Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Rosilah Hassan is active.

Publication


Featured researches published by Rosilah Hassan.


ieee international conference on digital ecosystems and technologies | 2010

Comparative review study of reactive and proactive routing protocols in MANETs

Shima Mohseni; Rosilah Hassan; Ahmed Patel; Rozilawati Razali

Mobile Ad Hoc Networks (MANETs) are generating a lot of interests due to 3G and 4G activities. The dynamic nature of these networks demands new set of network routing strategy protocols to be implemented in order to provide efficient end-to-end communication. Due to the diverse applications that use MANETs, such as battlefield, emergency services, and disaster discovery, MANETs offer many advantages to many organizations that need wireless roaming. For efficient and timely use, routing and synchronization are essential. Both are hot research topics in MANETs. This paper concentrates on routing, which is a challenging task and has seen a huge number of different strategies proposed, each claiming to provide an improvement over other strategies. These competing strategies make it quite difficult to determine which one may perform optimally under a number of different sets of network conditions as defined by their Quality of Service (QoS) offerings. This paper reviews some of the state-of-the-art and widely investigated MANET routing strategies in the literature. Moreover, a performance comparison of discussed routing protocol strategies is provided and suggestions are made to achieve improvement in performance of these protocols. This research is followed by presenting further research that will be pursued to define a radically most optimum set of strategies to satisfy different types of application domains.


international conference on electrical engineering and informatics | 2009

A comparative review of IPv4 and IPv6 for research test bed

Mohd. Khairil Sailan; Rosilah Hassan; Ahmed Patel

The Internet is migrating from IPv4 to IPv6. To determine the features for research test bed product selection, we compare the up-to-date information of IPv4 and IPv6. Currently IPv6 network penetration is still low but it is expected to grow, while IPv4 address pool is projected by Regional Internet Registry to be exhausted by the end of 2011. The reason why uptake of IPv6 is still low is because of high cost of service migration from IPv4 to IPv6, successfully used of IPv4 Network Address Translation for Intranet and unproven return of investment in IPv6 technology. This paper aims to review few migration path from IPv4 to IPv6 and some of the existing IPv6 products.


international conference on electrical engineering and informatics | 2011

A local intrusion detection routing security over MANET network

Maha Abdelhaq; Sami Serhan; Raed A. Alsaqour; Rosilah Hassan

Mobile Adhoc Network (MANET) is a group of wireless nodes that are distributed without relying on any standing network infrastructure. MANET routing protocols were designed to accommodate the properties of a self-organized environment without protection against any inside or outside network attacks. In this paper, we propose a Local Intrusion Detection (LID) security routing mechanism to detect Black Hole Attack (BHA) over Ad hoc On Demand Distance Vector (AODV) MANET routing protocol. In LID security routing mechanism, the intrusion detection is performed locally using the previous node of the attacker node instead of performing the intrusion detection via the source node as in Source Intrusion Detection (SID) security routing mechanism. By performing LID security routing mechanism, the security mechanism overhead would be decreased. Simulation results using the GloMoSim simulator show that the improvement ratio of the throughput gained by LID security routing mechanism and overall improvement reduction in the end-to-end delay and routing overhead.


international conference on information technology | 2013

Comparison between android and iOS Operating System in terms of security

Mohd Shahdi Ahmad; Nur Emyra Musa; Rathidevi Nadarajah; Rosilah Hassan; Nor Effendy Othman

This paper compares between android and iPhone Operating System (iOS) mobile operating systems (MOS) that available in the market which is more specific on the security issue. These issues are reportedly the concern of not only the mobile customers but also the software developers. In achieving security requirements, the MOS developers need to know how to achieve the criteria. The security requirements for MOS are Application Sandboxing, Memory Randomization, Encryption, Data Storage Format and Built-in Antivirus. Application sandboxing enforces permissions, privileges, directories, entitlements and kernel access for a mobile app. Memory randomization ensures that the memory regions of mobile application as well as system shared libraries are all randomized at device and application start-up. Encryption is performed on disk or filer/folder level and also at the interprocess communication level. It is difficult to speak in favor or against the android or the iOS operating system in terms of better security. The way of using the device plays a major role in determining the security level. In terms of storage, all data are stored in Data Storage Format. Data can be stored at internal storage or external storage. To protect the MOS from virus attacks, antivirus need to be installed for increasing security areas.


