scispace - formally typeset
Search or ask a question
Author

Nor Effendy Othman

Other affiliations: Trinity College, Dublin
Bio: Nor Effendy Othman is an academic researcher from National University of Malaysia. The author has contributed to research in topics: Handover & IPv6. The author has an hindex of 7, co-authored 34 publications receiving 227 citations. Previous affiliations of Nor Effendy Othman include Trinity College, Dublin.

Papers
More filters
Proceedings ArticleDOI
01 Jul 2013
TL;DR: This paper compares between android and iPhone Operating System (iOS) mobile operating systems (MOS) that available in the market which is more specific on the security issue.
Abstract: This paper compares between android and iPhone Operating System (iOS) mobile operating systems (MOS) that available in the market which is more specific on the security issue. These issues are reportedly the concern of not only the mobile customers but also the software developers. In achieving security requirements, the MOS developers need to know how to achieve the criteria. The security requirements for MOS are Application Sandboxing, Memory Randomization, Encryption, Data Storage Format and Built-in Antivirus. Application sandboxing enforces permissions, privileges, directories, entitlements and kernel access for a mobile app. Memory randomization ensures that the memory regions of mobile application as well as system shared libraries are all randomized at device and application start-up. Encryption is performed on disk or filer/folder level and also at the interprocess communication level. It is difficult to speak in favor or against the android or the iOS operating system in terms of better security. The way of using the device plays a major role in determining the security level. In terms of storage, all data are stored in Data Storage Format. Data can be stored at internal storage or external storage. To protect the MOS from virus attacks, antivirus need to be installed for increasing security areas.

55 citations

Journal ArticleDOI
TL;DR: This article revolves around the survey of the vulnerabilities mitigations approaches of NDP, since the time of the protocol development up to the date of this paper.
Abstract: Neighbor discovery protocol (NDP) is the core protocol of Internet protocol version 6 (IPv6) suite. The motive behind NDP is to replace address resolution protocol (ARP), router discovery, and redirect functions in Internet protocol version 4. NDP is known as the stateless protocol as it is utilized by the IPv6 nodes to determine joined hosts as well as routers in an IPv6 network without the need of dynamic host configuration protocol server. NDP is susceptible to attacks due to the deficiency in its authentication process. Securing NDP is extremely crucial as the Internet is prevalent nowadays and it is widely used in communal areas, for instance, airports, where trust does not exist among the users. A malicious host is able to expose denial of service or man-in-the-middle attacks by injecting spoofed address in NDP messages. With the intention to protect the NDP many solutions were proposed by researchers. However, these solutions either introduced new protocols that need to be supported by all nodes or built mechanisms that require the cooperation of all nodes. Moreover, some solutions are deviating from the layering principals of open system interconnection model. Therefore, the necessity to study NDP in details to recognize and identify the points that could be a source of enhancement has become mandatory task. This article revolves around the survey of the vulnerabilities mitigations approaches of NDP, since the time of the protocol development up to the date of finalized this paper. We described the technical specifications of NDP showing its components, functions, and working procedures. In addition, each threat of NDP is classified and explained in details. Open challenges of NDP and recommended future directions for scientific research are presented at the end of this paper.

47 citations

Journal ArticleDOI
TL;DR: The control plane structure of LTE/LTE-A is reviewed and a comprehensive discussion of handover procedures such as the phases, techniques, requirements, features, and challenges involved are presented.
Abstract: The increasing demand for mobile communication calls for improvements to network operating services in terms of capacity, coverage, and Quality of Services (QoS). Ensuring QoS is one of the challenges faced by wireless network operators, which include the provision of high mobility speeds, thus the implementation of a seamless and fast handover between network cells is a prominent issue that must be addressed, especially when fulfilling QoS prerequisites. Long Term Evolution (LTE)/LTE-Advance has met these demands of QoS through the use of a new Radio Access Network and distribution of Radio Resource Management including the handover decision technique to evolve NodeB instead of relying on centralized control. In this paper, we review the control plane structure of LTE/LTE-A and present a comprehensive discussion of handover procedures such as the phases, techniques, requirements, features, and challenges involved. According to the overview of the handover decision phase, we surveyed and classified the present handover decision algorithms for a LTE-A system-based technology in regard to the primary handover decision technique. For each class, we describe in detail the fundamental operations and decision parameters using representative algorithms. A summary of input parameters, techniques, and performance evaluation of the handover decision algorithms concludes this work.

