S
Salam Hamdan
Researcher at Princess Sumaya University for Technology
Publications - 11
Citations - 136
Salam Hamdan is an academic researcher from Princess Sumaya University for Technology. The author has contributed to research in topics: Sybil attack & Vehicular ad hoc network. The author has an hindex of 5, co-authored 10 publications receiving 49 citations.
Papers
More filters
Journal ArticleDOI
Edge-Computing Architectures for Internet of Things Applications: A Survey
TL;DR: This paper studies, in-depth, edge-computing architectures for IoT (ECAs-IoT), and then classifies them according to different factors such as data placement, orchestration services, security, and big data, and recommends four different scenarios for using ECAs- IoT by IoT applications.
Journal ArticleDOI
Detecting Sybil attacks in vehicular ad hoc networks
TL;DR: A hybrid algorithm is proposed by combining footprint and privacy-preserving detection of abuses of pseudonyms (P2DAP) methods that acts better than the footprint algorithm when the number of vehicles increases and on the trajectory of the vehicle.
Proceedings ArticleDOI
Enhance the security in smart home applications based on IOT-CoAP protocol
TL;DR: The authors will attempt to find the optimal hash function that can be added to the CoAP protocol in order of increasing the security without influencing the performance, and results show that SHA 224 is the best hash algorithm according to the performance.
Proceedings ArticleDOI
Compression Techniques Used in Iot: A Comparitive Study
TL;DR: A survey and a comparative study among most commonly used IoT compression techniques are provided and the techniques are addressed in terms of different attributes such as the compression type, lossless or lossy.
Proceedings ArticleDOI
Hybrid Algorithm to Detect the Sybil Attacks in VANET
TL;DR: An improved algorithm is proposed, taking advantage the footprint and privacy-preserving detection of abuses of pseudonyms (P2DAP) methods, and a new hybrid algorithm will be performed that depends on the encrypted, authentication and on the trajectory of the vehicle.