This page has only limited features, please log in for full access.

Prof. Dr. Hossam S. Hassanein
School of Computing, Queen’s University, Kingston, ON K7L 3N6, Canada

Basic Info

Basic Info is private.

Research Keywords & Expertise

0 Internet of Things
0 EDGE COMPUTING
0 Radio Resource Management
0 5G wireless sensor networks
0 Data-centric networks

Fingerprints

Internet of Things
Radio Resource Management

Honors and Awards

The user has no records in this section


Career Timeline

The user has no records in this section.


Short Biography

The user biography is not available.
Following
Followers
Co Authors
The list of users this user is following is empty.
Following: 0 users

Feed

Journal article
Published: 31 December 2020 in IEEE Transactions on Vehicular Technology
Reads 0
Downloads 0

This paper exploits crowdsensing to propose a novel IoT-Based Vehicle Crowd Management (IoT-VCM) framework. By efficiently managing vehicle departures and navigation, the IoT-VCM clears the network in a shorter time, while maintaining the network at low congestion levels to reduce the average travel time. To compromise between these conflicting objectives, the proposed system encompasses two subsystems that work in harmony, namely; the Travel-Time System-Optimum Navigation (TTSON) and the Vehicle Departure Control (VDC). The IoT-VCM uses different network sensory devices (connected vehicles and smartphones) to collect network information that is fused to compute the current road state conditions, based on which, the VDC determines the allowable vehicle departure rates, and the TTSON optimizes their navigation. The proposed system is developed in a microscopic traffic simulator and tested on a calibrated simulated real network. The IoT-VCM controller is compared to the state-of-the-art techniques reported in the literature, namely the dynamic time-dependent incremental user-optimum traffic assignment.

ACS Style

Ahmed Elbery; Hossam S. Hassanein; Nizar Zorba; Hesham A. Rakha. IoT-Based Crowd Management Framework for Departure Control and Navigation. IEEE Transactions on Vehicular Technology 2020, 70, 95 -106.

AMA Style

Ahmed Elbery, Hossam S. Hassanein, Nizar Zorba, Hesham A. Rakha. IoT-Based Crowd Management Framework for Departure Control and Navigation. IEEE Transactions on Vehicular Technology. 2020; 70 (1):95-106.

Chicago/Turabian Style

Ahmed Elbery; Hossam S. Hassanein; Nizar Zorba; Hesham A. Rakha. 2020. "IoT-Based Crowd Management Framework for Departure Control and Navigation." IEEE Transactions on Vehicular Technology 70, no. 1: 95-106.

Journal article
Published: 23 November 2020 in Journal of Sensor and Actuator Networks
Reads 0
Downloads 0

Mobile network traffic is increasing in an unprecedented manner, resulting in growing demand from network operators to deploy more base stations able to serve more devices while maintaining a satisfactory level of service quality. Base stations are considered the leading energy consumer in network infrastructure; consequently, increasing the number of base stations will increase power consumption. By predicting the traffic load on base stations, network optimization techniques can be applied to decrease energy consumption. This research explores different machine learning and statistical methods capable of predicting traffic load on base stations. These methods are examined on a public dataset that provides records of traffic loads of several base stations over the span of one week. Because of the limited number of records in the dataset for each base station, different base stations are grouped while building the prediction model. Due to the different behavior of the base stations, forecasting the traffic load of multiple base stations together becomes challenging. The proposed solution involves clustering the base stations according to their behavior and forecasting the load on the base stations in each cluster individually. Clustering the time series data according to their behavior mitigates the dissimilar behavior problem of the time series when they are trained together. Our findings demonstrate that predictions based on deep recurrent neural networks perform better than other forecasting techniques.

ACS Style

Basma Mahdy; Hazem Abbas; Hossam S. Hassanein; Aboelmagd Noureldin; Hatem Abou-Zeid. A Clustering-Driven Approach to Predict the Traffic Load of Mobile Networks for the Analysis of Base Stations Deployment. Journal of Sensor and Actuator Networks 2020, 9, 53 .

AMA Style

Basma Mahdy, Hazem Abbas, Hossam S. Hassanein, Aboelmagd Noureldin, Hatem Abou-Zeid. A Clustering-Driven Approach to Predict the Traffic Load of Mobile Networks for the Analysis of Base Stations Deployment. Journal of Sensor and Actuator Networks. 2020; 9 (4):53.

