Papers by Mohammad Hammoudeh
Proceedings of the International Conference on Internet of things and Cloud Computing - ICC '16, 2016
2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW), 2016
Proceedings of the International Conference on Intelligent Information Processing, Security and Advanced Communication - IPAC '15, 2015

The Open Automation and Control Systems Journal, 2016
Several recent studies have demonstrated the benefits of using the Wireless Sensor Network (WSN) ... more Several recent studies have demonstrated the benefits of using the Wireless Sensor Network (WSN) technology in large-scale monitoring applications, such as planetary exploration and battlefield surveillance. Sensor nodes generate continuous stream of data, which must be processed and delivered to end users in a timely manner. This is a very challenging task due to constraints in sensor node's hardware resources. Mobile Unmanned Ground Vehicles (UGV) has been put forward as a solution to increase network lifetime and to improve system's Quality of Service (QoS). UGV are mobile devices that can move closer to data sources to reduce the bridging distance to the sink. They gather and process sensory data before they transmit it over a long-range communication technology. In large-scale monitored physical environments, the deployment of multiple-UGV is essential to deliver consistent QoS across different parts of the network. However, data sink mobility causes intermittent connectivity and high re-connection overhead, which may introduce considerable data delivery delay. Consequently, frequent network reconfigurations in multiple data sink networks must be managed in an effective way. In this paper, we contribute an algorithm to allow nodes to choose between multiple available UGVs, with the primary objective of reducing the network reconfiguration and signalling overhead. This is realised by assigning each node to the mobile sink that offers the longest connectivity time. The proposed algorithm takes into account the UGV's mobility parameters, including its movement direction and velocity, to achieve longer connectivity period. Experimental results show that the proposed algorithm can reduce end-to-end delay and improve packet delivery ratio, while maintaining low sink discovery and handover overhead. When compared to its best rivals in the literature, the proposed approach improves the packet delivery ratio by up to 22%, end-to-end delay by up to 28%, energy consumption by up to 58%, and doubles the network lifetime.
Procedia Computer Science, 2015
Lecture Notes in Computer Science, 2012
6th Joint IFIP Wireless and Mobile Networking Conference (WMNC), 2013
2013 European Intelligence and Security Informatics Conference, 2013
The recovery of data from mobile phones is a very specialist and evolving field, which can make c... more The recovery of data from mobile phones is a very specialist and evolving field, which can make considerable assistance in the prosecution of criminal cases. Data can include not just call history or text messages but, as mobile phones become more smart, it can also include internet web pages, chat data, social media files and other application data. In this paper we present an open-source toolkit has been developed to improve workflow for forensic analysts and to aid Android OS mobile phone forensics. This toolkit has been designed to automatically extract and handle all data extracted from the devices so that vital intelligence can be searched and identified quickly, accurately and efficiently. This paper describes and presents the features of this toolkit.

Sensors (Basel, Switzerland), Jan 11, 2015
This paper presents a distributed information extraction and visualisation service, called the ma... more This paper presents a distributed information extraction and visualisation service, called the mapping service, for maximising information return from large-scale wireless sensor networks. Such a service would greatly simplify the production of higher-level, information-rich, representations suitable for informing other network services and the delivery of field information visualisations. The mapping service utilises a blend of inductive and deductive models to map sense data accurately using externally available knowledge. It utilises the special characteristics of the application domain to render visualisations in a map format that are a precise reflection of the concrete reality. This service is suitable for visualising an arbitrary number of sense modalities. It is capable of visualising from multiple independent types of the sense data to overcome the limitations of generating visualisations from a single type of sense modality. Furthermore, the mapping service responds dynami...
Communications in Computer and Information Science, 2012

International Journal of Advanced Computer Science and Applications, 2015
Clouds are distributed Internet-based platforms that provide highly resilient and scalable enviro... more Clouds are distributed Internet-based platforms that provide highly resilient and scalable environments to be used by enterprises in a multitude of ways. Cloud computing offers enterprises technology innovation that business leaders and IT infrastructure managers can choose to apply based on how and to what extent it helps them fulfil their business requirements. It is crucial that all technical consultants have a rigorous understanding of the ramifications of cloud computing as its influence is likely to spread the complete IT landscape. Security is one of the major concerns that is of practical interest to decision makers when they are making critical strategic operational decisions. Distributed Denial of Service (DDoS) attacks are becoming more frequent and effective over the past few years, since the widely publicised DDoS attacks on the financial services industry that came to light in September and October 2012 and resurfaced in the past two years. In this paper, we introduce advanced cloud security technologies and practices as a series of concepts and technology architectures, from an industry-centric point of view. This is followed by classification of intrusion detection and prevention mechanisms that can be part of an overall strategy to help understand identify and mitigate potential DDoS attacks on business networks. The paper establishes solid coverage of security issues related to DDoS and virtualisation with a focus on structure, clarity, and well-defined blocks for mainstream cloud computing security solutions and platforms. In doing so, we aim to provide industry technologists, who may not be necessarily cloud or security experts, with an effective tool to help them understand the security implications associated with cloud adoption in their transition towards more knowledge-based systems.
This paper presents a survey of simulation tools and systems for wireless sensor networks. Wirele... more This paper presents a survey of simulation tools and systems for wireless sensor networks. Wireless sensor network modelling and simulation methodologies are presented for each system alongside judgments concerning their relative ease of use and accuracy. Finally, we propose a mixed-mode simulation methodology that integrates a simulated environment with real wireless sensor network testbed hardware in order to improve both the accuracy and scalability of results when evaluating different prototype designs and systems.
International Conference on Education and e-Learning Innovations, 2012
2013 European Intelligence and Security Informatics Conference, 2013

