Search For:

Displaying 1-21 out of 21 total
Intrusion Detection in Wireless Sensor Networks: The S-Model Learning Automata Approach
Found in: Wireless and Mobile Computing, Networking and Communication, IEEE International Conference on
By Sudip Misra, Kiran Isaac Abraham, Mohammad S. Obaidat, P. Venkata Krishna
Issue Date:October 2008
pp. 603-607
In this paper, we address the problem of intrusion detection in Wireless Sensor Networks (WSNs) using a Learning Automata (LA)-based approach.??We are not aware of any LA-based intrusion detection systems (IDSs) solutions for WSNs. Additionally, the S-mode...
 
An Efficient Approach for Location Updating in Mobile Ad Hoc Networks
Found in: Simulation Symposium, Annual
By Sanjay K. Dhurandher, Sudip Misra, Namit Nangia, Nitin Bhardwaj, Pankaj Goyal, Sumit Aggarwal, Mohammad S. Obaidat
Issue Date:April 2008
pp. 61-67
In this paper, we consider the problem of location updating in mobile ad-hoc networks (MANETs). We propose a node stability-based location updating approach. In order to optimize the routing, most of the existing routing algorithms use some mechanism for d...
 
A Novel Scheme for Traffic Monitoring in Optical Burst-Switched Networks
Found in: Computer Systems and Applications, ACS/IEEE International Conference on
By Amor Lazzez, Noureddine Boudriga, Mohammad S. Obaidat
Issue Date:May 2007
pp. 266-273
Optical Burst Switching (OBS) technology offers a promising solution for the next generation Internet backbone. One of the main aspects in the deployment of OBS services is the development of an optical traffic/performance monitoring scheme allowing the pr...
 
A QoS-Oriented Protocol for Burst Admission Control in OBS Networks
Found in: Computer Systems and Applications, ACS/IEEE International Conference on
By Amor Lazzez, Noureddine Boudriga, Mohammad S. Obaidat, Sihem Guemara El Fatmi
Issue Date:May 2007
pp. 172-179
Among the promising solutions for next generation Internet backbones, one can consider the optical burst switching (OBS) technology. One of the main aspects in the design of optical burst-switched networks is the development of a burst admission control pr...
 
Congestion Avoidance Mechanism for Optical Label Switched Networks: A Dynamic QoS-based Approach
Found in: Computer Systems and Applications, ACS/IEEE International Conference on
By Yassine Khlifi, Noureddine Boudriga, Mohammad S. Obaidat
Issue Date:May 2007
pp. 233-240
Optical Label Switching (OLS) has been proposed as a promising technology for providing fast switching capabilities, resource provisioning and quality of service (QoS) support. In this paper, we address the issue of providing congestion avoidance in OLS ne...
 
Admission Control in Optical Label Switched Networks: A Dynamic QoS-Based Approach
Found in: Simulation Symposium, Annual
By Yassine Khlifi, Noureddine Boudriga, Mohammad S. Obaidat, Sihem Guemara-ElFatmi
Issue Date:March 2007
pp. 106-113
Optical Label Switching (OLS) is a promising technology that can provide ressource provisioning and quality of service (QoS) support. In OLS networks, admission control can be implemented using control protocols that handle signaling tasks, resource provis...
 
An Efficient and Secure Routing Protocol for Wireless Sensor Networks Using Multicasting
Found in: IEEE-ACM International Conference on Green Computing and Communications and International Conference on Cyber, Physical and Social Computing
By Sanjay K. Dhurandher, Mohammad S. Obaidat, Gaurav Jain, Isha Mani Ganesh, Vinay Shashidhar
Issue Date:December 2010
pp. 374-379
Recent technological advancements in the field of nanotechnology have increased the computation power of the wireless nodes while adhering to the energy constraints. This has made the use of the Wireless Sensor Networks (WSNs), more widespread, used in app...
 
Simulating Peer-to-Peer networks
Found in: Computer Systems and Applications, ACS/IEEE International Conference on
By Sanjay K. Dhurandher, Sudip Misra, Mohammad S. Obaidat, Inderpreet Singh, Raghu Agarwal, Bhuvnesh Bhambhani
Issue Date:May 2009
pp. 336-341
The Gnutella protocol of Peer-to-Peer (P2P) networks has undergone several changes since its inception in the beginning of this century. However, despite the large number of revisions to the original version of the protocol, Gnutella suffers from serious p...
 
A quality of service scheduling technique for optical LANs
Found in: Computer Systems and Applications, ACS/IEEE International Conference on
By Panagiotis G. Sarigiannidis, Sophia G. Petridou, Georgios I. Papadimitriou, Andreas S. Pomportsis, Mohammad S. Obaidat
Issue Date:May 2009
pp. 472-477
Quality of Service (QoS) support has become a key factor in designing Media Access Control (MAC) protocols. This paper introduces a novel scheduling scheme which supports priority based QoS in Wavelength Division Multiplexing (WDM) star networks. The propo...
 
Intelligent Agents on the Web: A Review
Found in: Computing in Science and Engineering
By Noureddine Boudriga, Mohammad S. Obaidat
Issue Date:July 2004
pp. 35-42
Intelligent agents are goal-driven and autonomous, and can communicate and interact with each other. Moreover, they can evaluate information obtained online from heterogeneous sources and present information tailored to an individual's needs. This article ...
 
Design and Implementation of a Fault Tolerant Multiple Master Cloud Computing System
Found in: International Conference on Internet of Things and International Conference on Cyber, Physical and Social Computing
By Mohammad S. Obaidat,Harsh Bedi,Aashish Bhandari,M.S. Don Bosco,Ankur Maheshwari,Sanjay K. Dhurandher,Isaac Woungang
Issue Date:October 2011
pp. 82-88
Today the applications of computing machines have outreached domains such as quantum physics, weather forecasting, or molecular biology, to name a few. Distributed computing systems provide a solution to meet the huge computational requirements by combinin...
 