Chicago/Turabian Style

Basma Mahdy; Hazem Abbas; Hossam S. Hassanein; Aboelmagd Noureldin; Hatem Abou-Zeid. 2020. "A Clustering-Driven Approach to Predict the Traffic Load of Mobile Networks for the Analysis of Base Stations Deployment." Journal of Sensor and Actuator Networks 9, no. 4: 53.

Journal article
Published: 29 June 2020 in Sensors
Reads 0
Downloads 0

The importance of securing communications on the Internet of Things (IoT) cannot be overstated. This is especially the case in light of the increasing proliferation of IoT devices and instances, as well as the growing dependence on their usage. Meanwhile, there have recently been mounting concerns over a wide array of vulnerabilities in IoT communications. The objective of this work is to address constraints in IoT devices that are “resource-constrained”, which are devices that are limited in terms of computing, energy, communication, or range capabilities, whether in terms of nominal or temporal limitations. Specifically, we propose a framework for resource-aiding constrained devices to facilitate secure communication. Without loss of generalization, the framework’s viability is illustrated by focusing on a group of security functions that utilize message authentication codes, which is a strongly representative example of resource-intensive security functions. Aspects of the framework are further demonstrated in processing cores commonly used in commercial IoT devices.

ACS Style

Abd-Elhamid M. Taha; Abdulmonem M. Rashwan; Hossam S. Hassanein. Secure Communications for Resource-Constrained IoT Devices. Sensors 2020, 20, 3637 .

AMA Style

Abd-Elhamid M. Taha, Abdulmonem M. Rashwan, Hossam S. Hassanein. Secure Communications for Resource-Constrained IoT Devices. Sensors. 2020; 20 (13):3637.

Chicago/Turabian Style

Abd-Elhamid M. Taha; Abdulmonem M. Rashwan; Hossam S. Hassanein. 2020. "Secure Communications for Resource-Constrained IoT Devices." Sensors 20, no. 13: 3637.

Journal article
Published: 04 May 2020 in Computer Communications
Reads 0
Downloads 0

The upsurge of smart devices has enabled the realization of safe, efficient smart cities that improve the quality of life of their citizens. A prevalent class of smart city services that are attracting increasing attention are Smart Emergency Response and Management (SERM) systems, where sensing paradigms such as crowd sensing and IoT-centric sensing are employed to facilitate the detection of, and response to a crisis situation. In this paper, we study the detection of an abnormal change in a monitored variable through crowd sensed and heterogeneous data, where the change is suggestive of an emergency situation. We formulate our problem as a sequential change-point detection problem, where the underlying distribution of the variable changes at an unknown time. We aim to detect the change-point with minimal delay, subject to a false alarm constraint. We utilize Shiryaev’s test to construct two variants of the solution depending on the structure of the received data contributions and mobility of participating sensing elements. We conduct simulations experiments to show the performance of these variants in terms of the delay-false alarm trade-off in different scenarios.

ACS Style

Rawan F. El Khatib; Nizar Zorba; Hossam S. Hassanein. Rapid sensing-based emergency detection: A sequential approach. Computer Communications 2020, 159, 222 -230.

AMA Style

Rawan F. El Khatib, Nizar Zorba, Hossam S. Hassanein. Rapid sensing-based emergency detection: A sequential approach. Computer Communications. 2020; 159 ():222-230.

Chicago/Turabian Style

Rawan F. El Khatib; Nizar Zorba; Hossam S. Hassanein. 2020. "Rapid sensing-based emergency detection: A sequential approach." Computer Communications 159, no. : 222-230.

Journal article
Published: 27 November 2019 in Sensors
Reads 0
Downloads 0

Personal Area Networks (PAN) are key topologies in pervasive Internet of Things (IoT) localization applications. In the numerous object localization techniques, centralization and synchronization between the elements are assumed. In this paper, we leverage crowdsourcing from multiple fixed and mobile elements to enhance object localization. A cooperative crowdsourcing scheme is proposed to localize mobile low power tags using distributed and mobile/fixed readers for GPS assisted environments (i.e., outdoor) and fixed readers for indoors. We propose Inertial-Based Shifting and Trilateration (IBST) technique to provide an accurate reckoning of the absolute location of mobile tags. The novelty in our technique is its capability to estimate tag locations even when the tag is not covered by three readers to perform trilateration. In addition, IBST provides scalability since no processing is required by the low power tags. IBST technique is validated through extensive simulations using MATLAB. Simulation results show that IBST consistently estimates location, while other indoor localization solutions fail to provide such estimates as the state-of-the-art techniques require localization data to be available simultaneously to provide location estimation.

