LETFM: A Robust and Key-Space Enhanced Map for Secure IoT Image Encryption DOI
Manish Kumar Thukral

Опубликована: Авг. 2, 2024

Язык: Английский

An efficient IoT task scheduling algorithm in cloud environment using modified Firefly algorithm DOI
Mohammad Qasim, Mohammad Sajid

International Journal of Information Technology, Год журнала: 2024, Номер unknown

Опубликована: Март 6, 2024

Язык: Английский

Процитировано

8

Blockchain Technology: Opportunities & Challenges DOI

Khushnood Bilal,

Mohammad Sajid, Jagendra Singh

и другие.

2021 International Conference on Data Analytics for Business and Industry (ICDABI), Год журнала: 2022, Номер unknown

Опубликована: Окт. 25, 2022

As an emerging technology, Blockchain technology can efficiently be used for various tasks in domains. It has become disruptive due to its secure, immutable, decentralized, persistent, anonymous, and auditable nature. a lot of opportunities offer fields like cryptocurrency, risk management, supply-chain financial services, identity healthcare, cloud computing, the Internet things (IoT). is relatively young proliferating; thus, several challenges must addressed realize full potential. These are even more significant require critical attention because aspect blockchain-based solutions. This work attempts present holistic picture Technology by discussing overview, style, reality, actuality Blockchain. discusses components, including mining consensus mechanisms. also presents layers, multiple applications, advantages, disadvantages. study issues which helpful researchers explore advance aspects Technology.

Язык: Английский

Процитировано

23

Enhancing the cryptographic key using sample entropy and whale optimization algorithm DOI
Md Saquib Jawed, Mohammad Sajid

International Journal of Information Technology, Год журнала: 2023, Номер 16(3), С. 1733 - 1741

Опубликована: Окт. 3, 2023

Язык: Английский

Процитировано

11

Substitution Box Construction Using Transfer‐Function Assisted Metaheuristic and Booster Algorithm: A Hybrid Approach DOI
Mohammad Shadab, Md Saquib Jawed, Mohammad Sajid

и другие.

Security and Privacy, Год журнала: 2024, Номер unknown

Опубликована: Сен. 26, 2024

ABSTRACT S‐box strengthens the encryption and decryption process by introducing nonlinearity protecting encrypted data against various differential linear cryptanalytic attacks. Generating a highly nonlinear with maximal is computationally impractical due to expansive search space, classifying it as an NP‐hard problem. This paper proposes Hawkboost algorithm, novel hybrid method merging Harris Hawks optimization algorithm (HHO) Booster for generating S‐boxes low computational efforts. The HHO utilized navigate in large permutation space find acceptable cryptographic properties. assisted Transfer function Random Key (RK) speed up design process. Additionally, enhances applying random local operators like swap inversion, effectively reshaping elements of S‐box. combination methodologies facilitates efficient generation that exhibit excellent properties while addressing key challenges optimization. performance proposed has been analyzed comparing state‐of‐the‐art based on numerous characteristics including average nonlinearity, strict Avalanche criterion (SAC), SAC offset, bit independence (BIC), approximation probability (LP), (DP), fixed points, opposite cycle counts. results from experiments analysis multiple metrics show satisfies all requirements safe reliable without sacrificing any crucial security features.

Язык: Английский

Процитировано

4

Securing IoT Communications: A Novel Lightweight Stream Cipher Using DNA Cryptography and Grain-80 Cipher DOI
Mohammad Ubaidullah Bokhari, Shahnwaz Afzal, Imran Khan

и другие.

SN Computer Science, Год журнала: 2025, Номер 6(2)

Опубликована: Янв. 22, 2025

Язык: Английский

Процитировано

0

CryptoHHO: a bio-inspired cryptosystem for data security in Fog–Cloud architecture DOI
Md Saquib Jawed, Mohammad Sajid

The Journal of Supercomputing, Год журнала: 2024, Номер 80(11), С. 15834 - 15867

Опубликована: Апрель 6, 2024

Язык: Английский

Процитировано

3

A novel approach for code coverage testing using hybrid metaheuristic algorithm DOI
Fatma Ahsan, Faisal Anwer

International Journal of Information Technology, Год журнала: 2024, Номер 16(6), С. 3691 - 3701

Опубликована: Июнь 22, 2024

Язык: Английский

Процитировано

3

An IoT-Enabled Cloud Computing Model for Authentication and Data Confidentiality using Lightweight Cryptography DOI
Salman Ali, Faisal Anwer

Arabian Journal for Science and Engineering, Год журнала: 2025, Номер unknown

Опубликована: Фев. 6, 2025

Язык: Английский

Процитировано

0

Identification of optimal Argon2i parameters for performance and security enhancement DOI
Sirapat Boonkrong,

Patchara Koksungnoen

International Journal of Information Technology, Год журнала: 2025, Номер unknown

Опубликована: Фев. 24, 2025

Язык: Английский

Процитировано

0

Chaotic and Transfer Function-Assisted Grey Wolf Optimizer for IoT Task Scheduling in Cloud-of Things DOI
Mohammad Qasim, Mohammad Sajid

Опубликована: Янв. 28, 2024

The amalgamation of Cloud Computing and Internet-of-Things (IoT), i.e., Cloud-of-Things (CoT), has emerged as one the indispensable technologies in IT business world. success CoT depends on efficient services provided by cloud computing to requests generated IoT devices. management virtualized resources, an NP-hard problem, is major component developing trust reliability among users. This research proposes a novel chaotic transfer functionassisted modified grey wolf optimizer (MGWO) algorithm schedule virtual machines computing. proposed MGWO utilizes function convert into solution circle map improve initial population's diversity, which leads faster convergence better exploitation exploration. algorithm's performance superior generic version GWO its variants.

Язык: Английский

Процитировано

2