This page has only limited features, please log in for full access.

Dr. Kashif Saleem
King Saud University, Saudi Arabia

Basic Info


Research Keywords & Expertise

0 Bioinformatics
0 Cyber Security
0 ant colony optimization
0 Blood brain barrier
0 telecommunications networks

Fingerprints

Wireless sensor networks (WSNs)
Wireless Sensor Networks, CyberSecurity, Heathcare Applications, Computer Communications Networks, Network Security
ant colony optimization
Cyber Security
Cybersecurity and Privacy

Honors and Awards

The user has no records in this section


Career Timeline

The user has no records in this section.


Short Biography

The user biography is not available.
Following
Followers
Co Authors
Profile ImageMohamed Guerroumi USTHB University
Profile ImageYakubu S. Baguda Department of Optics & Telem...
Profile ImageMuhammad Imran College of Applied Computer ...
Profile ImageZhiyuan Tan School of Computing, Merchis...
Profile ImagePaul Haskell-Dowland Edith Cowan University
Profile ImageBruno M. C. Silva Instituto de Telecomunicaç�...
Profile ImageRajan Shankaran Department of Computing, Mac...
Following: 19 users
View all

Feed

Journal article
Published: 08 June 2021 in Computer Communications
Reads 0
Downloads 0

Fog computing, a term coined by Cisco, is a new paradigm that extends the capabilities and services of cloud computing to the edge of the network. As a result, fog computing provides better location awareness and reduces the latency that occurs due to the distance between end devices and the cloud, which is a major issue for sensitive applications. Given that fog computing runs software on devices at the edge of the network rather than on the cloud side, it supports real-time smart applications, such as smart homes, smart grids, health data management, and smart vehicular technologies. This study focuses on security and privacy challenges in the fog computing paradigm and proposes a trust mechanism to address data breach, data loss, Denial of service (DoS) and establish a secure environment for fog applications. The novel model based on the subjective logic method calculates the trust value of nodes to determine if a node is from the network or a rogue node. The proposed trust model is implemented on iFogSim simulator and analyzed with multiple fog nodes that clearly demonstrates the effectiveness in providing the security.

ACS Style

Jalal Al Muhtadi; Rawan A. Alamri; Farrukh Aslam Khan; Kashif Saleem. Subjective logic-based trust model for fog computing. Computer Communications 2021, 178, 221 -233.

AMA Style

Jalal Al Muhtadi, Rawan A. Alamri, Farrukh Aslam Khan, Kashif Saleem. Subjective logic-based trust model for fog computing. Computer Communications. 2021; 178 ():221-233.

Chicago/Turabian Style

Jalal Al Muhtadi; Rawan A. Alamri; Farrukh Aslam Khan; Kashif Saleem. 2021. "Subjective logic-based trust model for fog computing." Computer Communications 178, no. : 221-233.

Journal article
Published: 07 June 2021 in IEEE Access
Reads 0
Downloads 0

In above article [1] , reference [11] is incorrect as the conference article had not been published in full until 2019. The correct reference is cited here as [2] . Therefore, the sentences in the article [1] with reference [11] should be cited [2] in this article as “When the data are stored in a centralized location and are transmitted by applying symmetric data encryption techniques, the deployment and maintenance costs will go beyond cost tolerance thresholds [2] ,” “Since cloud computing signifies a comparatively novel computing representation at every level, like applications, hosts, network, and data, that in turn raises the issue of the application safety to shift toward cloud computing [2] and [3] ,” and “However, this definition is not accurate in the sense that, if the normal operation is susceptible to eavesdropping, in this case, the normal operation of the organization must be restricted [2] .”

ACS Style

Hina Abrar; Syed Jawad Hussain; Junaid Chaudhry; Kashif Saleem; Mehmet A. Orgun; Jalal Al-Muhtadi; Craig Valli. Corrections to “Risk Analysis of Cloud Sourcing in Healthcare and Public Health Industry”. IEEE Access 2021, 9, 79628 -79628.

AMA Style

Hina Abrar, Syed Jawad Hussain, Junaid Chaudhry, Kashif Saleem, Mehmet A. Orgun, Jalal Al-Muhtadi, Craig Valli. Corrections to “Risk Analysis of Cloud Sourcing in Healthcare and Public Health Industry”. IEEE Access. 2021; 9 ():79628-79628.

Chicago/Turabian Style

Hina Abrar; Syed Jawad Hussain; Junaid Chaudhry; Kashif Saleem; Mehmet A. Orgun; Jalal Al-Muhtadi; Craig Valli. 2021. "Corrections to “Risk Analysis of Cloud Sourcing in Healthcare and Public Health Industry”." IEEE Access 9, no. : 79628-79628.