ACS Style

Abdallah Y. Alma’Aitah; Lobna M. Eslim; Hossam S. Hassanein. Tag Localization with Asynchronous Inertial-Based Shifting and Trilateration. Sensors 2019, 19, 5204 .

AMA Style

Abdallah Y. Alma’Aitah, Lobna M. Eslim, Hossam S. Hassanein. Tag Localization with Asynchronous Inertial-Based Shifting and Trilateration. Sensors. 2019; 19 (23):5204.

Chicago/Turabian Style

Abdallah Y. Alma’Aitah; Lobna M. Eslim; Hossam S. Hassanein. 2019. "Tag Localization with Asynchronous Inertial-Based Shifting and Trilateration." Sensors 19, no. 23: 5204.

Preprint
Published: 08 September 2018
Reads 0
Downloads 0
ACS Style

Amr S. El-Wakeel; Aboelmagd Noureldin; Hossam S. Hassanein; Nizar Zorba. iDriveSense: Dynamic Route Planning Involving Roads Quality Information. 2018, 1 .

AMA Style

Amr S. El-Wakeel, Aboelmagd Noureldin, Hossam S. Hassanein, Nizar Zorba. iDriveSense: Dynamic Route Planning Involving Roads Quality Information. . 2018; ():1.

Chicago/Turabian Style

Amr S. El-Wakeel; Aboelmagd Noureldin; Hossam S. Hassanein; Nizar Zorba. 2018. "iDriveSense: Dynamic Route Planning Involving Roads Quality Information." , no. : 1.

Chapter
Published: 23 August 2018 in Advanced Controllers for Smart Cities
Reads 0
Downloads 0

The unprecedented advances in wireless technology have led to the development of the IoT and numerous associated sub-paradigms, such as wireless sensor networks (WSNs), software-defined networks, mobile crowdsensing (MCS), and others. In this book chapter, we provide the reader an overview of the significance of small-scale data in the IoT within the bounds of the MCS paradigm. We motivate the scenarios where small data might exist, and we discuss its susceptibility to the errors. We provide the reader with a thorough investigation of the impact of one-sided outliers on small data sets. In addition, we present some of the potential techniques to deal with the outliers, making small data robust to errors and thus applicable to practical scenarios.

ACS Style

Sherif B. Azmy; Ruslan Abu Sneineh; Nizar Zorba; Hossam S. Hassanein. Small Data in IoT: An MCS Perspective. Advanced Controllers for Smart Cities 2018, 209 -229.

AMA Style

Sherif B. Azmy, Ruslan Abu Sneineh, Nizar Zorba, Hossam S. Hassanein. Small Data in IoT: An MCS Perspective. Advanced Controllers for Smart Cities. 2018; ():209-229.

Chicago/Turabian Style

Sherif B. Azmy; Ruslan Abu Sneineh; Nizar Zorba; Hossam S. Hassanein. 2018. "Small Data in IoT: An MCS Perspective." Advanced Controllers for Smart Cities , no. : 209-229.

Original article
Published: 01 July 2018 in Security and Privacy
Reads 0
Downloads 0

The increasing traffic volume and new requirements of highly scalable and efficient distribution of contents exceed the capabilities of the current Internet architecture. Information centric networking (ICN) is a new communication paradigm for the next generation internet (NGI), which focuses mainly on contents. ICN has in‐network caching capability, which enables any node to cache any content coming from any publisher. ICN subscribers are able to access contents from different distributed locations. This capability maximizes the problem of unauthorized access to ICN contents. In this paper, we propose a decentralized elliptic curve‐based access control (ECAC) protocol for ICN architectures. In this protocol, fewer public messages are needed for access control enforcement between ICN subscribers and ICN nodes than the existing access control protocols. ECAC protocol depends on ICN self‐certifying naming scheme. We perform security analysis on ECAC for the following attacks: man‐in‐the‐middle, forward security, replay attacks, integrity, and privacy violations. We also evaluate communication, computational, and storage overhead for performance analysis to ECAC. Based on our results that are obtained under various scenarios, ECAC efficiently prevents unauthorized access to ICN contents.

ACS Style

Eslam G. Abdallah; Mohammad Zulkernine; Hossam S. Hassanein. Preventing unauthorized access in information centric networking. Security and Privacy 2018, 1, e33 .

