Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Mohamed F. Younis is active.

Publication


Featured researches published by Mohamed F. Younis.


ad hoc networks | 2005

A SURVEY ON ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORKS

Kemal Akkaya; Mohamed F. Younis

Recent advances in wireless sensor networks have led to many new protocols specifically designed for sensor networks where energy awareness is an essential consideration. Most of the attention, however, has been given to the routing protocols since they might differ depending on the application and network architecture. This paper surveys recent routing protocols for sensor networks and presents a classification for the various approaches pursued. The three main categories explored in this paper are data-centric, hierarchical and location-based. Each routing protocol is described and discussed under the appropriate category. Moreover, protocols using contemporary methodologies such as network flow and quality of service modeling are also discussed. The paper concludes with open research issues. � 2003 Elsevier B.V. All rights reserved.


Computer Communications | 2007

A survey on clustering algorithms for wireless sensor networks

Ameer Ahmed Abbasi; Mohamed F. Younis

The past few years have witnessed increased interest in the potential use of wireless sensor networks (WSNs) in applications such as disaster management, combat field reconnaissance, border protection and security surveillance. Sensors in these applications are expected to be remotely deployed in large numbers and to operate autonomously in unattended environments. To support scalability, nodes are often grouped into disjoint and mostly non-overlapping clusters. In this paper, we present a taxonomy and general classification of published clustering schemes. We survey different clustering algorithms for WSNs; highlighting their objectives, features, complexity, etc. We also compare of these clustering algorithms based on metrics such as convergence rate, cluster stability, cluster overlapping, location-awareness and support for node mobility.


ad hoc networks | 2008

Strategies and techniques for node placement in wireless sensor networks: A survey

Mohamed F. Younis; Kemal Akkaya

The major challenge in designing wireless sensor networks (WSNs) is the support of the functional, such as data latency, and the non-functional, such as data integrity, requirements while coping with the computation, energy and communication constraints. Careful node placement can be a very effective optimization means for achieving the desired design goals. In this paper, we report on the current state of the research on optimized node placement in WSNs. We highlight the issues, identify the various objectives and enumerate the different models and formulations. We categorize the placement strategies into static and dynamic depending on whether the optimization is performed at the time of deployment or while the network is operational, respectively. We further classify the published techniques based on the role that the node plays in the network and the primary performance objective considered. The paper also highlights open problems in this area of research.


modeling, analysis, and simulation on computer and telecommunication systems | 2002

Energy-aware routing in cluster-based sensor networks

Mohamed F. Younis; Moustafa Youssef; Khaled A. Arisha

There has been a growing interest in the applications of sensor networks. Since sensors are generally constrained in on-board energy supply, efficient management of the network is crucial in extending the life of the sensor. We present a novel approach for energy-aware and context-aware routing of sensor data. The approach calls for network clustering and assigns a less-energy-constrained gateway node that acts as a centralized network manager. Based on energy usage at every sensor node and changes in the mission and the environment, the gateway sets routes for sensor data, monitors latency throughout the cluster, and arbitrates medium access among sensors. Simulation results demonstrate that our approach can achieve substantial energy saving.


Archive | 2002

Energy-Aware TDMA-Based MAC for Sensor Networks

Khaled A. Arisha; Moustafa Youssef; Mohamed F. Younis

Networking unattended sensors is expected to have a significant impact on the efficiency of many military and civil applications. Sensors in such systems are typically disposable and expected to last until their energy drains. Therefore, energy is a very scarce resource for such sensor systems and has to be managed wisely in order to extend the life of the sensors for the duration of a particular mission. In this chapter, we present a novel approach for energy-aware management of sensor networks that maximizes the lifetime of the sensors while maintaining desired quality of service attributes related to sensed data delivery. The approach is to dynamically set routes and arbitrate medium access to minimize energy consumption and maximize sensor life. We give a brief overview of the energy-aware routing and a description of a Time-Division-Multiple-Access (TDMA) -based Medium AccessControl (MAC) protocol. We discuss algorithms for assigning time slots for the communicating sensor nodes. The approach is evaluated through simulation. Simulation results have confirmed the effectiveness of our new approach.


Computer Networks | 2014

Survey Topology management techniques for tolerating node failures in wireless sensor networks: A survey

Mohamed F. Younis; Izzet F. Senturk; Kemal Akkaya; Sookyoung Lee; Fatih Senel

In wireless sensor networks (WSNs) nodes often operate unattended in a collaborative manner to perform some tasks. In many applications, the network is deployed in harsh environments such as battlefield where the nodes are susceptible to damage. In addition, nodes may fail due to energy depletion and breakdown in the onboard electronics. The failure of nodes may leave some areas uncovered and degrade the fidelity of the collected data. However, the most serious consequence is when the network gets partitioned into disjoint segments. Losing network connectivity has a very negative effect on the applications since it prevents data exchange and hinders coordination among some nodes. Therefore, restoring the overall network connectivity is very crucial. Given the resource-constrained setup, the recovery should impose the least overhead and performance impact. This paper focuses on network topology management techniques for tolerating/handling node failures in WSNs. Two broad categories based on reactive and proactive methods have been identified for classifying the existing techniques. Considering these categories, a thorough analysis and comparison of all the recent works have been provided. Finally, the paper is concluded by outlining open issues that warrant additional research.


