Ismaila A Kamil | University of Ibadan Nigeria (original) (raw)
Papers by Ismaila A Kamil
International journal of control theory and computer modeling, Oct 30, 2018
Forced Van der Pol oscillator exhibits chaotic behaviour and instability under certain parameters... more Forced Van der Pol oscillator exhibits chaotic behaviour and instability under certain parameters and this poses a great threat to the systems where it has been applied hence, the need to develop a control method to stabilize and control chaos in a Forced Van der Pol oscillator so as to avoid damage in the controlled system and also to prevent unmodeled dynamics from being introduced in the system. Sliding Mode control makes use of the regulatory variables derived from the controlled Lyapunov function to bring the new variables to stability. The essence of using Integral Backstepping was to prevent chattering which can occur in the control input and can cause instability to the system by igniting unmodeled dynamics. Simulation was done using MATLAB and the results were provided to show the effectiveness of the proposed control method. Integral Backstepping Sliding Mode control method was effective towards stability and chaos control. It was also robust towards matched and unmatched disturbance.
Smart grid is a modernized electrical grid. It is used to collect information about behaviors of ... more Smart grid is a modernized electrical grid. It is used to collect information about behaviors of suppliers and consumers and improve the efficiency, reliability, and economics of electricity. Recently, advanced metering infrastructure is proposed as a critical part of the smart grid. The security of advanced metering infrastructure is special importance for smart grid. In order to achieve data confidentiality, privacy, and authentication in advanced metering infrastructure, a lightweight authentication and key agreement scheme is proposed in this article. The scheme provides mutual authentication, key agreement, key refreshment, and multicast mechanism which can prevent various attacks. Furthermore, we analyze the security and performance of the scheme. The analysis shows that the proposed scheme is suitable for smart grid.
International Journal of Ad Hoc and Ubiquitous Computing, 2019
In multi-hop network the efficiency of the transmission depends solely on the cooperation of all ... more In multi-hop network the efficiency of the transmission depends solely on the cooperation of all nodes in the network in relaying neighbouring nodes' data packets. Some nodes may be selfish, mischievous by dropping received packets or refuse to accept packet from other nodes whereas using other nodes resources to transmit their packets. This drastically affects the performance of the network. In this paper, a fair and effective incentive mechanism, which induces cooperation among nodes in the network is proposed. The mechanism applies auction scheme by initiating auction between the node and its immediate neighbouring nodes. The neighbouring node(s) competitively purchase packets transmission liability from the source and re-auctions it to the neighbouring node. The performance characterisation and evaluation against fairness and some possible attacks demonstrated that the scheme strongly stimulates fairness and competitiveness in message relaying among the intermediary nodes unlike other incentive based schemes.
Journal of Parallel and Distributed Computing, Sep 1, 2021
Abstract Very recently, a number of intelligent applications have evolved in smart cities such as... more Abstract Very recently, a number of intelligent applications have evolved in smart cities such as smart grid, smart parking, smart waste management, smart manufacturing, smart home, and smart health, making our cities more smarter. In the context of smart health, smart devices are employed to collect and transmit biomedical information to a medical server, allowing medical practitioners to give better and improved healthcare services. However, considering the sensitive nature of the medical data, any illegal access may have devastating effects on the patient's health condition. A lightweight privacy-preserving authentication and fine-grained access control scheme for smart health known as PAASH is proposed. In PAASH, a new ultraefficient certificateless signature scheme with compact aggregation is developed to achieve source authentication and data integrity. To achieve efficient user authorization and data confidentiality, a privacy-preserving access control technique using the developed aggregate signature and ciphertext-policy attribute-based encryption (CP-ABE) is implemented. An analysis of PAASH reveals that it can provide desirable privacy and security measures in smart health. Moreover, the formal security demonstrated in the random oracle model (ROM) shows that PAASH is semantically secure under the intractability of the Discrete Logarithm Problem (DLP). The performance evaluation shows that PAASH is par excellence practically suitable for smart health.