AMA Style

Eslam G. Abdallah, Mohammad Zulkernine, Hossam S. Hassanein. Preventing unauthorized access in information centric networking. Security and Privacy. 2018; 1 (4):e33.

Chicago/Turabian Style

Eslam G. Abdallah; Mohammad Zulkernine; Hossam S. Hassanein. 2018. "Preventing unauthorized access in information centric networking." Security and Privacy 1, no. 4: e33.

Journal article
Published: 01 February 2018 in IEEE Transactions on Green Communications and Networking
Reads 0
Downloads 0

Predictive Resource Allocation (PRA) have gained momentum in the network research community to cope with the exponential increase in video traffic. Existing PRA schemes demonstrated profound energy savings and ubiquitous Quality of Service (QoS) satisfaction under idealistic prediction of future network states. This includes long-term mobility traces and demands of mobile users, anticipated channel capacities, and network load. In this paper, we relax the main assumption of existing PRA work and tackle uncertainties in predicted information which resulted from space and time variation of the network load and users demands. A Robust Green Predictive Resource Allocation (R-GPRA) is proposed to: model the uncertainties as random variables, ensure a probabilistic satisfaction of QoS constraints, and follow a risk-aware preallocation of future demand. The scheme adopts stochastic programming methods to provide robust allocation over the time horizon. A linear Recourse Programming (RP) model is used to represent the trade-off between the energy-savings and the risk of wasting resources while considering the probability of a user terminating the video session at each time slot. Thus, the scheme prevents the network from prebuffering the future video content that might be skipped by the user. Similarly, a Chance Constrained Programming (CCP) model is proposed to provide a probabilistic QoS representation to guarantee that the sum of resources, predetermined to video streaming users, do not surpass the total time-varying network capacity. To support the practicality of R-GPRA, we prove that a near-optimal solution is attainable by proposing a guided heuristic search with small optimality gap to numerical methods. Simulation results demonstrate the ability of the introduced R-GPRA to deliver energy-efficient video streaming with less resources than the existing PRA while promising QoS satisfaction. These results provide the incentive to implement the R-GPRA in future wireless networks.

ACS Style

Ramy Atawia; Hossam S. Hassanein; Najah Abu Ali; Aboelmagd Noureldin. Utilization of Stochastic Modeling for Green Predictive Video Delivery Under Network Uncertainties. IEEE Transactions on Green Communications and Networking 2018, 2, 556 -569.

AMA Style

Ramy Atawia, Hossam S. Hassanein, Najah Abu Ali, Aboelmagd Noureldin. Utilization of Stochastic Modeling for Green Predictive Video Delivery Under Network Uncertainties. IEEE Transactions on Green Communications and Networking. 2018; 2 (2):556-569.

Chicago/Turabian Style

Ramy Atawia; Hossam S. Hassanein; Najah Abu Ali; Aboelmagd Noureldin. 2018. "Utilization of Stochastic Modeling for Green Predictive Video Delivery Under Network Uncertainties." IEEE Transactions on Green Communications and Networking 2, no. 2: 556-569.

Journal article
Published: 16 August 2017 in IEEE Transactions on Intelligent Transportation Systems
Reads 0
Downloads 0

With the abundant on-board resources in smart vehicles, they have become major candidates for providing ubiquitous services, including public sensing. One of the challenges facing such ubiquitous utilization is the recruitment of the participating vehicles. In this paper, we present the reputation-aware, trajectory-based recruitment (RTR) framework that handles recruitment of vehicles for public sensing. The framework considers the spatiotemporal availability of participants along with their reputation to select vehicles that achieve desired coverage of an area of interest within a budget cap. The framework consists of a reputation assessment scheme, a pricing model, and a selection scheme collaborating for a main recruitment objective; maximizing coverage with minimum cost. We propose greedy heuristic solutions targeting the selection problem in real-time. The RTR framework generalizes the basic selection problem to handle some practical scenarios, including departing vehicles and varying redundancy requirements. We also propose a reputation assessment scheme and a pricing model as parts of the framework. Extensive performance evaluation of the proposed framework is conducted and the evaluation shows that the proposed greedy heuristics are able to achieve results close to previously obtained optimal benchmarks under different scenarios, and that the framework succeeds in achieving high levels of coverage even when vehicles do not stick to their announced trajectories.

ACS Style

Sherin Abdelhamid; Hossam S. Hassanein; Glen Takahara. Reputation-Aware, Trajectory-Based Recruitment of Smart Vehicles for Public Sensing. IEEE Transactions on Intelligent Transportation Systems 2017, 19, 1387 -1400.

