-
IoT Monitoring with Blockchain: Generating Smart Contracts from Service Level Agreements
Authors:
Adam Booth,
Awatif Alqahtani,
Ellis Solaiman
Abstract:
A Service Level Agreement (SLA) is a commitment between a client and provider that assures the quality of service (QoS) a client can expect to receive when purchasing a service. However, evidence of SLA violations in Internet of Things (IoT) service monitoring data can be manipulated by the provider or consumer, resulting in an issue of trust between contracted parties. The following research aims…
▽ More
A Service Level Agreement (SLA) is a commitment between a client and provider that assures the quality of service (QoS) a client can expect to receive when purchasing a service. However, evidence of SLA violations in Internet of Things (IoT) service monitoring data can be manipulated by the provider or consumer, resulting in an issue of trust between contracted parties. The following research aims to explore the use of blockchain technology in monitoring IoT systems using smart contracts so that SLA violations captured are irrefutable amongst service providers and clients. The research focuses on the development of a Java library that is capable of generating a smart contract from a given SLA. A smart contract generated by this library is validated through a mock scenario presented in the form of a Remote Patient Monitoring IoT system. In this scenario, the findings demonstrate a 100 percent success rate in capturing all emulated violations.
△ Less
Submitted 23 August, 2024;
originally announced August 2024.
-
SLA Conceptual Model for IoT Applications
Authors:
Awatif Alqahtani,
Ellis Solaiman,
Rajiv Ranjan
Abstract:
Since SLAs specify the contractual terms that are formally used between consumers and providers, there is a need to aggregate QoS requirements from the perspectives of Clouds, networks, and devices to deliver the promised IoT functionalities. Therefore, the main objective of this chapter is to provide a conceptual model of SLA for the IoT as well as rich vocabularies to describe the QoS and domain…
▽ More
Since SLAs specify the contractual terms that are formally used between consumers and providers, there is a need to aggregate QoS requirements from the perspectives of Clouds, networks, and devices to deliver the promised IoT functionalities. Therefore, the main objective of this chapter is to provide a conceptual model of SLA for the IoT as well as rich vocabularies to describe the QoS and domain-specific configuration parameters of the IoT on an end-to-end basis. We first propose a conceptual model that identifies the main concepts that play a role in specifying end-to-end SLAs. Then, we identify some of the most common QoS metrics and configuration parameters related to each concept. We evaluated the proposed conceptual model using a goal-oriented approach, and the participants in the study reported a high level of satisfaction regarding the proposed conceptual model and its ability to capture main concepts in a general way.
△ Less
Submitted 23 August, 2024;
originally announced August 2024.
-
Electrical Detection of Magnetization Switching in Single-Molecule Magnets
Authors:
Amjad Alqahtani,
DaVonne Henry,
Lubomír Havlíček,
Luke St. Marie,
Jakub Hrubý,
Antonín Sojka,
Morgan Hale,
Samuel Felsenfeld,
Abdelouahad El Fatimy,
Rachael L. Myers-Ward,
D. Kurt Gaskill,
Ivan Nemec,
Petr Neugebauer,
Amy Y. Liu,
Paola Barbara
Abstract:
Single-molecule magnets (SMMs) with chemically tailorable properties are potential building blocks for quantum computing, high-density magnetic memory, and spintronics.1 2 3,4 These applications require isolated or few molecules on substrates, but studies of SMMs have mainly focused on bulk crystals. Moreover, fabrication of SMM-based devices and electrical detection of the SMM magnetic state are…
▽ More
Single-molecule magnets (SMMs) with chemically tailorable properties are potential building blocks for quantum computing, high-density magnetic memory, and spintronics.1 2 3,4 These applications require isolated or few molecules on substrates, but studies of SMMs have mainly focused on bulk crystals. Moreover, fabrication of SMM-based devices and electrical detection of the SMM magnetic state are still coveted milestones that have so far been achieved mainly for double-decker rare-earth phthalocyanines at temperatures below 1 K.5-8 Here we demonstrate electrical detection of magnetization switching for a modification of the archetypal SMM Mn12, up to 70 K, based on the supramolecular spin valve effect5 with graphene quantum dots9. Notably, the exchange interaction between the molecules and the graphene, as well as the dot-mediated intermolecular interaction, can be directly extracted from the electrical response, opening the way to an effective characterization of the quantum properties of different types of SMMs in a wide temperature range.
△ Less
Submitted 30 July, 2024;
originally announced July 2024.
-
An incremental hybrid adaptive network-based IDS in Software Defined Networks to detect stealth attacks
Authors:
Abdullah H Alqahtani
Abstract:
Network attacks have became increasingly more sophisticated and stealthy due to the advances in technologies and the growing sophistication of attackers. Advanced Persistent Threats (APTs) are a type of attack that implement a wide range of strategies to evade detection and be under the defence radar. Software Defined Network (SDN) is a network paradigm that implements dynamic configuration by sep…
▽ More
Network attacks have became increasingly more sophisticated and stealthy due to the advances in technologies and the growing sophistication of attackers. Advanced Persistent Threats (APTs) are a type of attack that implement a wide range of strategies to evade detection and be under the defence radar. Software Defined Network (SDN) is a network paradigm that implements dynamic configuration by separating the control plane from the network plane. This approach improves security aspects by facilitating the employment of network intrusion detection systems. Implementing Machine Learning (ML) techniques in Intrusion Detection Systems (IDSs) is widely used to detect such attacks but has a challenge when the data distribution changes. Concept drift is a term that describes the change in the relationship between the input data and the target value (label or class). The model is expected to degrade as certain forms of change occur. In this paper, the primary form of change will be in user behaviour (particularly changes in attacker behaviour). It is essential for a model to adapt itself to deviations in data distribution. SDN can help in monitoring changes in data distribution. This paper discusses changes in stealth attacker behaviour. The work described here investigates various concept drift detection algorithms. An incremental hybrid adaptive Network Intrusion Detection System (NIDS) is proposed to tackle the issue of concept drift in SDN. It can detect known and unknown attacks. The model is evaluated over different datasets showing promising results.
△ Less
Submitted 1 April, 2024;
originally announced April 2024.
