M
Mohammed Y. Aalsalem
Researcher at Jazan University
Publications - 53
Citations - 1630
Mohammed Y. Aalsalem is an academic researcher from Jazan University. The author has contributed to research in topics: Wireless sensor network & Key distribution in wireless sensor networks. The author has an hindex of 17, co-authored 53 publications receiving 1309 citations. Previous affiliations of Mohammed Y. Aalsalem include University of Sydney.
Papers
More filters
Journal ArticleDOI
Mobile Phone Sensing Systems: A Survey
TL;DR: This paper has described comprehensively all those systems which are using smart phones and mobile phone sensors for humans good will and better human phone interaction.
Journal ArticleDOI
Wireless Sensor Networks in oil and gas industry: Recent advances, taxonomy, requirements, and open challenges
TL;DR: A comprehensive review and detailed comparison of the most recent systems or techniques developed for monitoring various anomalous events that are involved in the three sectors (upstream, midstream, downstream) of oil and gas industry is presented.
Journal ArticleDOI
Internet of Things (IoT) Operating Systems Management: Opportunities, Challenges, and Solution.
TL;DR: A brief overview of different IoT OSs, supported hardware, and future research directions is presented and overview of the accepted papers in the Special Issue on IoT OS management is provided.
Proceedings ArticleDOI
A reliable Internet of Things based architecture for oil and gas industry
Wazir Zada Khan,Mohammed Y. Aalsalem,Muhammad Khurram Khan,Md. Shohrab Hossain,Mohammed Atiquzzaman +4 more
TL;DR: A novel IoT based architecture is proposed for Oil and gas industries to make data collection from connected objects as simple, secure, robust, reliable and quick and ultimately saving time and money and increasing business productivity.
Journal ArticleDOI
Detection and Mitigation of Node Replication Attacks in Wireless Sensor Networks: A Survey
TL;DR: This paper deems a typical threat known as node replication attack or clone node attack, where an adversary creates its own low-cost sensor nodes called clone nodes and misinforms the network to acknowledge them as legitimate nodes.