Magdy S. El-Soudani

Learn More
This paper focuses on the wireless communication aspect of the traffic control problem in urban areas. The IEEE 802.11b standard is used and an architecture is developed that produces zero packet loss at vehicle speeds of up to 60 Km/hr. A quantitative comparison is made between the Mobile Internet Protocol v4 (MIPv4) and MIPv6. It is shown that MIPv6(More)
— In this paper, we are concerned of a particularly severe security attack that affects the ad hoc networks routing protocols, it is called the wormhole attack. We can think of wormhole attack as a two phase process launched by one or several malicious nodes. In the first phase, these malicious nodes, called wormhole nodes, try to lure legitimate nodes to(More)
The dynamic and cooperative nature of ad hoc networks present substantial challenges in securing these networks. There is a natural incentive for nodes to only consume, but not contribute to the services of the system. Intentional misbehavior can aim at an advantage for the misbehaving node or just constitute vandalism, such as enabling a malicious node to(More)
The dynamic and cooperative nature of ad hoc networks presents substantial challenges in securing and detecting attacks in these networks. A particularly severe security attack, called the wormhole attack, has been introduced in the context of ad-hoc networks. During the attack, a malicious node captures packets from one location in the network, and tunnels(More)
sinks besides the fixed sinks in order to reduce the transmission energy. This method can be highly inefficient as the notification of presence by the mobile sink is not guaranteed. An efficient hybrid method for message relaying and load balancing is proposed in low mobility wireless sensor networks. The system uses either a single hop transmission to a(More)
Ad hoc networks can be rapidly deployed and reconfigured. Hence, they are very appealing as they can be tailored to lots of applications. Due to their features they are vulnerable to attacks. A particularly severe security attack, called the wormhole attack, has been introduced in the context of ad-hoc networks. During the attack a malicious node captures(More)
Ad hoc networks have many features that make them attractive for the use in many applications. However, there are many unsolved problems in ad hoc networks; securing the network being one of the major concerns. The dynamic and cooperative nature of ad hoc networks present substantial challenges in securing these networks. In this paper, we focus on the role(More)
The dynamic and cooperative nature of ad hoc networks present challenges in securing these networks. There are recent research efforts in securing ad hoc networks. Amongst security approaches, there are threshold cryptography and authentication. In this paper we survey the threshold cryptography based schemes and the authentication schemes that have been(More)