Displaying all 5 publications

Abstract:
Sort:
  1. Alansari Z, Anuar NB, Kamsin A, Belgaum MR
    PeerJ Comput Sci, 2022;8:e1135.
    PMID: 36426265 DOI: 10.7717/peerj-cs.1135
    Wireless sensor networks (WSNs) consist of hundreds, or thousands of sensor nodes distributed over a wide area and used as the Internet of Things (IoT) devices to benefit many home users and autonomous systems industries. With many users adopting WSN-based IoT technology, ensuring that the sensor's information is protected from attacks is essential. Many attacks interrupt WSNs, such as Quality of Service (QoS) attacks, malicious nodes, and routing attacks. To combat these attacks, especially on the routing attacks, we need to detect the attacker nodes and prevent them from any access to WSN. Although some survey studies on routing attacks have been published, a lack of systematic studies on detecting WSN routing attacks can be seen in the literature. This study enhances the topic with a taxonomy of current and emerging detection techniques for routing attacks in wireless sensor networks to improve QoS. This article uses a PRISMA flow diagram for a systematic review of 87 articles from 2016 to 2022 based on eight routing attacks: wormhole, sybil, Grayhole/selective forwarding, blackhole, sinkhole, replay, spoofing, and hello flood attacks. The review also includes an evaluation of the metrics and criteria used to evaluate performance. Researchers can use this article to fill in any information gaps within the WSN routing attack detection domain.
  2. Alansari Z, Anuar NB, Kamsin A, Belgaum MR
    PeerJ Comput Sci, 2023;9:e1309.
    PMID: 37346586 DOI: 10.7717/peerj-cs.1309
    Routing protocols transmit vast amounts of sensor data between the Wireless Sensor Network (WSN) and the Internet of Things (IoT) gateway. One of these routing protocols is Routing Protocol for Low Power and Lossy Networks (RPL). The Internet Engineering Task Force (IETF) defined RPL in March 2012 as a de facto distance-vector routing protocol for wireless communications with lower energy. Although RPL messages use a cryptographic algorithm for security protection, it does not help prevent internal attacks. These attacks drop some or all packets, such as blackhole or selective forwarding attacks, or change data packets, like grayhole attacks. The RPL protocol needs to be strengthened to address such an issue, as only a limited number of studies have been conducted on detecting internal attacks. Moreover, earlier research should have considered the mobility framework, a vital feature of the IoT. This article presents a novel lightweight system for anomaly detection of grayhole, blackhole, and selective forwarding attacks. The study aims to use a trust model in the RPL protocol, considering attack detection under mobility frameworks. The proposed system, anomaly detection of three RPL attacks (RPLAD3), is designed in four layers and starts operating immediately after the initial state of the network. The experiments demonstrated that RPLAD3 outperforms the RPL protocol when defeating attacks with high accuracy and a true positive ratio while lowering power and energy consumption. In addition, it significantly improves the packet delivery ratio and decreases the false positive ratio to zero.
  3. Hakak S, Kamsin A, Palaiahnakote S, Tayan O, Idna Idris MY, Abukhir KZ
    PLoS One, 2018;13(6):e0198284.
    PMID: 29924810 DOI: 10.1371/journal.pone.0198284
    Arabic script is highly sensitive to changes in meaning with respect to the accurate arrangement of diacritics and other related symbols. The most sensitive Arabic text available online is the Digital Qur'an, the sacred book of Revelation in Islam that all Muslims including non-Arabs recite as part of their worship. Due to the different characteristics of the Arabic letters like diacritics (punctuation symbols), kashida (extended letters) and other symbols, it is written and available in different styles like Kufi, Naskh, Thuluth, Uthmani, etc. As social media has become part of our daily life, posting downloaded Qur'anic verses from the web is common. This leads to the problem of authenticating the selected Qur'anic passages available in different styles. This paper presents a residual approach for authenticating Uthmani and plain Qur'an verses using one common database. Residual (difference) is obtained by analyzing the differences between Uthmani and plain Quranic styles using XOR operation. Based on predefined data, the proposed approach converts Uthmani text into plain text. Furthermore, we propose to use the Tuned BM algorithm (BMT) exact pattern matching algorithm to verify the substituted Uthmani verse with a given database of plain Qur'anic style. Experimental results show that the proposed approach is useful and effective in authenticating multi-style texts of the Qur'an with 87.1% accuracy.
  4. Hakak S, Kamsin A, Shivakumara P, Idna Idris MY, Gilkar GA
    PLoS One, 2018;13(7):e0200912.
    PMID: 30048486 DOI: 10.1371/journal.pone.0200912
    Exact pattern matching algorithms are popular and used widely in several applications, such as molecular biology, text processing, image processing, web search engines, network intrusion detection systems and operating systems. The focus of these algorithms is to achieve time efficiency according to applications but not memory consumption. In this work, we propose a novel idea to achieve both time efficiency and memory consumption by splitting query string for searching in Corpus. For a given text, the proposed algorithm split the query pattern into two equal halves and considers the second (right) half as a query string for searching in Corpus. Once the match is found with second halves, the proposed algorithm applies brute force procedure to find remaining match by referring the location of right half. Experimental results on different S1 Dataset, namely Arabic, English, Chinese, Italian and French text databases show that the proposed algorithm outperforms the existing S1 Algorithm in terms of time efficiency and memory consumption as the length of the query pattern increases.
  5. Abdul Razakek NFS, Yusof ZYM, Yusop FD, Obaidellah UH, Kamsin A, Nor NAM
    J Clin Pediatr Dent, 2024 Jan;48(1):101-110.
    PMID: 38239162 DOI: 10.22514/jocpd.2023.096
    The effectiveness of children's oral health education (OHE) is determined by the appropriateness of the educational materials used, which can influence their attitude towards oral health. However, there is a lack of studies exploring the benefits of OHE materials from the perspective of schoolchildren. This study aimed to explore schoolchildren's opinions on the newly developed ToothPoly board game as an OHE tool. A qualitative approach using focus group discussions (FGDs) was conducted among 44 schoolchildren aged 12 years old from a public school in Malaysia. Convenience sampling was employed to recruit the schoolchildren. The ToothPoly board game was playtested and FGDs were conducted after the playtesting session ended. Data collection and analyses were performed concurrently until data saturation was reached. The data were transcribed and coded using Atlas.Ti software version 9.1.3 followed by the framework method analysis. Mixed opinions were observed among the schoolchildren with a majority expressing favourable opinions on the advantages of the ToothPoly board game as an OHE tool. Five themes emerged from the advantages aspect, i.e., fun and enjoyable, promote focus, attention and oral health-related learning, attractive board game features, and enhance peer interaction. Meanwhile, two themes emerged that were related to the disadvantages of the board game, i.e., "competition with online games and media" and "not practical for a large group activity". The findings showed that the ToothPoly board game was perceived as a useful, interactive, and enjoyable tool to learn about oral health in small groups. The findings of the study highlight the importance of tailoring OHE activities to fulfil the needs of specific target groups to ensure its acceptance and future success.
Related Terms
Filters
Contact Us

Please provide feedback to Administrator (afdal@afpm.org.my)

External Links