Hero Modares
University of Malaya
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Hero Modares.
IEEE Systems Journal | 2016
Hero Modares; Amirhosein Moravejosharieh; Jaime Lloret; Rosli Salleh
As wireless technologies have been improving in recent years, a mobility management mechanism is required to provide seamless and ubiquitous mobility for end users who are roaming among points of attachment in wireless networks. Thus, Mobile IPv6 was developed by the Internet Engineering Task Force (IETF) to support the mobility service. However, Mobile IPv6 is unable to fulfill the requirements of real-time applications, such as video streaming service and voice over IP service, due to its high handover (HO) latency. To address this problem, Proxy Mobile IPv6 (PMIPv6) has been introduced by the IETF. In PMIPv6, which is a network-based approach, the serving network controls mobility management on behalf of the mobile node (MN). Thus, the MN is not required to participate in any mobility-related signaling. However, the PMIPv6 still suffers from lengthy HO latency and packet loss during a HO. This paper explores an elaborated survey on the HO procedure of PMIPv6 protocols and proposed approaches accompanied by a discussion about their points of weakness.
Journal of Network and Computer Applications | 2014
Hero Modares; Amirhossein Moravejosharieh; Jaime Lloret; Rosli Salleh
Mobile IPv6, also known as MIPv6, is an IP-layer protocol that offers mobility support. The MIPv6 protocol allows Mobile Nodes (MNs) to remain connected to Correspondent Nodes (CNs), even when moving to foreign networks. Basically, MNs may change their position throughout the IPv6 network while retaining their existing connections by managing address variations in the Internet layer. Numerous advantages are thus attained, but security remains a fundamental concern. According to our research, a number of protocols can form a secure connection environment between MNs and CNs, though each has advantages and disadvantages. This paper presents a state-of-the art survey of security protocols in MIPv6. Moreover, we propose taxonomy, and comparative study that does not exist in the surveys in the literature. Along with the location management feature within these protocols, potential attacks and security threats, together with the security services and requirements are necessary for minimizing such problems, are subsequently presented.
international conference on intelligent systems, modelling and simulation | 2012
Amirhossein Moravejosharieh; Hero Modares; Rosli Salleh
Mobile IP enables a mobile node to be recognized via a single IP address even though the node may travel from one network to another. Despite reposition between different networks, connectivity at different positions is attained continuously with no user intervention. Mobile IP grants connectivity to nodes everywhere, whether within home networks or away from home. General improvement in MIPv6 may offer enhanced security, however, there are areas still prone to attacks. Security solutions for the mobile IP protocol are still in progress. IP Security (IPsec) in the IPv6 protocol can secure Mobile IPv6 more than IPv4. IPsec presents security services for the application and transportation layer protocols of the TCP/IP stack. However, there are several unsolved concerns and problems with Mobile IPv6 in most cases which justifies development of new methods to provide acceptable level of security. This article focuses on how IPsec works, Mobile IPv6 security, potential threats and security considerations.
2011 First International Conference on Informatics and Computational Intelligence | 2011
Hero Modares; Amirhossein Moravejosharieh; Rosli Salleh
As wireless sensor networks continue to grow, so does the need for effective security mechanisms. Sensor networks may interact with sensitive data and/or operate in hostile unattended environments, it needs to be secured. It is an important challenge to find out suitable cryptography for wireless sensor networks due to limitations of energy, computation capability and storage resources. We present a comparison of two public-key algorithms, RSA and Elliptic Curve Cryptography (ECC). We found ECC to have a significant advantage over RSA as it reduces computation time and also the amount of data transmitted and stored.
2011 First International Conference on Informatics and Computational Intelligence | 2011
Amirhosein Moravejosharieh; Rosli Salleh; Hero Modares
Providing seamless mobility among networks either heterogeneous or homogeneous has become one of the major challenging issues in next generation of wireless networks. Recently, within the past decade, researchers and IP-mobility communities have been investigating on performance of wireless networks in terms of providing seamless and smooth handover procedure while the Mobile Node detaches from current connected network and tries to connect to the most appropriate neighbor network. During performing handover procedure, Mobile Node may encounter connection problem which is a dramatically undesirable event especially for time sensitive applications such as VoIP and video conferences. Knowing the location of Mobile Node could save huge amount of time which results in significant reduction of handover latency. Thus this paper presents an overview on latest location-based handover schemes in both heterogeneous and Mobile IPv6 homogeneous networks.
international conference on intelligent systems, modelling and simulation | 2012
Amirhosein Moravejosharieh; Rosli Salleh; Hero Modares
IP-Mobility protocols provides robust and integrate connectivity while the Mobile Node (MN) is moving among wireless networks. Therefore running certain procedures are needed to perform the complete handover procedure which results in handover latency and consequently packet loss. The four main causes of handover latency are: 1) Movement Detection, 2) Neighbor Discovery, 3) Duplicate Address Discovery (DAD), and 4) Sending Binding Updates (BUs). Researchers and IP-mobility communities have recently been drawn to deploying GPS technology in order to benefit from coordinate information provided by GPS devices which perform seamless and smooth handover. In this paper, the latest HMIPv6 protocol and GPS model improvements are investigated and compared in terms of handover latency and energy consumption.
european symposium on computer modeling and simulation | 2012
Hero Modares; Amirhossein Moravejosharieh; Hassan Keshavarz; Rosli Salleh
Mobile Nodes (MN) in Mobile IPv6 (MIPv6) are given the opportunity to eliminate triangle routing that is inefficient with their own corresponding node (CN) using Route Optimisation (RO). This greatly improves the performance of the network. Unfortunately, using this method allows several security vulnerabilities to manifest itself with the MIPv6. Among those, common issues are those concerns the verification of authenticity and authorisation of Binding Updates during the process of RO. These types of unauthenticated and unauthorised BUs are the key to various types of malicious attacks. Since it is expected that MIPv6 will be supported by IPv6, several mechanism to ensure BU security will be crucial in the next generation Internet. This article focuses on Mobile IPv6 and security considerations.
international conference on computational intelligence, modelling and simulation | 2011
Hero Modares; Rosli Salleh; Amirhossein Moravejosharieh
Archive | 2013
Amirhossein Moravejosharieh; Hero Modares; Rosli Salleh; Ehsan Mostajeran
international conference on computational intelligence, modelling and simulation | 2011
Amirhosein Moravejosharieh; Rosli Salleh; Hero Modares