Computer Networks | 2003

Energy-aware management for cluster-based sensor networks

Mohamed F. Younis; Moustafa Youssef; Khaled A. Arisha

Networking unattended sensors is expected to have a significant impact on the efficiency of many military and civil applications. Sensors in such systems are typically disposable and expected to last until their energy drains. Therefore, energy is a very scarce resource for such sensor systems and has to be managed wisely in order to extend the life of the sensors for the duration of a particular mission. In this paper, we present a novel approach for energy-aware management of sensor networks that maximizes the lifetime of the sensors while achieving acceptable performance for sensed data delivery. The approach is to dynamically set routes and arbitrate medium access in order to minimize energy consumption and maximize sensor life. The approach calls for network clustering and assigns a less-energy-constrained gateway node that acts as a cluster manager. Based on energy usage at every sensor node and changes in the mission and the environment, the gateway sets routes for sensor data, monitors latency throughout the cluster, and arbitrates medium access among sensors. We also describe a time-based medium access control (MAC) protocol and discuss algorithms for assigning time slots for the communicating sensor nodes. Simulation results show an order of magnitude enhancement in the time to network partitioning, 11% enhancement in network lifetime predictability, and 14% enhancement in average energy consumed per packet.


international symposium on computers and communications | 2003

A low-energy key management protocol for wireless sensor networks

Gaurav Jolly; Mustafa C. Kusçu; Pallavi Kokate; Mohamed F. Younis

Wireless sensor networks have a wide spectrum of civil and military applications that call for security, e.g., target surveillance in hostile environments. Typical sensors possess limited computation, energy, and memory resources; therefore the use of vastly resource-consuming security mechanisms is not possible. In this paper, we propose a cryptographic key management protocol, which is based on the IBSK scheme, but only two symmetric keys are required to be pre-deployed at each sensor. The protocol supports the eviction of the compromised nodes. Simulation shows that the key management is remarkably low thanks to the multi-tier network architecture in which only sensor-to-gateway secure sessions are allowed, and reports order-of-magnitude improvement in energy saving as compared to the original IBSK scheme, and Kerberos-like schemes.


ad hoc networks | 2010

Towards autonomous vehicular clouds

Mohamed Eltoweissy; Stephan Olariu; Mohamed F. Younis

The dawn of the 21st century has seen a growing interest in vehicular networking and its myriad potential applications. The initial view of practitioners and researchers was that radio-equipped vehicles could keep the drivers informed about potential safety risks and increase their awareness of road conditions. The view then expanded to include access to the Internet and associated services. This position paper proposes and promotes a novel and more comprehensive vision namely, that advances in vehicular networks, embedded devices, and cloud computing will enable the formation of autonomous clouds of vehicular computing, communication, sensing, power and physical resources. Hence, we coin the term, Autonomous Vehicular Clouds (AVCs). A key features distinguishing AVCs from conventional cloud computing is that mobile AVC resources can be pooled dynamically to serve authorized users and to enable autonomy in real-time service sharing and management on terrestrial, aerial, or aquatic pathways or theatres of operations. In addition to general-purpose AVCs, we also envision the emergence of specialized AVCs such as mobile analytics laboratories. Furthermore, we envision that the integration of AVCs with ubiquitous smart infrastructures including intelligent transportation systems, smart cities, and smart electric power grids, will have an enormous societal impact enabling ubiquitous utility cyber-physical services at the right place, right time, and with right-sized resources.


hawaii international conference on system sciences | 2004

On handling QoS traffic in wireless sensor networks

Mohamed F. Younis; Kemal Akkaya; Mohamed Eltoweissy; Ashraf Wadaa

Many new routing and MAC layer protocols have been proposed for wireless sensor networks tackling the issues raised by the resource constrained unattended sensor nodes in large-scale deployments. The majority of these protocols considered energy efficiency as the main objective and assumed data traffic with unconstrained delivery requirements. However, the growing interest in applications that demand certain end-to-end performance guarantees and the introduction of imaging and video sensors have posed additional challenges. Transmission of data in such cases requires both energy and QoS aware network management in order to ensure efficient usage of the sensor resources and effective access to the gathered measurements. In this paper, we highlight the architectural and operational challenges of handling of QoS traffic in sensor networks. We report on progress make to-date and outline open research problems.

Collaboration


Dive into the Mohamed F. Younis's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Mohamed Eltoweissy

Pacific Northwest National Laboratory

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Nadjib Badache

University of Science and Technology Houari Boumediene

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Uthman Baroudi

King Fahd University of Petroleum and Minerals

View shared research outputs
Top Co-Authors

Avatar

Moustafa Youssef

Egypt-Japan University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Alexander D. Stoyenko

New Jersey Institute of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge