Abdullah M. Almuhaideb

Abdullah M. Almuhaideb

الشرقية الدمام السعودية
٤ آلاف متابع أكثر من 500 زميل

مقالات Abdullah M.

النشاط

انضم الآن لعرض كل النشاط

الخبرة

  • رسم بياني Ministry of Education, Saudi Arabia
  • -

    Dammam, Eastern, Saudi Arabia

  • -

    Dammam, Eastern, Saudi Arabia

  • -

    Al-Dammam Governorate, Saudi Arabia

  • -

    Al-Dammam Governorate, Saudi Arabia

  • -

    Al-Dammam Governorate, Saudi Arabia

  • -

  • -

    College of Computer Sciences & Information Technology

  • -

    College of Computer Sciences & Information Technology

  • -

    Saudi Arabia

  • -

    Saudi Arabia

  • -

  • -

    Saudi Arabia

  • -

التعليم

  • رسم بياني Monash University

    Monash University

    -

    الأنشطة والجمعيات:Member of Mobility Lab, Caulfield School of Information Technology, at Distributed System and Software Engineering (DSSE) Research Group. Monash is ranked one of the top 50 universities in the world as per the Times Higher Education World University Rankings.

    Advisor: Bala Srinivasan
    Thesis title: Secure Mobile Authentication in Ubiquitous Networking Environments

  • -

    الأنشطة والجمعيات:Average of High Distinction. Cumulative GPA is 3.5 (out of 4). Monash University Chapter of the Golden Key International Honour Society (top 15%). Received the highest grade for Network Administration subject. Facilities Manager of Monash Caulfield Islamic Society (MCIS).

    Advisor: Arkady Zaslavsky

    ITAG (ITinerary AGents): The project focuses on the itinerant mobile agents (ITAG) research challenges and describes the migration of ITAG to JADE, the popular FIPA-compliant agent platform. The migration process was based on two major steps: the migration of agent communications and agent tasks (behaviors). The ITAG Engine has been extracted to provide an easy migration to any new agent platform. In our experiments the results show that the current ITAGIII…

    Advisor: Arkady Zaslavsky

    ITAG (ITinerary AGents): The project focuses on the itinerant mobile agents (ITAG) research challenges and describes the migration of ITAG to JADE, the popular FIPA-compliant agent platform. The migration process was based on two major steps: the migration of agent communications and agent tasks (behaviors). The ITAG Engine has been extracted to provide an easy migration to any new agent platform. In our experiments the results show that the current ITAGIII (using JADE) has better performance and stability compared to ITAGII (using Grasshopper). The project is funded by the Australian Research Council’s Research Network on Enterprise Information Infrastructure (EII) through the Taskforce on Context-Aware Computing.

  • -

  • -

    الأنشطة والجمعيات:1) Trainer (ASP short course, 5 days) at Science Society. 2) Member of Saudi Computer Society.

    KFU E-Learning System: It is a one year research project that analyzed, designed and developed e-learning services for King Faisal University. In the analyzing stage, interviews and questionnaires have been conducted for both students and academic staff in order to define the project objectives and requirements. The project involved many stages including data flow diagram, input output interfaces, database development and the entities relationship. In the final stage, the e-learning system has…

    KFU E-Learning System: It is a one year research project that analyzed, designed and developed e-learning services for King Faisal University. In the analyzing stage, interviews and questionnaires have been conducted for both students and academic staff in order to define the project objectives and requirements. The project involved many stages including data flow diagram, input output interfaces, database development and the entities relationship. In the final stage, the e-learning system has been implemented.

التراخيص والشهادات

المنشورات

  • A Hybrid Mobile Authentication Model for Ubiquitous Networking

    Trustcom/BigDataSE/ISPA, 2015 IEEE (Volume:1 )

    The development in mobile devices and wireless technologies (e.g Cellular, Wi-Fi) has facilitated a growth in mobile services. As mobile users are usually moving, roaming services are deployed to allow users to access foreign network services without being limited to the geographical coverage of their home networks. Several solutions have been proposed to allow ubiquitous mobile access authentication; however, limitations still exist in these approaches, such as performance issues and security…

    The development in mobile devices and wireless technologies (e.g Cellular, Wi-Fi) has facilitated a growth in mobile services. As mobile users are usually moving, roaming services are deployed to allow users to access foreign network services without being limited to the geographical coverage of their home networks. Several solutions have been proposed to allow ubiquitous mobile access authentication; however, limitations still exist in these approaches, such as performance issues and security vulnerabilities. In this paper a novel hybrid mobile authentication model is proposed, with its realisation through suitable protocols that combine the advantages of both distributed and centralised models. The proposed Passport and Visa tokens assist a foreign network in authenticating and authorising visiting mobile users. These tokens also offer a unique solution to achieving secure and efficient key management. Most importantly, the proposed solution provides an efficient technique, using recency evidence (a Passport Stamp), to tackle the problem of a user revocation status check. The security and performance analysis demonstrates that the proposed protocols efficiently ensure secure roaming, greatly enhance computation speed, and reduce communication costs.

