Sabariah Baharun - Academia.edu (original) (raw)

Uploads

Papers by Sabariah Baharun

Research paper thumbnail of Developing Mathematical Communication Skills of Engineering Students

Procedia - Social and Behavioral Sciences, 2012

In Malaysia and also elsewhere in the world the demands for graduates who have employability skil... more In Malaysia and also elsewhere in the world the demands for graduates who have employability skills such as ability to think critically, solve problems and can communicate are highly sought in the workplace. In the early 2006, the development of such skills was recognized as integral goals of undergraduate education at Universiti Teknologi Malaysia. Since then rigorous efforts have been made to inculcate these skills amongst the undergraduates. In this paper, we will share some of our experiences in coping with the ...

Research paper thumbnail of Authentication Protocols in PMIPv6 Using Non-tamper Resistant Smart Card

Mobility management protocols support mobility for roaming mobile nodes in order to provide seaml... more Mobility management protocols support mobility for roaming mobile nodes in order to provide seamless connectivity. Proxy Mobile IPv6 is a network-based localized mobility management protocol that is more suitable for resource constrained devices among different mobility management schemes. The IETF group standardized this protocol in 2008, and specified in RFC5213 [1]. An authentication procedure, which has a key role to protect the network against different security threats, is not specified in this standard. In the last few years, several authentication methods have been proposed, however, using smart card under the non-tamper resistance assumption has not been considered. In this paper, we discuss possibility of using tamper-proof smart card in Proxy Mobile IPv6 authentication approaches.

Research paper thumbnail of Cluster Modelling for Cognitive Radio Ad-hoc Networks Using Graph Theory

With the swift expansion of wireless technologies, demand for radio spectrum is continuously moun... more With the swift expansion of wireless technologies, demand for radio spectrum is continuously mounting. Along with the spectrum scarcity problem, radio spectrums are also underutilized. Cognitive radio practices an open spectrum allocation technique, which can ensure efficient handling of the frequency bands. Suitable network model is a must for the implementation of cognitive radio networks. In this paper, an efficient cluster model for cognitive radio ad-hoc networks is presented using graph theory. The proposed clustering model is defined as a maximum edge biclique problem, where the spatial variations of spectrum availability are considered. This clustering scheme aims to maintain set of free common channels in every cluster, which allows smooth shifting among control channels. A parameter called Cluster Head Determination Factor (CHDF) is also introduced to select cluster-heads where clusters’ operations are coordinated by cluster-heads. Each cluster comprises of a secondary cluster- head to combat the re-clustering issue for mobile nodes. Finally, simulation and comparative studies are conducted to evaluate the performance of the proposed method.

Research paper thumbnail of 7 TH AUN/SEED-NET INT'L CONFERENCE ON EEE A Future Smart City Using Information and Communication Technologies

Smart city is a self-sustaining city which will cater to the modern needs of the society where sp... more Smart city is a self-sustaining city which will cater to the modern needs of the society where space, time, energy, transport, the basic needs of sustenance is networked in a smart grid to provide a modern city. Some companies like IBM are supporting this cause to build these future cities for modern day living that will not only reduce carbon foot print but also will be able to take care natural calamities. Using alternative source of energy that will not put stress on nature's resources is the key to a modern city. Not only the modern meant of transport will reduce the carbon footprint like electric vehicles but they will also have to be linked by a smart grid to reduce the traffic on road. Modern means for building like composites have to used that will reduce the need of electricity is a key component for a smart city. The components of a smart city are such as transportation, waste management, water management, e-governance, energy management, industry and business, e-healt...

Research paper thumbnail of Anonymity and Untraceability Assessment of Authentication Protocols in Proxy Mobile IPv6

Jurnal Teknologi, 2015

The Proxy Mobile IPv6 or the PMIPv6 is a protocol for mobile management as established by the Int... more The Proxy Mobile IPv6 or the PMIPv6 is a protocol for mobile management as established by the Internet Engineering Task Force or IETF to assist in the intense usage of mobile devices and to lower the overhead of signaling. As the inclusion of the mobile node in the signaling related to mobility is not necessary, this type of solutions based on networks optimize the performance of the handover based on signaling overhead and handover latency. Nevertheless, the PMIPv6 has several disadvantages such as issues of privacy and security. The process of authentication of users is usually needed at the time of connecting to a wireless network. The mobile users might wander away from their home networks and be approached by other network services. These network services would usually require the users' credentials to authorize the usage of the service. In order to retain a level of anonymity, various degrees of information are required to be safe guarded including the Local Mobility Anchor ID, Media Access Gateway, and Mobile Node. Nevertheless, a few methods of authentication have been suggested to enhance the PMIPv6's performance since 2008 when this protocol was first established [1]; however, the issues of privacy are often ignored. This study attempts to evaluate the authentication methods of the PMIPv6 according to the anonymity of several network mechanisms. The findings of this study reveal that it is important to suggest an appropriate method of enhancing the protection and privacy of network mechanisms.

