-
A Survey on Congestion Control and Scheduling for Multipath TCP: Machine Learning vs Classical Approaches
Authors:
Maisha Maliha,
Golnaz Habibi,
Mohammed Atiquzzaman
Abstract:
Multipath TCP (MPTCP) has been widely used as an efficient way for communication in many applications. Data centers, smartphones, and network operators use MPTCP to balance the traffic in a network efficiently. MPTCP is an extension of TCP (Transmission Control Protocol), which provides multiple paths, leading to higher throughput and low latency. Although MPTCP has shown better performance than T…
▽ More
Multipath TCP (MPTCP) has been widely used as an efficient way for communication in many applications. Data centers, smartphones, and network operators use MPTCP to balance the traffic in a network efficiently. MPTCP is an extension of TCP (Transmission Control Protocol), which provides multiple paths, leading to higher throughput and low latency. Although MPTCP has shown better performance than TCP in many applications, it has its own challenges. The network can become congested due to heavy traffic in the multiple paths (subflows) if the subflow rates are not determined correctly. Moreover, communication latency can occur if the packets are not scheduled correctly between the subflows. This paper reviews techniques to solve the above-mentioned problems based on two main approaches; non data-driven (classical) and data-driven (Machine Learning) approaches. This paper compares these two approaches and highlights their strengths and weaknesses with a view to motivating future researchers in this exciting area of machine learning for communications. This paper also provides details on the simulation of MPTCP and its implementations in real environments.
△ Less
Submitted 17 September, 2023;
originally announced September 2023.
-
Privacy-Preserving Ensemble Infused Enhanced Deep Neural Network Framework for Edge Cloud Convergence
Authors:
Veronika Stephanie,
Ibrahim Khalil,
Mohammad Saidur Rahman,
Mohammed Atiquzzaman
Abstract:
We propose a privacy-preserving ensemble infused enhanced Deep Neural Network (DNN) based learning framework in this paper for Internet-of-Things (IoT), edge, and cloud convergence in the context of healthcare. In the convergence, edge server is used for both storing IoT produced bioimage and hosting DNN algorithm for local model training. The cloud is used for ensembling local models. The DNN-bas…
▽ More
We propose a privacy-preserving ensemble infused enhanced Deep Neural Network (DNN) based learning framework in this paper for Internet-of-Things (IoT), edge, and cloud convergence in the context of healthcare. In the convergence, edge server is used for both storing IoT produced bioimage and hosting DNN algorithm for local model training. The cloud is used for ensembling local models. The DNN-based training process of a model with a local dataset suffers from low accuracy, which can be improved by the aforementioned convergence and Ensemble Learning. The ensemble learning allows multiple participants to outsource their local model for producing a generalized final model with high accuracy. Nevertheless, Ensemble Learning elevates the risk of leaking sensitive private data from the final model. The proposed framework presents a Differential Privacy-based privacy-preserving DNN with Transfer Learning for a local model generation to ensure minimal loss and higher efficiency at edge server. We conduct several experiments to evaluate the performance of our proposed framework.
△ Less
Submitted 16 May, 2023;
originally announced May 2023.
-
Trustworthy Privacy-preserving Hierarchical Ensemble and Federated Learning in Healthcare 4.0 with Blockchain
Authors:
Veronika Stephanie,
Ibrahim Khalil,
Mohammed Atiquzzaman,
Xun Yi
Abstract:
The advancement of Internet and Communication Technologies (ICTs) has led to the era of Industry 4.0. This shift is followed by healthcare industries creating the term Healthcare 4.0. In Healthcare 4.0, the use of IoT-enabled medical imaging devices for early disease detection has enabled medical practitioners to increase healthcare institutions' quality of service. However, Healthcare 4.0 is stil…
▽ More
The advancement of Internet and Communication Technologies (ICTs) has led to the era of Industry 4.0. This shift is followed by healthcare industries creating the term Healthcare 4.0. In Healthcare 4.0, the use of IoT-enabled medical imaging devices for early disease detection has enabled medical practitioners to increase healthcare institutions' quality of service. However, Healthcare 4.0 is still lagging in Artificial Intelligence and big data compared to other Industry 4.0 due to data privacy concerns. In addition, institutions' diverse storage and computing capabilities restrict institutions from incorporating the same training model structure. This paper presents a secure multi-party computation-based ensemble federated learning with blockchain that enables heterogeneous models to collaboratively learn from healthcare institutions' data without violating users' privacy. Blockchain properties also allow the party to enjoy data integrity without trust in a centralized server while also providing each healthcare institution with auditability and version control capability.