    مؤلفون آخرون
    عرض المنشور
  • Secure Mobile Authentication in Ubiquitous Networking Environments

    MONASH University

    This research project first investigates the existing mobile
    authentication approaches for ubiquitous networking and then proposes a secure hybrid authentication solution with high flexibility and good performance to facilitate users’ mobility. The proposed model combines the advantages of both centralised and distributed authentication models in terms of security and performance while still achieving flexibility.

    عرض المنشور
  • Analysis of mobile authentication protocols by SVO logic

    ACM

    The next generation of mobile services makes it desirable for mobile users to be connected everywhere. Since these users usually in the move, roaming services are deployed to allow mobile users to access foreign network services without being limited to the geographical coverage of their home networks. Several solutions have been proposed based on either two-party or three-party roaming structure to allow ubiquities mobile access authentication, however, limitations such as performance issues…

    The next generation of mobile services makes it desirable for mobile users to be connected everywhere. Since these users usually in the move, roaming services are deployed to allow mobile users to access foreign network services without being limited to the geographical coverage of their home networks. Several solutions have been proposed based on either two-party or three-party roaming structure to allow ubiquities mobile access authentication, however, limitations such as performance issues and security vulnerabilities still exist in these approaches. In this paper, we implemented a methodology for verifying authentication protocols based on SVO logic, which shows that our Passport/Visa protocols meet the desired authentication objectives and prove the protocols correctness. Moreover, we show that our proposal addresses existing limitations when compared to the other approaches.

    مؤلفون آخرون
    عرض المنشور
  • Two-Party Mobile Authentication Protocols for Wireless Roaming Networks

    IEEE

    Mobile Internet access has significantly increased over the past few years. Roaming into foreign networks becomes necessary in order to access mobile-services. Traditionally, this done based on roaming agreement between the home network and the foreign network to extend trust for mobile users. However, secured mobile authentication is a challenge especially in two-party authentication environment where only the visited user and the foreign network get involved. This paper proposes two-party…

    Mobile Internet access has significantly increased over the past few years. Roaming into foreign networks becomes necessary in order to access mobile-services. Traditionally, this done based on roaming agreement between the home network and the foreign network to extend trust for mobile users. However, secured mobile authentication is a challenge especially in two-party authentication environment where only the visited user and the foreign network get involved. This paper proposes two-party secure roaming protocols based on direct negotiation with potential foreign networks regarding quality of service, pricing and other billing related features, in order to establish service agreement and get the authorization token. The paper provides better performance to check the revocation status of the mobile user using recency evidence compare to the previously used revocation list. Identity Based Signature is used to stop impersonation attack. The security and performance analysis indicates that our protocol is resistant to well-known attacks, and it ensures efficient roaming.

    مؤلفون آخرون
    • Phu Dung Le
    • Bala Srinivasan
    عرض المنشور
  • Securing mobile access in ubiquitous networking via non-roaming agreement protocol

    Springer Berlin/Heidelberg

    Rapid developments in wireless technologies in terms of speed, quality and coverage are great motivations that lead to an increase in the use of mobile devices such as laptops and smart phones. These developments facilitate exchanging information anywhere any time. However, some concerns have been raised especially when the mobile users want to access services that provided by foreign networks. These issues can be classified as security and performance matters. This paper proposes a fast and…

    Rapid developments in wireless technologies in terms of speed, quality and coverage are great motivations that lead to an increase in the use of mobile devices such as laptops and smart phones. These developments facilitate exchanging information anywhere any time. However, some concerns have been raised especially when the mobile users want to access services that provided by foreign networks. These issues can be classified as security and performance matters. This paper proposes a fast and secure authentication protocol. The new feature about this protocol is that the foreign network (FN) can authenticate the mobile user (MU) without checking with the home network (HN). This feature can effectively enhance the network performance as just two messages are required to authenticate the MU. Moreover, we will demonstrate the strengths of this protocol against the common security attacks and we will compare the protocol performance with the previous protocols to ensure efficiency.

