Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Mustafa Al-Fayoumi is active.

Publication


Featured researches published by Mustafa Al-Fayoumi.


international conference on information technology new generations | 2008

An Efficient RSA Public Key Encryption Scheme

Sattar J. Aboud; Mohammad Ahmed Al-Fayoumi; Mustafa Al-Fayoumi; Haidar S. Jabbar

In this paper, we propose an efficient RSA public key encryption scheme, which is improved version of original RSA scheme. The proposed RSA encryption scheme is based on linear group over the ring of integer mod a composite modulus n which is the product of two distinct prime numbers. In the proposed scheme the original message and the encrypted message are h x h square matrices with entities in zn indicated via l(h, zn) . Since the original RSA Scheme is a block cipher in which the original message and cipher message are integer in the interval [0, n -1] for some integer modulus n. Therefore, in this paper, we generalize RSA encryption scheme in order to be implemented in the general linear group on the ring of integer mod n. Furthermore, the suggested encryption scheme has no restriction in encryption and decryption order and is claimed to be efficient, scalable and dynamic.


wireless and mobile computing, networking and communications | 2007

A New Hybrid Approach of Symmetric/Asymmetric Authentication Protocol for Future Mobile Networks

Mustafa Al-Fayoumi; Shadi Nashwan; Sufian Yousef; Abdel-Rahman Alzoubaidi

Most of current authentication schemes for mobile systems have some weaknesses; such as leakage of UE identities and high update overhead of temporary identities. This paper proposes a secure authentication mechanism for mobile communication systems that satisfies the security requirements of the third generation mobile systems. In this proposed protocol, the number of messages between authentication entities of the network is reduced to four messages instead of five in initial authentication procedure. The subsequent authentication procedure only contains two message exchanges. Therefore, the bottleneck at authentication center is avoided by reducing the number of messages between mobile and authentication center. The authentication time delay, call setup time and signaling traffic are minimized. Also, this proposed protocol is designed to be secure against network attacks, such as replay attacks and Guessing attacks and others attacks. Consequently, this approach is secure and practical as it can satisfy the security requirements of the third generation mobile communication systems based on hybrid asymmetric and symmetric cryptosystem, and can save up to 20% of the authentication traffic delay time.


Journal of Network and Systems Management | 2014

Location Prediction Based on a Sector Snapshot for Location-Based Services

Mohammad Sharif Daoud; Aladdin Ayesh; Mustafa Al-Fayoumi; Adrian A. Hopgood

In location-based services (LBSs), the service is provided based on the users’ locations through location determination and mobility realization. Most of the current location prediction research is focused on generalized location models, where the geographic extent is divided into regular-shaped cells. These models are not suitable for certain LBSs where the objectives are to compute and present on-road services. Such techniques are the new Markov-based mobility prediction (NMMP) and prediction location model (PLM) that deal with inner cell structure and different levels of prediction, respectively. The NMMP and PLM techniques suffer from complex computation, accuracy rate regression, and insufficient accuracy. In this paper, a novel cell splitting algorithm is proposed. Also, a new prediction technique is introduced. The cell splitting is universal so it can be applied to all types of cells. Meanwhile, this algorithm is implemented to the Micro cell in parallel with the new prediction technique. The prediction technique, compared with two classic prediction techniques and the experimental results, show the effectiveness and robustness of the new splitting algorithm and prediction technique.


Journal of Network and Systems Management | 2014

Cloning SIM Cards Usability Reduction in Mobile Networks

Mustafa Al-Fayoumi; Nidal F. Shilbayeh

This paper studies the probability of using cloning subscriber identity module (SIM) cards in Universal Mobile Telecommunications Systems. It also explores how the mobile system can discover the cloning SIM cards as soon as possible and how to reduce the probability of using cloning SIM cards in mobile networks. The illegal mobile station attached to mobile networks can be detected by a Normal Location Area Update, a periodic area location update, and by outgoing calls that are issued from genuine mobiles. An analytical model is developed to investigate the effects of a location area update and outgoing calls issued by genuine mobiles on the use of illegal mobiles. Mobility management, such as registration, cancellation, and outgoing and incoming procedures for legal and illegal users are investigated and analysed. An analytical model to investigate the effect of outgoing call arrival rates, and location area residence time on the detected illegal user has been presented. This paper seeks to increase the security of communication by avoiding fraud of cloned mobile phones by proposing a solution to speed up the detection of cloning SIM cards.