△ Less
Submitted 16 May, 2023;
originally announced May 2023.
-
Smart Policy Control for Securing Federated Learning Management System
Authors:
Aditya Pribadi Kalapaaking,
Ibrahim Khalil,
Mohammed Atiquzzaman
Abstract:
The widespread adoption of Internet of Things (IoT) devices in smart cities, intelligent healthcare systems, and various real-world applications have resulted in the generation of vast amounts of data, often analyzed using different Machine Learning (ML) models. Federated learning (FL) has been acknowledged as a privacy-preserving machine learning technology, where multiple parties cooperatively t…
▽ More
The widespread adoption of Internet of Things (IoT) devices in smart cities, intelligent healthcare systems, and various real-world applications have resulted in the generation of vast amounts of data, often analyzed using different Machine Learning (ML) models. Federated learning (FL) has been acknowledged as a privacy-preserving machine learning technology, where multiple parties cooperatively train ML models without exchanging raw data. However, the current FL architecture does not allow for an audit of the training process due to the various data-protection policies implemented by each FL participant. Furthermore, there is no global model verifiability available in the current architecture. This paper proposes a smart contract-based policy control for securing the Federated Learning (FL) management system. First, we develop and deploy a smart contract-based local training policy control on the FL participants' side. This policy control is used to verify the training process, ensuring that the evaluation process follows the same rules for all FL participants. We then enforce a smart contract-based aggregation policy to manage the global model aggregation process. Upon completion, the aggregated model and policy are stored on blockchain-based storage. Subsequently, we distribute the aggregated global model and the smart contract to all FL participants. Our proposed method uses smart policy control to manage access and verify the integrity of machine learning models. We conducted multiple experiments with various machine learning architectures and datasets to evaluate our proposed framework, such as MNIST and CIFAR-10.
△ Less
Submitted 18 May, 2023; v1 submitted 15 May, 2023;
originally announced May 2023.
-
SMPC-based Federated Learning for 6G enabled Internet of Medical Things
Authors:
Aditya Pribadi Kalapaaking,
Veronika Stephanie,
Ibrahim Khalil,
Mohammed Atiquzzaman,
Xun Yi,
Mahathir Almashor
Abstract:
Rapidly develo** intelligent healthcare systems are underpinned by Sixth Generation (6G) connectivity, ubiquitous Internet of Things (IoT), and Deep Learning (DL) techniques. This portends a future where 6G powers the Internet of Medical Things (IoMT) with seamless, large-scale, and real-time connectivity amongst entities. This article proposes a Convolutional Neural Network (CNN) based Federate…
▽ More
Rapidly develo** intelligent healthcare systems are underpinned by Sixth Generation (6G) connectivity, ubiquitous Internet of Things (IoT), and Deep Learning (DL) techniques. This portends a future where 6G powers the Internet of Medical Things (IoMT) with seamless, large-scale, and real-time connectivity amongst entities. This article proposes a Convolutional Neural Network (CNN) based Federated Learning framework that combines Secure Multi-Party Computation (SMPC) based aggregation and Encrypted Inference methods, all within the context of 6G and IoMT. We consider multiple hospitals with clusters of mixed IoMT and edge devices that encrypt locally trained models. Subsequently, each hospital sends the encrypted local models for SMPC-based encrypted aggregation in the cloud, which generates the encrypted global model. Ultimately, the encrypted global model is returned to each edge server for more localized training, further improving model accuracy. Moreover, hospitals can perform encrypted inference on their edge servers or the cloud while maintaining data and model privacy. Multiple experiments were conducted with varying CNN models and datasets to evaluate the proposed framework's performance.
△ Less
Submitted 26 April, 2023;
originally announced April 2023.
