Papers by Omar Banimelhem
Journal of Sensor and Actuator Networks, Apr 13, 2023
This article is an open access article distributed under the terms and conditions of the Creative... more This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY
Proactive Charging Mechanism for Wireless Rechargeable Sensor Networks
2022 International Arab Conference on Information Technology (ACIT), Nov 22, 2022

Computers
In this paper, an adaptive path construction approach for Mobile Sink (MS) in wireless sensor net... more In this paper, an adaptive path construction approach for Mobile Sink (MS) in wireless sensor networks (WSNs) for data gathering has been proposed. The path is constructed based on selecting Rendezvous Points (RPs) in the sensing field where the MS stops in order to collect the data. Compared with the most existing RP-based schemes, which rely on fixed RPs to construct the path where these points will stay fixed during the whole network lifetime, we propose an adaptive path construction where the locations of the RPs are dynamically updated using a Fuzzy Inference System (FIS). The proposed FIS, which is named Fuzzy_RPs, has three inputs and one output. The inputs are: the remaining energy of the sensor nodes, the transmission distance between the RPs and the sensor nodes, and the number of surrounding neighbors of each node. The output of FIS is a weight value for each sensor node generated based on the previous three parameters and, thus, each RP is updated to its new location acc...

Pilot Contamination Mitigation in Massive Multi-Input Multi-Output (MIMO) System
International Journal on Communications Antenna and Propagation (IRECAP), 2020
Massive MIMO is one of the key components in the technologies of the next generation wireless com... more Massive MIMO is one of the key components in the technologies of the next generation wireless communication network; the fifth generation (5G). Although massive MIMO is considered a promising technology in 5G, its efficiency is limited by the challenge of the pilot contamination problem. Pilot contamination problem occurs when user terminals in different cells concurrently share the same control signal set (called pilot sets), which results in causing interference in the estimated channel. In this paper, a model to reduce the pilot contamination problem and to increase the system sum-rate is proposed. The proposed model is a combination of three schemes: 1) A time-shifting protocol where the pilots are transmitted by users without overlapping in time; 2) A directional pilot scheme where the users directionally transmit the pilot; 3) A pilot allocation scheme for channel estimation based on the greedy algorithm to optimize the system sum-rate and the signal to interference and noise ratio with low complexity, and to mitigate the pilot contamination. Simulation results show that significant improvements are achieved compared to existing directional, time shifting and pilot allocation schemes.

An efficient coverage in wireless sensor networks using fuzzy logic-based control for the mobile node movement
2017 Advances in Wireless and Optical Communications (RTUWO), 2017
In large scale Wireless Sensor Networks (WSNs), the random deployment of the sensor nodes does no... more In large scale Wireless Sensor Networks (WSNs), the random deployment of the sensor nodes does not guarantee the desired level of the area coverage especially when the network is sparse. One of the solutions to overcome this problem is to use a mobile robot that is equipped with, in addition to the sensing unit, an actuator unit that controls its movement. In this case, the mobile robot is considered as a mobile sensor node that has the capability to monitor the uncovered regions in the sensor field. However, the main challenge in this case is how to control the movement of the mobile robot such that the area coverage is maximized and the time required to sample the uncovered regions is minimized. In this paper, we propose a fuzzy logic-based approach that controls the mobile robot movement in the sensor field in order to maximize the area coverage. The inputs of the fuzzy system determine the next point that the mobile node will select when it moves in the sensor field. Simulation results have shown that the proposed approach outperforms the random and standard moving patterns.
An Efficient Connectivity and Coverage Management Module for Software-Defined Wireless Sensor Networks
International Journal on Communications Antenna and Propagation (IRECAP)

Genetic-based Key Splitting Algorithm for the Two Layered Protection Scheme
2019 10th International Conference on Information and Communication Systems (ICICS)
Database as a service is one of the important services provided by Cloud Computing. Recently, a T... more Database as a service is one of the important services provided by Cloud Computing. Recently, a Two Layered Protection Scheme for securing the database has been proposed. The scheme employs two symmetric key encryption algorithms, the Order Preserving Encryption and Format Preserving Encryption. Each of the two encryption algorithms uses a different encryption key that is derived from Key Splitting module. Key Splitting module generates two keys from a Main Key by using a randomized algorithm. Randomized algorithm does not guarantee that the generated keys are always different because the resulting keys depend on the generated random numbers. Hence, in order to increase the security of the Two Layered Protection Scheme, a Genetic based Key Splitting algorithm is proposed. The purpose of the proposed algorithm is to generate the best random two keys that have maximum difference so that the two keys cannot be derived from each other. Simulation results have shown that the proposed algorithm generates random keys with maximum difference.

