Baha Rababah

Work place: Department of Computer Science, University of Manitoba, Canada

E-mail: baha@cs.umanitoba.ca

Website:

Research Interests: Network Security,

Biography

Baha Rababah is with Department of Computer Science, University of Manitoba, Canada since 2018. He was a lecturer at faculty of computer and information system, Islamic University, KSA. He obtained BSc Computer Engineering, Al-Balqa Applied University, Jordan in 2010. He also obtained MSc in Computer Network Administration and Management, University of Portsmouth, UK in 2015. His researches of interest are network performance, network security, and cloud computing.

Author Articles
Distributed Intelligence Model for IoT Applications Based on Neural Networks

By Baha Rababah Rasit Eskicioglu

DOI: https://doi.org/10.5815/ijcnis.2021.03.01, Pub. Date: 8 Jun. 2021

Increasing the implication of IoT data puts a focus on extracting the knowledge from sensors’ raw data. The management of sensors’ data is inefficient with current solutions, as studies have generally focused on either providing cloud-based IoT solutions or inefficient predefined rules. Cloud-based IoT solutions have problems with latency, availability, security and privacy, and power consumption. Therefore, Providing IoT gateways with relevant intelligence is essential for gaining knowledge from raw data to make the decision of whether to actuate or offload tasks to the cloud. This work proposes a model that provides an IoT gateway with the intelligence needed to extract the knowledge from sensors’ data in order to make the decision locally without needing to send all raw data to the cloud over the Internet. This speeds up decisions and actions for real-time data and overcomes the limitations of cloud-based IoT solutions. When the gateway is unable to process a task locally, the data and task are offloaded to the cloud.

[...] Read more.
Convergence of MANET in Communication among Smart Devices in IoT

By Tanweer Alam Baha Rababah

DOI: https://doi.org/10.5815/ijwmt.2019.02.01, Pub. Date: 8 Mar. 2019

In the next generation network, the physical things will enable to exchange the information among them. Internet of Things (IoT) is an emerging technology that provides facility to connect physical things with the digital world and able to exchange the information. Mobile ad-hoc networks (MANET) is consistently self-designing, framework less system of smart devices associated with each other remotely. Every smart device is enabled to change their locations using the mobility feature of MANET. These devices are also able to act as a bridge to exchange information between devices. MANET in the IoT becomes more attractive with its important approach in the communication among smart objects because MANET has a special feature that can create a network by own self or can connect with another huge network. In this research, the authors propose a solution that describes the convergence of MANET in the IoT. The results found in this paper have been tested and implemented using different seniors. 

[...] Read more.
Evaluation the Performance of DMZ

By Baha Rababah Shikun Zhou Mansour Bader

DOI: https://doi.org/10.5815/ijwmt.2018.01.01, Pub. Date: 8 Jan. 2018

Local area networks are built mainly for two essential goals, the first one is to support the framework’s business functionality such as email, file transferring, procurement systems, internet browsing, and so forth. Second, these common networks should be built using secure strategies to protect their components. Recent developments in network communication have heightened the need for both secure and high performance network. However, the performance of network sometime is effected by applying security rules. Actually, network security is an essential priority for protecting applications, data, and network resources. Applying resources isolation rules are very important to prevent any possible attack. This isolation can be achieved by applying DMZ (Demilitarized Zone) design. A DMZ extremely enhance the security of a network. A DMZ is used to add an extra layer of protection to the network. It is also used to protect a private information. A DMZ should be properly configured to increase the network’s security. This work reviewed DMZ with regard to its importance, its design, and its effect on the network performance. The main focus of this work was to explore a means of assessing DMZ effectiveness related to network performance with simulation under OpNet simulator.

[...] Read more.
Other Articles