Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Mohammed Aseeri is active.

Publication


Featured researches published by Mohammed Aseeri.


Journal of Network and Computer Applications | 2016

Energy-efficiency and reliability in MAC and routing protocols for underwater wireless sensor network

Nusrat Z. Zenia; Mohammed Aseeri; Muhammad R. Ahmed; Zamshed Iqbal Chowdhury; M. Shamim Kaiser

Underwater wireless sensor network (UWSN) technology has introduced a new flux to a whole gamut of application domains such as scientific exploration, commercial exploitation, underwater disaster prevention, etc. Such diversity of UWSN has gained prominence to the researchers quite fast and has marked this field of research as one of the emerging ones. With extensive researches conducted in this field, several design challenges have been experienced and explored by the network designers. Large propagation delay, low bandwidth, frequent loss of connectivity, variability of sound speed, limitation on source of energy, etc. are the key challenges, which are identified as necessary issues for establishing efficient and reliable UWSN. To address these issues, several MAC and routing protocols for UWSN have been proposed by the researchers during the last decade. In this review, the core design aspects for an ideal UWSN are identified which are energy-efficiency and reliability. These design aspects are evaluated in terms of energy consumption and communication efficiency - in order to provide an insight to the network designers on ideal design metrics. It is found that the protocols are highly selective, and the fitness of any protocol depends solely on the application and design requirements, which is addressed by this review. This paper also provides a comprehensive overview through comparison and simulation to analyze and summarize the MAC and routing protocols under concern.


International Journal of Future Computer and Communication | 2013

A Novel Trust and Reputation Model Based WSN Technology to Secure Border Surveillance

Ahmed Al Ghamdi; Mohammed Aseeri; Muhammad R. Ahmed

Border surveillance systems have recently came into attention to address the concerns about national security. Conventional border surveillance or petrol systems consist of check points and border troops. The existing system for surveillance suffers from intensive human involvement. The recent technology is expensive as it requires using high-tech devices e.g. Unmanned aerial vehicles, unattended ground sensors, and surveillance towers equipped with Radar and camera sensors. These techniques suffer with problems such as high false alarm rate and for communication line of sight is necessary. In such surveillance system wireless sensor network is cost effective and efficient for event detection in the large area with multi hope communications. Using Wireless Sensor Network (WSN) the task of object tracking or event detection has been investigated but not much attention was given to secure the border. In this paper the security analysis of the border and a trust and reputation based WSN is presented secure border surveillance with some simulation results.


international conference on electrical engineering and information communication technology | 2015

A novel algorithm for malicious attack detection in UWSN

Muhammad R. Ahmed; Mohammed Aseeri; M. Shamim Kaiser; Nusrat Z. Zenia; Zamshed Iqbal Chowdhury

Information transmission in the marine scenario utilizing wireless communications is unique method that empowering the technology for the evolution of imminent marine-surveillance systems and sensory networks. Under-water wireless sensor network (UWSN) in one of the auspicious technology for marine observation. The applications of underwater sensing has several domain that range from oil industry to aquaculture. Some of the UWSN applications include device checking, monitoring and control of pollution in the water, underwater ecosystems monitoring, forecasting of natural disasters and disturbances, exploration and survey missions, as well as study of oceanic life. Nodes in UWSN are normally low cost, low power. Considering the characteristics and the nature of applications, security of UWSN is one of the critical issue and had drawn significant attention to the researchers. In order to have a functional UWSN to extract the authentic data safeguarding and protection mechanisms are crucial. Malicious node attacks has accomplished as one of the most challenging attacks to UWSN. Several research has been conducted to protect UWSN from malicious attacks but majority of the works depend on either training data set or a previously defined threshold. Without an established security infrastructure a UWSN required to detect the malicious attacks is a complication and challenge. In this paper, we used evidential evaluation utilizing Dempster-Shafer theory (DST) of combined multiple evidences to identify the malicious attacks in a UWSN. Moreover, it gives a numerical procedure for fusing together multiple pieces of facts from an untrustworthy and unreliable neighbor with a higher degree of conflict reliability.


Wireless Communications and Mobile Computing | 2018

Compact Microstrip Lowpass Filter with Low Insertion Loss for UWB Medical Applications

Mohammed Aseeri; Meshaal Alyahya; Hatim Bukhari; Hussein Shaman

A microstrip lowpass filter based on transmission line elements for UWB medical applications is proposed in this paper. The filter is constructed of two symmetric shunt open-circuited stubs and three series unit elements. The filter is designed to exhibit an elliptic function response with equal ripple in the passband and the rejection band. A prototype is successfully designed, fabricated, and measured, where a good agreement is attained. The filter shows a high filtering selectivity and an ultra-wide stopband up to 20 GHz with an attenuation level of more than 20-dB. The filter is compact and has a low insertion loss and an ultra-wideband (UWB) rejection which makes it attractive for many technologies such as UWB medical applications.


international conference wireless technologies embedded and intelligent systems | 2017

Compact microstrip lowpass filter with ultra-wide rejection-band

Meshaal Alyahya; Mohammed Aseeri; Hatim Bukhari; Hussein Shaman; Abdulrahman Alhamrani; Adnan Affandi

A lowpass filter with wideband stopband is developed using microstrip line and proposed in this paper. It consists of shunt stepped-impedance open-circuited stubs and unit elements. The electrical length of the open-circuited stubs is chosen to be twice the length of the unit elements at a specific frequency. As a result, the filter can exhibit additional transmission zeros inside the rejection band and close to the cut-off frequency. Hence, the filter can provide an equal ripple performance with very high selectivity. The proposed design is verified by EM-simulations and experiment. A good agreement is attained between the calculated, simulated and measured results. The measured filter shows excellent performance with an extended stopband.


