Mustafa Al-Fayoumi
Salman bin Abdulaziz University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Mustafa Al-Fayoumi.
international conference on information technology new generations | 2008
Sattar J. Aboud; Mohammad Ahmed Al-Fayoumi; Mustafa Al-Fayoumi; Haidar S. Jabbar
In this paper, we propose an efficient RSA public key encryption scheme, which is improved version of original RSA scheme. The proposed RSA encryption scheme is based on linear group over the ring of integer mod a composite modulus n which is the product of two distinct prime numbers. In the proposed scheme the original message and the encrypted message are h x h square matrices with entities in zn indicated via l(h, zn) . Since the original RSA Scheme is a block cipher in which the original message and cipher message are integer in the interval [0, n -1] for some integer modulus n. Therefore, in this paper, we generalize RSA encryption scheme in order to be implemented in the general linear group on the ring of integer mod n. Furthermore, the suggested encryption scheme has no restriction in encryption and decryption order and is claimed to be efficient, scalable and dynamic.
wireless and mobile computing, networking and communications | 2007
Mustafa Al-Fayoumi; Shadi Nashwan; Sufian Yousef; Abdel-Rahman Alzoubaidi
Most of current authentication schemes for mobile systems have some weaknesses; such as leakage of UE identities and high update overhead of temporary identities. This paper proposes a secure authentication mechanism for mobile communication systems that satisfies the security requirements of the third generation mobile systems. In this proposed protocol, the number of messages between authentication entities of the network is reduced to four messages instead of five in initial authentication procedure. The subsequent authentication procedure only contains two message exchanges. Therefore, the bottleneck at authentication center is avoided by reducing the number of messages between mobile and authentication center. The authentication time delay, call setup time and signaling traffic are minimized. Also, this proposed protocol is designed to be secure against network attacks, such as replay attacks and Guessing attacks and others attacks. Consequently, this approach is secure and practical as it can satisfy the security requirements of the third generation mobile communication systems based on hybrid asymmetric and symmetric cryptosystem, and can save up to 20% of the authentication traffic delay time.
Journal of Network and Systems Management | 2014
Mohammad Sharif Daoud; Aladdin Ayesh; Mustafa Al-Fayoumi; Adrian A. Hopgood
In location-based services (LBSs), the service is provided based on the users’ locations through location determination and mobility realization. Most of the current location prediction research is focused on generalized location models, where the geographic extent is divided into regular-shaped cells. These models are not suitable for certain LBSs where the objectives are to compute and present on-road services. Such techniques are the new Markov-based mobility prediction (NMMP) and prediction location model (PLM) that deal with inner cell structure and different levels of prediction, respectively. The NMMP and PLM techniques suffer from complex computation, accuracy rate regression, and insufficient accuracy. In this paper, a novel cell splitting algorithm is proposed. Also, a new prediction technique is introduced. The cell splitting is universal so it can be applied to all types of cells. Meanwhile, this algorithm is implemented to the Micro cell in parallel with the new prediction technique. The prediction technique, compared with two classic prediction techniques and the experimental results, show the effectiveness and robustness of the new splitting algorithm and prediction technique.
Journal of Network and Systems Management | 2014
Mustafa Al-Fayoumi; Nidal F. Shilbayeh
This paper studies the probability of using cloning subscriber identity module (SIM) cards in Universal Mobile Telecommunications Systems. It also explores how the mobile system can discover the cloning SIM cards as soon as possible and how to reduce the probability of using cloning SIM cards in mobile networks. The illegal mobile station attached to mobile networks can be detected by a Normal Location Area Update, a periodic area location update, and by outgoing calls that are issued from genuine mobiles. An analytical model is developed to investigate the effects of a location area update and outgoing calls issued by genuine mobiles on the use of illegal mobiles. Mobility management, such as registration, cancellation, and outgoing and incoming procedures for legal and illegal users are investigated and analysed. An analytical model to investigate the effect of outgoing call arrival rates, and location area residence time on the detected illegal user has been presented. This paper seeks to increase the security of communication by avoiding fraud of cloned mobile phones by proposing a solution to speed up the detection of cloning SIM cards.
Journal of Computer Science | 2018
Mustafa Al-Fayoumi; Ruba Haj Hamad; Ja’afer Al-Saraireh
In the banking domain, a high level of security must be considered and achieved to prevent a core-banking system from vulnerabilities and attackers. This is especially true when implementing Service Oriented Architecture Middleware (SOAM), which enables all banking e-services to be connected in a unified way and then allows banking e-services to transmit and share information using simple Object Access Protocol (SOAP). The main challenge in this research is that SOAP is designed without security in mind and there are no security testing tools that guarantee a secure SOAM solution in all its layers. Thus, this paper studies and analyzes the importance of implementing secure banking SOAM design architecture and of having an automated security testing framework. Therefore, Secure SOAM (SSOAM) is proposed, which works in parallel with the banking production environment. SSOAM contains a group of integrated security plugins that are responsible for scanning, finding, analyzing and fixing vulnerabilities and also forecasting new vulnerabilities and attacks in all banking SOAM layers.
International Journal of Advanced Computer Science and Applications | 2016
Mustafa Al-Fayoumi; Yasir Ahmad; Usman Tariq
Wireless sensor network (WSN) has been broadly implemented in real world applications, such as monitoring of forest fire, military targets detection, medical and/or science areas and above all in our daily home life as well. Nevertheless, WSNs are effortlessly compromised by adversaries due to their broadcast transmission medium as a means of communication which are lacking in tamper resistance. Consequently, an intruder can over hear all traffic, replay previous messages, inject malicious data packets, or can compromise a node. Commonly, sensor nodes are very much vulnerable of two main issues in security aspect that are node authentication and compromising a node. In this paper, a heterogeneous framework of node capture and intrusion detection for WSNs is proposed. This framework efficiently detects the captured nodes by using a novel technique, embedded with an Intrusion Detection mechanism which aggregates Signature and Anomaly based approach with Neural Network Multi-Layer Perceptron (MLP) classification in a clustering environment. Moreover, the proposed framework achieves efficiency at reasonable computation and communication costs and it can be a security shield to real WSN applications.
International Journal of Security | 2011
Mustafa Al-Fayoumi; Ja’afer Al-Saraireh
systems, man and cybernetics | 2011
Mohammad Sh. Daoud; Aladdin Ayesh; Adrian A. Hopgood; Mustafa Al-Fayoumi
international conference on agents and artificial intelligence | 2013
Mohammad Sh. Daoud; Aladdin Ayesh; Mustafa Al-Fayoumi; Adrian A. Hopgood
systems, man and cybernetics | 2014
Mohammad Sh. Daoud; Adrian A. Hopgood; Mustafa Al-Fayoumi; Hani M. Mimi