based solutions for the cybersecurity of the main smart city applications, namely smart healthcare, smart transportation, smart agriculture, supply chain management, smart grid, and smart homes. We describe the existing solutions and we discuss their merits and limits. Moreover, we define the security requirements of each smart city application and we give a mapping of the studied solutions to these defined requirements. Additionally, future directions are given. We believe that the present survey is a good starting point for every researcher in the fields of cybersecurity, blockchain, and smart cities.
Mathematical Problems in Engineering, 2021
The advanced technology Internet of Things (IoT) visualizes a worldwide, that is, internally conn... more The advanced technology Internet of Things (IoT) visualizes a worldwide, that is, internally connected, networks of smart physical entities. IoT is a promising technology used in several applications including disaster management. In disaster management, the role of IoT is so important and ubiquitous and could be life-saving. This article describes the role of IoT in disaster management. More precisely, it presents IoT-based disaster management for different kind of disasters with a comparison between some solutions that are available in the market. It shows an implementation of some examples of the application of IoT such as early-warning system for fire detection and earthquake and represents some approaches talking about the application, IoT architecture, and focusing of the study on different disasters. This study could be a good guide to stakeholder about the use of IoT technology to secure their smart cities’ infrastructure and to manage disaster and reduce risks.
Journal of Network and Computer Applications, 2016
IEEE Access, 2021
Position awareness is very important for many sensor network applications. However, the use of Gl... more Position awareness is very important for many sensor network applications. However, the use of Global Positioning System receivers to every sensor node is very costly. Therefore, anchor based localization techniques are proposed. The lack of anchors in some Wireless Sensor Networks lead to the appearance of multi-hop localization, which permits to localize nodes even if they are far from anchors. One of the well-known multi-hop localization algorithms is the Distance Vector-Hop algorithm (DV-Hop). Although its simplicity, DV-Hop presents some deficiencies in terms of localization accuracy. Therefore, to deal with this issue, we propose in this paper an improvement of DV-Hop algorithm, called Regularized Least Square DV-Hop Localization Algorithm for multi-hop wireless sensors networks. The proposed solution improves the location accuracy of sensor nodes within their sensing field in both isotropic and anisotropic networks. We used the double Least Square localization method and the statistical filtering optimization strategy, which is the Regularized Least Square method. Simulation results prove that the proposed algorithm outperforms the original DV-Hop algorithm with up to 60%, as well as other related works, in terms of localization accuracy.
Electronics
Event detection is usually the primary purpose of wireless sensor networks (WSNs). Therefore, it ... more Event detection is usually the primary purpose of wireless sensor networks (WSNs). Therefore, it is crucial to determine where and when an event occurs in order to map the event to its spatio-temporal domain. In WSN localization, a few anchor nodes are those aware of their locations via the Global Positioning System (GPS), which is energy-consuming. Non-anchor nodes self-localize by gathering information from anchor nodes to estimate their positions using a localization technique. Traditional algorithms use at least three static anchors for the localization process. Recently, researchers opted to replace multiple static anchors by a single mobile anchor during the localization process. This paper proposes a Kalman filter based on bounding box localization algorithm (KF-BBLA) in WSNs with mobile anchor node. We present a new mobile anchor localization strategy to minimize energy, hardware costs, and computation complexity, while improving accuracy and cost-effectiveness. Network conn...
Security and Communication Networks, 2022
In the transmission of medical images, if the image is not processed, it is very likely to leak d... more In the transmission of medical images, if the image is not processed, it is very likely to leak data and personal privacy, resulting in unpredictable consequences. Traditional encryption algorithms have limited ability to deal with complex data. The chaotic system is characterized by randomness and ergodicity, which has advantages over traditional encryption algorithms in image encryption processing. A novel V-net convolutional neural network (CNN) based on four-dimensional hyperchaotic system for medical image encryption is presented in this study. Firstly, the plaintext medical images are processed into 4D hyperchaotic sequence images, including image segmentation, chaotic system processing, and pseudorandom sequence generation. Then, V-net CNN is used to train chaotic sequences to eliminate the periodicity of chaotic sequences. Finally, the chaotic sequence image is diffused to change the raw image pixel to realize the encryption processing. Simulation test analysis demonstrates ...
