Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Imad Mahgoub is active.

Publication


Featured researches published by Imad Mahgoub.


Archive | 2004

Handbook of Sensor Networks: Compact Wireless and Wired Sensing Systems

Mohammad Ilyas; Imad Mahgoub; Laurie Kelly

We envision that during the next decade the advances in technology will make sensor networks more powerful. Therefore, they will become part of a larger class of networks of embedded systems that have sufficient computing, communication, and energy resources to support distributed applications. The current software architectures and programming models are not suitable for these new computing environments. We present a distributed computing model, Cooperative Computing, and the Smart Messages software architecture for programming large networks of embedded systems. In Cooperative Computing, distributed applications are dynamic collections of migratory execution units, called SmartMessages, working to achieve a common goal. Virtually, any userdefined distributed application can be implemented using ourmodel. To illustrate this flexibility, we describe the implementation, using Smart Messages, of two previously proposed applications for sensor networks, SPIN and Directed Diffusion. The simulation results for these applications together with micro-benchmark results for our prototype implementation demonstrate that Cooperative Computing is a viable solution for programming networks of embedded systems.Title Type handbook of sensor networks compact wireless and wired sensing systems PDF internet networks wired wireless and optical technologies devices circuits and systems PDF cooperative control of distributed autonomous systems with applications to wireless sensor networks PDF implementing 8021x security solutions for wired and wireless networks PDF wireless sensor networks architectures and protocols PDF building wireless sensor networks using arduino PDF fundamentals of wireless sensor networks theory and practice PDF wireless sensor networks exam questions and answers PDF autonomous sensor networks collective sensing strategies for analytical purposes springer series on chemical sensors and biosensors PDF the art of wireless sensor networks volume 1 fundamentals signals and communication technology PDF wireless sensor and robot networks from topology control to communication aspects PDF building wireless sensor networks with zigbee xbee arduino and processing PDF rechargeable sensor networks technology theory and application introduce energy harvesting to sensor networks PDF wireless sensor networks principles design and applications signals and communication technology PDF topology control in wireless sensor networks with a companion simulation tool for teaching and research PDF industrial wireless sensor networks monitoring control and automation woodhead publishing series in electronic and optical materials PDF temperature-and supply voltage-independent time references for wireless sensor networks analog circuits and signal processing PDF industrial wireless sensor networks applications protocols and standards industrial electronics PDF wireless ad hoc and sensor networks protocols performance and control automation and control engineering PDF distributed antenna systems open architecture for future wireless communications wireless networks and mobile communications PDF the future of wireless networks architectures protocols and services wireless networks and mobile communications PDF designing and deploying 80211 wireless networks a practical guide to implementing 80211n and 80211ac wireless networks for enterprise-based applications 2nd edition networking technology PDF wireless sensor networks 11th european conference ewsn 2014 oxford uk february 17-19 2014 proceedings lecture notes in computer science PDF wireless communication networks and systems PDF sensor networks with ieee 802154 systems distributed processing mac and connectivity signals and communication technology PDF distributed sensor networks second edition sensor networking and applications chapman & hallcrc computer and information science series PDF ip-based next-generation wireless networks systems architectures and protocols PDF advances in wireless sensor networks the 8th china conference cwsn 2014 xian china october 31-november 2 2014 revised selected papers communications in computer and information science PDF cognitive radio networks medium access control for coexistence of wireless systems PDF


consumer communications and networking conference | 2010

Stochastic Broadcast for VANET

Michael Slavik; Imad Mahgoub

Vehicular Ad-hoc NETworks (VANETs) are an emerging important type of wireless ad-hoc network. Unlike many other types of MANETs, VANET applications such as traffic data dissemination are inherently broadcast oriented and require communication protocols to be anonymous and scalable. Simple broadcast flooding satisfies these requirements, but its performance is highly dependent on network density and may lead to the broadcast storm problem. This work is the first we are aware of to propose stochastic broadcast as a solution for VANET. Stochastic broadcast instructs nodes to rebroadcast messages according to a retransmit probability. Such a scheme is private since node identification is unnecessary, however it has an undesirable dependency on vehicle density in the same manner as simple flooding. To solve this problem, we demonstrate the link between the mathematical science of continuum percolation and stochastic broadcast. Specifically, that the critical percolation threshold in continuum percolation (≈ 4.5 expected neighbors) translates to the wireless broadcast context. Then we show that nodes can tune the performance of the broadcast system to efficient levels by adjusting the retransmit probability so the apparent density of the network approaches the critical threshold.


