Sanaa Mohamed Ahmed Taha | Egyptian E Learning University (original) (raw)

Papers by Sanaa Mohamed Ahmed Taha

Research paper thumbnail of Conclusions and Future Directions

SpringerBriefs in computer science, 2013

Research paper thumbnail of Physical-Layer Location Privacy for Mobile Public Hotspots in a NEMO-Based VANET

SpringerBriefs in computer science, 2013

ABSTRACT

Research paper thumbnail of Advanced Framework for Automated Testing of Mobile Applications

Research paper thumbnail of A Physical-Layer Location Privacy-Preserving Scheme for Mobile Public Hotspots in NEMO-Based VANETs

IEEE Transactions on Intelligent Transportation Systems, Dec 1, 2013

Research paper thumbnail of Predicting Brain Tumor using Transfer Deep Learning

International journal of computer applications, Nov 30, 2022

Research paper thumbnail of Anonymous Home Binding Update Scheme for Mobile IPv6 Wireless Networking

Research paper thumbnail of Lightweight Group Authentication with Dynamic Vehicle-Clustering for 5G-Based V2X Communications

For 5G based Vehicle-to-Everything (V2X) communications, it is envisioned that the network latenc... more For 5G based Vehicle-to-Everything (V2X) communications, it is envisioned that the network latency will be dramatically decreased to the extent of 1msec. However, achieving such low latency with high mobility in vehicular networks is a challenge. In this paper, we propose a lightweight group authentication scheme for 5G- based V2X communications using three different vehicles' roles in each cluster: an ordinary vehicle, Cluster Head (CH), and gateway vehicle. To increase cluster connectivity time, our clustering algorithm is developed based on three metrics: cluster's relative velocity, relative position, and received signal strength. The proposed authentication scheme aims to mutually authenticate the vehicle and CH as well as create a shared group key to be used inside the cluster. The security analysis and performance evaluation show that our proposed scheme thwarts inside and outside authentication attacks, and achieves up to 50% less computation overhead than those achieved in the existing schemes.

Research paper thumbnail of A link-layer authentication and key agreement scheme for mobile public hotspots in NEMO based VANET

Research paper thumbnail of Lightweight Privacy-Preserving and Secure Communication Protocol for Hybrid Ad Hoc Wireless Networks

IEEE Transactions on Parallel and Distributed Systems, Aug 1, 2014

Research paper thumbnail of Mixed Network

Research paper thumbnail of Anonymity and Location Privacy for Mobile IP Heterogeneous Networks

Springer eBooks, 2013

In transmitting mobile IPv6 binding update messages, both the mobile node’s (MN) Home Address (Ho... more In transmitting mobile IPv6 binding update messages, both the mobile node’s (MN) Home Address (HoA) and Care of Address (CoA) are transmitted as plain-text, hence they can be revealed by network entities and attackers.

Research paper thumbnail of Secure IP Mobility Management for VANET

Springer eBooks, 2013

The use of general descriptive names, registered names, trademarks, service marks, etc. in this p... more The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. While the advice and information in this book are believed to be true and accurate at the date of publication, neither the authors nor the editors nor the publisher can accept any legal responsibility for any errors or omissions that may be made. The publisher makes no warranty, express or implied, with respect to the material contained herein.

Research paper thumbnail of PMAS: A proposed mutual authentication scheme for wireless body area networks

Wireless Body area Networks (WBANs)- groups of sensors deployed inside a human body- are envision... more Wireless Body area Networks (WBANs)- groups of sensors deployed inside a human body- are envisioned to improve the healthcare domain by continuously monitoring and reporting patient's health to the health care systems. However, the nature of openly deployed sensor nodes, coupled with the lack of security, make it easy for intruders to attack WBANs. In this paper, we propose a new scheme, PMAS, to achieve mutual authentication between a cell phone (personal device representing the sink) and WBANs' sensor nodes. In addition, based on a modified idea of Diffie-Hellman key exchange scheme, we establish a shared secret key between that sink and every sensor node in the network. The security analysis shows that PMAS thwarts different attacks, including the replay, fake sink, fake sensor, and Denial of Service (DOS) attacks. Furthermore, comparing to previous authentication schemes, the computation and communication overheads added by our scheme are much smaller than those in previous schemes.

