Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Ali Hilal Al-Bayatti is active.

Publication


Featured researches published by Ali Hilal Al-Bayatti.


Journal of Network and Computer Applications | 2014

A comprehensive survey on vehicular Ad Hoc network

Saif Al-Sultan; Moath Al-Doori; Ali Hilal Al-Bayatti; Hussien Zedan

Vehicular ad hoc networks (VANETs) are classified as an application of mobile ad hoc network (MANET) that has the potential in improving road safety and in providing travellers comfort. Recently VANETs have emerged to turn the attention of researchers in the field of wireless and mobile communications, they differ from MANET by their architecture, challenges, characteristics and applications. In this paper we present aspects related to this field to help researchers and developers to understand and distinguish the main features surrounding VANET in one solid document, without the need to go through other relevant papers and articles starting from VANET architecture and ending up with the most appropriate simulation tools to simulate VANET protocols and applications.


IEEE Transactions on Vehicular Technology | 2013

Context-Aware Driver Behavior Detection System in Intelligent Transportation Systems

S. Al-Sultan; Ali Hilal Al-Bayatti; Hussein Zedan

Vehicular ad hoc networks (VANETs) have emerged as an application of mobile ad hoc networks (MANETs), which use dedicated short-range communication (DSRC) to allow vehicles in close proximity to communicate with each other or to communicate with roadside equipment. Applying wireless access technology in vehicular environments has led to the improvement of road safety and a reduction in the number of fatalities caused by road accidents through development of road safety applications and facilitation of information sharing between moving vehicles regarding the road. This paper focuses on developing a novel and nonintrusive driver behavior detection system using a context-aware system in VANETs to detect abnormal behaviors exhibited by drivers and to warn other vehicles on the road to prevent accidents from happening. A five-layer context-aware architecture is proposed, which is able to collect contextual information about the driving environment, to perform reasoning about certain and uncertain contextual information, and to react upon that information. A probabilistic model based on dynamic Bayesian networks (DBNs) in real time, inferring four types of driving behavior (normal, drunk, reckless, and fatigue) by combining contextual information about the driver, the vehicle, and the environment, is presented. The dynamic behavior model can capture the static and the temporal aspects related to the behavior of the driver, thus leading to robust and accurate behavior detection. The evaluation of behavior detection using synthetic data proves the validity of our model and the importance of including contextual information about the driver, the vehicle, and the environment.


Applied Soft Computing | 2014

The implementation of an intelligent and video-based fall detection system using a neural network

Laila Alhimale; Hussein Zedan; Ali Hilal Al-Bayatti

This paper presents the development of a smart fall detector to minimise accidental falls which occur among elderly people, especially for indoor situations. A video-based detection system was utilised, as this can preserve privacy and monitor the physical activities of elderly people. In order to identify the correct situation among a set of predetermined situations, which consisted of praying, sitting, standing, bending, kneeling and lying down, a neural network system was incorporated in the fall detection computation algorithm. The neural network analysed the binary map image of the person and then identified which plausible situation the person was in at any particular instant in time. The fall detectors performance in successfully detecting falls was then evaluated using two statistical metrics: specificity and sensitivity. The performance of this fall detection system in identifying falls was also evaluated during two non-normal gait movements, stumbling and limping, so as to mimic the motions of a good proportion of the elderly people having these types of walking gait movements. It was shown that the implemented video-based fall detection system could be a promising solution for detecting indoor falls among senior citizens.


Journal of Sensor and Actuator Networks | 2016

Social internet of vehicles for smart cities

Leandros A. Maglaras; Ali Hilal Al-Bayatti; Ying He; Isabel Wagner; Helge Janicke

Digital devices are becoming increasingly ubiquitous and interconnected. Their evolution to intelligent parts of a digital ecosystem creates novel applications with so far unresolved security issues. A particular example is a vehicle. As vehicles evolve from simple means of transportation to smart entities with new sensing and communication capabilities, they become active members of a smart city. The Internet of Vehicles (IoV) consists of vehicles that communicate with each other and with public networks through V2V (vehicle-to-vehicle), V2I (vehicle-to-infrastructure) and V2P (vehicle-to-pedestrian) interactions, which enables both the collection and the real-time sharing of critical information about the condition on the road network. The Social Internet of Things (SIoT) introduces social relationships among objects, creating a social network where the participants are not humans, but intelligent objects. In this article, we explore the concept of the Social Internet of Vehicles (SIoV), a network that enables social interactions both among vehicles and among drivers. We discuss technologies and components of the SIoV, possible applications and issues of security, privacy and trust that are likely to arise.