42 citations

Journal ArticleDOI
TL;DR: While the food app was well-accepted by most of the young adults, the current prototype would benefit from incorporation of a barcode scanning function, customizable reminders, in-app tutorial, an entertainment component, and enhancement in overall appearance.
Abstract: Mobile applications may improve dietary reporting among young adults due to their high accessibility and embedded camera function. This pilot study aimed to (i) evaluate users' acceptability and compliance in reporting dietary intake using a newly developed food diary mobile application (food app); and (ii) identify issues and recommendations for improving dietary assessment using this food app via quantitative and qualitative protocols. Twenty-eight university students each used a food app for seven consecutive days and attended one of five focus group interviews. A 42% decrement in reporting compliance was observed throughout the seven-day recording period. An average of 5.9 recording days were reported and 4.8 occasions of meal data were uploaded each day. Based on questionnaires, high levels of agreement were reported in terms of perceived usefulness (69.3%), perceived ease of use (77.1%), attitude (73.6%), perceived enjoyment (62.6%), and smartphone experience (91.1%), but such agreement was not reported for intention to use (38.1%) and social influence (33.4%). Four major themes emerged from the focus group interviews, namely, (i) features; (ii) potential use; (iii) utility issues of the food app; and (iv) suggestions for improvements. While the food app was well-accepted by most of the young adults, the current prototype would benefit from incorporation of a barcode scanning function, customizable reminders, in-app tutorial, an entertainment component, and enhancement in overall appearance.

25 citations

Journal ArticleDOI
TL;DR: An advanced handover technique is proposed, which consolidates the present UE moving direction and its history information and significantly reduced the number of handovers, the signaling measurements number, the packet delay ratio, and the packet loss ratio and increased the throughput.
Abstract: The handover is one of the basic elements in the mobility management of Long Term Evolution Advanced (LTE-A) wireless systems. It permits the user equipment (UE) to wander between LTE-A wireless networks. LTE-A purely depends on the hard handover, which may cause disconnection to occur if the handover is not fast enough. In this paper, an advanced handover technique is proposed, which consolidates the present UE moving direction and its history information. The proposed technique tracks the UE positions to determine its direction. When the UE is close to the handover spot, the UE begins to look into its history, so as to select the target cell. In the event that the UE trajectory does not exist in the history or the load of target cell is full, the UE and its serving cell will begin looking for a target cell through the use of a cosine function and distance in order to select the target cell. Through the direct selection of the evolved NodeB target in the handover, the performance of the network transmission is seen to improve. The proposed algorithm is evaluated and then compared with the 3GPP standard handover and existing work depending on handover number, number of signaling measurements, packet delay ratio, packet loss ratio, and throughput. The simulation with LTE-Sim proves that the proposed algorithm significantly reduced the number of handovers, the signaling measurements number, the packet delay ratio, and the packet loss ratio and increased the throughput.

