Tarek R. Sheltami received the Ph.D. degree in electrical and computer engineering from the Department of Electrical and Computer Engineering, Queen’s University, Kingston, ON, Canada, in 2003. He worked with GamaEng Inc. as a Consultant on wireless networks (in 2002–2004). He also worked in several joint projects with Nortel Network Corporation. He is currently a Professor at the Computer Engineering Department, King Fahd University of Petroleum and Minerals (KFUPM), Dhahran, Saudi Arabia. His research interest includes mobile ad hoc network and wireless sensor networks, internet of things performance evaluation, routing, synchronization, localization protocols, and intrusion detection systems Dr. Sheltami has been a member of the Technical Program and Organizing Committees of several international IEEE and ACM conferences
A wireless mobile sensor network is a collection of wireless mobile hosts forming nodes that are ... more A wireless mobile sensor network is a collection of wireless mobile hosts forming nodes that are communicating without the aid of any centralized administration or standard support services. Nodes are classified as sensor nodes and router. Some nodes act both as sensors and routers. While traditional MAC protocols must balance between throughput, delay, and fairness concerns, WSN MAC protocols place an emphasis on energy efficiency as well. Schedule-based MAC protocols have been proposed for WSN. A common theme through all these protocols is putting radios to a low-power "sleep mode" either periodically or whenever possible when a node is neither receiving nor transmitting. In this paper, we propose a novel cluster-based infrastructure creation protocol, namely: the Neighbor-Aware Clusterhead (NAC). We investigate the performance of the NAC protocol under different sleep scheduling protocols and compare it against another cluster-based protocol. In NAC protocol nodes are synchronized with their clusterheads and are allowed to go sleep mode in order to conserve their energy without degrading the performance of the network. The network is divided into clusters managed by a clusterhead. The simulation results show that NAC protocol has a good potential to be a good candidate protocol for SNET.
The monitoring of leaks in pipelines is an important issue to be addressed by researchers and the... more The monitoring of leaks in pipelines is an important issue to be addressed by researchers and the public. This is due the fact that they can have a great impact both economically and environmentally. In recent years, the effect of leakages of pipelines carrying oil, gas and nuclear fluids have posed a threat on humans as well as marine life. This paper provides a survey of recent methods of detecting pipeline leaks with special focus on software based methods. These methods include negative pressure wave, mass/volume balance, pressure point analysis, real time transient modeling, statistical methods as well as methods that employing digital signal processing. This paper also surveys some of the recent research attempts that focus on the employment of wireless sensor networks for leak detection and present research challenges that can be encountered in such environments.
Cluster-based protocols establish a dynamic wireless mobile infrastructure to mimic the operation... more Cluster-based protocols establish a dynamic wireless mobile infrastructure to mimic the operation of the fixed infrastructure in cellular networks. A Clusterhead or a Virtual Base Station (VBS) is elected from a set of nominees to act as a temporary base station within its zone. In this paper, we describe briefly the Warning Energy Aware Clusterhead (WEAC) infrastructure formation protocol together
2013 IEEE 27th International Conference on Advanced Information Networking and Applications (AINA), 2013
ABSTRACT Wireless Sensor Networks (WSNs) consume a lot of energy in infrastructure creation and m... more ABSTRACT Wireless Sensor Networks (WSNs) consume a lot of energy in infrastructure creation and maintenance which also include topology control, i.e., coverage and connectivity. Several sleep-based topology control protocols have been proposed for better performance. While the existing protocols serve their purpose, they still consume high energy. We propose an energy-efficient protocol for Coverage, Connectivity and Communication (C3) in WSNs. The proposed protocol runs in four steps: divide the network into virtual rings using RSSI, define clusters having cluster heads at alternating rings, make dings that are rings inside clusters using triangular tessellation, and start sending data through cluster heads which may involve gateways. It achieves better performance by using near-optimal deployment, load balancing, and energy-efficient communication. Simulation results show that C3 protocol can guarantee 1-connected network, partial coverage of greater than 90% and energy-efficient communication, while consuming 20-25% energy compared to the Layered Diffusion-based Coverage Control (LDCC), and the Coverage and Connectivity Protocol (CCP).
