Huda B. Hubboub

Work place: P. O. Box 108, Computer Engineering Department, Islamic University, Gaza, Palestine

E-mail:

Website:

Research Interests: Image Processing, Network Security, Information Security, Computer Networks, Image Manipulation, Image Compression, Computer Architecture and Organization, Computer systems and computational processes

Biography

Huda B. Hubboub received her B.Sc. degree in electrical engineering, Islamic University of Gaza, in 2002, and master degree in computer engineering, Islamic University of Gaza, in 2010. Her research interests include information security, computer networks, and digital image processing

Author Articles
Reinforcement Swap Attack against Directed Diffusion in Wireless Sensor Networks

By Ibrahim S. I. Abuhaiba Huda B. Hubboub

DOI: https://doi.org/10.5815/ijcnis.2013.03.02, Pub. Date: 8 Mar. 2013

In this paper, we introduce a new attack, Reinforcement Swap Attack, against Directed Diffusion based WSNs, which exploits the vulnerabilities of Directed Diffusion specifications. Its main idea is the disruption of configuration information, such as routing information to misuse route establishment along the network. Our approach is to swap Directed Diffusion reinforcement rule which means that the good route is excluded and the bad route is included. Moreover, our attack is activated and deactivated periodically to prolong its lifetime and hence brings down the target network. For the proposed attack, we present analysis, simulation, and experimental measurements. We show that the system achieves maximal damage on system performance represented by many metrics.

[...] Read more.
Swarm Flooding Attack against Directed Diffusion in Wireless Sensor Networks

By Ibrahim S. I. Abuhaiba Huda B. Hubboub

DOI: https://doi.org/10.5815/ijcnis.2012.12.02, Pub. Date: 8 Nov. 2012

The objective of this paper is to study the vulnerabilities of sensor networks, design, and implement new approaches for routing attack. As one of the cornerstones of network infrastructure, routing systems are facing more threats than ever; they are vulnerable by nature and challenging to protect.
We present a new attack, Swarm Flooding Attack, against Directed Diffusion based WSNs, which targets the consumption of sensors computational resources, such as bandwidth, disk space, or processor time. Two variants of swarm attack have been introduced: Bee and Ant. Both approaches are inspired from the natural swarming difference between bees and ants. In all cases, the strategy used to mount an attack is the same. An attack consists of a set of malicious user queries represented by interests that are inserted into the network. However, the two forms of attack vary in the synchronization aspects among attackers. These types of attacks are hard to defend against as illustrated. For each of the proposed attack models, we present analysis, simulation, and experimental measurements. We show that the system achieves maximal damage on system performance represented by many metrics.

[...] Read more.
Image Encryption Using Chaotic Map and Block Chaining

By Ibrahim S. I. Abuhaiba Hanan M. Abuthraya Huda B. Hubboub Ruba A. Salamah

DOI: https://doi.org/10.5815/ijcnis.2012.07.03, Pub. Date: 8 Jul. 2012

In this paper, a new Chaotic Map with Block Chaining (CMBC) cryptosystem for image encryption is proposed. It is a simple block cipher based on logistic chaotic maps and cipher block chaining (CBC). The new system utilizes simplicity of implementation, high quality, and enhanced security by the combined properties of chaos and CBC cipher. Implementation of the proposed technique has been realized for experimental purposes, and tests have been carried out with detailed analysis, demonstrating its high security. Results confirm that the scheme is unbreakable with reference to many of the well-known attacks. Comparative study with other algorithms indicates the superiority of CMBC security with slight increase in encryption time.

[...] Read more.
Other Articles