Browsing by Author "Wamusi, Robert"
Now showing 1 - 2 of 2
Results Per Page
Sort Options
Item A Comprehensive review on cryptographic techniques for securing internet of medical things: A state-of-the-art, applications, security attacks, mitigation measures, and future research direction.(Mesopotamian Journal of Artificial Intelligence in Healthcare, 2024-11-30) Wamusi, Robert; Asiku, Denis; Adebo, Thomas; Aziku, Samuel; Kabiito, Simon Peter; Zaward, Morish; Guma, AliAs healthcare becomes increasingly dependent on the Internet of Medical Things (IoMT) infrastructure, it is essential to establish a secure system that guarantees the confidentiality and privacy of patient data. This system must also facilitate the secure sharing of healthcare information with other parties within the healthcare ecosystem. However, this increased connectivity also introduces cybersecurity attacks and vulnerabilities. This comprehensive review explores the state-of-the-art in the IoMT, security requirements in the IoMT, cryptographic techniques in the IoMT, application of cryptographic techniques in securing the IoMT, security attacks on cryptographic techniques, mitigation strategies, and future research directions. The study adopts a comprehensive review approach, synthesizing findings from peer-reviewed journals, conference proceedings, book chapters, Books, and websites published between 2020 and 2024 to assess their relevance to cryptographic applications in IoMT systems. Despite advancements, cryptographic algorithms in IoMT remain susceptible to security attacks, such as man-in-the-middle attacks, replay attacks, ransomware attacks, cryptanalysis attacks, key management attacks, chosen plaintext/chosen ciphertext attacks, and side-channel attacks. While techniques like homomorphic encryption enhance security, their high computational and power demands pose challenges for resource-constrained IoMT devices. The rise of quantum computing threatens the efficacy of current cryptographic protocols, highlighting the need for research into quantum-resistant cryptography. The review identifies critical gaps in existing cryptographic research and emphasizes future directions, including lightweight cryptography, quantum-resistant methods, and artificial intelligence-driven security mechanisms. These innovations are vital for meeting the growing security requirements of IoMT systems and protecting against increasingly sophisticated threats.Item Practical application and management of information communication technology (ict) to enhance the performance of Ugandan secondary schools in West Nile(East African Nature and Science Organization, 2025-01-05) Wamusi, Robert; Habibu, TabanThis study focuses on the contribution that Information and Communication Technology (ICT) can make to improving teacher and student performance in secondary schools in West Nile Region, Uganda. Examines the existing ICT implementation, assesses integration and potential benefits issues, and analyses the relationship between ICT usage and learning outcomes. The research is focused on showing that ICT can go global and how it connects Uganda’s secondary schools in West Nile to global education networks. ICT enhances global learning through active participation, innovation, and flexibility through access to international resources and embracing cross-boundary collaboration and virtual interchanges. This has improved student achievement but also endows students and teachers with the competencies to prosper in a globally connected environment. Ugandan schools have poorly developed ICT facilities, but schools embrace ICT education and facilities for operations. The study centers on specific ICT issues in West Nile schools and explores the possibility of using ICT to raise aggregate performance and efficiency in communication, collaboration, and organizational management. Quantitative and qualitative data were collected from 400 respondents, including teachers and students from 10 secondary schools. Data collection tools included questionnaires and interviews. Quantitative analysis was performed using SPSS, while NVivo was used for qualitative analysis. Ethical considerations were strictly adhered to protect participants' rights. While observing ICT integration in teaching across the ten selected secondary schools in West Nile and surveying 100 teachers, researchers found that 55.6% of them sometimes, 33.3% consistently, and 11% seldom integrate ICT in their teaching. This limited integration is due to a lack of ICT equipment, for example, computers, projectors, and internet connections; inadequate teacher education, where the majority of the teachers are found to be either lacking skills or self-confidence to incorporate ICT in teaching; and limited resource availability where even schools that have procured ICT tools are most often found to be having very few that are inadequacy for the needs of both teacher and students to make effective use of. These results raise concerns regarding the existing disparities in developments and funds for ICT training in West Nile’s secondary schools, with recommendations being made to enhance specific plans to reduce the digital divide. These include making ICT tools a focal area, increasing internet connection, and providing training activities that would increase and develop the competencies of the teaching staff. They seek to devise a technological learning atmosphere to enhance education, teacher, and student learning outcomes.