Hassan Keshavarz

Learn More
Proxy Mobile IPv6 is a network-based localized mobility management protocol that supports mobility without mobile nodes' participation in mobility signaling. The details of user authentication procedure are not specified in this standard, hence, many authentication schemes have been proposed for this standard. In 2013, Chuang et al., proposed an(More)
Delivering Rich User eXperience (RUX) with the current explosion of smartphone as real ubiquitous computing device requires adaptive application architecture. Rich Mobile Application (RMA) is likely the candidate architecture for future mobile applications to deliver rich, immersive experience to the smartphone users. Research and development in domain of(More)
Mobile Ad hoc Networks (MANETs) have opened a new window for fresh ideas and thoughts to be converted to reality and to assist in making better use of mobile communication implemented with mobility models. For instance, Vehicular Ad hoc Networks (VANETs), a subset of MANETs, is used in vehicular connectivity such as Car-to-Car and Car-to-Internet and(More)
It is generally accepted that data encryption is the key role in current and future technologies. Many Public key cryptograph y schemes were presented, divided into different classes depending on a specific mathematical problem. Cryptography plays an i mportant task in accomplishing information security. It is used for encrypting or signing data at the(More)
One of the main criteria in Vehicular Ad hoc Networks (VANETs) that has attracted the researchers' consideration is congestion control. Accordingly, many algorithms have been proposed to alleviate the congestion problem, although it is hard to find an appropriate algorithm for applications and safety messages among them. Safety messages encompass beacons(More)
Since mobile device technology has emerged, users expect to experience more convenience and higher safety in Vehicular Ad Hoc Networks (VANETs). VANETs comprise a special subclass of Mobile Ad Hoc Networks (MANETs). The topology frequently changes, encountering frequent disconnection. Hence, designing a feasible routing protocol is challenging. Such(More)
The advance in wireless technologies and portable devices such as smart phones has made the Wireless Local Area Networks (WLANs) popular in the recent years. Nowadays, WLANs have become widely accepted in both private and public sectors due to ease of installation, reasonable prices and high data rates that can support real time applications. However, fast(More)
Mobile Nodes (MN) in Mobile IPv6 (MIPv6) are given the opportunity to eliminate triangle routing that is inefficient with their own corresponding node (CN) using Route Optimisation (RO). This greatly improves the performance of the network. Unfortunately, using this method allows several security vulnerabilities to manifest itself with the MIPv6. Among(More)
In recent years, Session Initiation Protocol (SIP) has become widely used in current internet protocols. It is a text-based protocol much like Hyper Text Transport Protocol (HTTP) and Simple Mail Transport Protocol (SMTP). SIP is a strong enough signaling protocol on the internet for establishing, maintaining, and terminating session. In this paper the(More)