Learn More
The Internet of Things (IoT) vision foresees a future Internet encompassing the realm of smart physical objects, which offer hosted functionality as services. The role of service discovery is crucial when providing application-level, end-to-end integration. In this paper, we propose trendy: a RESTful web services based Service Discovery protocol to tackle(More)
The design of a network architecture that can efficiently integrate WLAN and cellular networks is a challenging task, particularly when the objective is to make the interoperation between the two networks as seamless and as efficient as possible. To provide end-to-end quality of service (QoS) support is one of the key stages towards such a goal. Due to(More)
We propose, trendy, a new registry-based Service Discovery protocol with context awareness. It uses CoAP-based RESTful web services to provide a standard interoperable interface which can be easily translated from HTTP. In addition, trendy introduces an adaptive timer and grouping mechanism to minimise control overhead and energy consumption. trendy's(More)
Internet traffic congestion control using queue thresholds is a well known and effective mechanism. This motivates the stochastic analysis of a discrete-time queueing systems for the performance evaluation of the active queue management (AQM) based congestion control mechanism called Random Early Detection (RED) with bursty and correlated traffic using a(More)
This paper describes experiments in the State of Qatar to test Qataris' vulnerability to e-mail phishing in reality through two penetration tests. Factors which make Qatari citizens vulnerable to e-mail phishing attacks are identified, such as culture, country-specific factors, interests, beliefs, religion and personal characteristics. It has been found(More)
eceived 4 September 2009 eceived in revised form 10 April 2010 ccepted 13 August 2010 vailable online xxx The question of fairness in wireless sensor networks is not studied very well. It is not unusual to observe in the literature fairness traded for low latency or reliability. However, a disproportional use of some critical nodes as relaying nodes can(More)
In the development of wireless sensor networks (WSNs) applications, how to organize sensors into a wireless communication network and route the sensed data from sensors to a remote sink is a particular challenging problem. Therefore, WSNs need a protocol to route data and prolong the lifetime of sensor networks. The clustering technique is an efficient(More)
Employing effective buffer management schemes at Internet routers has been an increasing important issue in order to guarantee quality of service (QoS) to diverse Internet services. One of its primary goals is to control jitter and latency required by real-time and interactive traffic. Therefore, effectively constraining delay to a specified value is a key(More)
Distributed contention-based Medium Access Control (MAC) protocols are the fundamental components for IEEE 802.11 type Wireless LANs (WLAN). The deficiency of these types of MAC protocols mainly comes from the idle slots used to contend the channel and from the transmission collisions due to the same backoff slot value being generated. Assigning the same(More)