-
Impact of regularization on achieved resolution in 3D tunable structured illumination microscopy (TSIM)
Authors:
Arash Atibi,
Abdulaziz Alqahtani,
Mohammed Younis,
Chrysanthe Preza
Abstract:
We present a study that evaluates the impact of regularization on the achieved resolution in restorations from a novel three-dimensional (3D) Structured Illumination Microscopy (3D-SIM) system with desirable tunability properties. This contribution is the first performance evaluation of the Tunable SIM (TSIM) system through the restoration process. The study quantifies the achieved resolution in r…
▽ More
We present a study that evaluates the impact of regularization on the achieved resolution in restorations from a novel three-dimensional (3D) Structured Illumination Microscopy (3D-SIM) system with desirable tunability properties. This contribution is the first performance evaluation of the Tunable SIM (TSIM) system through the restoration process. The study quantifies the achieved resolution in restorations, from simulated TSIM data of a 3D star-like object, at various expected resolution limits controlled by system parameters, and at different noise levels mitigated by the Generalized Wiener filter, a computationally efficient method, successfully applied to other conventional 3D-SIM systems. We show that theoretical TSIM resolution limits are attained in the absence of noise, while with increasing noise levels, the necessary increase in regularization and residual restoration artifacts contributed to a $\sim$ 5%-10% and a 20% reduction in the axial achieved resolution, in 20-dB and 15-dB data, respectively, which is within the pixel size (20 nm) limitation.
△ Less
Submitted 20 March, 2024;
originally announced March 2024.
-
A Machine Learning Ensemble Model for the Detection of Cyberbullying
Authors:
Abulkarim Faraj Alqahtani,
Mohammad Ilyas
Abstract:
The pervasive use of social media platforms, such as Facebook, Instagram, and X, has significantly amplified our electronic interconnectedness. Moreover, these platforms are now easily accessible from any location at any given time. However, the increased popularity of social media has also led to cyberbullying.It is imperative to address the need for finding, monitoring, and mitigating cyberbully…
▽ More
The pervasive use of social media platforms, such as Facebook, Instagram, and X, has significantly amplified our electronic interconnectedness. Moreover, these platforms are now easily accessible from any location at any given time. However, the increased popularity of social media has also led to cyberbullying.It is imperative to address the need for finding, monitoring, and mitigating cyberbullying posts on social media platforms. Motivated by this necessity, we present this paper to contribute to developing an automated system for detecting binary labels of aggressive tweets.Our study has demonstrated remarkable performance compared to previous experiments on the same dataset. We employed the stacking ensemble machine learning method, utilizing four various feature extraction techniques to optimize performance within the stacking ensemble learning framework. Combining five machine learning algorithms,Decision Trees, Random Forest, Linear Support Vector Classification, Logistic Regression, and K-Nearest Neighbors into an ensemble method, we achieved superior results compared to traditional machine learning classifier models. The stacking classifier achieved a high accuracy rate of 94.00%, outperforming traditional machine learning models and surpassing the results of prior experiments that utilized the same dataset. The outcomes of our experiments showcased an accuracy rate of 0.94% in detection tweets as aggressive or non-aggressive.
△ Less
Submitted 19 February, 2024;
originally announced February 2024.
-
Securing the Invisible Thread: A Comprehensive Analysis of BLE Tracker Security in Apple AirTags and Samsung SmartTags
Authors:
Hosam Alamleh,
Michael Gogarty,
David Ruddell,
Ali Abdullah S. AlQahtani
Abstract:
This study presents an in-depth analysis of the security landscape in Bluetooth Low Energy (BLE) tracking systems, with a particular emphasis on Apple AirTags and Samsung SmartTags, including their cryptographic frameworks. Our investigation traverses a wide spectrum of attack vectors such as physical tampering, firmware exploitation, signal spoofing, eavesdropping, jamming, app security flaws, Bl…
▽ More
This study presents an in-depth analysis of the security landscape in Bluetooth Low Energy (BLE) tracking systems, with a particular emphasis on Apple AirTags and Samsung SmartTags, including their cryptographic frameworks. Our investigation traverses a wide spectrum of attack vectors such as physical tampering, firmware exploitation, signal spoofing, eavesdropping, jamming, app security flaws, Bluetooth security weaknesses, location spoofing, threats to owner devices, and cloud-related vulnerabilities. Moreover, we delve into the security implications of the cryptographic methods utilized in these systems. Our findings reveal that while BLE trackers like AirTags and SmartTags offer substantial utility, they also pose significant security risks. Notably, Apple's approach, which prioritizes user privacy by removing intermediaries, inadvertently leads to device authentication challenges, evidenced by successful AirTag spoofing instances. Conversely, Samsung SmartTags, designed to thwart beacon spoofing, raise critical concerns about cloud security and user privacy. Our analysis also highlights the constraints faced by these devices due to their design focus on battery life conservation, particularly the absence of secure boot processes, which leaves them susceptible to OS modification and a range of potential attacks. The paper concludes with insights into the anticipated evolution of these tracking systems. We predict that future enhancements will likely focus on bolstering security features, especially as these devices become increasingly integrated into the broader IoT ecosystem and face evolving privacy regulations. This shift is imperative to address the intricate balance between functionality and security in next-generation BLE tracking systems.
△ Less
Submitted 24 January, 2024;
originally announced January 2024.
-
Navigating Cybersecurity Training: A Comprehensive Review
Authors:
Saif Al-Dean Qawasmeh,
Ali Abdullah S. AlQahtani,
Muhammad Khurram Khan
Abstract:
In the dynamic realm of cybersecurity, awareness training is crucial for strengthening defenses against cyber threats. This survey examines a spectrum of cybersecurity awareness training methods, analyzing traditional, technology-based, and innovative strategies. It evaluates the principles, efficacy, and constraints of each method, presenting a comparative analysis that highlights their pros and…
▽ More
In the dynamic realm of cybersecurity, awareness training is crucial for strengthening defenses against cyber threats. This survey examines a spectrum of cybersecurity awareness training methods, analyzing traditional, technology-based, and innovative strategies. It evaluates the principles, efficacy, and constraints of each method, presenting a comparative analysis that highlights their pros and cons. The study also investigates emerging trends like artificial intelligence and extended reality, discussing their prospective influence on the future of cybersecurity training. Additionally, it addresses implementation challenges and proposes solutions, drawing on insights from real-world case studies. The goal is to bolster the understanding of cybersecurity awareness training's current landscape, offering valuable perspectives for both practitioners and scholars.
