Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Item TypeItem Type
-
SubjectSubject
-
YearFrom:-To:
-
More FiltersMore FiltersSourceLanguage
Done
Filters
Reset
41
result(s) for
"Rosilah Hassan"
Sort by:
Internet of Things and Its Applications: A Comprehensive Survey
by
Hassan, Rosilah
,
Aman, Azana Hafizah Mohd
,
Qamar, Faizan
in
Artificial intelligence
,
Data communication
,
Internet of Things
2020
With the evolution of the fifth-generation (5G) wireless network, the Internet of Things (IoT) has become a revolutionary technique that enables a diverse number of features and applications. It can able a diverse amount of devices to be connected in order to create a single communication architecture. As it has significantly expanded in recent years, it is fundamental to study this trending technology in detail and take a close look at its applications in the different domains. It represents an enabler of new communication possibilities between people and things. The main asset of this concept is its significant influence through the creation of a new world dimension. The key features required for employing a large-scale IoT are low-cost sensors, high-speed and error-tolerant data communications, smart computations, and numerous applications. This research work is presented in four main sections, including a general overview of IoT technology, a summary of previous correlated surveys, a review regarding the main IoT applications, and a section on the challenges of IoT. The purpose of this study is to fully cover the applications of IoT, including healthcare, environmental, commercial, industrial, smart cities, and infrastructural applications. This work explains the concept of IoT and defines and summarizes its main technologies and uses, offering a next-generation protocol as a solution to the challenges. IoT challenges were investigated to enhance research and development in the fields. The contribution and weaknesses of each research work cited are covered, highlighting eventual possible research questions and open matters for IoT applications to ensure a full analysis coverage of the discussed papers.
Journal Article
Blockchain Technology: Security Issues, Healthcare Applications, Challenges and Future Trends
by
Syed Talib Abbas Jafri
,
Zhang Wenhua
,
Taj-Aldeen Naser Abdali
in
Algorithms
,
Analysis
,
Archives & records
2023
Blockchain technology provides a data structure with inherent security properties that include cryptography, decentralization, and consensus, which ensure trust in transactions. It covers widely applicable usages, such as in intelligent manufacturing, finance, the Internet of things (IoT), medicine and health, and many different areas, especially in medical health data security and privacy protection areas. Its natural attributes, such as contracts and consensus mechanisms, have leading-edge advantages in protecting data confidentiality, integrity, and availability. The security issues are gradually revealed with in-depth research and vigorous development. Unlike traditional paper storage methods, modern medical records are stored electronically. Blockchain technology provided a decentralized solution to the trust-less issues between distrusting parties without third-party guarantees, but the “trust-less” security through technology was easily misunderstood and hindered the security differences between public and private blockchains appropriately. The mentioned advantages and disadvantages motivated us to provide an advancement and comprehensive study regarding the applicability of blockchain technology. This paper focuses on the healthcare security issues in blockchain and sorts out the security risks in six layers of blockchain technology by comparing and analyzing existing security measures. It also explores and defines the different security attacks and challenges when applying blockchain technology, which promotes theoretical research and robust security protocol development in the current and future distributed work environment.
Journal Article
Conceptual Framework for Future WSN-MAC Protocol to Achieve Energy Consumption Enhancement
by
Hassan, Rosilah
,
Ibrahim, Anwar Hassan
,
Aman, Azana Hafizah Mohd
in
Access control
,
Automation
,
Computer networks
2022
Nowadays, the rapid deployment of Wireless Sensor Networks (WSNs) and the integration of Internet of Things (IoT) technology has enabled their application to grow in various industrial fields in our country. Various factors influence the success of WSN development, particularly improvements in Medium Access Control (MAC) protocols, for which WSNs-IoT are deemed vital. Several aspects should be considered, such as energy consumption reduction, performance, scalability for a large deployment of nodes, and clustering intelligence. However, many protocols address this aspect in a constrained view of handling the medium access. This work presents a state-of-the-art review of recently proposed WSN MAC protocols. Different methods and approaches are proposed to enhance the main performance factors. Various performance issue factors are considered to be the main attribute that the MAC protocol should support. A comparison table is given to provide further details about using these approaches and algorithms to improve performance issues, such as network throughput, end-to-end delay, and packet drop, translated into energy consumption.
