Victor Balogun | University of Winnipeg (original) (raw)

Papers by Victor Balogun

Research paper thumbnail of On the impact of jamming attacks on cooperative spectrum sensing in cognitive radio networks

Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop, 2013

Cognitive Radio (CR) Networks have been identified in recent literature as having great potential... more Cognitive Radio (CR) Networks have been identified in recent literature as having great potential in realizing distributed shared communications, especially the ability to ensure broadband access of limited resources by opportunistically sharing spectrum with the incumbent users. Since the CR uses wireless communication and inherits all of its associated security threats, it is of paramount importance to fully investigate the impact of malicious faults like jamming attacks on CR networks under different fault scenarios. This research investigates CR Networks in the presence of Jamming attacks based on fault-model classification. A hybrid Jamming mitigating approach is proposed to better handle the affect of malicious jamming nodes under consideration of hybrid fault models.

Research paper thumbnail of An empirical measurement of jamming attacks in CSS Cognitive Radio networks

2014 IEEE 27th Canadian Conference on Electrical and Computer Engineering (CCECE), 2014

Cognitive Radio networks (CRN) are capable of providing a solution to the spectrum shortage probl... more Cognitive Radio networks (CRN) are capable of providing a solution to the spectrum shortage problem. With diverse application domains ranging from distance education to government-delivered essential services, the task of mitigating malicious attacks, especially jamming, in this emerging network is challenging. This is because potential attackers could be operating as Cognitive Radios themselves, and as a result are capable of preying on the adaptable and reconfigurable features of CRN with the intent of causing serious denial of service to the users of the network. In addition, these jammers are capable of introducing value faults in pathological cases as a result of being able to manipulate transmitted data. In this paper, we investigated through simulation the performance of CRNs operating in the presence of jamming attacks that are capable of introducing value faults. The purpose of this investigation is to be able to come up with a suitable anti-jamming strategy that is capable of mitigating jamming in CRN. Using Packet Delivery Ratio (PDR) measurements we observed that these jammers are very effective in their operations as they are capable of bringing down the entire CRN when their jamming rate is just about 30%. As a result, we investigated different anti-jamming strategies and analyzed their suitabilities in combating CR operating as jammers with the intent of proposing a solution that is capable of handling all scenarios presented in these models.

Research paper thumbnail of Development of a Web-Based Virtual Classroom System at the Federal University of Technology, Akure,Nigeria

African Journal of Library, Archives and Information Science

The Internet is about the biggest technological advancement since the industrial revolution, and ... more The Internet is about the biggest technological advancement since the industrial revolution, and has fundan entally changed virtually every sphere of life, including educational paradigms and practice. This research work harnessed the .joint and several advantages of the Web and its tools to design and write programs that run in the browser to implement a cost effective collaborative virtual classroom system. In the research, Apache served as the web server; HTML was used to edit the web pages; Javascript for data validation; MySQL for creating the database tables; and PHP for writing CGI scripts. This paper focuses on the student module of the collaborative virtual classroom system, which was designed and implemented in the Computer Science department of the Federal University of Technology, Akure (FUTA), Nigeria. The system provides such facilities as University news and calendar, results checking, course registration, online admission, and teaching support tools. The system also ...

Research paper thumbnail of A measurement-based design and evaluation methodology for embedded control systems

Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research, 2011

A measurement-based design and evaluation methodology for embedded control systems is presented t... more A measurement-based design and evaluation methodology for embedded control systems is presented that features 1) better control of executions through reduction of non-determinism, 2) certified behavior of executions, 3) real-time monitoring of operations, functionalities and modules, which 4) allows adaptation to non-certified behavior. Using principles of Design for Survivability the software system is broken down into costatements (the unit of execution in Dynamic C) with low degree of non-determinism in their executions. This results in a significant increase in the accuracy of run-time profiling, which in turn achieves potential for better detection of deviation from certified executions. The formal model to achieve these goals is introduced and the effectiveness is demonstrated in a real control

Research paper thumbnail of Framework for mobile phone enquire system for students\' admission status at the Federal University of Technology Akure, Nigeria

