Ako Muhammad Abdullah
YOU?
Author Swipe
View article: Hybrid Energy-Efficient Routing Protocol for Extended Network Lifetime in Wireless Body Area Networks
Hybrid Energy-Efficient Routing Protocol for Extended Network Lifetime in Wireless Body Area Networks Open
Wireless Body Area Networks (WBANs) are an emerging technology designed to provide extensive applications in different fields. Healthcare is a particularly interesting field for WBANs. This network plays a vital role in remotely monitoring…
View article: <span>A Conditional Privacy Preserving Generalized Ring Signcryption Scheme for Micro Aerial Vehicles</span>
<span>A Conditional Privacy Preserving Generalized Ring Signcryption Scheme for Micro Aerial Vehicles</span> Open
View article: Enabling Secure Communication in Wireless Body Area Networks with Heterogeneous Authentication Scheme
Enabling Secure Communication in Wireless Body Area Networks with Heterogeneous Authentication Scheme Open
View article: Enabling Secure Communication in Wireless Body Area Networks with Heterogeneous Authentication Scheme
Enabling Secure Communication in Wireless Body Area Networks with Heterogeneous Authentication Scheme Open
Thanks to the widespread availability of Fifth Generation (5G) wireless connectivity, it is now possible to provide preventative or proactive healthcare services from any location and at any time. As a result of this technological improvem…
View article: An Efficient and Conditional Privacy-Preserving Heterogeneous Signcryption Scheme for the Internet of Drones
An Efficient and Conditional Privacy-Preserving Heterogeneous Signcryption Scheme for the Internet of Drones Open
The Internet of Drones (IoD) is a network for drones that utilizes the existing Internet of Things (IoT) infrastructure to facilitate mission fulfilment through real-time data transfer and navigation services. IoD deployments, on the other…
View article: A Conditional Privacy Preserving Generalized Ring Signcryption Scheme for Micro Aerial Vehicles
A Conditional Privacy Preserving Generalized Ring Signcryption Scheme for Micro Aerial Vehicles Open
Micro Aerial Vehicles (MAVs) are a type of UAV that are both small and fully autonomous, making them ideal for both civilian and military applications. Modern MAVs can hover and navigate while carrying several sensors, operate over long di…
View article: A Malware Detection Scheme via Smart Memory Forensics for Windows Devices
A Malware Detection Scheme via Smart Memory Forensics for Windows Devices Open
With the introduction of 4G/5G Internet and the increase in the number of users, the malicious cyberattacks on computing devices have been increased making them vulnerable to external threats. High availability windows servers are designed…
View article: An Efficient Authentication Scheme Using Blockchain as a Certificate Authority for the Internet of Drones
An Efficient Authentication Scheme Using Blockchain as a Certificate Authority for the Internet of Drones Open
The Internet of Drones (IoD) has recently gained popularity in several military, commercial, and civilian applications due to its unique characteristics, such as high mobility, three-dimensional (3D) movement, and ease of deployment. Drone…
View article: Crop Yield Maximization Using an IoT-Based Smart Decision
Crop Yield Maximization Using an IoT-Based Smart Decision Open
Today, farmers are suffering from the low yield of crops. Though right crop selection is the main boosting key to maximize crop yield by doing soil analysis and considering metrological factors, the lack of knowledge about soil fertility a…
View article: Cost‐Efficient Privacy‐Preserving Authentication and Key Management Scheme for Internet of Vehicle Ecosystem
Cost‐Efficient Privacy‐Preserving Authentication and Key Management Scheme for Internet of Vehicle Ecosystem Open
Internet of vehicles (IoV) is an emerging area of advanced transportation systems, in which the functionality of traditional vehicular ad hoc networks (VANET) combined with the Internet of things (IoT). This technology allows vehicle users…
View article: Rating of Modern Color Image Cryptography: A Next‐Generation Computing Perspective
Rating of Modern Color Image Cryptography: A Next‐Generation Computing Perspective Open
Issues such as inefficient encryption architectures, nonstandard formats of image datasets, weak randomness of chaos‐based Pseudorandom Number Generators (PRNGs), omitted S‐boxes, and unconvincing security metrics leading to increased comp…
View article: An Efficient Multidocument Blind Signcryption Scheme for Smart Grid‐Enabled Industrial Internet of Things
An Efficient Multidocument Blind Signcryption Scheme for Smart Grid‐Enabled Industrial Internet of Things Open
The smart grid‐enabled industrial Internet of Things (SG‐IIoT) is a hybrid data communication network connected with the power grid that collects and analyzes data from transmission lines, distribution substations, and consumers. In the II…
View article: Certificate-Based Signcryption Scheme for Securing Wireless Communication in Industrial Internet of Things
Certificate-Based Signcryption Scheme for Securing Wireless Communication in Industrial Internet of Things Open
The Industrial Internet of Things (IIoT) community is concerned about the security of wireless communications between interconnected industries and autonomous systems. Providing a cyber-security framework for the IIoT offers a thorough com…
View article: Enhanced-AODV Routing Protocol to Improve Route Stability of MANETs
Enhanced-AODV Routing Protocol to Improve Route Stability of MANETs Open
Establishing and maintaining link stability in Mobile Ad hoc Networks (MANETs) is one of the key challenging issues. Topology changes in MANET because overhead traffic that leads to consuming extra energy of nodes as well as decreasing the…
View article: Investigating the Impact of Mobility Models on MANET Routing Protocols
Investigating the Impact of Mobility Models on MANET Routing Protocols Open
A mobile ad hoc network (MANET) is a type of multi-hop network under different movement patterns without requiring any fixed infrastructure or centralized control. The mobile nodes in this network moves arbitrarily and topology changes fre…
View article: New Approaches to Encrypt and Decrypt Data in Image using Cryptography and Steganography Algorithm
New Approaches to Encrypt and Decrypt Data in Image using Cryptography and Steganography Algorithm Open
Nowadays, network has important roles for transferring data accurately and fast from source to a destination.The data is not secure enough to transfer highly confidential.The security of information has become one of the principle challeng…
View article: Investigating on Mobile Ad-Hoc Network to Transfer FTP Application
Investigating on Mobile Ad-Hoc Network to Transfer FTP Application Open
—Mobile Ad-hoc Network (MANET) is the collection of mobile nodes without requiring of any infrastructure. Mobile nodes in MANET are operating as a router and MANET network topology can change quickly. Due to nodes in the network are mobile…