Wireless Communications and Mobile Computing, 2021
Multicontroller software-defined networks have been widely adopted to enable management of large-... more Multicontroller software-defined networks have been widely adopted to enable management of large-scale networks. However, they are vulnerable to several attacks including false data injection, which creates topology inconsistency among controllers. To deal with this issue, we propose BMC-SDN, a security architecture that integrates blockchain and multicontroller SDN and divides the network into several domains. Each SDN domain is managed by one master controller that communicates through blockchain with the masters of the other domains. The master controller creates blocks of network flow updates, and its redundant controllers validate the new block based on a proposed reputation mechanism. The reputation mechanism rates the controllers, i.e., block creator and voters, after each voting operation using constant and combined adaptive fading reputation strategies. The evaluation results demonstrate a fast and optimal detection of fraudulent flow rule injection.
Journal of Healthcare Engineering, 2021
Because of the availability of more than an actor and a wireless component among e-health applica... more Because of the availability of more than an actor and a wireless component among e-health applications, providing more security and safety is expected. Moreover, ensuring data confidentiality within different services becomes a key requirement. In this paper, we propose to collect data from health and fitness smart devices deployed in connection with the proposed IoT blockchain platform. The use of these devices helps us in extracting an amount of highly valuable heath data that are filtered, analyzed, and stored in electronic health records (EHRs). Different actors of the platform, coaches, patients, and doctors, collaborate to provide an on-time diagnosis and treatment for various diseases in an easy and cost-effective way. Our main purpose is to provide a distributed, secure, and authorized access to these sensitive data using the Ethereum blockchain technology. We have designed an integrated low-powered IoT blockchain platform for a healthcare application to store and review EHR...
Electronics, 2021
Due to the COVID-19 pandemic, the world has faced a significant challenge in the increase of the ... more Due to the COVID-19 pandemic, the world has faced a significant challenge in the increase of the rate of morbidity and mortality among people, particularly the elderly aged patients. The risk of acquiring infections may increase during the visit of patients to the hospitals. The utilisation of technology such as the “Internet of Things (IoT)” based on Fog Computing and Cloud Computing turned out to be efficient in enhancing the healthcare quality services for the patients. The present paper aims at gaining a better understanding and insights into the most effective and novel IoT-based applications such as Cloud Computing and Fog Computing and their implementations in the healthcare field. The research methodology employed the collection of the information from the databases such as PubMed, Google Scholar, MEDLINE, and Science Direct. There are five research articles selected after 2015 based on the inclusion and exclusion criteria set for the study. The findings of the studies inclu...
2020 5th International Conference on Advanced Technologies for Signal and Image Processing (ATSIP), 2020
Lecture Notes in Computer Science, 2021
Wireless Communications and Mobile Computing, 2020
The emergence of cognitive computing and big data analytics revolutionize the healthcare domain, ... more The emergence of cognitive computing and big data analytics revolutionize the healthcare domain, more specifically in detecting cancer. Lung cancer is one of the major reasons for death worldwide. The pulmonary nodules in the lung can be cancerous after development. Early detection of the pulmonary nodules can lead to early treatment and a significant reduction of death. In this paper, we proposed an end-to-end convolutional neural network- (CNN-) based automatic pulmonary nodule detection and classification system. The proposed CNN architecture has only four convolutional layers and is, therefore, light in nature. Each convolutional layer consists of two consecutive convolutional blocks, a connector convolutional block, nonlinear activation functions after each block, and a pooling block. The experiments are carried out using the Lung Image Database Consortium (LIDC) database. From the LIDC database, 1279 sample images are selected of which 569 are noncancerous, 278 are benign, and...
