Magdy S. El-Soudani

Learn More
— In this paper, we are concerned of a particularly severe security attack that affects the ad hoc networks routing protocols, it is called the wormhole attack. We can think of wormhole attack as a two phase process launched by one or several malicious nodes. In the first phase, these malicious nodes, called wormhole nodes, try to lure legitimate nodes to(More)
Ad hoc networks have many features that make them attractive for the use in many applications. However, there are many unsolved problems in ad hoc networks; securing the network being one of the major concerns. The dynamic and cooperative nature of ad hoc networks present substantial challenges in securing these networks. In this paper, we focus on the role(More)
In this article, we investigate to perform spectrum sensing in two stages for a target long-term evolution (LTE) signal where the main objective is enabling coexistence of LTE femtocells with other LTE femto and macrocells. In the first stage, it is required to perform the sensing as fast as possible and with an acceptable performance under different(More)
Wireless sensor networks is a voracious field for research, especially after the great advances in MEMS based sensors. In this paper, environmental monitoring applications are considered where data may be continuously reported with the possibility of urgent alarming if necessary. Hierarchical architecture of the network is assumed in order to overcome the(More)