IEEE Transactions on Mobile Computing | 2013

Spatial Distribution and Channel Quality Adaptive Protocol for Multihop Wireless Broadcast Routing in VANET

Michael Slavik; Imad Mahgoub

Multihop wireless broadcast is an important component in vehicular networks. Many applications are built on broadcast communications, so efficient routing methods are critical for their success. Here, we develop the Distribution-Adaptive Distance with Channel Quality (DADCQ) protocol to address this need and show that it performs well compared to several existing multihop broadcast proposals. The DADCQ protocol utilizes the distance method to select forwarding nodes. The performance of this method depends heavily on the value of the decision threshold, but it is difficult to choose a value that results in good performance across all scenarios. Node density, spatial distribution pattern, and wireless channel quality all affect the optimal value. Broadcast protocols tailored to vehicular networking must be adaptive to variation in these factors. In this work, we address this design challenge by creating a decision threshold function that is simultaneously adaptive to the number of neighbors, the node clustering factor, and the Rician fading parameter. To calculate the clustering factor, we propose using the quadrat method of spatial analysis. The resulting DADCQ protocol is then verified with JiST/SWANS and shown to achieve high reachability and low bandwidth consumption in urban and highway scenarios with varying node density and fading intensity.


Archive | 2006

Smart dust : sensor network applications, architecture, and design

Imad Mahgoub; Mohammad Ilyas

OPPORTUNITIES AND CHALLENGES IN WIRELESS SENSOR NETWORKS Martin Haenggi Introduction Opportunities Technical Challenges Concluding Remarks NEXT-GENERATION TECHNOLOGIES TO ENABLE SENSOR NETWORKS Joel I. Goodman, Albert I. Reuther and David R. Martinez Introduction Goals for Real-Time Distributed Network Computing for Sensor Data Fusion The Convergence of Networking and Real-Time Computing Middleware Network Resource Management Experimental Results SENSOR NETWORK MANAGEMENT Linnyer Beatrys Ruiz, Jose Marcos Nogueira, and Antonio A.F. Loureiro Introduction Management Challenges Management Dimensions MANNA as an Integrating Architecture Putting It All Together Conclusion MODELS FOR PROGRAMMABILITY IN SENSOR NETWORKS Athanassios Boulis Introduction Differences between Sensor Networks and Traditional Data Networks Aspects of Efficient Sensor Network Applications Need for Sensor Network Programmability Major Models for System-Level Programmability Frameworks for System-Level Programmability Conclusions MINIATURIZING SENSOR NETWORKS WITH MEMS Brett Warneke Introduction MEMS Basics Sensors Communication Micropower Sources Packaging Systems Conclusion SENSOR NETWORK ARCHITECTURE AND APPLICATIONS Chien-Chung Shen, Chaiporn Jaikaeo, and Chavalit