scispace - formally typeset
Search or ask a question

Showing papers by "Mohammed Y. Aalsalem published in 2012"


Proceedings ArticleDOI
12 Jun 2012
TL;DR: This research is an effort towards hoarding all the general metrics and guiding the researchers for designing efficient, professional and valuable routing protocols.
Abstract: With the maturity and development of Wireless Sensor Networks, a large body of research is being assembled and several routing protocols have been developed for wireless sensor networks. Routing metric is very important for the performance of wireless sensor networks. But a little attention has been paid by the researchers to the evaluation metrics and design principles for routing protocols that should never be neglected while designing and evaluating routing protocols for wireless sensor networks. This paper depicts some vital evaluation metrics that are essential while designing, developing and evaluating the performance of routing protocols for wireless sensor networks. This research is an effort towards hoarding all the general metrics and guiding the researchers for designing efficient, professional and valuable routing protocols.

28 citations


Journal ArticleDOI
TL;DR: All the existing defensive schemes according to the best knowledge against selective forwarding attack along with their drawbacks are described, thus providing researchers a better understanding of the attack and current solution space.
Abstract: Sensor networks are becoming closer towards wide-spread deployment so security issues become a vital concern. Selective forwarding attack is one of the harmful attacks against sensor networks and can affect the whole sensor network communication. The variety of defense approaches against selective forwarding attack is overwhelming. In this paper we have described all the existing defensive schemes according to our best knowledge against this attack along with their drawbacks, thus providing researchers a better understanding of the attack and current solution space. This paper also classifies proposed schemes according to their nature and defense. Nature of scheme classifies into Distributed and Centralized. Defense of scheme classifies into detection and prevention.

28 citations


Proceedings ArticleDOI
21 Feb 2012
TL;DR: This work considers the natural hybrid solution that combines the two approaches of mobile gateways and multi-hop forwarding to address more constraints for sensor applications and provides algorithmic solutions that attempt to balance the benefits of both approaches.
Abstract: In sensor network applications, data gathering mechanisms, which are based on multi-hop forwarding can be expensive in terms of energy. This limitation reduces the lifetime of the network and challenges the use of sensor networks for applications that demand a predefined operational lifetime. To avoid this problem, the benefits of using mobile gateway to prolong sensor life-time have been explored in the literature. However, practical considerations such as the gateway speed and route planning, sensor buffer size and data frequency generation constraints impose limits on the mobile elements. In this work, we consider the natural hybrid solution that combines the two approaches of mobile gateways and multi-hop forwarding to address more constraints for sensor applications. We provide algorithmic solutions that attempt to balance the benefits of both approaches. Based on a given predetermined time deadline, a gateway tour will be established to involve a subset of the sensors. These selected sensors will work as gathering points and will aggregate the other sensors' data. The gathering points/nodes are selected with the aim of reducing the energy expenditures due to multi-hop forwarding. We also present a heuristic-based solution and validate its performance through an extensive set of experiments.

4 citations


Journal Article
TL;DR: A protocol is proposed which is based on a property based attestation (PBA) also known as Vehicular Propertybased attestation Protocol (VPP), which will fulfil the need for a more secure and trusted mechanism for users using the safety and non-safety applications and services in the vehicular network.
Abstract: Trust is the key part of the security and challenges task in future life safety vehicular communication. Vehicular communication is based on peer to peer communication and each peer has embedded sensors inside and performs all computational tasks as well as security functions. The trusted Platform module (TPM) is used inside the vehicle and plays a key role to establish trust within the vehicle and also with other vehicles and network infrastructure. In this paper, a protocol is proposed which is based on a property based attestation (PBA) also known as Vehicular Property based attestation Protocol (VPP). In this proposed protocol, it is not based on the properties of the hardware and software of the vehicle; rather it depends on the static or dynamic properties of the system which has been pre configured. We would expect that the protocol will fulfil the need for a more secure and trusted mechanism for users using the safety and non-safety applications and services in the vehicular network Keywords : Security, Trust Safety and non Safety applications, Attacker, Trusted user, Behavior, Malicious User, Trust levels

2 citations


Posted Content
TL;DR: Experimental results from robot navigating in real environments have confirmed that the HFMT approach is simple and robust and can be adopted in any hostile industrial environment where humans are unable to work.
Abstract: The field of robotic vision is developing rapidly. Robots can react intelligently and provide assistance to user activities through sentient computing. Since industrial applications pose complex requirements that cannot be handled by humans, an efficient low cost and robust technique is required for the tracking of mobile industrial robots. The existing sensor based techniques for mobile robot tracking are expensive and complex to deploy, configure and maintain. Also some of them demand dedicated and often expensive hardware. This paper presents a low cost vision based technique called Hybrid Fiducial Mark Tracking (HFMT) technique for tracking mobile industrial robot. HFMT technique requires off-the-shelf hardware (CCD cameras) and printable 2-D circular marks used as fiducials for tracking a mobile industrial robot on a pre-defined path. This proposed technique allows the robot to track on a predefined path by using fiducials for the detection of Right and Left turns on the path and White Strip for tracking the path. The HFMT technique is implemented and tested on an indoor mobile robot at our laboratory. Experimental results from robot navigating in real environments have confirmed that our approach is simple and robust and can be adopted in any hostile industrial environment where humans are unable to work.

1 citations