Loay Abusalah, Ph.D.

UIC Homepage | Engineering College | ECE Dept.

Graduate Research

Current Projects

  • IPv6 and its Impact

IPv6 is the protocol of the Internet layer in the OSI model, designed to replace the aging IPv4 addressing scheme. The crunch was felt rather soon with respect to IPv4, with its limited addressing space of a few billion addresses, and the urgent need for a successor was felt throughout the world. The need for a bigger and better addressing mechanism led to the design of IPv6, which uses 128 bits instead of IPv4’s 32 bits of addressing.

  • An IPsec Multilink-Aggregate Accelerated Hybrid-Model for Virtual Private Networks

this paper describes a Multilink-Aggregate Accelerated Hybrid-Model for Virtual Private Networks (VPN) currently implemented with the industry standard IPSec protocol. This new hybrid model is based on the fusion of the “Accelerating the IPSec protocol” technique proposed by Y. Zhang, Z. Li, S. Mei, L. Xiao, and M. Wang in [3], and the “Multilink-Aggregate IPSec model” proposed by Yun-he Zhang, Zhi-tang Li, Mei-zhen Wang, and Ling Xiao in [4]. The principal objective of this paper is to show that both: a better performance and more reliability can be obtained by combining these two suggested models for VPN communications based on IPSec protocol.

  • Vehicular Ad-hoc Networks (VANETs): Multimedia Challenges

Vehicular ad-hoc networks are gaining popularity due to the plethora of applications and services it provides by utilizing the advances made in the wireless communications. The unique features and challenges that characterize these highly dynamic networks as well as their requirements with respect to applications, types of communication and routing are discussed. In this paper, the multimedia applications in vehicular ad hoc networks are underlined presenting the issues and challenges and possible solutions. The paper is concluded by exploring the future research directions in this field.

  • RTP and RTCP Protocol, a Comprehensive Survey

In this survey paper, RTP and RTCP are presented in a distributed multimedia system context.  It addresses the importance of the protocol, its conception, and basic makeup.    The challenges posed by its design and use.  This is followed by some proposed solutions that are in use or are being researched and developed.  Since RTP and RTCP are very mature protocols and designed to be incomplete its core and subset is considered.

  • Vehicular Ad-hoc Networks (VANET): Security Challenges

Providing safe, secure and efficient transportation system is the motivation behind development of Vehicular ad-hoc network (VANET). VANET has become an inseparable part of intelligent transportation system (ITS) and promises to offer safety and comfort to passengers while traveling. VANET comprises vehicle to vehicle (V2V) and vehicle to infrastructure (V2I) communication based on wireless network technologies. Security of vehicular ad hoc networks is one of the major issues that need to be addressed before its deployment in real world. This paper provides an overview of VANET, its applications and challenges associated with it. Detailed analysis and comparison of few proposed architectures has been presented. Suggestions for improving security in VANET have also been proposed.

  • Dereferencing a GRUU by UA during ongoing session

Session Initiation Protocol is an Application Layer protocol and it creates, maintains and terminates a session. The SIP URI is contains the AOR (Address of Record) information and it does not point to the specific instances. Therefore the GRUU Globally Routable User Agent URI solves this and can be requested not only by the same domain but also from other domains. When another UA is dereferencing a GRUU the content will be lost at the proxy when the request URI is copied to the contact address of the registered UA. This can however be prevented by the proxy server. The proxy server can tract the message back to the home domain and later the home domain can identify another route to resend the message. Althought his message will be delayed in the process it will not be lost.

  • Embedded Integrated Technologies to track lost Laptops

As the Technology advances, security become challenging. Laptops are lost like hot cakes at the US airport.Business travelers lose 1225 laptops per week in U.S. airports and of those, only 30% were actually found by the users. Companies are dependent on the workforce; no matter where they travel. However, this mobility puts a high risk on the companies for having the data to be breached if a laptop is lost or stolen. The work discusses different technologies and software’s available in the market to track lost computers. The review will show the pros and cons of these solutions launched by Dell, Intel, and Lenovo. This study is important not only to the companies who want to secure their employee laptops in order to secure the information but, also to the common man.

  • Managing Security in Cellular Networks

This paper aims at addressing the security concerns faced by the present cellular networks. The cellular network which is currently entering the 4th generation phase aims at providing various application services to its customers for which they require to integrate the network with MANET/WIFI/Adhoc networks. The problems faced by these networks have incompatible security issues and a solution, hence integrating them becomes a difficult task. Various solutions have been proposed such as Mutual Authentication scheme, Cooperation Incentive Mechanism and Scalable Secure Algorithms. This paper focuses primarily on the security threats imposed on the VOIP services provided by the 3G cellular networks and analyzing the solutions proposed for some of these challenges.

  • CDMA2000, A 3G Wireless Internet Access System

As the wireless communication system growing with the development of technology, third generation (3G) advanced digital systems are being deployed worldwide. 3G is intended to bring new improvement to system capacity, reliability, extended services and more over. The most important character of 3G is that it provides support for high-speed data communications, which 2G can’t not. Right now there are basically two kinds of 3G technologies, CDMA2000 1xEV-DO and Wideband Code Division Multiple Access (WCDMA) can provide multimedia applications to mobile users. And between the two, CDMA2000 1xEV-DO is unique and ideal for supporting data communications. Further more, an evolution of CDMA2000 family of standards called CDMA2000 1xEV-DV(data and voice)has been approved and published, which will proved integrated voice with simultaneous high-speed packet data services. This paper provides a technical overview, discusses key technologies with protocols and scheme.

Past Projects

  • Information will be posted soon

851 S. Morgan St. (M/C 154) Chicago, IL 60607 . SEO 1034 . labusa@ece.uic.edu . 312.413.0030 ©2009 Loay Abusalah