[HTML][HTML] Efficient hybrid centralized and blockchain-based authentication architecture for heterogeneous IoT systems

OA Khashan, NM Khafajah - Journal of King Saud University-Computer and …, 2023 - Elsevier
With the rapid increase in the number of Internet of Things (IoT) devices in recent years,
massive amounts of sensitive IoT data are being generated and transmitted over the …

An automated lightweight encryption scheme for secure and energy-efficient communication in wireless sensor networks

OA Khashan, R Ahmad, NM Khafajah - Ad Hoc Networks, 2021 - Elsevier
In wireless sensor networks (WSNs), security, efficiency, and energy consumption are still
major challenges due to its open, large-scale, and resource-constrained nature. The …

Securecam: Selective detection and encryption enabled application for dynamic camera surveillance videos

I Aribilola, MN Asghar, N Kanwal… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Using dynamic surveillance cameras for security has significantly increased the privacy
concerns for captured individuals. Malicious users may misuse these videos by performing …

Hybrid lightweight proxy re-encryption scheme for secure fog-to-things environment

OA Khashan - IEEE Access, 2020 - ieeexplore.ieee.org
Fog computing is a promising paradigm that can mitigate the heavy burden on cloud-central
processing of the vast amount of IoT data. Although fog computing has the advantages of …

Domain-flexible selective image encryption based on genetic operations and chaotic maps

P Murali, G Niranjana, AJ Paul, JS Muthu - The visual computer, 2023 - Springer
Image encryption research has seen massive advances in recent times, but many avenues
of improvement still remain nascent. This paper takes head on various research challenges …

Edge-based lightweight selective encryption scheme for digital medical images

OA Khashan, M AlShaikh - Multimedia Tools and Applications, 2020 - Springer
Securing digital medical images is increasingly becoming a major concern due to the rapid
growth of the amount of medical images transferred over a network and stored on the web …

Secure outsourcing and sharing of cloud data using a user-side encrypted file system

OA Khashan - IEEE Access, 2020 - ieeexplore.ieee.org
Cloud computing is an emerging paradigm that aims to provide computing resources,
massive data storage capacity and, flexible data sharing services. The explosive growth of …

Image salient regions encryption for generating visually meaningful ciphertext image

W Wen, Y Zhang, Y Fang, Z Fang - Neural Computing and Applications, 2018 - Springer
Image feature encryption is comprised of feature extraction and feature encryption. The
existing feature encryption algorithms aim at extracting edge features as significant …

A lightweight image encryption algorithm for secure communications in multimedia Internet of Things

R Hedayati, S Mostafavi - Wireless Personal Communications, 2022 - Springer
Devices in the Internet of Things (IoT) have resource constraints in terms of energy,
computing power, and memory that make them vulnerable to some security attacks. Due to …

[HTML][HTML] Fuzzy clustering algorithm based on improved global best-guided artificial bee colony with new search probability model for image segmentation

W Alomoush, OA Khashan, A Alrosan, EH Houssein… - Sensors, 2022 - mdpi.com
Clustering using fuzzy C-means (FCM) is a soft segmentation method that has been
extensively investigated and successfully implemented in image segmentation. FCM is …