Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Reading Level
      Reading Level
      Clear All
      Reading Level
  • Content Type
      Content Type
      Clear All
      Content Type
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Item Type
    • Is Full-Text Available
    • Subject
    • Publisher
    • Source
    • Donor
    • Language
    • Place of Publication
    • Contributors
    • Location
9 result(s) for "Othman, Mazliza"
Sort by:
A novel countermeasure technique for reactive jamming attack in internet of things
In recent years, Internet of Things (IoT) has attracted significant attention because of its wide range of applications in various domains. However, security is a growing concern as users of small devices in an IoT network are unable to defend themselves against reactive jamming attacks. These attacks negatively affect the performance of devices and hinder IoT operations. To address such an issue, this paper presents a novel countermeasure detection and consistency algorithm (CDCA), which aims to fight reactive jamming attacks on IoT networks. The proposed CDCA uses a change in threshold value to detect and treat an attack. The algorithm employs channel signal strength to check packet consistency by determining if the data transmission value contradicts the threshold value. The node that sends the threshold value is periodically checked and the threshold value is compared with the current value after data transmission to find out if an attack has occurred in the network. Based on realistic simulation scenarios (e.g., with varying traffic interval, number of malicious nodes, and random mobility patterns), the performance of the proposed CDCA is evaluated using a Cooja simulator. Simulation results demonstrate the superiority of the proposed technique compared with contemporary schemes in terms of performance metrics such as energy consumption, traffic delay, and network throughput.
Proxy-assisted routing for efficient data transmission in mobile ad hoc networks
While on-demand routing protocols have been optimized to use the aid of proxy nodes by considering the possibility of long-lived partitions due to intermittent connectivity, they do not consider the chances of using a proxy for a long distance between a pair of source and destination. In this paper, we introduce a Proxy-Assisted Routing (PART) for efficient data transmission by selecting a proxy node for every path length that is longer than the predefined value between a source and destination. Whenever route errors occur between a source node and proxy node, or a proxy node and destination node, the proxy node repairs a broken route locally by redirecting a new route to the source or destination node. To reduce routing overhead, we delineate a broadcasting zone, where nodes are only allowed to broadcast request packets within the predefined zone to the proxy. Furthermore, unicast transmission is used for the proxy selection process using IP address information at the MAC layer. When we evaluate the performance metrics through simulations, PART significantly reduces the normalized routing load by almost 55% and the packet losses by almost 30%, and increases throughput almost 70% if compared to the traditional routing protocols.
MobiByte: An Application Development Model for Mobile Cloud Computing
Mobile cloud computing presents an effective solution to overcome smartphone constraints, such as limited computational power, storage, and energy. As the traditional mobile application development models do not support computation offloading, mobile cloud computing requires novel application development models that can facilitate the development of cloud enabled mobile applications. This paper presents a mobile cloud application development model, named MobiByte, to enhance mobile device applications’ performance, energy efficiency, and execution support. MobiByte is a context-aware application model that uses multiple data offloading techniques to support a wide range of applications. The proposed model is validated using prototype applications and detailed results are presented. Moreover, MobiByte is compared with the most recent application models with a conclusion that it outperforms the existing application models in many aspects like energy efficiency, performance, generality, context awareness, and privacy.
Load sharing as a power management strategy for mobile computers
Load sharing has traditionally been used to improve system performance in distributed networks by transferring jobs from heavily loaded hosts to idle or lightly loaded hosts. Performance is improved by distributing workload more evenly among hosts, thus better utilising system resources. This thesis investigates the use of load sharing for a different purpose, that is as a power management strategy for mobile computers. Since mobile computers operate on limited battery power, which is a scarce resource, and there is unlikely to be a vast improvement in battery capacity in the near future, it is vital that power utilisation is managed efficiently and economically. The power management strategy proposed in this thesis is based on the concept of load sharing. The strategy attempts to reduce power consumption by the CPU, which is one of the components consuming a substantial amount of power, by off-loading computations from a mobile computer to a fixed host. A load sharing algorithm which selects suitable jobs for remote execution is proposed. When designing the algorithm, the inherent limitation of wireless networks must be taken into account. For example, low bandwidth means that communications delays are no longer negligible; sending and receiving messages must also be considered carefully as transmitting and receiving also consume a substantial amount of power. Consequently, when performing load sharing on wireless networks, more constraints have to be dealt with compared to when performing load sharing on fixed networks. In addition to reducing power consumption, transferring jobs for remote execution also gives users access to faster machines, thus improving response time. This study identifies the conditions and factors which make job transfer a viable option. The results obtained show that under suitable conditions, load sharing can extend battery lifetime significantly. Since stability is an important concern when designing load sharing algorithms, this issue is also addressed by this study.
A Proxy Acknowledgement Mechanism for TCP Variants in Mobile Ad Hoc Networks
A sequence number checking technique is proposed to improve the performance of TCP connections in mobile ad hoc networks. While a TCP connection is initialized, a routing protocol takes the responsibility for checking the hop count between a source and destination pair. If the hop count is greater than a predefined value, the routing protocol decides to use a proxy node. The responsibility of a proxy node is to check the correctness of data packets and inform the missing packets by sending an acknowledgement from a proxy node to the source node. By doing so, the source node is able to retransmit any missing packet in advance without waiting until an end-to-end acknowledgement is received from the destination. Simulation results show that the proposed mechanism is able to increase throughput up to 55% in static network and decrease routing overhead up to 95% in mobile network.
A Novel Application Licensing Framework for Mobile Cloud Environment
Mobile cloud computing is a new technology that enhances smartphone applications capabilities in terms of performance, energy efficiency, and execution support. These features are achieved via computation offloading technique that is supported by specialized mobile cloud application development models. However, the cloud-enabled applications are prone to application piracy issue for which the traditional licensing frameworks are of no use. Therefore, a new licensing framework is required to control application piracy in mobile cloud environment. This paper presents a preliminary design of a novel application licensing framework for mobile cloud environment that restricts execution of applications on unauthenticated smartphones and cloud resources.
Impact of mobility models on clustering based routing protocols in mobile WSNs
This paper presents comparison of different hierarchical (position and non-position based) protocols with respect to different mobility models. Previous work mainly focuses on static networks or at most a single mobility model. Using only one mobility model may not predict the behavior of routing protocol accurately. Simulation results show that mobility has large impact on the behavior of WSN routing protocols. Also, position based routing protocols performs better in terms of packet delivery compared to non position based routing protocols.
Framework for Ubiquitous Social Networks
This paper presents a novel framework for ubiquitous social networks (USNs). Instead of making virtual connections, on the basis of human social networks, an effort has been made to facilitate interactions among human social networks with the help of virtual social networks. The imperative domains that support ubiquitous social networks are highlighted and different scenarios are provided to project real world applications of proposed framework. Our proposed framework can provide preliminary foundations for creating ubiquitous social networks in true essence.