Research paper thumbnail of Security and Privacy Criteria to Evaluate Authentication Mechanisms in Proxy Mobile IPv6

Jurnal Teknologi, 2015

Mobility management protocols support mobility for roaming mobile nodes in order to provide seaml... more Mobility management protocols support mobility for roaming mobile nodes in order to provide seamless connectivity. Proxy Mobile IPv6 is a network-based localized mobility management protocol that is more suitable for resource constrained devices among different mobility management schemes. In this protocol, all mobility signaling procedures are completed by network entity not mobile node. According to the Proxy Mobile IPv6 architecture, an authentication procedure has a key role to protect the network against different security threats; however, the details of authentication procedure is not specified in this standard. In this paper, different security features are explored to evaluate the authentication protocols in Proxy Mobile IPv6. The existing authentication approaches can be analyzed based on these criteria to find security issues.

Research paper thumbnail of Fault tolerance in Dynamic Cluster-Based Wireless Sensor Networks

2015 12th International Bhurban Conference on Applied Sciences and Technology (IBCAST), 2015

Research paper thumbnail of Mobility-aware timeout medium access control protocol for wireless sensor networks

AEU - International Journal of Electronics and Communications, 2014

Research paper thumbnail of Energy-efficient and mobility-aware MAC protocol for wireless sensor networks

2013 19th Asia-Pacific Conference on Communications (APCC), 2013

Research paper thumbnail of Multi-nodes joining for dynamic cluster-based Wireless Sensor Network

2014 International Conference on Informatics, Electronics & Vision (ICIEV), 2014

ABSTRACT The state of the art of Wireless Sensor Networks (WSNs) has enabled attainment of compli... more ABSTRACT The state of the art of Wireless Sensor Networks (WSNs) has enabled attainment of complicated and challenging applications such as healthcare, traffic control, habitat monitoring, etc.. For the last few years, clustering in WSNs has gained more consideration because of the improved ability of sensor nodes to conserve energy. In a dynamic WSN, clustering consists of two important stages: cluster formation and cluster maintenance. A cluster is formed once a node or a group of nodes join an existing cluster-based network and cluster maintenance is executed to handle node(s)' leaving or even re-joining. In this paper, we investigate cluster formation problems for a dynamic cluster-based WSN. Current dynamic cluster-based WSN supports only single node's joining and/or leaving. We enhance the cluster-based structure by proposing multi-nodes-joining algorithms. We show that the time complexity of the proposed algorithm is expected O(|Q| + |R|) rounds, where R is the set of new nodes wish to join and Q is the set of neighboring nodes of set of new nodes R. We also show some simulation results for the proposed algorithm.

Research paper thumbnail of Directed Laplacians For Fuzzy Autocatalytic Set Of Fuzzy Graph Type‐3 Of An Incineration Process

Directed Laplacians For Fuzzy Autocatalytic Set Of Fuzzy Graph Type‐3 Of An Incineration Process.... more Directed Laplacians For Fuzzy Autocatalytic Set Of Fuzzy Graph Type‐3 Of An Incineration Process. [AIP Conference Proceedings 1309, 112 (2010)]. Tahir Ahmad, Sabariah Baharun, Sumarni Abu Bakar. Abstract. Fuzzy Autocatalytic ...

Research paper thumbnail of Modeling a clinical incineration process using fuzzy autocatalytic set

Journal of Mathematical Chemistry, 2010

In this paper we have investigated and explored the realm of fuzzy graph in its relation to autoc... more In this paper we have investigated and explored the realm of fuzzy graph in its relation to autocatalytic sets. A new concept namely fuzzy autocatalytic set have been defined. This relation has produced some results in the forms of theorems which have been proven. A clinical waste incineration process has been modeled using this new concept indicates to be more accurate than using crisp graph.

Research paper thumbnail of Relationship between fuzzy edge connectivity and the variables in clinical waste incineration process

Matematika, 2009

Structured networks of interacting components are hallmarks of several complex systems and clinic... more Structured networks of interacting components are hallmarks of several complex systems and clinical waste incineration process is an example of such a system. Fuzzy graph theory provides important tools to capture various aspects of complexity, imprecision and fuzziness of the ...

Research paper thumbnail of Variables Affecting The Combustion Efficiency Of A Clinical Waste Incineration Process

Jurnal Teknologi F, 2005

Incineration is known to be the best available option for treating clinical waste, particularly t... more Incineration is known to be the best available option for treating clinical waste, particularly the pathological related waste. A proper operation of the incinerator is essential to ensure complete destruction of the waste. It is anticipated that variables such as feed rate (waste), both the combustion temperatures of the Primary Combustion Chamber (PCC) and Secondary Combustion Chamber (SCC), fuel and combustion air consumption play a major role in affecting the performance of the incineration process. Particularly, the combustion efficiency (one of the performance indicators) of the incinerator determined by the presence of carbon monoxide and carbon dioxide emission after the SCC must be continuously monitored. In this regard, a study to investigate the relationship between variables affecting the combustion efficiency, namely waste, temperatures and fuel, were performed using regression analysis and further verified by ANOVA. Results showed that waste, primary and secondary combustion temperatures contribute significantly to the combustion efficiency of the process. The correlation between these affecting variables were also investigated and discussed in the paper.

Research paper thumbnail of A stable cluster-based architecture for cognitive radio ad-hoc networks

With the rapid development of wireless technologies, the demand for radio spectrum is ever increa... more With the rapid development of wireless technologies, the demand for radio spectrum is ever increasing. Along with the spectrum scarcity problem, radio spectrums are also under utilized. Cognitive radio practices an open spectrum allocation technique, which can ensure efficient handling of the frequency bands. Suitable network architecture is a must for the implementation of cognitive radio networks. This paper presents stable cluster-based architecture for cognitive radio ad-hoc network. The proposed architecture splits the network into groups of clusters where the spatial variations of spectrum availability are considered for clustering. Set of free common channels resides every cluster for smooth shifting among control channels. We introduce a parameter called Cluster Head Determination Factor (CHDF) to select cluster-heads where clusters' operations are coordinated by cluster-heads. Each cluster comprises of a secondary cluster-head to combat the re-clustering issue for mobile nodes. Conclusively, to evaluate the performance of our proposed scheme, simulation is conducted and comparative studies are performed.

Research paper thumbnail of Developing Mathematical Communication Skills of Engineering Students

Procedia - Social and Behavioral Sciences, 2012

In Malaysia and also elsewhere in the world the demands for graduates who have employability skil... more In Malaysia and also elsewhere in the world the demands for graduates who have employability skills such as ability to think critically, solve problems and can communicate are highly sought in the workplace. In the early 2006, the development of such skills was recognized as integral goals of undergraduate education at Universiti Teknologi Malaysia. Since then rigorous efforts have been made to inculcate these skills amongst the undergraduates. In this paper, we will share some of our experiences in coping with the ...

Research paper thumbnail of Authentication Protocols in PMIPv6 Using Non-tamper Resistant Smart Card

Mobility management protocols support mobility for roaming mobile nodes in order to provide seaml... more Mobility management protocols support mobility for roaming mobile nodes in order to provide seamless connectivity. Proxy Mobile IPv6 is a network-based localized mobility management protocol that is more suitable for resource constrained devices among different mobility management schemes. The IETF group standardized this protocol in 2008, and specified in RFC5213 [1]. An authentication procedure, which has a key role to protect the network against different security threats, is not specified in this standard. In the last few years, several authentication methods have been proposed, however, using smart card under the non-tamper resistance assumption has not been considered. In this paper, we discuss possibility of using tamper-proof smart card in Proxy Mobile IPv6 authentication approaches.

Research paper thumbnail of Cluster Modelling for Cognitive Radio Ad-hoc Networks Using Graph Theory

With the swift expansion of wireless technologies, demand for radio spectrum is continuously moun... more With the swift expansion of wireless technologies, demand for radio spectrum is continuously mounting. Along with the spectrum scarcity problem, radio spectrums are also underutilized. Cognitive radio practices an open spectrum allocation technique, which can ensure efficient handling of the frequency bands. Suitable network model is a must for the implementation of cognitive radio networks. In this paper, an efficient cluster model for cognitive radio ad-hoc networks is presented using graph theory. The proposed clustering model is defined as a maximum edge biclique problem, where the spatial variations of spectrum availability are considered. This clustering scheme aims to maintain set of free common channels in every cluster, which allows smooth shifting among control channels. A parameter called Cluster Head Determination Factor (CHDF) is also introduced to select cluster-heads where clusters’ operations are coordinated by cluster-heads. Each cluster comprises of a secondary cluster- head to combat the re-clustering issue for mobile nodes. Finally, simulation and comparative studies are conducted to evaluate the performance of the proposed method.

Research paper thumbnail of 7 TH AUN/SEED-NET INT'L CONFERENCE ON EEE A Future Smart City Using Information and Communication Technologies

Smart city is a self-sustaining city which will cater to the modern needs of the society where sp... more Smart city is a self-sustaining city which will cater to the modern needs of the society where space, time, energy, transport, the basic needs of sustenance is networked in a smart grid to provide a modern city. Some companies like IBM are supporting this cause to build these future cities for modern day living that will not only reduce carbon foot print but also will be able to take care natural calamities. Using alternative source of energy that will not put stress on nature's resources is the key to a modern city. Not only the modern meant of transport will reduce the carbon footprint like electric vehicles but they will also have to be linked by a smart grid to reduce the traffic on road. Modern means for building like composites have to used that will reduce the need of electricity is a key component for a smart city. The components of a smart city are such as transportation, waste management, water management, e-governance, energy management, industry and business, e-healt...

Research paper thumbnail of Anonymity and Untraceability Assessment of Authentication Protocols in Proxy Mobile IPv6

Jurnal Teknologi, 2015

The Proxy Mobile IPv6 or the PMIPv6 is a protocol for mobile management as established by the Int... more The Proxy Mobile IPv6 or the PMIPv6 is a protocol for mobile management as established by the Internet Engineering Task Force or IETF to assist in the intense usage of mobile devices and to lower the overhead of signaling. As the inclusion of the mobile node in the signaling related to mobility is not necessary, this type of solutions based on networks optimize the performance of the handover based on signaling overhead and handover latency. Nevertheless, the PMIPv6 has several disadvantages such as issues of privacy and security. The process of authentication of users is usually needed at the time of connecting to a wireless network. The mobile users might wander away from their home networks and be approached by other network services. These network services would usually require the users' credentials to authorize the usage of the service. In order to retain a level of anonymity, various degrees of information are required to be safe guarded including the Local Mobility Anchor ID, Media Access Gateway, and Mobile Node. Nevertheless, a few methods of authentication have been suggested to enhance the PMIPv6's performance since 2008 when this protocol was first established [1]; however, the issues of privacy are often ignored. This study attempts to evaluate the authentication methods of the PMIPv6 according to the anonymity of several network mechanisms. The findings of this study reveal that it is important to suggest an appropriate method of enhancing the protection and privacy of network mechanisms.

Research paper thumbnail of Security and Privacy Criteria to Evaluate Authentication Mechanisms in Proxy Mobile IPv6

Jurnal Teknologi, 2015

Mobility management protocols support mobility for roaming mobile nodes in order to provide seaml... more Mobility management protocols support mobility for roaming mobile nodes in order to provide seamless connectivity. Proxy Mobile IPv6 is a network-based localized mobility management protocol that is more suitable for resource constrained devices among different mobility management schemes. In this protocol, all mobility signaling procedures are completed by network entity not mobile node. According to the Proxy Mobile IPv6 architecture, an authentication procedure has a key role to protect the network against different security threats; however, the details of authentication procedure is not specified in this standard. In this paper, different security features are explored to evaluate the authentication protocols in Proxy Mobile IPv6. The existing authentication approaches can be analyzed based on these criteria to find security issues.

Research paper thumbnail of Fault tolerance in Dynamic Cluster-Based Wireless Sensor Networks

2015 12th International Bhurban Conference on Applied Sciences and Technology (IBCAST), 2015

Research paper thumbnail of Mobility-aware timeout medium access control protocol for wireless sensor networks

AEU - International Journal of Electronics and Communications, 2014

Research paper thumbnail of Energy-efficient and mobility-aware MAC protocol for wireless sensor networks

2013 19th Asia-Pacific Conference on Communications (APCC), 2013

Research paper thumbnail of Multi-nodes joining for dynamic cluster-based Wireless Sensor Network

