ORCID Profile
0000-0002-9951-8285
Current Organisations
Department of Defence, Australian Government
,
Deakin University
Does something not look right? The information on this page has been harvested from data sources that may not be up to date. We continue to work with information providers to improve coverage and quality. To report an issue, use the Feedback Form.
Publisher: Springer Singapore
Date: 2016
Publisher: MDPI AG
Date: 23-06-2022
DOI: 10.20944/PREPRINTS202206.0319.V1
Abstract: The vast rise in the number of Internet-connected devices necessitates a more accessible spectrum. As a result, Cognitive Radio was already proposed as a solution to the problem of restricted spectrum resources by utilizing available spectrum which is assigned to primary users. This method allows the secondary user to utilize the spectrum whenever the primary user is not using it, and it does so without intruding with the primary user. Whenever the secondary user detects the spectrum, it faced some issues, such as complexity in sensing leading to a lack of noise value, and the primary user is hidden to all secondary users. In order to tackle these challenges, an adaptive threshold matched filter detector and a cooperative matched filter detector are utilized in this paper to detect the spectrum. The probability of detection (Pd), probability of miss detection (Pm), and probability of false alarm (Pf) are the metrics used to assess sensing accuracy. To simulate suggested detectors, the MATLAB R2020a software was utilized. In comparison to earlier studies, the simulation conclusions reveal that the detection process starts with lower SNR values.
Publisher: MDPI AG
Date: 04-07-1970
DOI: 10.3390/JSAN8030037
Abstract: Counterfeiting has always been a concern, costing a significant amount of money and causing losses in international trading markets. Radio frequency identification (RFID) tag Anti-counterfeiting is a conceptual solution that has received attention in the past few years. In this article, we present a survey study on the research topic of anti-counterfeiting products using RFID tags on merchandise. As this issue evolved in industry, there were several techniques used to address the problem each technique uses a different concept and mechanism in resolving the issue. Each technique also has different pros and cons which we will address at the end of this paper with our findings. As we explore RFID technology and its implementation, we will discuss previous research before proceeding to the core of the topic of RFID Anti-counterfeiting based on the methods used. We compare the different techniques used at the end of the paper.
Publisher: MDPI AG
Date: 14-09-2018
DOI: 10.3390/JSAN7030041
Abstract: In this research, new modeling strategy based hierarchical growing neural gas network (HGNG)-semicooperative for feature classifier of intrusion detection system (IDS) in a vehicular ad hoc network (VANET). The novel IDS mainly presents a new design feature for an extraction mechanism and a HGNG-based classifier. Firstly, the traffic flow features and vehicle location features were extracted in the VANET model. In order to effectively extract location features, a semicooperative feature extraction is used for collecting the current location information for the neighboring vehicles through a cooperative manner and the location features of the historical location information. Secondly, the HGNG-based classifier was designed for evaluating the IDS by using a hierarchy learning process without the limitation of the fix lattice topology. Finally, an additional two-step confirmation mechanism is used to accurately determine the abnormal vehicle messages. In the experiment, the proposed IDS system was evaluated, observed, and compared with the existing IDS. The proposed system performed a remarkable detection accuracy, stability, processing efficiency, and message load.
Publisher: Springer International Publishing
Date: 2016
Publisher: Unpublished
Date: 2018
Publisher: MDPI AG
Date: 13-03-2020
DOI: 10.3390/JSAN9010016
Abstract: Counterfeiting and theft have always been problems that incur high costs and result in considerable losses for international markets. In this research paper, we address the issue of counterfeiting while using radio frequency identification RFID technology in retail systems or other industries by presenting a new anti-counterfeiting and anti-theft system for the retail market. This system addresses the two abovementioned issues and provides a solution that can save retail systems millions of dollars yearly. The proposed system achieves the objective of preventing or minimising the counterfeiting and theft of tagged products. At the same time, it provides a strong indication of suspiciously sold or obtained items. Furthermore, we conducted a security analysis to prove the correctness of our protocol on the basis of the strand spaces.
Publisher: Springer International Publishing
Date: 2019
Publisher: MDPI AG
Date: 16-07-2020
DOI: 10.20944/PREPRINTS202007.0360.V1
Abstract: Product counterfeiting is an on-going problem in supply chains and retail environments, Recently an anti-counterfeiting protocol to address this issue via cost-effective use of auto-identification technologies such as radio-frequency identification (RFID) was proposed by researchers.Yet the use case of re-selling the same product was not been fully addressed which might cause serious problem for the exciting and proposed schemes and transactions. This paper proposes an extended RFID-based anti-counterfeiting to address the use case of the original buyer reselling the same item to a second buyer. The extended scheme will be followed by a formal security analysis to show that the proposed protocol satisfies the requirements of security correctness and is resistant to compromise through security attacks.
Publisher: Springer Science and Business Media LLC
Date: 2015
Publisher: IEEE
Date: 07-10-2021
Publisher: Springer International Publishing
Date: 2017
Publisher: IEEE
Date: 03-2020
Publisher: MDPI AG
Date: 02-2021
DOI: 10.3390/JSAN10010012
Abstract: Product counterfeiting is a continuous problem in industry. Recently, an anti-counterfeiting protocol to address this issue via radio-frequency identification (RFID) technology was proposed by researchers. Yet, the use case of reselling the same product has not been fully addressed which might cause serious problems for the exciting and proposed schemes and transactions. This paper proposes an extended RFID-based anti-counterfeiting protocol to address the use case of the original buyer reselling the same item to a second buyer. We will follow the proposed extended scheme with a formal security analysis to prove that the proposed protocol is secure and immune against most known security attacks.
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2020
Publisher: IEEE
Date: 08-2014
Publisher: MDPI AG
Date: 08-09-2023
Publisher: MDPI AG
Date: 10-08-2020
DOI: 10.20944/PREPRINTS202007.0360.V2
Abstract: Product counterfeiting is an on-going problem in supply chains and retail environments, Recently an anti-counterfeiting protocol to address this issue via cost-effective use of auto-identification technologies such as radio-frequency identification (RFID) was proposed by researchers.Yet the use case of re-selling the same product was not been fully addressed which might cause serious problem for the exciting and proposed schemes and transactions. This paper proposes an extended RFID-based anti-counterfeiting to address the use case of the original buyer reselling the same item to a second buyer. The extended scheme will be followed by a formal security analysis to show that the proposed protocol satisfies the requirements of security correctness and is resistant to compromise through security attacks.
Location: No location found
Location: United Arab Emirates
Location: United Arab Emirates
No related grants have been discovered for Ghaith Khalil.