Sadeq Ali Makram

Learn More
Wireless mesh networks are a special kind of ad hoc networks in which most nodes are static. T he application pu rpose of wireless mesh networks is also different than that of ad hoc networks and is focu sed on b roadb and access serv ices to the I nternet. R ecent stu dies hav e shown that nodes in a wireless mesh network hav e to b e eq u ipped with sev(More)
The aggregate capacity of wireless mesh networks can be improved significantly by equipping each node with multiple interfaces and by using multiple channels in order to reduce the effect of interference. Since the number of available channels is limited, it is desired to allocate and reallocate channels on-demand. In this paper, a Cluster Channel(More)
Future ultra high-speed mobile information and communication technologies will only be successful, if the running applications based on low cost mobile network infrastructure are well developed. In the research cluster of UMIC project under German Excellence Initiatives, we examine scenarios for developing countries and rural areas where the traditional(More)
The threat of possible malicious activities that can be executed by adversaries impedes the rapid deployment of wireless networks. Researchers and scientists have rendered various mechanisms in order to preclude or at least mitigate such activities. Many of these strategies necessitate or presume the presence of a trusted authority to actualize their(More)
Mobile wireless networks have fascinating characteristics of rapid deployment and network connectivity anywhere and anytime. Due to their very nature of being mobile, grievous security issues may arise, for which some homogeneous solutions have already been proposed. However, each node may have its own security requirements depending on the available(More)
Security and privacy threats in technological environment are great hindrances to use latest technologies for our benefits. Such threats also exist in RFID systems which are currently utilized to a great extent in ubiquitous communication. These systems can also work in combination with cellular networks to control user's physical objects in a secure way(More)