2014 International Conference on Informatics, Electronics & Vision (ICIEV), 2014

ABSTRACT The state of the art of Wireless Sensor Networks (WSNs) has enabled attainment of compli... more ABSTRACT The state of the art of Wireless Sensor Networks (WSNs) has enabled attainment of complicated and challenging applications such as healthcare, traffic control, habitat monitoring, etc.. For the last few years, clustering in WSNs has gained more consideration because of the improved ability of sensor nodes to conserve energy. In a dynamic WSN, clustering consists of two important stages: cluster formation and cluster maintenance. A cluster is formed once a node or a group of nodes join an existing cluster-based network and cluster maintenance is executed to handle node(s)' leaving or even re-joining. In this paper, we investigate cluster formation problems for a dynamic cluster-based WSN. Current dynamic cluster-based WSN supports only single node's joining and/or leaving. We enhance the cluster-based structure by proposing multi-nodes-joining algorithms. We show that the time complexity of the proposed algorithm is expected O(|Q| + |R|) rounds, where R is the set of new nodes wish to join and Q is the set of neighboring nodes of set of new nodes R. We also show some simulation results for the proposed algorithm.

Research paper thumbnail of Directed Laplacians For Fuzzy Autocatalytic Set Of Fuzzy Graph Type‐3 Of An Incineration Process

Directed Laplacians For Fuzzy Autocatalytic Set Of Fuzzy Graph Type‐3 Of An Incineration Process.... more Directed Laplacians For Fuzzy Autocatalytic Set Of Fuzzy Graph Type‐3 Of An Incineration Process. [AIP Conference Proceedings 1309, 112 (2010)]. Tahir Ahmad, Sabariah Baharun, Sumarni Abu Bakar. Abstract. Fuzzy Autocatalytic ...

Research paper thumbnail of Modeling a clinical incineration process using fuzzy autocatalytic set

Journal of Mathematical Chemistry, 2010

In this paper we have investigated and explored the realm of fuzzy graph in its relation to autoc... more In this paper we have investigated and explored the realm of fuzzy graph in its relation to autocatalytic sets. A new concept namely fuzzy autocatalytic set have been defined. This relation has produced some results in the forms of theorems which have been proven. A clinical waste incineration process has been modeled using this new concept indicates to be more accurate than using crisp graph.

Research paper thumbnail of Relationship between fuzzy edge connectivity and the variables in clinical waste incineration process

Matematika, 2009

Structured networks of interacting components are hallmarks of several complex systems and clinic... more Structured networks of interacting components are hallmarks of several complex systems and clinical waste incineration process is an example of such a system. Fuzzy graph theory provides important tools to capture various aspects of complexity, imprecision and fuzziness of the ...

Research paper thumbnail of Variables Affecting The Combustion Efficiency Of A Clinical Waste Incineration Process

Jurnal Teknologi F, 2005

Incineration is known to be the best available option for treating clinical waste, particularly t... more Incineration is known to be the best available option for treating clinical waste, particularly the pathological related waste. A proper operation of the incinerator is essential to ensure complete destruction of the waste. It is anticipated that variables such as feed rate (waste), both the combustion temperatures of the Primary Combustion Chamber (PCC) and Secondary Combustion Chamber (SCC), fuel and combustion air consumption play a major role in affecting the performance of the incineration process. Particularly, the combustion efficiency (one of the performance indicators) of the incinerator determined by the presence of carbon monoxide and carbon dioxide emission after the SCC must be continuously monitored. In this regard, a study to investigate the relationship between variables affecting the combustion efficiency, namely waste, temperatures and fuel, were performed using regression analysis and further verified by ANOVA. Results showed that waste, primary and secondary combustion temperatures contribute significantly to the combustion efficiency of the process. The correlation between these affecting variables were also investigated and discussed in the paper.

Research paper thumbnail of A stable cluster-based architecture for cognitive radio ad-hoc networks

With the rapid development of wireless technologies, the demand for radio spectrum is ever increa... more With the rapid development of wireless technologies, the demand for radio spectrum is ever increasing. Along with the spectrum scarcity problem, radio spectrums are also under utilized. Cognitive radio practices an open spectrum allocation technique, which can ensure efficient handling of the frequency bands. Suitable network architecture is a must for the implementation of cognitive radio networks. This paper presents stable cluster-based architecture for cognitive radio ad-hoc network. The proposed architecture splits the network into groups of clusters where the spatial variations of spectrum availability are considered for clustering. Set of free common channels resides every cluster for smooth shifting among control channels. We introduce a parameter called Cluster Head Determination Factor (CHDF) to select cluster-heads where clusters' operations are coordinated by cluster-heads. Each cluster comprises of a secondary cluster-head to combat the re-clustering issue for mobile nodes. Conclusively, to evaluate the performance of our proposed scheme, simulation is conducted and comparative studies are performed.