img
Mutahadithun EXCLUSIVE

Dr. Hisham AlMajed

Cyber Security

Featured Topics


TRAVELS FROM


  • Riyadh, Riyadh, Saudi Arabia

Dr. Hisham AlMajed

Biography

ISHAM ALMAJED has 19 years of extensive experience in Information Technology and Information Security. He received a bachelor's degree in information systems from the College of Computer and Information Sciences at King Saud University in 2004. Also, he received a master of science degree in computer applications and systems administration from the computer section at Arabeast Colleges in 2015. In 2020, he received PhD in computer science from the College of Computer and Information Sciences at King Saud University. He works as an information technology governance team member at Saline Water Conversion Corporation headquarters in Riyadh, Saudi Arabia. He earned several professional certifications, including PMP, CISM, CISA, ISO27001 lead auditor, ISO27001 leas implementer, TOGA9, and ITIL expert. His research areas of interest are computer security and wireless sensor network security.

Dr. Hisham AlMajed

Featured Reviews

Dr. Hisham AlMajed

Featured Articles & Resources

img
Dr. Hisham AlMajed

Cyber Security

A system in Elliptic Curve Cryptography (ECC) that offers secure encoding and mapping of a message to the curve E against encryption attacks, such as Chosen Plaintext Attack (CPA) and Ciphertext Only Attack (COA). The system includes, a method to convert the text message to numerical values with manipulation using Initial Vector IV. In addition, the system provides, a method to revert the manipulated values to their original value.

img
Dr. Hisham AlMajed

Cyber Security

Internet of Things (IoT) enables modern improvements in smart sensors, RFID, Internet technologies, and communication protocols. Sensor nodes are treated as smart devices and widely used to gather and forward sensed information. However, besides intrinsic constraints on sensor nodes, they are vulnerable to a variety of security threats. This paper presents an energy-aware and secure multi-hop routing (ESMR) protocol by using a secret sharing scheme to increase the performance of energy efficiency with multi-hop data security against malicious actions. The proposed protocol comprises three main aspects. First, the network field is segmented into inner and outer zones based on the node location. Furthermore, in each zone, numerous clusters are generated on the basis of node neighborhood vicinity. Second, the data transmission from cluster heads in each zone towards the sink node is secured using the …