International Journal of Natural and Applied Sciences, 2009

The research was carried out to assess the perception of the undergraduate students of the Federa... more The research was carried out to assess the perception of the undergraduate students of the Federal University of Technology, Akure on the use of e-resources in the library. A total of 180 undergraduate students were randomly selected from the students who visited the e-resources section of the University within a period of eight months in 2015 (January-August). A structured questionnaire was used to collect data from the respondents; the data was analyzed using frequency counts, percentages, Likert type scale and means. The study revealed that the undergraduate students that visited the e-resources unit of the University were relatively young with a mean age of 22 years; male students visited the e-resources more than the female students. The e-resources in FUTA library are mainly used by male students that cut across most of the schools in the University. The major reasons for utilizing the e-resources were for assignment and research purposes. The E-resource frequently used was the e-journals, ebook and e-magazines. Although the students have positive perception of the e-resources, the most significant challenge faced by the students was insufficient computers in the e-library. Based on the findings, the study recommends that female students should be motivated to use the e-resources like their male counterparts. More computers should be provided in the library to cater for the needs of the students.

Research paper thumbnail of A hybrid fec code for mitigating jamming attacks in fault-model-classified cognitive radio networks

Opportunistic sharing of spectrum through the concept of Cognitive Radio network (CRN) has been c... more Opportunistic sharing of spectrum through the concept of Cognitive Radio network (CRN) has been considered the next stage in the effort of the government to alleviate the spectrum shortage problem. The idea is to salvage spectra that are rendered fallowed by the licensed (primary) users during their on and off period. Recent literature reiterated that this next generation wireless network is capable of providing ubiquitous connectivity of highbandwidth communications to both urban and rural communities. It has diverse application domains ranging from distance education to other government-delivered essential services like remote health care delivery and emergency rescue response. The security requirements of CRN must be specified because of the sensitive nature and variety of application domains of the network. Violation of any of the requirements, either maliciously or inadvertently, by The new hybrid FEC code is defined as the concatenation of the Raptor code and the Secure Hash Algorithm-2 (SHA-2). We use the Raptor code part of the code to recover data loss, since Raptor code is an FEC code that allows encoded communicated data to be recovered at the destination without the need for a re-transmission, with high probability even when some of the data is lost due to jamming. The SHA-2 part of the code is used to verify the integrity of data received at the destination since CR jammers are capable of manipulating transmitted data. This is possible because SHA-2 can transform any set of data elements into a unique fixed length hash value, which can be verified at both the sender and the receiver for any data manipulation by CR jammers. When data communicated is detected to be lost or manipulated, the approach explores a recovery block based on the application scenario. The algorithm for our proposed solution is presented and its validity and threshold functions are established. We simulate our proposed solution in NS-2 and evaluate its performance by comparing it with ordinary FEC code implementation. The result of the analysis using suitable performance metrics shows that the proposed solution is very efficient and robust against the different rates of jamming perpetrated by CR jammers in a fault-model classified CRN. In addition, the encoding and decoding algorithm of the proposed hybrid FEC code was found to be very efficient because of the observed high recovery rate of the algorithm capable of providing consistent low packet loss ratio (PLR), even at the jammers worst case scenario of 100% jamming rate. v ACKNOWLEDGMENTS I would like to thank the following people and groups: My supervisor, Dr. Axel Krings for his mentoring and invaluable contribution to the success of this work. He was always there to give me direction many times when I was lost at what to do next.

Research paper thumbnail of Challenges of Spectrum Handoff in Cognitive Radio Networks

Cognitive Radio (CR) with Dynamic Spectrum Access (DSA) could alleviate the shortage of radio res... more Cognitive Radio (CR) with Dynamic Spectrum Access (DSA) could alleviate the shortage of radio resources. Secondary Users (SUs) (unlicensed users) could access the spectrum when Primary Users (PUs) (licensed users) are inactive. The service interruption loss arises as secondary users try to handoff the channel to the legitimate users of the channels, the primary user. This new type of loss is different from losses as a result of network congestion and channel errors, experienced also by conventional wireless networks. Transport layer protocols’ performance of an SU could be degraded significantly as it tries to handoff channel due to the arrival of a PU. The need to investigate SU’s TCP performance during this period of sensing, hand-off, and looking for an alternative channel to continue transmitting is a challenging one. This paper presents a study of the challenges of spectrum handoff as PUs in CR networks appear in the course of an on-going transmission by the SUs. A TCP rate ada...