Lecture Notes in Computer Science, 2009
Opportunistic networks have evolved from mobile ad hoc networking and the delayed tolerant networ... more Opportunistic networks have evolved from mobile ad hoc networking and the delayed tolerant networking paradigms and have quickly gained popularity in research and industry. In opportunistic networking, when pairs of devices come within each others communication range, opportunistically, short-lived links (or opportunistic links) are created. Opportunistic computing exploits the opportunistic links created by pair-wise contacts, to share information content, resources and services, leading to a wide variety of applications. In this talk we discuss the research challenges and issues in exploiting opportunistic contacts to create a delay tolerant distributed computing environment. Further more, the impact of social computing and networking paradigms for such problems as synchronization and trust will be investigated. Results of ongoing research work on information dissemination, collaboration and trust will be presented. The research work is supported through an NSF grant.

Wireless Communications and Mobile Computing, 2013
Wireless sensor networks (WSNs) typically gather data at a discrete number of locations. However,... more Wireless sensor networks (WSNs) typically gather data at a discrete number of locations. However, it is desirable to be able to design applications and reason about the data in more abstract forms than in points of data. By bestowing the ability to predict inter-node values upon the network, it is proposed that it will become possible to build applications that are unaware of the concrete reality of sparse data. This interpolation capability is realised as a service of the network. In this paper, the 'map' style of presentation has been identified as a suitable sense data visualisation format. Although map generation is essentially a problem of interpolation between points, a new WSN service, called the map generation service, which is based on a Shepard interpolation method, is presented. A modified Shepard method that aims to deal with the special characteristics of WSNs is proposed. It requires small storage, can be localised and integrates the information about the application domain to further reduce the map generation cost and improve the mapping accuracy. Empirical analysis has shown that the map generation service is an accurate, a flexible and an efficient method.

Information Fusion, 2013
Wireless sensor networks are an effective tool to provide fine resolution monitoring of the physi... more Wireless sensor networks are an effective tool to provide fine resolution monitoring of the physical environment. Sensors generate continuous streams of data, which leads to several computational challenges. As sensor nodes become increasingly active devices, with more processing and communication resources, various methods of distributed data processing and sharing become feasible. The challenge is to extract information from the gathered sensory data with a specified level of accuracy in a timely and power-efficient approach. This paper presents a new solution to distributed information extraction that makes use of the morphological Watershed algorithm. The Watershed algorithm dynamically groups sensor nodes into homogeneous network segments with respect to their topological relationships and their sensingstates. This setting allows network programmers to manipulate groups of spatially distributed data streams instead of individual nodes. This is achieved by using network segments as programming abstractions on which various query processes can be executed. Aiming at this purpose, we present a reformulation of the global Watershed algorithm. The modified Watershed algorithm is fully asynchronous, where sensor nodes can autonomously process their local data in parallel and in collaboration with neighbouring nodes. Experimental evaluation shows that the presented solution is able to considerably reduce query resolution cost without scarifying the quality of the returned results. When compared to similar purpose schemes, such as ''Logical Neighborhood'', the proposed approach reduces the total query resolution overhead by up to 57.5%, reduces the number of nodes involved in query resolution by up to 59%, and reduces the setup convergence time by up to 65.1%.

Information Fusion, 2013
One of the key challenges for research in wireless sensor networks is the development of routing ... more One of the key challenges for research in wireless sensor networks is the development of routing protocols that provide application-specific service guarantees. This paper presents a new cluster-based Route Optimisation and Load-balancing protocol, called ROL, that uses various Quality of Service (QoS) metrics to meet application requirements. ROL combines several application requirements, specifically it attempts to provide an inclusive solution to prolong network life, provide timely message delivery and improve network robustness. It uses a combination of routing metrics that can be configured according to the priorities of user-level applications to improve overall network performance. To this end, an optimisation tool for balancing the communication resources for the constraints and priorities of user applications has been developed and Nutrient-flow-based Distributed Clustering (NDC), an algorithm for load balancing is proposed. NDC works seamlessly with any clustering algorithm to equalise, as far as possible, the diameter and the membership of clusters. This paper presents simulation results to show that ROL/ NDC gives a higher network lifetime than other similar schemes, such Mires++. In simulation, ROL/NDC maintains a maximum of 7% variation from the optimal cluster population, reduces the total number of set-up messages by up to 60%, reduces the end-to-end delay by up to 56%, and enhances the data delivery ratio by up to 0.98% compared to Mires++.
Uploads
Papers by Mohammad Hammoudeh