23rd International Conference on Distributed Computing Systems Workshops, 2003. Proceedings., 2003
A wireless mobile Ad hoc network (MANET) is a collection of wireless mobile hosts forming nodes t... more A wireless mobile Ad hoc network (MANET) is a collection of wireless mobile hosts forming nodes that are arbitrarily and randomly changing their locations and communicating without the aid of any centralized administration or standard support services. Ad hoc Cluster-based routing protocols establish a dynamic wireless mobile infrastructure to mimic the operation of the fixed infrastructure in cellular networks. A Clusterhead is elected from a set of nominees, based on an agreed upon rule, to act as a temporary base station within its zone or autonomous system. Mobile stations elected as clusterheads are used to track other mobile stations in the ad hoc network. In each cluster, we use the clusterhead controlled token to assign the channel among contending Mobile Terminals (MTs). Clusterhead controlled token supports multiple classes of service and minimizes collisions. In this paper, we derive formulas to calculate the average waiting time for a packet, in order to get transmitted. In our study, we use two polling schemes, namely: Exhaustive polling and Partially Gated polling controlled token.
23rd Biennial Symposium on Communications, 2006, 2006
Page 1. THE MOBILE PATIENT: A CASE STUDY IMPLEMENTATION AND ANALYSIS Tarek R. Sheltami and Ashraf... more Page 1. THE MOBILE PATIENT: A CASE STUDY IMPLEMENTATION AND ANALYSIS Tarek R. Sheltami and Ashraf S. Mahmoud Department of Computer Engineering King Fahd University of Petroleum and Minerals Dhahran ...
Communications in Computer and Information Science, 2012
ABSTRACT Video applications are becoming more popular over wireless ad hoc and sensor networks (W... more ABSTRACT Video applications are becoming more popular over wireless ad hoc and sensor networks (WAHSNs). However, due to limited resources, WAHSNs need an efficient video-compression technique in order to minimize the amount of data and maximize the quality of video to be transferred over the network. To this end, we have performed NS2 simulations to evaluate the performance of MPEG-4 (MPEG-4 Part 2) and H.264 (MPEG-4 Part 10) video codecs using EvalVid framework and toolset, AODV routing protocol and constant bit rate (CBR) traffic. The results of simulations show that H.264 outperforms in terms of peak signal-to-noise ratio (PSNR) and end-to-end delay which makes it perfect for video applications over WAHSNs.
2015 IEEE 28th Canadian Conference on Electrical and Computer Engineering (CCECE), 2015
ABSTRACT Electronic devices and sensor networks have witnessed great advancements. Consequently, ... more ABSTRACT Electronic devices and sensor networks have witnessed great advancements. Consequently, their limited resources (CPU, memory, bandwidth, and power) are becoming suitable to accommodate some of the enterprise networks solutions. One possible and effective solution is Middleware technology that is able to provide several advantages such as simplifying applications development, portability, scalability, and Quality of Service (QoS). Recently, A publish/subscribe (pub/sub) middleware in Wireless Sensor Network (WSN) has gained a lot of attention from both the industry and the academic communities. This paper provides a review to the state-of-the-art of some of these solutions. This paper also investigates the capabilities of these solutions and conducts a comparison study. In addition, a case study is carried out to estimate the cost of adding a middleware to a WSN. Furthermore, a study is performed to the middleware effect on the overall network performance.
This paper proposes a real-time Automatic Vehicle Location (AVL) and monitoring system for traffi... more This paper proposes a real-time Automatic Vehicle Location (AVL) and monitoring system for traffic control of pilgrims coming towards the city of Makkah in Saudi Arabia based on Data Distribution Service (DDS) specified by the Object Management Group (OMG). DDS based middleware employs Real-Time Publish/Subscribe (RTPS) protocol that implements many-to-many communication paradigm suitable in massive traffic control applications. Using this middleware approach, we are able to locate and track huge number of mobile vehicles and identify all passengers in real-time who are coming to perform annual Hajj. For validation of our proposed framework, various performance matrices are examined over WLAN using DDS. Results show that DDS based middleware can meet real-time requirements in large-scale AVL environment.
