Skip to main content

Showing 1–9 of 9 results for author: AlQahtani, A A S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2401.13584  [pdf

    cs.CR

    Securing the Invisible Thread: A Comprehensive Analysis of BLE Tracker Security in Apple AirTags and Samsung SmartTags

    Authors: Hosam Alamleh, Michael Gogarty, David Ruddell, Ali Abdullah S. AlQahtani

    Abstract: This study presents an in-depth analysis of the security landscape in Bluetooth Low Energy (BLE) tracking systems, with a particular emphasis on Apple AirTags and Samsung SmartTags, including their cryptographic frameworks. Our investigation traverses a wide spectrum of attack vectors such as physical tampering, firmware exploitation, signal spoofing, eavesdropping, jamming, app security flaws, Bl… ▽ More

    Submitted 24 January, 2024; originally announced January 2024.

  2. arXiv:2401.11326  [pdf

    cs.CR

    Navigating Cybersecurity Training: A Comprehensive Review

    Authors: Saif Al-Dean Qawasmeh, Ali Abdullah S. AlQahtani, Muhammad Khurram Khan

    Abstract: In the dynamic realm of cybersecurity, awareness training is crucial for strengthening defenses against cyber threats. This survey examines a spectrum of cybersecurity awareness training methods, analyzing traditional, technology-based, and innovative strategies. It evaluates the principles, efficacy, and constraints of each method, presenting a comparative analysis that highlights their pros and… ▽ More

    Submitted 20 January, 2024; originally announced January 2024.

  3. arXiv:2401.06612  [pdf

    cs.CR

    Leveraging Machine Learning for Wi-Fi-based Environmental Continuous Two-Factor Authentication

    Authors: Ali Abdullah S. AlQahtani, Thamraa Alshayeb, Mahmoud Nabil, Ahmad Patooghy

    Abstract: The traditional two-factor authentication (2FA) methods primarily rely on the user manually entering a code or token during the authentication process. This can be burdensome and time-consuming, particularly for users who must be authenticated frequently. To tackle this challenge, we present a novel 2FA approach replacing the user's input with decisions made by Machine Learning (ML) that continuou… ▽ More

    Submitted 12 January, 2024; originally announced January 2024.

  4. arXiv:2311.13416  [pdf

    cs.CR

    Comprehensive Survey: Biometric User Authentication Application, Evaluation, and Discussion

    Authors: Reem Alrawili, Ali Abdullah S. AlQahtani, Muhammad Khurram Khan

    Abstract: This paper conducts an extensive review of biometric user authentication literature, addressing three primary research questions: (1) commonly used biometric traits and their suitability for specific applications, (2) performance factors such as security, convenience, and robustness, and potential countermeasures against cyberattacks, and (3) factors affecting biometric system accuracy and po-tent… ▽ More

    Submitted 20 January, 2024; v1 submitted 7 July, 2023; originally announced November 2023.

  5. arXiv:2304.09468  [pdf

    cs.CR cs.NI

    Secure Mobile Payment Architecture Enabling Multi-factor Authentication

    Authors: Hosam Alamleh, Ali Abdullah S. AlQahtani, Baker Al Smadi

    Abstract: The rise of smartphones has led to a significant increase in the usage of mobile payments. Mobile payments allow individuals to access financial resources and make transactions through their mobile devices while on the go. However, the current mobile payment systems were designed to align with traditional payment structures, which limits the full potential of smartphones, including their security… ▽ More

    Submitted 19 April, 2023; originally announced April 2023.

  6. arXiv:2303.02503  [pdf

    cs.CR cs.LG

    Zero-Effort Two-Factor Authentication Using Wi-Fi Radio Wave Transmission and Machine Learning

    Authors: Ali Abdullah S. AlQahtani, Thamraa Alshayeb

    Abstract: The proliferation of sensitive information being stored online highlights the pressing need for secure and efficient user authentication methods. To address this issue, this paper presents a novel zero-effort two-factor authentication (2FA) approach that combines the unique characteristics of a users environment and Machine Learning (ML) to confirm their identity. Our proposed approach utilizes Wi… ▽ More

    Submitted 4 March, 2023; originally announced March 2023.

  7. arXiv:2210.00270  [pdf

    cs.CR

    ML for Location Prediction Using RSSI On WiFi 2.4 GHZ Frequency Band

    Authors: Ali Abdullah S. AlQahtani, Nazim Choudhury

    Abstract: For decades, the determination of an objects location has been implemented utilizing different technologies. Despite GPS (Global Positioning System) provides a scalable efficient and cost effective location services however the satellite emitted signals cannot be exploited indoor to effectively determine the location. In contrast to GPS which is a cost effective localization technology for outdoor… ▽ More

    Submitted 1 October, 2022; originally announced October 2022.

  8. arXiv:2210.00175  [pdf

    cs.CR cs.LG

    Technical Report-IoT Devices Proximity Authentication In Ad Hoc Network Environment

    Authors: Ali Abdullah S. AlQahtani, Hosam Alamleh, Baker Al Smadi

    Abstract: Internet of Things (IoT) is a distributed communication technology system that offers the possibility for physical devices (e.g. vehicles home appliances sensors actuators etc.) known as Things to connect and exchange data more importantly without human interaction. Since IoT plays a significant role in our daily lives we must secure the IoT environment to work effectively. Among the various secur… ▽ More

    Submitted 30 September, 2022; originally announced October 2022.

  9. arXiv:2209.13073  [pdf

    cs.CR

    Preprint: Privacy-preserving IoT Data Sharing Scheme

    Authors: Ali Abdullah S. AlQahtani, Hosam Alamleh, Reem Alrawili

    Abstract: Data sharing can be granted using different factors one of which is something in a users or an IoT devices environment which is in this paper broadcast signals. Using broadcast signals to measure Received Signal Strength Indicator values and Machine Learning models this paper implements an IoT data sharing scheme based on something that is in an IoT devices environment. The proposed scheme is expe… ▽ More

    Submitted 26 September, 2022; originally announced September 2022.