Isaac Woungang
Ryerson University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Isaac Woungang.
Archive | 2009
Sudip Misra; Isaac Woungang; Subhas Chandra Misra
Wireless communication technologies continue to undergo rapid advancement. In recent years, there has been a steep growth in research in the area of wireless sensor networks (WSNs). In WSNs, communication takes place with the help of spatially distributed, autonomous sensor nodes equipped to sense specific information. WSNs can be found in a variety of both military and civilian applications worldwide. Examples include detecting enemy intrusion on the battlefield, object tracking, habitat monitoring, patient monitoring and fire detection. Sensor networks are emerging as an attractive technology with great promise for the future. However, challenges remain to be addressed in issues relating to coverage and deployment, scalability, quality-of-service, size, computational power, energy efficiency and security. This highly useful guide presents a comprehensive account of the fundamental concepts, new ideas and results in the field of WSNs.
Archive | 2009
Sudip Misra; Isaac Woungang; Subhas Chandra Misra
Wireless ad-hoc network communication technologies have experienced a steep growth in research and significant advancements in recent times due to their important advantages. These benefits help to set-up a network fast in situations where there is no existing network set-up, or when setting up a fixed infrastructure network is considered infeasible. However, there are challenges that still need to be addressed. This indispensable guidebook provides a comprehensive resource on the new ideas and results in the areas of mobile ad-hoc networks and other ad-hoc computing systems in the wireless communication technology field. Wireless ad-hoc networks are explored by leading experts in the field from both academia and industry, with discussions on various challenges in varied environments, standards, routing mechanisms, etc. This reader-friendly, broad-ranging text features in-depth descriptions of terminologies and concepts related to the diverse subject areas germane to wireless ad hoc communication. Features: Provides an accessible, comprehensive overview of the state-of-the-art technology of wireless ad-hoc networks Includes reader-friendly discussions for practitioners, directions for future research, and helpful lists of terms and definitions Offers a set of summary questions at the end of each chapter to help readers assess their understanding of the various concepts Presents insight into the practical significance of these topics in real-world scenarios Designed, in structure and content, to aid the learning process with the intension of making the book useful at all learning levels Supplies supportive PowerPoint presentation slides and solutions to aid lecturers at www.springer.com/978-1-84800-327-9 This wide-ranging and highly useful guide will be a valuable reference/text in the field for researchers, engineers and strategists needing to know about this technology. It is also an ideal textbook for graduate students wishing to learn more about the topic. Key Topics: Routing Mobility Management Quality of Service Support Congestion Control Security Trust Management
Computer Communications | 2011
Mieso K. Denko; Tao Sun; Isaac Woungang
Designing a trust management scheme that can effectively evaluate the relationships among devices in pervasive computing environments is a challenging task. This paper continues the investigation of our recently proposed probabilistic trust management scheme for pervasive computing environments. We argue that in addition to allowing a device to find other appropriate devices with which to interact, while detecting those that are malicious, our trust management scheme is also capable of (1) allowing a device to judge the trustworthiness of another device it interacts with, while making a better use of the received recommendations and (2) behaving as expected when a device has little or enough experience of interactions with other devices and changes dynamically occur in the proportion of malicious devices. Simulation experiments are provided to assess the achievement of the stated goals, using some representative performance metrics.
IEEE Systems Journal | 2015
Jian Ming Chang; Po Chun Tsou; Isaac Woungang; Han-Chieh Chao; Chin-Feng Lai
In mobile ad hoc networks (MANETs), a primary requirement for the establishment of communication among nodes is that nodes should cooperate with each other. In the presence of malevolent nodes, this requirement may lead to serious security concerns; for instance, such nodes may disrupt the routing process. In this context, preventing or detecting malicious nodes launching grayhole or collaborative blackhole attacks is a challenge. This paper attempts to resolve this issue by designing a dynamic source routing (DSR)-based routing mechanism, which is referred to as the cooperative bait detection scheme (CBDS), that integrates the advantages of both proactive and reactive defense architectures. Our CBDS method implements a reverse tracing technique to help in achieving the stated goal. Simulation results are provided, showing that in the presence of malicious-node attacks, the CBDS outperforms the DSR, 2ACK, and best-effort fault-tolerant routing (BFTR) protocols (chosen as benchmarks) in terms of packet delivery ratio and routing overhead (chosen as performance metrics).
Archive | 2013
Isaac Woungang; Sanjay Kumar Dhurandher; Alagan Anpalagan; Athanasios V. Vasilakos
Routing in Opportunistic Networks focuses on the basics of opportunistic networks, modeling and communication in opportunistic networks, routing in opportunistic networks, and collaboration and cooperation in opportunistic networks. The editors will cover such topics as mobility characterization and discovery in opportunistic networks, scheduling and medium access control in opportunistic networks as well as testbed, tools, and measurements for opportunistic networks.