2010 IEEE 30th International Conference on Distributed Computing Systems Workshops, 2010
Group communication in Wireless Sensor Networks (WSNs) requires an efficient multicast routing me... more Group communication in Wireless Sensor Networks (WSNs) requires an efficient multicast routing mechanism due to inherent resources and computing constraints of sensor nodes. ZigBee, which is a standard protocol that represents a very prominent technology for WSNs, does not consider multicast routing in its specification. In this paper, a group is defined as a set of nodes that share the same sensory information. The main contributions of this paper are two-folded: First, we propose Z-Cast, an efficient multicast routing mechanism for groups that share the same sensory information in a cluster-tree WSN. Second, we show how to integrate the Z-Cast mechanism in open-ZB which is an open source IEEE 802.15.4/ZigBee implementation. Finally, we demonstrate the efficiency and backward compatibility of our proposal with the standard specification.
IEEE Access, 2021
Cardiovascular diseases are considered the number one cause of death across the globe which can b... more Cardiovascular diseases are considered the number one cause of death across the globe which can be primarily identified by the abnormal heart rhythms of the patients. By generating electrocardiogram (ECG) signals, wearable Internet of Things (IoT) devices can consistently track the patient's heart rhythms. Although Cloud-based approaches for ECG analysis can achieve some levels of accuracy, they still have some limitations, such as high latency. Conversely, the Fog computing infrastructure is more powerful than edge devices but less capable than Cloud computing for executing compositionally intensive data analytic software. The Fog infrastructure can consist of Fog-based gateways directly connected with the wearable devices to offer many advanced benefits, including low latency and high quality of services. To address these issues, a modular one-dimensional convolution neural network (1D-CNN) approach is proposed in this work. The inference module of the proposed approach is deployable over the Fog infrastructure for analysing the ECG signals and initiating the emergency countermeasures within a minimum delay, whereas its training module is executable on the computationally enriched Cloud data centers. The proposed approach achieves the F1-measure score ≈1 on the MIT-BIH Arrhythmia database when applying GridSearch algorithm with the cross-validation method. This approach has also been implemented on a single-board computer and Google Colab-based hybrid Fog-Cloud infrastructure and embodied to a remote patient monitoring system that shows 25% improvement in the overall response time.
Sensors (Basel, Switzerland), Jan 8, 2018
With the increasing realization of the Internet-of-Things (IoT) and rapid proliferation of wirele... more With the increasing realization of the Internet-of-Things (IoT) and rapid proliferation of wireless sensor networks (WSN), estimating the location of wireless sensor nodes is emerging as an important issue. Traditional ranging based localization algorithms use triangulation for estimating the physical location of only those wireless nodes that are within one-hop distance from the anchor nodes. Multi-hop localization algorithms, on the other hand, aim at localizing the wireless nodes that can physically be residing at multiple hops away from anchor nodes. These latter algorithms have attracted a growing interest from research community due to the smaller number of required anchor nodes. One such algorithm, known as DV-Hop (Distance Vector Hop), has gained popularity due to its simplicity and lower cost. However, DV-Hop suffers from reduced accuracy due to the fact that it exploits only the network topology (i.e., number of hops to anchors) rather than the distances between pairs of n...
International Journal of Trend in Scientific Research and Development, 2018
Structured Query Language (SQL) Injection is a code injection technique that exploits security vu... more Structured Query Language (SQL) Injection is a code injection technique that exploits security vulnerability occurring in database layer of web applications [8]. According to Open Web Application Security Projects (OWASP), SQL Injection is one of top 10 web based attacks [10]. This paper shows the basics of SQL Injection attack, types of SQL Injection Attack according to their classification. It also describes the survey of different SQL Injection attack detection prevention. At the end of this paper, the comparison of different SQL Injection Attack detection and prevention is shown.