Research paper thumbnail of Secure and efficient uniform handover scheme for LTE-A networks

Research paper thumbnail of Multihop Mobile Authentication for PMIP Networks

Springer eBooks, 2013

An important requirement for current mobile wireless networks, such as VANETs, is that they be ab... more An important requirement for current mobile wireless networks, such as VANETs, is that they be able to provide ubiquitous and seamless IP communications in a secure way. Moreover, these networks are envisioned to support multihop communications, in which intermediate nodes help to relay packets between two peers in the network. Therefore, in infrastructure-connected multihop mobile networks, the connection from the mobile node (MN) to the point of attachment may traverse multiple hops (Fig. 3.1.

Research paper thumbnail of An anonymous mutual authentication scheme for healthcare RFID systems

Radio Frequency Identification (RFID) is widely deployed nowadays in many applications, such as t... more Radio Frequency Identification (RFID) is widely deployed nowadays in many applications, such as toll road collection, access control, asset tracking, and supply chain, in order to identify, track, and locate mobile objects with high accuracy. However, the RFID tags are vulnerable to anonymity and location privacy threats due to the ID-query replies transmitted from those tags. Accordingly, in this paper and based on keyed hash functions, we propose an anonymous mutual authentication scheme, which achieves anonymity, unlinkability, untraceability, and location privacy for RFID tags. Security analysis shows that our proposed scheme thwarts illicit tracking, replay, relay, Dos, and backward secrecy attacks. Additionally, our scheme can be implemented in healthcare RFID systems because it employs lightweight security operations, and it achieves up to 21% and 84% less communication and communication overheads, respectively, compared to those in current anonymous authentication schemes.

Research paper thumbnail of Fake point location privacy scheme for mobile public hotspots in NEMO based VANET

Research paper thumbnail of A novel secured traffic monitoring system for VANET

There is a growing need for Vehicular Ad-hoc Networks (VANETs), in which vehicles communicate wit... more There is a growing need for Vehicular Ad-hoc Networks (VANETs), in which vehicles communicate with each other (i. e., Vehicle to Vehicle, V2V) or with the infrastructure (i. e., Vehicle to Infrastructure, V2I) on a wireless basis. This paper presents an improved traffic monitoring system for VANET applications via a proposed security scheme. Specifically, the proposed model analyzes the monitored scene, and automatically generates monitoring reports, which contain the current time, current location, and traffic event type (which may be an accident, crowd, demonstration or protest events). Additionally, two schemes have been proposed: one is detecting vehicle accident using image processing techniques, and the other is detecting both transmitted fake reports about the road and the malicious car's driver, who transmits those fake reports. The security scheme achieves source authentication, data confidentiality, driver anonymity, and non-repudiation security services. Also the monitoring system achieves 85.41% average accuracy and 84.093 msec. average execution time with only 0.011% increase in computation overhead for applying the security scheme.

Research paper thumbnail of Anonymous Home Binding Update Scheme for Mobile IPv6 Wireless Networking

2011 IEEE Global Telecommunications Conference - GLOBECOM 2011

ABSTRACT

Research paper thumbnail of Lightweight Handover Authentication Scheme for 5G-Based V2X Communications

2018 IEEE Global Communications Conference (GLOBECOM), 2018

With the development of 5G-based Vehicle to Everything (V2X) communications, many emerging applic... more With the development of 5G-based Vehicle to Everything (V2X) communications, many emerging applications have been prospered. However, either of them requires V2X communications to provide secure, reliable, and efficient handover authentication with low computation overheads. It becomes extremely challenging when vehicles move with frequent handovers. In this paper, a lightweight handover authentication scheme is proposed for 5G-based V2X communications. Specifically, each vehicle can initially acquire a temporary encrypted identity from a network function virtualization (NFV)-manager in its home public land mobile network (PLMN). This encrypted identity is used to authenticate the vehicle to the new PLMN when a handover occurs. By comparing with two previous schemes, simulation results show that the proposed scheme achieves over 50% less computation overhead than those achieved in both of them, while does not affected the overall network handover latency much. Additionally, the proposed scheme can thwart both inside and outside network attacks well.