Journal article
Published: 26 March 2021 in IEEE Transactions on Intelligent Transportation Systems
Reads 0
Downloads 0

The security and privacy of healthcare enterprises (HEs) are crucial because they maintain sensitive information. Because of the unique functional requirement of omni-inclusiveness, HEs are expected to monitor patients, allowing for connectivity with vehicular ad hoc networks (VANETs). In the absence of literature on security provisioning frameworks that connect VANETs and HEs, this paper presents a smart zero-knowledge proof and statistical fingerprinting-based trusted secure communication framework for a fog computing environment. A zero-knowledge proof is used for vehicle authentication, and statistical fingerprinting is employed to secure communication between VANETs and HEs. Authenticity verification of the operations is performed at the on-board unit (OBU) fitted in the vehicle based on the service executions at the resident hardware platform. The processor clock cycles are acquired from the service executions in a complete sandboxed environment. The calculated cycles assist in developing the blueprint signature for the particular OBU of the vehicle. Hence, the fingerprint signature helps build trust and plays a key role in authenticating the vehicle's horizontal movement to everything or to different sections of the HEs. In an environment enabled for fog computing, our novel model can provide efficient remote monitoring.

ACS Style

Junaid Ahsenali Chaudhry; Kashif Saleem; Mamoun Alazab; Hafiz Maher Ali Zeeshan; Jalal Al-Muhtadi; Joel J. P. C. Rodrigues. Data Security Through Zero-Knowledge Proof and Statistical Fingerprinting in Vehicle-to-Healthcare Everything (V2HX) Communications. IEEE Transactions on Intelligent Transportation Systems 2021, 22, 3869 -3879.

AMA Style

Junaid Ahsenali Chaudhry, Kashif Saleem, Mamoun Alazab, Hafiz Maher Ali Zeeshan, Jalal Al-Muhtadi, Joel J. P. C. Rodrigues. Data Security Through Zero-Knowledge Proof and Statistical Fingerprinting in Vehicle-to-Healthcare Everything (V2HX) Communications. IEEE Transactions on Intelligent Transportation Systems. 2021; 22 (6):3869-3879.

Chicago/Turabian Style

Junaid Ahsenali Chaudhry; Kashif Saleem; Mamoun Alazab; Hafiz Maher Ali Zeeshan; Jalal Al-Muhtadi; Joel J. P. C. Rodrigues. 2021. "Data Security Through Zero-Knowledge Proof and Statistical Fingerprinting in Vehicle-to-Healthcare Everything (V2HX) Communications." IEEE Transactions on Intelligent Transportation Systems 22, no. 6: 3869-3879.

Journal article
Published: 21 December 2020 in IEEE Access
Reads 0
Downloads 0

Every IPv6-enabled device connected and communicating over the Internet forms the Internet of things (IoT) that is prevalent in society and is used in daily life. This IoT platform will quickly grow to be populated with billions or more objects by making every electrical appliance, car, and even items of furniture smart and connected. The 5 th generation (5G) and beyond networks will further boost these IoT systems. The massive utilization of these systems over gigabits per second generates numerous issues. Owing to the huge complexity in large-scale deployment of IoT, data privacy and security are the most prominent challenges, especially for critical applications such as Industry 4.0, e-healthcare, and military. Threat agents persistently strive to find new vulnerabilities and exploit them. Therefore, including promising security measures to support the running systems, not to harm or collapse them, is essential. Nature-inspired algorithms have the capability to provide autonomous and sustainable defense and healing mechanisms. This paper first surveys the 5G network layer security for IoT applications and lists the network layer security vulnerabilities and requirements in wireless sensor networks, IoT, and 5G-enabled IoT. Second, a detailed literature review is conducted with the current network layer security methods and the bio-inspired techniques for IoT applications exchanging data packets over 5G. Finally, the bio-inspired algorithms are analyzed in the context of providing a secure network layer for IoT applications connected over 5G and beyond networks.

ACS Style

Kashif Saleem; Ghadah Majid Alabduljabbar; Nouf Alrowais; Jalal Al-Muhtadi; Muhammad Imran; Joel J. P. C. Rodrigues. Bio-Inspired Network Security for 5G-Enabled IoT Applications. IEEE Access 2020, 8, 229152 -229160.

AMA Style

Kashif Saleem, Ghadah Majid Alabduljabbar, Nouf Alrowais, Jalal Al-Muhtadi, Muhammad Imran, Joel J. P. C. Rodrigues. Bio-Inspired Network Security for 5G-Enabled IoT Applications. IEEE Access. 2020; 8 ():229152-229160.

Chicago/Turabian Style

Kashif Saleem; Ghadah Majid Alabduljabbar; Nouf Alrowais; Jalal Al-Muhtadi; Muhammad Imran; Joel J. P. C. Rodrigues. 2020. "Bio-Inspired Network Security for 5G-Enabled IoT Applications." IEEE Access 8, no. : 229152-229160.

Journal article
Published: 16 November 2020 in Sustainable Cities and Society
Reads 0
Downloads 0

Internet of things (IoT) plays a key role in enabling smart sustainable cities. Pervasive computing over the IoT platform makes life more convenient by embedding sensors based on context-aware computing devices in the physical environment for the ubiquitous availability of computing resources. The sensors gather contextual information from the physical world and transmit it to receivers as per requirements or in case of environmental changes, such as temperature and humidity. However, the combination of dynamic operation and the need to handle sensitive and private data make the pervasive computing environment and IoT devices vulnerable to numerous attacks. Smart environments require a maximum level of safety assurance, such as trusted context producers and customers, which should protect sensitive information from exposure or monitoring. This paper discusses the major cyber threats in smart environments and proposes a novel lightweight security framework that authenticates and maintains the context providers and receivers. The cloud environment is adopted for user authentication at the user layer to implement access control and role assignment. Finally, the proposed security framework is implemented in the IBM cloud platform with six devices to evaluate its efficiency, sustainability, and secure communication.

