Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Adel Ali Ahmed is active.

Publication


Featured researches published by Adel Ali Ahmed.


Computer Communications | 2008

A real-time routing protocol with load distribution in wireless sensor networks

Adel Ali Ahmed; Norsheila Fisal

Wireless sensor network (WSN) is a wireless ad hoc network that consists of very large number of tiny sensor nodes communicating with each other with limited power and memory constrain. WSN demands real-time forwarding which means messages in the network are delivered according to their end-to-end deadlines (packet lifetime). This paper proposes a novel real-time routing protocol with load distribution (RTLD) that ensures high packet throughput with minimized packet overhead and prolongs the lifetime of WSN. The routing depends on optimal forwarding decision that takes into account of the link quality, packet delay time and the remaining power of next hop sensor nodes. The proposed mechanism has been successfully studied and verified through simulation and real test bed implementation.


Computer Networks | 2013

An enhanced real-time routing protocol with load distribution for mobile wireless sensor networks

Adel Ali Ahmed

Mobile wireless sensor network (MWSN) is a wireless ad hoc network that consists of a very large number of tiny sensor nodes communicating with each other in which sensor nodes are either equipped with motors for active mobility or attached to mobile objects for passive mobility. A real-time routing protocol for MWSN is an exciting area of research because messages in the network are delivered according to their end-to-end deadlines (packet lifetime) while sensor nodes are mobile. This paper proposes an enhanced real-time with load distribution (ERTLD) routing protocol for MWSN which is based on our previous routing protocol RTLD. ERTLD utilized corona mechanism and optimal forwarding metrics to forward the data packet in MWSN. It computes the optimal forwarding node based on RSSI, remaining battery level of sensor nodes and packet delay over one-hop. ERTLD ensures high packet delivery ratio and experiences minimum end-to-end delay in WSN and MWSN compared to baseline routing protocol. In this paper we consider a highly dynamic wireless sensor network system in which the sensor nodes and the base station (sink) are mobile. ERTLD has been successfully studied and verified through simulation experiment.


Security and Communication Networks | 2011

Secure real-time routing protocol with load distribution in wireless sensor networks

Adel Ali Ahmed; Norsheila Fisal

Wireless sensor network (WSN) is a wireless ad hocnetwork that consists of a very large number of tiny sensor nodes communicating with each other with limited power and memory constrain. WSN demands real-time forwarding which means messages in the network are delivered according to their end-to-end deadlines (packet lifetime). Since many sensor networks will be deployed in critical applications, security is essential. Recently, many real-time routing protocols have been proposed, but none is designed with security. This paper proposes a novel secure real-time with load distribution (SRTLD) routing protocol that provides secure real-time data transfer and efficient distributed energy usage in WSN. The SRTLD routing protocol ensures high packet throughput and minimized packet overhead. It has been successfully studied and verified through simulation and real test bed implementation. Copyright


trust security and privacy in computing and communications | 2013

Efficient Random Key Based Encryption System for Data Packet Confidentiality in WSNs

Kashif Saleem; Mohammed Khalil; Norsheila Fisal; Adel Ali Ahmed; Mehmet A. Orgun

Wireless sensor networks (WSNs) consists of numerous tiny wireless sensor nodes to communicate with each other with limited resources. The resource limitations and vulnerabilities of wireless sensor node expose the network to suffer with numerous attacks. The WSN constraints and limitations should be taken under consideration while designing the security mechanism. The recent Biological inspired self-organized secure autonomous routing protocol (BIOSARP) requires certain amount of time at initialization phase of WSN deployment to develop overall network knowledge. Initialization phase is a critical stage in the overall life span of WSN that requires an efficient active security measures. Therefore, in this paper we propose E-BIOSARP that enhances the BIOSARP with random key encryption and decryption mechanism. We present the design, pseudo code and the simulation results to prove the efficiency of E-BIOSARP for WSN. Network simulator 2 (NS2) has been utilized to perform the analysis. Our result shows that proposed E-BIOSARP can efficiently protect WSN from spoofed, altered or replayed routing information attacks, selective forwarding, acknowledgement spoofing, sybil attack and hello flood attack.


