Article
Computer Science, Information Systems
Mahendra Prasad, Sachin Tripathi, Keshav Dahal
Summary: Mobile ad-hoc network is vulnerable to attacks, and encryption-based security mechanism is not compatible. Lightweight technique and intrusion detection system serve as reliable security mechanisms. This paper proposes an intrusion detection method based on learning techniques, which outperforms existing schemes in extensive simulations.
Article
Computer Science, Software Engineering
D. Ramkumar, C. Annadurai, I Nelson
Summary: This article presents a framework that considers continuous authentication and intrusion detection in mobile ad hoc networks (MANETs), implementing multi-layered security measures at different levels. Iris images are used for authentication, while detection and response engines are employed for high security in ad hoc networks.
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE
(2022)
Article
Automation & Control Systems
Mahendra Prasad, Sachin Tripathi, Keshav Dahal
Summary: A Mobile Ad-Hoc Network (MANET) is a widely used temporary network that is vulnerable to routing attacks. Many intrusion detection methods have been proposed to tackle this vulnerability. This paper presents a performance reliability evaluation model for intrusion detection methods in MANETs, which analyzes performance and hardware dependability and computes the performance reliability using a fuzzy logic system. The experimental results show that the proposed detection method outperforms existing methods in terms of maintaining high scheme reliability.
ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE
(2023)
Article
Computer Science, Information Systems
Hadjer Messabih, Chaker Abdelaziz Kerrache, Youssra Cheriguene, Carlos T. Calafate, Fatima Zohra Bousbaa
Summary: This paper surveys articles related to game theory for security in MANETs, providing an overview of the basic MANETs concepts and their main vulnerabilities. It also proposes a taxonomy for recent works, highlights the limits of existing works, and outlines potential future directions for cybersecurity in Ad-hoc networks.
Article
Computer Science, Information Systems
Bhanumathi Velusamy, Kalaivanan Karunanithy, Damien Sauveron, Raja Naeem Akram, Jaehyuk Cho
Summary: The main goal is to find multiple node-disjoint paths that meet the multi-objective optimization problem in terms of energy consumption minimization and network lifetime improvement. By using a multi-objective function to select the optimal path, the proposed system is proven to achieve less energy consumption and improved network lifetime compared to existing routing methods.
Article
Computer Science, Information Systems
Duc N. M. Hoang, Jong Myung Rhee, Sang Yoon Park
Summary: Mobile ad hoc networks (MANETs) are suitable for scenarios that require rapid deployment of communication systems. This study proposed a fault-tolerant ad hoc on-demand routing protocol (FT-AORP) for MANETs, which improves performance by optimizing data transmission paths.
Article
Computer Science, Artificial Intelligence
Rahma Meddeb, Farah Jemili, Bayrem Triki, Ouajdi Korbaa
Summary: The paper presents a Stacked autoencoder approach (Stacked AE-IDS) to enhance Intrusion Detection Systems (IDSs) in Mobile Ad-Hoc Networks (MANETs). The proposed approach reduces correlation and models relevant features with high-level representation to improve the effectiveness of IDSs in detecting attacks in MANETs. It focuses on Denial of Services (DoS) attacks within labeled datasets and their impact on routing services in Mobile Networks, making it particularly relevant for MANET security.
Article
Telecommunications
Nayoung Kim, Minhae Kwon, Hyunggon Park
Summary: This letter proposes a distributed solution for building mobile ad hoc networks using reinforcement learning. The mobile nodes autonomously determine their positions and form a cohesive team to maximize network throughput. By designing a curriculum, nodes converge quickly and work in optimal locations, improving learning efficiency and team performance.
IEEE COMMUNICATIONS LETTERS
(2022)
Article
Computer Science, Information Systems
Ayush Dusia, Ram Ramanathan, Warren Ramanathan, Christophe Servaes, Adarshpal S. Sethi
Summary: The study presents a novel protocol called ECHO that allows network-wide broadcasting in low-rate mobile ad hoc networks without using any control packets. ECHO is deterministic, fully distributed, accommodates mobility, and balances battery consumption.