Energy efficiency in specific clustering protocols is highly desired in wireless sensor networks.... more Energy efficiency in specific clustering protocols is highly desired in wireless sensor networks. Most existing clustering protocols periodically form clusters and statically assign cluster heads (CHs) and thus are not energy efficient. Every non‐CH node of these protocols sends data to the CH in every time slot of a frame allocated to them using the time division multiple access scheme, which is an energy‐consuming process. Moreover, these protocols do not provide any fault tolerance mechanism. Considering these limitations, we have proposed an efficient fault‐tolerant and energy‐efficient clustering protocol for a wireless sensor network. The performance of the proposed protocol was tested by means of a simulation and compared against the low energy adaptive clustering hierarchy and dynamic static clustering protocols. Simulation results showed that the fault‐tolerant and energy‐efficient clustering protocol has better performance than both the low energy adaptive clustering hiera...
ABSTRACT Chronic diseases are becoming one of the world's leading causes of death and dis... more ABSTRACT Chronic diseases are becoming one of the world's leading causes of death and disability. By 2020, it is predicted to account for almost three quarters of all deaths. A potential approach to monitor patients with chronic diseases is the implementation of home healthcare systems, using new technologies. The Internet of Things (IoT) and the Radio Frequency Identification (RFID) technologies are evolving rapidly with innovative applications, particularly in the healthcare sector. The aim of this paper is to develop a Tele-health system, based on IoT technology, for monitoring elderly individuals suffering from Alzheimer's. This paper describes a working prototype that is able to capture the vital signs and deliver the desired data care remotely for elderly patients staying at home, using wearable ECG wireless sensor. A UHF passive wearable RFID wristband is used to monitor the whereabouts of the elderly. This prototype is successfully tested on a number of patients at the King Fahd University of Petroleum and Minerals (KFUPM) Medical Centre in Saudi Arabia.
Proceedings of International Conference on Advances in Mobile Computing & Multimedia - MoMM '13, 2013
ABSTRACT Time synchronization plays an important role in distributed systems. Distributed wireles... more ABSTRACT Time synchronization plays an important role in distributed systems. Distributed wireless sensor networks (WSN) often require accurate time synchronization for coordination and data reliability. But precision of time synchronization is limited to scope and criticality of the application. Energy, lifetime and time synchronization are important parameters of any wireless sensor network. Flooding Time Synchronization Protocol (FTSP) and Recursive Time Synchronization Protocol (RTSP) are two state of the art protocols for time synchronization in WSNs. In this paper, a comparative analysis of both protocols under two different topologies i.e. bus and tree, using message count as performance parameter. Xbee Pro and Arduino Mega are used for communication and logical design implementation of both protocols, respectively.
22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008), 2008
A wireless mobile sensor network is a collection of wireless mobile hosts forming nodes that are ... more A wireless mobile sensor network is a collection of wireless mobile hosts forming nodes that are arbitrarily and randomly changing their locations and communicating without the aid of any centralized administration or standard support services. Nodes are classified as sensor nodes and router. Some nodes act both as sensors and routers. In this paper, we propose a novel cluster-based infrastructure
21st International Conference on Advanced Networking and Applications (AINA '07), 2007
Abstract— Transporting video over wireless networks has two- fold constraints. Not only should it... more Abstract— Transporting video over wireless networks has two- fold constraints. Not only should it satisfy delay requirements but power minimization and QoS issues should be handled carefully also. Mobile Ad Hoc Networks (MANETs) are more sensitive to these issues where each mobile device acts like a router and thus, routing delay adds significantly to overall end-to-end delay. In this paper,
CCECE 2003 - Canadian Conference on Electrical and Computer Engineering. Toward a Caring and Humane Technology (Cat. No.03CH37436), 2003
A wireless mobile ad hoc network (MANET) is a collection of wireless mobile hosts forming nodes t... more A wireless mobile ad hoc network (MANET) is a collection of wireless mobile hosts forming nodes that are arbitrarily and randomly changing their locations and communicating without the aid of any centralized administration or standard support services. In cluster-based routing protocols, a clusterhead is elected from a set of nominees, based on an agreed upon rule, to act as a temporary base station within its zone or autonomous system. Mobile stations elected as clusterheads are used to track other mobile stations in the ad hoc network. In each cluster, we use the clusterhead controlled token to assign the channel among contending mobile terminals (MTs). clusterhead controlled token supports multiple classes of service and minimizes collisions. In this paper, we describe briefly the operation of the warning energy aware clusterhead (WEAC) and the virtual base station on-demand (VBS-O) protocols, and then we compare the performance of the clusterheads of WEAC infrastructure creation protocol using two polling methods, namely: exhaustive polling and partially gated polling, by means of simulations.