ICM 2011 Proceeding, 2011
The explosive growth in the use of mobile and wireless devices demands a new generation of remote... more The explosive growth in the use of mobile and wireless devices demands a new generation of remote user authentication schemes that has to accommodate limitations on power and bandwidth, at the same time, to provide an adequate level of security for transferred data in wireless networks. In this paper, we present a new method of access control adapted to constrained
Web application attacks are incessantly increasing in number and in severity. The big data availa... more Web application attacks are incessantly increasing in number and in severity. The big data available on the internet motivates hackers to launch new kind of attacks. In this context, intensive research on web application security have been conducted. The most dangerous attack that target web applications is the Structured Query Language Injection (SQLI). This attack represents a serious threat to the web applications. Several research works have been conducted to mitigate this attack either by preventing it from an early stage or detecting it when it occurs. In this paper, we present an overview of the SQL injection attack and a classification of the newly proposed detection and prevention solutions. We classify the different attack sources, goals, and types. Moreover, we discuss and classify the most important and recent proposed solutions to mitigate this attack especially those based on ontology and machine learning.
— The explosive growth in the use of mobile and wireless devices demands a new generation of remo... more — The explosive growth in the use of mobile and wireless devices demands a new generation of remote user authentication schemes that has to accommodate limitations on power and bandwidth, at the same time, to provide an adequate level of security for transferred data in wireless networks. In this paper, we present a new method of access control adapted to constrained Wireless Sensor Networks (WSNs), that's provide access to legitimate users and deny access to illegitimate ones. Our scheme is based on the ID-based techniques and the Elliptic Curve Cryptography (ECC). The proposed protocol provides mutual authentication and key establishment between the user and a gateway node in the WSN.
Security and Communication Networks, 2021
The adoption of Internet of Things (IoT) technology across many applications, such as autonomous ... more The adoption of Internet of Things (IoT) technology across many applications, such as autonomous systems, communication, and healthcare, is driving the market’s growth at a positive rate. The emergence of advanced data analytics techniques such as blockchain for connected IoT devices has the potential to reduce the cost and increase in cloud platform adoption. Blockchain is a key technology for real-time IoT applications providing trust in distributed robotic systems running on embedded hardware without the need for certification authorities. There are many challenges in blockchain IoT applications such as the power consumption and the execution time. These specific constraints have to be carefully considered besides other constraints such as number of nodes and data security. In this paper, a novel approach is discussed based on hybrid HW/SW architecture and designed for Proof of Work (PoW) consensus which is the most used consensus mechanism in blockchain. The proposed architectur...
Cybersecurity is an inherent characteristic that should be addressed before the large deployment... more Cybersecurity is an inherent characteristic that should be addressed before the large deployment of smart city applications. Recently, Blockchain appears as a promising technology to provide several cybersecurity aspects of smart city applications. This paper provides a comprehensive review of the existing blockchain-based solutions for the cybersecurity of the main smart city applications, namely smart healthcare, smart transportation, smart agriculture, supply chain management, smart grid, and smart homes. We describe the existing solutions and we discuss their merits and limits. Moreover, we define the security requirements of each smart city application and we give a mapping of the studied solutions to these defined requirements. Additionally, future directions are given. We believe that the present survey is a good starting point for every researcher in the fields of cybersecurity, blockchain, and smart cities.
Mathematical Problems in Engineering, 2021
The advanced technology Internet of Things (IoT) visualizes a worldwide, that is, internally conn... more The advanced technology Internet of Things (IoT) visualizes a worldwide, that is, internally connected, networks of smart physical entities. IoT is a promising technology used in several applications including disaster management. In disaster management, the role of IoT is so important and ubiquitous and could be life-saving. This article describes the role of IoT in disaster management. More precisely, it presents IoT-based disaster management for different kind of disasters with a comparison between some solutions that are available in the market. It shows an implementation of some examples of the application of IoT such as early-warning system for fire detection and earthquake and represents some approaches talking about the application, IoT architecture, and focusing of the study on different disasters. This study could be a good guide to stakeholder about the use of IoT technology to secure their smart cities’ infrastructure and to manage disaster and reduce risks.