Journal of Computer Science | 2018

SSOAM: Automated Security Testing Framework for SOA Middleware in Banking Domain

Mustafa Al-Fayoumi; Ruba Haj Hamad; Ja’afer Al-Saraireh

In the banking domain, a high level of security must be considered and achieved to prevent a core-banking system from vulnerabilities and attackers. This is especially true when implementing Service Oriented Architecture Middleware (SOAM), which enables all banking e-services to be connected in a unified way and then allows banking e-services to transmit and share information using simple Object Access Protocol (SOAP). The main challenge in this research is that SOAP is designed without security in mind and there are no security testing tools that guarantee a secure SOAM solution in all its layers. Thus, this paper studies and analyzes the importance of implementing secure banking SOAM design architecture and of having an automated security testing framework. Therefore, Secure SOAM (SSOAM) is proposed, which works in parallel with the banking production environment. SSOAM contains a group of integrated security plugins that are responsible for scanning, finding, analyzing and fixing vulnerabilities and also forecasting new vulnerabilities and attacks in all banking SOAM layers.


International Journal of Advanced Computer Science and Applications | 2016

A Heterogeneous Framework to Detect Intruder Attacks in Wireless Sensor Networks

Mustafa Al-Fayoumi; Yasir Ahmad; Usman Tariq

Wireless sensor network (WSN) has been broadly implemented in real world applications, such as monitoring of forest fire, military targets detection, medical and/or science areas and above all in our daily home life as well. Nevertheless, WSNs are effortlessly compromised by adversaries due to their broadcast transmission medium as a means of communication which are lacking in tamper resistance. Consequently, an intruder can over hear all traffic, replay previous messages, inject malicious data packets, or can compromise a node. Commonly, sensor nodes are very much vulnerable of two main issues in security aspect that are node authentication and compromising a node. In this paper, a heterogeneous framework of node capture and intrusion detection for WSNs is proposed. This framework efficiently detects the captured nodes by using a novel technique, embedded with an Intrusion Detection mechanism which aggregates Signature and Anomaly based approach with Neural Network Multi-Layer Perceptron (MLP) classification in a clustering environment. Moreover, the proposed framework achieves efficiency at reasonable computation and communication costs and it can be a security shield to real WSN applications.


International Journal of Security | 2011

An Enhancement of Authentication Protocol and Key Agreement (AKA) For 3G Mobile Networks

Mustafa Al-Fayoumi; Ja’afer Al-Saraireh


systems, man and cybernetics | 2011

A new splitting-based displacement prediction approach for location-based services

Mohammad Sh. Daoud; Aladdin Ayesh; Adrian A. Hopgood; Mustafa Al-Fayoumi


international conference on agents and artificial intelligence | 2013

An enhanced ant colony optimization for routing area mobility prediction over cellular communications network.

Mohammad Sh. Daoud; Aladdin Ayesh; Mustafa Al-Fayoumi; Adrian A. Hopgood


systems, man and cybernetics | 2014

A New Routing Area Displacement Prediction for Location-Based Services based on an Enhanced Ant Colony

Mohammad Sh. Daoud; Adrian A. Hopgood; Mustafa Al-Fayoumi; Hani M. Mimi

Collaboration


Dive into the Mustafa Al-Fayoumi's collaboration.

Top Co-Authors

Avatar

Adrian A. Hopgood

Sheffield Hallam University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Mohammad Sh. Daoud

Al Ain University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Shadi Nashwan

Anglia Ruskin University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Sufian Yousef

Anglia Ruskin University

View shared research outputs
Researchain Logo
Decentralizing Knowledge