Internet of things, Jun 1, 2021
Abstract Fog computing is a decentralized computing infrastructure which extends the traditional ... more Abstract Fog computing is a decentralized computing infrastructure which extends the traditional cloud computing to the edge of the network, bringing data, storage, computing, and communication resources closer to end users. However, since fog servers are very close to end users and may collect sensitive information , they must be trustworthy for delegation. The traditional cryptographic solutions cannot be deployed to handle internal attacks such as that from a rogue fog that has been authenticated and has become part of the system. To this end, we put forward a bi-directional trust management system (TMS) for secure offloading and fog-to-fog collaboration, allowing a service requester (SR) to determine the trustworthiness of a service provider (SP) and the SP to check the level of trust of the SR before initiating a connection. The proposed TMS uses quality of service (QoS), quality of security (QoSec), and social relationships for direct trust computation through self-observation, and past reputation and recommendations to determine the indirect trust. The trust aggregation is based on fuzzy logic which is capable of handling the uncertainty, imprecision , and inaccuracy in a dynamic and highly mobile fog computing environment. A decay function is used to model the effect of past reputation on the present trust value and a credence function to mitigate the impact of false recommendations on the overall trust score. The results of the simulation show that the TMS could detect and mitigate about 71% and 74% of attacks, when 70% of the clients and fogs are malicious.
Engineering Applications of Artificial Intelligence, May 1, 2023
Facial makeup is a global problem from the perspective of recognition and security. In this paper... more Facial makeup is a global problem from the perspective of recognition and security. In this paper, a hybrid feature extraction method is proposed for makeup-invariant face identification and verification. The Gabor Filter Bank (GFB) and Histogram of Oriented Gradients (HOG) were applied to face images from the Virtual Makeup (VMU) database for feature extraction. The final feature vectors were generated through the combination of GFB and HOG features and classified using the City Block Distance (CBD), Euclidean Distance (EUC) and Cosine Similarity Metric (CSM). Performance evaluation of the CBD, EUC and CSM classifiers produced identification and verification rates of 97.39% and 94.12%, 96.73% and 92.16%, and 94.77% and 89.54% respectively for the VMU database. The CSM has the least recognition rate while the CBD achieved the best recognition rates. The implemented method outclassed several face recognition methods previously developed.
Computer Communications, Mar 1, 2021
Wireless body area networks play an indispensable role in the medical Internet of Things. It is a... more Wireless body area networks play an indispensable role in the medical Internet of Things. It is a network of several wearable or implantable devices that use wireless technologies to communicate. These devices usually collect the wearer's physiological data and send it to the server. Some health care providers can access the server over the network and provide medical care to the wearer. Due to the openness and mobility of the wireless network, the adversary can easily steal and forge information which exchanged in the communication channel that leaks wearer's privacy. Therefore, a secure and reliable authentication scheme is essential. Most of existing authentication schemes are based on asymmetric encryption. However, since the sensor devices in wireless body area networks are typically resource-constrained devices, their computing resources cannot afford to use asymmetric encryption. In addition, most of existing lightweight authentication schemes have various security vulnerabilities, especially the lack of forward secrecy. Therefore, we propose a secure lightweight authentication scheme for wireless body area networks. With this scheme, forward secrecy can be guaranteed without using asymmetric encryption. We use the automatic security verification tool ProVerif to verify the security of our scheme and analyze informal security. The experimental results and theoretical analysis indicate that our scheme significantly reduces the computational cost compared with the schemes using asymmetric encryption and that it has a lower security risk compared with the lightweight schemes.
Zenodo (CERN European Organization for Nuclear Research), Nov 7, 2018
Forced Van der Pol oscillator exhibits chaotic behaviour and instability under certain parameters... more Forced Van der Pol oscillator exhibits chaotic behaviour and instability under certain parameters and this poses a great threat to the systems where it has been applied hence, the need to develop a control method to stabilize and control chaos in a Forced Van der Pol oscillator so as to avoid damage in the controlled system and also to prevent unmodeled dynamics from being introduced in the system. Sliding Mode control makes use of the regulatory variables derived from the controlled Lyapunov function to bring the new variables to stability. The essence of using Integral Backstepping was to prevent chattering which can occur in the control input and can cause instability to the system by igniting unmodeled dynamics. Simulation was done using MATLAB and the results were provided to show the effectiveness of the proposed control method. Integral Backstepping Sliding Mode control method was effective towards stability and chaos control. It was also robust towards matched and unmatched disturbance.