Journal of Network and Computer Applications, 2016
IEEE Access, 2021
Position awareness is very important for many sensor network applications. However, the use of Gl... more Position awareness is very important for many sensor network applications. However, the use of Global Positioning System receivers to every sensor node is very costly. Therefore, anchor based localization techniques are proposed. The lack of anchors in some Wireless Sensor Networks lead to the appearance of multi-hop localization, which permits to localize nodes even if they are far from anchors. One of the well-known multi-hop localization algorithms is the Distance Vector-Hop algorithm (DV-Hop). Although its simplicity, DV-Hop presents some deficiencies in terms of localization accuracy. Therefore, to deal with this issue, we propose in this paper an improvement of DV-Hop algorithm, called Regularized Least Square DV-Hop Localization Algorithm for multi-hop wireless sensors networks. The proposed solution improves the location accuracy of sensor nodes within their sensing field in both isotropic and anisotropic networks. We used the double Least Square localization method and the statistical filtering optimization strategy, which is the Regularized Least Square method. Simulation results prove that the proposed algorithm outperforms the original DV-Hop algorithm with up to 60%, as well as other related works, in terms of localization accuracy.
Electronics
Event detection is usually the primary purpose of wireless sensor networks (WSNs). Therefore, it ... more Event detection is usually the primary purpose of wireless sensor networks (WSNs). Therefore, it is crucial to determine where and when an event occurs in order to map the event to its spatio-temporal domain. In WSN localization, a few anchor nodes are those aware of their locations via the Global Positioning System (GPS), which is energy-consuming. Non-anchor nodes self-localize by gathering information from anchor nodes to estimate their positions using a localization technique. Traditional algorithms use at least three static anchors for the localization process. Recently, researchers opted to replace multiple static anchors by a single mobile anchor during the localization process. This paper proposes a Kalman filter based on bounding box localization algorithm (KF-BBLA) in WSNs with mobile anchor node. We present a new mobile anchor localization strategy to minimize energy, hardware costs, and computation complexity, while improving accuracy and cost-effectiveness. Network conn...
Security and Communication Networks, 2022
In the transmission of medical images, if the image is not processed, it is very likely to leak d... more In the transmission of medical images, if the image is not processed, it is very likely to leak data and personal privacy, resulting in unpredictable consequences. Traditional encryption algorithms have limited ability to deal with complex data. The chaotic system is characterized by randomness and ergodicity, which has advantages over traditional encryption algorithms in image encryption processing. A novel V-net convolutional neural network (CNN) based on four-dimensional hyperchaotic system for medical image encryption is presented in this study. Firstly, the plaintext medical images are processed into 4D hyperchaotic sequence images, including image segmentation, chaotic system processing, and pseudorandom sequence generation. Then, V-net CNN is used to train chaotic sequences to eliminate the periodicity of chaotic sequences. Finally, the chaotic sequence image is diffused to change the raw image pixel to realize the encryption processing. Simulation test analysis demonstrates ...
Wireless Communications and Mobile Computing, 2021
Multicontroller software-defined networks have been widely adopted to enable management of large-... more Multicontroller software-defined networks have been widely adopted to enable management of large-scale networks. However, they are vulnerable to several attacks including false data injection, which creates topology inconsistency among controllers. To deal with this issue, we propose BMC-SDN, a security architecture that integrates blockchain and multicontroller SDN and divides the network into several domains. Each SDN domain is managed by one master controller that communicates through blockchain with the masters of the other domains. The master controller creates blocks of network flow updates, and its redundant controllers validate the new block based on a proposed reputation mechanism. The reputation mechanism rates the controllers, i.e., block creator and voters, after each voting operation using constant and combined adaptive fading reputation strategies. The evaluation results demonstrate a fast and optimal detection of fraudulent flow rule injection.