International Journal of Distributed Sensor Networks | 2017

Detection of attacker and location in wireless sensor network as an application for border surveillance

Mohammed Aseeri; Muhammad R. Ahmed; M. N. Shakib; Oussama Ghorbel; Hussian Shaman

Border surveillance is one of the high priority in the security of countries around the world. Typical and traditional border observations involve troops and checkpoints at borders, but these do not provide complete security. One effective solution is the addition of smart fencing to enhance surveillance in a Border Patrol system. More specifically, effective border security can be achieved through the introduction of autonomous surveillance and the utilization of wireless sensor networks. Collectively, these wireless sensor networks will create a virtual fencing system comprising a large number of heterogeneous sensor devices. These devices are embedded with cameras and other sensors that provide a continuous monitor. However, to achieve an efficient wireless sensor network, its own security must be assured. This article focuses on the detection of attacks by unknown trespassers (perpetrators) on border surveillance sensor networks. We use both the Dempster–Shafer theory and the time difference of arrival method to identify and locate an attacked node. Simulation results show that the proposed scheme is both plausible and effective.


international conference on informatics electronics and vision | 2016

A unique framework to integrate secured BAN and could computing to monitor patient

Mohammed Aseeri; Muhammad R Ahmed; Syed Nazmus Sakib; M Shamim Kaisert

Body Area Networks (BAN) is a special purpose Wireless Sensor Network (WSN) which is designed for patient monitoring. BAN requires to transmit the monitored data to the medical personals as quick as possible in real time. It is possible to make it web based. The integration of the BAN and cloud computing allows the sensors to transmit their data in a short time and show it in the web application. The technology is low cost as it is distributed and shared system. Even though the system will work in real time with integration but there is a concern to get the secure data from the sensor. So to get the real time secured data an efficient security mechanism is necessary. It is a challenge to secure the network from malicious or internal attacks. To mitigate tis problem several work is been proposed but most of it based on the cryptography or based on predefined tanning data. Which has drawbacks, as it is a challenging task for any dynamic networks to find the internal attacks without fixed infrastructure such as BAN. In this paper we proposed the integration of BAN and cloud computing using content-based publish/subscribe (pub/sub) broker model and security mechanisms for BAN based on entropy. The simulation result shows the evaluation.


Proceedings of the Australasian Computer Science Week Multiconference on | 2016

Effective algorithm for protecting WSNs from internal attacks in real-time

Xu Huang; Muhammad R. Ahmed; Raul Fernandez Rojas; Hongyan Cui; Mohammed Aseeri

Wireless sensor networks (WSNs) are playing a vital role in collecting data about a natural or built environment. WSNs have attractive advantages such as low-cost, low maintains and flexible arrangements for applications. Wireless sensor network has been used for many different applications such as military implementations in a battlefield, an environmental monitoring, and multifunction in health sector. In order to ensure its functionality, especially in malicious environments, security mechanisms become essential. Especially internal attacks have gained prominence and pose most challenging threats to all WSNs. Although, a number of works have been done to discuss a WSN under the internal attacks it has gained little attention. For example, the conventional cryptographic technique does not give the appropriated security to save the network from internal attack that causes by abnormally behaviour at the legitimate nodes in a network. In this paper, we propose an effective algorithm to make an evaluation for detecting internal attack by multi-criteria in real time. This protecting is based on the combination of the multiple pieces of evidences collected from the nodes under an internal attacker in a network. A theory of the decision is carefully discussed based on the Dempster-Shafer Theory (DST). If you really wanted to make sure the designed network works exactly works as you expected, you will be benefited from this algorithm. The advantage of this proposed method is not just its performance in real-time but also it is effective as it does not need the knowledge about the normal or malicious node in advance with very high average accuracy that is close to 100%. It also can be used as one of maintaining tools for the regulations of the deployed WSNs.


2015 IEEE 8th GCC Conference & Exhibition | 2015

Modelling a microwave chaotic generator for RADAR and communication systems

Mohammed Aseeri; Muhammad R. Ahmed; Ahmed Al Ghamdi; Majharul Talukder

This paper presents a new expression of the q-v characteristic of the varactor non-linear capacitor. Microwave chaotic communications systems are demonstrated using AM signal and the application of the microwave chaotic generator in chaotic radar systems using RF signal are obtained. The transmitter for both systems are simulated based on frequency multiplier chains. The original transmitted signals are recovered using the same model system but based on its an inverse via mathematical way.


radio frequency integrated circuits symposium | 2018

A 308-317GHz Source with 4.6mW Peak Radiated Power and on-Chip Frequency-Stabilization Feedback in 0.13µm BiCMOS

Chen Jiang; Mohammed Aseeri; Andreia Cathelin; Ehsan Afshari

Collaboration


Dive into the Mohammed Aseeri's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Xu Huang

University of Canberra

View shared research outputs
Top Co-Authors

Avatar

Abdulaziz Ahmad Alasows

King Abdulaziz City for Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Hatim Bukhari

King Abdulaziz City for Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Hussein Shaman

King Abdulaziz City for Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Meshaal Alyahya

King Abdulaziz City for Science and Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Chen Jiang

University of Michigan

View shared research outputs
Researchain Logo
Decentralizing Knowledge