![Hamid Barati](https://i1.rgstatic.net/ii/profile.image/663143873265664-1535117228193_Q128/Hamid-Barati-2.jpg)
Hamid BaratiDezful Branch, Islamic Azad University, Dezful, Iran · Computer Engineering
Hamid Barati
About
63
Publications
17,051
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,549
Citations
Introduction
Hamid Barati is an Assistant Professor in the Department of Computer Engineering at Dezful Branch, Islamic Azad University, Dezful, Iran. His major research experiences and interests include mobile adhoc networks, wireless sensor networks and IoT.
Additional affiliations
January 2006 - October 2015
Publications
Publications (63)
The rapid development and expansion of Internet of Things (IoT) systems have brought about increasingly complex security challenges due to the multi-layered structure of IoT, where attackers can exploit vulnerabilities at various layers. Traditional intrusion detection systems (IDS) often fail to detect novel attacks efficiently, especially in reso...
Nodes in wireless sensor networks (WSNs) have limited energy reserves. A primary goal is to collect data efficiently while minimizing energy use. Clustering is an approach that can help reduce energy consumption in these networks, but data transmission to a stationary sink can cause energy holes. Using a mobile sink helps mitigate this issue, enhan...
Medical Internet of Things (IoMT) is the next frontier in the digital revolution and is utilized in healthcare. In this context, IoT enables individuals to remotely manage their essential activities with minimal interaction. However, the limitations of network resources and the challenges of establishing a secure channel, as well as sharing and col...
The Internet of Things (IoT) is a network where physical objects with unique addresses can connect and communicate with each other through the Internet and telecommunications networks. However, the current methods of user authentication in this environment have limitations due to the need for a lightweight authentication process and limited resourc...
The Internet of Things has opened up new opportunities in healthcare systems. Wireless sensor nodes are used to collect and exchange health-related data in the Internet of Things. In this integration, data is transmitted to medical professionals through unsecured channels to enable them to monitor patients’ conditions in real-time. However, due to...
The internet of things (IoT) refers to the interconnection of various devices through the internet. With the help of IoT, different applications and devices can interact with each other and even with humans through the internet. However, the widespread use of IoT in homes, offices, and private companies has raised concerns about privacy and securit...
Today, many users' extensive use of the Internet of Things (IoT) has made authentication an inevitable issue in the IoT. The currently existing authentication methods are subjected to many challenges by various factors such as the limited resources, the lack of authorization, and the need for a light-weighted authentication process. Therefore, it i...
Internet of Things (IoT) means connecting different devices through the Internet. The Internet of things enables humans to remotely manage and control the objects they use with the Internet infrastructure. After the advent of the Internet of Things in homes, organizations, and private companies, privacy and information security are the biggest conc...
Today, the Internet of Things (IoT) is extending due to a wide range of applications and services. The variety of devices connected to the internet, the discussion of security on these networks is a challenging issue. Security includes diverse aspects such as botnets. Botnets are a set of devices such as smartphones, computers, and others polluted...
The Internet of Things (IoT) is a novel concept in the technology and communication world. Briefly, the “Internet of Things” is a modern technology in which any entity such as humans, animals, or objects can transmit data through communication networks like, the Internet or the Intranet. These networks have very important challenges such as energy...
Maintaining coverage, power consumption, and network lifetime are the most fundamental challenges for wireless sensor networks. Since it is impossible to replace or recharge the battery of the sensor nodes, discharging the battery will end the sensor node’s life. With the death of some sensor nodes and disconnecting, the network coverage is also vi...
Due to the big data exchange on the Internet of Things, proper routing and selecting the best routes for fast data transmission improve network performance. There are major challenges, like high delay, when cloud computing is used. Therefore, one solution is to use other schemes, such as fog computing. In fog computing, all data is not sent to the...
Internet of things (IoT) is a modern technology where data can be transmitted to any things (human, animal, or object) over communications networks, whether internet or intranet. Congestion occurs when the input data rate to the node was higher than the output data rate of node. Congestion control in computer network modulates traffic entry into a...
