Sabariah Baharun - Academia.edu (original) (raw)
Uploads
Papers by Sabariah Baharun
Procedia - Social and Behavioral Sciences, 2012
In Malaysia and also elsewhere in the world the demands for graduates who have employability skil... more In Malaysia and also elsewhere in the world the demands for graduates who have employability skills such as ability to think critically, solve problems and can communicate are highly sought in the workplace. In the early 2006, the development of such skills was recognized as integral goals of undergraduate education at Universiti Teknologi Malaysia. Since then rigorous efforts have been made to inculcate these skills amongst the undergraduates. In this paper, we will share some of our experiences in coping with the ...
Mobility management protocols support mobility for roaming mobile nodes in order to provide seaml... more Mobility management protocols support mobility for roaming mobile nodes in order to provide seamless connectivity. Proxy Mobile IPv6 is a network-based localized mobility management protocol that is more suitable for resource constrained devices among different mobility management schemes. The IETF group standardized this protocol in 2008, and specified in RFC5213 [1]. An authentication procedure, which has a key role to protect the network against different security threats, is not specified in this standard. In the last few years, several authentication methods have been proposed, however, using smart card under the non-tamper resistance assumption has not been considered. In this paper, we discuss possibility of using tamper-proof smart card in Proxy Mobile IPv6 authentication approaches.
With the swift expansion of wireless technologies, demand for radio spectrum is continuously moun... more With the swift expansion of wireless technologies, demand for radio spectrum is continuously mounting. Along with the spectrum scarcity problem, radio spectrums are also underutilized. Cognitive radio practices an open spectrum allocation technique, which can ensure efficient handling of the frequency bands. Suitable network model is a must for the implementation of cognitive radio networks. In this paper, an efficient cluster model for cognitive radio ad-hoc networks is presented using graph theory. The proposed clustering model is defined as a maximum edge biclique problem, where the spatial variations of spectrum availability are considered. This clustering scheme aims to maintain set of free common channels in every cluster, which allows smooth shifting among control channels. A parameter called Cluster Head Determination Factor (CHDF) is also introduced to select cluster-heads where clusters’ operations are coordinated by cluster-heads. Each cluster comprises of a secondary cluster- head to combat the re-clustering issue for mobile nodes. Finally, simulation and comparative studies are conducted to evaluate the performance of the proposed method.
Smart city is a self-sustaining city which will cater to the modern needs of the society where sp... more Smart city is a self-sustaining city which will cater to the modern needs of the society where space, time, energy, transport, the basic needs of sustenance is networked in a smart grid to provide a modern city. Some companies like IBM are supporting this cause to build these future cities for modern day living that will not only reduce carbon foot print but also will be able to take care natural calamities. Using alternative source of energy that will not put stress on nature's resources is the key to a modern city. Not only the modern meant of transport will reduce the carbon footprint like electric vehicles but they will also have to be linked by a smart grid to reduce the traffic on road. Modern means for building like composites have to used that will reduce the need of electricity is a key component for a smart city. The components of a smart city are such as transportation, waste management, water management, e-governance, energy management, industry and business, e-healt...
Jurnal Teknologi, 2015
The Proxy Mobile IPv6 or the PMIPv6 is a protocol for mobile management as established by the Int... more The Proxy Mobile IPv6 or the PMIPv6 is a protocol for mobile management as established by the Internet Engineering Task Force or IETF to assist in the intense usage of mobile devices and to lower the overhead of signaling. As the inclusion of the mobile node in the signaling related to mobility is not necessary, this type of solutions based on networks optimize the performance of the handover based on signaling overhead and handover latency. Nevertheless, the PMIPv6 has several disadvantages such as issues of privacy and security. The process of authentication of users is usually needed at the time of connecting to a wireless network. The mobile users might wander away from their home networks and be approached by other network services. These network services would usually require the users' credentials to authorize the usage of the service. In order to retain a level of anonymity, various degrees of information are required to be safe guarded including the Local Mobility Anchor ID, Media Access Gateway, and Mobile Node. Nevertheless, a few methods of authentication have been suggested to enhance the PMIPv6's performance since 2008 when this protocol was first established [1]; however, the issues of privacy are often ignored. This study attempts to evaluate the authentication methods of the PMIPv6 according to the anonymity of several network mechanisms. The findings of this study reveal that it is important to suggest an appropriate method of enhancing the protection and privacy of network mechanisms.
Jurnal Teknologi, 2015
Mobility management protocols support mobility for roaming mobile nodes in order to provide seaml... more Mobility management protocols support mobility for roaming mobile nodes in order to provide seamless connectivity. Proxy Mobile IPv6 is a network-based localized mobility management protocol that is more suitable for resource constrained devices among different mobility management schemes. In this protocol, all mobility signaling procedures are completed by network entity not mobile node. According to the Proxy Mobile IPv6 architecture, an authentication procedure has a key role to protect the network against different security threats; however, the details of authentication procedure is not specified in this standard. In this paper, different security features are explored to evaluate the authentication protocols in Proxy Mobile IPv6. The existing authentication approaches can be analyzed based on these criteria to find security issues.
