scispace - formally typeset
S

Salam Hamdan

Researcher at Princess Sumaya University for Technology

Publications -  11
Citations -  136

Salam Hamdan is an academic researcher from Princess Sumaya University for Technology. The author has contributed to research in topics: Sybil attack & Vehicular ad hoc network. The author has an hindex of 5, co-authored 10 publications receiving 49 citations.

Papers
More filters
Journal ArticleDOI

Edge-Computing Architectures for Internet of Things Applications: A Survey

TL;DR: This paper studies, in-depth, edge-computing architectures for IoT (ECAs-IoT), and then classifies them according to different factors such as data placement, orchestration services, security, and big data, and recommends four different scenarios for using ECAs- IoT by IoT applications.
Journal ArticleDOI

Detecting Sybil attacks in vehicular ad hoc networks

TL;DR: A hybrid algorithm is proposed by combining footprint and privacy-preserving detection of abuses of pseudonyms (P2DAP) methods that acts better than the footprint algorithm when the number of vehicles increases and on the trajectory of the vehicle.
Proceedings ArticleDOI

Enhance the security in smart home applications based on IOT-CoAP protocol

TL;DR: The authors will attempt to find the optimal hash function that can be added to the CoAP protocol in order of increasing the security without influencing the performance, and results show that SHA 224 is the best hash algorithm according to the performance.
Proceedings ArticleDOI

Compression Techniques Used in Iot: A Comparitive Study

TL;DR: A survey and a comparative study among most commonly used IoT compression techniques are provided and the techniques are addressed in terms of different attributes such as the compression type, lossless or lossy.
Proceedings ArticleDOI

Hybrid Algorithm to Detect the Sybil Attacks in VANET

TL;DR: An improved algorithm is proposed, taking advantage the footprint and privacy-preserving detection of abuses of pseudonyms (P2DAP) methods, and a new hybrid algorithm will be performed that depends on the encrypted, authentication and on the trajectory of the vehicle.