IEEE TRANSACTIONS ON MOBILE COMPUTING
(2022)
Article
Multidisciplinary Sciences
Mahmood A. Al-Shareeda, Selvakumar Manickam
Summary: Mobile ad hoc networks (MANETs) have been widely used in various fields, but the inter-node communication is vulnerable to security attacks, such as Man-In-The-Middle (MITM) attacks. This study aims to investigate the impact of attackers' strategies on executing MITM assaults in MANETs and proposes the use of encryption to prevent such attacks.
Article
Computer Science, Hardware & Architecture
Vasaki Ponnusamy, Mamoona Humayun, N. Z. Jhanjhi, Aun Yichiet, Maram Fahhad Almufareh
Summary: This paper investigates the complexities and challenges of deploying wireless IDS and highlights the lack of available network traces for training modern machine-learning models against IoT specific intrusions. The authors review various intrusion detection techniques, data collection methods, and placement methods, discussing how these can be adapted to the wireless environment and highlighting the design challenges involved.
COMPUTER SYSTEMS SCIENCE AND ENGINEERING
(2022)
Article
Telecommunications
N. Nishanth, A. Mujeeb
Summary: This study proposes novel methods for defending against RREQ flooding attacks in Wireless Ad Hoc Networks using Bayesian Inference and Dempster-Shafer (D-S) evidence theory. The algorithms can detect persistent attacks as well as high rate and low rate pulsed attacks. Through mathematical modeling and simulation evaluations, the proposed method successfully defends against any type of flooding based DoS attacks in Wireless Ad Hoc Networks with lower communication and memory overhead.
IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING
(2021)
Article
Telecommunications
Zhaleh Sadreddini, Erkan Guler, Mohsen Khalily, Halim Yanikomeroglu
Summary: A new routing protocol, MRIRS, is proposed in this study to address challenges such as route failure and end-to-end delay in mobile ad hoc networks. By utilizing intelligent reflecting surfaces (IRSs) as intermediate nodes, MRIRS enables multi-flow multi-path routing, minimizes delay during route discovery, and helps primary users avoid interference. The protocol shows improvements in packet delivery ratio, end-to-end delay, and throughput compared to other routing protocols, especially in scenarios with higher node speeds.
IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING
(2021)
Article
Mathematics, Interdisciplinary Applications
Yaohua Chen, Waixi Liu
Summary: This article introduces the key technology of routing in mobile ad hoc networks, optimizing energy consumption and simulating node problems to achieve MAC layer optimization, combining the advantages of the lithium-ion battery model, and proposing a numerical solution optimization algorithm based on the implicit Runge-Kutta method.
Article
Engineering, Electrical & Electronic
Thong-Nhat Tran, Toan-Van Nguyen, Kyusung Shim, Daniel Benevides da Costa, Beongku An
Summary: This paper proposes a novel deep reinforcement learning-based QoS routing protocol, which establishes efficient QoS routes in cognitive radio mobile ad hoc networks through cross-layer design. By offline training, the protocol supports real-time establishment of high-performance routes.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
(2022)
Article
Engineering, Electrical & Electronic
Amir Mehmood, Adnan Nadeem, Muhammad Ashraf, Muhammad Shoaib Siddiqui, Kashif Rizwan, Kamran Ahsan
Summary: This paper proposes a proactive Fall Risk Assessment mechanism for elderly by performing Muscle Fatigue Analysis on data collected using wearable sensors. It shows that muscle fatigue in two lower limb muscles could lead to falling in an elderly person, based on evaluation results and simulations on Matlab.
IEEE SENSORS JOURNAL
(2021)
Article
Chemistry, Analytical
Adnan Nadeem, Muhammad Ashraf, Kashif Rizwan, Nauman Qadeer, Ali AlZahrani, Amir Mehmood, Qammer H. Abbasi
Summary: This study introduces a method that integrates face-recognition algorithms with a soft-voting scheme for locating missing persons in large gatherings, which has shown promising experimental results in challenging scenarios.
