Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Kamalrulnizam Abu Bakar is active.

Publication


Featured researches published by Kamalrulnizam Abu Bakar.


Sensors | 2012

Multipath Routing in Wireless Sensor Networks: Survey and Research Challenges

Marjan Radi; Behnam Dezfouli; Kamalrulnizam Abu Bakar; Malrey Lee

A wireless sensor network is a large collection of sensor nodes with limited power supply and constrained computational capability. Due to the restricted communication range and high density of sensor nodes, packet forwarding in sensor networks is usually performed through multi-hop data transmission. Therefore, routing in wireless sensor networks has been considered an important field of research over the past decade. Nowadays, multipath routing approach is widely used in wireless sensor networks to improve network performance through efficient utilization of available network resources. Accordingly, the main aim of this survey is to present the concept of the multipath routing approach and its fundamental challenges, as well as the basic motivations for utilizing this technique in wireless sensor networks. In addition, we present a comprehensive taxonomy on the existing multipath routing protocols, which are especially designed for wireless sensor networks. We highlight the primary motivation behind the development of each protocol category and explain the operation of different protocols in detail, with emphasis on their advantages and disadvantages. Furthermore, this paper compares and summarizes the state-of-the-art multipath routing techniques from the network application point of view. Finally, we identify open issues for further research in the development of multipath routing protocols for wireless sensor networks.


2009 Third International Conference on Advanced Engineering Computing and Applications in Sciences | 2009

Distributed Intrusion Detection in Clouds Using Mobile Agents

Amir Vahid Dastjerdi; Kamalrulnizam Abu Bakar; Sayed Gholam Hassan Tabatabaei

Cloud Computing extends an enterprise ability to meet the computing demands of its everyday operations, while offering flexibility, mobility and scalability. However, the reason that Chief Information Officers (CIOs) and their colleagues hesitate to let their business workloads to move from private Cloud into public Cloud is security. This work tries to offer a line of defense by applying Mobile Agents technology to provide intrusion detection for Cloud applications regardless of their locations. Therefore, CIOs feel safer to use Cloud to extend their on-premise infrastructure by adding capacity on demand.


Tsinghua Science & Technology | 2011

Interference-Aware Multipath Routing Protocol for QoS Improvement in Event-Driven Wireless Sensor Networks

Marjan Radi; Behnam Dezfouli; Kamalrulnizam Abu Bakar; Shukor Abd Razak; Mohammad Ali Nematbakhsh

The existing multipath routing protocols for wireless sensor networks demonstrate the efficacy of traffic distribution over multiple paths to fulfill the Quality of Service (QoS) requirements of different applica- tions. However, the performance of these protocols is highly affected by the characteristics of the wireless channel and may be even inferior to the performance of single-path approaches. Specifically, when multiple adjacent paths are being used concurrently, the broadcast nature of wireless channels results in inter-path interference which significantly degrades end-to-end throughput. In this paper, we propose a Low- Interference Energy-efficient Multipath Routing protocol (LIEMRO) to improve the QoS requirements of event-driven applications. In addition, in order to optimize resource utilization over the established paths, LIEMRO employs a quality-based load balancing algorithm to regulate the amount of traffic injected into the paths. The performance gain of LIEMRO compared to the ETX-based single-path routing protocol is 85%, 80%, and 25% in terms of data delivery ratio, end-to-end throughput, and network lifetime, respectively. Fur- thermore, the end-to-end latency is improved more than 60%.


Telecommunication Systems | 2013

A fuzzy logic approach to beaconing for vehicular ad hoc networks

Kayhan Zrar Ghafoor; Kamalrulnizam Abu Bakar; Martijn van Eenennaam; Rashid Hafeez Khokhar; Alberto J. Gonzalez

Vehicular Ad Hoc Network (VANET) is an emerging field of technology that allows vehicles to communicate together in the absence of fixed infrastructure. The basic premise of VANET is that in order for a vehicle detect other vehicles in the vicinity. This cognizance, awareness of other vehicles, can be achieved through beaconing. In the near future, many VANET applications will rely on beaconing to enhance information sharing. Further, the uneven distribution of vehicles, ranging from dense rush hour traffic to sparse late night volumes creates a pressing need for an adaptive beaconing rate control mechanism to enable a compromise between network load and precise awareness between vehicles. To this end, we propose an intelligent Adaptive Beaconing Rate (ABR) approach based on fuzzy logic to control the frequency of beaconing by taking traffic characteristics into consideration. The proposed ABR considers the percentage of vehicles traveling in the same direction, and status of vehicles as inputs of the fuzzy decision making system, in order to tune the beaconing rate according to the vehicular traffic characteristics. To achieve a fair comparison with fixed beaconing schemes, we have implemented ABR approach in JIST/SWANs. Our simulation shows that the proposed ABR approach is able to improve channel load due to beaconing, improve cooperative awareness between vehicles and reduce average packet delay in lossy/lossless urban vehicular scenarios.


