Browsing by Author "Salau, Ayodeji Olalekan"
Now showing 1 - 3 of 3
Results Per Page
Sort Options
Item Blockchain and federated learning in edge-fog-cloud computing environments for smart logistics(Mesopotamian Academic Press, 2025-07-22) Ali, Guma; Adebo, Thomas; Mijwil, Maad M.; Al-Mahzoum, Kholoud; Sallam, Malik; Salau, Ayodeji Olalekan; Adamopoulos, Ioannis; Bala, Indu; Al-jubori, Aseed Yaseen RashidThe rapid growth of smart logistics, driven by IoT devices and data-intensive applications, necessitates secure, scalable, and efficient computing frameworks. As the edge-fog-cloud (EFC) paradigm supports real-time data processing, it faces significant security threats and attacks, including privacy risks, data breaches, and unauthorized access. To address these security threats and attacks, blockchain and federated learning (FL) have gained popularity as potential solutions in EFC computing environments for smart logistics. This survey reviews the current landscape in EFC computing environments for smart logistics, highlighting the existing benefits and challenges identified in 134 research studies published between January 2023 and June 2025. The applications of blockchain and FL demonstrate their ability to enhance data security and privacy, improve real-time tracking and monitoring, and ensure inventory and supply chain optimization. Although these technologies offer promising solutions, challenges such as scalability issues, data quality, interoperability and standardization hinder their effective implementation. The survey suggests future research directions focused on developing advanced blockchain and FL, integrating emerging technologies, developing policies and regulations, fostering collaborative research, and ensuring cross-industry adoption and interoperability. Integrating blockchain and FL within the EFC model offers a transformative path toward building secure, intelligent, and resilient logistics systems.Item Enhancing cybersecurity in smart education with deep learning and computer vision: A Survey.(Mesopotamian Academic Press, 2025-06-26) Ali, Guma; Aziku, Samuel; Mijwil, Maad M.; Al-Mahzoum, Kholoud; Sallam, Malik; Salau, Ayodeji Olalekan; Bala, Indu; Dhoska, Klodian; Melekoglu, EnginThe rapid digital transformation of education, driven by the widespread adoption of smart devices and online platforms, has ushered in the era of smart education. While this shift enhances learning experiences, it also introduces significant cybersecurity risks that threaten the confidentiality, integrity, and availability of educational resources, student data, and institutional systems. This survey examines how deep learning (DL) and computer vision (CV) techniques can enhance cybersecurity in smart education environments. By reviewing 202 peer-reviewed research papers published between January 2022 and June 2025 across leading publishers such as ACM Digital Library, Frontiers, Wiley Online Library, IGI Global, Nature, Springer, ScienceDirect, MDPI, IEEE Xplore Digital Library, Taylor & Francis, Sage, BMC, and Google Scholar, the study explores the integration of these advanced technologies to address emerging threats. It highlights the use of DL in intrusion detection, anomaly detection, and biometric authentication to protect digital learning platforms. It also examines how CV techniques, such as facial recognition, behavioral analysis, and emotion detection, enhance security and foster adaptive learning environments. The survey also addresses key challenges, including data quality, model interpretability, computational costs, and ethical considerations. By identifying research gaps and proposing future directions, this survey offers valuable insights for researchers, educators, and policymakers aiming to develop robust, scalable, and ethical AI-driven cybersecurity solutions for smart education.Item Integration of artificial intelligence, blockchain, and quantum cryptography for securing the Industrial Internet of Things (IIoT): Recent advancements and future trends(Mesopotamian Academic Press, 2025-03-27) Ali, Guma; Aziku, Samue; Kabiito, Simon Peter; Morish, Zaward; Adebo, Thomas; Wamusi, Robert; Asiku, Denis; Sallam, Malik; Mijwil, Maad M.; Ayad, Jenan; Salau, Ayodeji Olalekan; Dhoska, KlodianThe swift growth of the Industrial Internet of Things (IIoT) offers tremendous potential to boost productivity, facilitate real-time decision-making, and automate procedures in various industries. However, as industries increasingly adopt IIoT, they face paramount data security, privacy, and system integrity challenges. Artificial intelligence (AI), Blockchain, and quantum cryptography are gaining significant attention as solutions to address these challenges. This paper comprehensively surveys advanced technologies and their potential applications for securing IIoT ecosystems. It reviews findings from 196 sources, including peer-reviewed journal articles, conference papers, books, book chapters, reports, and websites published between 2021 and 2025. The survey draws insights from leading platforms like Springer Nature, ACM Digital Library, Frontiers, Wiley Online Library, Taylor & Francis, IGI Global, Springer, ScienceDirect, MDPI, IEEE Xplore Digital Library, and Google Scholar. This paper explores AI-driven approaches to anomaly detection, predictive maintenance, and adaptive security mechanisms, demonstrating how machine learning (ML) and deep learning (DL) can identify and mitigate threats instantly. It also examines Blockchain technology, emphasizing its decentralized nature, immutability, and ability to secure data sharing and authentication within IIoT networks. The paper discusses quantum cryptography, which utilizes quantum mechanics for theoretically unbreakable encryption, ensuring secure communications in highly sensitive industrial environments. The integration of these technologies is analyzed to create a multi-layered defense against cyber threats, highlighting challenges in scalability, interoperability, and computational overhead. Finally, the paper reviews the current research, limitations and challenges, and future directions for securing IIoT with these advanced technologies. This survey offers valuable insights to researchers, engineers, and industry practitioners working to secure the expanding IIoT infrastructure.