Research paper thumbnail of E-Crime in Nigeria: Trends, Tricks, and Treatment

The unprecedented spate of e-crime in Nigeria in recent times is quite alarming, and the negative... more The unprecedented spate of e-crime in Nigeria in recent times is quite alarming, and the negative impact on the socio-economy of the country is highly debilitating and of great concern. Numerous governmental and private initiatives have been deployed in order to curb and combat this menace. Recent reports revealed that there has not been significant reduction in this despicable art despite the various measures employed so far. Nigerian computer criminals are daily devising new ways of perpetrating this illegal trade and the existing methods of tracking these criminals are no longer suitable for to deal with their new tricks. The victims as well show increasing naivety and gullibility at the prospects incited by these fraudsters. This paper examines the trends, peculiarities, and reasons for the upsurge in ecrime in Nigeria. It further highlights these emerging tricks, possible infrastructures to be deployed for its treatment, and the implications of using such mechanisms.

Research paper thumbnail of A Non-invasive Cloud-Based IoT System and Data Analytics Support for Women Struggling with Drug Addictions During Pregnancy

Research paper thumbnail of A Cooperative Spectrum Sensing Architecture and Algorithm for Cloud- and Big Data-based Cognitive Radio Networks

2020 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), 2020

Cognitive Radio Network (CRN) was designed to lessen the shortage of radio resources. The Seconda... more Cognitive Radio Network (CRN) was designed to lessen the shortage of radio resources. The Secondary Users (SUs) can opportunistically utilize any available spectrum when the Primary Users (PUs) are inactive. Some of the challenges of CRN include the service interruption loss, complexity of processing and exchange of large amount of data, limited available memory to SUs and the non-real-time exchange of spectrum sensing data. These challenges can lead to significant degradation in the performance of a CRN. Therefore, there is a need to seek solutions that will alleviate these problems. The Cloud system incorporated with Big Data Analytics algorithm can be a potential solution. In this paper, we propose a Cloud-based Cooperative Spectrum Sensing model for CRN that allows the SUs to aggregate their individual spectrum sensing data into a cloud environment, where it can be analyzed using a proposed expanded Apache Spark algorithm incorporated with the hybridization of three machine lear...

Research paper thumbnail of Career Master: A Decision Support System (DSS) for Guidance and Counseling in Nigeria

The rate of students entering inappropriate disciplines in our tertiary institutions, especially ... more The rate of students entering inappropriate disciplines in our tertiary institutions, especially Nigeria, is soaring. This invariably has caused the nation many unproductive and frustrated graduates. In view of this, there is a need to enhance the quality of service of the Guidance and Counseling Unit in Nigeria. This paper presents the development of a knowledge assistant (Decision Support System DSS) for counselors to assist students in selecting the right discipline as they enter tertiary institutions, having considered the appropriate factors necessary for taking such decisions. Thus, the work which was carried out at the Department of Computer Science, Federal University of Technology, Akure, Nigeria was proposed for Secondary School “leaving students” who are likely to have a problem with their choice of carriers as they intend to study in at tertiary institutions of their choice. The deployment of this work was discovered to have a high correlation with that of the convention...

Research paper thumbnail of A Context-Sensitive Cloud-Based Data Analytic Mobile Alert and Optimal Route Discovery System for Rural and Urban ITS Penetration

Research paper thumbnail of A 3 D GeoSpatial Virtual Reality System for Virtual Tourism

The effective management and promotion of tourism can increase the Gross Domestic Product (GDP) o... more The effective management and promotion of tourism can increase the Gross Domestic Product (GDP) of any country significantly. This paper presents the design of a simplified and generic architecture of a 3-Dimension (3D) model virtual walk-through for tourist centers and historical heritages. We believe that this model could be adapted for its implementation in any state or country. The countries of the world are replete with numerous attractive and historical tourist sites. Many of such places are barely visited and explored because they have not been given enough publicity to draw people to those sites. This model provides platform to overcome these drawbacks by providing easy access and virtual exploration of these tourist sites. We envisage that the system will both promote these sites and also help to preserve the historical heritages of the people in such communities. The architecture is an integration of Virtual Reality System (VRS), Geographical Information System (GIS), and ...