ACS Style

Jalal Al-Muhtadi; Kashif Saleem; Sumayah Al-Rabiaah; Muhammad Imran; Amjad Gawanmeh; Joel J.P.C. Rodrigues. A lightweight cyber security framework with context-awareness for pervasive computing environments. Sustainable Cities and Society 2020, 66, 102610 .

AMA Style

Jalal Al-Muhtadi, Kashif Saleem, Sumayah Al-Rabiaah, Muhammad Imran, Amjad Gawanmeh, Joel J.P.C. Rodrigues. A lightweight cyber security framework with context-awareness for pervasive computing environments. Sustainable Cities and Society. 2020; 66 ():102610.

Chicago/Turabian Style

Jalal Al-Muhtadi; Kashif Saleem; Sumayah Al-Rabiaah; Muhammad Imran; Amjad Gawanmeh; Joel J.P.C. Rodrigues. 2020. "A lightweight cyber security framework with context-awareness for pervasive computing environments." Sustainable Cities and Society 66, no. : 102610.

Journal article
Published: 15 May 2020 in Sustainability
Reads 0
Downloads 0

The rapid growth of Information and Communication Technologies (ICT)—specifically, the Internet—has given emergence to e-learning. Resultantly, web-based e-learning systems are being increasingly developed to enhance the learning process. However, the utilization of such systems is low, mainly owing to poor quality content and overall design problems. To improve usage, it is imperative to identify the factors with the most significant impact on the quality of these systems so that the e-learning industry keeps these factors in consideration while developing e-learning systems. This study focused on the identification and prioritization of factors related to the design quality of e-learning systems through a hierarchical quality model. Thus, firstly, an extensive literature review was conducted to identify the factors that most affect the quality of web-based e-learning systems. Secondly, among the identified factors, only those with the most significant effect were considered. To identify the most important quality criteria, a survey was conducted. An instrument was deployed among 157 subjects, including e-learning designers, developers, students, teachers, and educational administrators. Finally, a second instrument was distributed among 51 participants to make a pairwise comparison among the criteria and rank them according to their relative importance. The identified and prioritized factors were classified into four main categories. Among these four factors, content was identified as the most important factor, whereas design was found to be the least important factor.

ACS Style

Abdul Hafeez Muhammad; Ansar Siddique; Ahmed E. Youssef; Kashif Saleem; Basit Shahzad; Adnan Akram; Al-Batool Saleh Al-Thnian. A Hierarchical Model to Evaluate the Quality of Web-Based E-Learning Systems. Sustainability 2020, 12, 4071 .

AMA Style

Abdul Hafeez Muhammad, Ansar Siddique, Ahmed E. Youssef, Kashif Saleem, Basit Shahzad, Adnan Akram, Al-Batool Saleh Al-Thnian. A Hierarchical Model to Evaluate the Quality of Web-Based E-Learning Systems. Sustainability. 2020; 12 (10):4071.

Chicago/Turabian Style

Abdul Hafeez Muhammad; Ansar Siddique; Ahmed E. Youssef; Kashif Saleem; Basit Shahzad; Adnan Akram; Al-Batool Saleh Al-Thnian. 2020. "A Hierarchical Model to Evaluate the Quality of Web-Based E-Learning Systems." Sustainability 12, no. 10: 4071.

Special issue paper
Published: 31 March 2020 in Software: Practice and Experience
Reads 0
Downloads 0

Internet of things environment is adopted widely in different industries and business organizations with varying capacity. It provides a favorable environment to outsource the crowdsourced data in the cloud to minimize the cost of computation, which is called crowdsourcing. Crowdsourcing is a technique where individuals or organizations obtain goods and services. A professional or industry outsource the crowdsourced data in the cloud, where confidentiality and authenticity of data become essential. Signcryption is the cryptographic technique that serves both the authenticity and the privacy of transmitted messages. This technique ensures secure authentic data transmission and storage. Therefore, this paper proposes an identity‐based signcryption scheme. In the proposed PSSCC framework, the user does pairing free computation during signcryption, which makes efficient calculation on user‐side. Moreover, PSSCC framework is proved secure under modified bilinear Diffie‐Hellman inversion and modified bilinear strong Diffie‐Hellman problems. The performance analysis of PSSCC with related schemes indicates that the proposed system supports efficient communication along with less computation cost.

ACS Style

Dharminder Dharminder; Dheerendra Mishra; Joel J. P. C. Rodrigues; Ricardo Rabelo; Kashif Saleem. PSSCC: Provably secure communication framework for crowdsourced industrial Internet of Things environments. Software: Practice and Experience 2020, 1 .

