أنت هنا

1. Performance evaluation of video streaming in Vehicular adhoc network
 
Authors: Aneel Rahim, Zeeshan Shafi Khan, Fahad bin Muhaya
Workshop: International Workshop of Wireless and Network Security WNS, Japan
Date: June 23 2010
Abstract: Broadcast is mainly used in VANETs for communication intended to reduce collision, contention, redundant messages and hidden node problem. It also improves the message reliability. But there is no comprehensive analysis and performance evaluation of broadcast exists. In this paper we briefly discuss the existing broadcast techniques their pros and cons in sparse and dense network. Thereafter we also measure the performance of broadcast schemes with help of NS-2 simulator in VANETs scenario.
 
Index: Springer LNCS
  
 
2. A Mechanism for Handling Internal Threats of IMS Based Push to Talk and Push to Multimedia Service
  
Authors: Zeeshan Shafi Khan , Aneel Rahim, Fahad bin Muhaya
Workshop: International Workshop on Advances in Multimedia Security (AIMS 2010),Korea
Date: May 2010
Abstract: Capabilities like Instant Messaging (IM), real-time video transfer and file transfer converts the Push to Talk (PTT) Service into a new one known as Push to Multimedia (PTM). In PTT and PTM an authenticated user can be deleted from the session by the session administrator (initiator). Deletion of an authenticated user by a single authority may results in dispute among the remaining authenticated members. So in this paper we present a distributed mechanism to delete an authenticated user (who starts to act maliciously after authentication) from the ongoing session.  Moreover a user may use the floor for the long period of time. No mechanism is defined to preset the maximum time for the floor use in a single turn. In this paper we also give a mechanism to define the maximum time for floor use at the start of the session. This time can vary from user to user. These features on one side secure the PTT and PTM service and on the other side enrich these services.
 
Index: IEEE
  
 
3. Impact of Malicious Node on Broadcast Schemes
  
Authors: Aneel Rahim, Fahad bin Muhaya
Conference: SecTech 2009
Date: Dec 2009
Abstract: Broadcast is frequently used operation in vehicular adhoc network (VANETs) for sharing traffic, weather, and safety information among vehicles. Relevance based approach forward high priority traffic for information sharing and removes the redundant and surplus messages. The relevance based approach depends upon the intermediate nodes and consider ideal scenario where there is no selfish and malicious node but it is not possible in real life scenario. We in this paper simulate the relevance based approach using NS-2 in a real scenario and consider the impact of malicious node and determine how much throughput of network is affected by malicious node.
 
Index: Springer LNCS
  
 
4. DPMM: A Novel Mobility Model for Delay Tolerant Networks
  
Authors: Fazl-e-Hadi, Fahad Bin Muhaya, Yasir Habib
Conference: IEEE-ICCAE, Singapore
Date: 2010
Abstract: The mobility model is one of the most important factors in the performance evaluations of a mobile ad hoc network (MANET). The Manhattan mobility model has been used to model the node’s mobility, where the movement pattern of mobile node on streets and roads defined by maps. However, DakNet ad hoc network that uses wireless technology to provide digital connectivity among villages, kiosks and private communication devices and between kiosks and a hub (for non-real time internet access) using low-cost WiFi radio transceivers. One typical mobility behavior is geographical restriction movement. To investigate DakNet scenario an underlying realistic mobility model is desired. In this paper, we propose a novel mobility model “Digital Postal Mobility Model” (DPMM), which closely approximates the mobility patterns in DakNet scenario; it models the movement of nodes at pre-defined path and have a set of destinations and also visit all destination. We demonstrate our proposed mobility model by evaluating various MANET routing protocols, including DSR and DSDV, the performance of DPMM is efficient than existing geographical restricted models and NS simulation results shows that the choice of mobility model has significant impact on network performance.
 
Index: IEEE
  
 
5. Secure User Authentication in Multimedia Systems
  
Authors: Fazl-e-Hadi, Fahad Bin Muhaya, Shakir Ullah Shah
Workshop: AIMS, Korea
Date: 2010
Abstract: The security of multimedia systems is becoming extremely important nowadays. The huge growth of multimedia information, in different format with the rise of technology, and services influences the lifestyle of an individual and industry. Despite of recent progress in multimedia information security, accessing the information and online services require username and password which can be captured by shoulder surfing attack. Thus current multimedia authentication systems do not provide adequate security and unscrupulous users are able to use the stolen credentials. This paper discusses existing authentication systems, all authentication factors and describes a general architecture of user authentication. This study proposes the usage of secure authentication system by using Bluetooth technology to make hard shoulder surfing (SS) attack and increase the faith of users by resolving the problem of identity theft.
 