international conference on sensor technologies and applications | 2010

LIEMRO: A Low-Interference Energy-Efficient Multipath Routing Protocol for Improving QoS in Event-Based Wireless Sensor Networks

Marjan Radi; Behnam Dezfouli; Shukor Abd Razak; Kamalrulnizam Abu Bakar

In the recent years, multipath routing techniques are recognized as an effective approach to improve QoS in Wireless Sensor Networks (WSNs). However, in most of the previously proposed protocols either the effects of inter-path interference are ignored, or establishing low-interference paths is very costly. In this paper, we propose a Low-Interference Energy-efficient Multipath ROuting protocol (LIEMRO) for WSNs. This protocol is mainly designed to improve packet delivery ratio, lifetime, and latency, through discovering multiple interference-minimized node-disjoint paths between source node and sink node. In addition, LIEMRO includes a load balancing algorithm to distribute source node’s traffic over multiple paths based on the relative quality of each path. Simulation results show that using LIEMRO in high traffic load conditions can increase data reception rate and network lifetime even more than 1.5x compared with single path routing approach, while end-to-end latency reduces significantly. Accordingly, LIEMRO is a multipath solution for event-driven applications in which lifetime, reliability, and latency are of great importance.


Wireless Personal Communications | 2013

Beaconing Approaches in Vehicular Ad Hoc Networks: A Survey

Kayhan Zrar Ghafoor; Jaime Lloret; Kamalrulnizam Abu Bakar; Ali Safa Sadiq; Sofian Ali Ben Mussa

A vehicular ad hoc network (VANET) is a type of wireless ad hoc network that facilitates ubiquitous connectivity between vehicles in the absence of fixed infrastructure. Beaconing approaches is an important research challenge in high mobility vehicular networks with enabling safety applications. In this article, we perform a survey and a comparative study of state-of-the-art adaptive beaconing approaches in VANET, that explores the main advantages and drawbacks behind their design. The survey part of the paper presents a review of existing adaptive beaconing approaches such as adaptive beacon transmission power, beacon rate adaptation, contention window size adjustment and Hybrid adaptation beaconing techniques. The comparative study of the paper compares the representatives of adaptive beaconing approaches in terms of their objective of study, summary of their study, the utilized simulator and the type of vehicular scenario. After implementing the representatives of beaconing approaches, we analysed the simulation results and discussed the strengths and weaknesses of these beaconing approaches with regard to their suitability to vehicular networks. Finally, we discussed the open issues and research directions related to VANET adaptive beaconing approaches.


Wireless Networks | 2013

Intelligent beaconless geographical forwarding for urban vehicular environments

Kayhan Zrar Ghafoor; Kamalrulnizam Abu Bakar; Jaime Lloret; Rashid Hafeez Khokhar; Kevin C. Lee

A Vehicular Ad hoc Network is a type of wireless ad hoc network that facilitates ubiquitous connectivity between vehicles in the absence of fixed infrastructure. Source based geographical routing has been proven to perform well in unstable vehicular networks. However, these routing protocols leverage beacon messages to update the positional information of all direct neighbour nodes. As a result, high channel congestion or problems with outdated neighbour lists may occur. To this end, we propose a street-aware, Intelligent Beaconless (IB) geographical forwarding protocol based on modified 802.11 Request To Send (RTS)/ Clear To Send frames, for urban vehicular networks. That is, at the intersection, each candidate junction node leverage digital road maps as well as distance to destination, power signal strength of the RTS frame and direction routing metrics to determine if it should elect itself as a next relay node. For packet forwarding between Intersections, on the other hand, the candidate node considers the relative direction to the packet carrier node and power signal strength of the RTS frame as routing metrics to elect itself based on intelligently combined metrics. After designing the IB protocol, we implemented it and compared it with standard protocols. The simulation results show that the proposed protocol can improve average delay and successful packet delivery ratio in realistic wireless channel conditions and urban vehicular scenarios.


