Browsing by Author "Ayad, Jenan"
Now showing 1 - 4 of 4
Results Per Page
Sort Options
Item Encryption of color images utilizing cascading 3D chaotic maps with S-Box algorithms(2023-08-25) Ayad, Jenan; Ali, Guma; Ullah, Waheed; Robert, WamusiThe fundamental characteristics of chaos, including sensitivity to beginning conditions and unpredictability, render it a prime candidate for cryptographic applications. This research introduces an encryption methodology for effective and safe image encryption. The encryption system has two ciphering phases and a substitution phase. This study proposes a method for key creation. The design of a pseudo-random number generator utilized for key generation is founded on chaotic algorithms. The chaotic map will be employed in encryption systems owing to its superior security. NIST tests are employed to assess the randomness of the proposed PRNG sequences. The subsequent part presents a security study of the suggested picture encryption approach to evaluate its efficacy. The statistical analysis now confirms that the technique is secure and efficient for encrypting both basic and complicated images, whether in monochrome or color. Through a comparison with previous chaotic investigations, it is evident that our method is competitive with earlier efforts.Item Integration of artificial intelligence, blockchain, and quantum cryptography for securing the Industrial Internet of Things (IIoT): Recent advancements and future trends(Mesopotamian Academic Press, 2025-03-27) Ali, Guma; Aziku, Samue; Kabiito, Simon Peter; Morish, Zaward; Adebo, Thomas; Wamusi, Robert; Asiku, Denis; Sallam, Malik; Mijwil, Maad M.; Ayad, Jenan; Salau, Ayodeji Olalekan; Dhoska, KlodianThe swift growth of the Industrial Internet of Things (IIoT) offers tremendous potential to boost productivity, facilitate real-time decision-making, and automate procedures in various industries. However, as industries increasingly adopt IIoT, they face paramount data security, privacy, and system integrity challenges. Artificial intelligence (AI), Blockchain, and quantum cryptography are gaining significant attention as solutions to address these challenges. This paper comprehensively surveys advanced technologies and their potential applications for securing IIoT ecosystems. It reviews findings from 196 sources, including peer-reviewed journal articles, conference papers, books, book chapters, reports, and websites published between 2021 and 2025. The survey draws insights from leading platforms like Springer Nature, ACM Digital Library, Frontiers, Wiley Online Library, Taylor & Francis, IGI Global, Springer, ScienceDirect, MDPI, IEEE Xplore Digital Library, and Google Scholar. This paper explores AI-driven approaches to anomaly detection, predictive maintenance, and adaptive security mechanisms, demonstrating how machine learning (ML) and deep learning (DL) can identify and mitigate threats instantly. It also examines Blockchain technology, emphasizing its decentralized nature, immutability, and ability to secure data sharing and authentication within IIoT networks. The paper discusses quantum cryptography, which utilizes quantum mechanics for theoretically unbreakable encryption, ensuring secure communications in highly sensitive industrial environments. The integration of these technologies is analyzed to create a multi-layered defense against cyber threats, highlighting challenges in scalability, interoperability, and computational overhead. Finally, the paper reviews the current research, limitations and challenges, and future directions for securing IIoT with these advanced technologies. This survey offers valuable insights to researchers, engineers, and industry practitioners working to secure the expanding IIoT infrastructure.Item Leveraging the internet of things, remote sensing, and artificial intelligence for sustainable forest management(Mesopotamian Academic Press, 2025-01-17) Ali, Guma; Mijwil, Maad M.; Adamopoulos, Ioannis; Ayad, JenanSustainable forest management is vital for addressing climate change, biodiversity loss, and deforestation. Human-induced stresses on forest ecosystems demand innovative approaches to ensure long-term health and productivity. This study explores how cutting-edge technologies, including the Internet of Things (IoT), remote sensing, and artificial intelligence (AI), enhance sustainable forest management practices. Researchers reviewed 196 studies published between 2021 and 2024 from IEEE Xplore Digital Library, MDPI, Taylor & Francis, ScienceDirect, Frontiers, Springer, SAGE, Hindawi, Nature, Wiley Online Library, and Google Scholar. The findings highlight IoT devices like drones, enabling real-time data collection on temperature, humidity, soil moisture, and tree growth, facilitating continuous forest monitoring. Remote sensing technologies, utilizing satellite imagery and aerial surveys, deliver high-resolution data for large-scale forest assessments, including forest cover changes, biomass estimation, and early detection of illegal logging. When integrated with AI, these tools enhance predictive modeling, data analysis, and decision-making, leading to more effective forest management strategies. The study also identifies challenges such as data security concerns, bandwidth limitations, interoperability issues, and high costs. Despite these barriers, IoT, remote sensing, and AI present transformative potential for improving forest resilience, carbon sequestration, and biodiversity conservation. These technologies are crucial in preserving forest ecosystems and mitigating climate change impacts by advancing real-time monitoring, optimizing resource allocation, and enabling data-driven decisions.Item Securing the internet of wetland things (IoWT) using machine and deep learning methods: a survey(Mesopotamian journal of Computer Science, 2025-02-03) Ali, Guma; Wamusi, Robert; Mijwil, Maad M.; Sallam, Malik; Ayad, Jenan; Adamopoulos, IoannisWetlands are essential ecosystems that provide ecological, hydrological, and economic benefits. However, human activities and climate change are degrading their health and jeopardizing their long-term sustainability. To address these challenges, the Internet of Wetland Things (IoWT) has emerged as an innovative framework integrating advanced sensing, data collection, and communication technologies to monitor and manage wetland ecosystems. Despite its potential, the IoWT faces substantial security and privacy risks, compromising its effectiveness and hindering adoption. This survey explores integrating machine learning (ML) and deep learning (DL) techniques as solutions to address the security threats, vulnerabilities, and challenges inherent in IoWT ecosystems. The survey examines findings from 231 sources, encompassing peer-reviewed journal articles, conference papers, books, book chapters, and websites published between 2020 and 2025. It consolidates insights from prominent platforms such as the Springer Nature, Emerald Insight, ACM Digital Library, Frontiers, Wiley Online Library, SAGE, Taylor & Francis, IGI Global, Springer, ScienceDirect, MDPI, IEEE Xplore Digital Library, and Google Scholar. Machine learning and DL methods have proven highly effective in detecting adversarial attacks, identifying anomalies, recognizing intrusions, and uncovering man-in-the-middle attacks, which are crucial in securing systems. These techniques also focus on detecting phishing, malware, and DoS/DDoS attacks and identifying insider and advanced persistent threats. They help detect botnet attacks and counteract jamming and spoofing efforts, ensuring comprehensive protection against a wide range of cyber threats. The survey examines case studies and the unique requirements and constraints of IoWT systems, such as limited energy resources, diverse sensor networks, and the need for real-time data processing. It also proposes future directions, such as developing lightweight, energy-efficient algorithms that operate effectively within the constrained environments typical of IoWT applications. Integrating ML and DL methods strengthens IoWT security while protecting and preserving wetlands through intelligent and resilient systems. These findings offer researchers and practitioners valuable insights into the current state of IoWT security, helping them drive and shape future advancements in the field.