Mohammad Salam - Academia.edu (original) (raw)

Papers by Mohammad Salam

Research paper thumbnail of Enhancing Routing Protocol for Wireless Sensor Network to Advance Network Lifetime

International Journal of Wireless & Mobile Networks, 2020

In wireless sensor networks, nodes are operated by batteries. To keep the network alive for a lon... more In wireless sensor networks, nodes are operated by batteries. To keep the network alive for a long time, it is crucial that we maintain battery life. There are many proposals on how to preserve the battery life. In this research, we focus on the routing protocols to prolong the network lifetime. Our proposed protocol is based on two basic protocols, namely, LEACH (Low-Energy Adaptive Clustering Hierarchy) and PEGASIS (Power Efficient Gathering in Sensor Information System). The proposed method compared favorably with these two basic protocols and our previously proposed cluster-based protocol in terms of network lifetime.

Research paper thumbnail of Error Performance of JPEG and Watermark Authentication Techniques in Wireless Sensor Network

International Journal of Security, Privacy and Trust Management, 2014

Wireless sensor network (WSN) iscomposed of tiny sensors and they are powered by energy-constrain... more Wireless sensor network (WSN) iscomposed of tiny sensors and they are powered by energy-constraint battery. The continual need to utilize limited bandwidth to absorb most of the packets has led to a great deal of research in the field of data compression. WSN has been exploited to balance the maintenance of readable information content with acceptable error and the cost of energy consumed by the collecting nodes during the compression. In this paper, we compared two compression techniques: JPEGand watermark authentication. We applied both techniques and used error measurement to indicate system performance regardless of the number of execution instructions. Wefound that it is not enough to use errormeasurement onlybut the number of executing instructions must also beconsidered. The digital watermark approach showed a lower average error compared to JPEGapproach. However, there were fewer instructions in the JPEG approach compared towatermark approach.

Research paper thumbnail of Referencing Tool for Reputation and Trust in Wireless Sensor Networks

International journal of Computer Networks & Communications, 2015

Presently, there are not many literatures on the characterization of reputation and trust in wire... more Presently, there are not many literatures on the characterization of reputation and trust in wireless sensor networks (WSNs) which can be referenced by scientists, researchers and students. Although some research documents include information on reputation and trust, characterization of these features are not adequately covered. In this paper, reputation and trust are divided into various classes or categories and a method of referencing the information is provided. This method used results in providing researchers with a tool that makes it easier to reference these features on reputation and trust in a much easier way than if referencing has to be directed to several uncoordinated resources. Although the outcome of this work proves beneficial to research in the characterization of reputation and trust in WSNs, more work needs to be done in extending the benefits to other network systems.

Research paper thumbnail of Characterization of Directed Diffusion Protocol in Wireless Sensor Network

International Journal of Wireless & Mobile Networks, 2014

Wireless sensor network (WSN) has enormous applications in many places for monitoring the environ... more Wireless sensor network (WSN) has enormous applications in many places for monitoring the environments of importance. Sensor nodes are capable of sensing, computing, and communicating. These sensor nodes are energy constraint and operated by batteries. Since energy consumption is an important issue of WSN, there have been many energy-efficient protocols proposed for the WSN. Directed diffusion (DD) is a datacentric protocol that focuses on the energy efficiency of the networks. Since the first proposal of DD protocol by Deborah, there have been various versions of DD protocols proposed by many scientists across the globe. These upgraded versions of DD protocols add on various features to the original DD protocol such as energy, scalability, network lifetime, security, reliability, and mobility. In this paper, we discuss and classify various characteristics of themost populardirected diffusion protocols that have been proposed over couple of years.

Research paper thumbnail of Machine Learning Based Attack Detection in Internet of Things Network

In recent years, the Internet of Things (IoT) has grown up rapidly and tremendously. This growth ... more In recent years, the Internet of Things (IoT) has grown up rapidly and tremendously. This growth has brought big and special problems. Two of the urgent topics of problems are security and privacy for IoT devices. Those devices are creating and gathering all data in their connections. For the security of IoT, detection of anomaly attacks is the first and crucial point for avoiding any interruption in the connection. Machine Learning algorithms have been rising and improving substantially year by year. Many classic tests can detect many attacks in the current time. However, those techniques are not enough for security since the types of attacks are changing and getting stronger frequently. In this study, we propose that how to detect a maximum number of attacks in IoT networks by applying machine learning techniques, especially K-Nearest Neighbors (KNN), Logistic Regression (LR), and Random Forest (RF) models. Dataset is presumably one of the most important starting points for the us...