△ Less
Submitted 20 January, 2024;
originally announced January 2024.
-
Leveraging Machine Learning for Wi-Fi-based Environmental Continuous Two-Factor Authentication
Authors:
Ali Abdullah S. AlQahtani,
Thamraa Alshayeb,
Mahmoud Nabil,
Ahmad Patooghy
Abstract:
The traditional two-factor authentication (2FA) methods primarily rely on the user manually entering a code or token during the authentication process. This can be burdensome and time-consuming, particularly for users who must be authenticated frequently. To tackle this challenge, we present a novel 2FA approach replacing the user's input with decisions made by Machine Learning (ML) that continuou…
▽ More
The traditional two-factor authentication (2FA) methods primarily rely on the user manually entering a code or token during the authentication process. This can be burdensome and time-consuming, particularly for users who must be authenticated frequently. To tackle this challenge, we present a novel 2FA approach replacing the user's input with decisions made by Machine Learning (ML) that continuously verifies the user's identity with zero effort. Our system exploits unique environmental features associated with the user, such as beacon frame characteristics and Received Signal Strength Indicator (RSSI) values from Wi-Fi Access Points (APs). These features are gathered and analyzed in real-time by our ML algorithm to ascertain the user's identity. For enhanced security, our system mandates that the user's two devices (i.e., a login device and a mobile device) be situated within a predetermined proximity before granting access. This precaution ensures that unauthorized users cannot access sensitive information or systems, even with the correct login credentials. Through experimentation, we have demonstrated our system's effectiveness in determining the location of the user's devices based on beacon frame characteristics and RSSI values, achieving an accuracy of 92.4%. Additionally, we conducted comprehensive security analysis experiments to evaluate the proposed 2FA system's resilience against various cyberattacks. Our findings indicate that the system exhibits robustness and reliability in the face of these threats. The scalability, flexibility, and adaptability of our system render it a promising option for organizations and users seeking a secure and convenient authentication system.
△ Less
Submitted 12 January, 2024;
originally announced January 2024.
-
A Novel 1D Generative Adversarial Network-based Framework for Atrial Fibrillation Detection using Restored Wrist Photoplethysmography Signals
Authors:
Faizul Rakib Sayem,
Mosabber Uddin Ahmed,
Saadia Binte Alam,
Sakib Mahmud,
Md. Mamun Sheikh,
Abdulrahman Alqahtani,
Md Ahasan Atick Faisal,
Muhammad E. H. Chowdhury
Abstract:
Atrial fibrillation (AF) increases the risk of stroke. Electrocardiogram (ECG) is used for AF detection, while photoplethysmography (PPG) is simple to use and appropriate for long-term monitoring. We have developed a novel approach to detect AF from smartwatch-based wrist PPG signals. To the best of our knowledge, this is the first study to employ 1D CycleGAN for the reconstruction of 1D wrist PPG…
▽ More
Atrial fibrillation (AF) increases the risk of stroke. Electrocardiogram (ECG) is used for AF detection, while photoplethysmography (PPG) is simple to use and appropriate for long-term monitoring. We have developed a novel approach to detect AF from smartwatch-based wrist PPG signals. To the best of our knowledge, this is the first study to employ 1D CycleGAN for the reconstruction of 1D wrist PPG signals, since the quality of wrist PPG signals is very poor due to motion artifacts and acquisition site limitations. Our proposed approach is validated on a dataset of 21,278 10s long wrist PPG segments. The dataset was divided into two halves and two experiments were conducted. One half was used for training and the other half for testing and vice versa. Our classification model (Self-AFNet) with 1D-CycleGAN for restoration achieves an accuracy of 96.41% and 97.09% for both splits, respectively. There is a noteworthy improvement in accuracy (2.94% and 5.08% for test splits, respectively) for restored signals as compared to unrestored PPG. AF detection task was also performed using ECG signals with the matched PPG signals to assess the validity of employing reconstructed PPG-based AF classification. Self-AFNet managed to achieve an accuracy of 98.07% and 98.97%, respectively using two ECG splits which is comparable to the performance of AF detection utilizing reconstructed PPG segments. This study reflects that reconstructed wrist PPG signals acquired from wearable devices can be used for reliable detection of atrial fibrillation, which can significantly help in the reduction of the risk of stroke.
△ Less
Submitted 23 December, 2023; v1 submitted 13 November, 2023;
originally announced December 2023.
-
Comprehensive Survey: Biometric User Authentication Application, Evaluation, and Discussion
Authors:
Reem Alrawili,
Ali Abdullah S. AlQahtani,
Muhammad Khurram Khan
Abstract:
This paper conducts an extensive review of biometric user authentication literature, addressing three primary research questions: (1) commonly used biometric traits and their suitability for specific applications, (2) performance factors such as security, convenience, and robustness, and potential countermeasures against cyberattacks, and (3) factors affecting biometric system accuracy and po-tent…
▽ More
This paper conducts an extensive review of biometric user authentication literature, addressing three primary research questions: (1) commonly used biometric traits and their suitability for specific applications, (2) performance factors such as security, convenience, and robustness, and potential countermeasures against cyberattacks, and (3) factors affecting biometric system accuracy and po-tential improvements. Our analysis delves into physiological and behavioral traits, exploring their pros and cons. We discuss factors influencing biometric system effectiveness and highlight areas for enhancement. Our study differs from previous surveys by extensively examining biometric traits, exploring various application domains, and analyzing measures to mitigate cyberattacks. This paper aims to inform researchers and practitioners about the biometric authentication landscape and guide future advancements.
△ Less
Submitted 20 January, 2024; v1 submitted 7 July, 2023;
originally announced November 2023.
