-
Fully Distributed Fog Load Balancing with Multi-Agent Reinforcement Learning
Authors:
Maad Ebrahim,
Abdelhakim Hafid
Abstract:
Real-time Internet of Things (IoT) applications require real-time support to handle the ever-growing demand for computing resources to process IoT workloads. Fog Computing provides high availability of such resources in a distributed manner. However, these resources must be efficiently managed to distribute unpredictable traffic demands among heterogeneous Fog resources. This paper proposes a full…
▽ More
Real-time Internet of Things (IoT) applications require real-time support to handle the ever-growing demand for computing resources to process IoT workloads. Fog Computing provides high availability of such resources in a distributed manner. However, these resources must be efficiently managed to distribute unpredictable traffic demands among heterogeneous Fog resources. This paper proposes a fully distributed load-balancing solution with Multi-Agent Reinforcement Learning (MARL) that intelligently distributes IoT workloads to optimize the waiting time while providing fair resource utilization in the Fog network. These agents use transfer learning for life-long self-adaptation to dynamic changes in the environment. By leveraging distributed decision-making, MARL agents effectively minimize the waiting time compared to a single centralized agent solution and other baselines, enhancing end-to-end execution delay. Besides performance gain, a fully distributed solution allows for a global-scale implementation where agents can work independently in small collaboration regions, leveraging nearby local resources. Furthermore, we analyze the impact of a realistic frequency to observe the state of the environment, unlike the unrealistic common assumption in the literature of having observations readily available in real-time for every required action. The findings highlight the trade-off between realism and performance using an interval-based Gossip-based multi-casting protocol against assuming real-time observation availability for every generated workload.
△ Less
Submitted 15 May, 2024;
originally announced May 2024.
-
Lifelong Learning for Fog Load Balancing: A Transfer Learning Approach
Authors:
Maad Ebrahim,
Abdelhakim Senhaji Hafid,
Mohamed Riduan Abid
Abstract:
Fog computing emerged as a promising paradigm to address the challenges of processing and managing data generated by the Internet of Things (IoT). Load balancing (LB) plays a crucial role in Fog computing environments to optimize the overall system performance. It requires efficient resource allocation to improve resource utilization, minimize latency, and enhance the quality of service for end-us…
▽ More
Fog computing emerged as a promising paradigm to address the challenges of processing and managing data generated by the Internet of Things (IoT). Load balancing (LB) plays a crucial role in Fog computing environments to optimize the overall system performance. It requires efficient resource allocation to improve resource utilization, minimize latency, and enhance the quality of service for end-users. In this work, we improve the performance of privacy-aware Reinforcement Learning (RL) agents that optimize the execution delay of IoT applications by minimizing the waiting delay. To maintain privacy, these agents optimize the waiting delay by minimizing the change in the number of queued requests in the whole system, i.e., without explicitly observing the actual number of requests that are queued in each Fog node nor observing the compute resource capabilities of those nodes. Besides improving the performance of these agents, we propose in this paper a lifelong learning framework for these agents, where lightweight inference models are used during deployment to minimize action delay and only retrained in case of significant environmental changes. To improve the performance, minimize the training cost, and adapt the agents to those changes, we explore the application of Transfer Learning (TL). TL transfers the knowledge acquired from a source domain and applies it to a target domain, enabling the reuse of learned policies and experiences. TL can be also used to pre-train the agent in simulation before fine-tuning it in the real environment; this significantly reduces failure probability compared to learning from scratch in the real environment. To our knowledge, there are no existing efforts in the literature that use TL to address lifelong learning for RL-based Fog LB; this is one of the main obstacles in deploying RL LB solutions in Fog systems.
△ Less
Submitted 8 October, 2023;
originally announced October 2023.
