scispace - formally typeset
Search or ask a question
Author

Ahmad Khadem-Zadeh

Bio: Ahmad Khadem-Zadeh is an academic researcher. The author has contributed to research in topics: Vehicular ad hoc network & Intelligent transportation system. The author has an hindex of 3, co-authored 5 publications receiving 91 citations.

Papers
More filters
01 Jan 2011
TL;DR: Different energy efficient clustering protocols for heterogeneous wireless sensor networks are surveyed and compared on various points like, location awareness, clustering method, heterogeneity level and clustering Attributes.
Abstract: Wireless sensor networks are an emerging technology for monitoring physical world. The energy constraint of Wireless sensor networks makes energy saving and Prolonging the network lifetime become the most important goals of various routing protocols. Clustering is a key technique used to extend the lifetime of a sensor network by reducing energy consumption. Also Putting few heterogeneous nodes in wireless sensor network is an effective way to increase the network lifetime and stability. The energy saving schemes for homogeneous wireless sensor networks do not perform efficiently when applied to heterogeneous wireless sensor networks. Thus, Energy efficient clustering protocols should be designed for the characteristic of heterogeneous wireless sensor networks. This paper surveys different energy efficient clustering protocols for heterogeneous wireless sensor networks and compares these protocols on various points like, location awareness, clustering method, heterogeneity level and clustering Attributes.

62 citations

Journal ArticleDOI
TL;DR: This article studies various proposed DCA schemes for MANET and then classify these schemes according to their internal structures and techniques and proposes the characteristics of an ideal DCA system that can be used to verify the completeness of any DCA scheme.
Abstract: Certificate authorities (CAs) are the main components of PKI that enable us for providing basic security services in wired networks and Internet. But, we cannot use centralized CAs, in mobile ad hoc networks (MANETs). So, many efforts have been made to adapt CA to the special characteristics of MANETs and new concepts such as distributed CAs (DCAs) have been proposed that distribute the functionality of CA between MANET nodes. In this article, we study various proposed DCA schemes for MANET and then classify these schemes according to their internal structures and techniques. Finally, we propose the characteristics of an ideal DCA system that can be used to verify the completeness of any DCA scheme. This classification and taxonomy identify the weakness and constraints of each scheme, and are very important for designing more secure, scalable, and high performance DCA systems for MANETs and other networks.

25 citations

Journal ArticleDOI
TL;DR: A novel certificate validation scheme called E-ADOPT or Enhanced-ADopT which utilizes a new kind of certificate status information which helps the client nodes to tune the OCSP results refresh rate more intelligently.

6 citations

01 Aug 2017
TL;DR: The systems in which information and communication technologies and systems engineering concepts are utilized to develop and improve transportation systems of all kinds are called “The Intelligent Transportation Systems (ITS)”.
Abstract: The systems in which information and communication technologies and systems engineering concepts are utilized to develop and improve transportation systems of all kinds are called “The Intelligent Transportation Systems (ITS)”. ITS integrates information, communications, computers and other technologies and uses them in the field of transportation to build an integrated system of people, roads and vehicles by utilizing advanced data communication technologies. Vehicular Ad-hoc Networks which is a subset of Mobile Ad-hoc Networks, provide Vehicle to Vehicle (V2V), Vehicle to Roadside (V2R) and Vehicle to Infrastructure (V2I) communications and plays an important role in Intelligent Transportation System. Due to special characteristics of VANETs, QoS (Quality of Service) provisioning in these networks is a challenging task. QoS is the capability of a network for providing superior service to a selected network traffic over various heterogeneous technologies. In this paper we present an overview of Vehicular Networks, QoS Concepts, QoS challenges in VANETs and approaches which aim to enhance the Quality of Service in Vehicular Networks

3 citations

01 Aug 2016
TL;DR: Different aspects of ITS and VANET are presented to help the researchers to understand the Architecture, Communication Technologies and Applications of these networks.
Abstract: The Intelligent Transportation System (ITS) provides wireless and mobile communication between vehicles and infrastructure to improve the safety of transportation and make the journey more enjoyable. This system consists of many fixed and mobile nodes (Vehicles, Trains, Vessels, Air planes), Wireless and Wired Telecommunication Technologies to exchange information between mobile nodes or between mobile nodes and fixed stations. The most common transportation tools are cars. Vehicular Ad-hoc Networks as an Application of Mobile Ad-hoc Networks and one of the subsets of Intelligent Transportation System provides wireless Ad-hoc communication between vehicles. VANET is a mobile wireless technology which is designed to improve safety of transportation with exchanging real time data between vehicles and providing different services to the users. It has special characteristics like high mobility and provides a broad range of services to the users, so it has been emerged as one of the research interests in the field of computer and telecommunication networks. In This paper we present different aspects of ITS and VANET to help the researchers to understand the Architecture, Communication Technologies and Applications of these networks.