Research paper thumbnail of Virtual reality as a tool for graphic presentation in architectural education

Research paper thumbnail of Anti-jamming Performance of Hybrid FEC code in the Presence of CRN Random Jammers

The survivability of Cognitive Radio Networks (CRNs) operating in the presence of malicious attac... more The survivability of Cognitive Radio Networks (CRNs) operating in the presence of malicious attackers, especially jammers is a crucial security issue. Cognitive Radio (CR) jammers are capable of taking advantage of the reconfigurable features of CRN so as to cause faults of different severity including value faults. The performance of CRNs under jamming attacks using the hybrid fault-model approach which considers different fault scenarios have been investigated. A hybrid Forward Error Correction (HFEC) code was proposed so as to mitigate the observed high jamming impact of CR jammers. The proposed HFEC code was defined as a concatenation of the Raptor code and the Secure Hash Algorithm-2 (SHA-2). The Raptor part is used to recover data loss due to jamming, while SHA-2 is used to verify the integrity of data received at the destination since CR jammers are capable of manipulating transmitted data leading to value faults. The HFEC code was designed in this manner so as to make it cap...

Research paper thumbnail of Practice, trends and challenges of mobile commerce in Nigeria

Information Technology Journal, 2007

Research paper thumbnail of Challenges of Spectrum Handoff in Cognitive Radio Networks

akamaiuniversity.us

Cognitive Radio (CR) with Dynamic Spectrum Access (DSA) could alleviate the shortage of radio res... more Cognitive Radio (CR) with Dynamic Spectrum Access (DSA) could alleviate the shortage of radio resources. Secondary Users (SUs) (unlicensed users) could access the spectrum when Primary Users (PUs) (licensed users) are inactive. The service interruption loss arises as secondary users try to handoff the channel to the legitimate users of the channels, the primary user. This new type of loss is different from losses as a result of network congestion and channel errors, experienced also by conventional wireless networks. Transport layer protocols' performance of an SU could be degraded significantly as it tries to handoff channel due to the arrival of a PU. The need to investigate SU's TCP performance during this period of sensing, hand-off, and looking for an alternative channel to continue transmitting is a challenging one. This paper presents a study of the challenges of spectrum handoff as PUs in CR networks appear in the course of an ongoing transmission by the SUs. A TCP rate adapting algorithm that ensures seamless spectrum handoff as PUs appear is proposed.

Research paper thumbnail of Web-Based Geographical Information System (GIS) for Tourism in Oyo State, Nigeria

Information Technology …, 2007

Research paper thumbnail of Survivability Analysis for IntelliDrive-Enabled Aging Traffic Aid System

The importance of ensuring safe traffic facilities for the aging population cannot be overemphasi... more The importance of ensuring safe traffic facilities for the aging population cannot be overemphasized. The emergence of the IntelliDrive technology may serve as a solution to realizing this concern. This project seeks to propose an IntelliDrive-enabled traffic-aid system for the aging towards a survivable system that is both functional and safe in spite of unavoidable threats and attacks. We discovered that developing this kind of application will improve the safety and the efficiency of the transportation system while at the same time reducing the threats to the aging population in the form of accidents during a medical attack or getting lost due to failing health and memory as they navigate our roads and streets.

Research paper thumbnail of Mitigating Constant Jamming in Cognitive Radio Networks Using Hybrid FEC Code

The task of detecting and mitigating Cognitive Radios (CRs) operating as constant jammers in a Co... more The task of detecting and mitigating Cognitive Radios (CRs) operating as constant jammers in a Cognitive Radio network (CRN) can be very daunting. The CR constant jammers prey on the adaptable functionalities of CRN so as to cause serious denial of service to the users of the network. In addition, these jammers are capable of introducing value faults in pathological cases as a result of being able to manipulate transmitted data. In previous research, we have investigated the performance of CRNs operating in the presence of jamming attacks that are capable of introducing value faults. The results obtained show that CR constant jammers are very effective in their operations and they are capable of bringing down the entire CRN when their jamming rate is just about 30%. In this paper, we show that none of the existing anti-jamming solutions are able to mitigate CR jammers that are capable of manipulating communicated data. As a result, we propose a hybrid forward error correction (FEC) ...

