Mahmoud Khasawneh
Concordia University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Mahmoud Khasawneh.
international conference on computer science and information technology | 2014
Mahmoud Khasawneh; Anjali Agarwal
Cognitive radio (CR) has been introduced to accommodate the steady increment in the spectrum demand. In CR networks, unlicensed users, which are referred to as secondary users (SUs), are allowed to dynamically access the frequency bands when licensed users which are referred to as primary users (PUs) are inactive. One important technical area that has received little attention to date in the cognitive radio system is wireless security. New classes of security threats and challenges have been introduced in the cognitive radio systems, and providing strong security may prove to be the most difficult aspect of making cognitive radio a long-term commercially-viable concept. This paper addresses the main challenges, security attacks and their mitigation techniques in cognitive radio networks. The attacks showed are organized based on the protocol layer that an attack is operating on.
broadband and wireless computing, communication and applications | 2012
Saed Alrabaee; Anjali Agarwal; Nishith Goel; Marzia Zaman; Mahmoud Khasawneh
Traditionally in routing approaches, each node allows a maximum load through the selected route. The existing routing approaches in cognitive radio networks (CRN) do not take into account spectrum trading as well as spectrum competition among licensed users (PUs). This paper introduces a novel routing algorithm that is based on spectrum trading and spectrum competition for cognitive radio networks while supporting different QoS levels for unlicensed users (SUs). The proposed path selection algorithm among different paths is based on user profiles which contain parameters such as SU identification, number of hops, channel identification, neighbor identification, probabilities of idle slots and PU presence. Each node shares its profile with the neighbor PU, which then exchanges its profile with other PUs and decides based on the information received. In spectrum trading phase a PU calculates its price based on the SU requirements. In spectrum competition phase a new coefficient α is defined that controls the price because of competition among PUs and depends on many factors such as the number of primary users, available channels, and duration of the usage. All possible paths are managed and categorized based on the level of QoS requested by SUs and the price offered by the PU.
International Conference on Security in Computer Networks and Distributed Systems | 2014
Mahmoud Khasawneh; Izadeen Kajman; Rashed Alkhudaidy; Anwar Althubyani
Wireless Network (Wi-Fi) becomes extremely popular over the world on the lastly two decades. Nowadays, most people are using the wireless networks for online banking and shopping. It also allows people to share information and communicate with each other whenever and wherever they are. Moreover, it has the advantages of flexibility and freedom of mobility and enables smart phones and laptops to provide a rapid and easy access to information. All of that makes the protection of the wireless network highly demanded to be existed. Therefore, security should be applied on Wi-Fi networks to keep users’ confidentiality and privacy. Hence, different protocols have been developed and applied. Nowadays, Wi-Fi Protected Access (WPA, and WPA2) protocols are considered as the most applied protocols in wireless networks over the world. In this paper, we discuss the advantages, vulnerability, and the weaknesses of both of these protocols. This paper ends up with some suggestions on how to improve the functionality of these protocols.
global communications conference | 2012
Saed Alrabaee; Mahmoud Khasawneh; Anjali Agarwal; Nishith Goel; Marzia Zaman
The dynamic behavior for spectrum management in cognitive radio networks is considered in this paper, which consists of spectrum trading and spectrum competition among multiple spectrum owners and spectrum leasers. The primary users adjust their behaviors in renting the spectrum to secondary users in order to achieve higher profits. The secondary users adjust the spectrum renting by observing the changes in the price and the quality of the spectrum. It is however problematic when the primary users and secondary users make the decisions dynamically. A three layer game theoretic approach is introduced in this paper to address this problem. The upper layer models the spectrum competition among primary users; a Bertrand game is formulated where the Nash equilibrium is considered as the solution. The middle layer models the spectrum trading between the primary user and secondary user; a Stackelberg game is formulated where the Nash equilibrium is considered as the solution. The lower layer models the dynamic selection strategies among secondary users in order to select the offered spectrum; an evolutionary game is formulated where the Nash equilibrium is the solution. Basically, the solution in each game is found in terms of the size of the offered spectrum to the secondary users and the spectrum price. The proposed game theory model is used to examine network dynamics under different levels of QoS where the actions of each user are made dynamically.
broadband and wireless computing, communication and applications | 2012
Saed Alrabaee; Anjali Agarwal; Nishith Goel; Marzia Zaman; Mahmoud Khasawneh
In this paper, we have introduced two models for spectrum management (spectrum trading and spectrum competition) in cognitive radio network. The first model is without game theory and the second one is with game theory. The first model for spectrum management without game theory, called SMWG, which has been designed to provide an efficient and dynamic equations to enhance the network performance. SMWG provides a novel function, called QoS function, to support three levels of QoS. In addition, it provides a novel factor, called Competition Factor, to control the behaviors among spectrum owners (primary users). In the second model, we have applied the game theory concept into spectrum management (SMG) to compare the network performance in both cases (SMWG and SMG). SMG provides two games, the first one is to model the dynamic behavior of spectrum competition among primary users, a Bertrand game is formulated where the Nash equilibrium is considered as the solution. The second game is to model the spectrum trading between the primary user and the secondary user, a Stackelberg game is formulated where the Nash equilibrium is again considered as the solution. Basically, the solution is found in terms of the size of the offered spectrum to the secondary users with regards to the offered spectrum price. We compare SMWG with conventional scheme, also compare SMG with conventional scheme, and finally compare SMWG with SMG in terms of network performance.
