Publications

Cybersecurity in the health care domain is one of the most important and critical issues of this era. In fact, it was reported in 2014 that on the black market medical records are worth 10 times more than credit card details [1]. Datasets experience...
Information and Communication Technologies (ICT) based applications for Ambient Assisted Living (AAL) help elderly or individual people living home alone. AAL system reliability is mostly based on the recent emerging class of network that is known...
E-Healthcare is an emerging field that provides mobility to its users. The protected health information of the users are stored at a remote server (Telecare Medical Information System) and can be accessed by the users at anytime. Many authentication...
Search engines and social networks are two entirely different data sources that can provide valuable information about Influenza. While search engine hosts can deliver popular queries (or terms) used for searching the Influenza related information,...
Ambient Assisted Living (AAL) is a concept that seeks to provide most autonomy, security, and health services for elderly people offering technology solutions to them. When AAL applications are provided through the Internet, it is possible to create...
Hypertension is the main cause of maternal death. Preeclampsia can affect pregnant women before or during pregnancy. Identification of patients with higher risk for preeclampsia allows some precautions that are taken to prevent its severe disease...
The advent of information and communication technology in healthcare sector has taken the world to a new pervasive horizon. Cloud computing is a ubiquitous way of information and data transfer. Implementation of cloud computing in daily healthcare...
The evolution of mobile devices has triggered the appearance of intelligent personal assistants (IPAs). IPAs are software agents used to support users to fulfill several daily actions. They are supposed to be intelligent in such a way that allows...
Wireless mesh networks (WMNs) are a promising technology that has emerged with the combination of several wireless networks. These wireless networks and devices communicate in a mesh network manner, to provide edge-to-edge, easy, and cost-effective...
In this paper, we propose OnDroid  , a prevention system to defend against outgoing malicious SMSs in Android devices. OnDroid is user-friendly as it considers the user's little understanding of the Android system. It also considers multiple threat...
The deployment of intelligent remote surveillance systems depends on wireless sensor networks (WSNs) composed of various miniature resource-constrained wireless sensor nodes. The development of routing protocols for WSNs is a major challenge because...
Industrial systems always prefer to reduce their operational expenses. To support such reductions, they need solutions that are capable of providing stability, fault tolerance, and flexibility. One such solution for industrial systems is cyber...
Generating random binary sequences is a fundamental requirement in cryptography. A binary sequence (BS) is a sequence of N bits and each bit has a value of 0 or 1. For securing sensors within Wireless Body Area Networks (WBANs), electrocardiogram (...
In this paper, we propose MinDroid, a user-centric preventive policy enforcement system against SMS malware in Android devices. The design of MinDroid takes into consideration the user’s little understanding of the Android permission system. This...
Vehicular communications are emerging as a promising technology to enable communications using vehicles as network nodes. VDTNs appear as a novel approach to enable services and applications where it is not possible to define an end-to-end path. To...
The wide dissemination of Internet around the world changed the way people communicate among them. The evolution of the information and communication technologies (ICT) or artificial intelligence (AI) allowed the creation of new types of services...
Testing and verification of healthcare information systems is a challenging and important issue since faults in these critical systems may lead to loss of lives, and in the best cases, loss of money and reputations. However, due to the complexity of...
The future of ambient assisted living (AAL) especially eHealthcare almost depends on the smart objects that are part of the Internet of things (IoT). In our AAL scenario, these objects collect and transfer real-time information about the patients to...
Cloud computing has appeared to be state of the art in the world of Information Technology especially in healthcare systems due to its innovative computing deployment model as a source of utility for users. However, many healthcare organizations are...
Health telematics is a growing up issue that is becoming a major improvement on patient lives, especially in elderly, disabled, and chronically ill. In recent years, information and communication technologies improvements, along with mobile Internet...
Multimedia applications are gradually becoming an essential—and flourishing—part of our daily lives. The area of wireless sensor networks is not an exception to this trend, as multimedia data have attracted the attention of researchers. Their...