Research paper thumbnail of On the impact of jamming attacks on cooperative spectrum sensing in cognitive radio networks

Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop, 2013

Cognitive Radio (CR) Networks have been identified in recent literature as having great potential... more Cognitive Radio (CR) Networks have been identified in recent literature as having great potential in realizing distributed shared communications, especially the ability to ensure broadband access of limited resources by opportunistically sharing spectrum with the incumbent users. Since the CR uses wireless communication and inherits all of its associated security threats, it is of paramount importance to fully investigate the impact of malicious faults like jamming attacks on CR networks under different fault scenarios. This research investigates CR Networks in the presence of Jamming attacks based on fault-model classification. A hybrid Jamming mitigating approach is proposed to better handle the affect of malicious jamming nodes under consideration of hybrid fault models.

Research paper thumbnail of An empirical measurement of jamming attacks in CSS Cognitive Radio networks

2014 IEEE 27th Canadian Conference on Electrical and Computer Engineering (CCECE), 2014

Cognitive Radio networks (CRN) are capable of providing a solution to the spectrum shortage probl... more Cognitive Radio networks (CRN) are capable of providing a solution to the spectrum shortage problem. With diverse application domains ranging from distance education to government-delivered essential services, the task of mitigating malicious attacks, especially jamming, in this emerging network is challenging. This is because potential attackers could be operating as Cognitive Radios themselves, and as a result are capable of preying on the adaptable and reconfigurable features of CRN with the intent of causing serious denial of service to the users of the network. In addition, these jammers are capable of introducing value faults in pathological cases as a result of being able to manipulate transmitted data. In this paper, we investigated through simulation the performance of CRNs operating in the presence of jamming attacks that are capable of introducing value faults. The purpose of this investigation is to be able to come up with a suitable anti-jamming strategy that is capable of mitigating jamming in CRN. Using Packet Delivery Ratio (PDR) measurements we observed that these jammers are very effective in their operations as they are capable of bringing down the entire CRN when their jamming rate is just about 30%. As a result, we investigated different anti-jamming strategies and analyzed their suitabilities in combating CR operating as jammers with the intent of proposing a solution that is capable of handling all scenarios presented in these models.

Research paper thumbnail of Development of a Web-Based Virtual Classroom System at the Federal University of Technology, Akure,Nigeria

African Journal of Library, Archives and Information Science

The Internet is about the biggest technological advancement since the industrial revolution, and ... more The Internet is about the biggest technological advancement since the industrial revolution, and has fundan entally changed virtually every sphere of life, including educational paradigms and practice. This research work harnessed the .joint and several advantages of the Web and its tools to design and write programs that run in the browser to implement a cost effective collaborative virtual classroom system. In the research, Apache served as the web server; HTML was used to edit the web pages; Javascript for data validation; MySQL for creating the database tables; and PHP for writing CGI scripts. This paper focuses on the student module of the collaborative virtual classroom system, which was designed and implemented in the Computer Science department of the Federal University of Technology, Akure (FUTA), Nigeria. The system provides such facilities as University news and calendar, results checking, course registration, online admission, and teaching support tools. The system also ...

Research paper thumbnail of A measurement-based design and evaluation methodology for embedded control systems

Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research, 2011

A measurement-based design and evaluation methodology for embedded control systems is presented t... more A measurement-based design and evaluation methodology for embedded control systems is presented that features 1) better control of executions through reduction of non-determinism, 2) certified behavior of executions, 3) real-time monitoring of operations, functionalities and modules, which 4) allows adaptation to non-certified behavior. Using principles of Design for Survivability the software system is broken down into costatements (the unit of execution in Dynamic C) with low degree of non-determinism in their executions. This results in a significant increase in the accuracy of run-time profiling, which in turn achieves potential for better detection of deviation from certified executions. The formal model to achieve these goals is introduced and the effectiveness is demonstrated in a real control

Research paper thumbnail of Framework for mobile phone enquire system for students\' admission status at the Federal University of Technology Akure, Nigeria