A wireless mobile sensor network is a collection of wireless mobile hosts forming nodes that are ... more A wireless mobile sensor network is a collection of wireless mobile hosts forming nodes that are communicating without the aid of any centralized administration or standard support services. Nodes are classified as sensor nodes and router. Some nodes act both as sensors and routers. While traditional MAC protocols must balance between throughput, delay, and fairness concerns, WSN MAC protocols place an emphasis on energy efficiency as well. Schedule-based MAC protocols have been proposed for WSN. A common theme through all these protocols is putting radios to a low-power "sleep mode" either periodically or whenever possible when a node is neither receiving nor transmitting. In this paper, we propose a novel cluster-based infrastructure creation protocol, namely: the Neighbor-Aware Clusterhead (NAC). We investigate the performance of the NAC protocol under different sleep scheduling protocols and compare it against another cluster-based protocol. In NAC protocol nodes are synchronized with their clusterheads and are allowed to go sleep mode in order to conserve their energy without degrading the performance of the network. The network is divided into clusters managed by a clusterhead. The simulation results show that NAC protocol has a good potential to be a good candidate protocol for SNET.
The monitoring of leaks in pipelines is an important issue to be addressed by researchers and the... more The monitoring of leaks in pipelines is an important issue to be addressed by researchers and the public. This is due the fact that they can have a great impact both economically and environmentally. In recent years, the effect of leakages of pipelines carrying oil, gas and nuclear fluids have posed a threat on humans as well as marine life. This paper provides a survey of recent methods of detecting pipeline leaks with special focus on software based methods. These methods include negative pressure wave, mass/volume balance, pressure point analysis, real time transient modeling, statistical methods as well as methods that employing digital signal processing. This paper also surveys some of the recent research attempts that focus on the employment of wireless sensor networks for leak detection and present research challenges that can be encountered in such environments.
Cluster-based protocols establish a dynamic wireless mobile infrastructure to mimic the operation... more Cluster-based protocols establish a dynamic wireless mobile infrastructure to mimic the operation of the fixed infrastructure in cellular networks. A Clusterhead or a Virtual Base Station (VBS) is elected from a set of nominees to act as a temporary base station within its zone. In this paper, we describe briefly the Warning Energy Aware Clusterhead (WEAC) infrastructure formation protocol together
2013 IEEE 27th International Conference on Advanced Information Networking and Applications (AINA), 2013
ABSTRACT Wireless Sensor Networks (WSNs) consume a lot of energy in infrastructure creation and m... more ABSTRACT Wireless Sensor Networks (WSNs) consume a lot of energy in infrastructure creation and maintenance which also include topology control, i.e., coverage and connectivity. Several sleep-based topology control protocols have been proposed for better performance. While the existing protocols serve their purpose, they still consume high energy. We propose an energy-efficient protocol for Coverage, Connectivity and Communication (C3) in WSNs. The proposed protocol runs in four steps: divide the network into virtual rings using RSSI, define clusters having cluster heads at alternating rings, make dings that are rings inside clusters using triangular tessellation, and start sending data through cluster heads which may involve gateways. It achieves better performance by using near-optimal deployment, load balancing, and energy-efficient communication. Simulation results show that C3 protocol can guarantee 1-connected network, partial coverage of greater than 90% and energy-efficient communication, while consuming 20-25% energy compared to the Layered Diffusion-based Coverage Control (LDCC), and the Coverage and Connectivity Protocol (CCP).
