[HTML][HTML] Efficient hybrid centralized and blockchain-based authentication architecture for heterogeneous IoT systems

OA Khashan, NM Khafajah - Journal of King Saud University-Computer and …, 2023 - Elsevier
With the rapid increase in the number of Internet of Things (IoT) devices in recent years,
massive amounts of sensitive IoT data are being generated and transmitted over the …

An automated lightweight encryption scheme for secure and energy-efficient communication in wireless sensor networks

OA Khashan, R Ahmad, NM Khafajah - Ad Hoc Networks, 2021 - Elsevier
In wireless sensor networks (WSNs), security, efficiency, and energy consumption are still
major challenges due to its open, large-scale, and resource-constrained nature. The …

[HTML][HTML] Efficient time-oriented latency-based secure data encryption for cloud storage

S Ahmad, S Mehfuz - Cyber Security and Applications, 2024 - Elsevier
To ensure data security in the cloud, there exist several techniques proposed by various
researchers. The most common method is the usage of data encryption techniques like …

Innovative energy-efficient proxy Re-encryption for secure data exchange in Wireless sensor networks

OA Khashan, NM Khafajah, W Alomoush… - IEEE …, 2024 - ieeexplore.ieee.org
In the realm of wireless sensor networks (WSNs), preserving data integrity, privacy, and
security against cyberthreats is paramount. Proxy re-encryption (PRE) plays a pivotal role in …

Enhancing intrusion detection in IoT networks using machine learning-based feature selection and ensemble models

A Almotairi, S Atawneh, OA Khashan… - Systems Science & …, 2024 - Taylor & Francis
Internet of Things (IoT) technology has evolved significantly, transitioning from personal
devices to powering smart cities and global deployments across diverse industries …

[PDF][PDF] Blockchain-Based Decentralized Authentication Model for IoT-Based E-Learning and Educational Environments.

OA Khashan, S Alamri, W Alomoush… - … Materials & Continua, 2023 - cdn.techscience.cn
In recent times, technology has advanced significantly and is currently being integrated into
educational environments to facilitate distance learning and interaction between learners …

Dynamic multimedia encryption using a parallel file system based on multi-core processors

OA Khashan, NM Khafajah, W Alomoush, M Alshinwan… - Cryptography, 2023 - mdpi.com
Securing multimedia data on disk drives is a major concern because of their rapidly
increasing volumes over time, as well as the prevalence of security and privacy problems …

Privacy and utility-assisted data protection strategy for secure data sharing and retrieval in cloud system

YM Gajmal, R Udayakumar - Information Security Journal: A Global …, 2022 - Taylor & Francis
ABSTRACT The outsourcing of Electronic Health Records (EHR) on cloud infrastructures
has enabled medical data sharing among several healthcare applications. The blockchain …

Parallel proxy re-encryption workload distribution for efficient big data sharing in cloud computing

OA Khashan - 2021 IEEE 11th annual Computing and …, 2021 - ieeexplore.ieee.org
Cloud computing enables users and organizations to conveniently store and share data in
large volumes and to enjoy on-demand services. Security and the protection of big data …

[HTML][HTML] Aligning security and energy-efficiency using change detection and partial encryption for wireless camera networks

OA Khashan - Engineering Science and Technology, an International …, 2024 - Elsevier
Wireless camera networks (WCNs) have seen widespread deployment in recent years,
leading to an upsurge in monitoring and surveillance systems aimed at detecting foreign …