[HTML][HTML] Systematic review of authentication and authorization advancements for the Internet of Things

M Trnka, AS Abdelfattah, A Shrestha, M Coffey, T Cerny - Sensors, 2022 - mdpi.com
Technologies for the Internet of Things (IoT) are maturing, yet no common standards dictate
their direction, leaving space for a plethora of research directions and opportunities. Among …

[HTML][HTML] A review of emerging technologies for IoT-based smart cities

M Whaiduzzaman, A Barros, M Chanda, S Barman… - Sensors, 2022 - mdpi.com
Smart cities can be complemented by fusing various components and incorporating recent
emerging technologies. IoT communications are crucial to smart city operations, which are …

BFIM: Performance measurement of a blockchain based hierarchical tree layered fog-IoT microservice architecture

M Whaiduzzaman, MJN Mahi, A Barros, MI Khalil… - IEEE …, 2021 - ieeexplore.ieee.org
Fog computing complements cloud computing by removing several limitations, such as
delays and network bandwidth. It emerged to support Internet of Things (IoT) applications …

[HTML][HTML] Concept to reality: An integrated approach to testing software user interfaces

M Whaiduzzaman, A Sakib, NJ Khan, S Chaki… - Applied Sciences, 2023 - mdpi.com
This paper delves into the complex task of evaluating a website user interface (UI) and user
experience (UX), a process complicated by gaps in research. To bridge this, we introduced …

[HTML][HTML] LAMAS: Lightweight anonymous mutual authentication scheme for securing fog computing environments

M Hamada, SA Salem, FM Salem - Ain Shams Engineering Journal, 2022 - Elsevier
Fog computing uses near-user edge devices that are usually smart devices with very limited
storage and computation resources; hence, the authentication process should be lightweight …

TS-ABOS-CMS: Time-bounded secure attribute-based online/offline signature with constant message size for IoT systems

H Hong, Z Sun - Journal of Systems Architecture, 2022 - Elsevier
Authentication is especially significant in IoT since the identity of the connected object needs
to be verified before carrying out interaction processes with the various IoT data. The …

Analyzing the effectiveness of several machine learning methods for heart attack prediction

K Oliullah, A Barros, M Whaiduzzaman - Proceedings of the Fourth …, 2023 - Springer
Heart attack or heart failure cases are rising quickly each day, thus it is crucial and
worrisome to anticipate any problems in advance. A heart attack is a significant medical …

A resilient fog-IoT framework for seamless microservice execution

M Whaiduzzaman, A Barros, AR Shovon… - 2021 IEEE …, 2021 - ieeexplore.ieee.org
Microservices have been proposed as the software architecture style for fog-IoT network
applications ecosystems. Recently, microservices have been extensively used in fog-IoT …

HIBAF: A data security scheme for fog computing

M Whaiduzzaman, N Farjana, A Barros… - Journal of High …, 2021 - journals.sagepub.com
Fog computing complemented cloud computing integration services in the Internet of Things
(IoT) and the web of real-time interactivity. Fog offers faster computing and other services …

A review on VANET security: Future challenges and open issues

MJN Mahi, S Chaki, E Humayun… - … Journal of Electrical …, 2023 - section.iaesonline.com
Abstract Vehicular Adhoc Network (VANET) is an established technology that is well-suited
for emerging technologies such as the Internet of Vehicles (IoV) and Unmanned Aerial …