23rd International Conference on Distributed Computing Systems Workshops, 2003. Proceedings., 2003
A wireless mobile Ad hoc network (MANET) is a collection of wireless mobile hosts forming nodes t... more A wireless mobile Ad hoc network (MANET) is a collection of wireless mobile hosts forming nodes that are arbitrarily and randomly changing their locations and communicating without the aid of any centralized administration or standard support services. Ad hoc Cluster-based routing protocols establish a dynamic wireless mobile infrastructure to mimic the operation of the fixed infrastructure in cellular networks. A Clusterhead is elected from a set of nominees, based on an agreed upon rule, to act as a temporary base station within its zone or autonomous system. Mobile stations elected as clusterheads are used to track other mobile stations in the ad hoc network. In each cluster, we use the clusterhead controlled token to assign the channel among contending Mobile Terminals (MTs). Clusterhead controlled token supports multiple classes of service and minimizes collisions. In this paper, we derive formulas to calculate the average waiting time for a packet, in order to get transmitted. In our study, we use two polling schemes, namely: Exhaustive polling and Partially Gated polling controlled token.
23rd Biennial Symposium on Communications, 2006, 2006
Page 1. THE MOBILE PATIENT: A CASE STUDY IMPLEMENTATION AND ANALYSIS Tarek R. Sheltami and Ashraf... more Page 1. THE MOBILE PATIENT: A CASE STUDY IMPLEMENTATION AND ANALYSIS Tarek R. Sheltami and Ashraf S. Mahmoud Department of Computer Engineering King Fahd University of Petroleum and Minerals Dhahran ...
Communications in Computer and Information Science, 2012
ABSTRACT Video applications are becoming more popular over wireless ad hoc and sensor networks (W... more ABSTRACT Video applications are becoming more popular over wireless ad hoc and sensor networks (WAHSNs). However, due to limited resources, WAHSNs need an efficient video-compression technique in order to minimize the amount of data and maximize the quality of video to be transferred over the network. To this end, we have performed NS2 simulations to evaluate the performance of MPEG-4 (MPEG-4 Part 2) and H.264 (MPEG-4 Part 10) video codecs using EvalVid framework and toolset, AODV routing protocol and constant bit rate (CBR) traffic. The results of simulations show that H.264 outperforms in terms of peak signal-to-noise ratio (PSNR) and end-to-end delay which makes it perfect for video applications over WAHSNs.
2015 IEEE 28th Canadian Conference on Electrical and Computer Engineering (CCECE), 2015
ABSTRACT Electronic devices and sensor networks have witnessed great advancements. Consequently, ... more ABSTRACT Electronic devices and sensor networks have witnessed great advancements. Consequently, their limited resources (CPU, memory, bandwidth, and power) are becoming suitable to accommodate some of the enterprise networks solutions. One possible and effective solution is Middleware technology that is able to provide several advantages such as simplifying applications development, portability, scalability, and Quality of Service (QoS). Recently, A publish/subscribe (pub/sub) middleware in Wireless Sensor Network (WSN) has gained a lot of attention from both the industry and the academic communities. This paper provides a review to the state-of-the-art of some of these solutions. This paper also investigates the capabilities of these solutions and conducts a comparison study. In addition, a case study is carried out to estimate the cost of adding a middleware to a WSN. Furthermore, a study is performed to the middleware effect on the overall network performance.
This paper proposes a real-time Automatic Vehicle Location (AVL) and monitoring system for traffi... more This paper proposes a real-time Automatic Vehicle Location (AVL) and monitoring system for traffic control of pilgrims coming towards the city of Makkah in Saudi Arabia based on Data Distribution Service (DDS) specified by the Object Management Group (OMG). DDS based middleware employs Real-Time Publish/Subscribe (RTPS) protocol that implements many-to-many communication paradigm suitable in massive traffic control applications. Using this middleware approach, we are able to locate and track huge number of mobile vehicles and identify all passengers in real-time who are coming to perform annual Hajj. For validation of our proposed framework, various performance matrices are examined over WLAN using DDS. Results show that DDS based middleware can meet real-time requirements in large-scale AVL environment.
Energy efficiency in specific clustering protocols is highly desired in wireless sensor networks.... more Energy efficiency in specific clustering protocols is highly desired in wireless sensor networks. Most existing clustering protocols periodically form clusters and statically assign cluster heads (CHs) and thus are not energy efficient. Every non‐CH node of these protocols sends data to the CH in every time slot of a frame allocated to them using the time division multiple access scheme, which is an energy‐consuming process. Moreover, these protocols do not provide any fault tolerance mechanism. Considering these limitations, we have proposed an efficient fault‐tolerant and energy‐efficient clustering protocol for a wireless sensor network. The performance of the proposed protocol was tested by means of a simulation and compared against the low energy adaptive clustering hierarchy and dynamic static clustering protocols. Simulation results showed that the fault‐tolerant and energy‐efficient clustering protocol has better performance than both the low energy adaptive clustering hiera...
