Design and Performance Evaluation of an Authentic End-to-End Communication Model on Large-Scale Hybrid IPv4-IPv6 Virtual Networks to Detect MITM Attacks DOI Creative Commons
Zeeshan Ashraf, Adnan Sohail, Muddesar Iqbal

и другие.

Cryptography, Год журнала: 2024, Номер 8(4), С. 49 - 49

Опубликована: Окт. 28, 2024

After the end of IPv4 addresses, Internet is moving towards IPv6 address architecture quickly with support virtualization techniques worldwide. and protocols will co-exist long during changeover process. Some attacks, such as MITM do not discriminate by appearance affect architectures. In an attack, attacker secretly captures data, masquerades original sender, sends it toward receiver. The receiver replies to because does authenticate source. Therefore, authentication between two parties compromised due attack. existing schemes adopt complicated mathematical procedures. increase computation communication costs. This paper proposes a lightweight authentic end-to-end model detect attacks using pre-shared symmetric key. addition, we implement analyze performance our proposed security on Linux-based virtual machines connected large-scale hybrid IPv4-IPv6 networks. Moreover, analyses prove effectiveness model. Finally, compare models in terms cost overhead.

Язык: Английский

Knowledge as the Engine: Transforming Healthcare Delivery Through Information and Communications Technology Applying a Sustainable Development Framework DOI
Augustine Appiah, Jianhua Zhang, Mintah Clement

и другие.

Sustainable Development, Год журнала: 2025, Номер unknown

Опубликована: Апрель 7, 2025

ABSTRACT The future of health in Ghana is indeed a complex and multifaceted landscape characterized by both challenges promising opportunities. Such opportunities lie adopting technology, which can revolutionize healthcare knowledge management elevate quality Ghana. As such, this study tested the prognosis using lens technology acceptance model (TAM) to investigate information communications (ICT) assimilation activities (KA) improve delivery Community‐based Health Planning Services (CHPS) zones TAM framework offers strong theoretical basis for evaluating professionals' use ICT providing services. A pooled dataset 657 sector respondents was employed test hypothesis Partial Least Squares Structural Equation Modeling (PLS‐SEM) technique. It found that adoption KA significantly helps facilities Moreover, relationship best mediated through policies (HP) KA. results further demonstrate effective CHPS contributes HP monitoring. concluded advent has reformed collaboration among diverse teams sector, fostering seamless exchange expertise. This interactive platform, accessible at fraction cost traditional methods, empowers providers work together effectively, enhancing efficiency patient care.

Язык: Английский

Процитировано

0

Agentic AI in Personalized Medicine and Treatment DOI
Wasswa Shafik

Advances in computational intelligence and robotics book series, Год журнала: 2025, Номер unknown, С. 85 - 100

Опубликована: Май 9, 2025

Personalized medicine is revolutionizing healthcare by shifting from a one-size-fits-all approach to individualized treatments tailored genetic, phenotypic, environmental, and lifestyle factors. It addresses biologically complex diseases, interindividual drug response variations, patient-specific needs, driven integrated diagnostics patient empowerment. This patient-centric model enhances informed decision-making, behavior change, outcomes measurement, aligning treatment strategies with individual preferences. Leading journals global agencies recognize its potential transform disease prevention, diagnosis, treatment, offering improved societal benefits. ensures more patients receive effective therapies, minimizing ineffective enhancing overall impact. As pivots toward precision, personalized promises transformative future in achieving equitable, effective, innovative care.

Язык: Английский

Процитировано

0

Artificial neural network analysis of temperature-dependent properties of second-grade nanofluid flow over an exponentially curved Riga surface DOI
Aqeela Shaheen, Nadeem Abbas, Wasfı Shatanawi

и другие.

Modern Physics Letters B, Год журнала: 2025, Номер unknown

Опубликована: Май 31, 2025

We investigated the flow of chemically reactive non-Newtonian nanofluid over an exponentially stretching curved Riga sheet, addressing its significance in advanced heat and mass transfer processes relevant to engineering industrial applications. The aim is explore effects involving factors on velocity, temperature, concentration profiles, as well associated physical quantities such skin friction, Nusselt number, Sherwood number. research employs a hybrid methodology combining boundary layer approximation, dimensional transformation governing PDEs into ODEs, numerical solutions, Artificial Neural Networks (ANNs) for enhanced prediction analysis. results expose that key parameters significantly impact characteristics, with ANN providing accurate predictions validate outcomes. comprehensive approach emphasizes potential complementing methods scrutinizing complex fluid dynamic systems. A higher thermophoresis parameter increased thermal resistance, which restricted raised local temperature. velocity profile near surface due enhancing elastic forces motion. Symmetric error distributions low mean errors demonstrate strong accuracy while outliers present challenges scenarios.

Язык: Английский

Процитировано

0

Design and Implementation of Lightweight Certificateless Secure Communication Scheme on Industrial NFV-Based IPv6 Virtual Networks DOI Open Access
Zeeshan Ashraf, Adnan Sohail, Muddesar Iqbal

и другие.

Electronics, Год журнала: 2024, Номер 13(13), С. 2649 - 2649

Опубликована: Июль 5, 2024

With the fast growth of Industrial Internet Everything (IIoE), computing and telecommunication industries all over world are moving rapidly towards IPv6 address architecture, which supports virtualization architectures such as Network Function Virtualization (NFV). NFV provides networking services like routing, security, storage, etc., through software-based virtual machines. As a result, reduces equipment costs. Due to increase in applications on Things (IoT)-based networks, security threats have also increased. The communication links between people or from one machine another insecure. Usually, critical data exchanged IoE, so authentication confidentiality significant concerns. Asymmetric key cryptosystems computation overheads. This paper proposes lightweight certificateless end-to-end secure scheme provide against replay attacks, man-in-the-middle (MITM) impersonation attacks with low system is implemented Linux-based Lubuntu 20.04 machines using Java programming connected NFV-based large-scale hybrid IPv4-IPv6 networks. Finally, we compare performance our proposed existing schemes based In addition, measure analyze virtualized networks regard several parameters delay packet loss. results comparison show that cost by 38.87% 26.08%.

Язык: Английский

Процитировано

2

Design and Performance Evaluation of an Authentic End-to-End Communication Model on Large-Scale Hybrid IPv4-IPv6 Virtual Networks to Detect MITM Attacks DOI Creative Commons
Zeeshan Ashraf, Adnan Sohail, Muddesar Iqbal

и другие.

Cryptography, Год журнала: 2024, Номер 8(4), С. 49 - 49

Опубликована: Окт. 28, 2024

After the end of IPv4 addresses, Internet is moving towards IPv6 address architecture quickly with support virtualization techniques worldwide. and protocols will co-exist long during changeover process. Some attacks, such as MITM do not discriminate by appearance affect architectures. In an attack, attacker secretly captures data, masquerades original sender, sends it toward receiver. The receiver replies to because does authenticate source. Therefore, authentication between two parties compromised due attack. existing schemes adopt complicated mathematical procedures. increase computation communication costs. This paper proposes a lightweight authentic end-to-end model detect attacks using pre-shared symmetric key. addition, we implement analyze performance our proposed security on Linux-based virtual machines connected large-scale hybrid IPv4-IPv6 networks. Moreover, analyses prove effectiveness model. Finally, compare models in terms cost overhead.

Язык: Английский

Процитировано

0