2015 12th International Bhurban Conference on Applied Sciences and Technology (IBCAST), 2015
AEU - International Journal of Electronics and Communications, 2014
2013 19th Asia-Pacific Conference on Communications (APCC), 2013
2014 International Conference on Informatics, Electronics & Vision (ICIEV), 2014
ABSTRACT The state of the art of Wireless Sensor Networks (WSNs) has enabled attainment of compli... more ABSTRACT The state of the art of Wireless Sensor Networks (WSNs) has enabled attainment of complicated and challenging applications such as healthcare, traffic control, habitat monitoring, etc.. For the last few years, clustering in WSNs has gained more consideration because of the improved ability of sensor nodes to conserve energy. In a dynamic WSN, clustering consists of two important stages: cluster formation and cluster maintenance. A cluster is formed once a node or a group of nodes join an existing cluster-based network and cluster maintenance is executed to handle node(s)' leaving or even re-joining. In this paper, we investigate cluster formation problems for a dynamic cluster-based WSN. Current dynamic cluster-based WSN supports only single node's joining and/or leaving. We enhance the cluster-based structure by proposing multi-nodes-joining algorithms. We show that the time complexity of the proposed algorithm is expected O(|Q| + |R|) rounds, where R is the set of new nodes wish to join and Q is the set of neighboring nodes of set of new nodes R. We also show some simulation results for the proposed algorithm.
Directed Laplacians For Fuzzy Autocatalytic Set Of Fuzzy Graph Type‐3 Of An Incineration Process.... more Directed Laplacians For Fuzzy Autocatalytic Set Of Fuzzy Graph Type‐3 Of An Incineration Process. [AIP Conference Proceedings 1309, 112 (2010)]. Tahir Ahmad, Sabariah Baharun, Sumarni Abu Bakar. Abstract. Fuzzy Autocatalytic ...
Journal of Mathematical Chemistry, 2010
In this paper we have investigated and explored the realm of fuzzy graph in its relation to autoc... more In this paper we have investigated and explored the realm of fuzzy graph in its relation to autocatalytic sets. A new concept namely fuzzy autocatalytic set have been defined. This relation has produced some results in the forms of theorems which have been proven. A clinical waste incineration process has been modeled using this new concept indicates to be more accurate than using crisp graph.
Matematika, 2009
Structured networks of interacting components are hallmarks of several complex systems and clinic... more Structured networks of interacting components are hallmarks of several complex systems and clinical waste incineration process is an example of such a system. Fuzzy graph theory provides important tools to capture various aspects of complexity, imprecision and fuzziness of the ...
Jurnal Teknologi F, 2005
Incineration is known to be the best available option for treating clinical waste, particularly t... more Incineration is known to be the best available option for treating clinical waste, particularly the pathological related waste. A proper operation of the incinerator is essential to ensure complete destruction of the waste. It is anticipated that variables such as feed rate (waste), both the combustion temperatures of the Primary Combustion Chamber (PCC) and Secondary Combustion Chamber (SCC), fuel and combustion air consumption play a major role in affecting the performance of the incineration process. Particularly, the combustion efficiency (one of the performance indicators) of the incinerator determined by the presence of carbon monoxide and carbon dioxide emission after the SCC must be continuously monitored. In this regard, a study to investigate the relationship between variables affecting the combustion efficiency, namely waste, temperatures and fuel, were performed using regression analysis and further verified by ANOVA. Results showed that waste, primary and secondary combustion temperatures contribute significantly to the combustion efficiency of the process. The correlation between these affecting variables were also investigated and discussed in the paper.
With the rapid development of wireless technologies, the demand for radio spectrum is ever increa... more With the rapid development of wireless technologies, the demand for radio spectrum is ever increasing. Along with the spectrum scarcity problem, radio spectrums are also under utilized. Cognitive radio practices an open spectrum allocation technique, which can ensure efficient handling of the frequency bands. Suitable network architecture is a must for the implementation of cognitive radio networks. This paper presents stable cluster-based architecture for cognitive radio ad-hoc network. The proposed architecture splits the network into groups of clusters where the spatial variations of spectrum availability are considered for clustering. Set of free common channels resides every cluster for smooth shifting among control channels. We introduce a parameter called Cluster Head Determination Factor (CHDF) to select cluster-heads where clusters' operations are coordinated by cluster-heads. Each cluster comprises of a secondary cluster-head to combat the re-clustering issue for mobile nodes. Conclusively, to evaluate the performance of our proposed scheme, simulation is conducted and comparative studies are performed.