AMA Style

Sherin Abdelhamid, Hossam S. Hassanein, Glen Takahara. Reputation-Aware, Trajectory-Based Recruitment of Smart Vehicles for Public Sensing. IEEE Transactions on Intelligent Transportation Systems. 2017; 19 (5):1387-1400.

Chicago/Turabian Style

Sherin Abdelhamid; Hossam S. Hassanein; Glen Takahara. 2017. "Reputation-Aware, Trajectory-Based Recruitment of Smart Vehicles for Public Sensing." IEEE Transactions on Intelligent Transportation Systems 19, no. 5: 1387-1400.

Journal article
Published: 22 June 2017 in IEEE Wireless Communications
Reads 0
Downloads 0

The proliferation of the Internet of Things hinges on the successful internetworking of billions of devices. While many approaches advocate for building on a thus-far versatile Internet infrastructure, many faltering claims for scalability will hinder IoT operation and responsiveness. At the heart of the problem, IoT is largely disparate in operational mandates, communication technologies, and access schemes. While such diversity could be empowering, the status quo lacks standardization, and these factors are hindering largescale IoT connectivity [1]. Simply put, IoT devices are developed by different manufacturers, and hence understand different digital languages and communication procedures. A successful global IoT deployment must find ways to interconnect things, allowing data from these objects to be usable across the IoT network. We elaborate on the architectural challenges in scaling the IoT, and highlight mainstream approaches in interconnecting devices across IoT infrastructures, both physically and semantically. We propose a novel architectural approach to bridging Internet-based IoT networks with cellular-based IoT systems, and explore the ensuing development of interoperable IoT systems. We propose the inclusion of a DOI module in the cellular-network-based IoT platform that handles general IoT data access for both cellular and Internet-based IoT nodes. The DOI will implement access and identification methods transversally across the two architectures such that any IoT node could interact with this module, thereby allowing general IoT services over cellular networks. The primary contribution of this article is the introduction of the DOI in cellular networks, emphasizing how the proposed architecture can address the aforementioned challenges.

ACS Style

Ahmed Iyanda Sulyman; Sharief Oteafy; Hossam S. Hassanein. Expanding the Cellular-IoT Umbrella: An Architectural Approach. IEEE Wireless Communications 2017, 24, 66 -71.

AMA Style

Ahmed Iyanda Sulyman, Sharief Oteafy, Hossam S. Hassanein. Expanding the Cellular-IoT Umbrella: An Architectural Approach. IEEE Wireless Communications. 2017; 24 (3):66-71.

Chicago/Turabian Style

Ahmed Iyanda Sulyman; Sharief Oteafy; Hossam S. Hassanein. 2017. "Expanding the Cellular-IoT Umbrella: An Architectural Approach." IEEE Wireless Communications 24, no. 3: 66-71.

Journal article
Published: 27 March 2017 in IEEE Transactions on Computers
Reads 0
Downloads 0

The growing demand for video content is reshaping our view of the current Internet, and mandating a fundamental change for future Internet paradigms. A current focus on Information-Centric Networks (ICN) promises a novel approach to intrinsically handling large content dissemination, caching and retrieval. While ubiquitous in-network caching in ICNs can expedite video delivery, a pressing challenge lies in provisioning scalable video streaming over adaptive requests for different bit rates. In this paper, we propose novel video caching schemes in ICN, to address variable bit rates and content sizes for best cache utilization. Our objective is to maximize overall throughput to improve the Quality of Service (QoS). In order to achieve this goal, we model the dynamic characteristics of rate adaptation, deriving caps on average delay, and propose DaCPlace which optimizes cache placement decisions. Building on DaCPlace, we further present a heuristic scheme, StreamCache, for low-overhead adaptive video caching. We conduct comprehensive simulations on NS-3 (specifically under the ndnSIM module). Results demonstrate how DaCPlace enables users to achieve the least delay per bit and StreamCache outperforms existing schemes, achieving near-optimal performance to DaCPlace .

ACS Style

Wenjie Li; Sharief Oteafy; Hossam S. Hassanein. Rate-Selective Caching for Adaptive Streaming Over Information-Centric Networks. IEEE Transactions on Computers 2017, 66, 1613 -1628.

AMA Style

Wenjie Li, Sharief Oteafy, Hossam S. Hassanein. Rate-Selective Caching for Adaptive Streaming Over Information-Centric Networks. IEEE Transactions on Computers. 2017; 66 (9):1613-1628.

Chicago/Turabian Style

Wenjie Li; Sharief Oteafy; Hossam S. Hassanein. 2017. "Rate-Selective Caching for Adaptive Streaming Over Information-Centric Networks." IEEE Transactions on Computers 66, no. 9: 1613-1628.

Journal article
Published: 26 October 2016 in IEEE Internet of Things Journal
Reads 0
Downloads 0

As competing industries delve into the Internet of Things (IoT), a growing challenge of interoperability and redundant deployments is magnified. Specifically, as we augment more "things" in the IoT fabric, how will these components interact across their heterogeneity, let alone collaborate. In this paper we address the core issue of component interaction and operation under the IoT umbrella. We present our contribution in the framework of Wireless Sensor Networks (WSNs), as a founding block in the IoT. More importantly, we present a novel paradigm in the design of WSNs, to build a resilient architecture that decouples operational mandates from the nodes. We abstract IoT things as wirelessly interfaced components, which introduce functionality physically decoupled from their devices; boosting resilience, dynamicity and resource utilization. This approach dissects the study of any IoT nodal capacity to its "connected" components, and empowers dynamic associativity between things to serve varying functional requirements and levels. It also enables re-introducing only the components required to suffice for network operation, or only those needed to meet a new requirement. More importantly, critical resources in the network will be shared within their neighborhoods. Thus network lifetime will relate to functional cliques of dynamic IoT nodes, rather than individual networks. We evaluate the cost effectiveness and resilience of our paradigm via simulations.

ACS Style

Sharief M. A. Oteafy; Hossam S. Hassanein. Resilient IoT Architectures Over Dynamic Sensor Networks With Adaptive Components. IEEE Internet of Things Journal 2016, 4, 474 -483.

AMA Style

Sharief M. A. Oteafy, Hossam S. Hassanein. Resilient IoT Architectures Over Dynamic Sensor Networks With Adaptive Components. IEEE Internet of Things Journal. 2016; 4 (2):474-483.

Chicago/Turabian Style

Sharief M. A. Oteafy; Hossam S. Hassanein. 2016. "Resilient IoT Architectures Over Dynamic Sensor Networks With Adaptive Components." IEEE Internet of Things Journal 4, no. 2: 474-483.

Journal article
Published: 01 March 2016 in Computer Networks
Reads 0
Downloads 0

Achieving reliability in Wireless Sensor Networks (WSNs) is challenging due to the limited resources available. In this study, we investigate the design of data survivability schemes using decentralized storage systems in WSNs. We propose a data storage system design based on Decentralized Erasure Codes (DEC) that features a simple and decentralized construction of the target code. The proposed framework allows sensor nodes to cooperate to build an erasure code-based storage that can tolerate a given failure/erasure rate. Code construction and decoding can both be performed randomly allowing for a distributed operation with no prior setup or coordination between source nodes. Further, we present two approaches that utilize Random Linear Network Coding (RLNC) to enhance the proposed scheme in order to achieve energy efficiency. We present the theoretical basis of the schemes then validate and evaluate their performance through simulations.

ACS Style

Louai Al-Awami; Hossam S. Hassanein. Distributed Data Storage Systems for Data Survivability in Wireless Sensor Networks using Decentralized Erasure Codes. Computer Networks 2016, 97, 113 -127.

AMA Style

Louai Al-Awami, Hossam S. Hassanein. Distributed Data Storage Systems for Data Survivability in Wireless Sensor Networks using Decentralized Erasure Codes. Computer Networks. 2016; 97 ():113-127.

Chicago/Turabian Style

Louai Al-Awami; Hossam S. Hassanein. 2016. "Distributed Data Storage Systems for Data Survivability in Wireless Sensor Networks using Decentralized Erasure Codes." Computer Networks 97, no. : 113-127.

Journal article
Published: 01 January 2016 in Vehicular Communications
Reads 0
Downloads 0

Cooperative multiple-input multiple-output technology allows a wireless network to coordinate among distributed single or multiple antenna deployments and achieves considerable performance gains compared to those provided by conventional transmission techniques. It promises significant improvements in spectral efficiency and network coverage and is a major candidate technology in various standard proposals for the fourth-generation wireless communication systems. We propose to use cooperative multiple antenna deployment links in Long Term Evolution-Advanced networks where vehicles act as relaying terminals using Decode-and-Forward relaying. To maintain orthogonality of signals, we deploy a modified Alamouti-based Space–Time Block Coding technique. Our approach allows exploitation of the multiplexing capability and spatial diversity of typical multiple antenna schemes in distributed way. We further contribute by deriving error rate, diversity gain and outage probability closed form expressions as a benchmark to assess our analysis and future research studies. Our findings indicate that significant diversity gains and reduced error rates are achievable. As well, a noticeable reduction in the required transmitting power, and an increase in coverage distance are observed compared to traditional single antenna deployments.

ACS Style

Mohamed Feteiha; Hossam S. Hassanein. Decode-and-Forward cooperative vehicular relaying for LTE-A MIMO-downlink. Vehicular Communications 2016, 3, 12 -20.

AMA Style

Mohamed Feteiha, Hossam S. Hassanein. Decode-and-Forward cooperative vehicular relaying for LTE-A MIMO-downlink. Vehicular Communications. 2016; 3 ():12-20.

Chicago/Turabian Style

Mohamed Feteiha; Hossam S. Hassanein. 2016. "Decode-and-Forward cooperative vehicular relaying for LTE-A MIMO-downlink." Vehicular Communications 3, no. : 12-20.

Conference paper
Published: 19 November 2015 in Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Reads 0
Downloads 0

Information Centric Networking (ICN) is a new communication paradigm for the future Internet that focuses on contents rather than infrastructures or end-points. Distributed Denial of Service (DDoS) attacks that may occur in many scenarios in an ICN, can overwhelm ICN routing and caching resources. In this paper, we focus on routing related DDoS attacks from both publisher and subscriber points of view and how they impact ICNs. We then propose a generic solution independent of a specific ICN architecture. This solution is based on a number of countermeasures: request satisfaction ratio, request rate limit, rating for contents and publishers, and test message. We present the implementation results, which show that the solution mitigates the routing related DDoS attacks and efficiently enhances the ICN performance in the existence of these attacks.

ACS Style

Eslam G. AbdAllah; Mohammad Zulkernine; Hossam S. Hassanein. Countermeasures for Mitigating ICN Routing Related DDoS Attacks. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2015, 84 -92.

AMA Style

Eslam G. AbdAllah, Mohammad Zulkernine, Hossam S. Hassanein. Countermeasures for Mitigating ICN Routing Related DDoS Attacks. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. 2015; ():84-92.

Chicago/Turabian Style

Eslam G. AbdAllah; Mohammad Zulkernine; Hossam S. Hassanein. 2015. "Countermeasures for Mitigating ICN Routing Related DDoS Attacks." Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering , no. : 84-92.

Journal article
Published: 24 March 2015 in Cluster Computing
Reads 0
Downloads 0

Although most of the data traffic in Internet is HTTP-based, multimedia applications will soon dominate a large percentage of the traffic. These applications require satisfactory level of bandwidth as they normally have large datasets. Under the limitation of network bandwidth, multimedia traffic may become a source for congestion; particularly when UDP is used due to the absence of flow control or congestion control mechanisms in this protocol. Avoiding congestion can be done if arrival rate to gateways is maintained close to outgoing link capacity while maintain small queue lengths at the routers. This guarantees the availability of buffer capacity for successful buffering and consequent forwarding in case of temporary traffic upsurges which could otherwise cause buffer overflows and packet loss. This research work introduces a congestion-aware and friendly UDP-based multimedia system which can help to lessening congestion occurrence and improve network performance, principally in real-time environments. The evaluation results show that the proposed system helps in controlling congestion, reducing packet loss, increasing throughput, and providing improved network utilization.

ACS Style

Mohammed M. Kadhum; Hossam S. Hassanein. Congestion-aware TCP-friendly system for multimedia transmission based on UDP. Cluster Computing 2015, 18, 693 -705.

AMA Style

Mohammed M. Kadhum, Hossam S. Hassanein. Congestion-aware TCP-friendly system for multimedia transmission based on UDP. Cluster Computing. 2015; 18 (2):693-705.

Chicago/Turabian Style

Mohammed M. Kadhum; Hossam S. Hassanein. 2015. "Congestion-aware TCP-friendly system for multimedia transmission based on UDP." Cluster Computing 18, no. 2: 693-705.

Journal article
Published: 26 January 2015 in IEEE Network
Reads 0
Downloads 0

Intelligent vehicles are considered key enablers for intelligent transportation systems. They are equipped with resources/components to enable services for vehicle occupants, other vehicles on the road, and third-party recipients. In-vehicle sensors, communication modules, and on-board units with computing and storage capabilities allow the intelligent vehicle to work as a mobile service provider of sensing, data storage, computing, cloud, data relaying, infotainment, and localization services. In this article we introduce the concept of Vehicle as a Resource and shed light on the services a vehicle can potentially provide on the road or parked. We anticipate that an intelligent vehicle can be a significant service provider in a variety of situations, including emergency scenarios.

ACS Style

Sherin Abdelhamid; Hossam S. Hassanein; Glen Takahara. Vehicle as a resource (VaaR). IEEE Network 2015, 29, 12 -17.

AMA Style

Sherin Abdelhamid, Hossam S. Hassanein, Glen Takahara. Vehicle as a resource (VaaR). IEEE Network. 2015; 29 (1):12-17.

Chicago/Turabian Style

Sherin Abdelhamid; Hossam S. Hassanein; Glen Takahara. 2015. "Vehicle as a resource (VaaR)." IEEE Network 29, no. 1: 12-17.

Journal article
Published: 14 January 2015 in IEEE Communications Surveys & Tutorials
Reads 0
Downloads 0

Information-centric networking (ICN) is a new communication paradigm that focuses on content retrieval from a network regardless of the storage location or physical representation of this content. In ICN, securing the content itself is much more important than securing the infrastructure or the endpoints. To achieve the security goals in this new paradigm, it is crucial to have a comprehensive understanding of ICN attacks, their classification, and proposed solutions. In this paper, we provide a survey of attacks unique to ICN architectures and other generic attacks that have an impact on ICN. It also provides a taxonomy of these attacks in ICN, which are classified into four main categories, i.e., naming, routing, caching, and other miscellaneous related attacks. Furthermore, this paper shows the relation between ICN attacks and unique ICN attributes, and that between ICN attacks and security requirements, i.e., confidentiality, integrity, availability, and privacy. Finally, this paper presents the severity levels of ICN attacks and discusses the existing ICN security solutions.

ACS Style

Eslam G. Abdallah; Hossam S. Hassanein; Mohammad Zulkernine. A Survey of Security Attacks in Information-Centric Networking. IEEE Communications Surveys & Tutorials 2015, 17, 1441 -1454.

AMA Style

Eslam G. Abdallah, Hossam S. Hassanein, Mohammad Zulkernine. A Survey of Security Attacks in Information-Centric Networking. IEEE Communications Surveys & Tutorials. 2015; 17 (3):1441-1454.

Chicago/Turabian Style

Eslam G. Abdallah; Hossam S. Hassanein; Mohammad Zulkernine. 2015. "A Survey of Security Attacks in Information-Centric Networking." IEEE Communications Surveys & Tutorials 17, no. 3: 1441-1454.

Journal article
Published: 20 November 2014 in Telecommunication Systems
Reads 0
Downloads 0

One of the key features of cellular systems is the possibility to switch the connection over several cells while the user is moving. This handover between cells has been upgraded to tackle different operator/users’ objectives, and even it has been proposed between two access technologies for what is known as vertical handover. The long term evolution-advanced technology uses two kinds of cells within its coverage design, the macrocell to provide larger coverage at the extent of lower data rate; and the smallcell (i.e., femtocell) that is designed for very high data rate while low coverage is provided. Therefore, special mechanisms for handover between macrocells and smallcells are required. Along this paper we propose two handover mechanisms over such scenario where the objectives vary among larger data rate, lower energy consumption and load balancing. Special concern is given to green communications that have emerged as one of the most important trends in wireless communications because of its several advantages of interference reduction, battery life increase and electrical bill cut. The presented handover mechanism can tackle more than one objective at a time in order to provide satisfaction both to the operator and users. Interesting conclusions are obtained about the presented approach through computer simulations.

ACS Style

Nizar Zorba; Hossam S. Hassanein. Optimized handover strategy with hybrid satisfaction mechanisms. Telecommunication Systems 2014, 59, 137 -144.

AMA Style

Nizar Zorba, Hossam S. Hassanein. Optimized handover strategy with hybrid satisfaction mechanisms. Telecommunication Systems. 2014; 59 (1):137-144.

Chicago/Turabian Style

Nizar Zorba; Hossam S. Hassanein. 2014. "Optimized handover strategy with hybrid satisfaction mechanisms." Telecommunication Systems 59, no. 1: 137-144.