Adel Ali Ahmed
Universiti Teknologi Malaysia
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Adel Ali Ahmed.
Computer Communications | 2008
Adel Ali Ahmed; Norsheila Fisal
Wireless sensor network (WSN) is a wireless ad hoc network that consists of very large number of tiny sensor nodes communicating with each other with limited power and memory constrain. WSN demands real-time forwarding which means messages in the network are delivered according to their end-to-end deadlines (packet lifetime). This paper proposes a novel real-time routing protocol with load distribution (RTLD) that ensures high packet throughput with minimized packet overhead and prolongs the lifetime of WSN. The routing depends on optimal forwarding decision that takes into account of the link quality, packet delay time and the remaining power of next hop sensor nodes. The proposed mechanism has been successfully studied and verified through simulation and real test bed implementation.
Computer Networks | 2013
Adel Ali Ahmed
Mobile wireless sensor network (MWSN) is a wireless ad hoc network that consists of a very large number of tiny sensor nodes communicating with each other in which sensor nodes are either equipped with motors for active mobility or attached to mobile objects for passive mobility. A real-time routing protocol for MWSN is an exciting area of research because messages in the network are delivered according to their end-to-end deadlines (packet lifetime) while sensor nodes are mobile. This paper proposes an enhanced real-time with load distribution (ERTLD) routing protocol for MWSN which is based on our previous routing protocol RTLD. ERTLD utilized corona mechanism and optimal forwarding metrics to forward the data packet in MWSN. It computes the optimal forwarding node based on RSSI, remaining battery level of sensor nodes and packet delay over one-hop. ERTLD ensures high packet delivery ratio and experiences minimum end-to-end delay in WSN and MWSN compared to baseline routing protocol. In this paper we consider a highly dynamic wireless sensor network system in which the sensor nodes and the base station (sink) are mobile. ERTLD has been successfully studied and verified through simulation experiment.
Security and Communication Networks | 2011
Adel Ali Ahmed; Norsheila Fisal
Wireless sensor network (WSN) is a wireless ad hocnetwork that consists of a very large number of tiny sensor nodes communicating with each other with limited power and memory constrain. WSN demands real-time forwarding which means messages in the network are delivered according to their end-to-end deadlines (packet lifetime). Since many sensor networks will be deployed in critical applications, security is essential. Recently, many real-time routing protocols have been proposed, but none is designed with security. This paper proposes a novel secure real-time with load distribution (SRTLD) routing protocol that provides secure real-time data transfer and efficient distributed energy usage in WSN. The SRTLD routing protocol ensures high packet throughput and minimized packet overhead. It has been successfully studied and verified through simulation and real test bed implementation. Copyright
trust security and privacy in computing and communications | 2013
Kashif Saleem; Mohammed Khalil; Norsheila Fisal; Adel Ali Ahmed; Mehmet A. Orgun
Wireless sensor networks (WSNs) consists of numerous tiny wireless sensor nodes to communicate with each other with limited resources. The resource limitations and vulnerabilities of wireless sensor node expose the network to suffer with numerous attacks. The WSN constraints and limitations should be taken under consideration while designing the security mechanism. The recent Biological inspired self-organized secure autonomous routing protocol (BIOSARP) requires certain amount of time at initialization phase of WSN deployment to develop overall network knowledge. Initialization phase is a critical stage in the overall life span of WSN that requires an efficient active security measures. Therefore, in this paper we propose E-BIOSARP that enhances the BIOSARP with random key encryption and decryption mechanism. We present the design, pseudo code and the simulation results to prove the efficiency of E-BIOSARP for WSN. Network simulator 2 (NS2) has been utilized to perform the analysis. Our result shows that proposed E-BIOSARP can efficiently protect WSN from spoofed, altered or replayed routing information attacks, selective forwarding, acknowledgement spoofing, sybil attack and hello flood attack.
Sensors | 2016
Kashif Saleem; Abdelouahid Derhab; Mehmet A. Orgun; Jalal Al-Muhtadi; Joel J. P. C. Rodrigues; Mohammed Khalil; Adel Ali Ahmed
The deployment of intelligent remote surveillance systems depends on wireless sensor networks (WSNs) composed of various miniature resource-constrained wireless sensor nodes. The development of routing protocols for WSNs is a major challenge because of their severe resource constraints, ad hoc topology and dynamic nature. Among those proposed routing protocols, the biology-inspired self-organized secure autonomous routing protocol (BIOSARP) involves an artificial immune system (AIS) that requires a certain amount of time to build up knowledge of neighboring nodes. The AIS algorithm uses this knowledge to distinguish between self and non-self neighboring nodes. The knowledge-building phase is a critical period in the WSN lifespan and requires active security measures. This paper proposes an enhanced BIOSARP (E-BIOSARP) that incorporates a random key encryption mechanism in a cost-effective manner to provide active security measures in WSNs. A detailed description of E-BIOSARP is presented, followed by an extensive security and performance analysis to demonstrate its efficiency. A scenario with E-BIOSARP is implemented in network simulator 2 (ns-2) and is populated with malicious nodes for analysis. Furthermore, E-BIOSARP is compared with state-of-the-art secure routing protocols in terms of processing time, delivery ratio, energy consumption, and packet overhead. The findings show that the proposed mechanism can efficiently protect WSNs from selective forwarding, brute-force or exhaustive key search, spoofing, eavesdropping, replaying or altering of routing information, cloning, acknowledgment spoofing, HELLO flood attacks, and Sybil attacks.
WSEAS TRANSACTIONS on COMMUNICATIONS archive | 2010
Kashif Saleem; Norsheila Fisal; M. Ariff Baharudin; Adel Ali Ahmed; Sharifah Hafizah; Sharifah Kamilah
Archive | 2009
Adel Ali Ahmed; Norsheila Fisal; Johur Bahru
Jurnal Teknologi | 2007
Adel Ali Ahmed; Liza A. Latiff; Norsheila Fisal
Jurnal Teknologi (Sciences and Engineering) | 2012
Farizah Yunus; Nor-syahidatul N. Ismail; S. H. S. Ariffin; A. A. Shahidan; S. K. Syed Yusof; Norsheila Fisal; Kashif Saleem; Adel Ali Ahmed
Jurnal Teknologi (Sciences and Engineering) | 2012
Nor-syahidatul N. Ismail; Farizah Yunus; S. H. S. Ariffin; A. A. Shahidan; Norsheila Fisal; N. M. Abdul Latiff; Adel Ali Ahmed; Kashif Saleem