Mahmood A. Al-Shareeda
Universiti Sains Malaysia

Published : 8 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 8 Documents
Search

Proposed security mechanism for preventing fake router advertisement attack in IPv6 link-local network Mahmood A. Al-Shareeda; Selvakumar Manickam; Murtaja Ali Saare; Navaneethan C. Arjuman
Indonesian Journal of Electrical Engineering and Computer Science Vol 29, No 1: January 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v29.i1.pp518-526

Abstract

The design of router discovery (RD) is a trust mechanism to confirm the legitimacy of the host and router. Fake router advertisement (RA) attacks have been made possible by this RD protocol design defect. Studies show that the standard RD protocol is vulnerable to a fake RA attack where the host will be denied a valid gateway. To cope with this problem, several prevention techniques have been proposed in the past to secure the RD process. Nevertheless, these methods have a significant temporal complexity as well as other flaws, including the bootstrapping issue and hash collision attacks. Thus, the SecMac-secure router discovery (SecMac-SRD) technique, which requires reduced processing time and may thwart fake RA assaults, is proposed in this study as an improved secure RD mechanism. SecMac-SRD is built based on a UMAC hashing algorithm with ElGamal public key distribution cryptosystem that hides the RD message exchange in the IPv6 link-local network. Based on the obtained expected results display that the SecMac-SRD mechanism achieved less processing time compared to the existing secure RD mechanism and can resist fake RA attacks. The outcome of the expected results clearly proves that the SecMac-SRD mechanism effectively copes with the fake RA attacks during the RD process.
DDoS attacks detection using machine learning and deep learning techniques: analysis and comparison Mahmood A. Al-Shareeda; Selvakumar Manickam; Murtaja Ali Saare
Bulletin of Electrical Engineering and Informatics Vol 12, No 2: April 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v12i2.4466

Abstract

The security of the internet is seriously threatened by a distributed denial of service (DDoS) attacks. The purpose of a DDoS assault is to disrupt service and prevent legitimate users from using it by flooding the central server with a large number of messages or requests that will cause it to reach its capacity and shut down. Because it is carried out by numerous bots that are managed (infected) by a single botmaster using a fake IP address, this assault is dangerous because it does not involve a lot of work or special tools. For the purpose of identifying and analyzing DDoS attacks, this paper will discuss various machine learning (ML) and deep learning (DL) techniques. Additionally, this study analyses and comparatives the significant distinctions between ML and DL techniques to aid in determining when one of these techniques should be used.
Unmanned aerial vehicle: a review and future directions Mahmood A. Al-Shareeda; Murtaja Ali Saare; Selvakumar Manickam
Indonesian Journal of Electrical Engineering and Computer Science Vol 30, No 2: May 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v30.i2.pp778-786

Abstract

The use of unmanned aerial vehicles (UAVs) will be crucial in the next generation of wireless communications infrastructure. When compared to traditional ground-based solutions, it is expected that their use in a variety of communication-based applications will increase coverage and spectrum efficiency. In this paper, we provide a detailed review of all relevant research works as follows. This paper presents types of UAVs (e.g., wireless coverage, military, agriculture, medical applications, environment, and climate, and delivery and transportation), characteristics of UAVs (e.g., node density, altering system topology, node mobility, radio broadcasting mode, frequency band, localization, and power consumption and network lifetime), the application of UAVs (e.g., Multi-UAV cooperation, UAV-to-VANET collaborations, and UAV-to-ground tasks). Additionally, this paper reviews the routing protocols of UAVs (e.g., topology-based, position-based, heterogeneous, delay-tolerant networks (DTNs), swarm-Based, and cluster-based) and simulation tools (e.g., OMNeT++, AVENS, MATLAB, NS3, SUMO, and OPNET). The design and development of any new methods for UAVs may use this work as a guide and reference.
Proposed enhanced link failure rerouting mechanism for software-defined exchange point Abdijalil Abdullahi; Selvakumar Manickam; Shankar Karuppayah; Mahmood A. Al-Shareeda
Indonesian Journal of Electrical Engineering and Computer Science Vol 31, No 1: July 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v31.i1.pp259-270