Routing is challenging in vehicular ad hoc networks due to their features, such as high mobility of nodes and unstable wireless communication links. Therefore, it is an interesting issue for researchers. In addition, it is very important to design an authentication mechanism between the source node and the destination node because these networks ar...
Wireless sensor networks (WSNs) consist of many sensor nodes, gathering data from the environment and sending it to base station (BS). One of the major challenges in WSNs is coverage maintenance. Since batteries provide sensor nodes' energy, battery depletion leads to the death of sensor nodes; when several nodes are dead, connectivity is lost, and...
Fog computing integrates cloud and edge resources. According to an intelligent and decentralized method, this technology processes data generated by IoT sensors to seamlessly integrate physical and cyber environments. Internet of Things uses wireless and smart objects. They communicate with each other, monitor the environment, collect information,...
It is widely accepted that wireless sensor networks can serve as a powerful infrastructure for information gathering, processing, and transfer. Since data transfer in these networks is via wireless channels, they should be equipped with necessary security measures to prevent eavesdropping or manipulation of information by attackers. This paper pres...
In recent years, due to technology development, applying WSNs has increased, and consequently, researchers have developed an interest in dealing with the problems of WSNs. The power-limitation issue of sensor nodes brings a serious challenge for employing WSNs. Clustering has a significant effect on increasing the network lifetime. Also, using mobi...
In wireless sensor networks, sensor nodes are typically distributed in harsh environments for continuous monitoring and data collection. All sensor nodes send the collected data directly or through other sensor nodes to the base station. Due to the nature and range of applications of these networks, maintaining security has always been one of the m...
Wireless sensor networks (WSNs) are composed of several nodes, distributed in a geographical region. Limited energy of nodes is the main challenge of WSNs. Hence, it is required to apply different methods to consume less energy for calculations and communications. One method to reduce energy consumption in WSNs is to reduce the number of packets tr...
Wireless sensor networks (WSNs) consist of sensor nodes, which can sense, process, and then transfer different types of data into the base station. The major role of sensor nodes is to gather data at regular intervals and then send it into the base station. Designing energy-efficient routing protocols is one of the major challenges in WSNs. In this...
Vehicular ad hoc networks (VANETs) are a subset of mobile ad hoc networks (MANETs) that can be used to communicate in intelligent transportation systems. In VANETs, each node in the network is a vehicle that exchanges data wirelessly with other vehicles. Many authors have considered using unnamed aerial vehicle (UAV) nodes to improve connectivity i...
Vehicular ad hoc networks (VANETs) are a subset of mobile ad hoc networks (MANETs) that can be used to communicate in intelligent transportation systems. In VANETs, each node in the network is a vehicle that exchanges data wirelessly with other vehicles. Many authors have considered using unnamed aerial vehicle (UAV) nodes to improve connectivity i...
Internet of things (IoT) is a modern technology where data can be transmitted to any things (human, animal, or object) over communications networks, whether Internet or intranet. Congestion occurs when the input data rate to the node, higher than the output data rate of node. Congestion control in computer network modulates traffic entry into a net...
A wireless sensor network (WSN) consists of a set of sensor nodes that are widely scattered in inaccessible areas. When deployed in large areas, WSNs generate a large volume of the data. Therefore, efficient methods are needed to process the data. One solution to minimize traffic on large-scale wireless sensor networks is to use data aggregation sc...
Wireless sensor networks include a large number of sensor nodes, which monitor an environment. These networks have many applications in Internet of Things (IoT) and Industrial IoT (IIoT). In wireless sensor networks, data aggregation methods are known as a suitable solution that can reduce energy consumption. In addition, these networks are subject...
Routing is one of the major challenges in wireless sensor networks (WSNs). Unbalanced energy consumption in the routing process of data packets is one of the main issues in WSNs. The issue needs consideration, because the energy level of sensor nodes is limited. Multipath routing methods reduce energy consumption, improve scalability and provide lo...
