Mohamed A. Abdelshafy

Learn More
MANET routing protocols have many vulnerabilities that may be exploited by malicious nodes to disrupt the normal routing behavior. In this paper, we present a vulnerability analysis of AODV. We simulate four routing attacks to analyse their impacts on AODV protocol using NS-2 network simulator. These attacks are blackhole, grayhole, selfish and flooding(More)
In Mobile ad-hoc network to resolve security or any other issue, broadcasting is the common factor in networking. MANETs is very new concept and gives us to very different direction to the internet and when we use it, it will become reduce the cost of both the network i.e. with infrastructure and infrastructure less networks. Mobile Ad-hoc network not need(More)
OBJECTIVES Trans-rectal ultrasound (TRUS) is a safe, cost-effective, radiation-free imaging modality for evaluation of prostate. But unfortunately, hemospermia is known to be associated with TRUS-guided prostate biopsy. The aim of this study is to measure the incidence and risk factors of hemospermia in patients undergoing TRUS. PATIENTS AND METHODS A(More)
MANET routing protocols are designed based on the assumption that all nodes cooperate without maliciously disrupting the operation of the routing protocol. A large number of attack types of varying severity are threatening MANET. Dynamic Source Routing (DSR) is a well-known reactive MANET routing protocol that does not support security of routing messages.(More)
PURPOSE The aim of this study is to evaluate the role of ureteric stents in relieving obstruction and improvement of kidney function in patients with obstructive uropathy. MATERIALS AND METHODS This study involved 138 patients with obstructive uropathy with age ranged from 2 months to 73 years. Patients classified into two groups: Group (I): Includes 57(More)
MANET routing protocols are designed based on the assumption that all nodes cooperate without maliciously disrupting the operation of the routing protocol. AODV is a reactive MANET routing protocol that is vulnerable to a dramatic collapse of network performance in the presence of blackhole attack. The paper introduces a new concept of Self-Protocol(More)
  • 1