Article
Chemistry, Analytical
Adnan Nadeem, Muhammad Ashraf, Nauman Qadeer, Kashif Rizwan, Amir Mehmood, Ali AlZahrani, Fazal Noor, Qammer H. Abbasi
Summary: In this paper, an intelligent mechanism for tracking missing persons in a large gathering scenario is proposed. The mechanism includes online reporting, estimation of geo fence settings, optimized face detection using various algorithms, and face recognition for finding missing persons. The mechanism performs well in low resolution image tests.
Review
Chemistry, Analytical
Toqeer Ali Syed, Muhammad Shoaib Siddiqui, Hurria Binte Abdullah, Salman Jan, Abdallah Namoun, Ali Alzahrani, Adnan Nadeem, Ahmad B. Alkhodre
Summary: Augmented reality has become widely popular and accepted in recent years. It combines immersive experiences and solutions to create an adaptive solution for various industries. However, there is a lack of security solutions in collaborative augmented reality, particularly in distributed trust management.
Article
Chemistry, Multidisciplinary
Toqeer Ali Syed, Salman Jan, Muhammad Shoaib Siddiqui, Ali Alzahrani, Adnan Nadeem, Arshad Ali, Ali Ullah
Summary: This paper introduces a CAR-Tourist framework for collaborative augmented reality in tourism, which provides a secure environment using blockchain architecture to ensure trust among participants and prevent unauthorized access. The framework also includes a specific tourism application where tourists can hire remote guides for collaborative guidance over a blockchain-trusted network.
APPLIED SCIENCES-BASEL
(2022)
Article
Chemistry, Multidisciplinary
Saeed Azfar, Adnan Nadeem, Kamran Ahsan, Amir Mehmood, Hani Almoamari, Saad Said Alqahtany
Summary: In this paper, an IoT framework is proposed for the smart pest detection and management of cotton plants using drones. The framework uses motion detection sensors for insect detection and drones for targeted spray. A predictive algorithm is also proposed for optimizing the pest detection response system. The simulation results validate the effectiveness of the framework in modernizing pest management for higher profits and improved crop quality and quantity.
APPLIED SCIENCES-BASEL
(2023)
Article
Chemistry, Multidisciplinary
Saeed Azfar, Adnan Nadeem, Kamran Ahsan, Amir Mehmood, Muhammad Shoaib Siddiqui, Muhammad Saeed, Mohammad Ashraf
Summary: This study proposes a real-time detection system based on Internet of Things (IoT) technology to identify Cotton Flying Moths (CFMs), which pose a significant threat to cotton crops. The system includes infrared sensors, a communication module, a microcontroller board, a battery, a gateway device, and a UAV to spray pesticides. The effectiveness of the prototype was demonstrated through a testbed and simulation scenarios, showing its potential to minimize pesticide usage and maintain cotton product quality and quantity.
APPLIED SCIENCES-BASEL
(2023)
Article
Computer Science, Information Systems
Adnan Nadeem, Amir Mehmood, Kashif Rizwan, Muhammad Ashraf, Nauman Qadeer, Ali Alzahrani, Qammer H. Abbasi, Fazal Noor, Majed Alhaisoni, Nadeem Mahmood
Summary: This paper presents a dataset of images extracted from publicly filmed videos by cameras in Masjid Al-Nabvi, Madinah, Saudi Arabia. The dataset includes raw and processed images reflecting a challenging and unconstraint environment. The methodology involves video acquisition, frame extraction, face localization, and cropping and resizing. The dataset can be used as a benchmark for face detection and recognition algorithms, as well as tracking and crowd counting in large crowd scenarios.
