Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Sasan Adibi is active.

Publication


Featured researches published by Sasan Adibi.


Journal of Network and Computer Applications | 2009

Review: Survey of multipath routing protocols for mobile ad hoc networks

Mohammed Tarique; Kemal E. Tepe; Sasan Adibi; Shervin Erfani

This survey investigates multipath routing protocols for mobile ad hoc networks (MANETs). The main objectives of multipath routing protocols are to provide reliable communication and to ensure load balancing as well as to improve quality of service (QoS) of MANETs. These multipath protocols are broadly classified into five categories based on their major goals. The goals are to improve delay, provide reliability, reduce overhead, maximize network life and support hybrid routing. Multipath routing protocols address issues such as multiple paths discovery and maintaining these paths. Issues, objectives, performances, advantages and disadvantages of these protocols are investigated and summarized. A checklist is provided as a guideline so that a network designer can choose an appropriate multipath routing protocol to meet the networks application objectives.


Fourth-generation Wireless Networks: Applications and Innovations | 2009

Fourth-generation Wireless Networks: Applications and Innovations

Sasan Adibi; Amin Mobasher; Tom Tofigh

Fourth-Generation Wireless Networks: Applications and Innovations presents a comprehensive collection of recent findings in access technologies useful in the architecture of wireless networks. Based on research results from academia and industry, this innovative publication covers cutting-edge findings on topics such as 4G security, mobile technologies, and handover mechanisms.


Telematics and Informatics | 2010

A remote interactive non-repudiation multimedia-based m-learning system

Sasan Adibi

One of the current challenges regarding distance learning systems, from a performance point of view, is the efficient and timely delivery of multimedia-enriched learning materials. Providing guaranteed Class of Service (CoS) and Quality of Service (QoS) are also challenging especially for remote sites and rural areas where Internet coverage tends to be limited. On a different note, another challenge is to track the audience accessing the learning materials and more importantly to monitor the true identity of the examination attendees. This paper aims to investigate both of these issues simultaneously, with an introduction of a non-repudiation system that provides a security mechanism, as well as maintaining certain QoS measures. This system not only authenticates the intended party, but also integrates a digital signature scheme accompanied with the transmitted multimedia-based information. The included digital signature prevents a later dispute from the involved parties that the communication ever took place or they ever took part in the communication. Therefore this paper introduces and discusses a multimedia-enriched interactive non-repudiation system involved in a mobile-based learning (m-learning) environment. The performance of this system is considered and discussed in terms of network-centric parameters, including end-to-end delays, overhead, and bandwidth, using Labview 8.5 mobile-transmitter and mobile-receiver testbeds.


international conference of the ieee engineering in medicine and biology society | 2008

On the diversity of eHealth security systems and mechanisms

Sasan Adibi; Gordon B. Agnew

This paper examines the security requirements for eHealth (Electronic Health) records and the provided current and future technological solutions. This includes the Security and Privacy (S&P) requirements for diverse electronic health information, the current frameworks and standards maintaining proper handling (processing, storing, and transmitting) of such sensitive information and the related network architectures.


Iet Communications | 2008

Multilayer flavoured dynamic source routing in mobile ad-hoc networks

Sasan Adibi; Gordon B. Agnew

Dynamic source routing (DSR, introduced in 1996) is one of the most frequently used routing protocols for mobile ad-hoc networks (MANETs). Numerous MANET protocols were created based on DSRs algorithm. In addition to inheriting the overall performance specifications of DSR, these MANET protocols are designed to perform optimised for specific functionality. To name a few, these functionalities include: hierarchical routing, security-aware routing and multipath routing. Such flavoured DSR schemes (X-DSR) are often compared against the original DSR protocol through simulation results. The purpose of this survey is to first introduce DSR in detail, discuss most of the DSR flavours, point out their specific features, and to present a complete survey of the analyses given in the current literature against the original DSR protocol. Following this in-depth discussion, we introduce an X-DSR-aware management architecture, which utilises a multilayer scheme that imports parameters from different layers (network, data-link and physical) and performs current network condition matching compared to the closest pre-defined network condition groups. The output of such a match is the selection of the most optimal routing protocol, which satisfies most of the criteria of the predefined condition group.


world of wireless mobile and multimedia networks | 2010

An application layer non-repudiation wireless system: A cross-layer approach

Sasan Adibi

Non-repudiation techniques are to ensure any communication taking place between two or more parties will be undeniable. Therefore it is crucial to include digital signatures of the involving parties while the communication is taking place. In medical practices, involved parties may include patient(s) and doctor(s) who are involved in series of visits, diagnosis, prescription, possible operation, and etc. To avoid possible conflicts, adding non-repudiation techniques help immensely. This thesis considers this issue in a wireless medium and studies the Quality of Service (QoS)/Security requirements in terms of network parameters and performance metrics [1].


electro information technology | 2006

Security Routing in MANETs - A Comparative Study

Sasan Adibi; Shervin Erfani; Hani Harbi

Mobile-IP ad-hoc networks (MANETs) have gained popularity in the past few years with the creation of variety of ad hoc protocols that specifically offer quality of service (QoS) for various multimedia traffic between mobile nodes (MNs) and base stations (BSs). The lack of proper end-to-end coverage, on the other hand, is a challenging issue as the nature of such networks with no specific infrastructure is prone to relatively more attacks, in variety of forms. The attention of this paper is to overview types of attacks in MANETs and the introduction of two entities; ad-hoc key distribution center (AKDC) and decentralize key generation and distribution (DKGD). Through simulations, the performance of these functional entities is compared to current schemes


International journal of advanced science and technology | 2010

Data mining - A captured wired traffic approach

Sasan Adibi


Archive | 2008

Extensible authentication (EAP) protocol integrations in the next generation cellular networks

Sasan Adibi; Gordon B. Agnew


Archive | 2008

Security Measures for Mobile Ad-Hoc Networks (MANETs)

Sasan Adibi; Gordon B. Agnew

Collaboration


Dive into the Sasan Adibi's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Hani Harbi

United Arab Emirates University

View shared research outputs
Top Co-Authors

Avatar

Mohammed Tarique

American InterContinental University

View shared research outputs
Researchain Logo
Decentralizing Knowledge