Srisathapornphat Introduction Sensor Network Applications Functional Architecture for Sensor Networks Sample Implementation Architectures Summary A PRACTICAL PERSPECTIVE ON WIRELESS SENSOR NETWORKS Quanhong Wang, Hossam Hassanein, and Kenan Xu Introduction WSN Applications Classification of WSNs Characteristics, Technical Challenges, and Design Directions Technical Approaches Conclusions and Considerations for Future Research SENSOR NETWORK ARCHITECTURE Jessica Feng, Farinaz Koushanfar, and Miodrag Potkonjak Overview Motivation and Objectives SNs - Global View and Requirements Individual Components of SN Nodes Sensor Network Node Wireless SNs as Embedded Systems Summary POWER-EFFICIENT TOPOLOGIES FOR WIRELESS SENSOR NETWORKS Ayad Salhieh and Loren Schwiebert Motivation Background Issues for Topology Design Assumptions Analysis of Power Usage Directional Source-Aware Routing Protocol (DSAP) DSAP Analysis Summary OVERVIEW OF COMMUNICATION PROTOCOLS FOR SENSOR NETWORKS Weilian Su, Erdal Cayirci, and Ozgur B. Akan Introduction Applications/Application Layer Protocols Localization Protocols Time Synchronization Protocols Transport Layer Protocols Network Layer Protocols Data Link Layer Protocols Conclusion POSITIONING AND LOCATION TRACKING IN WIRELESS SENSOR NETWORKS Yu-Chee Tseng, Chi-Fu Huang, and Sheng-Po Kuo Introduction Fundamentals Positioning and Location Tracking Algorithms Experimental Location Systems Conclusions COMPARISON OF DATA PROCESSING TECHNIQUES IN SENSOR NETWORKS Vicente Gonzalez-Millan, and Enrique Sanchis-Peris Sensor Networks: Organization and Processing Architectures for Sensor Integration Example of Architecture Evaluation in High-Energy Physics COOPERATIVE COMPUTING IN SENSOR NETWORKS Liviu Iftode, Cristian Borcea, and Porlin Kang Introduction The Cooperative Computing Model Node Architecture Smart Messages Programming Interface Prototype Implementation and Evaluation Applications Simulation Results Related Work Conclusions DYNAMIC POWER MANAGEMENT IN SENSOR NETWORKS Amit Sinha and Anantha Chandrakasan Introduction Idle Power Management Active Power Management System Implementation Results DESIGN CHALLENGES IN ENERGY-EFFICIENT MEDIUM ACCESS CONTROL FOR WIRELESS SENSOR NETWORKS Duminda Dewasurendra and Amitabh Mishra Introduction Unique Characteristics of Wireless Sensor Networks MAC Protocols for Wireless Ad Hoc Networks Design Challenges for Wireless Sensor Networks Medium Access Protocols for Wireless Sensor Networks Open Issues Conclusions SECURITY AND PRIVACY PROTECTION IN WIRELESS SENSOR NETWORKS Sasha Slijepcevic, Jennifer L. Wong and Miodrag Potkonjak Introduction Unique Security Challenges in Sensor Networks and Enabling Mechanisms Security Architectures Privacy Protection Conclusion LOW-POWER DESIGN FOR SMART DUST NETWORKS Zdravko Karakehayov Introduction Location Sensing Computation Hardware-Software Interaction Communication Orientation Conclusion INDEX