International Journal of Natural and Applied Sciences, 2009

The research was carried out to assess the perception of the undergraduate students of the Federa... more The research was carried out to assess the perception of the undergraduate students of the Federal University of Technology, Akure on the use of e-resources in the library. A total of 180 undergraduate students were randomly selected from the students who visited the e-resources section of the University within a period of eight months in 2015 (January-August). A structured questionnaire was used to collect data from the respondents; the data was analyzed using frequency counts, percentages, Likert type scale and means. The study revealed that the undergraduate students that visited the e-resources unit of the University were relatively young with a mean age of 22 years; male students visited the e-resources more than the female students. The e-resources in FUTA library are mainly used by male students that cut across most of the schools in the University. The major reasons for utilizing the e-resources were for assignment and research purposes. The E-resource frequently used was the e-journals, ebook and e-magazines. Although the students have positive perception of the e-resources, the most significant challenge faced by the students was insufficient computers in the e-library. Based on the findings, the study recommends that female students should be motivated to use the e-resources like their male counterparts. More computers should be provided in the library to cater for the needs of the students.

Research paper thumbnail of A hybrid fec code for mitigating jamming attacks in fault-model-classified cognitive radio networks

Opportunistic sharing of spectrum through the concept of Cognitive Radio network (CRN) has been c... more Opportunistic sharing of spectrum through the concept of Cognitive Radio network (CRN) has been considered the next stage in the effort of the government to alleviate the spectrum shortage problem. The idea is to salvage spectra that are rendered fallowed by the licensed (primary) users during their on and off period. Recent literature reiterated that this next generation wireless network is capable of providing ubiquitous connectivity of highbandwidth communications to both urban and rural communities. It has diverse application domains ranging from distance education to other government-delivered essential services like remote health care delivery and emergency rescue response. The security requirements of CRN must be specified because of the sensitive nature and variety of application domains of the network. Violation of any of the requirements, either maliciously or inadvertently, by The new hybrid FEC code is defined as the concatenation of the Raptor code and the Secure Hash Algorithm-2 (SHA-2). We use the Raptor code part of the code to recover data loss, since Raptor code is an FEC code that allows encoded communicated data to be recovered at the destination without the need for a re-transmission, with high probability even when some of the data is lost due to jamming. The SHA-2 part of the code is used to verify the integrity of data received at the destination since CR jammers are capable of manipulating transmitted data. This is possible because SHA-2 can transform any set of data elements into a unique fixed length hash value, which can be verified at both the sender and the receiver for any data manipulation by CR jammers. When data communicated is detected to be lost or manipulated, the approach explores a recovery block based on the application scenario. The algorithm for our proposed solution is presented and its validity and threshold functions are established. We simulate our proposed solution in NS-2 and evaluate its performance by comparing it with ordinary FEC code implementation. The result of the analysis using suitable performance metrics shows that the proposed solution is very efficient and robust against the different rates of jamming perpetrated by CR jammers in a fault-model classified CRN. In addition, the encoding and decoding algorithm of the proposed hybrid FEC code was found to be very efficient because of the observed high recovery rate of the algorithm capable of providing consistent low packet loss ratio (PLR), even at the jammers worst case scenario of 100% jamming rate. v ACKNOWLEDGMENTS I would like to thank the following people and groups: My supervisor, Dr. Axel Krings for his mentoring and invaluable contribution to the success of this work. He was always there to give me direction many times when I was lost at what to do next.

Research paper thumbnail of Challenges of Spectrum Handoff in Cognitive Radio Networks

Cognitive Radio (CR) with Dynamic Spectrum Access (DSA) could alleviate the shortage of radio res... more Cognitive Radio (CR) with Dynamic Spectrum Access (DSA) could alleviate the shortage of radio resources. Secondary Users (SUs) (unlicensed users) could access the spectrum when Primary Users (PUs) (licensed users) are inactive. The service interruption loss arises as secondary users try to handoff the channel to the legitimate users of the channels, the primary user. This new type of loss is different from losses as a result of network congestion and channel errors, experienced also by conventional wireless networks. Transport layer protocols’ performance of an SU could be degraded significantly as it tries to handoff channel due to the arrival of a PU. The need to investigate SU’s TCP performance during this period of sensing, hand-off, and looking for an alternative channel to continue transmitting is a challenging one. This paper presents a study of the challenges of spectrum handoff as PUs in CR networks appear in the course of an on-going transmission by the SUs. A TCP rate ada...