-
Deep learning in computed tomography pulmonary angiography imaging: a dual-pronged approach for pulmonary embolism detection
Authors:
Fabiha Bushra,
Muhammad E. H. Chowdhury,
Rusab Sarmun,
Saidul Kabir,
Menatalla Said,
Sohaib Bassam Zoghoul,
Adam Mushtak,
Israa Al-Hashimi,
Abdulrahman Alqahtani,
Anwarul Hasan
Abstract:
The increasing reliance on Computed Tomography Pulmonary Angiography (CTPA) for Pulmonary Embolism (PE) diagnosis presents challenges and a pressing need for improved diagnostic solutions. The primary objective of this study is to leverage deep learning techniques to enhance the Computer Assisted Diagnosis (CAD) of PE. With this aim, we propose a classifier-guided detection approach that effective…
▽ More
The increasing reliance on Computed Tomography Pulmonary Angiography (CTPA) for Pulmonary Embolism (PE) diagnosis presents challenges and a pressing need for improved diagnostic solutions. The primary objective of this study is to leverage deep learning techniques to enhance the Computer Assisted Diagnosis (CAD) of PE. With this aim, we propose a classifier-guided detection approach that effectively leverages the classifier's probabilistic inference to direct the detection predictions, marking a novel contribution in the domain of automated PE diagnosis. Our classification system includes an Attention-Guided Convolutional Neural Network (AG-CNN) that uses local context by employing an attention mechanism. This approach emulates a human expert's attention by looking at both global appearances and local lesion regions before making a decision. The classifier demonstrates robust performance on the FUMPE dataset, achieving an AUROC of 0.927, sensitivity of 0.862, specificity of 0.879, and an F1-score of 0.805 with the Inception-v3 backbone architecture. Moreover, AG-CNN outperforms the baseline DenseNet-121 model, achieving an 8.1% AUROC gain. While previous research has mostly focused on finding PE in the main arteries, our use of cutting-edge object detection models and ensembling techniques greatly improves the accuracy of detecting small embolisms in the peripheral arteries. Finally, our proposed classifier-guided detection approach further refines the detection metrics, contributing new state-of-the-art to the community: mAP$_{50}$, sensitivity, and F1-score of 0.846, 0.901, and 0.779, respectively, outperforming the former benchmark with a significant 3.7% improvement in mAP$_{50}$. Our research aims to elevate PE patient care by integrating AI solutions into clinical workflows, highlighting the potential of human-AI collaboration in medical diagnostics.
△ Less
Submitted 5 January, 2024; v1 submitted 9 November, 2023;
originally announced November 2023.
-
Secure Mobile Payment Architecture Enabling Multi-factor Authentication
Authors:
Hosam Alamleh,
Ali Abdullah S. AlQahtani,
Baker Al Smadi
Abstract:
The rise of smartphones has led to a significant increase in the usage of mobile payments. Mobile payments allow individuals to access financial resources and make transactions through their mobile devices while on the go. However, the current mobile payment systems were designed to align with traditional payment structures, which limits the full potential of smartphones, including their security…
▽ More
The rise of smartphones has led to a significant increase in the usage of mobile payments. Mobile payments allow individuals to access financial resources and make transactions through their mobile devices while on the go. However, the current mobile payment systems were designed to align with traditional payment structures, which limits the full potential of smartphones, including their security features. This has become a major concern in the rapidly growing mobile payment market. To address these security concerns,in this paper we propose new mobile payment architecture. This architecture leverages the advanced capabilities of modern smartphones to verify various aspects of a payment, such as funds, biometrics, location, and others. The proposed system aims to guarantee the legitimacy of transactions and protect against identity theft by verifying multiple elements of a payment. The security of mobile payment systems is crucial, given the rapid growth of the market. Evaluating mobile payment systems based on their authentication, encryption, and fraud detection capabilities is of utmost importance. The proposed architecture provides a secure mobile payment solution that enhances the overall payment experience by taking advantage of the advanced capabilities of modern smartphones. This will not only improve the security of mobile payments but also offer a more user-friendly payment experience for consumers.
△ Less
Submitted 19 April, 2023;
originally announced April 2023.
-
Zero-Effort Two-Factor Authentication Using Wi-Fi Radio Wave Transmission and Machine Learning
Authors:
Ali Abdullah S. AlQahtani,
Thamraa Alshayeb
Abstract:
The proliferation of sensitive information being stored online highlights the pressing need for secure and efficient user authentication methods. To address this issue, this paper presents a novel zero-effort two-factor authentication (2FA) approach that combines the unique characteristics of a users environment and Machine Learning (ML) to confirm their identity. Our proposed approach utilizes Wi…
▽ More
The proliferation of sensitive information being stored online highlights the pressing need for secure and efficient user authentication methods. To address this issue, this paper presents a novel zero-effort two-factor authentication (2FA) approach that combines the unique characteristics of a users environment and Machine Learning (ML) to confirm their identity. Our proposed approach utilizes Wi-Fi radio wave transmission and ML algorithms to analyze beacon frame characteristics and Received Signal Strength Indicator (RSSI) values from Wi-Fi access points to determine the users location. The aim is to provide a secure and efficient method of authentication without the need for additional hardware or software. A prototype was developed using Raspberry Pi devices and experiments were conducted to demonstrate the effectiveness and practicality of the proposed approach. Results showed that the proposed system can significantly enhance the security of sensitive information in various industries such as finance, healthcare, and retail. This study sheds light on the potential of Wi-Fi radio waves and RSSI values as a means of user authentication and the power of ML to identify patterns in wireless signals for security purposes. The proposed system holds great promise in revolutionizing the field of 2FA and user authentication, offering a new era of secure and seamless access to sensitive information.
△ Less
Submitted 4 March, 2023;
originally announced March 2023.
-
ML for Location Prediction Using RSSI On WiFi 2.4 GHZ Frequency Band
Authors:
Ali Abdullah S. AlQahtani,
Nazim Choudhury
Abstract:
For decades, the determination of an objects location has been implemented utilizing different technologies. Despite GPS (Global Positioning System) provides a scalable efficient and cost effective location services however the satellite emitted signals cannot be exploited indoor to effectively determine the location. In contrast to GPS which is a cost effective localization technology for outdoor…
▽ More
For decades, the determination of an objects location has been implemented utilizing different technologies. Despite GPS (Global Positioning System) provides a scalable efficient and cost effective location services however the satellite emitted signals cannot be exploited indoor to effectively determine the location. In contrast to GPS which is a cost effective localization technology for outdoor locations several technologies have been studied for indoor localization. These include Wireless Fidelity (Wi-Fi) Bluetooth Low Energy (BLE) and Received Signal Strength Indicator (RSSI) etc. This paper presents an enhanced method of using RSSI as a mean to determine an objects location by applying some Machine Learning (ML) concepts. The binary classification is defined by considering the adjacency of the coordinates denoting objects locations. The proposed features were tested empirically via multiple classifiers that achieved a maximum of 96 percent accuracy.