AMA Style

Dharminder Dharminder, Dheerendra Mishra, Joel J. P. C. Rodrigues, Ricardo Rabelo, Kashif Saleem. PSSCC: Provably secure communication framework for crowdsourced industrial Internet of Things environments. Software: Practice and Experience. 2020; ():1.

Chicago/Turabian Style

Dharminder Dharminder; Dheerendra Mishra; Joel J. P. C. Rodrigues; Ricardo Rabelo; Kashif Saleem. 2020. "PSSCC: Provably secure communication framework for crowdsourced industrial Internet of Things environments." Software: Practice and Experience , no. : 1.

Journal article
Published: 20 December 2019 in Journal of Network and Computer Applications
Reads 0
Downloads 0

The microservice recommendation mechanism, as a key supporting technology for providing users with intelligent and proactive application services, is one of the important research contents in mobile social networks. In this paper, a recommendation mechanism of mobile social network service based on user trajectory, trust network and collaborative filtering algorithm is proposed. The user trajectory prediction model based on Generative Adversarial Network (GAN) is introduced into the process of service recommendation, and combined with trust degree to constitute the 3D service recommendation model of user-service-trajectory prediction. This method improves the accuracy and reliability of service recommendation and avoids the blindness and randomness of service recommendation. The simulation experiments show that the service recommendation algorithm has higher accuracy than the traditional collaborative filtering algorithm.

ACS Style

Ru Wang; Muhammad Imran; Kashif Saleem. A microservice recommendation mechanism based on mobile architecture. Journal of Network and Computer Applications 2019, 152, 102510 .

AMA Style

Ru Wang, Muhammad Imran, Kashif Saleem. A microservice recommendation mechanism based on mobile architecture. Journal of Network and Computer Applications. 2019; 152 ():102510.

Chicago/Turabian Style

Ru Wang; Muhammad Imran; Kashif Saleem. 2019. "A microservice recommendation mechanism based on mobile architecture." Journal of Network and Computer Applications 152, no. : 102510.

Review article
Published: 24 October 2019 in Neural Computing and Applications
Reads 0
Downloads 0

Among the numerous alternatives used in the world of risk balance, it highlights the provision of guarantees in the formalization of credit agreements. The objective of this paper is to compare the achievement of fuzzy sets with that of artificial neural network-based decision trees on credit scoring to predict the recovered value using a sample of 1890 borrowers. Comparing with fuzzy logic, the decision analytic approach can more easily present the outcomes of the analysis. On the other hand, fuzzy logic makes some implicit assumptions that may make it even harder for credit-grantors to follow the logical decision-making process. This paper leads an initial study of collateral as a variable in the calculation of the credit scoring. The study concludes that the two models make modelling of uncertainty in the credit scoring process possible. Although more difficult to implement, fuzzy logic is more accurate for modelling the uncertainty. However, the decision tree model is more favourable to the presentation of the problem.

ACS Style

Gernmanno Teles; Joel J. P. C. Rodrigues; Kashif Saleem; Sergei Kozlov; Ricardo Rabelo. Machine learning and decision support system on credit scoring. Neural Computing and Applications 2019, 32, 9809 -9826.

AMA Style

Gernmanno Teles, Joel J. P. C. Rodrigues, Kashif Saleem, Sergei Kozlov, Ricardo Rabelo. Machine learning and decision support system on credit scoring. Neural Computing and Applications. 2019; 32 (14):9809-9826.

Chicago/Turabian Style

Gernmanno Teles; Joel J. P. C. Rodrigues; Kashif Saleem; Sergei Kozlov; Ricardo Rabelo. 2019. "Machine learning and decision support system on credit scoring." Neural Computing and Applications 32, no. 14: 9809-9826.

Systems level quality improvement
Published: 16 October 2019 in Journal of Medical Systems
Reads 0
Downloads 0

Real-time and ubiquitous patient monitoring demands the use of wireless data acquisition through resource constrained medical sensors, mostly configured with No-input No-output (NiNo) capabilities. Bluetooth is one of the most popular and widely adopted means of communicating this sensed information to a mobile terminal. However, over simplified implementations of Bluetooth low energy (BLE) protocol in eHealth sector is susceptible to several wireless attacks, in particular the Man-in-the-Middle (MITM) attack. The issue arises due to a lack of mutual authentication and integrity protection between the communicating devices, which may lead to compromise of confidentiality, availability and even the integrity of this safety-critical information. This research paper presents a novel framework named MARC to detect, analyze, and mitigate Bluetooth security flaws while focusing upon MITM attack against NiNo devices. For this purpose, a comprehensive solution has been proposed, which can detect MITM signatures based upon four novel anomaly detection metrics: analyzing Malicious scan requests, Advertisement intervals, RSSI levels, and Cloned node addresses. The proposed solution has been evaluated through practical implementation and demonstration of different attack scenarios, which show promising results concerning accurate and efficient detection of MITM attacks.

ACS Style

Muhammad Yaseen; Mian Muhammad Waseem Iqbal; Imran Rashid; Haider Abbas; Mujahid Mohsin; Kashif Saleem; Yawar Abbas Bangash. MARC: A Novel Framework for Detecting MITM Attacks in eHealthcare BLE Systems. Journal of Medical Systems 2019, 43, 324 .

