أبحاث أعضاء هيئة التدريس

أنت هنا

An Approach for Designing and Implementing Eager and lazy Data Replication محمد عثمان علي حجازي

Replication can be a success factor in database systems as well as perhaps being one of the needs of proliferation, expansion, and the rapid progress of databases and distributed technology, despite there being a strong belief among database designers that most existing solutions are not feasible due to their complexity, poor performance and lack of scalability. This paper provides an approach that can help designers in implementing eager and lazy replication mechanisms. The proposed approach contains two phases: In the first phase, the database is designed to have indicator fields that can carry the update status, and to consider the replication concepts by classifying, categorizing and determining the kinds and locations of data objects; in the second phase, the updating methodology is provided to make the implementation of eager and lazy replication mechanisms easier and reliable.

...
Research Interest Ahmad O. Aseeri

I have a plan to research in several area of Science especially in Artificial Intelligence, Computer Architecture, Computer Security.  I have an interest in cloud computing and elliptic curve cryptography. I've read plenty of security books and also have implemented some of the theories of the web and computer security in softwares using JAVA programming language. For instance, during the Msc's capstone project I had closely studied digital certificates from the mathematical prospective. It follows an implementtion, as a proof of concept, using JAVA language.

...
تصميم مقياس توجيه واعي لقياس اداء قنوات الراديو المتعدده في الشبكات اللاسلكيه المتجانسه (Research Project) Usman Tariq
تقنيات القنوات المتعدده للاتصالات للاسلكية متعددة القنوات للراديو غيرت من التوجه لكل من بروتوكولات الصوت والفيديو من خلال الانترنت في الشبكات الاجتماعية. هذا النمو الهائل في الاتصالات المتعددة الوسائط متأثرمباشره بواسطة الشبكات اللاسلكية المتجانسه متعددة القنوات الراديو ويمكن التنبؤ بها في المستقبل القريب.حيث ان الشبكات الاجتماعية سيكون لها مستقبل مزدهر فيما يتعلق في معدات القنوات المتعدده للراديو مما سيكون لها اكبر الاثر في تعزيز الاعتمادية من خلال خصائص المعالجة الذاتية. بالرغم من التحسينات في طبقة تواصل البيانات والطبقه المتعلقه بالاجهزه الملموسه في معايير الـ (IEEE 802.11) لتحقيق الانتاجيه الامتل و افضل الاداء وتوافر الشبكة من الشبكات المتجانسه متعددة قنوات الراديو اللاسلكية الا انها ما تزال تعتمد على التوجيه القياسي الفعال و البروتوكول. هذه الدراسة تبين ان اتباع منهجيه التوجيه الامثل هو اكثر الطبقات المهمه و الذي يحتاج لتصميم ذات كفاءة قياسيه عاليه للشباكات المتجانسه متعددة الوسائط للراديو والقنوات. هذا كله بسبب ان تصميم الطبقة المتقاطعة الذي يتألف من تحديثات الشبكة الدايناميكيه الذي يتوجه للطبقة العليا لتحقيق المخطط الامثل. بالرغم من ان عدة من الطبقات المتقاطعة القياسيه متوفرة في الدارسات التي تهدف الى تحسين الاداء الكلي للشباكات اللاسلكية. ...
Energy Awareness Spatial Routing in Wireless Sensors Network Usman Tariq
This Chapter presents how to realize in WSN networks energy awareness spatial routing employing relations. Considering the routing issue in WSN networks we looked for such a solution that will allow defining the strategy for a global network operation without giving detailed, explicit orders that can interfere with nodes local activities. As the result of research carried out, we proposed novel approach using the relationships. This approach allows for the routing area sizing and implementation costs allocation for a number of nodes in a network. 