Archive | 2006

Sensor network protocols

Imad Mahgoub; Mohammad Ilyas

OPPORTUNITIES AND CHALLENGES IN WIRELESS SENSOR NETWORKS Martin Haenggi Introduction Opportunities Technical Challenges Concluding Remarks NEXT-GENERATION TECHNOLOGIES TO ENABLE SENSOR NETWORKS Joel I. Goodman, Albert I. Reuther and David R. Martinez Introduction Goals for Real-Time Distributed Network Computing for Sensor Data Fusion The Convergence of Networking and Real-Time Computing Middleware Network Resource Management Experimental Results A TAXONOMY OF ROUTING TECHNIQUES IN WIRELESS SENSOR NETWORKS Jamal N. Al-Karaki and Ahmed E. Kamal Introduction Routing Protocols in WSNs Routing in WSNs: Future Directions Conclusions OVERVIEW OF COMMUNICATION PROTOCOLS FOR SENSOR NETWORKS Weilian Su, Erdal Cayirci and Ozgur B. Akan Introduction Applications/Application Layer Protocols Localization Protocols Time Synchronization Protocols Transport Layer Protocols Network Layer Protocols Data Link Layer Protocols Conclusion A COMPARATIVE STUDY OF ENERGY-EFFICIENT (E2) PROTOCOLS FOR WIRELESS SENSOR NETWORKS Quanhong Wang and Hossam Hassanein Introduction Motivations and Directions Cross-Layer Communication Protocol Stack for WSNs Energy-Efficient MAC Protocols Energy-Efficient Network Layer Protocols Concluding Remarks FUNDAMENTAL PROTOCOLS TO GATHER INFORMATION IN WIRELESS SENSOR NETWORKS Jacir L. Bordim and Koji Nakano Introduction Model Definition Gathering Information in Wireless Sensor Networks Identifying Faulty Nodes in Wireless Sensor Networks Conclusions DESIGN CHALLENGES IN ENERGY-EFFICIENT MEDIUM ACCESS CONTROL FOR WIRELESS SENSOR NETWORKS Duminda Dewasurendra and Amitabh Mishra Introduction Unique Characteristics of Wireless Sensor Networks MAC Protocols for Wireless ad hoc Networks Design Challenges for Wireless Sensor Networks Medium Access Protocols for Wireless Sensor Networks Open Issues Conclusions TECHNIQUES TO REDUCE COMMUNICATION AND COMPUTATION ENERGY IN WIRELESS SENSOR NETWORKS Vishnu Swaminathan, Yi Zou and Krishnendu Chakrabarty Introduction Overview of Node-Level Energy Management Overview of Energy-Efficient Communication Node-Level Processor-Oriented Energy Management Node-Level I/O-Device-Oriented Energy Management Energy-Aware Communication Conclusions ENERGY-AWARE ROUTING AND DATA FUNNELING IN SENSOR NETWORKS Rahul C. Shah, Dragan Petrovic and Jan M. Rabaey Introduction Protocol Stack Design Routing Protocol Characteristics and Related Work Routing for Maximizing Lifetime: A Linear Programming Formulation Energy-Aware Routing Simulations Data Funneling Conclusion RELIABILITY ENERGY-CONSTRAINED ROUTING IN SENSOR NETWORKS Alvin S. Lim Introduction Game-Theoretic Models of Reliable and Length Energy-Constrained Routing Distributed Length Energy-Constrained (LEC) Routing Protocol Performance Evaluation LOCALIZED ALGORITHMS FOR SENSOR NETWORKS Jessica Feng, Farinaz Koushanfar and Miodrag Potkonjak Introduction Models and Abstractions Centralized Algorithm Case Studies Analysis Protocols and Distributed Localized Algorithms Pending Challenges INDEX


advanced information networking and applications | 2007

A Hierarchical Key Establishment Scheme forWireless Sensor Networks

Jamil Ibriq; Imad Mahgoub

This paper presents hierarchical key establishment scheme (HIKES) for wireless sensor networks. In this scheme, the base station, acting as the central trust authority, empowers randomly selected sensors to act as local trust authorities authenticating on its behalf the cluster members and issuing all secret keys. HIKES uses a partial key escrow scheme that enables any sensor node selected as a cluster head to generate all the cryptographic keys needed to authenticate other sensors within its cluster. This scheme localizes authentication and key distribution, thereby reducing the communication cost with the base station. HIKES also provides one-step broadcast authentication mechanism and shows robustness against most known routing attacks. Simulation results show that HIKES provides an efficient and scalable solution to the key management problem.