Research paper thumbnail of Conclusions and Future Directions

SpringerBriefs in computer science, 2013

Research paper thumbnail of Physical-Layer Location Privacy for Mobile Public Hotspots in a NEMO-Based VANET

SpringerBriefs in computer science, 2013

ABSTRACT

Research paper thumbnail of Advanced Framework for Automated Testing of Mobile Applications

Research paper thumbnail of A Physical-Layer Location Privacy-Preserving Scheme for Mobile Public Hotspots in NEMO-Based VANETs

IEEE Transactions on Intelligent Transportation Systems, Dec 1, 2013

Research paper thumbnail of Predicting Brain Tumor using Transfer Deep Learning

International journal of computer applications, Nov 30, 2022

Research paper thumbnail of Anonymous Home Binding Update Scheme for Mobile IPv6 Wireless Networking

Research paper thumbnail of Lightweight Group Authentication with Dynamic Vehicle-Clustering for 5G-Based V2X Communications

For 5G based Vehicle-to-Everything (V2X) communications, it is envisioned that the network latenc... more For 5G based Vehicle-to-Everything (V2X) communications, it is envisioned that the network latency will be dramatically decreased to the extent of 1msec. However, achieving such low latency with high mobility in vehicular networks is a challenge. In this paper, we propose a lightweight group authentication scheme for 5G- based V2X communications using three different vehicles' roles in each cluster: an ordinary vehicle, Cluster Head (CH), and gateway vehicle. To increase cluster connectivity time, our clustering algorithm is developed based on three metrics: cluster's relative velocity, relative position, and received signal strength. The proposed authentication scheme aims to mutually authenticate the vehicle and CH as well as create a shared group key to be used inside the cluster. The security analysis and performance evaluation show that our proposed scheme thwarts inside and outside authentication attacks, and achieves up to 50% less computation overhead than those achieved in the existing schemes.

Research paper thumbnail of A link-layer authentication and key agreement scheme for mobile public hotspots in NEMO based VANET

Research paper thumbnail of Lightweight Privacy-Preserving and Secure Communication Protocol for Hybrid Ad Hoc Wireless Networks

IEEE Transactions on Parallel and Distributed Systems, Aug 1, 2014

Research paper thumbnail of Mixed Network

Research paper thumbnail of Anonymity and Location Privacy for Mobile IP Heterogeneous Networks

Springer eBooks, 2013

In transmitting mobile IPv6 binding update messages, both the mobile node’s (MN) Home Address (Ho... more In transmitting mobile IPv6 binding update messages, both the mobile node’s (MN) Home Address (HoA) and Care of Address (CoA) are transmitted as plain-text, hence they can be revealed by network entities and attackers.

Research paper thumbnail of Secure IP Mobility Management for VANET

Springer eBooks, 2013

The use of general descriptive names, registered names, trademarks, service marks, etc. in this p... more The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. While the advice and information in this book are believed to be true and accurate at the date of publication, neither the authors nor the editors nor the publisher can accept any legal responsibility for any errors or omissions that may be made. The publisher makes no warranty, express or implied, with respect to the material contained herein.

Research paper thumbnail of PMAS: A proposed mutual authentication scheme for wireless body area networks

Wireless Body area Networks (WBANs)- groups of sensors deployed inside a human body- are envision... more Wireless Body area Networks (WBANs)- groups of sensors deployed inside a human body- are envisioned to improve the healthcare domain by continuously monitoring and reporting patient's health to the health care systems. However, the nature of openly deployed sensor nodes, coupled with the lack of security, make it easy for intruders to attack WBANs. In this paper, we propose a new scheme, PMAS, to achieve mutual authentication between a cell phone (personal device representing the sink) and WBANs' sensor nodes. In addition, based on a modified idea of Diffie-Hellman key exchange scheme, we establish a shared secret key between that sink and every sensor node in the network. The security analysis shows that PMAS thwarts different attacks, including the replay, fake sink, fake sensor, and Denial of Service (DOS) attacks. Furthermore, comparing to previous authentication schemes, the computation and communication overheads added by our scheme are much smaller than those in previous schemes.

