-
Open Source Horizontal IoT Platforms: A Comparative Study on Functional Requirements
Authors:
Ali Farhat,
Abdelrahman Eldosouky,
Jason Jaskolka,
Mohamed Ibnkahla,
Ashraf Matrawy
Abstract:
The growth in the deployment of Internet of Things (IoT) devices in various industries required the use of IoT platforms to manage, automate and control devices. This introduced different commercial and open source IoT platforms for developers and researchers to deploy. As a result, selecting one of these platforms for a specific application and use case became a challenge. In this study, a guidel…
▽ More
The growth in the deployment of Internet of Things (IoT) devices in various industries required the use of IoT platforms to manage, automate and control devices. This introduced different commercial and open source IoT platforms for developers and researchers to deploy. As a result, selecting one of these platforms for a specific application and use case became a challenge. In this study, a guideline for selecting an open source platform is presented. The process starts by identifying a list of functional requirements that would reflect the requirements of an IoT system in general. This list of requirements is used to compare between four major open source platforms: 1) OM2M (OneM2M standard), 2) IoTivity (OCF standard), LwM2M (OMA SpecWorks LwM2M standard), and 4) FIWARE (FIWARE standard). The purpose of this comparison is to indicate the capability and limitations of the different platforms and how they satisfy each requirement. Afterwards, two examples are presented to demonstrate how this guideline is used to select the most suitable platform for an e-health and a smart city use case. This includes how to define each use case and all the required information that could affect the process of selecting the most suitable platform for the development of the IoT platform.
△ Less
Submitted 13 September, 2022;
originally announced September 2022.
-
Finding the Sweet Spot for Data Anonymization: A Mechanism Design Perspective
Authors:
Abdelrahman Eldosouky,
Tapadhir Das,
Anuraag Kotra,
Shamik Sengupta
Abstract:
Data sharing between different organizations is an essential process in today's connected world. However, recently there were many concerns about data sharing as sharing sensitive information can jeopardize users' privacy. To preserve the privacy, organizations use anonymization techniques to conceal users' sensitive data. However, these techniques are vulnerable to de-anonymization attacks which…
▽ More
Data sharing between different organizations is an essential process in today's connected world. However, recently there were many concerns about data sharing as sharing sensitive information can jeopardize users' privacy. To preserve the privacy, organizations use anonymization techniques to conceal users' sensitive data. However, these techniques are vulnerable to de-anonymization attacks which aim to identify individual records within a dataset. In this paper, a two-tier mathematical framework is proposed for analyzing and mitigating the de-anonymization attacks, by studying the interactions between sharing organizations, data collector, and a prospective attacker. In the first level, a game-theoretic model is proposed to enable sharing organizations to optimally select their anonymization levels for k-anonymization under two potential attacks: background-knowledge attack and homogeneity attack. In the second level, a contract-theoretic model is proposed to enable the data collector to optimally reward the organizations for their data. The formulated problems are studied under single-time sharing and repeated sharing scenarios. Different Nash equilibria for the proposed game and the optimal solution of the contract-based problem are analytically derived for both scenarios. Simulation results show that the organizations can optimally select their anonymization levels, while the data collector can benefit from incentivizing the organizations to share their data.
△ Less
Submitted 29 January, 2021;
originally announced January 2021.
-
Interdependence-Aware Game-Theoretic Framework for Secure Intelligent Transportation Systems
Authors:
Aidin Ferdowsi,
Abdelrahman Eldosouky,
Walid Saad
Abstract:
The operation of future intelligent transportation systems (ITSs), communications infrastructure (CI), and power grids (PGs) will be highly interdependent. In particular, autonomous connected vehicles require CI resources to operate, and, thus, communication failures can result in non-optimality in the ITS flow in terms of traffic jams and fuel consumption. Similarly, CI components, e.g., base sta…
▽ More
The operation of future intelligent transportation systems (ITSs), communications infrastructure (CI), and power grids (PGs) will be highly interdependent. In particular, autonomous connected vehicles require CI resources to operate, and, thus, communication failures can result in non-optimality in the ITS flow in terms of traffic jams and fuel consumption. Similarly, CI components, e.g., base stations (BSs) can be impacted by failures in the electric grid that is powering them. Thus, malicious attacks on the PG can lead to failures in both the CI and the ITSs. To this end, in this paper, the security of an ITS against indirect attacks carried out through the PG is studied in an interdependent PG-CI-ITS scenario. To defend against such attacks, the administrator of the interdependent critical infrastructure can allocate backup power sources (BPSs) at every BS to compensate for the power loss caused by the attacker. However, due to budget limitations, the administrator must consider the importance of each BS in light of the PG risk of failure, while allocating the BPSs. In this regard, a rigorous analytical framework is proposed to model the interdependencies between the ITS, CI, and PG. Next, a one-to-one relationship between the PG components and ITS streets is derived in order to capture the effect of the PG components' failure on the optimality of the traffic flow in the streets. Moreover, the problem of BPS allocation is formulated using a Stackelberg game framework and the Stackelberg equilibrium (SE) of the game is characterized. Simulation results show that the derived SE outperforms any other BPS allocation strategy and can be scalable in linear time with respect to the size of the interdependent infrastructure.