AMA Style

Muhammad Yaseen, Mian Muhammad Waseem Iqbal, Imran Rashid, Haider Abbas, Mujahid Mohsin, Kashif Saleem, Yawar Abbas Bangash. MARC: A Novel Framework for Detecting MITM Attacks in eHealthcare BLE Systems. Journal of Medical Systems. 2019; 43 (11):324.

Chicago/Turabian Style

Muhammad Yaseen; Mian Muhammad Waseem Iqbal; Imran Rashid; Haider Abbas; Mujahid Mohsin; Kashif Saleem; Yawar Abbas Bangash. 2019. "MARC: A Novel Framework for Detecting MITM Attacks in eHealthcare BLE Systems." Journal of Medical Systems 43, no. 11: 324.

Journal article
Published: 13 September 2019 in Procedia Computer Science
Reads 0
Downloads 0

With the advancement in technology, the installation and usage of diverse applications and softwares on various Operating Systems (OS) have become a very common practice. Owing to technical flaws, misconfigurations, hidden vulnerabilities etc, these applications/ softwares are highly susceptible to cyber-attacks. The installation of such applications on critical systems may compromise the security of the systems as well as the resident data. Numerous standards and guidelines already exist that help determine the authenticity of software applications, but they are very specific to an OS or a single point of check. Furthermore, the tools, available in this regard, are used to target a very specific issue while others are not freely available. This research work, after the critical analysis of such frameworks and tools, proposes an integrated framework to check the application’s authenticity before its installation. It covers the aspects of confidentiality, integrity, availability and authentication. This is a general framework for all kinds of organizations, but critical organizations with high security objectives specifically, may use this framework to increase their security. The framework has been applied and validated on data sets of six PDF readers, taken from "CVE Details".

ACS Style

Rida Zojaj Naeem; Haider Abbas; Narmeen Shafqat; Kashif Saleem; Waseem Iqbal. A Framework to Determine Applications’ Authenticity. Procedia Computer Science 2019, 155, 268 -275.

AMA Style

Rida Zojaj Naeem, Haider Abbas, Narmeen Shafqat, Kashif Saleem, Waseem Iqbal. A Framework to Determine Applications’ Authenticity. Procedia Computer Science. 2019; 155 ():268-275.

Chicago/Turabian Style

Rida Zojaj Naeem; Haider Abbas; Narmeen Shafqat; Kashif Saleem; Waseem Iqbal. 2019. "A Framework to Determine Applications’ Authenticity." Procedia Computer Science 155, no. : 268-275.

Journal article
Published: 10 September 2019 in IEEE Systems Journal
Reads 0
Downloads 0

Credit operations are indispensable in the organizational development of financial institutions. However, misconduct in these operations occurs, and this can lead to financial loss. These consequences are caused by incorrectly granting credit or incorrectly assigning customer ratings and can compromise a credit portfolio. The result shows that support vector machine is the most commonly used classifier for credit scores, and while the system performs well, it does not apply approaches with collateral. The analysis includes 84 studies in this article to propose using statistical methodology to conduct a meta-analysis to compare the results of classification methods. It shows some cases that consider various probability distributions and also survival data. It also elaborates that collateral is not the first approach for credit scoring. The credit scoring system can then give several starting credit scores according to the classifier the user wants to use.

ACS Style

Germanno Teles; Joel J. P. C. Rodrigues; Kashif Saleem; Sergei A. Kozlov. Classification Methods Applied to Credit Scoring With Collateral. IEEE Systems Journal 2019, 14, 4557 -4566.

AMA Style

Germanno Teles, Joel J. P. C. Rodrigues, Kashif Saleem, Sergei A. Kozlov. Classification Methods Applied to Credit Scoring With Collateral. IEEE Systems Journal. 2019; 14 (3):4557-4566.

Chicago/Turabian Style

Germanno Teles; Joel J. P. C. Rodrigues; Kashif Saleem; Sergei A. Kozlov. 2019. "Classification Methods Applied to Credit Scoring With Collateral." IEEE Systems Journal 14, no. 3: 4557-4566.

Journal article
Published: 02 August 2019 in IEEE Access
Reads 0
Downloads 0

Routing protocols represent an important issue on the Internet of Things (IoT) scenarios since they are responsible for creating paths and forwarding data packets among the network nodes. In mobile IoT scenarios, the topology changes caused by the movement of nodes makes the work of routing protocols more difficult. Thus, the current IoT routing solutions tend to present strong limitations and a poor performance in these scenarios, generally requiring complex additional improvement to better support the mobility of the devices. In this context, the Lightweight On-demand Ad hoc Distance-vector Routing Protocol - Next Generation (LOADng), is an emerging solution for IoT networks that despite being adequate for a mobile environment due to its reactive functioning still lacks in performance. Thus, this paper proposes a novel solution to enhance the performance of LOADng in mobile IoT networks. The improved version, LOADng-IoT-Mob, introduces a mechanism that permits nodes to be aware of the availability of their neighbors through the harnessing of control messages. As a result, these nodes can shorten paths and avoid sending data packets through broken routes due to the movement of the nodes. Additionally, a short periodical control message is introduced, allowing the nodes to update their routing table, even with a low control message frequency. Furthermore, a new routing metric is proposed for creating routes based on the reliability of the link and proximity of the neighboring nodes. Finally, through computational simulations, the performance of the LOADng-IoT-Mob is studied under multiple scenarios varying the network size, the number of mobile devices, and maximum nodes' speed. The results obtained demonstrate the efficiency of the proposed solution in terms of packet delivery ratio, latency, and power and overhead efficiency, with a slight increase in memory consumption.