Journal Article
Security Concepts in Emerging 6G Communication: Threats, Countermeasures, Authentication Techniques and Research Directions
by
Hassan, Rosilah
,
Nisar, Kashif
,
Qamar, Faizan
in
6G mobile communication
,
Access control
,
Analysis
2023
Challenges faced in network security have significantly steered the deployment timeline of Fifth Generation (5G) communication at a global level; therefore, research in Sixth Generation (6G) security analysis is profoundly necessitated. The prerogative of this paper is to present a survey on the emerging 6G cellular communication paradigm to highlight symmetry with legacy security concepts along with asymmetric innovative aspects such Artificial Intelligence (AI), Quantum Computing, Federated Learning, etc. We present a taxonomy of the threat model in 6G communication in five security legacy concepts, including Confidentiality, Integrity, Availability, Authentication and Access control (CIA3). We also suggest categorization of threat-countering techniques specific to 6G communication into three types: cryptographic methods, entity attributes and Intrusion Detection System (IDS). Thus, with this premise, we distributed the authentication techniques in eight types, including handover authentication, mutual authentication, physical layer authentication, deniable authentication, token-based authentication, certificate-based authentication, key agreement-based authentication and multi-factor authentication. We specifically suggested a series of future research directions at the conclusive edge of this survey.
Journal Article
Anomaly Detection Using Deep Neural Network for IoT Architecture
by
Nisar, Kashif
,
Hassan, Rosilah
,
Ahmad, Zeeshan
in
Algorithms
,
anomaly detection
,
Artificial intelligence
2021
The revolutionary idea of the internet of things (IoT) architecture has gained enormous popularity over the last decade, resulting in an exponential growth in the IoT networks, connected devices, and the data processed therein. Since IoT devices generate and exchange sensitive data over the traditional internet, security has become a prime concern due to the generation of zero-day cyberattacks. A network-based intrusion detection system (NIDS) can provide the much-needed efficient security solution to the IoT network by protecting the network entry points through constant network traffic monitoring. Recent NIDS have a high false alarm rate (FAR) in detecting the anomalies, including the novel and zero-day anomalies. This paper proposes an efficient anomaly detection mechanism using mutual information (MI), considering a deep neural network (DNN) for an IoT network. A comparative analysis of different deep-learning models such as DNN, Convolutional Neural Network, Recurrent Neural Network, and its different variants, such as Gated Recurrent Unit and Long Short-term Memory is performed considering the IoT-Botnet 2020 dataset. Experimental results show the improvement of 0.57–2.6% in terms of the model’s accuracy, while at the same time reducing the FAR by 0.23–7.98% to show the effectiveness of the DNN-based NIDS model compared to the well-known deep learning models. It was also observed that using only the 16–35 best numerical features selected using MI instead of 80 features of the dataset result in almost negligible degradation in the model’s performance but helped in decreasing the overall model’s complexity. In addition, the overall accuracy of the DL-based models is further improved by almost 0.99–3.45% in terms of the detection accuracy considering only the top five categorical and numerical features.
Journal Article
Performance Improvements of AODV by Black Hole Attack Detection Using IDS and Digital Signature
2021
In mobile ad hoc networks (MANETs), mobile devices connect with other devices wirelessly, where there is no central administration. They are prone to different types of attacks such as the black hole, insider, gray hole, wormhole, faulty node, and packet drop, which considerably interrupt to perform secure communication. This paper has implemented the denial-of-service attacks like black hole attacks on general-purpose ad hoc on-demand distance vector (AODV) protocol. It uses three approaches: normal AODV, black hole AODV (BH_AODV), and detected black hole AODV (D_BH_AODV), wherein we observe that black holes acutely degrade the performance of networks. We have detected the black hole attacks within the networks using two techniques: (1) intrusion detection system (IDS) and (2) encryption technique (digital signature) with the concept of prevention. Moreover, normal AODV, BH_AODV, and D_BH_AODV protocols are investigated for various quality of service (QoS) parameters, i.e., packet delivery ratio (PDR), delay, and overhead with varying the number of nodes, packet sizes, and simulation times. The NS2 software has been used as a simulation tool to simulate existing network topologies, but it does not contain any mechanism to simulate malicious protocols by itself; therefore, we have developed and implemented a D_BH_AODV routing protocol. The outcomes show that the proposed D_BH_AODV approach for the PDR value delivers around 40 to 50% for varying nodes and packets. In contrast, the delay decreases from 300 to 100 ms and 150 to 50 ms with an increase in the number of nodes and packets, respectively. Furthermore, the overhead changes from 1 to 3 for various nodes and packet values. The outcome of this research proves that the black hole attack degrades the overall performance of the network, while the D_BH_AODV enhances the QoS performance since it detects the black hole nodes and avoids them to establish the communication between nodes.
Journal Article
Issues, Challenges, and Research Trends in Spectrum Management: A Comprehensive Overview and New Vision for Designing 6G Networks
by
Quang Ngoc Nguyen
,
Faizan Qamar
,
Rosilah Hassan
in
6G mobile communication
,
Artificial intelligence
,
Bandwidths
2020
With an extensive growth in user demand for high throughput, large capacity, and low latency, the ongoing deployment of Fifth-Generation (5G) systems is continuously exposing the inherent limitations of the system, as compared with its original premises. Such limitations are encouraging researchers worldwide to focus on next-generation 6G wireless systems, which are expected to address the constraints. To meet the above demands, future radio network architecture should be effectively designed to utilize its maximum radio spectrum capacity. It must simultaneously utilize various new techniques and technologies, such as Carrier Aggregation (CA), Cognitive Radio (CR), and small cell-based Heterogeneous Networks (HetNet), high-spectrum access (mmWave), and Massive Multiple-Input-Multiple-Output (M-MIMO), to achieve the desired results. However, the concurrent operations of these techniques in current 5G cellular networks create several spectrum management issues; thus, a comprehensive overview of these emerging technologies is presented in detail in this study. Then, the problems involved in the concurrent operations of various technologies for the spectrum management of the current 5G network are highlighted. The study aims to provide a detailed review of cooperative communication among all the techniques and potential problems associated with the spectrum management that has been addressed with the possible solutions proposed by the latest researches. Future research challenges are also discussed to highlight the necessary steps that can help achieve the desired objectives for designing 6G wireless networks.
Journal Article
Design and Development of Smart Parking System Based on Fog Computing and Internet of Things
by
Hassan, Rosilah
,
Khayyat, Mashael
,
Jabbar, Waheb
in
Algorithms
,
Case studies
,
Cloud computing
2021
Current parking systems employ a single gateway-centered solution (i.e., cloud) for data processing which leads to the possibility of a single point of failure, data loss, and high delays. Moreover, the parking-spot selection process considers criteria that do not maximize parking utilization and revenue. The pricing strategy does not achieve high revenue because a fixed pricing rate is utilized. To address these issues, this paper proposes a smart parking system based on the Internet of Things (IoT) that provides useful information to drivers and parking administrators about available parking spots and related services such as parking navigation, reservation, and availability estimation. A multi-layer architecture is developed that consists of multiple sensor nodes, and fog and cloud computing layers. The acquired parking data are processed through fog computing nodes to facilitate obtaining the required real-time parking data. A novel algorithm to obtain the optimal parking spot with the minimum arrival time is also presented. Proof-of-concept implementation and simulation evaluations are conducted to validate the system performance. The findings show that the system reduces the parking arrival time by 16–46% compared to current parking systems. In addition, the revenue is increased for the parking authority by 10–15%.
Journal Article
Comparison of Named Data Networking Mobility Methodology in a Merged Cloud Internet of Things and Artificial Intelligence Environment
by
Azamuddin, Wan Muhd Hazwan
,
Hassan, Rosilah
,
Aman, Azana Hafizah Mohd
in
Artificial intelligence
,
cloud internet of things
,
Consumers
2022
In-network caching has evolved into a new paradigm, paving the way for the creation of Named Data Networking (NDN). Rather than simply being typical Internet technology, NDN serves a range of functions, with a focus on consumer-driven network architecture. The NDN design has been proposed as a method for replacing Internet Protocol (IP) addresses with identified content. This study adds to current research on NDN, artificial intelligence (AI), cloud computing, and the Internet of Things (IoT). The core contribution of this paper is the merging of cloud IoT (C-IoT) and NDN-AI-IoT. To be precise, this study provides possible methodological and parameter explanations of the technologies via three methods: KITE, a producer mobility support scheme (PMSS), and hybrid network mobility (hybrid NeMO). KITE uses the indirection method to transmit content using simple NDN communication; the PMSS improves producer operation by reducing handover latency; and hybrid NeMO provides a binding information table to replace the base function of forwarding information. This study also describes mathematical equations for signaling cost and handover latency. Using the network simulator ndnSIM NS-3, this study highlights producer mobility operation. Mathematical equations for each methodology are developed based on the mobility scenario to measure handover latency and signaling cost. The results show that the efficiency of signaling cost for hybrid NeMO is approximately 4% better than that of KITE and the PMSS, while the handover latency for hybrid NeMO is 46% lower than that of KITE and approximately 60% lower than that of the PMSS.
Journal Article
Analyzing the maximum angle of light‐emitting diodes for indoor visible light communication
by
Hassan, Rosilah
,
Latiff, Liza Abdul
,
Hasan, Mohammad Kamrul
in
angle modulation
,
Bandwidths
,
Codes
2023
In this letter, an optimal arrangement of the Light‐Emitting Diodes (LED) for an indoor Visible Light Communication (VLC) setup is presented by using the simulation model. The idea is to get the maximum angle of covering the area of the LED as an access point during user mobility in keeping the connectivity between the user and the access point. As a result, an analysis of data rate measurement is discussed using the maximum angle rotation of the LED as an access point. The authors present validation simulation results for a Line‐of‐Sight configuration. The authors demonstrated that the angle change movement can be carried out efficiently. Results suggest that the directivity at the transmitter can enlarge the area region of the transmitter and user mobility.
Journal Article