18 citations


Cited by
More filters
01 Jan 2005

454 citations

Journal ArticleDOI
01 Mar 2019
TL;DR: This paper intends to provide a comprehensive security analysis of the IoT, by examining and assessing the potential threats and countermeasures, and identifies the suitable countermeasures and their limitations, paying special attention to the IoT protocols.
Abstract: The Internet of Things (IoT) is the next technological leap that will introduce significant improvements to various aspects of the human environment, such as health, commerce, and transport. However, despite the fact that it may bring beneficial economic and social changes, the security and the privacy protection of objects and users remain a crucial challenge that has to be addressed. Specifically, now the security measures have to monitor and control the actions both of users and objects. However, the interconnected and independent nature of objects, as well as their constrained capabilities regarding the computing resources make impossible the applicability of the conventional security mechanisms. Moreover, the heterogeneity of various technologies which the IoT combines increases the complexity of the security processes, since each technology is characterized by different vulnerabilities. Furthermore, the tremendous amounts of data which is generated by the multiple interactions between the users and objects or among the objects make harder their management and the functionality of the access control systems. In this context, this paper intends to provide a comprehensive security analysis of the IoT, by examining and assessing the potential threats and countermeasures. More detailed, after studying and determining the security requirements in the context of the IoT, we implement a qualitative and quantitative risk analysis, investigating the security threats per layer. Subsequently, based on this process we identify the suitable countermeasures and their limitations, paying special attention to the IoT protocols. Finally, we provide research directions for future work.

190 citations

Journal ArticleDOI
TL;DR: This paper will thoroughly analyze the technical details about the Internet of Things network and provide insight about the future IoT network and the crucial components that will enable it.
Abstract: The introduction of mobile devices has changed our daily lives. They enable users to obtain information even in a nomadic environment and provide information without limitations. A decade after the introduction of this technology, we are now facing the next innovation that will change our daily lives. With the introduction of the Internet of Things (IoT), our communication ability will not be restricted to only mobile devices. Rather, it will expand to all things with which we coexist. Many studies have discussed IoT-related services and platforms. However, there are only limited discussions about the IoT network. In this paper, we will thoroughly analyze the technical details about the IoT network. Based on our survey of papers, we will provide insight about the future IoT network and the crucial components that will enable it.

147 citations

01 Jan 2011
TL;DR: The Internet of Things (IoT) is a network of interconnected devices that provide real-time information about connected devices and applications.
Abstract: 事情(IoT ) 的因特网针对启用物理世界和电子空间的互联和集成。它代表未来联网的趋势,并且带信息产业革命的第三个波浪。在这篇文章,我们首先介绍某背景和 IoT 的相关技术并且讨论 IoT 的概念和目的。然后,我们在场挑战和关键科学问题在 IoT 包含了开发。而且,我们介绍中国(973 程序) 的国家基本研究程序支持的当前的研究工程。最后,我们构画出未来研究方向。

142 citations

Journal ArticleDOI
01 Oct 2020-Symmetry
TL;DR: This work explains the concept of IoT and defines and summarizes its main technologies and uses, offering a next-generation protocol as a solution to the challenges.
Abstract: With the evolution of the fifth-generation (5G) wireless network, the Internet of Things (IoT) has become a revolutionary technique that enables a diverse number of features and applications. It can able a diverse amount of devices to be connected in order to create a single communication architecture. As it has significantly expanded in recent years, it is fundamental to study this trending technology in detail and take a close look at its applications in the different domains. It represents an enabler of new communication possibilities between people and things. The main asset of this concept is its significant influence through the creation of a new world dimension. The key features required for employing a large-scale IoT are low-cost sensors, high-speed and error-tolerant data communications, smart computations, and numerous applications. This research work is presented in four main sections, including a general overview of IoT technology, a summary of previous correlated surveys, a review regarding the main IoT applications, and a section on the challenges of IoT. The purpose of this study is to fully cover the applications of IoT, including healthcare, environmental, commercial, industrial, smart cities, and infrastructural applications. This work explains the concept of IoT and defines and summarizes its main technologies and uses, offering a next-generation protocol as a solution to the challenges. IoT challenges were investigated to enhance research and development in the fields. The contribution and weaknesses of each research work cited are covered, highlighting eventual possible research questions and open matters for IoT applications to ensure a full analysis coverage of the discussed papers.

125 citations