    مؤلفون آخرون
    • Talal Alharbi
    • Phu Dung Le
    عرض المنشور
  • Passport/Visa: Authentication and Authorisation Tokens for Ubiquitous Wireless Communications

    Springer Berlin Heidelberg

    Ubiquitous connectivity faces interoperation issues between wireless network providers when authenticating visiting users. This challenge lies in the fact that a foreign network provider does not initially have the authentication credentials of the mobile users. The existing approaches are based on roaming agreement to exchange authentication information between the home network and a foreign network. This paper proposes Passport/Visa approach that consists of two tokens: Passport…

    Ubiquitous connectivity faces interoperation issues between wireless network providers when authenticating visiting users. This challenge lies in the fact that a foreign network provider does not initially have the authentication credentials of the mobile users. The existing approaches are based on roaming agreement to exchange authentication information between the home network and a foreign network. This paper proposes Passport/Visa approach that consists of two tokens: Passport (authentication token) and Visa (authorisation token), to provide a flexible authentication method for foreign networks to authenticate mobile users. Our approach can be used when there is no roaming agreement between foreign networks and the mobile user’s home network. The security analysis indicates that our protocol is resistant to well-known attacks, ant it efficiently ensures the security for both mobile users and network providers. The performance analysis also demonstrated that the proposed protocol will greatly enhance computation, and communication cost.

    مؤلفون آخرون
    • Phu Dung Le
    • Bala Srinivasan
    عرض المنشور
  • A New Holistic Security Approach for Government Critical Systems: Flooding Prevention

    Springer Berlin Heidelberg

    Flooding attack is a threat to services in the Internet. They can cause significant financial losses. This paper presents a new holistic security approach which prevents flooding in the government critical systems. A new corporation with local service providers has been suggested to finding the real source of the flooding attacks. In addition, a new concept of a dynamic-multi-communicationpoint is included to make the prevention of flooding attacks easier. Also the dynamic key encryption…

    Flooding attack is a threat to services in the Internet. They can cause significant financial losses. This paper presents a new holistic security approach which prevents flooding in the government critical systems. A new corporation with local service providers has been suggested to finding the real source of the flooding attacks. In addition, a new concept of a dynamic-multi-communicationpoint is included to make the prevention of flooding attacks easier. Also the dynamic key encryption technique is adapted as a part of the proposed approach to enhance its functionality.

    مؤلفون آخرون
    • Mohammed Alhabeeb
    • Phu Dung Le
    • Bala Srinivasan
    عرض المنشور
  • A Novel Security Approach for Critical Information Systems: Preventing Flooding in the Non-authenticated Client Area Using a New Service from Local Network Service Providers

    IEEE

    Flooding is one type of Denial of Service (DoS) attacks which can cause significant financial losses. This paper presents a new security approach which prevents flooding in the government critical systems and focuses in preventing flooding in non-authenticated client area. A new cooperation with local service providers has been suggested to make the prevention of flooding attacks easier. In addition, dynamic key encryption technique is adapted as a part of the proposed approach to enhance its…

    Flooding is one type of Denial of Service (DoS) attacks which can cause significant financial losses. This paper presents a new security approach which prevents flooding in the government critical systems and focuses in preventing flooding in non-authenticated client area. A new cooperation with local service providers has been suggested to make the prevention of flooding attacks easier. In addition, dynamic key encryption technique is adapted as a part of the proposed approach to enhance its functionality.

    مؤلفون آخرون
    عرض المنشور
  • Toward a Ubiquitous Mobile Access Model: A roaming agreement-less approach

    IEEE

    The development in mobile devices and wireless technologies opens up unlimited choices of mobile services such as mobile commerce. These advances make access services available and convenient everywhere at any time. Since mobile users usually move, accessing services becomes unavailable especially in some locations that are not covered by their home networks. Therefore, it becomes necessary to roam into foreign networks in order to access such services. However, authenticating visiting users by…

    The development in mobile devices and wireless technologies opens up unlimited choices of mobile services such as mobile commerce. These advances make access services available and convenient everywhere at any time. Since mobile users usually move, accessing services becomes unavailable especially in some locations that are not covered by their home networks. Therefore, it becomes necessary to roam into foreign networks in order to access such services. However, authenticating visiting users by a foreign network results in some security concerns. This challenge lies in the fact that a foreign network provider does not initially have the authentication credentials of the mobile users. The existing approaches are either roaming agreement-based in exchanging authentication information between the home network and a foreign network or vulnerable to some security attacks. This paper proposes a roaming agreement-less approach based on our ubiquitous mobile access model. This approach consists of two tokens: Passport (identification token) and Visa (authorisation token) to provide a flexible authentication method for foreign network to authenticate mobile users. The security analysis indicates that our proposal is more secure and suitable for ubiquitous mobile communications specially in roaming agreement-less environment.

