scispace - formally typeset
M

Mohammed Y. Aalsalem

Researcher at Jazan University

Publications -  53
Citations -  1630

Mohammed Y. Aalsalem is an academic researcher from Jazan University. The author has contributed to research in topics: Wireless sensor network & Key distribution in wireless sensor networks. The author has an hindex of 17, co-authored 53 publications receiving 1309 citations. Previous affiliations of Mohammed Y. Aalsalem include University of Sydney.

Papers
More filters
Journal ArticleDOI

Mobile Phone Sensing Systems: A Survey

TL;DR: This paper has described comprehensively all those systems which are using smart phones and mobile phone sensors for humans good will and better human phone interaction.
Journal ArticleDOI

Wireless Sensor Networks in oil and gas industry: Recent advances, taxonomy, requirements, and open challenges

TL;DR: A comprehensive review and detailed comparison of the most recent systems or techniques developed for monitoring various anomalous events that are involved in the three sectors (upstream, midstream, downstream) of oil and gas industry is presented.
Journal ArticleDOI

Internet of Things (IoT) Operating Systems Management: Opportunities, Challenges, and Solution.

TL;DR: A brief overview of different IoT OSs, supported hardware, and future research directions is presented and overview of the accepted papers in the Special Issue on IoT OS management is provided.
Proceedings ArticleDOI

A reliable Internet of Things based architecture for oil and gas industry

TL;DR: A novel IoT based architecture is proposed for Oil and gas industries to make data collection from connected objects as simple, secure, robust, reliable and quick and ultimately saving time and money and increasing business productivity.
Journal ArticleDOI

Detection and Mitigation of Node Replication Attacks in Wireless Sensor Networks: A Survey

TL;DR: This paper deems a typical threat known as node replication attack or clone node attack, where an adversary creates its own low-cost sensor nodes called clone nodes and misinforms the network to acknowledge them as legitimate nodes.