Journal of Network and Computer Applications | 2015

Modeling low-power wireless communications

Behnam Dezfouli; Marjan Radi; Shukor Abd Razak; Tan Hwee-Pink; Kamalrulnizam Abu Bakar

Low-power wireless communications have particular characteristics that highly affect the performance of network protocols. However, many of these essential characteristics have not been considered in the existing simulation platforms and analytical performance evaluation models. While this issue invalidates many of the reported evaluation results, it also impedes pre-deployment performance prediction and parameter adjustment. Accordingly, this paper studies, analyzes and proposes models for accurate modeling of low-power wireless communications. Our contributions are six-fold. First, we investigate the essential characteristics of low-power wireless transceivers. Second, we present a classified and detailed study on modeling signal propagation, noise floor, system variations and interference. Third, we highlight the importance and effects of system variations and radio regularity on the real applications of wireless sensor networks. Fourth, we reveal the inaccuracy of the packet reception algorithms used in the existing simulators. Furthermore, we propose an improved packet reception algorithm and we confirm its accuracy through comparison with empirical results. Fifth, we propose an architecture to integrate and implement the models presented in this paper. Finally, we show that the transitional region can be employed by the simulators to confine the propagation range and improve simulation scalability. To the best of our knowledge this is the first work that reveals the essentials of accurate modeling and evaluation of low-power wireless communications.


Frontiers of Computer Science in China | 2015

A survey on trust based detection and isolation of malicious nodes in ad-hoc and sensor networks

Adnan Ahmed; Kamalrulnizam Abu Bakar; Muhammad Ibrahim Channa; Khalid Haseeb; Abdul Waheed Khan

Mobile ad-hoc networks (MANETs) and wireless sensor networks (WSNs) have gained remarkable appreciation and technological development over the last few years. Despite ease of deployment, tremendous applications and significant advantages, security has always been a challenging issue due to the nature of environments in which nodes operate. Nodes’ physical capture, malicious or selfish behavior cannot be detected by traditional security schemes. Trust and reputation based approaches have gained global recognition in providing additional means of security for decision making in sensor and ad-hoc networks. This paper provides an extensive literature review of trust and reputation based models both in sensor and ad-hoc networks. Based on the mechanism of trust establishment, we categorize the state-of-the-art into two groups namely node-centric trust models and system-centric trust models. Based on trust evidence, initialization, computation, propagation and weight assignments, we evaluate the efficacy of the existing schemes. Finally, we conclude our discussion with identification of some unresolved issues in pursuit of trust and reputation management.


Mobile Networks and Applications | 2013

An Intelligent Vertical Handover Scheme for Audio and Video Streaming in Heterogeneous Vehicular Networks

Ali Safa Sadiq; Kamalrulnizam Abu Bakar; Kayhan Zrar Ghafoor; Jaime Lloret; Rashid Hafeez Khokhar

In heterogeneous vehicular networks, the most challenging issue is obtaining an efficient vertical handover during the vehicle roaming process. Efficient network selection process can achieve satisfactory Quality-of-Service for ongoing applications. In this paper, we propose an Intelligent Network Selection (INS) scheme based on maximization scoring function to efficiently rank available wireless network candidates. Three input parameters were utilized to develop a maximization scoring function that collected data from each network candidate during the selection process. These parameters are: Faded Signal-to-Noise Ratio, Residual Channel Capacity, and Connection Life Time. The results show that the proposed INS scheme is more efficient at decreasing handover delays, End-to-End delays for VoIP and Video applications, packet loss ratios as well as increasing the efficiency of network selection processes in comparison with the state of the arts.

Collaboration


Dive into the Kamalrulnizam Abu Bakar's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Abdul Hanan Abdullah

Universiti Teknologi Malaysia

View shared research outputs
Top Co-Authors

Avatar

Tasneem Darwish

Universiti Teknologi Malaysia

View shared research outputs
Top Co-Authors

Avatar

Adnan Ahmed

Quaid-e-Awam University of Engineering

View shared research outputs
Top Co-Authors

Avatar

Behnam Dezfouli

Universiti Teknologi Malaysia

View shared research outputs
Top Co-Authors

Avatar

Khalid Haseeb

Universiti Teknologi Malaysia

View shared research outputs
Top Co-Authors

Avatar

Marjan Radi

Universiti Teknologi Malaysia

View shared research outputs
Top Co-Authors

Avatar

Shukor Abd Razak

Universiti Teknologi Malaysia

View shared research outputs
Top Co-Authors

Avatar

Aboamama Atahar Ahmed

Universiti Teknologi Malaysia

View shared research outputs
Top Co-Authors

Avatar

Ali Safa Sadiq

Universiti Malaysia Pahang

View shared research outputs
Researchain Logo
Decentralizing Knowledge