-
Blockchain-based Federated Learning with Secure Aggregation in Trusted Execution Environment for Internet-of-Things
Authors:
Aditya Pribadi Kalapaaking,
Ibrahim Khalil,
Mohammad Saidur Rahman,
Mohammed Atiquzzaman,
Xun Yi,
Mahathir Almashor
Abstract:
This paper proposes a blockchain-based Federated Learning (FL) framework with Intel Software Guard Extension (SGX)-based Trusted Execution Environment (TEE) to securely aggregate local models in Industrial Internet-of-Things (IIoTs). In FL, local models can be tampered with by attackers. Hence, a global model generated from the tampered local models can be erroneous. Therefore, the proposed framew…
▽ More
This paper proposes a blockchain-based Federated Learning (FL) framework with Intel Software Guard Extension (SGX)-based Trusted Execution Environment (TEE) to securely aggregate local models in Industrial Internet-of-Things (IIoTs). In FL, local models can be tampered with by attackers. Hence, a global model generated from the tampered local models can be erroneous. Therefore, the proposed framework leverages a blockchain network for secure model aggregation. Each blockchain node hosts an SGX-enabled processor that securely performs the FL-based aggregation tasks to generate a global model. Blockchain nodes can verify the authenticity of the aggregated model, run a blockchain consensus mechanism to ensure the integrity of the model, and add it to the distributed ledger for tamper-proof storage. Each cluster can obtain the aggregated model from the blockchain and verify its integrity before using it. We conducted several experiments with different CNN models and datasets to evaluate the performance of the proposed framework.
△ Less
Submitted 25 April, 2023;
originally announced April 2023.
-
How Can Optical Communications Shape the Future of Deep Space Communications? A Survey
Authors:
Sarah Karmous,
Nadia Adem,
Mohammed Atiquzzaman,
Sumudu Samarakoon
Abstract:
With a large number of deep space (DS) missions anticipated by the end of this decade, reliable and high-capacity DS communications are needed more than ever. Nevertheless, existing technologies are far from meeting such a goal. Improving current systems does not only require engineering leadership, but also, very crucially, investigating potential technologies that overcome the unique challenges…
▽ More
With a large number of deep space (DS) missions anticipated by the end of this decade, reliable and high-capacity DS communications are needed more than ever. Nevertheless, existing technologies are far from meeting such a goal. Improving current systems does not only require engineering leadership, but also, very crucially, investigating potential technologies that overcome the unique challenges of ultra-long DS links. To the best of our knowledge, there has not been any comprehenive surveys of DS communications technologies over the last decade. Free space optical (FSO) is an emerging DS technology, proven to acquire lower communications systems size weight and power (SWaP) and achieve a very high capacity compared to its counterpart radio frequency (RF), the currently used DS technology. In this survey, we discuss the pros and cons of deep space optical communications (DSOC) and review their physical and networking characteristics. Furthermore, we provide, for the first time, thoughtful discussions about implementing orbital angular momentum (OAM) and quantum communications (QC) for DS. We elaborate on how these technologies among other field advances including interplanetary network (IPN) and RF/FSO systems improve reliability, capacity, and security. This paper provides a holistic survey of DSOC technologies gathering 247 fragmented pieces of literature and including novel perspectives aiming to set the stage for more developments in the field.
△ Less
Submitted 19 May, 2024; v1 submitted 7 December, 2022;
originally announced December 2022.
-
Stable Dynamic Predictive Clustering (SDPC) Protocol for Vehicular Ad hoc Network
Authors:
Mohammad Mukhtaruzzaman,
Mohammed Atiquzzaman
Abstract:
Vehicular communication is an essential part of a smart city. Scalability is a major issue for vehicular communication, specially, when the number of vehicles increases at any given point. Vehicles also suffer some other problems such as broadcast problem. Clustering can solve the issues of vehicular ad hoc network (VANET); however, due to the high mobility of the vehicles, clustering in VANET suf…
▽ More
Vehicular communication is an essential part of a smart city. Scalability is a major issue for vehicular communication, specially, when the number of vehicles increases at any given point. Vehicles also suffer some other problems such as broadcast problem. Clustering can solve the issues of vehicular ad hoc network (VANET); however, due to the high mobility of the vehicles, clustering in VANET suffers stability issue. Previously proposed clustering algorithms for VANET are optimized for either straight road or for intersection. Moreover, the absence of the intelligent use of a combination of the mobility parameters, such as direction, movement, position, velocity, degree of vehicle, movement at the intersection etc., results in cluster stability issues. A dynamic clustering algorithm considering the efficient use of all the mobility parameters can solve the stability problem in VANET. To achieve higher stability for VANET, a novel robust and dynamic clustering algorithm stable dynamic predictive clustering (SDPC) for VANET is proposed in this paper. In contrast to previous studies, vehicle relative velocity, vehicle position, vehicle distance, transmission range, and vehicle density are considered in the creation of a cluster, whereas relative distance, movement at the intersection, degree of vehicles are considered to select the cluster head. From the mobility parameters the future road scenario is constructed. The cluster is created, and the cluster head is selected based on the future construction of the road. The performance of SDPC is compared in terms of the average cluster head change rate, the average cluster head duration, the average cluster member duration, and the ratio of clustering overhead in terms of total packet transmission. The simulation result shows SDPC outperforms the existing algorithms and achieved better clustering stability.