Journal of Healthcare Engineering, 2021
Because of the availability of more than an actor and a wireless component among e-health applica... more Because of the availability of more than an actor and a wireless component among e-health applications, providing more security and safety is expected. Moreover, ensuring data confidentiality within different services becomes a key requirement. In this paper, we propose to collect data from health and fitness smart devices deployed in connection with the proposed IoT blockchain platform. The use of these devices helps us in extracting an amount of highly valuable heath data that are filtered, analyzed, and stored in electronic health records (EHRs). Different actors of the platform, coaches, patients, and doctors, collaborate to provide an on-time diagnosis and treatment for various diseases in an easy and cost-effective way. Our main purpose is to provide a distributed, secure, and authorized access to these sensitive data using the Ethereum blockchain technology. We have designed an integrated low-powered IoT blockchain platform for a healthcare application to store and review EHR...
Electronics, 2021
Due to the COVID-19 pandemic, the world has faced a significant challenge in the increase of the ... more Due to the COVID-19 pandemic, the world has faced a significant challenge in the increase of the rate of morbidity and mortality among people, particularly the elderly aged patients. The risk of acquiring infections may increase during the visit of patients to the hospitals. The utilisation of technology such as the “Internet of Things (IoT)” based on Fog Computing and Cloud Computing turned out to be efficient in enhancing the healthcare quality services for the patients. The present paper aims at gaining a better understanding and insights into the most effective and novel IoT-based applications such as Cloud Computing and Fog Computing and their implementations in the healthcare field. The research methodology employed the collection of the information from the databases such as PubMed, Google Scholar, MEDLINE, and Science Direct. There are five research articles selected after 2015 based on the inclusion and exclusion criteria set for the study. The findings of the studies inclu...
2020 5th International Conference on Advanced Technologies for Signal and Image Processing (ATSIP), 2020
Lecture Notes in Computer Science, 2021
Wireless Communications and Mobile Computing, 2020
The emergence of cognitive computing and big data analytics revolutionize the healthcare domain, ... more The emergence of cognitive computing and big data analytics revolutionize the healthcare domain, more specifically in detecting cancer. Lung cancer is one of the major reasons for death worldwide. The pulmonary nodules in the lung can be cancerous after development. Early detection of the pulmonary nodules can lead to early treatment and a significant reduction of death. In this paper, we proposed an end-to-end convolutional neural network- (CNN-) based automatic pulmonary nodule detection and classification system. The proposed CNN architecture has only four convolutional layers and is, therefore, light in nature. Each convolutional layer consists of two consecutive convolutional blocks, a connector convolutional block, nonlinear activation functions after each block, and a pooling block. The experiments are carried out using the Lung Image Database Consortium (LIDC) database. From the LIDC database, 1279 sample images are selected of which 569 are noncancerous, 278 are benign, and...
2010 IEEE 30th International Conference on Distributed Computing Systems Workshops, 2010
Group communication in Wireless Sensor Networks (WSNs) requires an efficient multicast routing me... more Group communication in Wireless Sensor Networks (WSNs) requires an efficient multicast routing mechanism due to inherent resources and computing constraints of sensor nodes. ZigBee, which is a standard protocol that represents a very prominent technology for WSNs, does not consider multicast routing in its specification. In this paper, a group is defined as a set of nodes that share the same sensory information. The main contributions of this paper are two-folded: First, we propose Z-Cast, an efficient multicast routing mechanism for groups that share the same sensory information in a cluster-tree WSN. Second, we show how to integrate the Z-Cast mechanism in open-ZB which is an open source IEEE 802.15.4/ZigBee implementation. Finally, we demonstrate the efficiency and backward compatibility of our proposal with the standard specification.