-
Privacy-Aware Load Balancing in Fog Networks: A Reinforcement Learning Approach
Authors:
Maad Ebrahim,
Abdelhakim Hafid
Abstract:
In this paper, we propose a load balancing algorithm based on Reinforcement Learning (RL) to optimize the performance of Fog Computing for real-time IoT applications. The algorithm aims to minimize the waiting delay of IoT workloads in dynamic environments with unpredictable traffic demands, using intelligent workload distribution. Unlike previous studies, our solution does not require load and re…
▽ More
In this paper, we propose a load balancing algorithm based on Reinforcement Learning (RL) to optimize the performance of Fog Computing for real-time IoT applications. The algorithm aims to minimize the waiting delay of IoT workloads in dynamic environments with unpredictable traffic demands, using intelligent workload distribution. Unlike previous studies, our solution does not require load and resource information from Fog nodes to preserve the privacy of service providers, who may wish to hide such information to prevent competitors from calculating better pricing strategies. The proposed algorithm is evaluated on a Discrete-event Simulator (DES) to mimic practical deployment in real environments, and its generalization ability is tested on simulations longer than what it was trained on. Our results show that our proposed approach outperforms baseline load balancing methods under different workload generation rates, while ensuring the privacy of Fog service providers. Furthermore, the environment representation we proposed for the RL agent demonstrates better performance compared to the commonly used representations for RL solutions in the literature, which compromise privacy.
△ Less
Submitted 28 February, 2023; v1 submitted 23 January, 2023;
originally announced January 2023.
-
Resilience and Load Balancing in Fog Networks: A Multi-Criteria Decision Analysis Approach
Authors:
Maad Ebrahim,
Abdelhakim Hafid
Abstract:
The advent of Cloud Computing enabled the proliferation of IoT applications for smart environments. However, the distance of these resources makes them unsuitable for delay-sensitive applications. Hence, Fog Computing has emerged to provide such capabilities in proximity to end devices through distributed resources. These limited resources can collaborate to serve distributed IoT application workf…
▽ More
The advent of Cloud Computing enabled the proliferation of IoT applications for smart environments. However, the distance of these resources makes them unsuitable for delay-sensitive applications. Hence, Fog Computing has emerged to provide such capabilities in proximity to end devices through distributed resources. These limited resources can collaborate to serve distributed IoT application workflows using the concept of stateless micro Fog service replicas, which provides resiliency and maintains service availability in the face of failures. Load balancing supports this collaboration by optimally assigning workloads to appropriate services, i.e., distributing the load among Fog nodes to fairly utilize compute and network resources and minimize execution delays. In this paper, we propose using ELECTRE, a Multi-Criteria Decision Analysis (MCDA) approach, to efficiently balance the load in Fog environments. We considered multiple objectives to make service selection decisions, including compute and network load information. We evaluate our approach in a realistic unbalanced topological setup with heterogeneous workload requirements. To the best of our knowledge, this is the first time ELECTRE-based methods are used to balance the load in Fog environments. Through simulations, we compared the performance of our proposed approach with traditional baseline methods that are commonly used in practice, namely random, Round-Robin, nearest node, and fastest service selection algorithms. In terms of the overall system performance, our approach outperforms these methods with up to 67% improvement.
△ Less
Submitted 24 October, 2022;
originally announced October 2022.
-
Blockchain as privacy and security solution for smart environments: A Survey
Authors:
Maad Ebrahim,
Abdelhakim Hafid,
Etienne Elie
Abstract:
Blockchain was always associated with Bitcoin, cryptocurrencies, and digital asset trading. However, its benefits are far beyond that. It supports technologies like the Internet-of-Things (IoT) to pave the way for futuristic smart environments, like smart homes, smart transportation, smart energy trading, smart industries, smart supply chains, and more. To enable these environments, IoT devices, m…
▽ More
Blockchain was always associated with Bitcoin, cryptocurrencies, and digital asset trading. However, its benefits are far beyond that. It supports technologies like the Internet-of-Things (IoT) to pave the way for futuristic smart environments, like smart homes, smart transportation, smart energy trading, smart industries, smart supply chains, and more. To enable these environments, IoT devices, machines, appliances, and vehicles, need to intercommunicate without the need for centralized trusted parties. Blockchain replaces these trusted parties in such trustless environments. It provides security enforcement, privacy assurance, authentication, and other key features to IoT ecosystems. Besides IoT-Blockchain integration, other technologies add more benefits that attract the research community. Software-Defined Networking (SDN), Fog, Edge, and Cloud Computing technologies, for example, play a key role in enabling realistic IoT applications. Moreover, the integration of Artificial Intelligence (AI) provides smart, dynamic, and autonomous decision-making capabilities for IoT devices in smart environments. To push the research further in this domain, we provide in this paper a comprehensive survey that includes state-of-the-art technological integration, challenges, and solutions for smart environments, and the role of these technologies as the building blocks of such smart environments. We also demonstrate how the level of integration between these technologies has increased over the years, which brings us closer to the futuristic view of smart environments. We further discuss the current need to provide general-purpose Blockchain platforms that can adapt to unique design requirements of different applications and solutions. Finally, we provide a simplified architecture of futuristic smart environments that integrate these technologies, showing the advantage of such integration.