△ Less
Submitted 16 September, 2022;
originally announced September 2022.
-
Controller-based Energy-Aware Wireless Sensor Network Routing using Quantum Algorithms
Authors:
Jie Chen,
Prasanna Date,
Nicholas Chancellor,
Mohammed Atiquzzaman,
Cormac Sreenan
Abstract:
Energy efficient routing in wireless sensor networks has attracted attention from researchers in both academia and industry, most recently motivated by the opportunity to use SDN (software defined network)-inspired approaches. These problems are NP-hard, with algorithms needing computation time which scales faster than polynomial in the problem size. Consequently, heuristic algorithms are used in…
▽ More
Energy efficient routing in wireless sensor networks has attracted attention from researchers in both academia and industry, most recently motivated by the opportunity to use SDN (software defined network)-inspired approaches. These problems are NP-hard, with algorithms needing computation time which scales faster than polynomial in the problem size. Consequently, heuristic algorithms are used in practice, which are unable to guarantee optimally. In this short paper, we show proof-of-principle for the use of a quantum annealing processor instead of a classical processor, to find optimal or near-optimal solutions very quickly. Our preliminary results for small networks show that this approach using quantum computing has great promise and may open the door for other significant improvements in the efficacy of network algorithms.
△ Less
Submitted 12 October, 2021;
originally announced October 2021.
-
Enhancing Security in VANETs with Efficient Sybil Attack Detection using Fog Computing
Authors:
Anirudh Paranjothi,
Mohammed Atiquzzaman
Abstract:
Vehicular ad hoc networks (VANETs) facilitate vehicles to broadcast beacon messages to ensure road safety. Rogue nodes in VANETs cause a Sybil attack to create an illusion of fake traffic congestion by broadcasting malicious information leading to catastrophic consequences, such as the collision of vehicles. Previous researchers used either cryptography, trust scores, or past vehicle data to detec…
▽ More
Vehicular ad hoc networks (VANETs) facilitate vehicles to broadcast beacon messages to ensure road safety. Rogue nodes in VANETs cause a Sybil attack to create an illusion of fake traffic congestion by broadcasting malicious information leading to catastrophic consequences, such as the collision of vehicles. Previous researchers used either cryptography, trust scores, or past vehicle data to detect rogue nodes, but they suffer from high processing delay, overhead, and false-positive rate (FPR). We propose a fog computing-based Sybil attack detection for VANETs (FSDV), which utilizes onboard units (OBUs) of all the vehicles in the region to create a dynamic fog for rogue nodes detection. We aim to reduce the data processing delays, overhead, and FPR in detecting rogue nodes causing Sybil attacks at high vehicle densities. The performance of our framework was carried out with simulations using OMNET++ and SUMO simulators. Results show that our framework ensures 43% lower processing delays, 13% lower overhead, and 35% lower FPR at high vehicle densities compared to existing Sybil attack detection schemes.
△ Less
Submitted 23 August, 2021;
originally announced August 2021.
-
A statistical approach for enhancing security in VANETs with efficient rogue node detection using fog computing
Authors:
Anirudh Paranjothi,
Mohammed Atiquzzaman
Abstract:
Rogue nodes broadcasting false information in beacon messages may lead to catastrophic consequences in Vehicular Ad Hoc Networks (VANETs). Previous researchers used either cryptography, trust scores, or past vehicle data to detect rogue nodes; however, these methods suffer from high processing delay, overhead, and False-Positive Rate (FPR). We propose herein Greenshield's traffic model-based fog c…
▽ More
Rogue nodes broadcasting false information in beacon messages may lead to catastrophic consequences in Vehicular Ad Hoc Networks (VANETs). Previous researchers used either cryptography, trust scores, or past vehicle data to detect rogue nodes; however, these methods suffer from high processing delay, overhead, and False-Positive Rate (FPR). We propose herein Greenshield's traffic model-based fog computing scheme called Fog-based Rogue Nodes Detection (F-RouND), which dynamically utilizes the On-Board Units (OBUs) of all vehicles in the region for rogue node detection. We aim to reduce the data processing delays and FPR in detecting rogue nodes at high vehicle densities. The performance of the F-RouND framework was evaluated via simulations. Results show that the F-RouND framework ensures 45% lower processing delays, 12% lower overhead, and 36% lower FPR at the urban scenario compared to the existing rogue node detection schemes even when the number of rogue nodes increases by up to 40% in the region.