In this paper, we propose MinDroid, a user-centric preventive policy enforcement system against SMS malware in Android devices. The design of MinDroid takes into consideration the user’s little understanding of the Android permission system. This...
Secret key establishment and freshness are challenging task in resource constrained wireless sensor networks (WSNs). A large number of messages are exchanged for key establishment at startup and every time a node join or leave the group to refresh...
In this paper, we have proposed the design of an efficient computer forensics investigation framework. The proposed framework improves the investigation efficiency using Data Warehouse (DW) concept, which provides a selective evidence identification...
Wireless Sensor Networks (WSNs) are often deployed in remote and hostile areas and because of their limited power and vulnerability, the sensors may stop functioning after sometime leading to the appearance of holes in a network. A hole created by...
In this paper, we propose an Intrusion Detection System (IDS) against Sinkhole attack in wireless sensor networks with mobile sink. In the detection model, the network area is divided into a flat grid of cells, and we use the signature-based...
A critical issue in environmental decision making is how to trust the monitoring information gathered by a multitude of devices at remote locations. The accuracy of information helps in enhancing the effectiveness of decisions, whether it is made by...
Network lifetime and throughput are one of the prime concerns while designing routing protocols for wireless sensor networks (WSNs). However, most of the existing schemes are either geared towards prolonging network lifetime or improving throughput...
This paper investigates the ant colony optimization (ACO) based routing protocol against holes (or voids) to address user’s connectivity via Pervasive Wireless Sensor Networks (PWSNs). A hole is an area that has no active sensors, which makes a...
In this paper, we propose a Machine to Machine (M2M) Low Cost and Secure (LCS) communication system for e-Healthcare society. The system is designed to take into consideration the psychological issues related to all actors in the e-Healthcare...
Currently, the eHealthcare information management is the most critical and hot research topic. Especially with the involvement of new and promising telecommunication technologies like Machine to Machine (M2M) Communication. In M2M communication the...
Applying multimedia to WSN add more challenges due to the resource constraint nature of WSN and the strict QoS requirements for multimedia transmission. Different multimedia applications may have different QoS requirements, so routing protocols...
In this paper, we inspire from two analogies: the warfare kill zone and the airport check-in system, to design and deploy a new line in the defense-in-depth strategy, called the third line. This line is represented by a security framework, named the...
A wireless sensor network (WSN) depends on miniaturized wireless sensor nodes that are deployed to monitor physical phenomena by communicating with each other with limited resources. The major factor to be tackled in WSN is the network lifetime. A...
Over the past decade, there have been dramatic increases in the usage of mobile phones in the world. Currently available smart mobile phones are capable of storing enormous amounts of personal information/data. The smart mobile phone is also capable...
Wireless sensor networks (WSNs) consists of numerous tiny wireless sensor nodes to communicate with each other with limited resources. The resource limitations and vulnerabilities of wireless sensor node expose the network to suffer with numerous...
Interest in the cognitive radio sensor network (CRSN) paradigm has gradually grown among researchers. This concept seeks to fuse the benefits of dynamic spectrum access into the sensor network, making it a potential player in the next generation (...
Wireless Sensor Networks (WSNs) is one of the core technologies to contribute in the next generation networks (NGNs). WSN consists of numerous miniaturized low cost wireless sensor nodes with limited power, processing capability and data storage....
In this paper we have presented the improved ACO algorithm that has been utilized in BIOSARP to perform self-optimized routing in WSN. BIOSARP has been studied and verified through simulation in network simulator 2 (NS-2). In simulation study...
Wireless sensor network (WSN) deploys tiny wireless sensor nodes to communicate with each other with limited processing speed, power and security measures. A recent WSN routing protocol defined as Secure Real-Time Load Distribution (SRTLD) has been...
Currently, wireless sensor networks (WSNs) are of significant, hot and challenging research area. WSN consists of numerous tiny wireless sensor nodes to communicate with each other with limited resources due to cost and size restrictions....