△ Less
Submitted 1 October, 2022;
originally announced October 2022.
-
Technical Report-IoT Devices Proximity Authentication In Ad Hoc Network Environment
Authors:
Ali Abdullah S. AlQahtani,
Hosam Alamleh,
Baker Al Smadi
Abstract:
Internet of Things (IoT) is a distributed communication technology system that offers the possibility for physical devices (e.g. vehicles home appliances sensors actuators etc.) known as Things to connect and exchange data more importantly without human interaction. Since IoT plays a significant role in our daily lives we must secure the IoT environment to work effectively. Among the various secur…
▽ More
Internet of Things (IoT) is a distributed communication technology system that offers the possibility for physical devices (e.g. vehicles home appliances sensors actuators etc.) known as Things to connect and exchange data more importantly without human interaction. Since IoT plays a significant role in our daily lives we must secure the IoT environment to work effectively. Among the various security requirements authentication to the IoT devices is essential as it is the first step in preventing any negative impact of possible attackers. Using the current IEEE 802.11 infrastructure this paper implements an IoT devices authentication scheme based on something that is in the IoT devices environment (i.e. ambient access points). Data from the broadcast messages (i.e. beacon frame characteristics) are utilized to implement the authentication factor that confirms proximity between two devices in an ad hoc IoT network.
△ Less
Submitted 30 September, 2022;
originally announced October 2022.
-
Preprint: Privacy-preserving IoT Data Sharing Scheme
Authors:
Ali Abdullah S. AlQahtani,
Hosam Alamleh,
Reem Alrawili
Abstract:
Data sharing can be granted using different factors one of which is something in a users or an IoT devices environment which is in this paper broadcast signals. Using broadcast signals to measure Received Signal Strength Indicator values and Machine Learning models this paper implements an IoT data sharing scheme based on something that is in an IoT devices environment. The proposed scheme is expe…
▽ More
Data sharing can be granted using different factors one of which is something in a users or an IoT devices environment which is in this paper broadcast signals. Using broadcast signals to measure Received Signal Strength Indicator values and Machine Learning models this paper implements an IoT data sharing scheme based on something that is in an IoT devices environment. The proposed scheme is experimentally tested using different ML models and shows 97.78 percent as its highest accuracy.
△ Less
Submitted 26 September, 2022;
originally announced September 2022.
-
First Dark Matter Search Results from the LUX-ZEPLIN (LZ) Experiment
Authors:
J. Aalbers,
D. S. Akerib,
C. W. Akerlof,
A. K. Al Musalhi,
F. Alder,
A. Alqahtani,
S. K. Alsum,
C. S. Amarasinghe,
A. Ames,
T. J. Anderson,
N. Angelides,
H. M. Araújo,
J. E. Armstrong,
M. Arthurs,
S. Azadi,
A. J. Bailey,
A. Baker,
J. Balajthy,
S. Balashov,
J. Bang,
J. W. Bargemann,
M. J. Barry,
J. Barthel,
D. Bauer,
A. Baxter
, et al. (322 additional authors not shown)
Abstract:
The LUX-ZEPLIN experiment is a dark matter detector centered on a dual-phase xenon time projection chamber operating at the Sanford Underground Research Facility in Lead, South Dakota, USA. This Letter reports results from LUX-ZEPLIN's first search for weakly interacting massive particles (WIMPs) with an exposure of 60~live days using a fiducial mass of 5.5 t. A profile-likelihood ratio analysis s…
▽ More
The LUX-ZEPLIN experiment is a dark matter detector centered on a dual-phase xenon time projection chamber operating at the Sanford Underground Research Facility in Lead, South Dakota, USA. This Letter reports results from LUX-ZEPLIN's first search for weakly interacting massive particles (WIMPs) with an exposure of 60~live days using a fiducial mass of 5.5 t. A profile-likelihood ratio analysis shows the data to be consistent with a background-only hypothesis, setting new limits on spin-independent WIMP-nucleon, spin-dependent WIMP-neutron, and spin-dependent WIMP-proton cross sections for WIMP masses above 9 GeV/c$^2$. The most stringent limit is set for spin-independent scattering at 36 GeV/c$^2$, rejecting cross sections above 9.2$\times 10^{-48}$ cm$^2$ at the 90% confidence level.
△ Less
Submitted 2 August, 2023; v1 submitted 8 July, 2022;
originally announced July 2022.
-
Energy Efficient VM Placement in a Heterogeneous Fog Computing Architecture
Authors:
Abdullah M. Alqahtani,
Barzan Yosuf,
Sanaa H. Mohamed,
Taisir E. H. El-Gorashi,
Jaafar M. H. Elmirghani
Abstract:
Recent years have witnessed a remarkable development in communication and computing systems, mainly driven by the increasing demands of data and processing intensive applications such as virtual reality, M2M, connected vehicles, IoT services, to name a few. Massive amounts of data will be collected by various mobile and fixed terminals that will need to be processed in order to extract knowledge f…
▽ More
Recent years have witnessed a remarkable development in communication and computing systems, mainly driven by the increasing demands of data and processing intensive applications such as virtual reality, M2M, connected vehicles, IoT services, to name a few. Massive amounts of data will be collected by various mobile and fixed terminals that will need to be processed in order to extract knowledge from the data. Traditionally, a centralized approach is taken for processing the collected data using large data centers connected to a core network. However, due to the scale of the Internet-connected things, transporting raw data all the way to the core network is costly in terms of the power consumption, delay, and privacy. This has compelled researchers to propose different decentralized computing paradigms such as fog computing to process collected data at the network edge close to the terminals and users. In this paper, we study, in a Passive Optical Network (PON)-based collaborative-fog computing system, the impact of the heterogeneity of the fog units capacity and energy-efficiency on the overall energy-efficiency of the fog system. We optimized the virtual machine (VM) placement in this fog system with three fog cells and formulated the problem as a mixed integer linear programming (MILP) optimization model with the objective of minimizing the networking and processing power consumption of the fog system. The results indicate that in our proposed architecture, the processing power consumption is the crucial element to achieve energy efficient VMs placement.
△ Less
Submitted 26 March, 2022;
originally announced March 2022.
