scispace - formally typeset
Search or ask a question
Author

Abdullah M. Al-Dhelaan

Bio: Abdullah M. Al-Dhelaan is an academic researcher from King Saud University. The author has contributed to research in topics: Wireless sensor network & Cognitive radio. The author has an hindex of 8, co-authored 13 publications receiving 677 citations.

Papers
More filters
Journal ArticleDOI
01 May 2011
TL;DR: The framework to deploy and operate BorderSense, a hybrid wireless sensor network architecture for border patrol systems, is developed and the most advanced sensor network technologies, including the wireless multimedia sensor networks and the wireless underground sensor networks are used.
Abstract: The conventional border patrol systems suffer from intensive human involvement. Recently, unmanned border patrol systems employ high-tech devices, such as unmanned aerial vehicles, unattended ground sensors, and surveillance towers equipped with camera sensors. However, any single technique encounters inextricable problems, such as high false alarm rate and line-of-sight-constraints. There lacks a coherent system that coordinates various technologies to improve the system accuracy. In this paper, the concept of BorderSense, a hybrid wireless sensor network architecture for border patrol systems, is introduced. BorderSense utilizes the most advanced sensor network technologies, including the wireless multimedia sensor networks and the wireless underground sensor networks. The framework to deploy and operate BorderSense is developed. Based on the framework, research challenges and open research issues are discussed.

288 citations

Journal ArticleDOI
01 May 2011
TL;DR: A new solution, the magnetic induction (MI)-based wireless sensor network for underground pipeline monitoring (MISE-PIPE), is introduced to provide low-cost and real-time leakage detection and localization for underground pipelines.
Abstract: Underground pipelines constitute one of the most important ways to transport large amounts of fluid (e.g. oil and water) through long distances. However, existing leakage detection techniques do not work well in monitoring the underground pipelines due to the harsh underground environmental conditions. In this paper, a new solution, the magnetic induction (MI)-based wireless sensor network for underground pipeline monitoring (MISE-PIPE), is introduced to provide low-cost and real-time leakage detection and localization for underground pipelines. MISE-PIPE detects and localizes leakage by jointly utilizing the measurements of different types of sensors that are located both inside and around the underground pipelines. By adopting an MI waveguide technique, the measurements of different types of the sensors throughout the pipeline network can be reported to the administration center in real-time. The system architecture and operational framework of MISE-PIPE is first developed. Based on the operational framework, research challenges and open research issues are then discussed.

230 citations

Journal ArticleDOI
TL;DR: Simulation results show that the proposed solution outperforms the classic group- and sequence-based solutions in the responsiveness to rapidly changing PU activity and the maintenance of connectivity.
Abstract: A constantly available control channel facilitates control message exchange and spectrum coordination in cognitive radio (CR) ad hoc networks. When a dedicated control channel is unavailable, a control channel must be dynamically allocated in licensed channels and vacated for the presence of primary users (PUs). As a result, the establishment of such a control channel is a challenge. In this paper, an efficient recovery control channel (ERCC) design is proposed to address this challenge. This heuristic and distributed design approach is essentially based on the observed spectrum homogeneity in a neighborhood. By adaptively updating a list of channels commonly available to neighbors, each secondary user is able to efficiently establish new control channels among neighbors in response to PU activity changes. Therefore, a virtually “always on” control channel robust to PU activity can be realized by the proposed method. The contributions are summarized as follows: 1) The proposed method efficiently recovers control channels from PU activity changes and maintains network connectivity. 2) It extends the control channel coverage to facilitate broadcast and reduce control overhead and delay. 3) It minimizes the interference with PUs. Simulation results show that the proposed solution outperforms the classic group- and sequence-based solutions in the responsiveness to rapidly changing PU activity and the maintenance of connectivity. Furthermore, the increase in control channel coverage and the allocation of the highest quality channels to control channels can be well balanced with reliability and scalability in various network scenarios.