Procedia - Social and Behavioral Sciences, 2012
In Malaysia and also elsewhere in the world the demands for graduates who have employability skil... more In Malaysia and also elsewhere in the world the demands for graduates who have employability skills such as ability to think critically, solve problems and can communicate are highly sought in the workplace. In the early 2006, the development of such skills was recognized as integral goals of undergraduate education at Universiti Teknologi Malaysia. Since then rigorous efforts have been made to inculcate these skills amongst the undergraduates. In this paper, we will share some of our experiences in coping with the ...
Mobility management protocols support mobility for roaming mobile nodes in order to provide seaml... more Mobility management protocols support mobility for roaming mobile nodes in order to provide seamless connectivity. Proxy Mobile IPv6 is a network-based localized mobility management protocol that is more suitable for resource constrained devices among different mobility management schemes. The IETF group standardized this protocol in 2008, and specified in RFC5213 [1]. An authentication procedure, which has a key role to protect the network against different security threats, is not specified in this standard. In the last few years, several authentication methods have been proposed, however, using smart card under the non-tamper resistance assumption has not been considered. In this paper, we discuss possibility of using tamper-proof smart card in Proxy Mobile IPv6 authentication approaches.
With the swift expansion of wireless technologies, demand for radio spectrum is continuously moun... more With the swift expansion of wireless technologies, demand for radio spectrum is continuously mounting. Along with the spectrum scarcity problem, radio spectrums are also underutilized. Cognitive radio practices an open spectrum allocation technique, which can ensure efficient handling of the frequency bands. Suitable network model is a must for the implementation of cognitive radio networks. In this paper, an efficient cluster model for cognitive radio ad-hoc networks is presented using graph theory. The proposed clustering model is defined as a maximum edge biclique problem, where the spatial variations of spectrum availability are considered. This clustering scheme aims to maintain set of free common channels in every cluster, which allows smooth shifting among control channels. A parameter called Cluster Head Determination Factor (CHDF) is also introduced to select cluster-heads where clusters’ operations are coordinated by cluster-heads. Each cluster comprises of a secondary cluster- head to combat the re-clustering issue for mobile nodes. Finally, simulation and comparative studies are conducted to evaluate the performance of the proposed method.
Smart city is a self-sustaining city which will cater to the modern needs of the society where sp... more Smart city is a self-sustaining city which will cater to the modern needs of the society where space, time, energy, transport, the basic needs of sustenance is networked in a smart grid to provide a modern city. Some companies like IBM are supporting this cause to build these future cities for modern day living that will not only reduce carbon foot print but also will be able to take care natural calamities. Using alternative source of energy that will not put stress on nature's resources is the key to a modern city. Not only the modern meant of transport will reduce the carbon footprint like electric vehicles but they will also have to be linked by a smart grid to reduce the traffic on road. Modern means for building like composites have to used that will reduce the need of electricity is a key component for a smart city. The components of a smart city are such as transportation, waste management, water management, e-governance, energy management, industry and business, e-healt...
Jurnal Teknologi, 2015
The Proxy Mobile IPv6 or the PMIPv6 is a protocol for mobile management as established by the Int... more The Proxy Mobile IPv6 or the PMIPv6 is a protocol for mobile management as established by the Internet Engineering Task Force or IETF to assist in the intense usage of mobile devices and to lower the overhead of signaling. As the inclusion of the mobile node in the signaling related to mobility is not necessary, this type of solutions based on networks optimize the performance of the handover based on signaling overhead and handover latency. Nevertheless, the PMIPv6 has several disadvantages such as issues of privacy and security. The process of authentication of users is usually needed at the time of connecting to a wireless network. The mobile users might wander away from their home networks and be approached by other network services. These network services would usually require the users' credentials to authorize the usage of the service. In order to retain a level of anonymity, various degrees of information are required to be safe guarded including the Local Mobility Anchor ID, Media Access Gateway, and Mobile Node. Nevertheless, a few methods of authentication have been suggested to enhance the PMIPv6's performance since 2008 when this protocol was first established [1]; however, the issues of privacy are often ignored. This study attempts to evaluate the authentication methods of the PMIPv6 according to the anonymity of several network mechanisms. The findings of this study reveal that it is important to suggest an appropriate method of enhancing the protection and privacy of network mechanisms.
Jurnal Teknologi, 2015
Mobility management protocols support mobility for roaming mobile nodes in order to provide seaml... more Mobility management protocols support mobility for roaming mobile nodes in order to provide seamless connectivity. Proxy Mobile IPv6 is a network-based localized mobility management protocol that is more suitable for resource constrained devices among different mobility management schemes. In this protocol, all mobility signaling procedures are completed by network entity not mobile node. According to the Proxy Mobile IPv6 architecture, an authentication procedure has a key role to protect the network against different security threats; however, the details of authentication procedure is not specified in this standard. In this paper, different security features are explored to evaluate the authentication protocols in Proxy Mobile IPv6. The existing authentication approaches can be analyzed based on these criteria to find security issues.