international conference on information technology | 2011

Evaluation study on routing information protocol and dynamic source routing in Ad-Hoc network

Zeyad Ghaleb Al-Mekhlafi; Rosilah Hassan

In the recent years, the Ad-Hoc networks have been the focus of many researches especially in the routing protocols which include Proactive and Reactive routing. The strategy of forwarding the data packets from the source to the destination is the ultimate goal of routing protocols. Hence, the difference between these protocols is based on searching, maintenance and recovering the route path. The potential problem in Ad-Hoc networks is how to determine the optimum routing protocol that satisfies the needs of the application regarding to some criteria. This work will present the evaluation of proactive routing protocol Routing Information Protocol (RIP) and reactive routing protocol Dynamic Source Routing (DSR) based on the QualNet simulation. Moreover, the performance of these routing protocols will be measured based on the throughput, delay, average jitter and energy consumption metrics. The present paper shows that the routing information protocols (RIP) have better evaluation performance compared to DSR in the scenario.


asia-pacific conference on communications | 2011

A performance study of various mobility speed on AODV routing protocol in homogeneous and heterogeneous MANET

Zahian Ismail; Rosilah Hassan

Mobile Ad Hoc Network (MANET) is a dynamic network without fixed infrastructure due to their wireless nature and can be deployed as multi-hop packet networks. It is a wireless network and has dynamic topology due to its node mobility. Networks are being used in various areas and the demand of users nowadays has motivated the emergence of the heterogeneous MANET. Compared to homogeneous MANET, heterogeneous MANET is more open to other types of network for example wireless LAN, cellular network and fixed network. In MANET, the concern is more to configuration and one of the important elements in configuration is routing. Ad hoc On Demand Distance Vector (AODV) is one of the routing protocols in MANET which can compromise with MANET characteristics. The aim of this research is to assess the performance of AODV in different mobility speed for homogeneous MANET and heterogeneous MANET through the simulation method. The simulation scenarios derived from the HetMAN architecture (as been discussed in previous work) have been developed in the OMNeT++ network simulator. The results achieved from the test have been evaluated using the metrics assigned; throughput and packet delivery ratio (PDR). The tests show that, as the speed increase, the throughput and PDR decrease for both homogeneous and heterogeneous MANET. From the test also, we can conclude that the performance in homogeneous MANET is better than in heterogeneous MANET.


international symposium on information technology | 2010

Performance of AODV routing protocol in Mobile Ad Hoc Network

Zahian Ismail; Rosilah Hassan

Mobile Ad Hoc Network (MANET) is a type of network with special characteristics and it needs special mechanism to bear with its ad hoc behavior. The important issue in MANET is routing protocol. Routing protocol is a standard used to determine the route path taken during the transmission of data. In this paper we will focus on Ad Hoc On Demand Distance Vector (AODV) routing protocol. The simulation experiments have been carried out using OMNeT++ network simulator to study the routing protocol performance in the heterogeneous MANET architecture. The metrics used to analyze the performance of the routing protocol are throughput and packet delivery ratio (PDR).


international conference on software engineering and computer systems | 2011

Using dendritic cell algorithm to detect the resource consumption attack over MANET