    مؤلفون آخرون
    • Talal Alharbi
    • Mohammed Alhabeeb
    • Phu Dung Le
    • Bala Srinivasan
    عرض المنشور
  • Holistic approach for critical system security: Flooding prevention

    IEEE

    Denial of Service (DoS) attacks can cause significant financial damages. Flooding is one kind of DoS attacks. This paper presents a new security approach which prevents flooding in the critical systems. A new concept of a dynamic-multi- points-communication is included to make the prevention of flooding attacks easier. In addition, dynamic key encryption technique is adapted as a part of the proposed approach to enhance its functionality.

    مؤلفون آخرون
    • Mohammed Alhabeeb
    • Phu Dung Le
    • Bala Srinivasan
    عرض المنشور
  • Passport-Visa based authentication mechanism for ubiquitous mobile communication

    IEEE

    The increase in mobile device capability (processing power, memory, storage) as well as the introduction of wireless systems (Wi-Fi, WiMAX, 3.5G) have opened new opportunities for the next generation of mobile services such as mobile internet, m-commerce, m-learning and m-government. This makes it desirable for mobile internet users to be connected everywhere. However, ubiquitous connectivity faces interoperation issues between wireless network providers and wireless network technologies…

    The increase in mobile device capability (processing power, memory, storage) as well as the introduction of wireless systems (Wi-Fi, WiMAX, 3.5G) have opened new opportunities for the next generation of mobile services such as mobile internet, m-commerce, m-learning and m-government. This makes it desirable for mobile internet users to be connected everywhere. However, ubiquitous connectivity faces interoperation issues between wireless network providers and wireless network technologies. Although mobile users want to get as many services as possible when they travel, there is a lack of technologies to identify visited users in current foreign network authentication systems. This challenge lies in the fact that a foreign network provider does not initially have the authentication credentials of a mobile user. Existing systems use service agreement to exchange authentication information between home network and foreign network. This paper proposes a Passport (identification token) and Visa (authorisation token) to provide the mobile user with a flexible authentication method to access foreign network services. The technique is lightweight for the mobile device side as it employs just symmetric keys. The symmetric keys do not need key management (no need to store them) on the servers side (home network and foreign network) as they are stored in the Passport and the Visa. The security analysis indicates that our proposal is more suitable for ubiquitous mobile communication.

    مؤلفون آخرون
    • Mohammed Alhabeeb
    • Phu Dung Le
    • Bala Srinivasan
    عرض المنشور
  • Information security threats classification pyramid

    IEEE

    Threat classification is extremely important for organizations, as it is an important step towards implementation of information security. Most of the existing threat classifications listed threats in static ways without linking threats to information system areas. The aim of this paper is to design a methodology that can classify deliberate threats in a dynamic way to represent each threat in different areas of the information system. This technique is based on the following factors: the…

    Threat classification is extremely important for organizations, as it is an important step towards implementation of information security. Most of the existing threat classifications listed threats in static ways without linking threats to information system areas. The aim of this paper is to design a methodology that can classify deliberate threats in a dynamic way to represent each threat in different areas of the information system. This technique is based on the following factors: the attacker's prior knowledge (i. e. the knowledge hold by the source of the threat) about the system, loss of security information and the criticality of the area that might be affected by that threat.

    مؤلفون آخرون
    • Mohammed Alhabeeb
    • Phu Dung Le
    • Bala Srinivasan
    عرض المنشور
  • Beyond Fixed Key Size: Classifications Toward a Balance Between Security and Performance

    IEEE

    The inherent limitations of mobile devices (MD) increase the gap between security and performance, and this gap increases with the growing heterogeneity of computing environments. As we are moving to the 4G network and Mobile Internet, there will be a need to deliver an intelligence tradeoff between security and performance. The main aim of this paper is to identify challenges in MD research and to propose practical solution to maintain the balance between efficiency and protection to secure…

    The inherent limitations of mobile devices (MD) increase the gap between security and performance, and this gap increases with the growing heterogeneity of computing environments. As we are moving to the 4G network and Mobile Internet, there will be a need to deliver an intelligence tradeoff between security and performance. The main aim of this paper is to identify challenges in MD research and to propose practical solution to maintain the balance between efficiency and protection to secure mobile communication. We propose a Dynamic Key Size (DKS) architecture which can be integrated into security protocols to provide an efficient and secure mobile communication. Applications are provided with an interface for selectively securing information at different levels of protection. Our architecture makes use of both the information sensitivity and MD capabilities performance levels classifications in making a decision for suitable algorithm key length. As a possible application, we outline the integration of DKS over SSL protocol to demonstrate the flexibility features that improves the protocol security performance.