Archive | 2008
Sudip Misra; Subhas Chandra Misra; Isaac Woungang
Wireless communication technologies continue to undergo rapid advancement. The attractiveness of Wireless Mesh Networks (WMN)s, in general, can be attributed to their characteristics: the ability to dynamically self-organize and self-configure, coupled with the ability to maintain mesh connectivity, leads in effect to low set-up/installation costs, simpler maintenance tasks, and service coverage with high reliability and fault-tolerance. As a result, WMNs have found many useful applications in a broad range of domains. WMNs represent a key technology for future generation wireless networks, and this broad-ranging and comprehensive guidebook presents new ideas and results from research to address the challenges ahead. This unique resource describes all the fundamental key topics and covers both the important core and specialized issues in the field. Each chapter is written by topical area experts, with the first chapters devoted to the basics of WMNs and subsequent ones dealing with some of the more specialist topics, such as the WiMAX metro area mesh networks and the symbiosis of cognitive radio with WMNs. Features: Provides an accessible, comprehensive overview of the state-of-the-art technology of Wireless Mesh Networks Includes reader-friendly discussions for practitioners, directions for future research, helpful lists of terms and definitions, and summary questions within in each chapter Offers a set of questions to help readers assess their understanding of the various concepts at the end of each chapter Presents insight into the practical significance of these topics in real-world scenarios Designed, in structure and content, to aid the learning process with the intension of making the book useful at all learning levels Supplies supportive presentation PowerPoint slides and solutions to aid lecturers at www.springer.com/978-1-84800-908-0 With contributions by some of the most prominent researchers in the field today, this book will be an invaluable reference/text to WMNs for researchers and practitioners. In addition, its pedagogical tools can make it eminently suitable as a textbook for graduate students wishing to learn more about the topic. Key Topics: WMNs and MANETs Medium Access Routing and Channel Assignment Routing Metrics Congestion and Transport Layer Issues Multi-network Convergence and Scalability Mobility
international conference on computer information and telecommunication systems | 2013
Marcelo Luiz Brocardo; Issa Traore; Sherif Saad; Isaac Woungang
Authorship verification can be checked using stylometric techniques through the analysis of linguistic styles and writing characteristics of the authors. Stylometry is a behavioral feature that a person exhibits during writing and can be extracted and used potentially to check the identity of the author of online documents. Although stylometric techniques can achieve high accuracy rates for long documents, it is still challenging to identify an author for short documents, in particular when dealing with large authors populations. These hurdles must be addressed for stylometry to be usable in checking authorship of online messages such as emails, text messages, or twitter feeds. In this paper, we pose some steps toward achieving that goal by proposing a supervised learning technique combined with n-gram analysis for authorship verification in short texts. Experimental evaluation based on the Enron email dataset involving 87 authors yields very promising results consisting of an Equal Error Rate (EER) of 14.35% for message blocks of 500 characters.
advanced information networking and applications | 2013
Sanjay Kumar Dhurandher; Deepak Kumar Sharma; Isaac Woungang; Shruti Bhati
In Opportunistic Networks (OppNets), the existence of an end-to-end connected path between the sender and the receiver is not possible. Thus routing in this type of networks is different from the traditional Mobile Adhoc Networks (MANETs). MANETs assume the existence of a fixed route between the sender and the receiver before the start of the communication and till its completion. Routes are constructed dynamically as the source node or an intermediate node can choose any node as next hop from a group of neighbors assuming that it will take the message closer to the destination node or deliver to the destination itself. In this paper, we proposed a novel History Based Prediction Routing (HBPR) protocol for infrastructure-less OppNets which utilizes the behavioral information of the nodes to find the best next node for routing. The proposed protocol was compared with the Epidemic routing protocol. Through simulations it was found that the HBPR performs better in terms of number of messages delivered and the overhead ratio than the Epidemic protocol.
IEEE Systems Journal | 2013
Bassam Sayed; Issa Traore; Isaac Woungang; Mohammad S. Obaidat
The mouse dynamics biometric is a behavioral biometric technology that extracts and analyzes the movement characteristics of the mouse input device when a computer user interacts with a graphical user interface for identification purposes. Most of the existing studies on mouse dynamics analysis have targeted primarily continuous authentication or user reauthentication for which promising results have been achieved. Static authentication (at login time) using mouse dynamics, however, appears to face some challenges due to the limited amount of data that can reasonably be captured during such a process. In this paper, we present a new mouse dynamics analysis framework that uses mouse gesture dynamics for static authentication. The captured gestures are analyzed using a learning vector quantization neural network classifier. We conduct an experimental evaluation of our framework with 39 users, in which we achieve a false acceptance ratio of 5.26% and a false rejection ratio of 4.59% when four gestures were combined, with a test session length of 26.9 s. This is an improvement both in the accuracy and validation sample, compared to the existing mouse dynamics approaches that could be considered adequate for static authentication. Furthermore, to our knowledge, our work is the first to present a relatively accurate static authentication scheme based on mouse gesture dynamics.
2012 Fourth International Conference on Digital Home | 2012
Issa Traore; Isaac Woungang; Mohammad S. Obaidat; Youssef Nakkabi; Iris Lai
Existing risk-based authentication systems rely on basic web communication information such as the source IP address or the velocity of transactions performed by a specific account, or originating from a certain IP address. Such information can easily be spoofed, and as such, put in question the robustness and reliability of the proposed systems. In this paper, we propose a new online risk-based authentication system that provides more robust user identity information by combining mouse dynamics and keystroke dynamics biometrics in a multimodal framework. Experimental evaluation of our proposed model with 24 participants yields an Equal Error Rate of 8.21%, which is promising considering that we are dealing with free text and free mouse movements, and the fact that many web sessions tend to be very short.