LETFM: A Robust and Key-Space Enhanced Map for Secure IoT Image Encryption DOI
Manish Kumar Thukral

Published: Aug. 2, 2024

Language: Английский

An efficient IoT task scheduling algorithm in cloud environment using modified Firefly algorithm DOI
Mohammad Qasim, Mohammad Sajid

International Journal of Information Technology, Journal Year: 2024, Volume and Issue: unknown

Published: March 6, 2024

Language: Английский

Citations

8

Blockchain Technology: Opportunities & Challenges DOI

Khushnood Bilal,

Mohammad Sajid, Jagendra Singh

et al.

2021 International Conference on Data Analytics for Business and Industry (ICDABI), Journal Year: 2022, Volume and Issue: unknown

Published: Oct. 25, 2022

As an emerging technology, Blockchain technology can efficiently be used for various tasks in domains. It has become disruptive due to its secure, immutable, decentralized, persistent, anonymous, and auditable nature. a lot of opportunities offer fields like cryptocurrency, risk management, supply-chain financial services, identity healthcare, cloud computing, the Internet things (IoT). is relatively young proliferating; thus, several challenges must addressed realize full potential. These are even more significant require critical attention because aspect blockchain-based solutions. This work attempts present holistic picture Technology by discussing overview, style, reality, actuality Blockchain. discusses components, including mining consensus mechanisms. also presents layers, multiple applications, advantages, disadvantages. study issues which helpful researchers explore advance aspects Technology.

Language: Английский

Citations

23

Enhancing the cryptographic key using sample entropy and whale optimization algorithm DOI
Md Saquib Jawed, Mohammad Sajid

International Journal of Information Technology, Journal Year: 2023, Volume and Issue: 16(3), P. 1733 - 1741

Published: Oct. 3, 2023

Language: Английский

Citations

11

Securing IoT Communications: A Novel Lightweight Stream Cipher Using DNA Cryptography and Grain-80 Cipher DOI
Mohammad Ubaidullah Bokhari, Shahnwaz Afzal, Imran Khan

et al.

SN Computer Science, Journal Year: 2025, Volume and Issue: 6(2)

Published: Jan. 22, 2025

Language: Английский

Citations

0

A novel approach for code coverage testing using hybrid metaheuristic algorithm DOI
Fatma Ahsan, Faisal Anwer

International Journal of Information Technology, Journal Year: 2024, Volume and Issue: 16(6), P. 3691 - 3701

Published: June 22, 2024

Language: Английский

Citations

3

Substitution Box Construction Using Transfer‐Function Assisted Metaheuristic and Booster Algorithm: A Hybrid Approach DOI
Mohammad Shadab, Md Saquib Jawed, Mohammad Sajid

et al.

Security and Privacy, Journal Year: 2024, Volume and Issue: unknown

Published: Sept. 26, 2024

ABSTRACT S‐box strengthens the encryption and decryption process by introducing nonlinearity protecting encrypted data against various differential linear cryptanalytic attacks. Generating a highly nonlinear with maximal is computationally impractical due to expansive search space, classifying it as an NP‐hard problem. This paper proposes Hawkboost algorithm, novel hybrid method merging Harris Hawks optimization algorithm (HHO) Booster for generating S‐boxes low computational efforts. The HHO utilized navigate in large permutation space find acceptable cryptographic properties. assisted Transfer function Random Key (RK) speed up design process. Additionally, enhances applying random local operators like swap inversion, effectively reshaping elements of S‐box. combination methodologies facilitates efficient generation that exhibit excellent properties while addressing key challenges optimization. performance proposed has been analyzed comparing state‐of‐the‐art based on numerous characteristics including average nonlinearity, strict Avalanche criterion (SAC), SAC offset, bit independence (BIC), approximation probability (LP), (DP), fixed points, opposite cycle counts. results from experiments analysis multiple metrics show satisfies all requirements safe reliable without sacrificing any crucial security features.

Language: Английский

Citations

3

An IoT-Enabled Cloud Computing Model for Authentication and Data Confidentiality using Lightweight Cryptography DOI
Salman Ali, Faisal Anwer

Arabian Journal for Science and Engineering, Journal Year: 2025, Volume and Issue: unknown

Published: Feb. 6, 2025

Language: Английский

Citations

0

Identification of optimal Argon2i parameters for performance and security enhancement DOI
Sirapat Boonkrong,

Patchara Koksungnoen

International Journal of Information Technology, Journal Year: 2025, Volume and Issue: unknown

Published: Feb. 24, 2025

Language: Английский

Citations

0

CryptoHHO: a bio-inspired cryptosystem for data security in Fog–Cloud architecture DOI
Md Saquib Jawed, Mohammad Sajid

The Journal of Supercomputing, Journal Year: 2024, Volume and Issue: 80(11), P. 15834 - 15867

Published: April 6, 2024

Language: Английский

Citations

3

Chaotic and Transfer Function-Assisted Grey Wolf Optimizer for IoT Task Scheduling in Cloud-of Things DOI
Mohammad Qasim, Mohammad Sajid

Published: Jan. 28, 2024

The amalgamation of Cloud Computing and Internet-of-Things (IoT), i.e., Cloud-of-Things (CoT), has emerged as one the indispensable technologies in IT business world. success CoT depends on efficient services provided by cloud computing to requests generated IoT devices. management virtualized resources, an NP-hard problem, is major component developing trust reliability among users. This research proposes a novel chaotic transfer functionassisted modified grey wolf optimizer (MGWO) algorithm schedule virtual machines computing. proposed MGWO utilizes function convert into solution circle map improve initial population's diversity, which leads faster convergence better exploitation exploration. algorithm's performance superior generic version GWO its variants.

Language: Английский

Citations

2