△ Less
Submitted 12 July, 2020;
originally announced July 2020.
-
Recycling of SmCo5 magnets by HD process
Authors:
A. Eldosouky,
I. Skulj
Abstract:
Hydrogen decrepitation process has been applied for the first time for the direct recycling of SmCo5 magnets. Industrially produced sintered SmCo5 magnets were decrepitated by hydrogen gas at a pressure of 1 bar to 9.5 bar at room temperature in a planetary rotating jar. After decrepitation, the starting sintered magnets were reduced to a powder with a particle size of less than 200 microns. The p…
▽ More
Hydrogen decrepitation process has been applied for the first time for the direct recycling of SmCo5 magnets. Industrially produced sintered SmCo5 magnets were decrepitated by hydrogen gas at a pressure of 1 bar to 9.5 bar at room temperature in a planetary rotating jar. After decrepitation, the starting sintered magnets were reduced to a powder with a particle size of less than 200 microns. The produced powder was used for the preparation of recycled SmCo5 magnets. Scanning electron microscopy, energy-dispersive X-ray spectroscopy, X-ray diffraction studies and magnetic measurements were used to follow the decrepitation and the sintering processes. The measured remanence and maximum energy product of the recycled magnet are 0.94 T and 171.1 kJ/m3, respectively, in comparison with 0.91 T and 156.8 kJ/m3, respectively for the original magnet before recycling. It was also observed that, there is refinement in the microstructure after recycling in comparison to the original magnet.
△ Less
Submitted 12 May, 2019;
originally announced May 2019.
-
Drones in Distress: A Game-Theoretic Countermeasure for Protecting UAVs Against GPS Spoofing
Authors:
AbdelRahman Eldosouky,
Aidin Ferdowsi,
Walid Saad
Abstract:
One prominent security threat that targets unmanned aerial vehicles (UAVs) is the capture via GPS spoofing in which an attacker manipulates a UAV's global positioning system (GPS) signals in order to capture it. Given the anticipated widespread deployment of UAVs for various purposes, it is imperative to develop new security solutions against such attacks. In this paper, a mathematical framework i…
▽ More
One prominent security threat that targets unmanned aerial vehicles (UAVs) is the capture via GPS spoofing in which an attacker manipulates a UAV's global positioning system (GPS) signals in order to capture it. Given the anticipated widespread deployment of UAVs for various purposes, it is imperative to develop new security solutions against such attacks. In this paper, a mathematical framework is introduced for analyzing and mitigating the effects of GPS spoofing attacks on UAVs. In particular, system dynamics are used to model the optimal routes that the UAVs will adopt to reach their destinations. The GPS spoofer's effect on each UAV's route is also captured by the model. To this end, the spoofer's optimal imposed locations on the UAVs, are analytically derived; allowing the UAVs to predict their traveling routes under attack. Then, a countermeasure mechanism is developed to mitigate the effect of the GPS spoofing attack. The countermeasure is built on the premise of cooperative localization, in which a UAV can determine its location using nearby UAVs instead of the possibly compromised GPS locations. To better utilize the proposed defense mechanism, a dynamic Stackelberg game is formulated to model the interactions between a GPS spoofer and a drone operator. In particular, the drone operator acts as the leader that determines its optimal strategy in light of the spoofer's expected response strategy. The equilibrium strategies of the game are then analytically characterized and studied through a novel proposed algorithm. Simulation results show that, when combined with the Stackelberg strategies, the proposed defense mechanism will outperform baseline strategy selection techniques in terms of reducing the possibility of UAV capture
△ Less
Submitted 28 December, 2019; v1 submitted 16 April, 2019;
originally announced April 2019.