Research paper thumbnail of A Novel Characterization of Distributed Sensor Networks within the DoD

Distributed sensor networks (DSN) within the DoD are motivated by a need for pervasive and persis... more Distributed sensor networks (DSN) within the DoD are motivated by a need for pervasive and persistent military surveillance, as addressed in Navy DoD guidance documents [1, 2, 3, 4, 5, 6, 7]. Previous studies [8, 9] have sought to characterize DSNs based on various attributes, taxonomies, and design spaces from more of a theoretical perspective. This paper differs from previous studies by focusing on the establishment and use of measurable, orthogonal, design-level, discriminating attributes (discriminators) for classifying DSNs. DoD and non-DoD applications are then characterized in light of these discriminators. Senior Navy/DoD leadership and other decision makers interested in understanding the characterization of DSNs within the DoD, will find this paper valuable.

Research paper thumbnail of Dealing with the secure time synchronization and man-in-the-middle attacker in mobile sensor networks

Proceedings of the 50th Annual Southeast Regional Conference, 2012

Wireless sensor networks (WSNs) are resource-constrained self-organizing networks that are often ... more Wireless sensor networks (WSNs) are resource-constrained self-organizing networks that are often deployed in hostile and inaccessible environments in order to collect data. Benign system faults such as malfunctioning hardware, software glitches, and environmental hazards may impact overall system reliability but can often be mitigated by appropriate fault tolerance mechanisms. However, in an adversarial context, more subtle and difficult challenges to reliability can be faced and must be considered. This paper focuses the well-studied man-in-the-middle (MITM) attack problem where an attacker tampers with the characteristics of the network by mediating a link between legitimate nodes that does not have the properties required for correct network operation. This paper develops attack scenarios for unique network topologies, presents a timing and location-based analysis of MITM attack scenarios for each, and characterizes the limits of MITM detectability via timing analysis as a function of distance.

Research paper thumbnail of Cochannel Interference Reduction for CDMA Wireless Communication Systems

Research paper thumbnail of Enhancing Routing Protocol for Wireless Sensor Network to Advance Network Lifetime

International Journal of Wireless & Mobile Networks, 2020

In wireless sensor networks, nodes are operated by batteries. To keep the network alive for a lon... more In wireless sensor networks, nodes are operated by batteries. To keep the network alive for a long time, it is crucial that we maintain battery life. There are many proposals on how to preserve the battery life. In this research, we focus on the routing protocols to prolong the network lifetime. Our proposed protocol is based on two basic protocols, namely, LEACH (Low-Energy Adaptive Clustering Hierarchy) and PEGASIS (Power Efficient Gathering in Sensor Information System). The proposed method compared favorably with these two basic protocols and our previously proposed cluster-based protocol in terms of network lifetime.

Research paper thumbnail of Error Performance of JPEG and Watermark Authentication Techniques in Wireless Sensor Network

International Journal of Security, Privacy and Trust Management, 2014

Wireless sensor network (WSN) iscomposed of tiny sensors and they are powered by energy-constrain... more Wireless sensor network (WSN) iscomposed of tiny sensors and they are powered by energy-constraint battery. The continual need to utilize limited bandwidth to absorb most of the packets has led to a great deal of research in the field of data compression. WSN has been exploited to balance the maintenance of readable information content with acceptable error and the cost of energy consumed by the collecting nodes during the compression. In this paper, we compared two compression techniques: JPEGand watermark authentication. We applied both techniques and used error measurement to indicate system performance regardless of the number of execution instructions. Wefound that it is not enough to use errormeasurement onlybut the number of executing instructions must also beconsidered. The digital watermark approach showed a lower average error compared to JPEGapproach. However, there were fewer instructions in the JPEG approach compared towatermark approach.