Fuzzy logic-based clustering approach with mobile sink for WSNs
One of the solutions that have been proposed in order to prolong the lifetime of Wireless Sensor ... more One of the solutions that have been proposed in order to prolong the lifetime of Wireless Sensor Networks (WSNs) is the use of mobile sinks. Depending on the application, mobile sinks can be used in WSNs for different objectives. In some applications, mobile sinks are used for increasing the coverage of the sensor field. Other applications employ them as data collectors. Whatever the application is, the main issue in utilizing the advantage of mobile sinks is the design of the path that the sink will follow in the senor field. In this paper, we use fuzzy logic in order to control the movement of the mobile sink while it collects the data from the sensor nodes. During the network operation and for every R rounds, a new position of the mobile sink is calculated using fuzzy logic. The calculation of the new position is considered a fuzzy logic-based decision which depends on the remaining energy of the sensor nodes and the current distance of the mobile sink relative to the sensor node...

Communications and Network, 2013
In hybrid wireless sensor networks composed of both static and mobile sensor nodes, the random de... more In hybrid wireless sensor networks composed of both static and mobile sensor nodes, the random deployment of stationary nodes may cause coverage holes in the sensing field. Hence, mobile sensor nodes are added after the initial deployment to overcome the coverage holes problem. To achieve optimal coverage, an efficient algorithm should be employed to find the best positions of the additional mobile nodes. This paper presents a genetic algorithm that searches for an optimal or near optimal solution to the coverage holes problem. The proposed algorithm determines the minimum number and the best locations of the mobile nodes that need to be added after the initial deployment of the stationary nodes. The performance of the genetic algorithm was evaluated using several metrics, and the simulation results demonstrated that the proposed algorithm can optimize the network coverage in terms of the overall coverage ratio and the number of additional mobile nodes.
A Novel High Quality High Capacity Image Hiding Scheme Based on Image Compression and an Optical Pixel Adjustment Process
Information Security Journal: A Global Perspective, 2012
Image hiding methods embed a secret image into a host image. The resultant stego-image does not a... more Image hiding methods embed a secret image into a host image. The resultant stego-image does not attract the interceptors that would not detect the differences between the host image and the stego-image. To exploit the great developments in the area of image compression and to improve the quality of stego-image, this paper proposes a new method to embed the secret

An Enhanced Energy-Efficient Coverage Protocol for Wireless Sensor Networks
2021 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology (JEEIT), 2021
The area coverage in wireless sensor networks (WSN) is an important issue as it reflects the qual... more The area coverage in wireless sensor networks (WSN) is an important issue as it reflects the quality of service a certain WSN can achieve. In large scale WSNs, scheduling the sensor nodes activities is used to utilize the large number of available sensor nodes efficiently and therefore extending the network lifetime. In scheduling the monitoring task between the nodes, an energy will be consumed due to the switching between nodes states. The effect of such operation could increase if it takes place frequently during the node lifetime. Therefore, a proper approach should be used to eliminate the impact of switching between states on the energy consumption. This paper proposes a mechanism that determines how a sensor node sets its Sleep timer when it goes to the Sleep state. The proposed approach is an enhancement on one of the current scheduling protocols. Simulation results have shown an improvement of the proposed approach compared with the original protocol and its variant in terms of extending the network lifetime.

International Journal of Fuzzy System Applications, 2015
In wireless sensor networks, cluster-based routing was proven to be the most energy-efficient str... more In wireless sensor networks, cluster-based routing was proven to be the most energy-efficient strategy to deal with the scaling problem. In addition, selecting the proper number of clusters is a critical decision that can impose a significant impact on the energy consumption and the network lifetime. This paper presents FL-LEACH, a variant of the well-known LEACH clustering protocol, which attempts to relax the stringent strategy of determining the number of clusters used by LEACH via fuzzy logic decision-making scheme. This relates the number of clusters to a number of network characteristics such as the number of sensor nodes, the area of the sensing field, and the location of the base station. The performance of FL-LEACH was evaluated via simulation and was compared against LEACH using standard metrics such as network lifetime and remaining network energy. The results depicted that the proposed approach has the potential to substantially conserve the sensor node energy and extend...

An Enhanced EPC Gen2v2 RFID Authentication and Ownership Management Protocol
2017 IEEE 42nd Conference on Local Computer Networks (LCN), 2017
Radio frequency identification is a modern technology for item identification that has widely spr... more Radio frequency identification is a modern technology for item identification that has widely spread over the recent years. In order to securely identify the items and transfer their ownership from one entity to another, several authentication and ownership management protocols have been proposed. One of the recent protocols is Niu et al.'s EPC Class 1 Generation 2 RFID Standard Authentication and Ownership Management protocol. This lightweight protocol is mainly based on the use of bitwise XOR and permutation operations in addition to the lightweight 16-bit Pseudo Random Number Generator. However, Bagheri et al. launched de-synchronization and secret-disclosure attacks against Niu et al.'s protocol and proved that it does not fulfill the requirements for a secure authentication and ownership management protocol. In this paper, we propose an enhancement for Niu et al.'s protocol such that it can resist the de-synchronization and secret-disclosure attacks. The enhanced pr...