IGI Global eBooks, 2021
In smart grids (SGs), smart meters (SMs) are usually deployed to collect and transmit customers&a... more In smart grids (SGs), smart meters (SMs) are usually deployed to collect and transmit customers' electricity consumption data in real-time to the control center. Due to the open nature of the SG communication, several privacy-preserving data aggregation schemes have been proposed to protect the privacy of customers. However, most of these schemes cannot protect against internal attackers and they are not efficient, since SMs are constrained in processing, memory, and computing capabilities. To address these problems, the authors propose a privacy-aware lightweight data aggregation scheme against internal attackers based on Elliptic Curve Cryptography (ECC). The scheme satisfies all the security requirements of SG, and supports conditional traceability, strong anonymity and autonomy. The authors demonstrate that the proposed scheme provides confidentiality based on the Computational Diffie-Hellman (CDH) assumption and unforgeability in the security model based on the intractability of the Discrete Logarithm (DL) problem. Extensive performance analysis shows that the proposed scheme is very efficient.
Journal of information security and applications, Dec 1, 2021
Applied Soft Computing, Aug 1, 2023
Journal of Emerging Trends in Engineering and Applied Sciences, 2012
Chaos is one of the most important behavioural modes exhibited by dynamical systems and refers to... more Chaos is one of the most important behavioural modes exhibited by dynamical systems and refers to the unpredictable, seemingly random, motion of trajectories of a dynamical system. In recent time, non-linear dynamics and chaos have become familiar in the technical vocabulary of most sciences and technology due to the various applications of chaos in these areas. Chaotic systems display chaotic behaviours only for specific range of values of their parameters. It is therefore important to understand the chaotic features as well as parameter values resulting in its emergence in systems. In this paper, the emergence of chaos in six chaotic systems was demonstrated using Simulink with specific initial conditions and parameter values. The simulation results obtained in form of time series illustrated noise-like waveforms which were unpredictable even after a long interval of time, while the phase portraits were irregular and sponge-like in appearance. The noise-like and unpredictable traj...
Journal of Engineering and Applied Sciences, 2012
Journal of Engineering and Applied Sciences, 2012
International Journal of Information and Computer Security, 2021
In healthcare wireless sensor networks (HWSNs), a patient's body usually contains several wea... more In healthcare wireless sensor networks (HWSNs), a patient's body usually contains several wearable or implantable wireless sensors which generate and transmit physiological data to a medical server...
Taylor & Francis makes every effort to ensure the accuracy of all the information (the “Content”)... more Taylor & Francis makes every effort to ensure the accuracy of all the information (the “Content”) contained in the publications on our platform. However, Taylor & Francis, our agents, and our licensors make no representations or warranties whatsoever as to the accuracy, completeness, or suitability for any purpose of the Content. Any opinions and views expressed in this publication are the opinions and views of the authors, and are not the views of or endorsed by Taylor & Francis. The accuracy of the Content should not be relied upon and should be independently verified with primary sources of information. Taylor and Francis shall not be liable for any losses, actions, claims, proceedings, demands, costs, expenses, damages, and other liabilities whatsoever or howsoever caused arising directly or indirectly in connection with, in relation to or arising out of the use of the Content.
Doctors have a crucial role in promoting the physical wellbeing of patients and ensuring that the... more Doctors have a crucial role in promoting the physical wellbeing of patients and ensuring that they are given the safest and effective treatments that meet their medical needs and preferences. To achieve this, doctors need adequate health information of the patients and a broad medical knowledge about their health conditions. However, due to an extensive area of the field of medicine, doctors do not have complete knowledge about a patient diagnosis and the special tools required, hence referral is indispensable. Referral requires the transfer of patient and her relevant medical information to a specialist in order for the specialist to develop a tailored treatment or suggestion for a better healthcare. Therefore, it is imperative to search for a specialist in that area of specialization who will not only have access to the patients relevant health information but able to proffer solutions to her health challenges. There is need for an effective referral system that is capable of sele...