ACS Style

Jose V. V. Sobral; Joel Jose P. C. Rodrigues; Ricardo Rabelo; Kashif Saleem; Sergei A. Kozlov. Improving the Performance of LOADng Routing Protocol in Mobile IoT Scenarios. IEEE Access 2019, 7, 107032 -107046.

AMA Style

Jose V. V. Sobral, Joel Jose P. C. Rodrigues, Ricardo Rabelo, Kashif Saleem, Sergei A. Kozlov. Improving the Performance of LOADng Routing Protocol in Mobile IoT Scenarios. IEEE Access. 2019; 7 ():107032-107046.

Chicago/Turabian Style

Jose V. V. Sobral; Joel Jose P. C. Rodrigues; Ricardo Rabelo; Kashif Saleem; Sergei A. Kozlov. 2019. "Improving the Performance of LOADng Routing Protocol in Mobile IoT Scenarios." IEEE Access 7, no. : 107032-107046.

Conference paper
Published: 01 June 2019 in 2019 4th International Conference on Smart and Sustainable Technologies (SpliTech)
Reads 0
Downloads 0
ACS Style

Sinara P. Medeiros; Joel Rodrigues; Mauro A. A. Da Cruz; Ricardo Rabelo; Kashif Saleem; Petar Solic. Windows Monitoring and Control for Smart Homes based on Internet of Things. 2019 4th International Conference on Smart and Sustainable Technologies (SpliTech) 2019, 1 .

AMA Style

Sinara P. Medeiros, Joel Rodrigues, Mauro A. A. Da Cruz, Ricardo Rabelo, Kashif Saleem, Petar Solic. Windows Monitoring and Control for Smart Homes based on Internet of Things. 2019 4th International Conference on Smart and Sustainable Technologies (SpliTech). 2019; ():1.

Chicago/Turabian Style

Sinara P. Medeiros; Joel Rodrigues; Mauro A. A. Da Cruz; Ricardo Rabelo; Kashif Saleem; Petar Solic. 2019. "Windows Monitoring and Control for Smart Homes based on Internet of Things." 2019 4th International Conference on Smart and Sustainable Technologies (SpliTech) , no. : 1.

Journal article
Published: 04 April 2019 in IEEE Access
Reads 0
Downloads 0

Connected objects to the Internet (computers, sensors, smartphones, and smart watches) are the part of daily life and their interconnection performs the Internet of Things (IoT) vision. IoT solutions are used in various domains, such as healthcare, industry, agriculture, and cities. IoT networks are often characterized by resource-constrained devices and sometimes deployed in hard to reach areas. In addition, an IoT network landscape may include a large number of heterogeneous devices. All these factors drive the need for adapted management solutions for IoT devices and networks. In order to guarantee the better use of IoT networks, effective and automatic management is necessary. This paper studies different solutions for IoT networks and devices management identifying their characteristics and technical challenges. Important requirements like security, context-aware, and a standard model for messages exchange have not been completely explored. Thus, these most relevant features are used to propose and deploy a new IoT management platform with a friendly user's interface, called management for devices and networks in IoT (M4DN.IoT). The solution is evaluated, demonstrated, validated, and it is under use.

ACS Style

Jonathan De C. Silva; Joel Jose P. C. Rodrigues; Kashif Saleem; Sergei A. Kozlov; Ricardo Rabelo. M4DN.IoT-A Networks and Devices Management Platform for Internet of Things. IEEE Access 2019, 7, 53305 -53313.

AMA Style

Jonathan De C. Silva, Joel Jose P. C. Rodrigues, Kashif Saleem, Sergei A. Kozlov, Ricardo Rabelo. M4DN.IoT-A Networks and Devices Management Platform for Internet of Things. IEEE Access. 2019; 7 ():53305-53313.

Chicago/Turabian Style

Jonathan De C. Silva; Joel Jose P. C. Rodrigues; Kashif Saleem; Sergei A. Kozlov; Ricardo Rabelo. 2019. "M4DN.IoT-A Networks and Devices Management Platform for Internet of Things." IEEE Access 7, no. : 53305-53313.