Maha Abdelhaq; Rosilah Hassan; Raed A. Alsaqour

Artificial Immune Systems (AISs) and Mobile Ad Hoc Networks (MANETs) are two up to date attractive technologies. AIS is utilized to introduce efficient intrusion detection algorithms to secure both host based and network based systems, whilst MANET is defined as a collection of mobile, decentralized, and self organized nodes. Securing MANET is a problem which adds more challenges on the research. This is because MANET properties make it harder to be secured than the other types of static networks. We claim that AIS properties as robust, self-healing, and self-organizing system can meet the challenges of securing MANET environment. This paper objective is to utilize the benefits of one of the Danger Theory based AIS intrusion detection algorithms, namely the Dendritic Cell Algorithm (DCA) to detect a type of Denial of Service (DoS) attack called Resource Consumption Attack (RCA) and also called sleep deprivation attack over MANET. The paper introduces a Mobile Dendritic Cell Algorithm (MDCA) architecture in which DCA plugged to be applied by each MANET node.


Ksii Transactions on Internet and Information Systems | 2014

Lightweight Multicast Routing Based on Stable Core for MANETs

Abdulmalek Al-Hemyari; Mahamod Ismail; Rosilah Hassan; Sabri Saeed

Mobile ad hoc networks (MANETs) have recently gained increased interest due to the widespread use of smart mobile devices. Group communication applications, serving for better cooperation between subsets of business members, become more significant in the context of MANETs. Multicast routing mechanisms are very useful communication techniques for such group-oriented applications. This paper deals with multicast routing problems in terms of stability and scalability, using the concept of stable core. We propose LMRSC (Lightweight Multicast Routing Based on Stable Core), a lightweight multicast routing technique for MANETs, in order to avoid periodic flooding of the source messages throughout the network, and to increase the duration of multicast routes. LMRSC establishes and maintains mesh architecture for each multicast group member by dividing the network into several zones, where each zone elects the most stable node as its core. Node residual energy and node velocity are used to calculate the node stability factor. The proposed algorithm is simulated by using NS-2 simulation, and is compared with other multicast routing mechanisms: ODMRP and PUMA. Packet delivery ratio, multicast route lifetime, and control packet overhead are used as performance metrics. These metrics are measured by gradual increase of the node mobility, the number of sources, the group size and the number of groups. The simulation performance results indicate that the proposed algorithm outperforms other mechanisms in terms of routes stability and network density.


international conference on electrical engineering and informatics | 2009

A study of routing protocol for topology configuration management in mobile ad hoc network

Zahian Ismail; Rosilah Hassan; Ahmed Patel; Rozilawati Razali

Managing todays increasingly complex networks requires extra information, knowledge and autonomic training. Network is being used in various areas and it requires a tool to manage it. Configuration management is one of the functional areas of network management that monitor network and system configuration information so that the effects on network operation of various items like versions of hardware and software elements and routing tables can be tracked and managed. In configuration, topology management issues are even more important in the context of mobile ad hoc networks (MANETs). In this review paper, we focus on three routing protocols and discussed it in related works. Then we compare these three protocols and derive at our new hybrid protocol for MANETs.

Collaboration


Dive into the Rosilah Hassan's collaboration.

Top Co-Authors

Avatar

Amjed Sid Ahmed

National University of Malaysia

View shared research outputs
Top Co-Authors

Avatar

Mahamod Ismail

National University of Malaysia

View shared research outputs
Top Co-Authors

Avatar

Abdulmalek Al-Hemyari

National University of Malaysia

View shared research outputs
Top Co-Authors

Avatar

Sabri Saeed

National University of Malaysia

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Zahian Ismail

National University of Malaysia

View shared research outputs
Top Co-Authors

Avatar

Maha Abdelhaq

National University of Malaysia

View shared research outputs
Top Co-Authors

Avatar

Samer Sami Hasan

National University of Malaysia

View shared research outputs
Top Co-Authors

Avatar

Dahlila Putri Dahnil

National University of Malaysia

View shared research outputs
Top Co-Authors

Avatar

Haslina Arshad

National University of Malaysia

View shared research outputs
Researchain Logo
Decentralizing Knowledge