2015 12th International Bhurban Conference on Applied Sciences and Technology (IBCAST), 2015
AEU - International Journal of Electronics and Communications, 2014
2013 19th Asia-Pacific Conference on Communications (APCC), 2013
2014 International Conference on Informatics, Electronics & Vision (ICIEV), 2014
ABSTRACT The state of the art of Wireless Sensor Networks (WSNs) has enabled attainment of compli... more ABSTRACT The state of the art of Wireless Sensor Networks (WSNs) has enabled attainment of complicated and challenging applications such as healthcare, traffic control, habitat monitoring, etc.. For the last few years, clustering in WSNs has gained more consideration because of the improved ability of sensor nodes to conserve energy. In a dynamic WSN, clustering consists of two important stages: cluster formation and cluster maintenance. A cluster is formed once a node or a group of nodes join an existing cluster-based network and cluster maintenance is executed to handle node(s)' leaving or even re-joining. In this paper, we investigate cluster formation problems for a dynamic cluster-based WSN. Current dynamic cluster-based WSN supports only single node's joining and/or leaving. We enhance the cluster-based structure by proposing multi-nodes-joining algorithms. We show that the time complexity of the proposed algorithm is expected O(|Q| + |R|) rounds, where R is the set of new nodes wish to join and Q is the set of neighboring nodes of set of new nodes R. We also show some simulation results for the proposed algorithm.
Directed Laplacians For Fuzzy Autocatalytic Set Of Fuzzy Graph Type‐3 Of An Incineration Process.... more Directed Laplacians For Fuzzy Autocatalytic Set Of Fuzzy Graph Type‐3 Of An Incineration Process. [AIP Conference Proceedings 1309, 112 (2010)]. Tahir Ahmad, Sabariah Baharun, Sumarni Abu Bakar. Abstract. Fuzzy Autocatalytic ...
Journal of Mathematical Chemistry, 2010
In this paper we have investigated and explored the realm of fuzzy graph in its relation to autoc... more In this paper we have investigated and explored the realm of fuzzy graph in its relation to autocatalytic sets. A new concept namely fuzzy autocatalytic set have been defined. This relation has produced some results in the forms of theorems which have been proven. A clinical waste incineration process has been modeled using this new concept indicates to be more accurate than using crisp graph.
Matematika, 2009
Structured networks of interacting components are hallmarks of several complex systems and clinic... more Structured networks of interacting components are hallmarks of several complex systems and clinical waste incineration process is an example of such a system. Fuzzy graph theory provides important tools to capture various aspects of complexity, imprecision and fuzziness of the ...
Jurnal Teknologi F, 2005
Incineration is known to be the best available option for treating clinical waste, particularly t... more Incineration is known to be the best available option for treating clinical waste, particularly the pathological related waste. A proper operation of the incinerator is essential to ensure complete destruction of the waste. It is anticipated that variables such as feed rate (waste), both the combustion temperatures of the Primary Combustion Chamber (PCC) and Secondary Combustion Chamber (SCC), fuel and combustion air consumption play a major role in affecting the performance of the incineration process. Particularly, the combustion efficiency (one of the performance indicators) of the incinerator determined by the presence of carbon monoxide and carbon dioxide emission after the SCC must be continuously monitored. In this regard, a study to investigate the relationship between variables affecting the combustion efficiency, namely waste, temperatures and fuel, were performed using regression analysis and further verified by ANOVA. Results showed that waste, primary and secondary combustion temperatures contribute significantly to the combustion efficiency of the process. The correlation between these affecting variables were also investigated and discussed in the paper.
With the rapid development of wireless technologies, the demand for radio spectrum is ever increa... more With the rapid development of wireless technologies, the demand for radio spectrum is ever increasing. Along with the spectrum scarcity problem, radio spectrums are also under utilized. Cognitive radio practices an open spectrum allocation technique, which can ensure efficient handling of the frequency bands. Suitable network architecture is a must for the implementation of cognitive radio networks. This paper presents stable cluster-based architecture for cognitive radio ad-hoc network. The proposed architecture splits the network into groups of clusters where the spatial variations of spectrum availability are considered for clustering. Set of free common channels resides every cluster for smooth shifting among control channels. We introduce a parameter called Cluster Head Determination Factor (CHDF) to select cluster-heads where clusters' operations are coordinated by cluster-heads. Each cluster comprises of a secondary cluster-head to combat the re-clustering issue for mobile nodes. Conclusively, to evaluate the performance of our proposed scheme, simulation is conducted and comparative studies are performed.