Index: IEEE
  
 
6. On Usage Control of Multimedia Content in and through Cloud Computing  Paradigm
  
Authors: Tamleek Ali, Mohammad Nauman, Fazl-e-Hadi, Fahad bin Muhaya
Conference: IEEE-FutureTech, Korea
Date: 2010
Abstract: Multimedia content dissemination is a complex problem because of the multitude of policy types that providers may wish to associate with their content. There have been quite a few efforts at defining security policies and models which can cater to these types of requirements. Usage control models are the new breed of access control models that allow description of comprehensive policies for usage of protected content. In this paradigm, decisions regarding access to objects is not limited to request time only. It is coupled with the usage of the protected objects and becomes a continuous process carried out in parallel to the usage. The realization of usage control has been a long standing research problem to overcome the issue of loss of control in secure document dissemination. With the emergence of cloud computing, documents are stored in the cloud, the document viewers and editors themselves reside in the cloud and are accessed from thin clients such as browsers. We note that such scenarios provide an ideal opportunity for the realization of usage control for securing the usage of documents based on the stakeholders’ policies. In this paper, we argue for a better realization of different features of the UCON model in the cloud based applications. We propose a robust architecture to provide fine-grained control over usage of protected objects through the use of emerging cloud computing paradigm. We present the design principles for this realization and discuss our prototype implementation of the proposed architecture.
 
Index: IEEE
  
 
7. Secure Multimedia Communication in Wireless Mesh Networks
  
Authors: Fazl-e-Hadi, Fahad Bin Muhaya, Atif Naseer
Conference: Submitted to IEEE-MUE, Philippines
Date: 2010
Abstract: Wireless mesh networks (WMNs) is a new type of network paradigm in which each node is communicates to others to enhance network reliability and performance. Multimedia communication in wireless mesh network is a challenging task. The concept of field based routing (FBR) is gaining the popularity because it uses a little information to route the packets. These routing algorithms are robust, inexpensive and scalable. Authors believe that the FBR is the better choice for the multimedia communication in wireless mesh networks. Because it exchanges little information for building and maintenance of the routing tables. Despite from the robustness and scalability of the FBR it is also prone to different active and passive attacks. In this paper we first study that how multimedia communication can be done using FBR and than take some security measures to eliminate the risk of intruder intervention in such communication. Multimedia FBR and its security has is extensively studied using Omnet++ network simulator for to identify and isolate the malicious node and to prevent the traffic flows from various active and passive attacks.
 
Index: IEEE
  
 
8. Multimedia Information Security Architecture Framework
  
Authors: Heru Susanto and Fahad Bin Muhaya
Workshop: AIMS, Korea
Date: 2010
Abstract: This paper presents a state-of-the-art overview of distinguishable approaches, overview of some writings that have themes and a similar discussion, with the background to provide an overview to the readers of control and things related to multimedia information security, all attempting to define  multimedia information security architecture, followed by a proposition of requirements for multimedia integrated security architecture. Multimedia information security as part of Information security has holistic approach towards the implementation of information security by introducing the concept and model of multimedia security architecture.
 
Index: IEEE
  
 
9. Lip Reading Based Surveillance System
  
Authors: Hanan Mahmoud, Fahad Bin Muhaya, Alaaeldin Hafez
Workshop: AIMS, Korea
Date: 2010
Abstract: In this paper we propose a lip reading recognition technique designed to be a part of a surveillance system and will be used for physical security. The proposed technique would be used for security issues using motion estimation analysis, applying a new five step search block matching algorithm.. The proposed technique is characterized by high speed performance suitable for real time applications. The three-step search (TSS) algorithm has been widely used as the motion estimation technique in some low bit-rate video compression applications, owing to its simplicity and effectiveness. However, TSS uses a uniformly allocated checking point pattern in its first step, which becomes inefficient for the estimation of small motions. The lip recognition technique deemed valuable in fast recognition of lip reading that can be used in security paradigm for real time applications like password entries that are shoulder surfing resilient.
 