International Journal of Wireless & Mobile Networks | 2012

Data confidentiality in mobile ad hoc networks.

Hamza Aldabbas; Tariq Alwada'n; Helge Janicke; Ali Hilal Al-Bayatti

Mobile ad hoc networks (MANETs) are self-configuring infrastructure-less networks comprised of mobile nodes that communicate over wireless links without any central control on a peer-to-peer basis. These individual nodes act as routers to forward both their own data and also their neighbours’ data by sending and receiving packets to and from other nodes in the network. The relatively easy configuration and the quick deployment make ad hoc networks suitable the emergency situations (such as human or natural disasters) and for military units in enemy territory. Securing data dissemination between these nodes in such networks, however, is a very challenging task. Exposing such information to anyone else other than the intended nodes could cause a privacy and confidentiality breach, particularly in military scenarios. In this paper we present a novel framework to enhance the privacy and data confidentiality in mobile ad hoc networks by attaching the originator policies to the messages as they are sent between nodes. We evaluate our framework using the Network Simulator (NS-2) to check whether the privacy and confidentiality of the originator are met. For this we implemented the Policy Enforcement Points (PEPs), as NS-2 agents that manage and enforce the policies attached to packets at every node in the MANET.


workshop on positioning navigation and communication | 2013

GPS integrity monitoring for an intelligent transport system

Tareq Binjammaz; Ali Hilal Al-Bayatti; Ashwaq Al-Hargan

The integrity of positioning systems has become an increasingly important requirement for location-based ITS applications, such as electronic toll collection, pay-as-you-drive and traffic control systems. GPS receivers are used to provide vehicle position and velocity data. However, GPS cannot provide the high quality positioning information required by ITS applications due to atmospheric effects , receiver measurement errors, and multipath errors. In addition, some ITS applications, such as traffic law enforcement systems (e.g., speed fining), have legal or economic consequences and require integrity in both position and speed information. Therefore, the integrity of GPS data is required to guarantee that navigation systems will not produce misleading or faulty information. Instead, to achieve the integrity goal, systems should warn the user if there is a potential error in the GPS data. In this paper, a new technique for providing high integrity GPS information for land vehicle monitoring systems is proposed. The proposed method provides a three level integrity check. Each level uses a different technique to check the consistency of the GPS information. A receiver autonomous integrity monitoring (RAIM) algorithm is used to measure the quality of GPS positioning output. GPS Doppler information is used to check the integrity of vehicle velocity, which adds a new layer of integrity and could improve the performance of the map matching process. The final level in the integrity check requires confirming the integrity of the map matching algorithm.


2012 International Conference on Computer Systems and Industrial Informatics | 2012

An InfoStation-based context-aware on-street parking system

Abdulmalik Alhammad; Francois Siewe; Ali Hilal Al-Bayatti

This paper presents a novel vehicle ad hoc network (VANET) based on an on-street parking system that exploits the concept of InfoStations (ISs) and context-aware systems to locate and reserve a parking space. All parking zones have an assigned IS that provides wireless coverage to that parking zone. Thus, the parking details are available over dedicated short-range communication (DSRC) via the IS. Vehicles can request and reserve a preferred parking space using wireless capabilities while still moving. Because parking zones are generally distributed according to street (area) names, the architecture in this paper recommends centralised IS, which monitors and controls the geographically intermittent area-wise parking zones.


international conference on networking and services | 2009

Security Solution for Mobile Ad Hoc Network of Networks (MANoN)

