Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Item TypeItem Type
-
SubjectSubject
-
YearFrom:-To:
-
More FiltersMore FiltersSourceLanguage
Done
Filters
Reset
4
result(s) for
"Almesaeed, Reham"
Sort by:
Sybil attack detection scheme based on channel profile and power regulations in wireless sensor networks
2022
The detection of sybil attack is one of the main security challenges in wireless sensor networks (WSNs). The attack is considered as one of the risky threats since an attacker can generate multiple fake identities with false messages to severely impair the normal operation of WSNs. This study proposes a novel sybil attack detection method referred to as CPPR, based on the wireless channel profile and the regulation of transmission power at the sensor nodes. The proposed CPPR mechanism can benefit from the advances in the physical layer at the sensor nodes to regulate their transmission power to prevent many attacks and maintain high detection ratio. The CPPR can also provide low operational overhead and energy consumption. The proposed scheme is shown to provide an average of 95% detection ratio despite the number of sybil nodes in the network.
Journal Article
A Comprehensive Survey on Routing and Security in Mobile Wireless Sensor Networks
by
Almesaeed, Reham
,
Al-Nasser, Ahmed
,
Al-Junaid, Hessa
in
Communication
,
Data collection
,
Energy utilization
2021
With the continuous advances in mobile wireless sensor networks (MWSNs), the research community has responded to the challenges and constraints in the design of these networks by proposing efficient routing protocols that focus on particular performance metrics such as residual energy utilization, mobility, topology, scalability, localization, data collection routing, Quality of Service (QoS), etc. In addition, the introduction of mobility in WSN has brought new challenges for the routing, stability, security, and reliability of WSNs. Therefore, in this article, we present a comprehensive and meticulous investigation in the routing protocols and security challenges in the theory of MWSNs which was developed in recent years.
Journal Article
Configurable Secured Adaptive Routing Protocol for Mobile Wireless Sensor Networks
by
Almesaeed, Reham
,
Alnaser, Ahmed
,
Al-Junaid, Hessa
in
Energy consumption
,
mobile wireless sensor networks
,
Nodes
2022
This paper aims at designing, building, and simulating a secured routing protocol to defend against packet dropping attacks in mobile WSNs (MWSNs). This research addresses the gap in the literature by proposing Configurable Secured Adaptive Routing Protocol (CSARP). CSARP has four levels of protection to allow suitability for different types of network applications. The protocol allows the network admin to configure the required protection level and the ratio of cluster heads to all nodes. The protocol has an adaptive feature, which allows for better protection and preventing the spread of the threats in the network. The conducted CSARP simulations with different conditions showed the ability of CSARP to identify all malicious nodes and remove them from the network. CSARP provided more than 99.97% packets delivery rate with 0% data packet loss in the existence of 3 malicious nodes in comparison with 3.17% data packet loss without using CSARP. When compared with LEACH, CSARP showed an improvement in extending the lifetime of the network by up to 39.5%. The proposed protocol has proven to be better than the available security solutions in terms of configurability, adaptability, optimization for MWSNs, energy consumption optimization, and the suitability for different MWSNs applications and conditions.
Journal Article
Heterogeneous Cloud Radio Access Networks: Enhanced Time Allocation for Interference Mitigation
by
Beach, Mark
,
Al-Samman, Imad
,
Doufexi, Angela
in
Cloud computing
,
Computer simulation
,
Cost effectiveness
2018
Responding to the unprecedented challenges imposed by the 5G technologies, mobile operators have given significant attention to Heterogeneous Cloud Radio Access Networks (H-CRAN) due to their beneficial features of performing optimization, cost effectiveness, and improving spectral and energy efficiency performance. H-CRAN inherits the attractive benefits of Heterogeneous Networks (HetNet) and the cloud computing by facilitating interference mitigation, scalability, and radio resource control. Consequently, H-CRAN is proposed in this article as a cost-effective potential solution to alleviate intertier interference and improve cooperative processing gains in HetNets by employing cloud computing. H-CRAN can provide efficient resource sharing at the spectrum, network, and infrastructure levels. Therefore, this article proposes H-CRAN cooperative interference mitigation method that enhances the time sharing among Radio Remote Heads (RRH) users. The study proposes an enhanced Almost Blank Subframe (ABSF) technique to increase the SINR and throughput of the small-cell (low power base station) and macrocell users. Simulation results show that the proposed Dynamic Programming-Diverse Almost Blank Subframe (ABSF) Pattern (DP-DAP) scheme improved the macro- and small-cell users up to 56% and 35%, respectively, as compared to other state-of-the-art ABSF schemes.
Journal Article