أنت هنا

1. Information Sharing In Vehicular Ad-hoc Network
 
Authors: Aneel Rahim, Zeeshan Shafi Khan, Fahad Bin Muhaya, Muhammad Sher, Muhammad Khurram
Journal: International Journal of Computers, Communications & Control
Date: March, 2010 (Accepted)
Abstract: Relevance Technique broadcast the useful information and removes the redundant data. 802.11e protocol implementation has certain flaws and is not suitable for VANETs scenarios. Main issue in 802.11e protocol is internal sorting of packets, no priority mechanism within the queues and often lower priority traffic get more medium than high priority traffic. In this paper, the mathematical model of relevance scheme is enhanced so that it can consider the network control in real scenario by considering the impact of malicious node in network. Problems of 802.11e protocol can be resolved by making virtual queue at application level. We analyze the comparison of simple virtual queue with the over all impact of virtual queue and mathematical model. Similarly we compare the mathematical model with over all impact of virtual queue and modified mathematical model using NS-2 simulator.
Index:

covered/indexed/abstracted in:

  
 
2. Enhanced Relevance Based Approach for Network Control
 
Authors: Aneel Rahim, Fahad Bin Muhaya, Zeeshan Shafi , M.A. Ansari, Muhammad Sher
Journal: Informatica
Date: Feb 2010 (Accepted)
Abstract: imple flooding, probabilistic approach, area based scheme, knowledge based approach and Multi hop Vehicular broadcast is not suitable for VANETs scenario because of its dynamic nature. Relevance scheme is proposed to disseminate the relevant message for sharing in VANETs and discards the redundant messages from the network and improves the over all performance of network. The relevance based approach does not provide network control and it only broadcast user traffic.  This paper presents an improvement in mathematical model to consider the network control. Simulations using NS-2 show that proposed mathematical model consider the network control and improve the global benefit.
Index:
  • ACM Digital Library
  • Citeseer
  • COBISS
  • Compendex
  • Computer & Information Systems Abstracts
  • Computer Database
  • Computer Science Index
  • DBLP Computer Science Bibliography
  • Directory of Open Access Journals
  • Google Scholar
  • InfoTrac OneFile
  • Inspec
  • Linguistic and Language Behaviour Abstracts
  • Mathematical Reviews, MatSciNet, MatSci on SilverPlatter and Current Mathematical Publications
  • Scopus
  • Zentralblatt Math
  
 
3. Performance evaluation of broadcast techniques in VANETs
 
Authors: Aneel Rahim, Fahad Bin Muhaya, Muhammad Sher, Zeeshan Shafi, Imran. Ahmad
Journal: Indian Journal of Science and Technology
Date: Oct 2009
Abstract: Broadcast is mainly used in VANETs for communication intended to reduce collision, contention, redundant messages and hidden node problem. It also improves the message reliability. But there is no comprehensive analysis and performance evaluation of broadcast exists. In this paper we briefly discuss the existing broadcast techniques their pros and cons in sparse and dense network. Thereafter we also measure the performance of broadcast schemes with help of NS-2 simulator in VANETs scenario.
Index: Master Journal List (ISI Thomson Reuters Scientific)
  
  
4. Realization of Call-Back Authentication (CBA) for Secure Web to Cellular Phone SMS Communication.
 
Authors: Zeeshan Shafi Khan, Khalid Rashid, Fahad Bin Muhaya, Qutbuddin, Aneel Rahim
Journal: Computers and Mathematics with Applications
Date: In Press 25 Feb, 2010
Abstract: In order to provide essential data services, the cellular networks have opened interface with Internet enabling communication with the users beyond the coverage of their wireless signals across the globe. Besides economical expansion of the global system for mobile communication (GSM) services, this interface has given birth to new security challenges. Especially recent research has divulged that an adversary equipped with little more than a cable modem can block all voice communication in a metropolitan area or even in entire country of the size of USA by sending enormous short message service (SMS) traffic via Internet. To overcome this threat in particular and other client server communication problems in general, a new secure protocol, Call-Back Authentication (CBA), for web to phone SMS communication is proposed. The protocol introduces two-tier server architecture and pulls data traffic control (PDTC) mechanism for secure communication. The protocol is aimed to throat-knot malicious traffic at GSM Internet interface gateway. The results show that the CBA protocol secures all GSM services from Internet originated SMS floods. Moreover the authentication mechanism of the CBA protocol identifies and blocks the spoofed as well as the zombie requests. The CBA server requires lesser resources to deliver SMS as compared to existing mechanism.
Index: SCIE
  
  
5. Speeding up Elliptic Curve Cryptography Computations By  Adopting Edwards Curves Over GF(p)
 
Authors: Lo’ai Tawalbeh, Qasem Abu AL-Haija, Adnan Gutub, Fahad Bin muhaya
Journal: International Journal of Security (IJS), Malaysia
Date: 2010
Abstract:

The Modular Inversion (Division By Modulus) operation which is known as a very long-time operation that performed by the processor considered as the main arithmetic operation of Elliptic Curve Cryptography (ECC). Many solutions tried to decrease the cost of the inversion operations for ECC Cryptosystem over Galios Field (GF(p)) problem. Many of these hardware algorithms used different projective coordinates which eliminated the GF(p) inversion problem by converting it to several multiplication operations where it was found that these several multiplications can be implemented in some parallel fashion to obtain maximum gain. In this work, we will study Edwards projective coordinates systems over GF(p) to perform ECC doubling operation by using parallel multipliers to obtain maximum parallelism to achieve higher performance.