Baraq Ghaleb
YOU?
Author Swipe
Harnessing Blockchain: a Framework for Sustainable Reverse Supply Chain Optimization Open
Vehicle recalls in the UK have surged in recent years, necessitating efficient and secure management of safety concerns by the Driver and Vehicle Standards Agency (DVSA) in partnership with manufacturers. The DVSA currently relies on tradi…
Evaluating the Energy Costs of SHA-256 and SHA-3 (KangarooTwelve) in Resource-Constrained IoT Devices Open
The rapid expansion of Internet of Things (IoT) devices has heightened the demand for lightweight and secure cryptographic mechanisms suitable for resource-constrained environments. While SHA-256 remains a widely used standard, the emergen…
A Survey on LoRaWAN MAC Schemes: From Conventional Solutions to AI-Driven Protocols Open
Long Range (LoRa) networks have emerged as a vital solution catering to applications requiring coverage over relatively long distances in the world of Internet of Things (IoT), where connectivity and efficient data transmission are paramou…
Side Channel Analysis in Homomorphic Encryption Open
Homomorphic encryption provides many opportunities for privacy-aware processing, including with methods related to machine learning. Many of our existing cryptographic methods have been shown in the past to be susceptible to side channel a…
Privacy-Preserving Credit Card Approval Using Homomorphic SVM: Toward Secure Inference in FinTech Applications Open
The growing use of machine learning in cloud environments raises critical concerns about data security and privacy, especially in finance. Fully Homomorphic Encryption (FHE) offers a solution by enabling computations on encrypted data, but…
View article: Performance Evaluation of Threshold Signing Schemes in Cryptography
Performance Evaluation of Threshold Signing Schemes in Cryptography Open
Threshold Signature Scheme (TSS) protocols have gained significant attention over the past ten years due to their widespread adoption in cryptocurrencies. The adoption is mainly boosted by Gennaro and Goldfedder's TSS protocol. Since then,…
Sustainable Environmental Monitoring: Multistage Fusion Algorithm for Remotely Sensed Underwater Super-Resolution Image Enhancement and Classification Open
Oceans and seas cover more than 70% of the Earth's surface. If compared with the land mass there are a lot of unexplored locations, a wealth of natural resources, and diverse ocean creatures that are inaccessible to us humans. Underwater r…
Investigation of brain response to acquisition and learning the second languages based on EEG signals and machine learning techniques Open
Brain-computer interfaces (BCI) and neurolinguistics have become vital areas of scientific inquiry, focusing on neural mechanisms in language acquisition. While studies have examined brain activity during language learning, there’s a need …
Securing IoT: Mitigating Sybil Flood Attacks with Bloom Filters and Hash Chains Open
In the evolving landscape of the Internet of Things (IoT), ensuring the security and integrity of data transmission remains a paramount challenge. Routing Protocol for Low-Power and Lossy Networks (RPL) is commonly utilized in IoT networks…
Impact Analysis of Security Attacks on Mobile Ad Hoc Networks (MANETs) Open
Mobile ad hoc networks (MANETs) offer a decentralized communication solution ideal for infrastructure-less environments like disaster relief zones. However, their inherent lack of central control and dynamic topology make them vulnerable t…
A Novel Autonomous Adaptive Frame Size for Time-Slotted LoRa MAC Protocol Open
LoRa networks represent a promising technology for IoT applications due to their long range, low cost, and energy efficiency. However, their ALOHA-based access method and duty cycle restrictions can limit their scalability and reliability …
SACNN‐IDS: A self‐attention convolutional neural network for intrusion detection in industrial internet of things Open
Industrial Internet of Things (IIoT) is a pervasive network of interlinked smart devices that provide a variety of intelligent computing services in industrial environments. Several IIoT nodes operate confidential data (such as medical, tr…
Two-Level Dynamic Programming-Enabled Non-Metric Data Aggregation Technique for the Internet of Things Open
The Internet of Things (IoT) has become a transformative technological infrastructure, serving as a benchmark for automating and standardizing various activities across different domains to reduce human effort, especially in hazardous envi…
DID:RING: Ring Signatures using Decentralised Identifiers For Privacy-Aware Identity Open