Research paper thumbnail of E-Crime in Nigeria: Trends, Tricks, and Treatment

The unprecedented spate of e-crime in Nigeria in recent times is quite alarming, and the negative... more The unprecedented spate of e-crime in Nigeria in recent times is quite alarming, and the negative impact on the socio-economy of the country is highly debilitating and of great concern. Numerous governmental and private initiatives have been deployed in order to curb and combat this menace. Recent reports revealed that there has not been significant reduction in this despicable art despite the various measures employed so far. Nigerian computer criminals are daily devising new ways of perpetrating this illegal trade and the existing methods of tracking these criminals are no longer suitable for to deal with their new tricks. The victims as well show increasing naivety and gullibility at the prospects incited by these fraudsters. This paper examines the trends, peculiarities, and reasons for the upsurge in ecrime in Nigeria. It further highlights these emerging tricks, possible infrastructures to be deployed for its treatment, and the implications of using such mechanisms.

Research paper thumbnail of A Non-invasive Cloud-Based IoT System and Data Analytics Support for Women Struggling with Drug Addictions During Pregnancy

Research paper thumbnail of A Cooperative Spectrum Sensing Architecture and Algorithm for Cloud- and Big Data-based Cognitive Radio Networks

2020 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), 2020

Cognitive Radio Network (CRN) was designed to lessen the shortage of radio resources. The Seconda... more Cognitive Radio Network (CRN) was designed to lessen the shortage of radio resources. The Secondary Users (SUs) can opportunistically utilize any available spectrum when the Primary Users (PUs) are inactive. Some of the challenges of CRN include the service interruption loss, complexity of processing and exchange of large amount of data, limited available memory to SUs and the non-real-time exchange of spectrum sensing data. These challenges can lead to significant degradation in the performance of a CRN. Therefore, there is a need to seek solutions that will alleviate these problems. The Cloud system incorporated with Big Data Analytics algorithm can be a potential solution. In this paper, we propose a Cloud-based Cooperative Spectrum Sensing model for CRN that allows the SUs to aggregate their individual spectrum sensing data into a cloud environment, where it can be analyzed using a proposed expanded Apache Spark algorithm incorporated with the hybridization of three machine lear...

Research paper thumbnail of Career Master: A Decision Support System (DSS) for Guidance and Counseling in Nigeria

The rate of students entering inappropriate disciplines in our tertiary institutions, especially ... more The rate of students entering inappropriate disciplines in our tertiary institutions, especially Nigeria, is soaring. This invariably has caused the nation many unproductive and frustrated graduates. In view of this, there is a need to enhance the quality of service of the Guidance and Counseling Unit in Nigeria. This paper presents the development of a knowledge assistant (Decision Support System DSS) for counselors to assist students in selecting the right discipline as they enter tertiary institutions, having considered the appropriate factors necessary for taking such decisions. Thus, the work which was carried out at the Department of Computer Science, Federal University of Technology, Akure, Nigeria was proposed for Secondary School “leaving students” who are likely to have a problem with their choice of carriers as they intend to study in at tertiary institutions of their choice. The deployment of this work was discovered to have a high correlation with that of the convention...

Research paper thumbnail of A Context-Sensitive Cloud-Based Data Analytic Mobile Alert and Optimal Route Discovery System for Rural and Urban ITS Penetration

Research paper thumbnail of A 3 D GeoSpatial Virtual Reality System for Virtual Tourism

The effective management and promotion of tourism can increase the Gross Domestic Product (GDP) o... more The effective management and promotion of tourism can increase the Gross Domestic Product (GDP) of any country significantly. This paper presents the design of a simplified and generic architecture of a 3-Dimension (3D) model virtual walk-through for tourist centers and historical heritages. We believe that this model could be adapted for its implementation in any state or country. The countries of the world are replete with numerous attractive and historical tourist sites. Many of such places are barely visited and explored because they have not been given enough publicity to draw people to those sites. This model provides platform to overcome these drawbacks by providing easy access and virtual exploration of these tourist sites. We envisage that the system will both promote these sites and also help to preserve the historical heritages of the people in such communities. The architecture is an integration of Virtual Reality System (VRS), Geographical Information System (GIS), and ...

