Imane Aly Saroit
Cairo University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Imane Aly Saroit.
Procedia Computer Science | 2011
Ahmed Mohamed Abdalla; Imane Aly Saroit; Amira Kotb; Ali Hassan Afsari
Abstract Intrusion Detection Systems (IDS) in Mobile Ad hoc Networks (MANETs) are required to develop a strong security scheme it is therefore necessary to understand how malicious nodes can attack the MANETs. Focusing on the Optimized Link State Routing (OLSR) protocol, an IDS mechanism to accurately detect and isolate misbehavior node(s) in OLSR protocol based on End-to-End (E2E) communication between the source and the destination is proposed. The collaboration of a group of neighbor nodes is used to make accurate decisions. Creating and broadcasting attackers list to neighbor nodes enables other node to isolate misbehavior nodes by eliminating them from the routing table. Eliminating misbehavior node allows the source to select another trusted path to its destination. The simulation results show that the proposed mechanism is able to detect any number of attackers while keeping a reasonably low overhead in terms of network traffic.
International Journal of Communication Systems | 2014
Ahmed Abdel Moamen; Haitham S. Hamza; Imane Aly Saroit
A mobile ad-hoc network MANET is a collection of autonomous nodes that communicate with each other by forming a multi-hop radio network. Routing protocols in MANETs define how routes between source and destination nodes are established and maintained. Multicast routing provides a bandwidth-efficient means for supporting group-oriented applications. The increasing demand for such applications coupled with the inherent characteristics of MANETs e.g., lack of infrastructure and node mobility have made secure multicast routing a crucial yet challenging issue. Recently, several multicast routing protocols MRP have been proposed in MANETs. Depending on whether security is built-in or added, MRP can be classified into two types: secure and security-enhanced routing protocols, respectively. This paper presents a survey on secure and security-enhanced MRP along with their security techniques and the types of attacks they can confront. A detailed comparison for the capability of the various routing protocols against some known attacks is also presented and analyzed. Copyright
Computer Communications | 2017
Shaimaa M. Mohamed; Haitham S. Hamza; Imane Aly Saroit
A mobile wireless sensor network (M-WSN) consists of sensors equipped with locomotive platforms to allow movement after initial deployment. M-WSNs are useful for environments that are difficult and/or dangerous for sensor deployment. A key challenge in sensor networks deployment is to ensure that deployed sensors provide the required coverage for the area of interest, while ensuring connectivity of the deployed network. Sensor coverage and connectivity problems were investigated thoroughly in the literature for various types of WSNs, and several techniques were proposed with various capability and limitations. This paper attempts to provide a comprehensive classification and categorization for the various techniques and algorithms used in M-WSNs for enhancing coverage after initial deployment, and for maintaining coverage after node failure. We present a mathematical formulation for each coverage type, and survey and analyze approaches proposed in the literature to maintain coverage in each type in the context of M-WSN.
wireless and mobile computing, networking and communications | 2015
Zaher Haddad; Mohamed M. E. A. Mahmoud; Sanaa Taha; Imane Aly Saroit
In smart grid Automatic Metering Infrastructure (AMI) networks, smart meters should send consumption data to the utility company (UC) for grid state estimation. Creating a new infrastructure to support this communication is costly and may take long time which may delay the deployment of the AMI networks. The Long Term Evolution-Advanced (LTE-A) networks can be used to support the communications between the AMI networks and the UC. However, since these networks are owned and operated by private companies, the UC cannot ensure the security and privacy of the communications. Moreover, the data sent by the AMI networks have different characteristics and requirements than most of the existing applications in LTE-A networks. For example, there is a strict data delay requirement, data is short and transmitted every short time, data is sent at known/predefined time slots, and there is no handover. In this paper, we study enabling secure and privacy preserving AMI-UC communications via LTE-A networks. The proposed scheme aims to achieve essential security requirements such as authentication, confidentiality, key agreement and data integrity without trusting the LTE-A networks. Furthermore, an aggregation scheme is used to protect the privacy of the electricity consumers. It can also reduce the amount of required bandwidth which can reduce the communication cost. Our evaluations have demonstrated that our proposals are secure and require low communication/computational overhead.
International Journal of Advanced Computer Science and Applications | 2013
Ahmed Mohamed Abdalla; Ahmad H. Almazeed; Imane Aly Saroit; Amira Kotb
Several approaches have been proposed for Intrusion Detection Systems (IDS) in Mobile Ad hoc Networks (MANETs). Due to lack of MANETs infrastructure and well defined perimeter MANETs are susceptible to a variety of attacker types. To develop a strong security mechanism it is necessary to understand how malicious nodes can attack the MANETs. A new IDS mechanism is presented based on End-to-End connection for securing Optimized Link State Routing (OLSR) routing protocol. This new mechanism is named as Detection and Isolation Packet Dropped Attackers in MANETs (DIPDAM). DIPDAM mechanism based on three ID messages Path Validation Message (PVM) , Attacker Finder Message (AFM) and Attacker Isolation Message (AIM). DIPDAM mechanism based on End-to-End (E2E) communication between the source and the destination is proposed. The simulation results showed that the proposed mechanism is able to detect any number of attackers while keeping a reasonably low overhead in terms of network traffic.