Procedia Computer Science | 2016
Mahmoud Khasawneh; Anjali Agarwal
Abstract Cognitive radio (CR) is introduced to accommodate the steady increment in the spectrum demand. Spectrum sensing is used to detect the unexploited sub-bands in the radio environment. In order to improve the accuracy of the spectrum sensing, the cooperative spectrum sensing method is assumed to be the best method to be used. However, misbehaving sensing nodes might falsify the spectrum sensing data to prevent legitimate nodes from utilizing the spectrum. Hence, wireless security has become an important issue in cognitive radio networks to ensure a reliable spectrum sensing and a fair resource allocation and management. A node misbehaves during the spectrum sensing phase by sending false sensing data to other cooperative sensing nodes. In this paper we propose a novel collaborative approach during spectrum sensing phase to monitor sensing nodes’ behavior and identify the misbehaving sensing nodes. The proposed approach measures the nodes reliability through a value called belief level (BL). The clustering method is used to divide all the sensing nodes in a specific number of clusters. Each cluster has a cluster head (CH) which is responsible for collecting sensing reports from different cognitive nodes in the same cluster about each other and identifying the misbehaving sensing nodes. Simulation results show the added value and the effectiveness of the proposed approach.
advances in computing and communications | 2012
Saed Alrabaee; Anjali Agarwal; Nishith Goel; Marzia Zaman; Mahmoud Khasawneh
Cognitive radio networks are smart networks that automatically sense the channel and adjust the network parameters accordingly. Cognitive radio is an emerging technology that enables the dynamic deployment of highly adaptive radios that are built upon software defined radio technology. The radio technology allows the unlicensed operation to be in the licensed band. The cognitive radio network paradigm therefore raises many technical challenges that appear in different layers, such as the power efficiency, spectrum management, spectrum detection, environment awareness, and distributed spectrum measurements in the physical layer, the route selection as well as the route robustness in the network layer, and the security issues like the unauthorized intrusion and malicious users in the application layer. In this paper we aim at presenting an overview of research issues especially in network and application layers as well as the proposed solutions for them.
IEEE Access | 2017
Mahmoud Khasawneh; Anjali Agarwal
Cognitive radio (CR) has been introduced to accommodate the steady increment in the spectrum demand. Wireless security in CR network (CRN) is a challenging technical area due to the dynamic and unique characteristics of CRNs. As a cognitive node can dynamically join or leave the spectrum, providing secure communication becomes problematic and requires more investigation. Authentication is a primary security property in wireless networks, wherein the identity of a cognitive node is verified before providing access to available resources. In this paper, a two-level authentication scheme for communication in a CRN is proposed. Before joining the network, a CR node is validated by obtaining security credentials from an authorized point. The proposed scheme relies on public- and symmetric-key cryptography, instead of using a digital signature-based approach. It encrypts data between the communicating nodes in order to improve network security in terms of resource availability and accessibility. This mitigates attacks such as reflection attack, denial of service attack, and man-in-the-middle attack. The scheme has been evaluated and verified in terms of security functionality, its correctness, and the performance, which shows less computation and communication requirements.
international conference on computer science and information technology | 2014
Noman Saleem; Saed Alrabaee; Fawaz Ali Khasawneh; Mahmoud Khasawneh
Participatory Sensing Application is new emerging computing paradigm that uses the data collected by the participants via mobile devices and active sensors. It gives an opportunity with the help of increasing number of mobile users to share information acquired by their sensor equipped devices. However, security and privacy are the major concerns in the success of these applications. While several security implementation techniques have discussed by the research community, one of them is Homomorphic encryption that allows aggregating encrypted values and the result would be same as unencrypted data. In this paper, we simulate the aggregation function using homomorphic encryption in participating sensing application.
international conference on ultra modern telecommunications | 2012
Saed Alrabaee; Anjali Agarwal; Nishith Goel; Marzia Zaman; Mahmoud Khasawneh
In this paper, we propose cognitive radio network models for providing spectrum management which includes spectrum trading and spectrum competition. The models described are with and without using the concepts of game theory. For both the models, the spectrum trading that occurs between the primary user and the secondary user is considered first, and then the spectrum competition among the primary users is considered. Our model includes multiple levels of QoS for different secondary users. In the first phase, the secondary user selects the spectrum by observing the changes in the price and the level of QoS offered by different primary users. In the second phase, the primary user controls its strategy in renting the spectrum to secondary users to achieve the highest utility. To model the dynamic behavior of spectrum competition among primary users, a Bertrand game is formulated where the Nash equilibrium is considered as the solution. Moreover, to model the spectrum trading between the primary user and the secondary user, a Stackelberg game is formulated where the Nash equilibrium is again considered as the solution. Basically the solution is in terms of the size of offered spectrum to the secondary users and the offered spectrum price.