-
A Quantitative and Qualitative Analysis of Schizophrenia Language
Authors:
Amal Alqahtani,
Efsun Sarioglu Kay,
Sardar Hamidian,
Michael Compton,
Mona Diab
Abstract:
Schizophrenia is one of the most disabling mental health conditions to live with. Approximately one percent of the population has schizophrenia which makes it fairly common, and it affects many people and their families. Patients with schizophrenia suffer different symptoms: formal thought disorder (FTD), delusions, and emotional flatness. In this paper, we quantitatively and qualitatively analyze…
▽ More
Schizophrenia is one of the most disabling mental health conditions to live with. Approximately one percent of the population has schizophrenia which makes it fairly common, and it affects many people and their families. Patients with schizophrenia suffer different symptoms: formal thought disorder (FTD), delusions, and emotional flatness. In this paper, we quantitatively and qualitatively analyze the language of patients with schizophrenia measuring various linguistic features in two modalities: speech and written text. We examine the following features: coherence and cohesion of thoughts, emotions, specificity, level of committed belief (LCB), and personality traits. Our results show that patients with schizophrenia score high in fear and neuroticism compared to healthy controls. In addition, they are more committed to their beliefs, and their writing lacks details. They score lower in most of the linguistic features of cohesion with significant p-values.
△ Less
Submitted 25 January, 2022;
originally announced January 2022.
-
Energy Efficient Resource Allocation in Federated Fog Computing Networks
Authors:
Abdullah M. Alqahtani,
Barzan Yosuf,
Sanaa H. Mohamed,
Taisir E. H. El-Gorashi,
Jaafar M. H. Elmirghani
Abstract:
There is a continuous growth in demand for time sensitive applications which has shifted the cloud paradigm from a centralized computing architecture towards distributed heterogeneous computing platforms where resources located at the edge of the network are used to provide cloud-like services. This paradigm is widely known as fog computing. Virtual machines (VMs) have been widely utilized in both…
▽ More
There is a continuous growth in demand for time sensitive applications which has shifted the cloud paradigm from a centralized computing architecture towards distributed heterogeneous computing platforms where resources located at the edge of the network are used to provide cloud-like services. This paradigm is widely known as fog computing. Virtual machines (VMs) have been widely utilized in both paradigms to enhance the network scalability, improve resource utilization, and energy efficiency. Moreover, Passive Optical Networks (PONs) are a technology suited to handling the enormous volumes of data generated in the access network due to their energy efficiency and large bandwidth. In this paper, we utilize a PON to provide the connectivity between multiple distributed fog units to achieve federated (i.e. cooperative) computing units in the access network to serve intensive demands. We propose a mixed integer linear program (MILP) to optimize the VM placement in the federated fog computing units with the objective of minimizing the total power consumption while considering inter-VM traffic. The results show a significant power saving as a result of the proposed optimization model by up to 52%, in the VM-allocation compared to a baseline approach that allocates the VM requests while neglecting the power consumption and inter-VMs traffic in the optimization framework.
△ Less
Submitted 28 October, 2021;
originally announced October 2021.
-
Energy Minimized Federated Fog Computing over Passive Optical Networks
Authors:
Abdullah M. Alqahtani,
Barzan Yosuf,
Sanaa H. Mohamed,
Taisir E. H. El-Gorashi,
Jaafar M. H. Elmirghani
Abstract:
The rapid growth of time-sensitive applications and services has driven enhancements to computing infrastructures. The main challenge that needs addressing for these applications is the optimal placement of the end-users demands to reduce the total power consumption and delay. One of the widely adopted paradigms to address such a challenge is fog computing. Placing fog units close to end-users at…
▽ More
The rapid growth of time-sensitive applications and services has driven enhancements to computing infrastructures. The main challenge that needs addressing for these applications is the optimal placement of the end-users demands to reduce the total power consumption and delay. One of the widely adopted paradigms to address such a challenge is fog computing. Placing fog units close to end-users at the edge of the network can help mitigate some of the latency and energy efficiency issues. Compared to the traditional hyperscale cloud data centres, fog computing units are constrained by computational power, hence, the capacity of fog units plays a critical role in meeting the stringent demands of the end-users due to intensive processing workloads. In this paper, we aim to optimize the placement of virtual machines (VMs) demands originating from end-users in a fog computing setting by formulating a Mixed Integer Linear Programming (MILP) model to minimize the total power consumption through the use of a federated architecture made up of multiple distributed fog cells. The obtained results show an increase in processing capacity in the fog layer and a reduction in the power consumption by up to 26% compared to the Non-Federated fogs network.
△ Less
Submitted 21 May, 2021;
originally announced May 2021.
-
Continuous Adaptive Cross Approximation for Ill-posed Problems with Chebfun
Authors:
Abdulaziz Alqahtani,
Thomas Mach,
Lothar Reichel
Abstract:
The analysis of linear ill-posed problems often is carried out in function spaces using tools from functional analysis. However, the numerical solution of these problems typically is computed by first discretizing the problem and then applying tools from (finite-dimensional) linear algebra. The present paper explores the feasibility of applying the Chebfun package to solve ill-posed problems. This…
▽ More
The analysis of linear ill-posed problems often is carried out in function spaces using tools from functional analysis. However, the numerical solution of these problems typically is computed by first discretizing the problem and then applying tools from (finite-dimensional) linear algebra. The present paper explores the feasibility of applying the Chebfun package to solve ill-posed problems. This approach allows a user to work with functions instead of matrices. The solution process therefore is much closer to the analysis of ill-posed problems than standard linear algebra-based solution methods.
△ Less
Submitted 31 July, 2020;
originally announced July 2020.
-
PON-based connectivity for fog computing
Authors:
Abdullah M. Alqahtani,
Sanaa H. Mohamed,
Taisir E. H. El-Gorashi,
Jaafar M. H. Elmirghani
Abstract:
Fog computing plays a crucial role in satisfying the requirements of delay-sensitive applications such as connected vehicles, smart grids, and actuator networks by moving data processing close to end users. Passive optical networks (PONs) are widely used in access networks to reduce the power consumption while providing high bandwidth to end users under flexible designs. Typically, distributed fog…
▽ More
Fog computing plays a crucial role in satisfying the requirements of delay-sensitive applications such as connected vehicles, smart grids, and actuator networks by moving data processing close to end users. Passive optical networks (PONs) are widely used in access networks to reduce the power consumption while providing high bandwidth to end users under flexible designs. Typically, distributed fog computing units in access networks have limited processing and storage capacities that can be under or over utilized depending on instantaneous demands. To extend the available capacity in access network, this paper proposes a fog computing architecture based on SDN-enabled PONs to achieve full connectivity among distributed fog computing servers. The power consumption results show that this architecture can achieve up to about 80% power savings in comparison to legacy fog computing based on spine and leaf data centers with the same number of servers.