Archive | 2004

Mobile Computing Handbook

Mohammad Ilyas; Imad Mahgoub

INTRODUCTION AND APPLICATIONS OF MOBILE COMPUTING Wearable Computing,A. Smailagic and D.P. Siewiorek Developing Mobile Applications: A Lime Primer,G.P. Picco, A.L. Murphy, and G.-C. Roman Pervasive Application Development: Approaches and Pitfalls,G. Banavar, N. Cohen, and D. Soroker ISAM, Joining Context-Awareness and Mobility to Building Pervasive Applications,I. Augustin, A. Correa Yamin, J.L. Victoria Barbosa, L. Cavalheiro da Silva, R. Araujo Real, G. Frainer, G.G. Honrich Cavalheiro, and C.F. Resin Geyer Integrating Mobile Wireless Devices into the Computational Grid,T. Phan, L. Huang, N. Ruiz, and R. Bagrodia Multimedia Messaging Service, S.A. Ahson LOCATION MANAGEMENT A Scheme for Nomadic Hosts Location Management Using DNS,R.S. Khurana, H. El-Rewini, and I. Mahgoub Location Management Techniques for Mobile Computing Environments,R. Subrata and A.Y. Zomaya Locating Mobile Objects,E. Pitoura, G. Samaras, and G. Kastidou Dependable Message Delivery to Mobile Units,A.L. Murphy, G.-C. Roman, and G. Varghese LOCATION-BASED SERVICES Location-Dependent Query Processing in Mobile Computing, A.Y. Seydim and M. H. Dunham Simulation Models and Tool for Mobile Location-Dependent Information Access, U. Kubach, C. Becker, I. Stepanov, and J. Tian Context-Aware Mobile Computing, Dr. R. Jana and Dr. Y.-F. Chen Mobile Agent Middlewares for Context-Aware Applications, P. Bellavista, D. Bottazzi, A. Corradi, R. Montanari, and S. Vecchi CACHING STRATEGIES Cache Management in Wireless and Mobile Computing Environments. Y. Du and S.K.S. Gupta Cache Invalidation Schemes in Mobile Environments, E. Chan, J.C.H. Yuen, and K.-Y. Lam Hoarding in Mobile Computing Environments, Y. Saygin Power-Aware Cache Management in Mobile Environments, G. Cao Energy Efficient Selective Cache Invalidation, K.-L. Tan MOBILE AND AD HOC WIRELESS NETWORKS I Self-Policing Mobile Ad Hoc Networks, S. Buchegger and J.-Y.s Le Boudec Securing Mobile Ad Hoc Networks, P. Papadimitratos and Z.J. Haas Ad Hoc Network Security, H. Yang, H. Luo, J. Kong, F. Ye, P. Zerfos, S. Lu, and L. Zhang Modeling Distributed Applications for Mobile Ad Hoc Networks Using Attributed Task Graphs, P. Basu, W. Ke, and T.D.C. Little Medium Access Control Mechanisms in Mobile Ad Hoc Networks,C. Yu, B. Lee, S. Kalubandi, and M. Kim MOBILE AND AD HOC WIRELESS NETWORKS II Quality of Service Routing in Mobile Ad Hoc Networks: Past and Future, J.N. Al-Karaki and A.E. Kamal Issues in Scalable Clustered Network Architecture for Mobile Ad Hoc Networks, B. Lee, C. Yu, and S. Moh Routing and Mobility Management in Wireless Ad Hoc Networks, R. Sankar Localized Broadcasting in Mobile Ad Hoc Networks Using Neighbor Designation, W. Lou and J. Wu Energy-Efficient Wireless Networks, I. Cardei and D.-Z. Du POWER MANAGEMENT Power Management for Mobile Computers, T.L. Martin, D.P. Siewiorek, A. Smailagic, and J. Warren Power Awareness and Management Techniques, A. Abukmail and A. (Sumi) Helal Adaptive Algorithmic Power Optimization for Multimedia Workload in Mobile Environments, L. Benini and A. Acquaviva Energy-Aware Web Caching over Hybrid Networks, F. Sailhan and V. Issarny Transmitter Power Control in Wireless Computing, S. Gitzenis and N. Bambos PERFORMANCE AND MODELING A Survey on Mobile Transaction Models, A. Helal, S. Balakrishnan, M. Dunham, and Y. Liu Analytic Mobility Models of PCS Networks, C.-H. Wu Battery Power Management in Portable Devices, V. Sharma and A. Chockalingam SECURITY AND PRIVACY ASPECTS Challenges in Wireless Security: A Case Study of 802.11, N. Borisov Security for Mobile Agents: Issues and Challenges, P. Bellavista, A. Corradi, C. Federici, R. Montanari, and D. Tibaldi Security, Trust, and Privacy in Mobile Computing Environments, L. Kagal, J. Parker, H. Chen, A. Joshi, and T. Finin


international symposium on high-capacity optical networks and enabling technologies | 2008