Decentralised identifiers have become a standardised element of digital identity architecture, with supra-national organisations such as the European Union adopting them as a key component for a unified European digital identity ledger. Th…
ML-Driven Attack Detection in RPL Networks: Exploring Attacker Position's Significance Open
The Routing Protocol for Low Power and Lossy Networks (RPL) plays a pivotal role in IoT communication, employing a rank-based topology to guide routing decisions. However, RPL is vulnerable to Decreased Rank Attacks, where malicious nodes …
RNA-TransCrypt: Image Encryption Using Chaotic RNA Encoding, Novel Transformative Substitution, and Tailored Cryptographic Operations Open
Given the security concerns of Internet of Things (IoT) networks and limited computational resources of IoT devices, this paper presents RNA-TransCrypt, a novel image encryption scheme that is not only highly secure but also efficient and …
Scalable Multi-domain Trust Infrastructures for Segmented Networks Open
Within a trust infrastructure, a private key is often used to digitally sign a transaction, which can be verified with an associated public key. Using PKI (Public Key Infrastructure), a trusted entity can produce a digital signature, verif…
SRSS: A New Chaos-Based Single-Round Single S-Box Image Encryption Scheme for Highly Auto-Correlated Data Open
With the advent of digital communication, securing digital images during transmission and storage has become a critical concern. The traditional s-box substitution methods often fail to effectively conceal the information within highly aut…
Scalable Multi-domain Trust Infrastructures for Segmented Networks Open
Within a trust infrastructure, a private key is often used to digitally sign a transaction, which can be verified with an associated public key. Using PKI (Public Key Infrastructure), a trusted entity can produce a digital signature, verif…
SRSS: A New Chaos-Based Single-Round Single S-Box Image Encryption Scheme for Highly Auto-Correlated Data Open
With the advent of digital communication, securing digital images during transmission and storage has become a critical concern. The traditional s-box substitution methods often fail to effectively conceal the information within highly aut…
A Novel Autonomous Time-Slotted LoRa MAC Protocol with Adaptive Frame Sizes Open
Time-Slotted Medium Access Control protocols bring advantages to the scalability of LoRa networks as an alternative to the ALOHA access method. However, such Time-Slotted protocols require nodes synchronization and schedules dissemination …
(POSTER) Resolving the Decreased Rank Attack in RPL's IoT Networks Open
The Routing Protocol for Low power and Lossy networks (RPL) has been developed by the Internet Engineering Task Force (IETF) standardization body to serve as a part of the 6LoWPAN (IPv6 over Low-Power Wireless Personal Area Networks) stand…
Resolving the Decreased Rank Attack in RPL's IoT Networks Open
The Routing Protocol for Low power and Lossy networks (RPL) has been developed by the Internet Engineering Task Force (IETF) standardization body to serve as a part of the 6LoWPAN (IPv6 over Low-Power Wireless Personal Area Networks) stand…
Distributed Twins in Edge Computing: Blockchain and IOTA Open
Blockchain (BC) and Information for Operational and Tactical Analysis (IOTA) are distributed ledgers that record a huge number of transactions in multiple places at the same time using decentralized databases. Both BC and IOTA facilitate I…
View article: Dynamic S-Box and PWLCM-Based Robust Watermarking Scheme
Dynamic S-Box and PWLCM-Based Robust Watermarking Scheme Open
Due to the increased number of cyberattacks, numerous researchers are motivated towards the design of such schemes that can hide digital information in a signal. Watermarking is one of the promising technologies that can protect digital in…
A Novel Chaotic Permutation-Substitution Image Encryption Scheme Based on Logistic Map and Random Substitution Open
Privacy is a serious concern related to sharing videos or images among people over the Internet. As a method to preserve images’ privacy, chaos-based image encryption algorithms have been used widely to fulfil such a requirement. However, …
Wireless Sensor Networks (WSN) in Oil and Gas Industry: Applications, Requirements and Existing Solutions Open
Effective measurement and monitoring of certain parameters (temperature, pressure, flow etc.) is crucial for the safety and optimization of processes in the Oil and Gas Industry. Wired sensors have been extensively utilized for this purpos…