    مؤلفون آخرون
    • Mohammed Alhabeeb
    • Phu Dung Le
    • Bala Srinivasan
    عرض المنشور
  • Comparative Efficiency and Implementation Issues of Itinerant Agent Language on Different Agent Platforms

    OFAI Technical Report 2008-01

    An itinerary scripting language provides a tool to accelerate the development of mobile agent applications. The main purpose of this paper is to discuss research challenges of itinerant mobile
    agents (ITAG) and describe the migration of ITAG to JADE, the popular FIPA-compliant agent platform. The migration process was based on two major steps: the migration of agent communications and agent tasks (behaviors). The ITAG Engine has been extracted to provide an easy migration to any new agent…

    An itinerary scripting language provides a tool to accelerate the development of mobile agent applications. The main purpose of this paper is to discuss research challenges of itinerant mobile
    agents (ITAG) and describe the migration of ITAG to JADE, the popular FIPA-compliant agent platform. The migration process was based on two major steps: the migration of agent communications and agent tasks (behaviors). The ITAG Engine has been extracted to provide an easy migration to any new agent platform. In our experiments the results show that the current ITAGIII (using JADE) has better performance and stability compared to ITAGII (using Grasshopper). The paper discusses the experiments and comparisons in detail.

    مؤلفون آخرون
    عرض المنشور
  • Flexible Authentication Technique for Ubiquitous Wireless Communication using Passport and Visa Tokens

    Journal of Telecommunications (Arxiv preprint arXiv:1003.5619)

    The development of mobile devices (CPU, memory, and storage) and the introduction of mobile networks (Ad-Hoc, Wi-Fi, WiMAX, and 3.5G) have opened new opportunities for next generation of mobile services. It becomes more convenience and desirable for mobile internet users to be connected everywhere. However, ubiquitous mobile access connectivity faces interoperation issues between wireless network providers and wireless network technologies. Although mobile users would like to get as many…

    The development of mobile devices (CPU, memory, and storage) and the introduction of mobile networks (Ad-Hoc, Wi-Fi, WiMAX, and 3.5G) have opened new opportunities for next generation of mobile services. It becomes more convenience and desirable for mobile internet users to be connected everywhere. However, ubiquitous mobile access connectivity faces interoperation issues between wireless network providers and wireless network technologies. Although mobile users would like to get as many services as possible while they travel, there is a lack of technology to identify visited users in current foreign network authentication systems. This challenge lies in the fact that a foreign network provider does not initially have the authentication credentials of a mobile user. Existing approaches use roaming agreement to exchange authentication information between home network and foreign network. This paper proposes a roaming agreement-less approach designed based on our ubiquitous mobile access model. Our approach consist of two tokens, Passport (identification token) and Visa (authorisation token) to provide the mobile user with a flexible authentication method to access foreign network services. The security analysis indicates that our proposal is more suitable for ubiquitous mobile communication especially in roaming agreement-less environment.

    مؤلفون آخرون
    • Mohammed A Alhabeeb
    • Phu D Le
    • Bala Srinivasan
    عرض المنشور
  • Holistic Approach for Critical System Security: Flooding Prevention and Malicious Packet Stopping

    Journal of Telecommunications (Arxiv preprint arXiv:1002.3322)

    Denial of service attacks (DoS) can cause significant financial damages. Flooding and Malicious packets are two kinds of DoS attacks. This paper presents a new security approach which stops malicious packets and prevents flooding in the critical systems. New concepts of packet stamp a dynamic-multi-communication-point mechanism has been identified for this proposed approach to make the prevention of flooding attacks easier and the performing of malicious packet attacks harder. In addition…

    Denial of service attacks (DoS) can cause significant financial damages. Flooding and Malicious packets are two kinds of DoS attacks. This paper presents a new security approach which stops malicious packets and prevents flooding in the critical systems. New concepts of packet stamp a dynamic-multi-communication-point mechanism has been identified for this proposed approach to make the prevention of flooding attacks easier and the performing of malicious packet attacks harder. In addition, dynamic key encryption technique has been adapted as a part of the proposed approach to enhance its functionality.

    مؤلفون آخرون
    • Mohammed A Alhabeeb
    • Phu Dung Le
    عرض المنشور

المزيد من أنشطة Abdullah M.

عرض ملف Abdullah M. الشخصي الكامل

  • مشاهدة الأشخاص المشتركين الذين تعرفهم
  • تقديم تعارف
  • تواصل مع Abdullah M. مباشرة
انضم لعرض الملف الشخصي الكامل

ملفات شخصية أخرى مشابهة

اكتسب مهارات جديدة من خلال هذه المواد الدراسية