△ Less
Submitted 23 August, 2021;
originally announced August 2021.
-
Blockchain-based Security Framework for Critical Industry 4.0 Cyber-physical System
Authors:
Ziaur Rahman,
Ibrahim Khalil,
Xun Yi,
Mohammed Atiquzzaman
Abstract:
There has been an intense concern for security alternatives because of the recent rise of cyber attacks, mainly targeting critical systems such as industry, medical, or energy ecosystem. Though the latest industry infrastructures largely depend on AI-driven maintenance, the prediction based on corrupted data undoubtedly results in loss of life and capital. Admittedly, an inadequate data-protection…
▽ More
There has been an intense concern for security alternatives because of the recent rise of cyber attacks, mainly targeting critical systems such as industry, medical, or energy ecosystem. Though the latest industry infrastructures largely depend on AI-driven maintenance, the prediction based on corrupted data undoubtedly results in loss of life and capital. Admittedly, an inadequate data-protection mechanism can readily challenge the security and reliability of the network. The shortcomings of the conventional cloud or trusted certificate-driven techniques have motivated us to exhibit a unique Blockchain-based framework for a secure and efficient industry 4.0 system. The demonstrated framework obviates the long-established certificate authority after enhancing the consortium Blockchain that reduces the data processing delay, and increases cost-effective throughput. Nonetheless, the distributed industry 4.0 security model entails cooperative trust than depending on a single party, which in essence indulges the costs and threat of the single point of failure. Therefore, multi-signature technique of the proposed framework accomplishes the multi-party authentication, which confirms its applicability for the real-time and collaborative cyber-physical system.
△ Less
Submitted 24 June, 2021;
originally announced June 2021.
-
F-RouND: Fog-based Rogue Nodes Detection in Vehicular Ad hoc Networks
Authors:
Anirudh Paranjothi,
Mohammed Atiquzzaman,
Mohammad S. Khan
Abstract:
Vehicular ad hoc networks (VANETs) facilitate vehicles to broadcast beacon messages to ensure road safety. The rogue nodes in VANETs broadcast malicious information leading to potential hazards, including the collision of vehicles. Previous researchers used either cryptography, trust values, or past vehicle data to detect rogue nodes, but they suffer from high processing delay, overhead, and false…
▽ More
Vehicular ad hoc networks (VANETs) facilitate vehicles to broadcast beacon messages to ensure road safety. The rogue nodes in VANETs broadcast malicious information leading to potential hazards, including the collision of vehicles. Previous researchers used either cryptography, trust values, or past vehicle data to detect rogue nodes, but they suffer from high processing delay, overhead, and false-positive rate (FPR). We propose fog-based rogue nodes detection (F-RouND), a fog computing scheme, which dynamically creates a fog utilizing the on-board units (OBUs) of all vehicles in the region for rogue nodes detection. The novelty of F-RouND lies in providing low processing delays and FPR at high vehicle densities. The performance of our F-RouND framework was carried out with simulations using OMNET++ and SUMO simulators. Results show that F-RouND ensures 45% lower processing delays, 12% lower overhead, and 36% lower FPR at high vehicle densities compared to existing rogue nodes detection schemes.
△ Less
Submitted 1 February, 2021;
originally announced February 2021.