△ Less
Submitted 2 May, 2020;
originally announced May 2020.
-
Simulations of Events for the LUX-ZEPLIN (LZ) Dark Matter Experiment
Authors:
The LUX-ZEPLIN Collaboration,
:,
D. S. Akerib,
C. W. Akerlof,
A. Alqahtani,
S. K. Alsum,
T. J. Anderson,
N. Angelides,
H. M. Araújo,
J. E. Armstrong,
M. Arthurs,
X. Bai,
J. Balajthy,
S. Balashov,
J. Bang,
D. Bauer,
A. Baxter,
J. Bensinger,
E. P. Bernard,
A. Bernstein,
A. Bhatti,
A. Biekert,
T. P. Biesiadzinski,
H. J. Birch,
K. E. Boast
, et al. (173 additional authors not shown)
Abstract:
The LUX-ZEPLIN dark matter search aims to achieve a sensitivity to the WIMP-nucleon spin-independent cross-section down to (1--2)$\times10^{-12}$\,pb at a WIMP mass of 40 GeV/$c^2$. This paper describes the simulations framework that, along with radioactivity measurements, was used to support this projection, and also to provide mock data for validating reconstruction and analysis software. Of par…
▽ More
The LUX-ZEPLIN dark matter search aims to achieve a sensitivity to the WIMP-nucleon spin-independent cross-section down to (1--2)$\times10^{-12}$\,pb at a WIMP mass of 40 GeV/$c^2$. This paper describes the simulations framework that, along with radioactivity measurements, was used to support this projection, and also to provide mock data for validating reconstruction and analysis software. Of particular note are the event generators, which allow us to model the background radiation, and the detector response physics used in the production of raw signals, which can be converted into digitized waveforms similar to data from the operational detector. Inclusion of the detector response allows us to process simulated data using the same analysis routines as developed to process the experimental data.
△ Less
Submitted 23 June, 2020; v1 submitted 25 January, 2020;
originally announced January 2020.
-
Projected sensitivity of the LUX-ZEPLIN experiment to the $0νββ$ decay of $^{136}$Xe
Authors:
D. S. Akerib,
C. W. Akerlof,
A. Alqahtani,
S. K. Alsum,
T. J. Anderson,
N. Angelides,
H. M. Araújo,
J. E. Armstrong,
M. Arthurs,
X. Bai,
J. Balajthy,
S. Balashov,
J. Bang,
A. Baxter,
J. Bensinger,
E. P. Bernard,
A. Bernstein,
A. Bhatti,
A. Biekert,
T. P. Biesiadzinski,
H. J. Birch,
K. E. Boast,
B. Boxer,
P. Brás,
J. H. Buckley
, et al. (167 additional authors not shown)
Abstract:
The LUX-ZEPLIN (LZ) experiment will enable a neutrinoless double beta decay search in parallel to the main science goal of discovering dark matter particle interactions. We report the expected LZ sensitivity to $^{136}$Xe neutrinoless double beta decay, taking advantage of the significant ($>$600 kg) $^{136}$Xe mass contained within the active volume of LZ without isotopic enrichment. After 1000 l…
▽ More
The LUX-ZEPLIN (LZ) experiment will enable a neutrinoless double beta decay search in parallel to the main science goal of discovering dark matter particle interactions. We report the expected LZ sensitivity to $^{136}$Xe neutrinoless double beta decay, taking advantage of the significant ($>$600 kg) $^{136}$Xe mass contained within the active volume of LZ without isotopic enrichment. After 1000 live-days, the median exclusion sensitivity to the half-life of $^{136}$Xe is projected to be 1.06$\times$10$^{26}$ years (90% confidence level), similar to existing constraints. We also report the expected sensitivity of a possible subsequent dedicated exposure using 90% enrichment with $^{136}$Xe at 1.06$\times$10$^{27}$ years.
△ Less
Submitted 24 April, 2020; v1 submitted 9 December, 2019;
originally announced December 2019.
-
Constrained Clustering: General Pairwise and Cardinality Constraints
Authors:
Adel Bibi,
Ali Alqahtani,
Bernard Ghanem
Abstract:
We study constrained clustering, where constraints guide the clustering process. In existing works, two categories of constraints have been widely explored, namely pairwise and cardinality constraints. Pairwise constraints enforce the cluster labels of two instances to be the same (must-link constraints) or different (cannot-link constraints). Cardinality constraints encourage cluster sizes to sat…
▽ More
We study constrained clustering, where constraints guide the clustering process. In existing works, two categories of constraints have been widely explored, namely pairwise and cardinality constraints. Pairwise constraints enforce the cluster labels of two instances to be the same (must-link constraints) or different (cannot-link constraints). Cardinality constraints encourage cluster sizes to satisfy a user-specified distribution. Most existing constrained clustering models can only utilize one category of constraints at a time. We enforce the above two categories into a unified clustering model starting with the integer program formulation of the standard K-means. As the two categories provide different useful information, utilizing both allow for better clustering performance. However, the optimization is difficult due to the binary and quadratic constraints in the unified formulation. To solve this, we utilize two techniques: equivalently replacing the binary constraints by the intersection of two continuous constraints; the other is transforming the quadratic constraints into bi-linear constraints by introducing extra variables. We derive an equivalent continuous reformulation with simple constraints, which can be efficiently solved by Alternating Direction Method of Multipliers. Extensive experiments on both synthetic and real data demonstrate when: (1) utilizing a single category of constraint, the proposed model is superior to or competitive with SOTA constrained clustering models, and (2) utilizing both categories of constraints jointly, the proposed model shows better performance than the case of the single category. The experiments show that the proposed method exploits the constraints to achieve perfect clustering performance with improved clustering to 2%-5% in classical clustering metrics, e.g. Adjusted Random, Mirkin's, and Huber's, indices outerperfomring other methods.
△ Less
Submitted 27 January, 2023; v1 submitted 24 July, 2019;
originally announced July 2019.