A new routing protocol that handles real-time and non-real time applications in Wireless Sensor N... more A new routing protocol that handles real-time and non-real time applications in Wireless Sensor Networks (WSNs) is proposed. We employ the idea of dividing the sensor network field into grids. Inside each grid, one of the sensor nodes is selected as a master node which is responsible for delivering the data generated by any node in that grid and for routing the data received from other master nodes in the neighbor grids. For each master node, multiple paths that connect the master node to the sink are stored as routing entries in the routing table of that node. These paths are the diagonal paths between the sink and the master node. In case of congestion occurrence, a novel congestion control mechanism is also proposed in order to relieve the congested areas. Simulation results have shown that our proposed protocol has the capability to extend the lifetime of the sensor network and to utilize the available storage.

Pilot contamination mitigation in massive MIMO-based 5G wireless communication networks
2018 9th International Conference on Information and Communication Systems (ICICS), 2018
Massive MIMO (Multiple-Input Multiple-Output) is one of the most promising technologies to be use... more Massive MIMO (Multiple-Input Multiple-Output) is one of the most promising technologies to be used in the fifth generation wireless communication networks (5G), which are expected to be deployed as the next generation after the 4G, to provide better throughput and better spectrum efficiency using multiple transmit and receive antennas. Pilot contamination is one of the challenges in using massive MIMO technology in 5G, where pilot is a single frequency control signal transmitted over the communication system for channel state information (CSI). Contamination happens when users in adjacent cells have the same pilot sets. Therefore, channel estimation will interfere at base stations. In this paper, we propose an approach to mitigate pilot contamination in massive MIMO systems deployed in time division duplexing (TDD) 5G cellular networks. The proposed approach is based on coupling two pilot decontamination schemes. Firstly, pilot locations shifting in time to reduce inter-cell interfe...
Journal of Sensor and Actuator Networks
Recently, the data collection problem in wireless sensor networks (WSNs) using mobile sinks has r... more Recently, the data collection problem in wireless sensor networks (WSNs) using mobile sinks has received much attention. The main challenge in such problems is constructing the path that the mobile sink (MS) will use to collect the data. In this paper, an efficient path generation algorithm for the mobile sink based on principal component analysis (PCA) is proposed. The proposed approach was evaluated using two data collection modes—direct and multihop—and it was compared with another approach called the mobile-sink-based energy-efficient clustering algorithm for wireless sensor networks (MECA). When compared with MECA, simulation results have shown that the proposed approach improves the performance of WSN in terms of the number of live nodes and average remaining energy.

International Journal of Computational Intelligence Systems, 2018
The evolution of wireless multimedia sensor networks (WMSN) has opened the door to a wide range o... more The evolution of wireless multimedia sensor networks (WMSN) has opened the door to a wide range of applications such as telemedicine, surveillance, and intrusion detection. However, the delivery of multimedia content over wireless sensor networks requires maintaining the quality of service demands of the applications as well as the resource constraints of the network. This has motivated the design of cross-layer architectures as a promising solution for efficiently meeting the quality of service requirements and the resource constraints in WMSN. In this paper, a cross-layer design for image transmission, using fuzzy logic, is proposed to provide quality of service guarantees and efficient resource utilization in WMSN. The proposed cross-layer design takes into consideration the trade-off between the network performance and the quality of received images by exploiting the information exchange between different layers in the protocol stack. The simulation results demonstrate that the proposed approach can efficiently improve the network performance in terms of packet loss, delay, and energy consumption, while maintaining an acceptable level of quality of the received images.
Image Steganography using YCbCr Color Space and Matrix Pattern
2019 2nd International Conference on Signal Processing and Information Security (ICSPIS)
Building maps for mobile robot navigation using fuzzy classification of ultrasonic range data
Journal of Intelligent Fuzzy Systems Applications in Engineering and Technology, 2001
... Omar M. Al-Jarrah ∗ and Omar Q. Bani-Melhem Department of Computer Engineering, Jordan Univer... more ... Omar M. Al-Jarrah ∗ and Omar Q. Bani-Melhem Department of Computer Engineering, Jordan University of Science and Technology, Irbid 22110, Jordan E-mail: {aljarrah ... The second type of virtual rotation is to ro-tate the sensor ring into the Most Occupied Orienta-tion (MOO). ...
Deploying multicast communication over MPLS networks using tree numbering
Proceedings International Symposium on Computers and Communications, Jun 27, 2005
... In [11], we have proposed an approach that depends on state encoding (SE) of the interfaces o... more ... In [11], we have proposed an approach that depends on state encoding (SE) of the interfaces of each router that a multicast tree passes through. ... Page 7. Table 3: Network topologies used in our simulation ... [9] B. Yang and P. Mohapatra, “Edge Router Multicasting with MPLS ...
Uploads
Papers by Omar Banimelhem