International Journal of Ad Hoc and Ubiquitous Computing
International journal of control theory and computer modeling, Oct 30, 2018
Forced Van der Pol oscillator exhibits chaotic behaviour and instability under certain parameters... more Forced Van der Pol oscillator exhibits chaotic behaviour and instability under certain parameters and this poses a great threat to the systems where it has been applied hence, the need to develop a control method to stabilize and control chaos in a Forced Van der Pol oscillator so as to avoid damage in the controlled system and also to prevent unmodeled dynamics from being introduced in the system. Sliding Mode control makes use of the regulatory variables derived from the controlled Lyapunov function to bring the new variables to stability. The essence of using Integral Backstepping was to prevent chattering which can occur in the control input and can cause instability to the system by igniting unmodeled dynamics. Simulation was done using MATLAB and the results were provided to show the effectiveness of the proposed control method. Integral Backstepping Sliding Mode control method was effective towards stability and chaos control. It was also robust towards matched and unmatched disturbance.
Smart grid is a modernized electrical grid. It is used to collect information about behaviors of ... more Smart grid is a modernized electrical grid. It is used to collect information about behaviors of suppliers and consumers and improve the efficiency, reliability, and economics of electricity. Recently, advanced metering infrastructure is proposed as a critical part of the smart grid. The security of advanced metering infrastructure is special importance for smart grid. In order to achieve data confidentiality, privacy, and authentication in advanced metering infrastructure, a lightweight authentication and key agreement scheme is proposed in this article. The scheme provides mutual authentication, key agreement, key refreshment, and multicast mechanism which can prevent various attacks. Furthermore, we analyze the security and performance of the scheme. The analysis shows that the proposed scheme is suitable for smart grid.
International Journal of Ad Hoc and Ubiquitous Computing, 2019
In multi-hop network the efficiency of the transmission depends solely on the cooperation of all ... more In multi-hop network the efficiency of the transmission depends solely on the cooperation of all nodes in the network in relaying neighbouring nodes' data packets. Some nodes may be selfish, mischievous by dropping received packets or refuse to accept packet from other nodes whereas using other nodes resources to transmit their packets. This drastically affects the performance of the network. In this paper, a fair and effective incentive mechanism, which induces cooperation among nodes in the network is proposed. The mechanism applies auction scheme by initiating auction between the node and its immediate neighbouring nodes. The neighbouring node(s) competitively purchase packets transmission liability from the source and re-auctions it to the neighbouring node. The performance characterisation and evaluation against fairness and some possible attacks demonstrated that the scheme strongly stimulates fairness and competitiveness in message relaying among the intermediary nodes unlike other incentive based schemes.
Journal of Parallel and Distributed Computing, Sep 1, 2021
Abstract Very recently, a number of intelligent applications have evolved in smart cities such as... more Abstract Very recently, a number of intelligent applications have evolved in smart cities such as smart grid, smart parking, smart waste management, smart manufacturing, smart home, and smart health, making our cities more smarter. In the context of smart health, smart devices are employed to collect and transmit biomedical information to a medical server, allowing medical practitioners to give better and improved healthcare services. However, considering the sensitive nature of the medical data, any illegal access may have devastating effects on the patient's health condition. A lightweight privacy-preserving authentication and fine-grained access control scheme for smart health known as PAASH is proposed. In PAASH, a new ultraefficient certificateless signature scheme with compact aggregation is developed to achieve source authentication and data integrity. To achieve efficient user authorization and data confidentiality, a privacy-preserving access control technique using the developed aggregate signature and ciphertext-policy attribute-based encryption (CP-ABE) is implemented. An analysis of PAASH reveals that it can provide desirable privacy and security measures in smart health. Moreover, the formal security demonstrated in the random oracle model (ROM) shows that PAASH is semantically secure under the intractability of the Discrete Logarithm Problem (DLP). The performance evaluation shows that PAASH is par excellence practically suitable for smart health.
