Skip to main content

Research Repository

Advanced Search

Outputs (38)

Protocol-specific and sensor network-inherited attack detection in IoT using machine learning (2022)
Journal Article
Zahra, F., Jhanjhi, N. Z., Khan, N. A., Brohi, S. N., Masud, M., & Aljahdali, S. (2022). Protocol-specific and sensor network-inherited attack detection in IoT using machine learning. Applied Sciences, 12(22), https://doi.org/10.3390/app122211598

For networks with limited resources, such as IoT-enabled smart homes, smart industrial equipment, and urban infrastructures, the Routing Protocol for Low-power and Lossy Networks (RPL) was developed. Additionally, a number of optimizations have been... Read More about Protocol-specific and sensor network-inherited attack detection in IoT using machine learning.

Rank and wormhole attack detection model for RPL-based Internet of Things using machine learning (2022)
Journal Article
Zahra, F., Jhanjhi, N. Z., Brohi, S. N., Khan, N., Masud, M., & AlZain, M. A. (2022). Rank and wormhole attack detection model for RPL-based Internet of Things using machine learning. Sensors, 22(18), 1 - 17. https://doi.org/10.3390/s22186765

The proliferation of the internet of things (IoT) technology has led to numerous challenges in various life domains, such as healthcare, smart systems, and mission-critical applications. The most critical issue is the security of IoT nodes, networks,... Read More about Rank and wormhole attack detection model for RPL-based Internet of Things using machine learning.

E-government cybersecurity modeling in the context of software-defined networks (2022)
Book Chapter
Ujjan, R. M. A., Taj, I., & Brohi, S. N. (2022). E-government cybersecurity modeling in the context of software-defined networks. In Cybersecurity Measures for E-Government Frameworks (1-21). IGI Global. https://doi.org/10.4018/978-1-7998-9624-1.ch001

Currently, information and communication technologies are going in advance, allowing more information to be distributed globally via the internet superhighway. While being interconnected to the virtual world, people are becoming increasingly focused,... Read More about E-government cybersecurity modeling in the context of software-defined networks.

The impact of Blockchain technology on advanced security measures for E-Government (2022)
Book Chapter
Ujjan, R. M. A., Hussain, K., & Brohi, S. N. (2022). The impact of Blockchain technology on advanced security measures for E-Government. In Cyber Security Measures for E-Government Frameworks (157-174). IGI Global. https://doi.org/10.4018/978-1-7998-9624-1.ch010

Implementation of blockchain with e-government has raised several complexities. When an area has satisfied the requirements for e-government implementation, new challenges will appear. As a result of the information technology revolution, governments... Read More about The impact of Blockchain technology on advanced security measures for E-Government.

Proposing an algorithm for UAVs interoperability: MAVLink to STANAG 4586 for securing communication (2021)
Journal Article
Khan, N. A., Jhanjhi, N. Z., Brohi, S. N., & Almusaylim, Z. A. (2021). Proposing an algorithm for UAVs interoperability: MAVLink to STANAG 4586 for securing communication. Lecture Notes in Networks and Systems, 248, 413-423. https://doi.org/10.1007/978-981-16-3153-5_44

Recently, the use of unmanned aerial vehicles has become increased rapidly in both civilian and military applications. With the increased popularity and wide range of applications, these systems’ global manufacturer market has also been improved. UAV... Read More about Proposing an algorithm for UAVs interoperability: MAVLink to STANAG 4586 for securing communication.

A secure communication protocol for unmanned aerial vehicles (2021)
Journal Article
Khan, N. A., Jhanjhi, N. Z., Brohi, S. N., Almazroi, A. A., & Almazroi, A. A. (2021). A secure communication protocol for unmanned aerial vehicles. Computers, Materials & Continua, 70(1), 601-618. https://doi.org/10.32604/cmc.2022.019419

Mavlink is a lightweight and most widely used open-source communication protocol used for Unmanned Aerial Vehicles. Multiple UAVs and autopilot systems support it, and it provides bi-directional communication between the UAV and Ground Control Statio... Read More about A secure communication protocol for unmanned aerial vehicles.

UAV’s applications, architecture, security issues and attack scenarios: A survey (2020)
Book Chapter
Khan, N. A., Brohi, S., & Jhanjhi, N. (2020). UAV’s applications, architecture, security issues and attack scenarios: A survey. In S. Peng, L. H. Son, G. Suseendran, & D. Balaganesh (Eds.), Book cover Book cover Intelligent Computing and Innovation on Data Science (753-760). Online and in print.: Springer. https://doi.org/10.1007/978-981-15-3284-9_81

Unmanned aerial vehicles (UAVs)/drones have become very popular in recent years as they are widely used in several domains. They are widely used in both military and civilian applications such as aerial photography, entertainment, search and rescue m... Read More about UAV’s applications, architecture, security issues and attack scenarios: A survey.

Performance of deep learning vs machine learning in plant leaf disease detection (2020)
Journal Article
Sujatha, R., Chatterjee, J. M., Jhanjhi, N. Z., & Brohi, S. (2020). Performance of deep learning vs machine learning in plant leaf disease detection. Microprocessors and Microsystems, 80, 103615. https://doi.org/10.1016/j.micpro.2020.103615

Plants are recognized as essential as they are the primary source of humanity's energy production since they are having nutritious, medicinal, etc. values. At any time between crop farming, plant diseases can affect the leaf, resulting in enormous cr... Read More about Performance of deep learning vs machine learning in plant leaf disease detection.

Proposing a hybrid RPL protocol for rank and wormhole attack mitigation using machine learning (2020)
Conference Proceeding
Zahra, F., Jhanjhi, N. Z., Brohi, S., Malik, N. A., & Humayun, M. (2020). Proposing a hybrid RPL protocol for rank and wormhole attack mitigation using machine learning. In 2020 2nd International Conference on Computer and Information Sciences (ICCIS). https://doi.org/10.1109/ICCIS49240.2020.9257607

Internet of Things have profoundly transformed the way technology is deployed today in different domains of life. However, its widescale implementation has also caused major security concerns in context of data communication because of escalating int... Read More about Proposing a hybrid RPL protocol for rank and wormhole attack mitigation using machine learning.

Emerging use of UAV’s: secure communication protocol issues and challenges (2020)
Book Chapter
Khan, N. A., Jhanjhi, N. Z., Brohi, S. N., & Nayyar, A. (2020). Emerging use of UAV’s: secure communication protocol issues and challenges. In Drones in Smart-Cities: Security and Performance (37-55). Elsevier. https://doi.org/10.1016/B978-0-12-819972-5.00003-3

In recent years, unmanned aerial vehicles (UAVs)/drones have gained popularity in many areas due to their widely used applications. They are used extensively in military and civil applications such as search and rescue, reconnaissance, monitoring of... Read More about Emerging use of UAV’s: secure communication protocol issues and challenges.