26 results

Protecting mobile agents from external replay attacks

Journal Article
Garrigues, C., Migas, N., Buchanan, W., Robles, S., & Borrell, J. (2009)
Protecting mobile agents from external replay attacks. Journal of Systems and Software, 82(2), 197-206. https://doi.org/10.1016/j.jss.2008.05.018
This paper presents a protocol for the protection of mobile agents against external replay attacks. This kind of attacks are performed by malicious platforms when dispatching ...

New efficient velocity-aware probabilistic route discovery schemes for high mobility Ad hoc networks

Journal Article
Bani Khalaf, M., Al-Dubai, A. Y., & Min, G. (2015)
New efficient velocity-aware probabilistic route discovery schemes for high mobility Ad hoc networks. Journal of Computer and System Sciences, 81(1), 97-109. https://doi.org/10.1016/j.jcss.2014.06.014
Most existing route discovery schemes in MANETs are based on probabilistic models by which MANETs usually deploy broadcast mechanisms to discover routes between nodes. This is...

A new efficient cross-layer relay node selection model for Wireless Community Mesh Networks

Journal Article
Zhao, L., Al-Dubai, A., Li, X., Chen, G., & Min, G. (2017)
A new efficient cross-layer relay node selection model for Wireless Community Mesh Networks. Computers and Electrical Engineering, 61, 361-372. https://doi.org/10.1016/j.compeleceng.2016.12.031
Current networking technologies are not perfectly equipped to support Quality of Service (QoS), which is vital for real-time multimedia applications in Wireless Community Mesh...

On The Design of High Throughput Adaptive Multicast Communication

Conference Proceeding
Al-Dubai, A. Y., & Romdhani, I. (2007)
On The Design of High Throughput Adaptive Multicast Communication. In Proceedings of the 6th International Symposium on Parallel and Distributed Computing (ISPDC-2007), 37-38. doi:10.1109/ispdc.2007.39
The efficient and high throughput multicast communication in interconnection networks is known as a fundamental but hard problem. In the literature, most of the related works ...

A new dynamic counter-based broadcasting scheme for mobile ad hoc networks.

Journal Article
Yassein, M. B., Nimer, S. F., & Al-Dubai, A. (2011)
A new dynamic counter-based broadcasting scheme for mobile ad hoc networks. Simulation Modelling Practice and Theory, 19, 553-563. https://doi.org/10.1016/j.simpat.2010.08.011
Broadcasting is an essential operation in Mobile Ad hoc Networks (MANETs) to transmit a message (data packet) from the sender to the rest of the network nodes. Although floodi...

A Performance Study of Path Based Multicast Communication Algorithms

Conference Proceeding
Al-Dubai, A., & Romdhani, I. (2006)
A Performance Study of Path Based Multicast Communication Algorithms. In International Symposium on Parallel Computing in Electrical Engineering (PARELEC 2006), 245-250. doi:10.1109/parelec.2006.7
Multicast communication?s history has been driven by many schemes; however, a few have shown their efficiency on interconnection networks. Among these schemes, path based mult...

Performance Investigation of RPL Routing in Pipeline Monitoring WSNs

Conference Proceeding
Wadhaj, I., Gharebi, W., Al-Dubai, A., & Thomson, C. (2018)
Performance Investigation of RPL Routing in Pipeline Monitoring WSNs. In 20th {IEEE} International Conference on High Performance Computing and Communications; 16th {IEEE} International Conference on Smart City; 4th {IEEE} International Conference on Data Science and Systems, HPCC/SmartCity/DSS 2018https://doi.org/10.1109/HPCC/SmartCity/DSS.2018.00178
The adoption of WSN and IEEE 802.15.4 standard for the linear WSN networks were assumed. The interconnection of WSNs with the Internet is possible by assigning IPv6 addresses ...

Performance evaluation of RPL metrics in environments with strained transmission ranges.

Conference Proceeding
Thomson, C., Wadhaj, I., Romdhani, I., & Al-Dubai, A. (2017)
Performance evaluation of RPL metrics in environments with strained transmission ranges. In 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA). https://doi.org/10.1109/aiccsa.2016.7945687
An examination of existing studies in the area of Routing Protocol for Low-Power and Lossy Networks (RPL) implementation in wireless sensor networks (WSNs) reveals a consisten...

Mobile agents for routing, topology discovery, and automatic network reconfiguration in ad-hoc networks.

Conference Proceeding
Migas, N., Buchanan, W. J., & McArtney, K. (2003)
Mobile agents for routing, topology discovery, and automatic network reconfiguration in ad-hoc networks. In Proceedings. 10th IEEE International Conference and Workshop on the Engineering of Computer-Based Systems, 2003. , (200-206). https://doi.org/10.1109/ECBS.2003.1194800
Wireless networks and the usage of mobile devices are becoming popular in recent days, especially in creating ad-hoc networks. There is thus scope for developing mobile system...

The VoIP intrusion detection through a LVQ-based neural network.

Presentation / Conference
Zheng, L., & Peng, T. (2009, November)
The VoIP intrusion detection through a LVQ-based neural network. Paper presented at The 4th International Conference for Internet Technology and Secured Transactions, London, UK
Being a fast-growing Internet application, Voice over Internet Protocol shares the network resources with the regular Internet traffic. However it is susceptible to the existi...