Research paper thumbnail of Secure and efficient uniform handover scheme for LTE-A networks

Research paper thumbnail of Multihop Mobile Authentication for PMIP Networks

Springer eBooks, 2013

An important requirement for current mobile wireless networks, such as VANETs, is that they be ab... more An important requirement for current mobile wireless networks, such as VANETs, is that they be able to provide ubiquitous and seamless IP communications in a secure way. Moreover, these networks are envisioned to support multihop communications, in which intermediate nodes help to relay packets between two peers in the network. Therefore, in infrastructure-connected multihop mobile networks, the connection from the mobile node (MN) to the point of attachment may traverse multiple hops (Fig. 3.1.

Research paper thumbnail of An anonymous mutual authentication scheme for healthcare RFID systems

Radio Frequency Identification (RFID) is widely deployed nowadays in many applications, such as t... more Radio Frequency Identification (RFID) is widely deployed nowadays in many applications, such as toll road collection, access control, asset tracking, and supply chain, in order to identify, track, and locate mobile objects with high accuracy. However, the RFID tags are vulnerable to anonymity and location privacy threats due to the ID-query replies transmitted from those tags. Accordingly, in this paper and based on keyed hash functions, we propose an anonymous mutual authentication scheme, which achieves anonymity, unlinkability, untraceability, and location privacy for RFID tags. Security analysis shows that our proposed scheme thwarts illicit tracking, replay, relay, Dos, and backward secrecy attacks. Additionally, our scheme can be implemented in healthcare RFID systems because it employs lightweight security operations, and it achieves up to 21% and 84% less communication and communication overheads, respectively, compared to those in current anonymous authentication schemes.

Research paper thumbnail of Fake point location privacy scheme for mobile public hotspots in NEMO based VANET

Research paper thumbnail of A novel secured traffic monitoring system for VANET

There is a growing need for Vehicular Ad-hoc Networks (VANETs), in which vehicles communicate wit... more There is a growing need for Vehicular Ad-hoc Networks (VANETs), in which vehicles communicate with each other (i. e., Vehicle to Vehicle, V2V) or with the infrastructure (i. e., Vehicle to Infrastructure, V2I) on a wireless basis. This paper presents an improved traffic monitoring system for VANET applications via a proposed security scheme. Specifically, the proposed model analyzes the monitored scene, and automatically generates monitoring reports, which contain the current time, current location, and traffic event type (which may be an accident, crowd, demonstration or protest events). Additionally, two schemes have been proposed: one is detecting vehicle accident using image processing techniques, and the other is detecting both transmitted fake reports about the road and the malicious car's driver, who transmits those fake reports. The security scheme achieves source authentication, data confidentiality, driver anonymity, and non-repudiation security services. Also the monitoring system achieves 85.41% average accuracy and 84.093 msec. average execution time with only 0.011% increase in computation overhead for applying the security scheme.

Research paper thumbnail of Anonymous Home Binding Update Scheme for Mobile IPv6 Wireless Networking

2011 IEEE Global Telecommunications Conference - GLOBECOM 2011

ABSTRACT

Research paper thumbnail of Lightweight Handover Authentication Scheme for 5G-Based V2X Communications

2018 IEEE Global Communications Conference (GLOBECOM), 2018

With the development of 5G-based Vehicle to Everything (V2X) communications, many emerging applic... more With the development of 5G-based Vehicle to Everything (V2X) communications, many emerging applications have been prospered. However, either of them requires V2X communications to provide secure, reliable, and efficient handover authentication with low computation overheads. It becomes extremely challenging when vehicles move with frequent handovers. In this paper, a lightweight handover authentication scheme is proposed for 5G-based V2X communications. Specifically, each vehicle can initially acquire a temporary encrypted identity from a network function virtualization (NFV)-manager in its home public land mobile network (PLMN). This encrypted identity is used to authenticate the vehicle to the new PLMN when a handover occurs. By comparing with two previous schemes, simulation results show that the proposed scheme achieves over 50% less computation overhead than those achieved in both of them, while does not affected the overall network handover latency much. Additionally, the proposed scheme can thwart both inside and outside network attacks well.