Aggregating the sensed data by nodes is a natural way to increase the network lifetime and reduce the number of bits sent and received by each sensor node. This paper presents a reliable tree-based data aggregation method. In the proposed method, sensor nodes are organized in the form of a binary tree. Then, aggregation requests are authenticated b...
The vehicular ad hoc network (VANET) is a promising technology to improve the comfort and safety of passengers, roads and urban traffic. Applications applied to VANETs require efficient routing protocols. Urban environments include tunnels, subways, overpasses, and multilevel highways, which indicate the multilevel information environment and speci...
Wireless sensor networks (WSNs) consist of a large number of small nodes, containing sensors; these sensors serve as powerful devices to gather data in different environments. One of the major challenges facing WSNs is their limited energy resources, which affects network lifetime directly. This paper provides a method of hierarchical routing and d...
Vehicular ad hoc networks (VANETs) are a subclass of mobile ad hoc networks (MANETs) which are a promising approach for the intelligent transportation system (ITS). VANET protocols face high challenges due to dynamic topology and symmetric links of networks. A suitable and effective routing mechanism helps to extend the vehicular ad-hoc networks su...
Wireless sensor networks (WSN) are consisted of several sensor nodes scattered in an area to gather data from their ambient environment and send it to base station (BS). The energy of nodes in WSNs is limited. One of the most significant issues in WSNs is reducing the energy consumption of nodes, which leads to increased network lifetime. One metho...
Cloud Computing has brought a new dimension to the IT world. The technology of cloud computing allows employing a large number of Virtual Machines to run intensive applications. Each failure in running applications fails system operations. To solve the problem, it is required to restart the systems. Methods: In this paper, to predict and avoid fail...
Wireless sensor networks include a large number of sensor nodes which are developed in an environment. These networks have military, commercial, industrial, and medical applications. Providing these networks with security is of absolute importance. One strategy for maintaining the security of these networks is key management. In the presented paper...
Wireless sensor networks consisting of numerous nodes function in such a manner that each node that collects data from its physical environment, conveys them to the base station for rigorous analysis. Maintaining the functional coverage, energy consumption and the lifetime are among the most challenging factors for WSN. The aim of this paper is to...
A wireless sensor network consists of a large number of nodes, ending sensed data to the base station or sink, either directly or through intermediate nodes. Multi-hop communication results in increased volume of traffic and depleting the energy of nodes adjacent to static sinks. A method of dealing with this challenge is using mobile sinks. Mobile...
Wireless sensor networks include a large number of sensor nodes which are developed in an environment. These networks have military, commercial, industrial, and medical applications. Providing these networks with security is of absolute importance. One strategy for maintaining the security of these networks is key management. In the presented paper...
Energy consumption, network lifetime and coverage are the major challenges in wireless sensor networks. This paper proposes a method that grids network area into square cells on a geographical basis. The node possessing the greatest energy is selected as an aggregator in each cell. Given the cover area and remaining energy, the firefly algorithm fu...
Radio frequency identification (RFID) is a relatively new technology widely deployed in many applications. Due to several advantages of the technology including decreased costs and increased speed, different organizations and industries show interest in it, and its application range is gradually developing. Some of the main problems of RFID are sec...
Wireless sensor networks include a large number of sensor nodes, which perform the receiving, sending, and processing of the data. Because of the wireless nature of communications in this kind of networks, they are more vulnerable than the wired networks. Therefore, security in wireless sensor networks is vital and requires special instruments and...
Vehicular ad hoc network (VANET), a subclass of mobile ad hoc networks (MANETs), is a promising approach for the intelligent transportation system (ITS). One of the main challenges in VANETs is establishment of vehicular communication and stable routing. Another problem of VANETs is their tendency of being trapped in a local optimum. In this paper,...
Wireless sensor networks consist of a large number of nodes which are distributed sporadically in a geographic area. The energy of all nodes on the network is limited. For this reason, providing a method of communication between nodes and network administrator to manage energy consumption is crucial. For this purpose, one of the proposed methods wi...
