Faculty Members researchs

أنت هنا

Reliable communication protocol for inter-vehicular network Usman Tariq

This paper presents the reliable broadcast protocol for Inter-Vehicular networks. Traffic fatalities are one of the leading causes of death in the world. Vehicular communication technology such as (vehicular ad hoc networks) has emerged as one of promising technology in improving the safety of drivers, passengers, and pedestrians on the road. In vehicular ad hoc networks majority of the messages are broadcasted to announce the state of a vehicle to it neighbors (e.g. sending emergency warning messages, transmitting state information, etc.). However broadcast in vehicular ad hoc networks cause a broadcast storm problem. In this paper, we present new broadcast protocol that address the broadcast problem and improves the reliability of receiving broadcast messages in vehicular ad hoc network. Simulation results shows the efficiency of proposed protocol.

A Witness Based Approach to Combat Malicious Packets in Wireless Sensor Network Usman Tariq
Limitation in resources like processing power, energy and storage capacity has raised security issues for small embedded devices in ubiquitous environments. Moreover, deployment of tiny devices like sensor nodes in these environment, make it easy for intruder to plant attack node or control over the legitimate node for launching the network attack. Such threat raises the issue to design light weight cryptography algorithms to secure such networks. In this paper, we analyzed the basic threat models in wireless sensor network, and proposed a secure witness based approach to combat malicious packets in wireless sensor network. Our model authenticate legitimate broadcast of control packet like HELLO Packet. and identify the adversary communication between nodes. Once the malicious node is identified the localization algorithm can identify the vulnerable node location and can take appropriate actions. Simulation results show the effectiveness of the proposed model.

Polynomial-based key management for secure intra-group and inter-group communication Usman Tariq
Secure group communication has become an important issue in many applications. Both intra-group and inter-group multicast traffic must be protected by shared secret keys. In order to communicate securely in the same group and among different groups, we employed a polynomial P to achieve efficient intra-group key refreshment and generated a polynomial H(x) to create an inter-group key. Proposed polynomial-based key management schemes have the following advantages: (1) Group  members and the group controller can share the intra-group key without any encryption/decryption. (2) When the members of the group get changed, the group controller needs to update and distribute the renewed group keys. The proposed mechanism can reduce the number of re-keying messages. (3) The proposed mechanism lessens the storage overhead of group members and the group controller by adopting a polynomial-based key management scheme. (4) As compared with previous approaches, the group controller does not need to broadcast heavy messages which are necessary for creating an inter-group key. Hence, it introduces only a small amount of broadcast traffic to the group members. The analysis of the proposed mechanism is conducted to demonstrate the improvements. ...
Detecting and Defending against Distributed Denial of Service (DDoS) Attack Usman Tariq

Due to explosion of hand held devices e.g. smart phones and wireless internet, distributed denial of service attack (DDoS) become a great threat to service availability in cloud computing. In past, research community focused on IP base traffic filtering to mitigate attack by ignoring the fact that thousands of distributed zombies participate in collaborative fashion to launch DDoS attack successful by creating huge amount of network traffic. As a result, DDoS attack guzzles the resources of legitimate service server so that the network and the permanence of service cannot be assured. In this paper, we have focused on three proposed goals. First, we re-engineered attack and, mitigation scenario to provide real-time analysis about current Internet-wide DDoS security anomalies. This allowed us to impel supplementary active measurements to typify the burden of attacks and to enhance correlation of our log data with other publicly available sources of network traffic analysis data. Second, we have focused the sophistication of proposed monitoring scheme to simulate a variety of operating systems and software podiums. This facilitates us to identify and typify verity of DDoS attacks and traffic scanning activity to avoid detection of attacks such as ‘Ping to Death DDoS attack’. Third, we followed these proceedings on an enduring basis to extort trends in the attack frequency, make-up, and production of extensive DDoS attacks. Generating such longitudinal analysis findings was necessary for understanding the progression of the threats and vulnerabilities being utilized. In conclusion, while we had authenticated our early results concerning large-scale DDoS...

Sinkhole Vulnerabilities in Wireless Sensor Networks Usman Tariq

Sinkhole attacks in wireless sensor networks occur when a compromised node tries to attract network traffic by advertising un-authorized/illegitimate routing updates. The victim node sends data to the compromised node rather than sending it to the node it was formerly using. Sinkhole attacks are typically used to launch other attacks on the network such as selective forwarding and wormhole attacks. Once the network is compromised it is very hard to predict the kind of attack that is to follow. For this reason, there is a need to strengthen the security of wireless sensor networks. In this paper, we first describe the challenges in detecting sinkhole attacks in wireless sensor networks, followed by an analysis of methods to prevent, detect and neutralize sinkhole attacks. The analysis will be based on discussing the advantages and limitations of the proposed solutions.

Mobile learning Aspects and Readiness محمد عثمان علي حجازي

This paper provide the aspects of mobile learning by presenting the differences techniques and aspects of using mobile devices in education according to the perspective of researches and studies in this area, it offers a comparison between e-learning and m-learning, a classification of education by mobile devices, and shows the categories of mobile learning. The paper also provides the readiness of mobile learning by presenting the results of study conducted at faculty of Computer Science and Information Technology at Al- Zaiem Al-Azahri University in Sudan.

Autism Applications for Special Needs Students in Saudi Arabia to Help Them to Learning إلهام داود كريري

The number of people being diagnosed with autism is on increase. In the US, statistics have shown that autism affects close to 500,000 people, and the number has been increasing gradually. Other parts of the world have also witnessed this increase, and hence, it is considered a global concern. In Saudi Arabia, the situation is not different. Right from diagnosis, special needs students encounter massive challenges (Abrahams, 2008, p. 350; Croen, 2007, p. 242; Al-Mousa, 2008, p. 76; Anthony, 2008, p. 236; Dover, 2007 p. 541; Freitag, 2007, p. 20; Childress, 2007, p. 187). In Saudi Arabia, there are no support services in place for students with autism in most schools, and the number of teachers trained in special needs education still wants (Cook, 2010, p. 210; Cook, 2009, p. 327; Cross, 2007, p. 178; Ministry of Education of Saudi Arabia, 2009, p. 132). This means that most students suffering from autism in Saudi Arabia do not get the opportunity to further their education, and the few that get the opportunity face difficult and unfriendly conditions.

In what ways and how Human characteristics: Language, Communication and Interaction impact on technology إلهام داود كريري

It  has  been  observed  that  technology  has  been  designed  in  a  manner  that  it  facilitates
achievement  of  human  objectives  such  as  communication,  interaction,  use  of  communication
languages  and  other  human  characteristics  (Wenglinsky,  2005).  The  design  of  technical
equipment  such  as  computers  has  been  done  in  manners  which  ensure  these  objectives  are
achieved. An example of this form of interaction is the computer-mediated communication. This
paper provides a research into ways in which human interactions impact on technology.

IMPACT OF 3D PRINTER إلهام داود كريري

This  research  proposal  outlines  the  way  and  how  3D  printer  impact  businesses  in  the
current  economic  and  social  dynamic  environment  (Harrington,  2013).  This  proposal  will
examine the main impacts surrounding 3D printing technology, Identifying global responses and
investigating what the global business world is doing to adopt this kind of technology in their
business operations. The methodology behind this proposal will involve reading and locating the
current literature from advanced academic reports, global government bodies, and conversational
organizations (Hood-Daniel & Kelly, 2011).

Exploring the Holly Quran محمد عثمان علي حجازي
I working know on a project that manipulating Information Technology in Understanding and Discovering more about the Quran

QR Code for https://cces.psau.edu.sa/ar/sources/research/6