Index: IEEE
  
 
10. Semi-Autonomous Link Layer Vulnerability Discovery and Mitigation Dissemination
  
Authors: Ziyad S. Al-Salloum, Stephen D. Wolthusen
Workshop: International Conference on IT Security Incident Management and IT Forensics, Stuttgart
Date: 2009
Abstract: Risk and vulnerability management is a critical task in maintaining any nontrivial network,but made increasingly difficult by the dynamic nature of internetworking, transient connectivity, and the use of virtual machines that are connected intermittently, while both real and virtual hosts may harbor vulnerabilities that must be addressed to protect both the vulnerable host and its environment whether these are known to an organization’s asset database or not. This is particularly critical if a security incident is in progress and the exposure to a vulnerability must be assessed and potentially mitigated as quickly and completely as possible. In this paper we therefore propose a probabilistic discovery and mitigation algorithm traversing a network with only knowledge of the immediate network neighborhood as can be obtained from passive observation of the LLDP protocol to minimize bandwidth consumption in conjunction with persistent agents deployed by the traversal to capture transient or intermittently active nodes and provide an analysis of the algorithm’s efficiency under different topologies and taking into account link failure as well as inconclusive or failed discovery and mitigation operation probabilities.
 
Index: IEEE
  
 
11. Security and Performance Aspects of an Agent-Based Link-Layer Vulnerability Discovery Mechanism
  
Authors: Ziyad S. Al-Salloum, Stephen D. Wolthusen
Workshop: Fourth International ARES Workshop on Secure Software Engineering (SecSE 2010) Poland
Date: 2010
Abstract: The identification of vulnerable hosts and subsequent deployment of mitigation mechanisms such as service disabling or installation of patches is both time-critical and errorprone. This is in part owing to the fact that malicious worms can rapidly scan networks for vulnerable hosts, but is further exacerbated by the fact that network topologies are becoming more fluid and vulnerable hosts may only be visible intermittently for environments such as virtual machines or wireless edge networks. In this paper we therefore describe and evaluate an agentbased mechanism which uses the spanning tree protocol (STP) to gain knowledge of the underlying network topology to allow both rapid and resource-efficient traversal of the network by agents as well as residual scanning and mitigation techniques on edge nodes. We report performance results, comparing the mechanism against a random scanning worm and demonstrating that network immunity can be largely achieved despite a very limited warning interval. We also discuss mechanisms to protect the agent mechanism against subversion, noting that similar approaches are also increasingly deployed in case of malicious code.
 
Index: IEEE
  
 
12. Special Purpose ALU Over GF(pk) Using The {2m -1} Primes For Elliptic Curve Computations
  
Authors: Lo’ai A. Tawalbeh, Fahad Bin Muhaya, Ahmad Qaiser, Wafaa Kanakri
Workshop:  
Date: 2010
Abstract: This work proposes a design for a special purpose ALU to perform the basic arithmetic operations of elliptic curve cryptography (ECC) over the optimal extension field GF(pk). The EEC operation we implement here is the modular addition which could be used with Affine or Jacobean coordinates based ECC cryptosystems. The whole functionality of this design is proposed here in addition to hardware implementation for some portions of the design. The ALU mainly compromises three components: adder, subtractor, and control unit. To make everything concrete, we put firstly a general design, and then we become more specialized in the hardware implementation. The modular adder design is described using VHDL.
 
Index:  
  
 
13. An Approach for the Development of National Information Security Policies
  
Authors: Fahad Bin Muhaya, Saad Haj Bakry
Workshop:  
Date: 2010
Abstract: Information is widely generated, stored, processed and transferred using various information technology (IT) tools including the Internet; and thereby creating what is now widely known as the cyberspace. The security of the cyberspace is both a national and an international issue associated with different levels including: people, enterprises, and governments; and related to various fields concerned with: technical, economic, social and political activities. As a result, interest in the development of sound national information security policies is becoming of increasing importance. This paper aims at providing a comprehensive approach for this development. For this purpose, the paper is divided into two main parts: the first reviews key related issues in order to establish the necessary background for the subject; while the second describes the target approach. The approach has four main dimensions: a structured scope that integrates all the issues concerned; a development process that deals with security requirements on continuous basis; security measures and standards for assessments and benchmarking; in addition to past experience and knowledge sharing for improvements. It is hoped that the approach will become a base for the development and continuous improvement of a national information security policy, not only for Saudi Arabia, but also for other countries.