How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
Now, I am working in 5G network security and privacy, my interest to use PKI to develop a new secure and uniform security protocol for 5G network.
September 1999 - present
Alaqsa University -Faculty of Computers and Information Technology
- Professor (Assistant)
September 2012 - November 2016
Field of study
- Information Technology
Fifth-generation (5G) networks are about to become the backbone of communications through their integration with many services such as software-defined network (SDN), network function virtualization (NFV), cloud computing, and multiple input multiple outputs (MIMO). However, this integration brings major security and privacy challenges to 5G networ...
The fifth generation (5G) cellular network provides users with high-quality services due to its high transmission rate and low latency. It will support Internet of Things (IoT) devices and enable new applications in health, banking, education, etc. Security is essential in this network because vulnerabilities may be exploited to disrupt these appli...
Moodle, Modular Object-Oriented Dynamic Learning Environment, is the most common learning management system being used around the world. many educational institutes, schools, and universities select Moodle system to achieve their electronic learning facilities such as lectures, exams, assignments and etc. Moodle as other Internet of thing systems u...
Long Term Evaluation Advanced (LTE-A) is the third generation partnership project for cellular network that allows subscribers to roam into networks ( i. e., the Internet and wireless connections) using special purpose base-stations, such as wireless access points and home node B. In such LTE-A based networks, neither base-stations, nor the Interne...
In this paper, we propose a secure and efficient handover scheme for the Long Term Evolution-Advanced (LTE-A) networks. The proposed scheme does not trust the base-stations because they may be accessible to attackers and operated by subscribers, rather than service providers. First, we propose a registration procedure to enable the base-stations to...
In smart grid Automatic Metering Infrastructure (AMI) networks, smart meters should send consumption data to the utility company (UC) for grid state estimation. Creating a new infrastructure to support this communication is costly and may take long time which may delay the deployment of the AMI networks. The Long Term Evolution-Advanced (LTE-A) net...
In this paper, we propose a secure authentication of the Evolved Packet System Authentication and Key Agreement (EPS-AKA) for the LTE-A network. Our scheme is proposed to solve the problem of sending the IMSI as a clear text, and hence prevents the mobility management entity attack. We will use public key (PK) cryptography to protect the transmitte...