Osamah Ibrahiem Abdullaziz

ORCID: 0000-0003-2667-3783
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Internet Traffic Analysis and Secure E-voting
  • Software-Defined Networks and 5G
  • IoT and Edge/Fog Computing
  • Network Security and Intrusion Detection
  • Caching and Content Delivery
  • Advanced Steganography and Watermarking Techniques
  • Opportunistic and Delay-Tolerant Networks
  • Cloud Computing and Resource Management
  • Advanced Data and IoT Technologies
  • Advanced MIMO Systems Optimization
  • Advanced Neural Network Applications
  • Video Surveillance and Tracking Methods
  • Wireless Networks and Protocols
  • Modular Robots and Swarm Intelligence
  • Advanced Photonic Communication Systems
  • Graph Theory and Algorithms
  • Age of Information Optimization
  • Telecommunications and Broadcasting Technologies
  • Advanced Optical Network Technologies
  • Chaos-based Image/Signal Encryption
  • UAV Applications and Optimization
  • Advanced Malware Detection Techniques

National Yang Ming Chiao Tung University
2016-2021

ITRI International
2018

Industrial Technology Research Institute
2017

Multimedia University
2013-2016

Software defined network (SDN) is an emerging architecture which offloads the control logic of from underlying forwarding devices to a centralized controller. This intelligence software defines behavior network. However, programmability and centralization SDN introduce potential security concerns. In this paper, we first investigate threats denial service (DoS) attacks on channel. Then, evaluate impact DoS by simulating attack against Our results show that it possible exhaust controller...

10.1109/glocom.2016.7841954 article EN 2015 IEEE Global Communications Conference (GLOBECOM) 2016-12-01

Software defined networking (SDN) enables network function programmability for ease of configuration and maintenance, also allows administrators to change traffic rules on the fly. However, denial service (DoS) attacks pose security challenges centralized control plane SDN. Although transport layer (TLS) can help secure plane, it is computationally intensive, complex configure, not mandatory in OpenFlow protocol. In this paper, we present a lightweight authentication solution, called hidden...

10.1109/tnsm.2019.2909116 article EN IEEE Transactions on Network and Service Management 2019-04-03

Network steganography is an emerging research field, which exploits packet protocol headers, mechanism, payload, etc. to establish secret communication between two parties over a computer network. The detection of such hidden has not been part intrusion systems that are primarily used detect malicious activities as viruses and malwares. In this paper, we propose packet-length based steganographic techniques implement covert channel. We examine analyze the lengths normal traffic show our can...

10.1109/csudet.2013.6670985 article EN 2013-05-01

Pushing contents, applications, and network functions closer to end users is necessary cope with the huge data volume low latency required in future 5G networks. Edge fog frameworks have emerged recently address this challenge. Whilst edge framework was more infrastructure-focused mobile operator-oriented, pervasive included any node (stationary or mobile), including terminal devices. This article analyzes opportunities challenges integrate, federate, jointly orchestrate resources into a...

10.1109/wcncw.2018.8369006 article EN 2018-04-01

Edge networking has become an important technology for providing low-latency services to end users. However, deploying edge network does not guarantee continuous service mobile Mobility can cause frequent interruptions and delays as users leave the initial serving edge. In this paper, we propose a solution provide transparent continuity in large-scale WiFi networks. The contribution of work three parts. First, ARNAB architecture achieve continuity. term means rabbit Arabic, which represents...

10.1109/tnse.2019.2953129 article EN IEEE Transactions on Network Science and Engineering 2019-11-20

Energy efficiency is likely to be the litmus test for sustainability of upcoming 5G networks. Before new generation cellular networks are ready roll out, their architecture designers motivated leverage SDN technology sake its offered flexibility, scalability, and programmability achieve KPI 10 times lower energy consumption. In this paper, we present Proofs-of-Concept Management Monitoring Applications (EMMAs) in context three challenging, realistic case studies, along with a SDN/NFV-based...

10.1109/eucnc.2017.7980760 article EN 2017-06-01

The fifth generation (5G) mobile network has paved the way for innovations across vertical industries. integration of distributed intelligent edge into 5G orchestrated architecture brings benefits low-latency and automation. A successful example this is exhibited by 5G-DIVE project, which aims at proving technical merits business value proposition industries such as autonomous drone surveillance navigation. In paper, part 5G-DIVE, we present an aerial disaster relief system, called EagleEYE,...

10.1109/eucnc48522.2020.9200963 article EN 2020-06-01

In this paper, we present an architecture for transparent service continuity cloud-enabled WiFi networks called ARNAB: ARchitecture traNsparent viA douBle-tier migration. The term arnab means rabbit in Arabic. It is dubbed the proposed because a mobile-user with ARNAB behaves like hopping through infrastructure. To deliver continuous services, deploying edge clouds not sufficient. Users may travel far from initial serving and also perform multiple handoffs during mobility. solve this,...

10.1109/glocomw.2018.8644091 article EN 2022 IEEE Globecom Workshops (GC Wkshps) 2018-12-01

Because of SDN centralization nature, denial service (DoS) attacks have become a prominent concern. In the OpenFlow (OF) protocol, transport layer security (TLS) protocol is recommended to secure control channel. Unfortunately, tasks involved in proper configuration secured TLS are very challenging. Even worse, made an optional mode communication OF. As consequence, some OF-enabled switches and controllers do not adopt TLS. this paper, we develop lightweight authentication mechanism, called...

10.1109/wcnc.2019.8885764 article EN 2022 IEEE Wireless Communications and Networking Conference (WCNC) 2019-04-01

In this work, we propose a fragmentation resilient IP identification based data embedding method. First, analyze the generation in various operating systems to validate feasibility of our proposal. Then, put forward proposal embed into field while considering from payload field. Results suggest that proposed method resembles ordinary pattern and can mitigate problem packet fragmentation.

10.1109/icce-tw.2015.7216804 article EN 2022 IEEE International Conference on Consumer Electronics - Taiwan 2015-06-01

In this paper, we provide an experimental evaluation of a commercial grade energy efficient radio-over-fiber (RoF) network for high-speed trains. While the fifth generation (5G) aims to improve capacity by thousand-fold through densification, consumption management has become very challenging. Towards vision, develop and evaluate RoF-based software defined monitoring application (EMMA) train networks. Our results show that proposed solution can not only minimize footprint, but also platform...

10.1109/noms.2018.8406303 article EN NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium 2018-04-01

In moving train networks, two-hop architecture is adopted to improve users experience by reducing the interaction between on-board and base stations on route. addition, edge networking have emerged as a solution for bringing services proximity of users. However, deploying networks do not guarantee continuous service delivery When large number transit from land, they interruption due control signalling storm backhaul latency. this paper, we propose holistic management system provide mobile...

10.1109/pimrc.2019.8904853 article EN 2019-09-01
Coming Soon ...