wireless communications and networking conference | 2016
Zaher Haddad; Mohamed M. E. A. Mahmoud; Imane Aly Saroit; Sanaa Taha
In this paper, we propose a secure and efficient handover scheme for the Long Term Evolution-Advanced (LTE-A) networks. The proposed scheme does not trust the basestations because they may be accessible to attackers and operated by subscribers, rather than service providers. First, we propose a registration procedure to enable the base-stations to authenticate and register with the Home Subscriber Server (HSS). Then, we propose a procedure to enable the user equipment (UEs) to authenticate and exchange keys with the Mobility Management Entity (MME) and base-stations. Finally, we propose a secure and fast handover procedure. To reduce the handover latency, the HSS is not involved and the computation overhead on the UEs is very low. The proposed scheme is uniform in the sense that one procedure can be used for all handover scenarios. Our security analysis demonstrates that the proposed scheme can thwart well-known attacks such as impersonation, man in the middle, packet replay, etc. The proposed key agreement procedures can achieve backward/forward secrecy, where attackers cannot derive the past or future session keys. Our performance evaluation results demonstrate that the proposed handover scheme is fast because it needs few computations and exchanges few number of packets. This is important to improve the quality of service, avoid call termination, and service disruption. Moreover, the proposed scheme imposes minimal overhead on the mobile nodes, which is very desirable because these nodes usually have low computational power and energy.
modeling and optimization in mobile, ad-hoc and wireless networks | 2014
Shaimaa M. Mohamed; Haitham S. Hamza; Imane Aly Saroit
Dynamic deployment aims at enhancing coverage in wireless sensor networks by redistributing sensor nodes after initial random deployment. In this paper, a harmony search based dynamic deployment (HS-DD) technique is proposed that aims at maximizing both network coverage and connectivity. Furthermore, the performance of the proposed algorithm and a number of the HS-variants in dynamic deployment is studied; namely: Harmony Search-Dynamic Deployment (HS-DD), Improved HS-Dynamic Deployment (IHS-DD), Global HS-Dynamic Deployment (GHS-DD), Differential HS-Dynamic Deployment (DHS-DD) and Self adaptive HS-Dynamic Deployment (SaHS-DH). Simulation results show that GHS-DD achieves the best coverage improvement with the minimum moving distance, while SaHS-DD provides better connectivity with reasonable coverage improvement for dense networks.
international conference on computer technology and development | 2010
Ahmed Mohamed Abdalla; Imane Aly Saroit; Amira Kotb; Ali Hassan Afsari
Several approaches have been proposed for Intrusion Detection Systems (IDS) in Mobile Ad hoc Networks (MANETs). Due to lack of MANETs infrastructure and well defined perimeter MANETs are susceptible to a variety of attacker types. To develop a strong security scheme it is necessary to understand how malicious nodes can attack the MANETs. Focusing on the Optimized Link State Routing (OLSR) protocol an IDS mechanism to accurately detect misbehavior node(s) in OLSR protocol based on End-to-End (E2E) communication between the source and the destination is proposed. The simulation results showed that the proposed mechanism is able to detect any number of attackers while keeping a reasonably low overhead in terms of network traffic.
international conference on sciences of electronics technologies of information and telecommunications | 2012
Yousef Sabbah; Imane Aly Saroit; Amira Kotb
This paper presents a theoretical model for summative e-assessment in distance learning for the future, where exams can be conducted distantly, e.g. at home. This model aims to provide e-learning systems with an authentication approach that guarantees cheating-free summative e-assessment. It utilizes a combination of live video monitoring and a bimodal biometrics approach. Together they form a robust and highly secure model to ensure that the examinee is the correct person throughout the e-assessment period without a need for a proctor. Advanced techniques of image and video processing and feature extraction are required to implement this model.
international conference on information technology: new generations | 2011
Wafaa Saber Hamed; Haitham S. Hamza; Imane Aly Saroit
M-commerce has become one of the most evolutionary fields not only in the developed countries but also in the developing countries. It facilitates transactional procedures using mobile devices that are being enhanced rapidly to become simpler and more secured. Currently users can make any monetary transaction such as booking tickets or buying goods online anywhere anytime. One of the most challenging concerns in developing m-commerce systems and applications is trustworthiness, because trust is very hard to gain and very easy to lose. Trust is a fuzzy concept as it is defined differently in each discipline even within each, its perceived in a subjective way. A key step to incorporate trust in m-commerce is to acquire an in-depth understanding of the trustworthiness. This paper presents an attempt to develop a unified trust model for m-commerce. To achieve unification and abstraction, the proposed unified trust model for m-commerce separates changeable and endurable aspects of trustiness. In addition, the proposed model is validated through the demonstration of how existing trust models are embedded within the proposed unified model.