-
Cloud based VANET Simulator (CVANETSIM)
Authors:
Mohammad Mukhtaruzzaman,
Mohammed Atiquzzaman
Abstract:
Vehicular ad hoc network (VANET) is an integral part of vehicular communication. VANET suffers many problems such as scalability. To solve scalability and other problems of VANET, clustering is proposed. VANET clustering is different than any other kind of clustering due to the high mobility of the vehicles. Likewise, VANET and VANET clustering, VANET simulator requires some unique features such a…
▽ More
Vehicular ad hoc network (VANET) is an integral part of vehicular communication. VANET suffers many problems such as scalability. To solve scalability and other problems of VANET, clustering is proposed. VANET clustering is different than any other kind of clustering due to the high mobility of the vehicles. Likewise, VANET and VANET clustering, VANET simulator requires some unique features such as internet based real-time data processing, huge data analysis, the complex calculation to maintain hierarchy among the vehicles, etc.; however, neither web based VANET simulator nor clustering module available in the existing simulators. Therefore, a simulator that will be able to simulate any feature of VANET equipped with a clustering module and accessible via the internet is a growing need in vehicular communication research. At the Telecom and Network Research Lab (TNRL), University of Oklahoma, we have developed a fully functional discrete-event VANET simulator that includes all the features of VANET clustering. Moreover, the cloud based VANET simulator (CVANETSIM) is coming with an easy and interactive web interface. To our best of our knowledge, CVANETSIM is the first of its kind which integrates features of the VANET simulator, built-in VANET clustering module, and accessible through the internet.
△ Less
Submitted 26 January, 2021;
originally announced January 2021.
-
Clustering in VANET: Algorithms and Challenges
Authors:
Mohammad Mukhtaruzzaman,
Mohammed Atiquzzaman
Abstract:
Clustering is an important concept in vehicular ad hoc network (VANET) where several vehicles join to form a group based on common features. Mobility-based clustering strategies are the most common in VANET clustering; however, machine learning and fuzzy logic algorithms are also the basis of many VANET clustering algorithms. Some VANET clustering algorithms integrate machine learning and fuzzy lo…
▽ More
Clustering is an important concept in vehicular ad hoc network (VANET) where several vehicles join to form a group based on common features. Mobility-based clustering strategies are the most common in VANET clustering; however, machine learning and fuzzy logic algorithms are also the basis of many VANET clustering algorithms. Some VANET clustering algorithms integrate machine learning and fuzzy logic algorithms to make the cluster more stable and efficient. Network mobility (NEMO) and multi-hop-based strategies are also used for VANET clustering. Mobility and some other clustering strategies are presented in the existing literature reviews; however, extensive study of intelligence-based, mobility-based, and multi-hop-based strategies still missing in the VANET clustering reviews. In this paper, we presented a classification of intelligence-based clustering algorithms, mobility-based algorithms, and multi-hop-based algorithms with an analysis on the mobility metrics, evaluation criteria, challenges, and future directions of machine learning, fuzzy logic, mobility, NEMO, and multi-hop clustering algorithms.
△ Less
Submitted 3 September, 2020;
originally announced September 2020.
-
Message Dissemination in Connected Vehicles
Authors:
Anirudh Paranjothi,
Mohammed Atiquzzaman,
Mohammad S. Khan
Abstract:
Advances in connected vehicles based on Vehicular Ad-hoc Networks (VANETs) in recent years have gained significant attention in Intelligent Transport Systems (ITS) in terms of disseminating messages in an efficient manner. VANET uses Dedicated Short Range Communication (DSRC) for disseminating messages between vehicles and between infrastructures. Though DSRC based communications are viable, it is…
▽ More
Advances in connected vehicles based on Vehicular Ad-hoc Networks (VANETs) in recent years have gained significant attention in Intelligent Transport Systems (ITS) in terms of disseminating messages in an efficient manner. VANET uses Dedicated Short Range Communication (DSRC) for disseminating messages between vehicles and between infrastructures. Though DSRC based communications are viable, it is still challenging to disseminate messages in a timely manner when vehicles are not in the transmission range of each other. Furthermore, DSRC communication channels are heavily congested when the vehicle density increases on the road. To address these limitations, two emerging paradigms: 1) vehicular cloud computing and 2) vehicular fog computing are been adopted to disseminate message between the vehicles in a connected vehicular environment. Vehicular fog computing uses fog nodes for the dissemination of messages among vehicles. Any real-world object can be formed as a fog node by acquiring the properties such as 1) network connectivity, 2) computation, and 3) storage. In this book chapter, we highlight the significance of message dissemination in connected vehicles based on techniques like DSRC, vehicular cloud computing, and vehicular fog computing. Our objective is to help the readers better understand the fundamentals of connected vehicles and communication techniques while disseminating messages between vehicles and between infrastructures.
△ Less
Submitted 3 September, 2020;
originally announced September 2020.