Research paper thumbnail of Referencing Tool for Reputation and Trust in Wireless Sensor Networks

International journal of Computer Networks & Communications, 2015

Presently, there are not many literatures on the characterization of reputation and trust in wire... more Presently, there are not many literatures on the characterization of reputation and trust in wireless sensor networks (WSNs) which can be referenced by scientists, researchers and students. Although some research documents include information on reputation and trust, characterization of these features are not adequately covered. In this paper, reputation and trust are divided into various classes or categories and a method of referencing the information is provided. This method used results in providing researchers with a tool that makes it easier to reference these features on reputation and trust in a much easier way than if referencing has to be directed to several uncoordinated resources. Although the outcome of this work proves beneficial to research in the characterization of reputation and trust in WSNs, more work needs to be done in extending the benefits to other network systems.

Research paper thumbnail of Characterization of Directed Diffusion Protocol in Wireless Sensor Network

International Journal of Wireless & Mobile Networks, 2014

Wireless sensor network (WSN) has enormous applications in many places for monitoring the environ... more Wireless sensor network (WSN) has enormous applications in many places for monitoring the environments of importance. Sensor nodes are capable of sensing, computing, and communicating. These sensor nodes are energy constraint and operated by batteries. Since energy consumption is an important issue of WSN, there have been many energy-efficient protocols proposed for the WSN. Directed diffusion (DD) is a datacentric protocol that focuses on the energy efficiency of the networks. Since the first proposal of DD protocol by Deborah, there have been various versions of DD protocols proposed by many scientists across the globe. These upgraded versions of DD protocols add on various features to the original DD protocol such as energy, scalability, network lifetime, security, reliability, and mobility. In this paper, we discuss and classify various characteristics of themost populardirected diffusion protocols that have been proposed over couple of years.

Research paper thumbnail of Machine Learning Based Attack Detection in Internet of Things Network

In recent years, the Internet of Things (IoT) has grown up rapidly and tremendously. This growth ... more In recent years, the Internet of Things (IoT) has grown up rapidly and tremendously. This growth has brought big and special problems. Two of the urgent topics of problems are security and privacy for IoT devices. Those devices are creating and gathering all data in their connections. For the security of IoT, detection of anomaly attacks is the first and crucial point for avoiding any interruption in the connection. Machine Learning algorithms have been rising and improving substantially year by year. Many classic tests can detect many attacks in the current time. However, those techniques are not enough for security since the types of attacks are changing and getting stronger frequently. In this study, we propose that how to detect a maximum number of attacks in IoT networks by applying machine learning techniques, especially K-Nearest Neighbors (KNN), Logistic Regression (LR), and Random Forest (RF) models. Dataset is presumably one of the most important starting points for the us...

Research paper thumbnail of A Novel Characterization of Distributed Sensor Networks within the DoD

Distributed sensor networks (DSN) within the DoD are motivated by a need for pervasive and persis... more Distributed sensor networks (DSN) within the DoD are motivated by a need for pervasive and persistent military surveillance, as addressed in Navy DoD guidance documents [1, 2, 3, 4, 5, 6, 7]. Previous studies [8, 9] have sought to characterize DSNs based on various attributes, taxonomies, and design spaces from more of a theoretical perspective. This paper differs from previous studies by focusing on the establishment and use of measurable, orthogonal, design-level, discriminating attributes (discriminators) for classifying DSNs. DoD and non-DoD applications are then characterized in light of these discriminators. Senior Navy/DoD leadership and other decision makers interested in understanding the characterization of DSNs within the DoD, will find this paper valuable.

Research paper thumbnail of Dealing with the secure time synchronization and man-in-the-middle attacker in mobile sensor networks

Proceedings of the 50th Annual Southeast Regional Conference, 2012

Wireless sensor networks (WSNs) are resource-constrained self-organizing networks that are often ... more Wireless sensor networks (WSNs) are resource-constrained self-organizing networks that are often deployed in hostile and inaccessible environments in order to collect data. Benign system faults such as malfunctioning hardware, software glitches, and environmental hazards may impact overall system reliability but can often be mitigated by appropriate fault tolerance mechanisms. However, in an adversarial context, more subtle and difficult challenges to reliability can be faced and must be considered. This paper focuses the well-studied man-in-the-middle (MITM) attack problem where an attacker tampers with the characteristics of the network by mediating a link between legitimate nodes that does not have the properties required for correct network operation. This paper develops attack scenarios for unique network topologies, presents a timing and location-based analysis of MITM attack scenarios for each, and characterizes the limits of MITM detectability via timing analysis as a function of distance.

Research paper thumbnail of Cochannel Interference Reduction for CDMA Wireless Communication Systems