Abstract

Internet eXchange point (IXP) is a way to optimize network bandwidth. It enables a platform in the different providers like internet service providers (ISPs) and content delivery providers (CDNs) to share their traffic through a common point. A software defined exchange point (SDX) is an IXP comprising of a programmable deployed software defined network (SDN) switching fabric to enhance the management of their services, but they met the performance issues. The previous studies proposed various mechanisms and frameworks that tackled with these issues, but they don’t overcome overall challenges like link failure recovery for multi-hop-based SDX particularly packet processing delay and switch memory overhead. To cope with these issues, this paper proposed an enhanced link failure rerouting (ELFR) mechanism for multi-hop-based SDX. The objective of the proposed ELFR mechanism is to reduce the delay of packet processing to recover the link failure quickly and improve the path computation while ensuring the switch storage overhead. The present paper is an effort to retrospect and analyze the critical review of existing work for SDX. Furthermore, this paper provides a background of SDX, its components and its applications. Finally, this paper presents and compares the expected results of ELFR mechanism and related work.
Bluetooth low energy for internet of things: review, challenges, and open issues Mahmood A. Al-Shareeda; Murtaja Ali Saare; Selvakumar Manickam; Shankar Karuppayah
Indonesian Journal of Electrical Engineering and Computer Science Vol 31, No 2: August 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v31.i2.pp1182-1189

Abstract

As a result of its ultra-low power consumption, simple development, sufficient network coverage, and rapid data transfer speed, Bluetooth low energy (BLE) has emerged as the standard communication standard for internet of things (IoT) nodes. Therefore, in this review paper introduces the concept of Bluetooth low energy for the internet of things (BLE-IoT) in terms of Bluetooth classic, Bluetooth version, applications for BLE-IoT, and new features of BLE-IoT. We then provide a taxonomy of literature reviews based on the parameter adjustment approach (e.g., advertiser side schemes, scanner side schemes, hybrid schemes) and collision avoidance approach (e.g., advertiser side schemes and scanner side schemes). Finally, we discuss research challenges and future opportunities for BLE-IoT.
Validation of the toolkit for fake news awareness in social media Mahmood A. Al-Shareeda; Murtaja Ali Saare; Selvakumar Manickam; Shankar Karuppayah
Indonesian Journal of Electrical Engineering and Computer Science Vol 31, No 2: August 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v31.i2.pp1171-1181

Abstract

Fake news has gained attention in recent years, particularly among social media users. The quick spread of fake news has been made possible by the increased usage of social media as a platform to get the most recent news and information. As a consequence, it is getting harder to distinguish between real news and fake news. This essay will outline a study that evaluated the usefulness of a toolset for identifying false news. The first hypothesis is that an increase in media literacy will result in a rise in awareness of fake news. The second theory is that fake news toolkits significantly increase students’ and working adults’ awareness of false news. On the staff of a manufacturing company and an institution, a survey was undertaken. The organization’s employees were given approximately 150 questionnaires, and 110 responses were received. The project includes the creation of a web application-a false news awareness toolkit-that will raise user awareness of fake news in terms of knowledge, behaviour, and attitude among students and workers.
Wireless sensor networks in the internet of things: review, techniques, challenges, and future directions Fu Zijie; Mahmood A. Al-Shareeda; Murtaja Ali Saare; Selvakumar Manickam; Shankar Karuppayah
Indonesian Journal of Electrical Engineering and Computer Science Vol 31, No 2: August 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v31.i2.pp1190-1200

Abstract

Wireless sensor networks (WSN) are an emerging multidisciplinary intersection of cutting-edge research fields, and their advantages in terms of freedom of formation, high signal-to-noise ratio, high strength, and unattended, which makes WSN have good prospects for application in the field of internet of things (IoT). Considering all the benefits that WSN offer, this paper reviews the development history of wireless sensor networks internet of things (WSN-IoT), analyses the technologies used by sensors in the IoT, and illustrates the future developing patterns and remaining challenges, in conjunction with the main technologies in the perception layer of the current network of things industry.
The blockchain internet of things: review, opportunities, challenges, and recommendations Mahmood A. Al-Shareeda; Murtaja Ali Saare; Selvakumar Manickam
Indonesian Journal of Electrical Engineering and Computer Science Vol 31, No 3: September 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v31.i3.pp1673-1683

Abstract

A new technology known as the internet of things (IoT) allows both physical and virtual items to be linked and communicated with one another, creating new digital services that enhance our fineness of sustenance. The IoT system has a number of benefits, but because of its present centralized architecture, there are several problems with regard to data integrity, security, privacy, and single points of failure. The future development of IoT applications is hampered by these difficulties. To tackle these problems, it might be best to integrate the Internet of Things with one of the distributed ledger solutions. The blockchain is one of the most frequent and well-liked varieties of distributed ledger technologies. Numerous advantages can result from integrating blockchain technology with the IoT called blockchain internet of things (BIoT). In this paper, we show a brief overview of blockchain, its components of blockchain, and its features of blockchain. Meanwhile, we describe the architecture of BIoT, Issues of BIoT, and BIoT applications. Additionally, this paper provides a future research challenge and open issues.