Journal article
Published: 19 March 2019 in Computers & Electrical Engineering
Reads 0
Downloads 0

Mutual exclusion (ME) is a highly researched problem in distributed computing systems. In the mutual exclusion problem, no two nodes can use critical resource simultaneously. Numerous protocols have been proposed for various types of static as well as mobile distributed systems, namely, Mobile Ad Hoc Networks (MANET), Vehicular Ad Hoc Networks (VANET) and cellular networks. The flying ad hoc networks (FANET) is an interesting variant of distributed systems and, to the best of our knowledge, no protocol exists in the literature for mutual exclusion in FANETs. In FANETs, the critical resource is mounted on an unmanned aerial vehicle (UAV) and user nodes are assumed in the transmission range of the UAV. Ours is the first algorithm to ensure ME in FANETs. The algorithm is token-based and we name it Mobile Resource Mutual Exclusion (MRME) algorithm. Unlike other ad hoc networks, due to swift mobility of nodes as well as resource, the FANETs topology is highly dynamic and fault prone. The MRME algorithm handles it successfully. Further, we present the correctness proof, complexity analysis and simulation results. The worst-case complexity of MRME is O(n) and synchronization delay is T, where T is message propagation delay.

ACS Style

Ashish Khanna; Joel J.P.C. Rodrigues; Naman Gupta; Abhishek Swaroop; Deepak Gupta; Kashif Saleem; Victor Hugo C. de Albuquerque. A mutual exclusion algorithm for flying Ad Hoc networks. Computers & Electrical Engineering 2019, 76, 82 -93.

AMA Style

Ashish Khanna, Joel J.P.C. Rodrigues, Naman Gupta, Abhishek Swaroop, Deepak Gupta, Kashif Saleem, Victor Hugo C. de Albuquerque. A mutual exclusion algorithm for flying Ad Hoc networks. Computers & Electrical Engineering. 2019; 76 ():82-93.

Chicago/Turabian Style

Ashish Khanna; Joel J.P.C. Rodrigues; Naman Gupta; Abhishek Swaroop; Deepak Gupta; Kashif Saleem; Victor Hugo C. de Albuquerque. 2019. "A mutual exclusion algorithm for flying Ad Hoc networks." Computers & Electrical Engineering 76, no. : 82-93.

Journal article
Published: 12 March 2019 in Future Generation Computer Systems
Reads 0
Downloads 0

Vehicular networks are continually gaining popularity, owing to the evolution of the Internet of things, by means of rapid communication in IP-based networks. Vehicles are being fitted with sensory devices to gain inputs from the external environment for information processing. Numerous applications of vehicular networks depend on the use of communication networks. The security and privacy of data communication are significant challenges, particularly in wireless applications, for example, the Internet of connected vehicles. When an official fleet of vehicles (government or military) begins its journey, the vehicles need to communicate with one another to share sensitive information. The security of such a fleet is maintained in various security layers, each of which coordinates and communicates with the others, but avoids disclosing sensitive information of higher security layers to lower security layers. No such access control model exists that can enforce the authority of security officials in layers. We propose a novel security and privacy based access control (SPBAC) model for the Internet of connected vehicles, which allows security officials to access information in combination with permissions and roles, instead of roles only, for officials traveling in vehicles belonging to the same fleet. Vehicle-to-vehicle communication is performed with the aid of onboard unit sensory devices. The vehicles can also communicate through wireless technology, namely WiFi and cellular communications (4G/5G). The SPBAC model provides communication among security layers in a secure, private, and efficient manner compared to other state-of-the-art algorithms. The SPBAC model is demonstrated here using mathematical modeling along with implementation examples.

ACS Style

Muhammad Asif Habib; Mudassar Ahmad; Sohail Jabbar; Shehzad Khalid; Junaid Chaudhry; Kashif Saleem; Joel J.P. C. Rodrigues; Muhammad Sayim Khalil. Security and privacy based access control model for internet of connected vehicles. Future Generation Computer Systems 2019, 97, 687 -696.

AMA Style

Muhammad Asif Habib, Mudassar Ahmad, Sohail Jabbar, Shehzad Khalid, Junaid Chaudhry, Kashif Saleem, Joel J.P. C. Rodrigues, Muhammad Sayim Khalil. Security and privacy based access control model for internet of connected vehicles. Future Generation Computer Systems. 2019; 97 ():687-696.

Chicago/Turabian Style

Muhammad Asif Habib; Mudassar Ahmad; Sohail Jabbar; Shehzad Khalid; Junaid Chaudhry; Kashif Saleem; Joel J.P. C. Rodrigues; Muhammad Sayim Khalil. 2019. "Security and privacy based access control model for internet of connected vehicles." Future Generation Computer Systems 97, no. : 687-696.

Journal article
Published: 26 February 2019 in Future Generation Computer Systems
Reads 0
Downloads 0

Cloud Computing has been a predominant approach for the development of Internet of Things (IoT) solutions. However, to meet the requirements of real-time and latency-sensitive applications in healthcare, a new computing paradigm that follows a Cloud computing approach, called Fog Computing, demonstrates to be an effective tool by extending the Cloud resources to the edge of the network. This work studies the contribution of the Fog Computing paradigm applied to healthcare, highlighting its main benefits regarding latency, network usage, and power consumption. Based on these parameters, a Fog-assisted health monitoring system is proposed and its performance evaluation and demonstration is carried out. The results demonstrates the potential enhancement of this approach to minimise data traffic in the core of the network because data is analysed locally and, also, enhancing security on health information that can be kept locally, enhancing data security and providing better insights of patient’s health status.