CMC-COMPUTERS MATERIALS & CONTINUA
(2023)
Article
Computer Science, Theory & Methods
Muhammad Shoaib Siddiqui, Toqeer Ali Syed, Adnan Nadeem, Waqas Nawaz, Ahmad Alkhodre
Summary: Virtual tourism has gained popularity among the younger generation due to travel restrictions, safety concerns, and expensive travelling. However, service providers in virtual tourism do not financially benefit as compared to traditional tourism stakeholders. A blockchain-based broker service is proposed to address this issue, allowing tourism sites to offer virtual tours while providing accessibility and accountability. Users can register, subscribe, access, and be billed according to their usage through an online system that includes permission and payment control. The proposed system ensures authentication, authorization, and accountability through permission and usage control modules. Transactions are stored on the blockchain to guarantee data integrity, and smart contracts are used for automatic usage and permission control. An implementation on Hyperledger Fabric is provided as proof of concept, with performance measurements as a case study.
INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS
(2022)
Review
Computer Science, Interdisciplinary Applications
Adnan Nadeem
Summary: This paper investigates the highly demanding resource of electricity in developing countries, specifically in rural areas. It focuses on local communities generating their own electricity using solar and trading the energy with suppliers. Peer-to-peer energy trading is analyzed as a novel paradigm that allows customers to contribute energy to the grid and power generation and supply companies. The research explores the enabling technologies, applications, challenges, and benefits of energy trading, and presents an analysis of recent research proposals and implementations of blockchain and IoT technologies in customer-level energy trading.
FRONTIERS IN COMPUTER SCIENCE
(2022)
Article
Computer Science, Theory & Methods
Muhammad Shoaib Siddiqui, Toqeer Ali Syed, Adnan Nadeem, Waqas Nawaz, Ahmad Alkhodre
Summary: This paper provides a literature review of the latest technologies and applications that can potentially benefit the virtual tourism and digital heritage industry. It also analyzes their impact on user experience, awareness, and interest, as well as the pros and cons of virtual experiences.
INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS
(2022)
Proceedings Paper
Engineering, Electrical & Electronic
Hamza Kiani, David Chatzichristodoulou, Adnan Nadeem, Abdul Quddious, Nosherwan Shoaib, Photos Vryonides, Dimitris E. Anagnostou, Symeon Nikolaou
Summary: This paper presents microfluidically frequency reconfigurable and polarization reconfigurable probe-fed patch antennas. By loading liquid metal and metallic ink inside microfluidic channels and 3D printed PLA channels respectively, the antennas demonstrate tunable frequency and polarization with stable performance.
2022 16TH EUROPEAN CONFERENCE ON ANTENNAS AND PROPAGATION (EUCAP)
(2022)
Proceedings Paper
Engineering, Electrical & Electronic
Adnan Nadeem, David Chatzichristodoulou, Hamza Kiani, Abdul Quddious, Loukia Vassiliou, Nosherwan Shoaib, Photos Vryonides, Symeon Nikolaou
Summary: This paper presents a two directional scanning conformal array that can be used as a transmitter for wirelessly powered sensors. The array consists of two perpendicular three-element linear arrays with a total gain of 9 dBi. Each linear array can direct the main beam in five different directions. Despite the non-symmetric geometry of the phase shifter and the distinct different biasing states of the used SPDT switches, the array remains well matched regardless of the selected main beam direction.
2022 16TH EUROPEAN CONFERENCE ON ANTENNAS AND PROPAGATION (EUCAP)
(2022)
Proceedings Paper
Engineering, Electrical & Electronic
Junaid Tahir, Adnan Nadeem, Faizan Hussain, Ali Imran Najam, Nosherwan Shoaib, Abdul Quddious, Photos Vryonides, Symeon Nikolaou
Summary: The paper introduces a Doherty power amplifier with high efficiency, high linearity, and high output power features for S-band communication applications.
2021 1ST INTERNATIONAL CONFERENCE ON MICROWAVE, ANTENNAS & CIRCUITS (ICMAC)
(2021)
Article
Computer Science, Theory & Methods
Yazed Alsaawy, Ahmad Alkhodre, Nour M. Bahbouh, Adnan Abi Sen, Adnan Nadeem
Summary: This research proposes creating a modified Light Weight chain (LWC) by integrating Text Mining algorithm with customized blockchain, to speed up the verification process based on good history proof. The LWC will assign weights to nodes according to their previous posts for improved accuracy and efficiency in verifying news authenticity.
INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS
(2021)