Ali Hilal Al-Bayatti; Hussein Zedan; Antonio Cau

Our definition for Mobile Ad hoc Network of Networks (MANoNs) are a group of large autonomous wireless nodes communicating on a peer-to-peer basis in a heterogeneous environment with no pre-defined infrastructure. In fact, each node by itself is an ad hoc network with its own management. Based on the Recommendation ITU-T M.3400 security management consisting of security administration, prevention and detection of malicious nodes and containment and recovery is considered to be one of the major problems MANoN is facing. This paper proposes a novel behaviour detection algorithm combined with threshold cryptography digital certificates to satisfy prevention and detection to securely manage our system. This technique will be evaluated using Network Simulator NS-2 to provide and check whether security requirements are met in a comprehensive manner.


Proceedings of the 4th ACM International Workshop on Context-Awareness for Self-Managing Systems | 2010

Context aware architecture for sending adaptive HELLO messages in VANET

Moath Al-Doori; Ali Hilal Al-Bayatti; Hussein Zedan

With vehicular Ad hoc Network (VANET) being considered a vital application of Mobile ad hoc Network (MANET), this paper will focus on exploiting the aspect of context aware system to leverage the efficiency of routing protocols in VANET. Our investigation will concentrate on the vehicle to vehicle (V2V) communication type rather than the vehicle to Infrastructures (V2I) type, owing to the lack of infrastructures and difficulties involved in providing a comprehensive covering for all roads because of the high expense of installation. Many challenges (e.g. routing issues and security) have emerged in this area, encouraging many researchers to investigate their research in attempting to meet these challenges. Routing protocols are considered as one of the critical dilemmas that need to be tackled; designing an efficient routing mechanism has an impact on enhancing the network performance in terms of disseminating messages to its desired destination. Thus we concentrate in this paper on dealing with the routing issues particularly in minimising overhead and bandwidth consumptions, which in turn will lead to effects on the time delay of packet dissemination. To do this, we introduce a novel technique and architecture that organises the broadcast process of HELLO beacon message by sending these messages according to the circumstances of each vehicle in the network, for instance changing a vehicles direction and exceeding a predefined range of speed, which has an impact on changing the network topology in the road.


Vehicular Communications | 2017

Cooperative volunteer protocol to detect non-line of sight nodes in vehicular ad hoc networks

Khaled Alodadi; Ali Hilal Al-Bayatti; Nasser Alalwan

Abstract A vehicular Ad hoc Network (VANET) is a special type of Mobile Ad hoc Network (MANET) application that impacts wireless communications and Intelligent Transport Systems (ITSs). VANETs are employed to develop safety applications for vehicles to create a safer and less cluttered environment on the road. The many remaining challenges relating to VANETs have encouraged researchers to conduct further investigation in this field to meet these challenges. For example, issues pertaining to routing protocols, such as the delivery of warning messages to vehicles facing Non-Line of Sight (NLOS) situations without causing a broadcasting storm and channel contention are regarded as a serious dilemma, especially in congested environments. This prompted the design of an efficient mechanism for a routing protocol capable of broadcasting warning messages from emergency vehicles to vehicles under NLOS conditions to reduce the overhead and increase the packet delivery ratio with reduced time delay and channel utilisation. This work used the cooperative approach to develop the routing protocol named the Co-operative Volunteer Protocol (CVP), which uses volunteer vehicles to disseminate the warning message from the source to the target vehicle experiencing an NLOS situation. A novel architecture has been developed by utilising the concept of a Context-Aware System (CAS), which clarifies the OBU components and their interaction with each other to collect data and make decisions based on the sensed circumstances. The simulation results showed that the proposed protocol outperformed the GRANT protocol with regard to several metrics such as packet delivery ratio, neighbourhood awareness, channel utilisation, overhead, and latency. The results also showed that the proposed CVP could successfully detect NLOS situations and solve them effectively and efficiently for both the intersection scenario in urban areas and the highway scenario.

Collaboration


Dive into the Ali Hilal Al-Bayatti's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge