Suhaib Obeidat's research while affiliated with Bloomfield College and other places

Publications (14)

Article
Full-text available
A significant percentage of security research that is conducted suffers from common issues that prevent wide-scale adoption. Common snags of such proposed methods tend to include (i) introduction of additional nodes within the communication architecture, breaking the simplicity of the typical client–server model, or fundamental restructuring of the...
Article
Full-text available
The Internet of Things (IoT) has experienced constant growth in the number of devices deployed and the range of applications in which such devices are used. They vary widely in size, computational power, capacity storage, and energy. The explosive growth and integration of IoT in different domains and areas of our daily lives has created an Interne...
Article
Full-text available
A Vehicular Ad hoc Network (VANET) is a special type of Mobile Ad hoc Network (MANET). One of the main applications of VANETs is safety. This is accomplished by disseminating an Early Warning Message (EWM) to all vehicles in an emergency zone. However, broadcasting an EWM in a multihop environment, such as a VANET, introduces many challenges. The m...
Article
To enhance the Quality of service (QoS) communications over mobile ad hoc networks (MANETs), this paper proposes QoS-Aware Multipath Routing Protocol (QMRP). Delay is the most crucial factor for multimedia applications which can be minimized by providing more than one path between source-destination pair as well as choosing the path based on the qu...
Article
Full-text available
The support of voice communication is fundamental in the deployment of an ad hoc network for the battlefield or emergency response. We use the QoS requirements of voice to identify factors influencing its communication, and validate their significance through statistical analysis. Based on the results, we propose an opportunistic protocol within a...
Article
Introduction802.11 MAC802.11 Physical LayerHIPERLANsWLANs SecurityQoS Support: IEEE 802.11eAdvanced TopicsConclusion GlossaryCross References
Article
This paper proposes a novel multipath routing protocol for MANETs. The proposed protocol is a variant of the single path AODV routing protocol. The proposed multipath routing protocol establishes node- disjoint paths that have the lowest delays based on the interaction of many factors from different layers. Other delay aware MANETs routing protocol...
Conference Paper
This paper proposes a QoS multipath routing protocol (QMRP) for MANETs based on the single path AODV routing protocol. QMRP establishes node-disjoint paths that experience the lowest delay. Other delay-aware routing protocols do not factor in the projected contribution of the node requesting a route in the total network load. The implication is tha...
Article
We propose an opportunistic cross-layer architecture for adaptive support of Voice over IP in multi-hop wireless LANs. As opposed to providing high call quality, we target emergencies where it is important to communicate, even if at low quality, no matter the harshness of the network conditions. With the importance of delay on voice quality in mind...
Conference Paper
In a no-guarantees network such as an ad hoc network, nodes are expected to adapt to changes in network and channel conditions. As a step toward supporting voice communications in such environments, we propose an adaptation scheme that takes both voice coding (i.e., compression) and modulation as parameters. In such severe environments, the main go...
Article
The varying channel error conditions of a wireless link do not allow for providing a steady service quality. Adaptability is one way to go around this problem since the quality of service (QoS) requirements can be changed as the channel status changes. In this paper we propose a framework for adaptive voice over one-hop wireless communication betwe...
Conference Paper
Time-varying channel error conditions of a wireless link do not allow for providing a steady service quality. Adaptability is one way to go around this problem since the quality of service (QoS) requirements can be changed as the channel status changes. In this paper, we propose a framework for adaptive voice over one-hop wireless communication bet...
Article
This article presents a modeling and simulation methodology to analyze the performance of voice quality when sent over the available bit rate service in asynchronous transfer mode networks. Sources can modify the rate at which they send traffic to the network based on the feedback carried in the resource management cells. This is achieved by changi...

Citations

... A framework 2F provides authentication clients, link cloud system for encryption keys for provide tight security to avoid attackers at any cost [10], it consists of seed swap for account arrangement in tunnel security of transport layer. An authentication server with encryption key and an influential decryption action, and asynchronous creation about one authentication via TOTP approach via internal memory for cloud computing [11]. Figure 1 shows a Mobile Cloud Architecture that talks about the architecture of the mobile. ...
... One of the consequences of the DoS attack is that the attack puts the node under too many computation tasks and may cause the node to be forced to stay awake due to high network traffic than preferred and result in "barrage" and "sleep deprivation" [ 20,21]. The barrage attack differs from the sleep deprivation attack in terms of the rate of the sent requests, with the former being characterized by a high package rate that quickly depletes the resources of the victim. ...
... Real-time monitoring via IoT allows tasks such as parking reservations via direct service provider communication, elevating convenience. Despite diverse vehicular network potential, challenges include topology shifts, delays, and security [1] cause delay to respond to the requested vehicle and SNR (signal to noise ratio)instability also affect the vehicular environment [2]. Privacy policies, aligned with GDPR and Data Protection Act 2018, emphasize user data security [3]. ...
... As the IoT and blockchain industries continue to grow [1], they bring convenience to people's lives. However, there is a great possibility of illegal access by stakeholders when IoT platforms, cloud computing infrastructures [2,3] and smart devices are exchanging huge amounts of data [4]. ...
... Mobile Ad Hoc Network (MANET) is a mobile wireless Ad Hoc network that is self-configured, infrastructure-less, autonomous and multi-hop [1][2][3]. A Vehicle Ad Hoc Network (VANET) is a special type of MANET, where nodes are mobile vehicles that communicate over the wireless medium [1,2]. ...
... Obaidat M. et al. [10] is a variant of the AODV routing protocol with a single route. These are problems for accurately calculating route delay. ...
... In wireless systems, other degradation factors may occur, such as, obstacles between the transmitter and receiver, reflecting agents, signal amplitude variations, among others [4]. Two popular wireless channel models are the Rayleigh and Rician fading channels [5]- [7]. An important characteristic associated to a channel model is the Doppler shifts that is related to the channel frequencyvariation in a radio communication, in which the transmitter or the receiver are moving relative to each other [8]. ...
... Ad hoc network is a kind of peer to peer networks and each node has functions of data collecting, storage, processing and forwarding [3] . It is the cost-effective solution for the short-range communication in some particular scenarios, such as battlefield [4] , disaster rescue [5] , environment sensing [6] , etc. In order to improve the Quality of Service (QoS) among different heterogeneous network units, HANETs become the research focus in recent years [7] . ...
... Initially when a node is invoked trust value of the node will be calculate that either the node is trusted or node. if the node will be trusted then it will be registered [20] as one of node of MANET. Otherwise the trust value of the node will be calculated again until it starts behaving well. ...