-
Local Differential Privacy for Deep Learning
Authors:
M. A. P. Chamikara,
P. Bertok,
I. Khalil,
D. Liu,
S. Camtepe,
M. Atiquzzaman
Abstract:
The internet of things (IoT) is transforming major industries including but not limited to healthcare, agriculture, finance, energy, and transportation. IoT platforms are continually improving with innovations such as the amalgamation of software-defined networks (SDN) and network function virtualization (NFV) in the edge-cloud interplay. Deep learning (DL) is becoming popular due to its remarkabl…
▽ More
The internet of things (IoT) is transforming major industries including but not limited to healthcare, agriculture, finance, energy, and transportation. IoT platforms are continually improving with innovations such as the amalgamation of software-defined networks (SDN) and network function virtualization (NFV) in the edge-cloud interplay. Deep learning (DL) is becoming popular due to its remarkable accuracy when trained with a massive amount of data, such as generated by IoT. However, DL algorithms tend to leak privacy when trained on highly sensitive crowd-sourced data such as medical data. Existing privacy-preserving DL algorithms rely on the traditional server-centric approaches requiring high processing powers. We propose a new local differentially private (LDP) algorithm named LATENT that redesigns the training process. LATENT enables a data owner to add a randomization layer before data leave the data owners' devices and reach a potentially untrusted machine learning service. This feature is achieved by splitting the architecture of a convolutional neural network (CNN) into three layers: (1) convolutional module, (2) randomization module, and (3) fully connected module. Hence, the randomization module can operate as an NFV privacy preservation service in an SDN-controlled NFV, making LATENT more practical for IoT-driven cloud-based environments compared to existing approaches. The randomization module employs a newly proposed LDP protocol named utility enhancing randomization, which allows LATENT to maintain high utility compared to existing LDP protocols. Our experimental evaluation of LATENT on convolutional deep neural networks demonstrates excellent accuracy (e.g. 91%- 96%) with high model quality even under low privacy budgets (e.g. $\varepsilon=0.5$).
△ Less
Submitted 9 November, 2019; v1 submitted 8 August, 2019;
originally announced August 2019.
-
Hybrid-Vehcloud: An Obstacle Shadowing Approach for VANETs in Urban Environment
Authors:
Anirudh Paranjothi,
Mohammad S Khan,
Mohammed Atiquzzaman
Abstract:
Routing of messages in Vehicular Ad-hoc Networks (VANETs) is challenging due to obstacle shadowing regions with high vehicle densities, which leads to frequent disconnection problems and blocks radio wave propagation between vehicles. Previous researchers used multi-hop, vehicular cloud or roadside infrastructures to solve the routing issue among the vehicles, but they suffer from significant pack…
▽ More
Routing of messages in Vehicular Ad-hoc Networks (VANETs) is challenging due to obstacle shadowing regions with high vehicle densities, which leads to frequent disconnection problems and blocks radio wave propagation between vehicles. Previous researchers used multi-hop, vehicular cloud or roadside infrastructures to solve the routing issue among the vehicles, but they suffer from significant packet delays and frequent packet losses arising from obstacle shadowing. We proposed a vehicular cloud based hybrid technique called Hybrid-Vehcloud to disseminate messages in obstacle shadowing regions, and multi-hop technique to disseminate messages in non-obstacle shadowing regions. The novelty of our approach lies in the fact that our proposed technique dynamically adapts between obstacle shadowing and non-obstacle shadowing regions. Simulation based performance analysis of Hybrid-Vehcloud showed improved performance over Cloud-assisted Message Downlink Dissemination Scheme (CMDS), Cross-Layer Broadcast Protocol (CLBP) and Cloud-VANET schemes at high vehicle densities.
△ Less
Submitted 9 July, 2018;
originally announced July 2018.