Internet of things, Jun 1, 2021
Abstract Fog computing is a decentralized computing infrastructure which extends the traditional ... more Abstract Fog computing is a decentralized computing infrastructure which extends the traditional cloud computing to the edge of the network, bringing data, storage, computing, and communication resources closer to end users. However, since fog servers are very close to end users and may collect sensitive information , they must be trustworthy for delegation. The traditional cryptographic solutions cannot be deployed to handle internal attacks such as that from a rogue fog that has been authenticated and has become part of the system. To this end, we put forward a bi-directional trust management system (TMS) for secure offloading and fog-to-fog collaboration, allowing a service requester (SR) to determine the trustworthiness of a service provider (SP) and the SP to check the level of trust of the SR before initiating a connection. The proposed TMS uses quality of service (QoS), quality of security (QoSec), and social relationships for direct trust computation through self-observation, and past reputation and recommendations to determine the indirect trust. The trust aggregation is based on fuzzy logic which is capable of handling the uncertainty, imprecision , and inaccuracy in a dynamic and highly mobile fog computing environment. A decay function is used to model the effect of past reputation on the present trust value and a credence function to mitigate the impact of false recommendations on the overall trust score. The results of the simulation show that the TMS could detect and mitigate about 71% and 74% of attacks, when 70% of the clients and fogs are malicious.
Engineering Applications of Artificial Intelligence, May 1, 2023
Facial makeup is a global problem from the perspective of recognition and security. In this paper... more Facial makeup is a global problem from the perspective of recognition and security. In this paper, a hybrid feature extraction method is proposed for makeup-invariant face identification and verification. The Gabor Filter Bank (GFB) and Histogram of Oriented Gradients (HOG) were applied to face images from the Virtual Makeup (VMU) database for feature extraction. The final feature vectors were generated through the combination of GFB and HOG features and classified using the City Block Distance (CBD), Euclidean Distance (EUC) and Cosine Similarity Metric (CSM). Performance evaluation of the CBD, EUC and CSM classifiers produced identification and verification rates of 97.39% and 94.12%, 96.73% and 92.16%, and 94.77% and 89.54% respectively for the VMU database. The CSM has the least recognition rate while the CBD achieved the best recognition rates. The implemented method outclassed several face recognition methods previously developed.
Computer Communications, Mar 1, 2021
Wireless body area networks play an indispensable role in the medical Internet of Things. It is a... more Wireless body area networks play an indispensable role in the medical Internet of Things. It is a network of several wearable or implantable devices that use wireless technologies to communicate. These devices usually collect the wearer's physiological data and send it to the server. Some health care providers can access the server over the network and provide medical care to the wearer. Due to the openness and mobility of the wireless network, the adversary can easily steal and forge information which exchanged in the communication channel that leaks wearer's privacy. Therefore, a secure and reliable authentication scheme is essential. Most of existing authentication schemes are based on asymmetric encryption. However, since the sensor devices in wireless body area networks are typically resource-constrained devices, their computing resources cannot afford to use asymmetric encryption. In addition, most of existing lightweight authentication schemes have various security vulnerabilities, especially the lack of forward secrecy. Therefore, we propose a secure lightweight authentication scheme for wireless body area networks. With this scheme, forward secrecy can be guaranteed without using asymmetric encryption. We use the automatic security verification tool ProVerif to verify the security of our scheme and analyze informal security. The experimental results and theoretical analysis indicate that our scheme significantly reduces the computational cost compared with the schemes using asymmetric encryption and that it has a lower security risk compared with the lightweight schemes.
Zenodo (CERN European Organization for Nuclear Research), Nov 7, 2018
Forced Van der Pol oscillator exhibits chaotic behaviour and instability under certain parameters... more Forced Van der Pol oscillator exhibits chaotic behaviour and instability under certain parameters and this poses a great threat to the systems where it has been applied hence, the need to develop a control method to stabilize and control chaos in a Forced Van der Pol oscillator so as to avoid damage in the controlled system and also to prevent unmodeled dynamics from being introduced in the system. Sliding Mode control makes use of the regulatory variables derived from the controlled Lyapunov function to bring the new variables to stability. The essence of using Integral Backstepping was to prevent chattering which can occur in the control input and can cause instability to the system by igniting unmodeled dynamics. Simulation was done using MATLAB and the results were provided to show the effectiveness of the proposed control method. Integral Backstepping Sliding Mode control method was effective towards stability and chaos control. It was also robust towards matched and unmatched disturbance.
