Papers by Imane Aly Saroit
Many wireless sensor network applications require<br> K-coverage of the monitored area. In ... more Many wireless sensor network applications require<br> K-coverage of the monitored area. In this paper, we propose a<br> scalable harmony search based algorithm in terms of execution<br> time, K-Coverage Enhancement Algorithm (KCEA), it attempts to<br> enhance initial coverage, and achieve the required K-coverage degree<br> for a specific application efficiently. Simulation results show that<br> the proposed algorithm achieves coverage improvement of 5.34%<br> compared to K-Coverage Rate Deployment (K-CRD), which achieves<br> 1.31% when deploying one additional sensor. Moreover, the proposed<br> algorithm is more time efficient.

In this paper, we propose an efficient and a scalable protocol for secure multicast communication... more In this paper, we propose an efficient and a scalable protocol for secure multicast communication. This protocol is based on the Iolus and the logical key hierarchy protocols. It divides the whole group into several subgroups as in the Iolus protocol. Each subgroup in turn is organized in a logical key hierarchy as in the LKH protocol. This decomposition reduces the complexity for a member join or leave form O(n) to O(logm), where n is the number of the whole group members and m is the number of each subgroup members. The performance of the proposed protocol is compared with that of the Simple App., Iolus and LKH protocols. The comparison is undertaken according to the computational overhead, communication overhead, storage overhead, and message size. The results show that the proposed protocol enhances the group performance in terms of computation overhead, and communication overhead especially at the leave operation.
Towards a Unified Trust Model for M-commerce Systems
Page 1. Towards a Unified Trust Model for M-commerce Wafaa Saber Hamed IBM Egypt Global Delivery ... more Page 1. Towards a Unified Trust Model for M-commerce Wafaa Saber Hamed IBM Egypt Global Delivery Center, Global Business Services Haitham S. Hamza Department of Information Technology, Cairo University Imane Aly ...

New attacks and efficient countermeasures for multicast AODV
Security in multicast routing in MANETs is crucial in order to enable effective and efficient mul... more Security in multicast routing in MANETs is crucial in order to enable effective and efficient multicast-based applications. Multicast Ad-hoc On-demand Distance Vector (MAODV) protocol is one of the well-known multicast routing protocol in MANET. In this paper, we identify and describe, for the first time, three new protocol-dependant attacks on multicast operations of MAODV namely, Group Leader Selection (GLS); False Link Breakage (FLB) and Group Leader Pruning (GLP) attack. For each attack, we implement a scenario to demonstrate the impact of the attack on the performance of the network. Implemented scenarios show a considerable degradation in the Packet Delivery Ratio (PDR) of the protocol. Accordingly, we propose security countermeasures for the identified attacks. Simulation results of the secured and unsecured MAODV show that the proposed countermeasures are effective and efficient. In particular, compared to unsecured MAODV, the proposed countermeasures improve the PDR with 85%.
A survey on security enhanced multicast routing protocols in Mobile Ad hoc Networks
... Protocols in Mobile Ad Hoc Networks Ahmed. M. Abdel Mo&amp;#x27;men, Haitham. S. Hamza, I... more ... Protocols in Mobile Ad Hoc Networks Ahmed. M. Abdel Mo&amp;#x27;men, Haitham. S. Hamza, IEEE Member, and Iman. A. Saroit Abstract—A Mobile Ad-hoc Network (MANET) is a collec-tion of autonomous nodes that communicate with each other by forming a multi-hop radio network. ...
An energy-efficient hierarchical routing protocol for wireless sensor networks
... Protocol for Wireless Sensor Networks Sara Abd EL Aziz, Haitham S. Hamza, Imane A. Saroit Inf... more ... Protocol for Wireless Sensor Networks Sara Abd EL Aziz, Haitham S. Hamza, Imane A. Saroit Information Technology Department, Faculty of Computers and Information, Cairo University 5 Dr. Ahmed Zoweil st., Dokki, Giza 12613, Egypt. ... [6] K. Akkaya and M.Younis, ”A Survey ...
The ubiquity of the Internet poses serious concerns on the security of computer infrastructures a... more The ubiquity of the Internet poses serious concerns on the security of computer infrastructures and the integrity of sensitive data. Intrusion Detection Systems (IDS) aim at protecting networks and computers from malicious networkbased or host-based attacks. The underlying assumption of intrusion detection is an attack will noticeably affect system performance or behavior. Neural networks method is a promising technique, which has been used in many classification problems. The present study is aimed to solve a multi-class problem of intrusion detection using MLP in which not only the attack records are distinguished from normal ones, but also the attack type is identified. The results showed that the designed system is capable of classifying records with 93.43% accuracy with two hidden layers of neuron.
Optimizing Neural Network Architecture Using Tikhonov Regularization Parameter for Intrusion Detection Systems and Classification of Attacks
... Marwa S.Sharawi1, Mohammed Sammany2, Mohammed El-Beltagy3, and Imane Saroit4 ... THE AUTHOR W... more ... Marwa S.Sharawi1, Mohammed Sammany2, Mohammed El-Beltagy3, and Imane Saroit4 ... THE AUTHOR WOULD LIKE TO THANK: • Mehdi Moradi, from Queen's University Kingston, Ontario, Canada, for presenting his work in this domain and for giving the data sets used in our ...
This paper proposes a new approach for e-assessment or e-examination authentication. This approac... more This paper proposes a new approach for e-assessment or e-examination authentication. This approach enables educational institutions to conduct cheating-free e-examinations, which has been considered a big challenge of e-learning within the previous decade. It ensures that an examinee is the correct student throughout his exam. This approach provides virtual, interactive, and secure e-examination sessions. A prototype will be developed on Moodle with a media server to broadcast sessions. A control toolbox will be developed to provide interaction between a proctor and examinees. An e-exam can not be started without approval by a proctor who can also pause, resume or terminate an e-exam any time if an examinee violates examination instructions.