-
DFCV: A Novel Approach for Message Dissemination in Connected Vehicles using Dynamic Fog
Authors:
Anirudh Paranjothi,
Mohammad S. Khan,
Mohammed Atiquzzaman
Abstract:
Vehicular Ad-hoc Network (VANET) has emerged as a promising solution for enhancing road safety. Routing of messages in VANET is challenging due to packet delays arising from high mobility of vehicles, frequently changing topology, and high density of vehicles, leading to frequent route breakages and packet losses. Previous researchers have used either mobility in vehicular fog computing or cloud c…
▽ More
Vehicular Ad-hoc Network (VANET) has emerged as a promising solution for enhancing road safety. Routing of messages in VANET is challenging due to packet delays arising from high mobility of vehicles, frequently changing topology, and high density of vehicles, leading to frequent route breakages and packet losses. Previous researchers have used either mobility in vehicular fog computing or cloud computing to solve the routing issue, but they suffer from large packet delays and frequent packet losses. We propose Dynamic Fog for Connected Vehicles (DFCV), a fog computing based scheme which dynamically creates, increments and destroys fog nodes depending on the communication needs. The novelty of DFCV lies in providing lower delays and guaranteed message delivery at high vehicular densities. Simulations were conducted using hybrid simulation consisting of ns-2, SUMO, and Cloudsim. Results show that DFCV ensures efficient resource utilization, lower packet delays and losses at high vehicle densities.
△ Less
Submitted 30 May, 2018; v1 submitted 19 May, 2018;
originally announced May 2018.
-
NHAD: Neuro-Fuzzy Based Horizontal Anomaly Detection In Online Social Networks
Authors:
Vishal Sharma,
Ravinder Kumar,
Wen-Huang Cheng,
Mohammed Atiquzzaman,
Kathiravan Srinivasan,
Albert Y. Zomaya
Abstract:
Use of social network is the basic functionality of today's life. With the advent of more and more online social media, the information available and its utilization have come under the threat of several anomalies. Anomalies are the major cause of online frauds which allow information access by unauthorized users as well as information forging. One of the anomalies that act as a silent attacker is…
▽ More
Use of social network is the basic functionality of today's life. With the advent of more and more online social media, the information available and its utilization have come under the threat of several anomalies. Anomalies are the major cause of online frauds which allow information access by unauthorized users as well as information forging. One of the anomalies that act as a silent attacker is the horizontal anomaly. These are the anomalies caused by a user because of his/her variable behaviour towards different sources. Horizontal anomalies are difficult to detect and hazardous for any network. In this paper, a self-healing neuro-fuzzy approach (NHAD) is used for the detection, recovery, and removal of horizontal anomalies efficiently and accurately. The proposed approach operates over the five paradigms, namely, missing links, reputation gain, significant difference, trust properties, and trust score. The proposed approach is evaluated with three datasets: DARPA'98 benchmark dataset, synthetic dataset, and real-time traffic. Results show that the accuracy of the proposed NHAD model for 10% to 30% anomalies in synthetic dataset ranges between 98.08% and 99.88%. The evaluation over DARPA'98 dataset demonstrates that the proposed approach is better than the existing solutions as it provides 99.97% detection rate for anomalous class. For real-time traffic, the proposed NHAD model operates with an average accuracy of 99.42% at 99.90% detection rate.
△ Less
Submitted 18 April, 2018; v1 submitted 18 April, 2018;
originally announced April 2018.
-
Extension of MIH to Support FPMIPv6 for Optimized Heterogeneous Handover
Authors:
Jianfeng Guan,
Vishal Sharma,
Ilsun You,
Mohammad Atiquzzaman
Abstract:
Fast handover for Proxy Mobile IPv6 (FPMIPv6) can reduce handover delay and packet loss compared with Proxy Mobile IPv6 (PMIPv6). However, FPMIPv6 still cannot handle heterogeneous handovers due to the lack of unified Layer 2 triggering mechanism along with the booming of emerging wireless technologies. Media Independent Handover (MIH) can provide heterogeneous handover support, and a lot of integ…
▽ More
Fast handover for Proxy Mobile IPv6 (FPMIPv6) can reduce handover delay and packet loss compared with Proxy Mobile IPv6 (PMIPv6). However, FPMIPv6 still cannot handle heterogeneous handovers due to the lack of unified Layer 2 triggering mechanism along with the booming of emerging wireless technologies. Media Independent Handover (MIH) can provide heterogeneous handover support, and a lot of integration solutions have been proposed for it. However, most of them focus on the integration of MIH and PMIPv6, and require the additional mechanisms, which are out of the scope the MIH and difficult to standardize the operations. Therefore, in this paper, we propose an integration solution of FPMIPv6 and MIH by extending the existing MIH standards, and adopt the city section mobility model to analyze its performance under different scenarios. The analytical results show that the proposed solution is capable of reducing the handover delay and the signaling cost compared with the standard as well as the fast handover solutions.
△ Less
Submitted 27 May, 2017;
originally announced May 2017.