IGI Global eBooks, 2021
In smart grids (SGs), smart meters (SMs) are usually deployed to collect and transmit customers&a... more In smart grids (SGs), smart meters (SMs) are usually deployed to collect and transmit customers' electricity consumption data in real-time to the control center. Due to the open nature of the SG communication, several privacy-preserving data aggregation schemes have been proposed to protect the privacy of customers. However, most of these schemes cannot protect against internal attackers and they are not efficient, since SMs are constrained in processing, memory, and computing capabilities. To address these problems, the authors propose a privacy-aware lightweight data aggregation scheme against internal attackers based on Elliptic Curve Cryptography (ECC). The scheme satisfies all the security requirements of SG, and supports conditional traceability, strong anonymity and autonomy. The authors demonstrate that the proposed scheme provides confidentiality based on the Computational Diffie-Hellman (CDH) assumption and unforgeability in the security model based on the intractability of the Discrete Logarithm (DL) problem. Extensive performance analysis shows that the proposed scheme is very efficient.
Journal of information security and applications, Dec 1, 2021
Applied Soft Computing, Aug 1, 2023
Journal of Emerging Trends in Engineering and Applied Sciences, 2012
Chaos is one of the most important behavioural modes exhibited by dynamical systems and refers to... more Chaos is one of the most important behavioural modes exhibited by dynamical systems and refers to the unpredictable, seemingly random, motion of trajectories of a dynamical system. In recent time, non-linear dynamics and chaos have become familiar in the technical vocabulary of most sciences and technology due to the various applications of chaos in these areas. Chaotic systems display chaotic behaviours only for specific range of values of their parameters. It is therefore important to understand the chaotic features as well as parameter values resulting in its emergence in systems. In this paper, the emergence of chaos in six chaotic systems was demonstrated using Simulink with specific initial conditions and parameter values. The simulation results obtained in form of time series illustrated noise-like waveforms which were unpredictable even after a long interval of time, while the phase portraits were irregular and sponge-like in appearance. The noise-like and unpredictable traj...
Journal of Engineering and Applied Sciences, 2012
Journal of Engineering and Applied Sciences, 2012
International Journal of Information and Computer Security, 2021
In healthcare wireless sensor networks (HWSNs), a patient's body usually contains several wea... more In healthcare wireless sensor networks (HWSNs), a patient's body usually contains several wearable or implantable wireless sensors which generate and transmit physiological data to a medical server...
Taylor & Francis makes every effort to ensure the accuracy of all the information (the “Content”)... more Taylor & Francis makes every effort to ensure the accuracy of all the information (the “Content”) contained in the publications on our platform. However, Taylor & Francis, our agents, and our licensors make no representations or warranties whatsoever as to the accuracy, completeness, or suitability for any purpose of the Content. Any opinions and views expressed in this publication are the opinions and views of the authors, and are not the views of or endorsed by Taylor & Francis. The accuracy of the Content should not be relied upon and should be independently verified with primary sources of information. Taylor and Francis shall not be liable for any losses, actions, claims, proceedings, demands, costs, expenses, damages, and other liabilities whatsoever or howsoever caused arising directly or indirectly in connection with, in relation to or arising out of the use of the Content.
Doctors have a crucial role in promoting the physical wellbeing of patients and ensuring that the... more Doctors have a crucial role in promoting the physical wellbeing of patients and ensuring that they are given the safest and effective treatments that meet their medical needs and preferences. To achieve this, doctors need adequate health information of the patients and a broad medical knowledge about their health conditions. However, due to an extensive area of the field of medicine, doctors do not have complete knowledge about a patient diagnosis and the special tools required, hence referral is indispensable. Referral requires the transfer of patient and her relevant medical information to a specialist in order for the specialist to develop a tailored treatment or suggestion for a better healthcare. Therefore, it is imperative to search for a specialist in that area of specialization who will not only have access to the patients relevant health information but able to proffer solutions to her health challenges. There is need for an effective referral system that is capable of sele...
International Journal of Ad Hoc and Ubiquitous Computing