In this paper, congestion-aware routing and fuzzy based rate controller for wireless sensor networks (WSNs) is proposed. The proposed method tries to make a distinction between locally generated data and transit data by using a priority-based mechanism which provides a novel queueing model. Furthermore, a novel congestion-aware routing using greedy...
The energy of all sensor nodes in wireless sensor networks is limited. For this reason, providing a method of communication between nodes and network administrator to manage energy consumption is crucial. In this paper, a centralized evolutionary clustering protocol for wireless sensor networks is proposed. The proposed protocol selects the appropr...
Wireless sensor networks (WSNs) comprise a large number of small sensor nodes scattered across limited geographical areas. The nodes in such networks carry sources of limited and mainly unchangeable energy. Therefore, it is necessary that these networks operate under energy efficient protocols and structures. Energy efficient clustering algorithms...
In sending data from one point to another, such as transferring data between various components of a computer system, due to the existence of electromagnetic waves and other issues such as noise and attenuation, information may be changed in the middle of the track. Therefore, it is critical for receiver to ensure the accuracy of the information. F...
Today, optimal performance and cost advantages of using Internet telephony
are obvious. Despite current standardized techniques, voice transferring through
protocol (VoIP) has lower security than traditional telephony. One of the most
important security issues which should be noticed in using VoIP is end -to-end user2
identity, i.e. when there is a...
Wireless sensor networks are composed of hundreds or thousands of small nodes called sensor that work together and are associated with a specific task or tasks to do. Each of these nodes includes sensor, processor, communication components, a small memory and a source of energy. It is expected that wireless sensor networks will be used widely in ma...
Wireless sensor networks consist of many micro sensor nodes that are dispersed in a limited geographical area. The nodes are wireless interconnected. Each node works independently and without human intervention and typically, it is physically very small with limitations in processing power, memory capacity, power supply and etc. The nodes in these...
In this study, we presented a method for distributing data storage by using residue number system for mobile systems and wireless networks based on peer to peer paradigm. Generally, redundant residue number system is capable in error detection and correction. In proposed method, we made a new system by mixing Redundant Residue Number System (RRNS),...
Wireless sensor networks (WSNs) are wireless ad hoc networks of tiny sensor nodes increasingly deployed for multiple civilian and military applications, including patient monitoring, wildlife monitoring, battlefield surveillance, enemy tracking, etc. Like other computer networks, WSNs must be provided of security services such as key management, co...
An Ad-Hoc network has been constructed from a fabric of mobile nodes intercom connected by temporary wireless links. Nodes located beyond a single hop are reached using intermediate neighbors to forward messages over long distances. The problem with this method of communication is that mobility causes the network topology to be unstable. Traditiona...
A routing algorithm defines a route which packet traverses to get to destination. In this research we study some kind of routing algorithms that are used in internal connections networks of multi-processor and multi-computers systems. Then we discuss about some routing algorithms which have been implemented network on chip architecture. First, we p...
This paper presents a novel CMOS four-transistor SRAM cell for very high density and low power embedded SRAM applications as well as for stand-alone SRAM applications. This cell retains its data with leakage current and positive feedback without refresh cycle. The new cell size is 20% smaller than a conventional six-transistor cell using same desig...
This paper proposes a low power SRAM based on five transistor SRAM cell. Proposed SRAM uses novel word-line decoding such that, during read/write operation, only selected cell connected to bit-line whereas, in conventional SRAM (CV-SRAM), all cells in selected row connected to their bit-lines, which in turn develops differential voltages across all...
The energy consumption and delay in read/write operation of conventional SRAM is investigated analytically as well as by simulation. Explicit analytical expressions for the energy consumption and delay in read and write operation as a function of device parameters and supply voltage are derived. The expressions are useful in predicting the effect o...
In this article, we are going to study switching techniques which are related to multiprocessor system. The switching techniques specify that when and hold internal switches are regulated until they connect routers input to their outputs and which one of the packets must be transferred along the route during a special time. The switching techniques...