△ Less
Submitted 16 March, 2022;
originally announced March 2022.
-
Hybrid Chaotic Method for Medical Images Ciphering
Authors:
Seham Muawadh Ali Ebrahim
Abstract:
Healthcare is an essential application of e-services, where for diagnostic testing, medical imaging acquiring, processing, analysis, storage, and protection are used. Image ciphering during storage and transmission over the networks used has seen implemented using many types of ciphering algorithms for security purpose. Current cyphering algorithms are classified into two types: traditional classi…
▽ More
Healthcare is an essential application of e-services, where for diagnostic testing, medical imaging acquiring, processing, analysis, storage, and protection are used. Image ciphering during storage and transmission over the networks used has seen implemented using many types of ciphering algorithms for security purpose. Current cyphering algorithms are classified into two types: traditional classical cryptography using standard algorithms (DES, AES, IDEA, RC5, RSA, ...) and chaos cryptography using continuous (Chau, Rossler, Lorenz, ...) or discreet (Logistics, Henon, ...) algorithms. The traditional algorithms have struggled to combat image data as compared to regular textual data. Whereas, the chaotic algorithms are more efficient for image ciphering. The Significance characteristics of chaos are its extreme sensitivity to initial conditions and algorithm parameters. In this paper, medical image security based on hybrid/mixed chaotic algorithms is proposed. The proposed method is implemented using MATLAB. Where the image of the Retina of the Eye to detect Blood Vessels is ciphered. The Pseudo-Random Numbers Generators (PRNGs) from the different chaotic algorithms are implemented, and their statistical properties are evaluated using the National Institute of Standards and Technology NIST and other statistical test-suits. Then, these algorithms are used to secure the data, where the statistical properties of the cipher-text are also tested. We propose two PRNGs to increase the complexity of the PRNGs and to allow many of the NIST statistical tests to be passed: one based on two-hybrid mixed chaotic logistic maps and one based on two-hybrid mixed chaotic Henon maps, where each chaotic algorithm runs side-by-side and starts with random initial conditions and parameters (encryption keys). The resulting hybrid PRNGs passed many of the NIST statistical test suits.
△ Less
Submitted 4 December, 2020;
originally announced December 2020.
-
Intrusion Detection Framework for SQL Injection
Authors:
Israr Ali,
Syed Hasan Adil,
Mansoor Ebrahim
Abstract:
In this era of internet, E-Business and e-commerce applications are using Databases as their integral part. These Databases irrespective of the technology used are vulnerable to SQL injection attacks. These Attacks are considered very dangerous as well as very easy to use for attackers and intruders. In this paper, we are proposing a new approach to detect intrusion from attackers by using SQL inj…
▽ More
In this era of internet, E-Business and e-commerce applications are using Databases as their integral part. These Databases irrespective of the technology used are vulnerable to SQL injection attacks. These Attacks are considered very dangerous as well as very easy to use for attackers and intruders. In this paper, we are proposing a new approach to detect intrusion from attackers by using SQL injection. The main idea of our proposed solution is to create trusted user profiles fetched from the Queries submitted by authorized users by using association rules. After that we will use a hybrid (anomaly + misuse) detection model which will depend on data mining techniques to detect queries that deviates from our normal behavior profile. The normal behavior profile will be created in XML format. In this way we can minimize false positive alarms.
△ Less
Submitted 29 September, 2020;
originally announced September 2020.
-
Line-based compressive sensing for low-power visual applications
Authors:
Mansoor Ebrahim,
Syed Hasan Adil,
Daniyal Nawaz,
Kamran Raza
Abstract:
In this paper, a Line based Compressive Sensing (LCS) scheme is discussed and proposed for low power visual applications, in which image acquisition is performed in a line-by-line manner at the encoder side using same measurement operator. Such approach reduces the computational burden and makes the implementation process easier (at encoder) plus provides better and more efficient initial reconstr…
▽ More
In this paper, a Line based Compressive Sensing (LCS) scheme is discussed and proposed for low power visual applications, in which image acquisition is performed in a line-by-line manner at the encoder side using same measurement operator. Such approach reduces the computational burden and makes the implementation process easier (at encoder) plus provides better and more efficient initial reconstruction (at decoder) than other CS techniques. The reconstruction algorithm is based on the combination of the conventional augmented Lagrangian method with variable splitting and alternating direction method and is referred as TV-AL3. The simulation results show that the proposed line based CS scheme not only improves the quality of image by 1dB to ~3dB at various subrates, when compared to the conventional CS schemes but also reduces the computational complexity at the encoder side.