ACS Style

Pedro H. Vilela; Joel J.P.C. Rodrigues; Petar Solic; Kashif Saleem; Vasco Furtado. Performance evaluation of a Fog-assisted IoT solution for e-Health applications. Future Generation Computer Systems 2019, 97, 379 -386.

AMA Style

Pedro H. Vilela, Joel J.P.C. Rodrigues, Petar Solic, Kashif Saleem, Vasco Furtado. Performance evaluation of a Fog-assisted IoT solution for e-Health applications. Future Generation Computer Systems. 2019; 97 ():379-386.

Chicago/Turabian Style

Pedro H. Vilela; Joel J.P.C. Rodrigues; Petar Solic; Kashif Saleem; Vasco Furtado. 2019. "Performance evaluation of a Fog-assisted IoT solution for e-Health applications." Future Generation Computer Systems 97, no. : 379-386.

Journal article
Published: 28 January 2019 in Journal of Cleaner Production
Reads 0
Downloads 0

The knowledge of flying insects wing-beat acoustical properties supported the progress of sensing disease vectors mosquitoes in free flight. The classification of individual flying insects species' through wing-beat frequencies and respective harmonics is the principle of frequency spectrum analysis method both in acoustical and optical sensors approaches for disease vectors mosquitoes. Investigations based on acoustic devices, microphones, amplifiers, and recorders have produced extensive scientific contributions to behavioral and biological insects’ knowledge. Moreover, the researches based on acoustical approach are accountable for the massive available database on flying insects species and gender classification. However, it was the advent of the optical sensing approach for flying insects detection that allowed sensor devices to become smaller, cheaper, faster, self-triggered, and further reliable and energy efficient. These benefits enabled the state of the art on mosquitoes monitoring to move towards smarter devices that automatically process data and have greater autonomy in inaccessible locations. Consequently, it becomes plausible to break geographic, economic and social boundaries for the flying insects sensing, allowing the ubiquitous monitoring of disease-vector mosquito populations. This paper reviews the related literature on automated electronic approaches for disease vectors mosquitoes monitoring and identifies open issues and opportunities for further researches in expanding scenarios considering new data processing and emerging transmission technologies.

ACS Style

Diego A.A. Santos; Joel J.P.C. Rodrigues; Vasco Furtado; Kashif Saleem; Valery Korotaev. Automated electronic approaches for detecting disease vectors mosquitoes through the wing-beat frequency. Journal of Cleaner Production 2019, 217, 767 -775.

AMA Style

Diego A.A. Santos, Joel J.P.C. Rodrigues, Vasco Furtado, Kashif Saleem, Valery Korotaev. Automated electronic approaches for detecting disease vectors mosquitoes through the wing-beat frequency. Journal of Cleaner Production. 2019; 217 ():767-775.

Chicago/Turabian Style

Diego A.A. Santos; Joel J.P.C. Rodrigues; Vasco Furtado; Kashif Saleem; Valery Korotaev. 2019. "Automated electronic approaches for detecting disease vectors mosquitoes through the wing-beat frequency." Journal of Cleaner Production 217, no. : 767-775.

Journal article
Published: 03 January 2019 in Sensors
Reads 0
Downloads 0

The Internet of Things (IoT) is an emerging paradigm that proposes the connection of objects to exchange information in order to reach a common objective. In IoT networks, it is expected that the nodes will exchange data between each other and with external Internet services. However, due to deployment costs, not all the network devices are able to communicate with the Internet directly. Thus, other network nodes should use Internet-connected nodes as a gateway to forward messages to Internet services. Considering the fact that main routing protocols for low-power networks are not able to reach suitable performance in the displayed IoT environment, this work presents an enhancement to the Lightweight On-demand Ad hoc Distance-vector Routing Protocol—Next Generation (LOADng) for IoT scenarios. The proposal, named LOADng-IoT, is based on three improvements that will allow the nodes to find Internet-connected nodes autonomously and dynamically, decreasing the control message overhead required for the route construction, and reducing the loss of data messages directed to the Internet. Based on the performed assessment study, which considered several number of nodes in dense, sparse, and mobility scenarios, the proposed approach is able to present significant results in metrics related to quality-of-service, reliability, and energy efficiency.

ACS Style

José V. V. Sobral; Joel J. P. C. Rodrigues; Ricardo A. L. Rabêlo; Kashif Saleem; Vasco Furtado. LOADng-IoT: An Enhanced Routing Protocol for Internet of Things Applications over Low Power Networks. Sensors 2019, 19, 150 .

AMA Style

José V. V. Sobral, Joel J. P. C. Rodrigues, Ricardo A. L. Rabêlo, Kashif Saleem, Vasco Furtado. LOADng-IoT: An Enhanced Routing Protocol for Internet of Things Applications over Low Power Networks. Sensors. 2019; 19 (1):150.

Chicago/Turabian Style

José V. V. Sobral; Joel J. P. C. Rodrigues; Ricardo A. L. Rabêlo; Kashif Saleem; Vasco Furtado. 2019. "LOADng-IoT: An Enhanced Routing Protocol for Internet of Things Applications over Low Power Networks." Sensors 19, no. 1: 150.