A Learning Automata Based Solution for Preventing Distributed Denial of Service in Internet of Things
Found in: International Conference on Internet of Things and International Conference on Cyber, Physical and Social Computing
By Sudip Misra,P. Venkata Krishna,Harshit Agarwal,Antriksh Saxena,Mohammad S. Obaidat
Issue Date:October 2011
pp. 114-122
Internet of Things (IoT) refers to the networked interconnection of everyday objects. IoT is an upcoming research field and is being regarded as the revolution in the world of communication because of its extensible applications in numerous fields. Due to ...
 
Combining Mouse and Keystroke Dynamics Biometrics for Risk-Based Authentication in Web Environments
Found in: 2012 4th International Conference on Digital Home (ICDH)
By Issa Traore,Isaac Woungang,Mohammad S. Obaidat,Youssef Nakkabi,Iris Lai
Issue Date:November 2012
pp. 138-145
Existing risk-based authentication systems rely on basic web communication information such as the source IP address or the velocity of transactions performed by a specific account, or originating from a certain IP address. Such information can easily be s...
 
Time Stamp-Based Algorithm for Task Scheduling in a Distributed Computing System with Multiple Master Multiple Slave Architecture
Found in: International Conference on Internet of Things and International Conference on Cyber, Physical and Social Computing
By Sanjay K. Dhurandher,Ankit Aggarwal,Aashish Bhandari,Abhishek Verma,Mohammad S. Obaidat,Isaac Woungang
Issue Date:October 2011
pp. 67-73
Distributed computing provides solution to fundamental requirement of high computational capacity for numerous complex problems in the fields of quantum physics, weather forecasting, and molecular biology. This computational ability is the result of combin...
 
Detection of Identity-Based Attacks in Wireless Sensor Networks Using Signalprints
Found in: IEEE-ACM International Conference on Green Computing and Communications and International Conference on Cyber, Physical and Social Computing
By Sudip Misra, Ashim Ghosh, A. P. Sagar P., Mohammad S. Obaidat
Issue Date:December 2010
pp. 35-41
A number of green technologies such as Smart Power Grids, Smart Buildings, Smart Industrial Process and Smart Transportation rely on sensor technology. Sensor networks consist of a network of autonomous sensors that can reconfigure themselves so as to sens...
 
A novel Geocast technique with hole detection in underwater sensor networks
Found in: Computer Systems and Applications, ACS/IEEE International Conference on
By Sanjay K. Dhurandher, Mohammad S. Obaidat, Megha Gupta
Issue Date:May 2010
pp. 1-8
Most of the work on geocasting has been done for mobile ad-hoc networks and vehicular ad-hoc networks. This paper presents a novel Geocast technique with the hole detection in the geocast region for underwater environment. The proposed model named as Routi...
 
Predictive multi-hop stable routing in Vehicular Ad Hoc Networks
Found in: Computer Systems and Applications, ACS/IEEE International Conference on
By Sanjay K. Dhurandher, Mohammad S. Obaidat, Pulkit Jindal, Rajneesh Chavli, Sanchit Valecha
Issue Date:May 2010
pp. 1-6
The past few years have observed vehicular networks becoming increasingly important in order to exchange information between stationary or moving vehicles. The information exchanged can range from warning messages in case of accidents that have occurred on...
 
An adaptive learning-like solution of random early detection for congestion avoidance in computer networks
Found in: Computer Systems and Applications, ACS/IEEE International Conference on
By Sudip Misra, B. John Oommen, Sreekeerthy Yanamandra, Mohammad S. Obaidat
Issue Date:May 2009
pp. 485-491
In this paper, we<sup>1</sup> present an Adaptive Learning (specifically, Learning Automata) Like (LAL) mechanism for congestion avoidance in wired networks. Our algorithm, named as Learning Automata Like Random Early Detection (LALRED), is fou...
 
Adaptive learning solution for congestion avoidance in wireless sensor networks
Found in: Computer Systems and Applications, ACS/IEEE International Conference on
By Sudip Misra, Vivek Tiwari, Mohammad S. Obaidat
Issue Date:May 2009
pp. 478-484
One of the major challenges in wireless sensor network (WSN) research is to curb down congestion in the network's traffic, without compromising with the energy of the sensor nodes. In this work, we address the problem of congestion in the nodes of a WSN us...
 
An efficient 802.11 medium access control method and its simulation analysis
Found in: Computer Systems and Applications, ACS/IEEE International Conference on
By P. Venkata Krishna, Mohammad S. Obaidat, Sudip Misra, V. Saritha
Issue Date:May 2009
pp. 330-335
This paper presents a technique called as Virtual Back off Algorithm (VBA), based on the sequencing technique for efficient media access control. The proposed method minimizes the number of collisions as well as reduces delays during back off periods. We p...
 
QDV: A Quality-of-Security-Based Distance Vector Routing Protocol for Wireless Sensor Networks Using Ant Colony Optimization
Found in: Wireless and Mobile Computing, Networking and Communication, IEEE International Conference on
By Sanjay Kumar Dhurandher, Sudip Misra, Mohammad S. Obaidat, Nidhi Gupta
Issue Date:October 2008
pp. 598-602
In wireless sensor networks (WSNs), message security is an important concern. The protection of integrity and confidentiality of information and the protection from unauthorized access are important issues. However, due to factors such as resource limitati...
 
 1