Procedia Computer Science, 2011
Intrusion Detection Systems (IDS) in Mobile Ad hoc Networks (MANETs) are required to develop a st... more Intrusion Detection Systems (IDS) in Mobile Ad hoc Networks (MANETs) are required to develop a strong security scheme it is therefore necessary to understand how malicious nodes can attack the MANETs. Focusing on the Optimized Link State Routing (OLSR) protocol, an IDS mechanism to accurately detect and isolate misbehavior node(s) in OLSR protocol based on End-to-End (E2E) communication between the source and the destination is proposed. The collaboration of a group of neighbor nodes is used to make accurate decisions. Creating and broadcasting attackers list to neighbor nodes enables other node to isolate misbehavior nodes by eliminating them from the routing table. Eliminating misbehavior node allows the source to select another trusted path to its destination. The simulation results show that the proposed mechanism is able to detect any number of attackers while keeping a reasonably low overhead in terms of network traffic.
Several approaches have been proposed for Intrusion Detection Systems (IDS) in Mobile Ad hoc Netw... more Several approaches have been proposed for Intrusion Detection Systems (IDS) in Mobile Ad hoc Networks (MANETs). Due to lack of MANETs infrastructure and well defined perimeter MANETs are susceptible to a variety of attacker types. To develop a strong security scheme it is necessary to understand how malicious nodes can attack the MANETs. Focusing on the Optimized Link State Routing (OLSR) protocol an IDS mechanism to accurately detect misbehavior node(s) in OLSR protocol based on End-to-End (E2E) communication between the source and the destination is proposed. The simulation results showed that the proposed mechanism is able to detect any number of attackers while keeping a reasonably low overhead in terms of network traffic.
International Journal of Advanced Computer Science and Applications, 2013
Several approaches have been proposed for Intrusion Detection Systems (IDS) in Mobile Ad hoc Netw... more Several approaches have been proposed for Intrusion Detection Systems (IDS) in Mobile Ad hoc Networks (MANETs). Due to lack of MANETs infrastructure and well defined perimeter MANETs are susceptible to a variety of attacker types. To develop a strong security mechanism it is necessary to understand how malicious nodes can attack the
Uploads
Papers by Imane Aly Saroit