Search Results - "Hasbullah, Halabi"
-
1
ZGLS: a novel flat quorum-based and reliable location management protocol for VANETs
Published in Wireless networks (01-08-2018)“…In location management services, a destination advertises its position attributes to a set of vehicles called location servers while, a source obtains these…”
Get full text
Journal Article -
2
Correction to: ZGLS: a novel flat quorum-based and reliable location management protocol for VANETs
Published in Wireless networks (01-02-2019)“…The original version of this article contained an error in co-author’s affiliation. The correct affiliation of Dr. Waqas Rehan is given in this erratum…”
Get full text
Journal Article -
3
A TOTP-Based Enhanced Route Optimization Procedure for Mobile IPv6 to Reduce Handover Delay and Signalling Overhead
Published in TheScientificWorld (01-01-2014)“…Due to the proliferation of handheld mobile devices, multimedia applications like Voice over IP (VoIP), video conferencing, network music, and online gaming…”
Get full text
Journal Article -
4
Sleep/wake scheduling scheme for minimizing end-to-end delay in multi-hop wireless sensor networks
Published in EURASIP journal on wireless communications and networking (09-09-2011)“…We present a sleep/wake schedule protocol for minimizing end-to-end delay for event driven multi-hop wireless sensor networks. In contrast to generic…”
Get full text
Journal Article -
5
An Energy Efficient Simultaneous-Node Repositioning Algorithm for Mobile Sensor Networks
Published in TheScientificWorld (01-01-2014)“…Recently, wireless sensor network (WSN) applications have seen an increase in interest. In search and rescue, battlefield reconnaissance, and some other such…”
Get full text
Journal Article -
6
Distributed vertical handover management for wireless mesh networks
Published in 2012 18th IEEE International Conference on Networks (ICON) (01-12-2012)“…Operators and wireless internet service providers are increasingly using Wireless Mesh Networks (WMN) to offer Internet connectivity, as it allows fast, easy…”
Get full text
Conference Proceeding -
7
Energy efficient and QoS aware routing protocol for Clustered Wireless Sensor Network
Published in Computers & electrical engineering (01-11-2013)“…In this paper, a protocol called Energy Efficient and QoS aware Routing (EEQR) protocol for Clustered Wireless Sensor Network is proposed. To ensure QoS for…”
Get full text
Journal Article -
8
Bloom-filter based IP-CHOCK detection scheme for denial of service attacks in VANET
Published in Security and communication networks (25-03-2015)“…ABSTRACT Vehicular ad hoc networks (VANETs) have drawn increasing attention in recent years due to their wide range of applications. At the present time,…”
Get full text
Journal Article -
9
Prevention of DoS Attacks in VANET
Published in Wireless personal communications (01-11-2013)“…Privacy and Security have become an indispensable matter of attention in the Vehicular Ad-Hoc Network, which is vulnerable to many security threats these days…”
Get full text
Journal Article -
10
Corona based deployment strategies in wireless sensor network: A survey
Published in Journal of network and computer applications (01-04-2016)Get full text
Journal Article -
11
Localized motion-based connectivity restoration algorithms for wireless sensor and actor networks
Published in Journal of network and computer applications (01-03-2012)“…In wireless sensor and actor networks maintaining inter-actor connectivity is very important in mission-critical applications where actors have to quickly plan…”
Get full text
Journal Article -
12
Effects of attackers and attacks on availability requirement in vehicular network: A survey
Published in 2014 International Conference on Computer and Information Sciences (ICCOINS) (01-06-2014)“…Availability is one of the key security requirements in vehicular network. The purpose of vehicular network is to serve the user with its potential…”
Get full text
Conference Proceeding -
13
Using TPM to ensure security, trust and privacy (STP) in VANET
Published in 2015 5th National Symposium on Information Technology: Towards New Smart World (NSITNSW) (01-02-2015)“…Safety and non-safety applications of VANET provides solutions for road accidents in current traffic system. Security is one of the key research area for…”
Get full text
Conference Proceeding -
14
Minimizing discovery time in bluetooth networks using localization techniques
Published in 2010 International Symposium on Information Technology (01-06-2010)“…Bluetooth is a short range wireless communication protocol. However, the discovery process to establish connection in Bluetooth network is very time consuming…”
Get full text
Conference Proceeding -
15
Performance comparison of end-to-end mobility management protocols for TCP
Published in Journal of network and computer applications (01-11-2012)“…Mobility management for TCP connections has been discussed in literature since last several years. Many mobility management solutions have been proposed…”
Get full text
Journal Article -
16
Strategy for efficient routing in VANET
Published in 2010 International Symposium on Information Technology (01-06-2010)“…Flooding is a commonly used technique to transmit packets of data from a source to one or multiple destinations over a network topology of VANET. However,…”
Get full text
Conference Proceeding -
17
Quality of service metrics using generalized Pareto distribution
Published in 2010 International Symposium on Information Technology (01-06-2010)“…Computer networks are becoming an important aspect of our life. More users are competing for limited resources; degradation in the quality of service is thus…”
Get full text
Conference Proceeding -
18
Prevention of DoS Attacks in VANET: Privacy, Security and Trust for Mobile Systems
Published in Wireless personal communications (2013)Get full text
Journal Article -
19
Dynamic relay management protocol for efficient inter-piconet scheduling in Bluetooth scatternet
Published in Computers & electrical engineering (01-05-2012)“…[Display omitted] ► DRM reduces unnecessary relays and assigns them the special role as backup relays. ► Backup relays are activated to resolve the bottleneck…”
Get full text
Journal Article -
20
New card based scheme to ensure security and trust in vehicular communications
Published in 2011 Saudi International Electronics, Communications and Photonics Conference (SIECPC) (01-04-2011)“…Potential safety and non safety applications of vehicular network provide solutions to current traffic system. Dynamic topology of the vehicular communication…”
Get full text
Conference Proceeding