...
MOBILE NODE LOCALIZATION IN CELLULAR NETWORKS Usman Tariq
Location information is the major component in location based applications. This information is used in different safety and service oriented applications to provide users with  services according to their Geolocation. There are many approaches to locate mobile nodes in indoor and outdoor environments. In this paper, we are interested in outdoor localization particularly in cellular networks of mobile nodes and presented a localization method based on cell and user location information. Our localization method is based on hello message ... ...
Collaborative Peer to Peer Defense Mechanism for DDoS Attacks Usman Tariq
Distributed Denial of Service (DDoS) attacks are the most common and easiest attacks to propagate over internet. It causes a high degree of destruction to the network and systems resources. The destructive nature of DDoS attacks force security engineers to design defense solutions which can detect and take counter actions to defend against such attacks. In this paper, we investigated the packet flood attacks and presented a collaborative peer to peer defense mechanism. The proposed solution detects the attack at victim edge router and sends the alert messages to its neighboring nodes which allow them to proactively defend themselves. Simulation results shows the e_ciency of the solution with less false positives at victim edge router and less damage to the network due to proactive defense approach.

...
Defense and Monitoring Model for Distributed Denial of Service Attacks Usman Tariq
Due to emergence of wireless networks and immense use of hand held devices, wireless networks encounter a great threat of denial of service attack. Traditionally IP-Based Filtering has been used to combat these attacks, however studies shows that thousands of distributed zombies work in cooperation generate huge network traffic that result in distributed denial of service (DDOS) attacks and illegitimate access to resources and services. In this paper, first we studied attacks and mitigation scenarios to analyze network wide DDoS security anomalies. This will help us to drive supplementary active measurements to characterize the strength and characteristic of attacks to improve correlation of our log data and with other publicly available network traffic analysis data. Secondly, we presented a monitoring scheme to simulate a variety of attacks on different mobile operating system. This will identify the potential threat of different DDoS attacks for such platform and traffic scanning activity to avoid detection of attacks such as Ping to Death DDoS attack. Third, we followed proceedings of an enduring basis to extort trends in the attack frequency, make-up, and production of extensive DDoS attacks. This longitudinal analysis was necessary for understanding the progression of the threats and vulnerabilities. In conclusion, while analyzing our early results concerning large-scale DDoS attack. We used a hybrid approach to diminish and prevent the attack. Network Simulator 2 (NS-2) is used to imitate the real environment and to create attack traffic with different attack strength. The simulation results are encouraging as we were able to establish,...
Dealing with Sinkhole Attacks in Wireless Sensor Networks Usman Tariq
Wireless sensor networks (WSNs) consist of many small wireless sensor nodes which are capable of sensing data and sending it to base stations. WSNs face resource constraints including limitations on communication, power, memory capacity and computational power. Also, since they are frequently deployed in hostile environments and left unattended, they are vulnerable to several attacks such as sinkhole attacks. Sinkhole attacks occur when a compromised node attracts network traffic by advertising fake routing updates. This paper first describes the challenges in detecting sinkhole attacks in WSNs. This is followed by analyzing methods to detect and neutralize sinkholes.

...
Reliable communication protocol for inter-vehicular network Usman Tariq

This paper presents the reliable broadcast protocol for Inter-Vehicular networks. Traffic fatalities are one of the leading causes of death in the world. Vehicular communication technology such as (vehicular ad hoc networks) has emerged as one of promising technology in improving the safety of drivers, passengers, and pedestrians on the road. In vehicular ad hoc networks majority of the messages are broadcasted to announce the state of a vehicle to it neighbors (e.g. sending emergency warning messages, transmitting state information, etc.). However broadcast in vehicular ad hoc networks cause a broadcast storm problem. In this paper, we present new broadcast protocol that address the broadcast problem and improves the reliability of receiving broadcast messages in vehicular ad hoc network. Simulation results shows the efficiency of proposed protocol.

...
A Witness Based Approach to Combat Malicious Packets in Wireless Sensor Network Usman Tariq
Limitation in resources like processing power, energy and storage capacity has raised security issues for small embedded devices in ubiquitous environments. Moreover, deployment of tiny devices like sensor nodes in these environment, make it easy for intruder to plant attack node or control over the legitimate node for launching the network attack. Such threat raises the issue to design light weight cryptography algorithms to secure such networks. In this paper, we analyzed the basic threat models in wireless sensor network, and proposed a secure witness based approach to combat malicious packets in wireless sensor network. Our model authenticate legitimate broadcast of control packet like HELLO Packet. and identify the adversary communication between nodes. Once the malicious node is identified the localization algorithm can identify the vulnerable node location and can take appropriate actions. Simulation results show the effectiveness of the proposed model.

...
QR Code for https://cces.psau.edu.sa/ar/sources/research/7