IEEE Access, 2021
Cardiovascular diseases are considered the number one cause of death across the globe which can b... more Cardiovascular diseases are considered the number one cause of death across the globe which can be primarily identified by the abnormal heart rhythms of the patients. By generating electrocardiogram (ECG) signals, wearable Internet of Things (IoT) devices can consistently track the patient's heart rhythms. Although Cloud-based approaches for ECG analysis can achieve some levels of accuracy, they still have some limitations, such as high latency. Conversely, the Fog computing infrastructure is more powerful than edge devices but less capable than Cloud computing for executing compositionally intensive data analytic software. The Fog infrastructure can consist of Fog-based gateways directly connected with the wearable devices to offer many advanced benefits, including low latency and high quality of services. To address these issues, a modular one-dimensional convolution neural network (1D-CNN) approach is proposed in this work. The inference module of the proposed approach is deployable over the Fog infrastructure for analysing the ECG signals and initiating the emergency countermeasures within a minimum delay, whereas its training module is executable on the computationally enriched Cloud data centers. The proposed approach achieves the F1-measure score ≈1 on the MIT-BIH Arrhythmia database when applying GridSearch algorithm with the cross-validation method. This approach has also been implemented on a single-board computer and Google Colab-based hybrid Fog-Cloud infrastructure and embodied to a remote patient monitoring system that shows 25% improvement in the overall response time.
Sensors (Basel, Switzerland), Jan 8, 2018
With the increasing realization of the Internet-of-Things (IoT) and rapid proliferation of wirele... more With the increasing realization of the Internet-of-Things (IoT) and rapid proliferation of wireless sensor networks (WSN), estimating the location of wireless sensor nodes is emerging as an important issue. Traditional ranging based localization algorithms use triangulation for estimating the physical location of only those wireless nodes that are within one-hop distance from the anchor nodes. Multi-hop localization algorithms, on the other hand, aim at localizing the wireless nodes that can physically be residing at multiple hops away from anchor nodes. These latter algorithms have attracted a growing interest from research community due to the smaller number of required anchor nodes. One such algorithm, known as DV-Hop (Distance Vector Hop), has gained popularity due to its simplicity and lower cost. However, DV-Hop suffers from reduced accuracy due to the fact that it exploits only the network topology (i.e., number of hops to anchors) rather than the distances between pairs of n...
International Journal of Trend in Scientific Research and Development, 2018
Structured Query Language (SQL) Injection is a code injection technique that exploits security vu... more Structured Query Language (SQL) Injection is a code injection technique that exploits security vulnerability occurring in database layer of web applications [8]. According to Open Web Application Security Projects (OWASP), SQL Injection is one of top 10 web based attacks [10]. This paper shows the basics of SQL Injection attack, types of SQL Injection Attack according to their classification. It also describes the survey of different SQL Injection attack detection prevention. At the end of this paper, the comparison of different SQL Injection Attack detection and prevention is shown.
ICM 2011 Proceeding, 2011
The explosive growth in the use of mobile and wireless devices demands a new generation of remote... more The explosive growth in the use of mobile and wireless devices demands a new generation of remote user authentication schemes that has to accommodate limitations on power and bandwidth, at the same time, to provide an adequate level of security for transferred data in wireless networks. In this paper, we present a new method of access control adapted to constrained
Web application attacks are incessantly increasing in number and in severity. The big data availa... more Web application attacks are incessantly increasing in number and in severity. The big data available on the internet motivates hackers to launch new kind of attacks. In this context, intensive research on web application security have been conducted. The most dangerous attack that target web applications is the Structured Query Language Injection (SQLI). This attack represents a serious threat to the web applications. Several research works have been conducted to mitigate this attack either by preventing it from an early stage or detecting it when it occurs. In this paper, we present an overview of the SQL injection attack and a classification of the newly proposed detection and prevention solutions. We classify the different attack sources, goals, and types. Moreover, we discuss and classify the most important and recent proposed solutions to mitigate this attack especially those based on ontology and machine learning.
— The explosive growth in the use of mobile and wireless devices demands a new generation of remo... more — The explosive growth in the use of mobile and wireless devices demands a new generation of remote user authentication schemes that has to accommodate limitations on power and bandwidth, at the same time, to provide an adequate level of security for transferred data in wireless networks. In this paper, we present a new method of access control adapted to constrained Wireless Sensor Networks (WSNs), that's provide access to legitimate users and deny access to illegitimate ones. Our scheme is based on the ID-based techniques and the Elliptic Curve Cryptography (ECC). The proposed protocol provides mutual authentication and key establishment between the user and a gateway node in the WSN.