ABSTRACT Chronic diseases are becoming one of the world's leading causes of death and dis... more ABSTRACT Chronic diseases are becoming one of the world's leading causes of death and disability. By 2020, it is predicted to account for almost three quarters of all deaths. A potential approach to monitor patients with chronic diseases is the implementation of home healthcare systems, using new technologies. The Internet of Things (IoT) and the Radio Frequency Identification (RFID) technologies are evolving rapidly with innovative applications, particularly in the healthcare sector. The aim of this paper is to develop a Tele-health system, based on IoT technology, for monitoring elderly individuals suffering from Alzheimer's. This paper describes a working prototype that is able to capture the vital signs and deliver the desired data care remotely for elderly patients staying at home, using wearable ECG wireless sensor. A UHF passive wearable RFID wristband is used to monitor the whereabouts of the elderly. This prototype is successfully tested on a number of patients at the King Fahd University of Petroleum and Minerals (KFUPM) Medical Centre in Saudi Arabia.
Proceedings of International Conference on Advances in Mobile Computing & Multimedia - MoMM '13, 2013
ABSTRACT Time synchronization plays an important role in distributed systems. Distributed wireles... more ABSTRACT Time synchronization plays an important role in distributed systems. Distributed wireless sensor networks (WSN) often require accurate time synchronization for coordination and data reliability. But precision of time synchronization is limited to scope and criticality of the application. Energy, lifetime and time synchronization are important parameters of any wireless sensor network. Flooding Time Synchronization Protocol (FTSP) and Recursive Time Synchronization Protocol (RTSP) are two state of the art protocols for time synchronization in WSNs. In this paper, a comparative analysis of both protocols under two different topologies i.e. bus and tree, using message count as performance parameter. Xbee Pro and Arduino Mega are used for communication and logical design implementation of both protocols, respectively.
22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008), 2008
A wireless mobile sensor network is a collection of wireless mobile hosts forming nodes that are ... more A wireless mobile sensor network is a collection of wireless mobile hosts forming nodes that are arbitrarily and randomly changing their locations and communicating without the aid of any centralized administration or standard support services. Nodes are classified as sensor nodes and router. Some nodes act both as sensors and routers. In this paper, we propose a novel cluster-based infrastructure
21st International Conference on Advanced Networking and Applications (AINA '07), 2007
Abstract— Transporting video over wireless networks has two- fold constraints. Not only should it... more Abstract— Transporting video over wireless networks has two- fold constraints. Not only should it satisfy delay requirements but power minimization and QoS issues should be handled carefully also. Mobile Ad Hoc Networks (MANETs) are more sensitive to these issues where each mobile device acts like a router and thus, routing delay adds significantly to overall end-to-end delay. In this paper,
CCECE 2003 - Canadian Conference on Electrical and Computer Engineering. Toward a Caring and Humane Technology (Cat. No.03CH37436), 2003
A wireless mobile ad hoc network (MANET) is a collection of wireless mobile hosts forming nodes t... more A wireless mobile ad hoc network (MANET) is a collection of wireless mobile hosts forming nodes that are arbitrarily and randomly changing their locations and communicating without the aid of any centralized administration or standard support services. In cluster-based routing protocols, a clusterhead is elected from a set of nominees, based on an agreed upon rule, to act as a temporary base station within its zone or autonomous system. Mobile stations elected as clusterheads are used to track other mobile stations in the ad hoc network. In each cluster, we use the clusterhead controlled token to assign the channel among contending mobile terminals (MTs). clusterhead controlled token supports multiple classes of service and minimizes collisions. In this paper, we describe briefly the operation of the warning energy aware clusterhead (WEAC) and the virtual base station on-demand (VBS-O) protocols, and then we compare the performance of the clusterheads of WEAC infrastructure creation protocol using two polling methods, namely: exhaustive polling and partially gated polling, by means of simulations.
Uploads