1 citations


Cited by
More filters
Journal ArticleDOI
10 May 2017-Sensors
TL;DR: An extensive survey of the different state-of-the-art energy-efficient and energy-balanced routing protocols for WSNs is presented and possible research directions in order to optimize the energy consumption in sensor networks are suggested.
Abstract: Wireless sensor networks (WSNs) form an important part of industrial application. There has been growing interest in the potential use of WSNs in applications such as environment monitoring, disaster management, health care monitoring, intelligence surveillance and defence reconnaissance. In these applications, the sensor nodes (SNs) are envisaged to be deployed in sizeable numbers in an outlying area, and it is quite difficult to replace these SNs after complete deployment in many scenarios. Therefore, as SNs are predominantly battery powered devices, the energy consumption of the nodes must be properly managed in order to prolong the network lifetime and functionality to a rational time. Different energy-efficient and energy-balanced routing protocols have been proposed in literature over the years. The energy-efficient routing protocols strive to increase the network lifetime by minimizing the energy consumption in each SN. On the other hand, the energy-balanced routing protocols protract the network lifetime by uniformly balancing the energy consumption among the nodes in the network. There have been various survey papers put forward by researchers to review the performance and classify the different energy-efficient routing protocols for WSNs. However, there seems to be no clear survey emphasizing the importance, concepts, and principles of load-balanced energy routing protocols for WSNs. In this paper, we provide a clear picture of both the energy-efficient and energy-balanced routing protocols for WSNs. More importantly, this paper presents an extensive survey of the different state-of-the-art energy-efficient and energy-balanced routing protocols. A taxonomy is introduced in this paper to classify the surveyed energy-efficient and energy-balanced routing protocols based on their proposed mode of communication towards the base station (BS). In addition, we classified these routing protocols based on the solution types or algorithms, and the input decision variables defined in the routing algorithm. The strengths and weaknesses of the choice of the decision variables used in the design of these energy-efficient and energy-balanced routing protocols are emphasised. Finally, we suggest possible research directions in order to optimize the energy consumption in sensor networks.

100 citations

Book ChapterDOI
Sunil Kumar1, Kamlesh Dutta1
01 Jan 2016
TL;DR: The main vulnerabilities in the mobile ad hoc networks, which have made it much easier to suffer from attacks than the traditional wired network, are analyzed.
Abstract: In this paper, we discuss security issues and their current solutions in the mobile ad hoc network. Owe to the vulnerable nature of the mobile ad hoc network, there are numerous security threats that disturb the development of it. We first analyze the main vulnerabilities in the mobile ad hoc networks, which have made it much easier to suffer from attacks than the traditional wired network. Then we discuss the security criteria of the mobile ad hoc network and present the main attack types that exist in it. Finally we survey the current security solutions for the mobile ad hoc network.

99 citations

Proceedings ArticleDOI
15 Apr 2013
TL;DR: An enhanced algorithm for Low Energy Adaptive Clustering Hierarchy-Mobile (LEACH-M) protocol is proposed called ECBR-MWSN which is Enhanced cluster based routing protocol for mobile nodes in wireless sensor network which gives better performance in terms of higher packet delivery ratio, throughput, energy consumption, routing overhead, and delay.
Abstract: Mobile Wireless Sensor Networks (MWSNs) are a current encouraged technology which is used to help many civilian, military and industrial services. Energy saving is the critical issue while designing the wireless sensor networks. In order to enhance the network life time there are many routing protocols have been developed. One of these is clustering based in which network is partitioned into small clusters and each cluster is examined and controlled by a single node called Cluster Head (CH). In this paper, we propose an enhanced algorithm for Low Energy Adaptive Clustering Hierarchy-Mobile (LEACH-M) protocol called ECBR-MWSN which is Enhanced cluster based routing protocol for mobile nodes in wireless sensor network. ECBR-MWSN protocol selects the CHs using the parameters of highest residual energy, lowest Mobility and least Distance from the Base Station. The BS periodically runs the proposed algorithm to select new CHs after a certain period of time. It is aimed to prolonging the lifetime of the sensor networks by balancing the energy consumption of the nodes. Then compare the performance of our proposed algorithm with the cluster based protocols using ns2 simulator. The simulation result indicates that the proposed algorithm gives better performance in terms of higher packet delivery ratio, throughput, energy consumption, routing overhead, and delay.

53 citations

Journal ArticleDOI
TL;DR: This paper mainly classifies the key management methods into the biometric and non-biometric categories and illustrates their main capabilities in detail and provides a complete comparison of the security schemes and highlights their features and limitations.

49 citations

Journal ArticleDOI
TL;DR: Deep learning is one of the exciting techniques which recently are vastly employed by the IDS or intrusion detection systems to increase their performance in securing the computer networks and hosts as mentioned in this paper. But deep learning is not suitable for all applications.
Abstract: Nowadays, the ever-increasing complication and severity of security attacks on computer networks have inspired security researchers to incorporate different machine learning methods to protect the organizations’ data and reputation. Deep learning is one of the exciting techniques which recently are vastly employed by the IDS or intrusion detection systems to increase their performance in securing the computer networks and hosts. This survey article focuses on the deep learning-based intrusion detection schemes and puts forward an in-depth survey and classification of these schemes. It first presents the primary background concepts about IDS architecture and various deep learning techniques. It then classifies these schemes according to the type of deep learning methods utilized in each of them. It describes how deep learning networks are utilized in the intrusion detection process to recognize intrusions accurately. Finally, a complete analysis of the investigated IDS frameworks is provided, and concluding remarks and future directions are highlighted.

37 citations