Sensors | 2016

Cost-Effective Encryption-Based Autonomous Routing Protocol for Efficient and Secure Wireless Sensor Networks

Kashif Saleem; Abdelouahid Derhab; Mehmet A. Orgun; Jalal Al-Muhtadi; Joel J. P. C. Rodrigues; Mohammed Khalil; Adel Ali Ahmed

The deployment of intelligent remote surveillance systems depends on wireless sensor networks (WSNs) composed of various miniature resource-constrained wireless sensor nodes. The development of routing protocols for WSNs is a major challenge because of their severe resource constraints, ad hoc topology and dynamic nature. Among those proposed routing protocols, the biology-inspired self-organized secure autonomous routing protocol (BIOSARP) involves an artificial immune system (AIS) that requires a certain amount of time to build up knowledge of neighboring nodes. The AIS algorithm uses this knowledge to distinguish between self and non-self neighboring nodes. The knowledge-building phase is a critical period in the WSN lifespan and requires active security measures. This paper proposes an enhanced BIOSARP (E-BIOSARP) that incorporates a random key encryption mechanism in a cost-effective manner to provide active security measures in WSNs. A detailed description of E-BIOSARP is presented, followed by an extensive security and performance analysis to demonstrate its efficiency. A scenario with E-BIOSARP is implemented in network simulator 2 (ns-2) and is populated with malicious nodes for analysis. Furthermore, E-BIOSARP is compared with state-of-the-art secure routing protocols in terms of processing time, delivery ratio, energy consumption, and packet overhead. The findings show that the proposed mechanism can efficiently protect WSNs from selective forwarding, brute-force or exhaustive key search, spoofing, eavesdropping, replaying or altering of routing information, cloning, acknowledgment spoofing, HELLO flood attacks, and Sybil attacks.


WSEAS TRANSACTIONS on COMMUNICATIONS archive | 2010

Ant colony inspired self-optimized routing protocol based on cross layer architecture for wireless sensor networks

Kashif Saleem; Norsheila Fisal; M. Ariff Baharudin; Adel Ali Ahmed; Sharifah Hafizah; Sharifah Kamilah


Archive | 2009

Experiment Measurements for Packet Reception Rate in Wireless Underground Sensor Networks

Adel Ali Ahmed; Norsheila Fisal; Johur Bahru


Jurnal Teknologi | 2007

Real–time Routing Protocol with Load Distribution in Wireless Sensor Network Based on IEEE 802.11 and IEEE 802.15.4

Adel Ali Ahmed; Liza A. Latiff; Norsheila Fisal


Jurnal Teknologi (Sciences and Engineering) | 2012

Proposed Technique for Transport Protocol in Wireless Sensor Network (WSN) for Multimedia Application

Farizah Yunus; Nor-syahidatul N. Ismail; S. H. S. Ariffin; A. A. Shahidan; S. K. Syed Yusof; Norsheila Fisal; Kashif Saleem; Adel Ali Ahmed


Jurnal Teknologi (Sciences and Engineering) | 2012

Proposed Hybrid MAC Layer Design for Priority Application Usage in Wireless Sensor Network (WSN)

Nor-syahidatul N. Ismail; Farizah Yunus; S. H. S. Ariffin; A. A. Shahidan; Norsheila Fisal; N. M. Abdul Latiff; Adel Ali Ahmed; Kashif Saleem

Collaboration


Dive into the Adel Ali Ahmed's collaboration.

Top Co-Authors

Avatar

Norsheila Fisal

Universiti Teknologi Malaysia

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

A. A. Shahidan

Universiti Teknologi Malaysia

View shared research outputs
Top Co-Authors

Avatar

Farizah Yunus

Universiti Teknologi Malaysia

View shared research outputs
Top Co-Authors

Avatar

Liza Abdul Latiff

Universiti Teknologi Malaysia

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

S. H. S. Ariffin

Universiti Teknologi Malaysia

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge