Loading [MathJax]/extensions/MathMenu.js
Ibrahim Nadir - IEEE Xplore Author Profile

Showing 1-9 of 9 results

Filter Results

Show

Results

Internet of Things (IoT) market is growing exponentially and automated smart solutions are revolutionizing a diverse range of areas with innovative technologies. The most critical and vital part of an IoT system that cannot be overlooked at any cost is its security. The security standards for IoT devices are not mature enough to provide foolproof security and there is still a long journey for manu...Show More
Internet of Things (IoT) devices is being used in countless network applications. However, due to their insecure nature, the wide adoption of these devices has also increased the possibility of cyber-attacks. There is a need for a robust security mechanism to detect and safeguard against numerous threats. Machine Learning (ML) techniques have been used to detect attacks on different networking lay...Show More
Wireless sensor networks (WSN) have become an increasingly popular technology over the past decade with multiple applications in a range of avenues from E-healthcare to environmental monitoring. WSN applications can be used for data collection, monitoring, and operational analytics to aid in decision making. Recently WSN technology has also found increasing adoption in the emerging Internet of Thi...Show More
The prevalent use of IoT has raised numerous security concerns in recent times. One particular vulnerability in IoT ecosystem is weak authentication credentials. A large number of IoT attacks exploit such vulnerabilities. Emerged in 2016, the famous Mirai malware conducts attacks that benefits from poorly chosen username and passwords. Since its advent, Mirai attacks have only increased with time....Show More
Current resource consumption monitoring systems such as utility meters allow for easy manipulation to give incorrect readings and generate corrupt bills leading to huge financial losses for utility companies. In order to limit this practice, the present work proposes the use of smart meters in tandem with an Ethereum-based blockchain to secure utility (consumption) data. Electricity generation and...Show More
Software defined networking (SDN) promises a paradigm shift in real-time traffic management by offering centralized network control and programmability. The present work leverages SDN technology for dynamic resource allocation in campus environments with a view to improve Voice over Internet Protocol (VoIP) communication between end-systems. To correctly record user perceived voice quality the mat...Show More
Introduction of IoT is a big step towards the convergence of physical and virtual world as everyday objects are connected to the internet nowadays. But due to its diversity and resource constraint nature, the security of these devices in the real world has become a major challenge. Although a number of security frameworks have been suggested to ensure the security of IoT devices, frameworks for au...Show More
An ever-increasing number of Internet-enabled devices over the past decade have highlighted the requirement for robust cybersecurity primitives to effectively deal with contemporary forms of cybercrime. Among the recent cybercrime threat canvass, ransomware has come to limelight as a prominent form of crypto-virus, aiming to hamper everyday user device operation through unsolicited encryption of d...Show More
Wireless Sensor Networks (WSN) are becoming an increasingly popular technology for data collection. Since data is of significant importance in the current era, security of the data is essentially indispensable. Because the nodes deployed are usually on an unattended environment, security of the data communicated between the wireless sensor nodes is of utmost importance. A secure established connec...Show More