Research paper thumbnail of Virtual reality as a tool for graphic presentation in architectural education

Research paper thumbnail of Anti-jamming Performance of Hybrid FEC code in the Presence of CRN Random Jammers

The survivability of Cognitive Radio Networks (CRNs) operating in the presence of malicious attac... more The survivability of Cognitive Radio Networks (CRNs) operating in the presence of malicious attackers, especially jammers is a crucial security issue. Cognitive Radio (CR) jammers are capable of taking advantage of the reconfigurable features of CRN so as to cause faults of different severity including value faults. The performance of CRNs under jamming attacks using the hybrid fault-model approach which considers different fault scenarios have been investigated. A hybrid Forward Error Correction (HFEC) code was proposed so as to mitigate the observed high jamming impact of CR jammers. The proposed HFEC code was defined as a concatenation of the Raptor code and the Secure Hash Algorithm-2 (SHA-2). The Raptor part is used to recover data loss due to jamming, while SHA-2 is used to verify the integrity of data received at the destination since CR jammers are capable of manipulating transmitted data leading to value faults. The HFEC code was designed in this manner so as to make it cap...

Research paper thumbnail of Practice, trends and challenges of mobile commerce in Nigeria

Information Technology Journal, 2007

Research paper thumbnail of Challenges of Spectrum Handoff in Cognitive Radio Networks

akamaiuniversity.us

Cognitive Radio (CR) with Dynamic Spectrum Access (DSA) could alleviate the shortage of radio res... more Cognitive Radio (CR) with Dynamic Spectrum Access (DSA) could alleviate the shortage of radio resources. Secondary Users (SUs) (unlicensed users) could access the spectrum when Primary Users (PUs) (licensed users) are inactive. The service interruption loss arises as secondary users try to handoff the channel to the legitimate users of the channels, the primary user. This new type of loss is different from losses as a result of network congestion and channel errors, experienced also by conventional wireless networks. Transport layer protocols' performance of an SU could be degraded significantly as it tries to handoff channel due to the arrival of a PU. The need to investigate SU's TCP performance during this period of sensing, hand-off, and looking for an alternative channel to continue transmitting is a challenging one. This paper presents a study of the challenges of spectrum handoff as PUs in CR networks appear in the course of an ongoing transmission by the SUs. A TCP rate adapting algorithm that ensures seamless spectrum handoff as PUs appear is proposed.

Research paper thumbnail of Web-Based Geographical Information System (GIS) for Tourism in Oyo State, Nigeria

Information Technology …, 2007

Research paper thumbnail of Survivability Analysis for IntelliDrive-Enabled Aging Traffic Aid System

The importance of ensuring safe traffic facilities for the aging population cannot be overemphasi... more The importance of ensuring safe traffic facilities for the aging population cannot be overemphasized. The emergence of the IntelliDrive technology may serve as a solution to realizing this concern. This project seeks to propose an IntelliDrive-enabled traffic-aid system for the aging towards a survivable system that is both functional and safe in spite of unavoidable threats and attacks. We discovered that developing this kind of application will improve the safety and the efficiency of the transportation system while at the same time reducing the threats to the aging population in the form of accidents during a medical attack or getting lost due to failing health and memory as they navigate our roads and streets.

Research paper thumbnail of Mitigating Constant Jamming in Cognitive Radio Networks Using Hybrid FEC Code

The task of detecting and mitigating Cognitive Radios (CRs) operating as constant jammers in a Co... more The task of detecting and mitigating Cognitive Radios (CRs) operating as constant jammers in a Cognitive Radio network (CRN) can be very daunting. The CR constant jammers prey on the adaptable functionalities of CRN so as to cause serious denial of service to the users of the network. In addition, these jammers are capable of introducing value faults in pathological cases as a result of being able to manipulate transmitted data. In previous research, we have investigated the performance of CRNs operating in the presence of jamming attacks that are capable of introducing value faults. The results obtained show that CR constant jammers are very effective in their operations and they are capable of bringing down the entire CRN when their jamming rate is just about 30%. In this paper, we show that none of the existing anti-jamming solutions are able to mitigate CR jammers that are capable of manipulating communicated data. As a result, we propose a hybrid forward error correction (FEC) ...