96 citations

Journal ArticleDOI
TL;DR: It is shown that if the sensors are buried in shallow depth, allowing sensor to use multiple types of channels improves network connectivity, and a WSN architecture can be established for efficient and effective sandstorm monitoring.

42 citations

Journal ArticleDOI
TL;DR: It is proven that it is still possible for a SU to transfer its message to any destination with a certain delay with probability one and this delay is shown to be asymptotically linear in the Euclidean distance between the transmitter and receiver.
Abstract: This paper investigates the dynamic connectivity and transmission latency of cognitive radio ad-hoc networks (secondary networks) coexisting with licensed networks (primary networks) that experience time-varying on-off links. It is shown that there exists a critical density ? s * such that if the density of secondary networks is larger than ? s * , the secondary network percolates at all time t > 0, i.e., there exists always an infinite connected component in the secondary network under the time-varying spectrum availability. Furthermore, the upper and lower bounds of ? s * are derived and it is shown that they do not depend on the random locations of primary and secondary users, but only on the network parameters, such as active/inactive probability of primary users, transmission range, and the user density. Moreover, due to the dynamic behavior of the unoccupied spectrum, the secondary network can be disconnected at all times. It is proven that it is still possible for a SU to transfer its message to any destination with a certain delay with probability one. This delay is shown to be asymptotically linear in the Euclidean distance between the transmitter and receiver.

18 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: The state-of-the-art survey of cooperative sensing is provided to address the issues of cooperation method, cooperative gain, and cooperation overhead.

1,800 citations

Journal ArticleDOI
01 May 2013
TL;DR: In this paper, Flying Ad-Hoc Networks (FANETs) are surveyed which is an ad hoc network connecting the UAVs, and the main FANET design challenges are introduced.
Abstract: One of the most important design problems for multi-UAV (Unmanned Air Vehicle) systems is the communication which is crucial for cooperation and collaboration between the UAVs. If all UAVs are directly connected to an infrastructure, such as a ground base or a satellite, the communication between UAVs can be realized through the in-frastructure. However, this infrastructure based communication architecture restricts the capabilities of the multi-UAV systems. Ad-hoc networking between UAVs can solve the problems arising from a fully infrastructure based UAV networks. In this paper, Flying Ad-Hoc Networks (FANETs) are surveyed which is an ad hoc network connecting the UAVs. The differences between FANETs, MANETs (Mobile Ad-hoc Networks) and VANETs (Vehicle Ad-Hoc Networks) are clarified first, and then the main FANET design challenges are introduced. Along with the existing FANET protocols, open research issues are also discussed.

1,072 citations

Journal ArticleDOI
TL;DR: A top-down survey of the trade-offs between application requirements and lifetime extension that arise when designing wireless sensor networks is presented and a new classification of energy-conservation schemes found in the recent literature is presented.

785 citations

Journal ArticleDOI
01 Sep 2014
TL;DR: A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks is proposed, which ensures mutual authentication between the user, sensor node, and the gateway node (GWN), although the GWN is never contacted by the user.
Abstract: The idea of the Internet of Things (IOT) notion is that everything within the global network is accessible and interconnected. As such Wireless Sensor Networks (WSN) play a vital role in such an environment, since they cover a wide application field. Such interconnection can be seen from the aspect of a remote user who can access a single desired sensor node from the WSN without the necessity of firstly connecting with a gateway node (GWN). This paper focuses on such an environment and proposes a novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks. The proposed scheme enables a remote user to securely negotiate a session key with a general sensor node, using a lightweight key agreement protocol. The proposed scheme ensures mutual authentication between the user, sensor node, and the gateway node (GWN), although the GWN is never contacted by the user. The proposed scheme has been adapted to the resource-constrained architecture of the WSN, thus it uses only simple hash and XOR computations. Our proposed scheme tackles these risks and the challenges posed by the IOT, by ensuring high security and performance features.

529 citations