Khaled M. Elleithy

Learn More
Wireless sensor networks are facing many challenges such as the limited resource in processing power, storage and energy. The limited energy resource is one of the main challenges facing the security in such networks. This paper aims to improve the current security mechanisms in wireless sensor networks as well as reducing power consumption. LEACH protocol(More)
We deploy BT node (sensor) that offers passive and active sensing capability to save energy. BT node works in passive mode for outdoor communication and active for indoor communication. The BT node is supported with novel automatic energy saving (AES) mathematical model to decide either modes. It provides robust and faster communication with less energy(More)
Null message algorithm is an important conservative time management protocol in parallel discrete event simulation systems for providing synchronization between the distributed computers with the capability of both avoiding and resolving the deadlock. However, the excessive generation of null messages prevents the widespread use of this algorithm. The(More)
In this paper we investigate Chandy-Misra-Bryant Null message algorithm and propose a grouping technique to improve the performance. This technique along with status retrieval which will be explained in detail can improve the performance when compared to the traditional conservative algorithm by Chandy-Misra-Bryant. Null message algorithm is an efficient(More)
This paper introduces the design, implementation, and performance analysis of the scalable and mobility-aware hybrid protocol named boarder node medium access control (BN-MAC) for wireless sensor networks (WSNs), which leverages the characteristics of scheduled and contention-based MAC protocols. Like contention-based MAC protocols, BN-MAC achieves high(More)
Due to the significant growth of video data over the Internet, video steganography has become a popular choice. The effectiveness of any steganographic algorithm depends on the embedding efficiency, embedding payload, and robustness against attackers. The lack of the preprocessing stage, less security, and low quality of stego videos are the major issues of(More)
IEEE 802.11 and Bluetooth, these two operating in the unlicensed 2.4Ghz frequency band are becoming more and more popular in the mobile computing world. The number of devices equipped with IEEE 802.11 and Bluetooth is growing drastically. Result is the number of co-located devices , say within 10meters, grown to a limit, so that it may cause interference(More)