△ Less
Submitted 30 December, 2019;
originally announced January 2020.
-
Two-photon Quantum Interference and Entanglement at 2 μm
Authors:
Shashi Prabhakar,
Taylor Shields,
Adetunmise Dada,
Mehdi Ebrahim,
Gregor G. Taylor,
Dmitry Morozov,
Kleanthis Erotokritou,
Shigehito Miki,
Masahiro Yabuno,
Hirotaka Terai,
Corin Gawith,
Michael Kues,
Lucia Caspani,
Robert H. Hadfield,
Matteo Clerici
Abstract:
Quantum-enhanced optical systems operating within the 2- to 2.5-$μ$m spectral region have the potential to revolutionize emerging applications in communications, sensing, and metrology. However, to date, sources of entangled photons have been realized mainly in the near-infrared 700- to 1550-nm spectral window. Here, using custom-designed lithium niobate crystals for spontaneous parametric down-co…
▽ More
Quantum-enhanced optical systems operating within the 2- to 2.5-$μ$m spectral region have the potential to revolutionize emerging applications in communications, sensing, and metrology. However, to date, sources of entangled photons have been realized mainly in the near-infrared 700- to 1550-nm spectral window. Here, using custom-designed lithium niobate crystals for spontaneous parametric down-conversion and tailored superconducting nanowire single-photon detectors, we demonstrate two-photon interference and polarization-entangled photon pairs at 2090 nm. These results open the 2- to 2.5-$μ$m mid-infrared window for the development of optical quantum technologies such as quantum key distribution in next-generation mid-infrared fiber communication systems and future Earth-to-satellite communications.
△ Less
Submitted 30 March, 2020; v1 submitted 5 June, 2019;
originally announced June 2019.
-
Security Analysis of Secure Force Algorithm for Wireless Sensor Networks
Authors:
Shujaat Khan,
Muhammad Sohail Ibrahim,
Kafeel Ahmed Khan,
Mansoor Ebrahim
Abstract:
In Wireless Sensor Networks, the sensor nodes are battery powered small devices designed for long battery life. These devices also lack in terms of processing capability and memory. In order to provide high confidentiality to these resource constrained network nodes, a suitable security algorithm is needed to be deployed that can establish a balance between security level and processing overhead.…
▽ More
In Wireless Sensor Networks, the sensor nodes are battery powered small devices designed for long battery life. These devices also lack in terms of processing capability and memory. In order to provide high confidentiality to these resource constrained network nodes, a suitable security algorithm is needed to be deployed that can establish a balance between security level and processing overhead. The objective of this research work is to perform a security analysis and performance evaluation of recently proposed Secure Force algorithm. This paper shows the comparison of Secure Force 64, 128, and 192 bit architecture on the basis of avalanche effect (key sensitivity), entropy change analysis, image histogram, and computational time. Moreover, based on the evaluation results, the paper also suggests the possible solutions for the weaknesses of the SF algorithm.
△ Less
Submitted 8 September, 2015; v1 submitted 3 September, 2015;
originally announced September 2015.
-
Peer-to-Peer Network Simulators: an Analytical Review
Authors:
Mansoor Ebrahim,
Shujaat Khan,
Syed Sheraz Ul Hasan Mohani
Abstract:
Simulators are the most dominant and eminent tool for analyzing and investigating different type of networks. The simulations can be executed with less cost as compared to large scale experiment as less computational resources are required and if the simulation model is carefully designed then it can be more practical than any well brought-up mathematical model. Generally P2P research is based on…
▽ More
Simulators are the most dominant and eminent tool for analyzing and investigating different type of networks. The simulations can be executed with less cost as compared to large scale experiment as less computational resources are required and if the simulation model is carefully designed then it can be more practical than any well brought-up mathematical model. Generally P2P research is based on the principle of simulate first and then experiment in the real world and there is no reason that simulation results cannot be reproducible. A lack of standard documentation makes verification of results harder as well as due to such poor documentation implementation of well-known overlay algorithms was very difficult. This Paper describes different types of existing P2P simulators as well as provides a survey and comparison of existing P2P simulators and extracting the best simulator among them.
△ Less
Submitted 2 May, 2014;
originally announced May 2014.
-
Symmetric Algorithm Survey: A Comparative Analysis
Authors:
Mansoor Ebrahim,
Shujaat Khan,
Umer Bin Khalid
Abstract:
Information Security has become an important issue in modern world as the popularity and infiltration of internet commerce and communication technologies has emerged, making them a prospective medium to the security threats. To surmount these security threats modern data communications uses cryptography an effective, efficient and essential component for secure transmission of information by imple…
▽ More
Information Security has become an important issue in modern world as the popularity and infiltration of internet commerce and communication technologies has emerged, making them a prospective medium to the security threats. To surmount these security threats modern data communications uses cryptography an effective, efficient and essential component for secure transmission of information by implementing security parameter counting Confidentiality, Authentication, accountability, and accuracy. To achieve data security different cryptographic algorithms (Symmetric & Asymmetric) are used that jumbles data in to scribbled format that can only be reversed by the user that have to desire key. This paper presents a comprehensive comparative analysis of different existing cryptographic algorithms (symmetric) based on their Architecture, Scalability, Flexibility, Reliability, Security and Limitation that are essential for secure communication (Wired or Wireless).
△ Less
Submitted 2 May, 2014;
originally announced May 2014.
-
Security Risk Analysis in Peer 2 Peer System; An Approach towards Surmounting Security Challenges
Authors:
Mansoor Ebrahim,
Shujaat Khan,
UmerBin Khalid
Abstract:
P2P networking has become a promising technology and has achieved popularity as a mechanism for users to share files without the need for centralized servers. The rapid growth of P2P networks beginning with Kaza, Lime wire, Napsters, E-donkey, Gnutella etc makes them an attractive target to the creators of viruses and other security threats. This paper describes the major security issues on P2P ne…
▽ More
P2P networking has become a promising technology and has achieved popularity as a mechanism for users to share files without the need for centralized servers. The rapid growth of P2P networks beginning with Kaza, Lime wire, Napsters, E-donkey, Gnutella etc makes them an attractive target to the creators of viruses and other security threats. This paper describes the major security issues on P2P networks (Viruses and worms) and presents the study of propagation mechanisms. In particular, the paper explores different P2P viruses and worms, their propagation methodology, outlines the challenges, and evaluates how P2P worms affect the network. The experimental results obtained will provide new direction in surmounting the security concerns in P2P Networks
△ Less
Submitted 1 January, 2018; v1 submitted 21 April, 2014;
originally announced April 2014.
-
JRC EuroVoc Indexer JEX - A freely available multi-label categorisation tool
Authors:
Ralf Steinberger,
Mohamed Ebrahim,
Marco Turchi
Abstract:
EuroVoc (2012) is a highly multilingual thesaurus consisting of over 6,700 hierarchically organised subject domains used by European Institutions and many authorities in Member States of the European Union (EU) for the classification and retrieval of official documents. JEX is JRC-developed multi-label classification software that learns from manually labelled data to automatically assign EuroVoc…
▽ More
EuroVoc (2012) is a highly multilingual thesaurus consisting of over 6,700 hierarchically organised subject domains used by European Institutions and many authorities in Member States of the European Union (EU) for the classification and retrieval of official documents. JEX is JRC-developed multi-label classification software that learns from manually labelled data to automatically assign EuroVoc descriptors to new documents in a profile-based category-ranking task. The JEX release consists of trained classifiers for 22 official EU languages, of parallel training data in the same languages, of an interface that allows viewing and amending the assignment results, and of a module that allows users to re-train the tool on their own document collections. JEX allows advanced users to change the document representation so as to possibly improve the categorisation result through linguistic pre-processing. JEX can be used as a tool for interactive EuroVoc descriptor assignment to increase speed and consistency of the human categorisation process, or it can be used fully automatically. The output of JEX is a language-independent EuroVoc feature vector lending itself also as input to various other Language Technology tasks, including cross-lingual clustering and classification, cross-lingual plagiarism detection, sentence selection and ranking, and more.
△ Less
Submitted 20 September, 2013;
originally announced September 2013.