Bluetooth Security in Wearable Computing Applications

Redjem Bouhenguel; Imad Mahgoub; Mohammad Ilyas

Advances in wireless sensor networking technologies have been extended to wearable computing systems and opened a plethora of applications and opportunities in the development and integration of pervasive Bluetooth Technologies with the abundance of existing specialized technologies in monitoring, data collection, and real-time analysis and reporting. Although the Bluetooth framework is acceptably secure, there are still a number of weaknesses in the Bluetooth technology. The nature of the wireless ad hoc and the device addressing schemes still make the Bluetooth protocol vulnerable to possible attacks and risks. This paper analyzes some of the vulnerabilities of Bluetooth architecture to possible attacks and risks and the best practices and countermeasures needed to thwart these attacks that target Bluetooth devices and their attached networks. It concentrates on Bluetooth technology security issues and challenges that face wireless computing systems.


global communications conference | 2010

Statistical Broadcast Protocol Design for Unreliable Channels in Wireless Ad-Hoc Networks

Michael Slavik; Imad Mahgoub

Broadcast is a critical component in ad-hoc wireless networks. This paper examines the effects that channel unreliability have on the performance of broadcasting protocols. We show that the distance method of statistical broadcast performs poorly under adverse channel conditions. We then describe how to design a version of the distance method that is tolerant of transmission errors by adjusting the statistical variable threshold according to the channel conditions. The resulting protocol is then compared with the Double Covered Broadcast (DCB), a topological protocol designed to handle similar circumstances. The modified distance method protocol is shown to give similar reachability characteristics to DCB while using far less transmissions.


international symposium on multimedia | 2004

Cache optimization for mobile devices running multimedia applications

Abu Asaduzzaman; Imad Mahgoub; Praveen Sanigepalli; Hari Kalva; Ravi Shankar; Borko Furht

The popularity of mobile/wireless embedded systems running multimedia applications is growing. MPEG4 is an important and demanding multimedia application. With improved CPU, memory subsystem deficiency is the major barrier to improving the system performance. Studies show that there is sufficient reuse of values for caching to significantly reduce the raw required memory bandwidth for video data. Decoding MPEG4 video data in software generates many times more cache-memory traffic than required. Proper understanding of the decoding algorithm and the composition of its data set is obvious to improve the performance of such a system. The focus of this paper is to enhance MPEG4 decoding performance through cache optimization of a mobile device. The architecture we simulate includes a digital signal processor (DSP) to run the decoding algorithm and a two-level cache system. Level-1 cache is split into data (D1) and instruction (I1) caches and level-2 (CL2) is a unified cache. We use Cachegrind and VisualSim simulation tools to optimize cache size, line size, associativity, and levels of caches for a wireless device decoding MPEG4 video.

Collaboration


Dive into the Imad Mahgoub's collaboration.

Top Co-Authors

Avatar

Mohammad Ilyas

Florida Atlantic University

View shared research outputs
Top Co-Authors

Avatar

Michael Slavik

Florida Atlantic University

View shared research outputs
Top Co-Authors

Avatar

Ahmed Badi

Florida Atlantic University

View shared research outputs
Top Co-Authors

Avatar

Monika Rathod

Florida Atlantic University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Fadi N. Sibai

United Arab Emirates University

View shared research outputs
Top Co-Authors

Avatar

Jamil Ibriq

Florida Atlantic University

View shared research outputs
Top Co-Authors

Avatar

Elnaz Limouchi

Florida Atlantic University

View shared research outputs
Top Co-Authors

Avatar

Lina Altoaimy

Florida Atlantic University

View shared research outputs
Top Co-Authors

Avatar

Redjem Bouhenguel

Florida Atlantic University

View shared research outputs
Researchain Logo
Decentralizing Knowledge