-
Social Credibility Incorporating Semantic Analysis and Machine Learning: A Survey of the State-of-the-Art and Future Research Directions
Authors:
Bilal Abu-Salih,
Bushra Bremie,
Pornpit Wongthongtham,
Kevin Duan,
Tomayess Issa,
Kit Yan Chan,
Mohammad Alhabashneh,
Teshreen Albtoush,
Sulaiman Alqahtani,
Abdullah Alqahtani,
Muteeb Alahmari,
Naser Alshareef,
Abdulaziz Albahlal
Abstract:
The wealth of Social Big Data (SBD) represents a unique opportunity for organisations to obtain the excessive use of such data abundance to increase their revenues. Hence, there is an imperative need to capture, load, store, process, analyse, transform, interpret, and visualise such manifold social datasets to develop meaningful insights that are specific to an application domain. This paper lays…
▽ More
The wealth of Social Big Data (SBD) represents a unique opportunity for organisations to obtain the excessive use of such data abundance to increase their revenues. Hence, there is an imperative need to capture, load, store, process, analyse, transform, interpret, and visualise such manifold social datasets to develop meaningful insights that are specific to an application domain. This paper lays the theoretical background by introducing the state-of-the-art literature review of the research topic. This is associated with a critical evaluation of the current approaches, and fortified with certain recommendations indicated to bridge the research gap.
△ Less
Submitted 27 February, 2019;
originally announced February 2019.
-
End-to-End Service Level Agreement Specification for IoT Applications
Authors:
Awatif Alqahtani,
Yinhao Li,
Pankesh Patel,
Ellis Solaiman,
Rajiv Ranjan
Abstract:
The Internet of Things (IoT) promises to help solve a wide range of issues that relate to our wellbeing within application domains that include smart cities, healthcare monitoring, and environmental monitoring. IoT is bringing new wireless sensor use cases by taking advantage of the computing power and flexibility provided by Edge and Cloud Computing. However, the software and hardware resources u…
▽ More
The Internet of Things (IoT) promises to help solve a wide range of issues that relate to our wellbeing within application domains that include smart cities, healthcare monitoring, and environmental monitoring. IoT is bringing new wireless sensor use cases by taking advantage of the computing power and flexibility provided by Edge and Cloud Computing. However, the software and hardware resources used within such applications must perform correctly and optimally. Especially in applications where a failure of resources can be critical. Service Level Agreements (SLA) where the performance requirements of such applications are defined, need to be specified in a standard way that reflects the end-to-end nature of IoT application domains, accounting for the Quality of Service (QoS) metrics within every layer including the Edge, Network Gateways, and Cloud. In this paper, we propose a conceptual model that captures the key entities of an SLA and their relationships, as a prior step for end-to-end SLA specification and composition. Service level objective (SLO) terms are also considered to express the QoS constraints. Moreover, we propose a new SLA grammar which considers workflow activities and the multi-layered nature of IoT applications. Accordingly, we develop a tool for SLA specification and composition that can be used as a template to generate SLAs in a machine-readable format. We demonstrate the effectiveness of the proposed specification language through a literature survey that includes an SLA language comparison analysis, and via reflecting the user satisfaction results of a usability study.
△ Less
Submitted 13 October, 2018;
originally announced October 2018.
-
Demonstration Abstract: A Toolkit for Specifying Service Level Agreements for IoT applications
Authors:
Awatif Alqahtani,
Pankesh Patel,
Ellis Solaiman,
Rajiv Ranjan
Abstract:
Today we see the use of the Internet of Things (IoT) in various application domains such as healthcare, smart homes, smart cars, and smart-x applications in smart cities. The number of applications based on IoT and cloud computing is projected to increase rapidly over the next few years. IoT-based services must meet the guaranteed levels of quality of service (QoS) to match users' expectations. En…
▽ More
Today we see the use of the Internet of Things (IoT) in various application domains such as healthcare, smart homes, smart cars, and smart-x applications in smart cities. The number of applications based on IoT and cloud computing is projected to increase rapidly over the next few years. IoT-based services must meet the guaranteed levels of quality of service (QoS) to match users' expectations. Ensuring QoS through specifying the QoS constraints using Service Level Agreements (SLAs) is crucial. Therefore, as a first step toward SLA management, it is essential to provide an SLA specification in a machine-readable format. In this paper, we demonstrate a toolkit for creating SLA specifications for IoT applications. The toolkit is used to simplify the process of capturing the requirements of IoT applications. We present a demonstration of the toolkit using a Remote Health Monitoring Service (RHMS) usecase. The toolkit supports the following: (1) specifying the Service-Level Objectives (SLO) of an IoT application at the application level; (2) specifying the workflow activities of the IoT application; (3) mapping each activity to the required software and hardware resources and specifying the constraints of SLOs and other configuration- related metrics of the required hardware and software; and (4) creating the composed SLA in JSON format.
△ Less
Submitted 5 October, 2018;
originally announced October 2018.
-
A Unified Knowledge Representation and Context-aware Recommender System in Internet of Things
Authors:
Yinhao Li,
Awa Alqahtani,
Ellis Solaiman,
Charith Perera,
Prem Prakash Jayaraman,
Boualem Benatallah,
Rajiv Ranjan
Abstract:
Within the rapidly developing Internet of Things (IoT), numerous and diverse physical devices, Edge devices, Cloud infrastructure, and their quality of service requirements (QoS), need to be represented within a unified specification in order to enable rapid IoT application development, monitoring, and dynamic reconfiguration. But heterogeneities among different configuration knowledge representat…
▽ More
Within the rapidly developing Internet of Things (IoT), numerous and diverse physical devices, Edge devices, Cloud infrastructure, and their quality of service requirements (QoS), need to be represented within a unified specification in order to enable rapid IoT application development, monitoring, and dynamic reconfiguration. But heterogeneities among different configuration knowledge representation models pose limitations for acquisition, discovery and curation of configuration knowledge for coordinated IoT applications. This paper proposes a unified data model to represent IoT resource configuration knowledge artifacts. It also proposes IoT-CANE (Context-Aware recommendatioN systEm) to facilitate incremental knowledge acquisition and declarative context driven knowledge recommendation.
△ Less
Submitted 24 May, 2018; v1 submitted 10 May, 2018;
originally announced May 2018.