-
Hydrogen Decrepitation and Spark Plasma Sintering to Produce Recycled SmCo5 Magnets With High Coercivity
Authors:
Anas Eldosouky,
Awais Ikram,
Muhammad Farhan Mehmood,
Xuan Xu,
Saso Sturm,
Kristina Zuzek Rozman,
Irena Skulj
Abstract:
Spark plasma sintering (SPS) technique is applied in combination with hydrogen decrepitation process for the recycling of SmCo5 magnets. The SmCo5 magnets for recycling were first decrepitated by hydrogen gas of a pressure of 4 bar for 3 hours to produce decrepitated powder. This powder was then used to prepare isotropic sintered magnets using the SPS technique, by sintering at 800-1000 oC for 1 m…
▽ More
Spark plasma sintering (SPS) technique is applied in combination with hydrogen decrepitation process for the recycling of SmCo5 magnets. The SmCo5 magnets for recycling were first decrepitated by hydrogen gas of a pressure of 4 bar for 3 hours to produce decrepitated powder. This powder was then used to prepare isotropic sintered magnets using the SPS technique, by sintering at 800-1000 oC for 1 minute. Full densification of the SPS-ed magnets was possible at a temperature of 1000 oC. The sample sintered at 900 oC showed the best internal coercivity (jHc) of higher than 1500 kA/m with high remanence (Br) value of 0.47 T and energy product (BH(max)) of 43.4 kJ/m3. The properties of the SPS-ed sample sintered at 900 oC were compared with conventionally sintered (CVS-ed) sample prepared by using fresh SmCo5 powder. The results showed the improvement of the magnetic properties of the SPS-ed sample in comparison to the CVS-ed sample at room temperature, and the possibility to use the SPS-ed sample at high temperature of 180 oC, where the sample showed good magnetic properties of jHc of 1502 kA/m, Br of 0.44 T and BH(max) of 36.4 kJ/m3. The microstructure and X-ray diffraction patterns of the SPS-ed and the CVS-ed samples were studied; where the samples showed to basically consist of SmCo5 matrix phase with Sm2Co7 and Sm-oxides.
△ Less
Submitted 31 May, 2018;
originally announced May 2018.
-
Environment-Aware Deployment of Wireless Drones Base Stations with Google Earth Simulator
Authors:
Aaron French,
Mohammad Mozaffari,
Abdelrahman Eldosouky,
Walid Saad
Abstract:
In this paper, a software-based simulator for the deployment of base station-equipped unmanned aerial vehicles (UAVs) in a cellular network is proposed. To this end, the Google Earth Engine platform and its included image processing functions are used to collect geospatial data and to identify obstacles that can disrupt the line-of-sight (LoS) communications between UAVs and ground users. Given su…
▽ More
In this paper, a software-based simulator for the deployment of base station-equipped unmanned aerial vehicles (UAVs) in a cellular network is proposed. To this end, the Google Earth Engine platform and its included image processing functions are used to collect geospatial data and to identify obstacles that can disrupt the line-of-sight (LoS) communications between UAVs and ground users. Given such geographical information, three environment-aware optimal UAV deployment scenarios are investigated using the developed simulator. In the first scenario, the positions of UAVs are optimized such that the number of ground users covered by UAVs is maximized. In the second scenario, the minimum number of UAVs needed to provide full coverage for all ground users is determined. Finally, given the load requirements of the ground users, the total flight time (i.e., energy) that the UAVs need to completely serve the ground users is minimized. Simulation results using a real area of the Virginia Tech campus show that the proposed environment-aware drone deployment framework with Google Earth input significantly enhances the network performance in terms of coverage and energy consumption, compared to classical deployment approaches that do not exploit geographical information. In particular, the results show that the proposed approach yields a coverage enhancement by a factor of 2, and a 65% improvement in energy-efficiency. The results have also shown the existence of an optimal number of drones that leads to a maximum wireless coverage performance.
△ Less
Submitted 26 May, 2018;
originally announced May 2018.
-
Resilient Critical Infrastructure: Bayesian Network Analysis and Contract-Based Optimization
Authors:
AbdelRahman Eldosouky,
Walid Saad,
Narayan Mandayam
Abstract:
Instilling resilience in critical infrastructure (CI) such as dams or power grids is a major challenge for tomorrow's cities and communities. Resilience, here, pertains to a CI's ability to adapt or rapidly recover from disruptive events. In this paper, the problem of optimizing and managing the resilience of CIs is studied. In particular, a comprehensive two-fold framework is proposed to improve…
▽ More
Instilling resilience in critical infrastructure (CI) such as dams or power grids is a major challenge for tomorrow's cities and communities. Resilience, here, pertains to a CI's ability to adapt or rapidly recover from disruptive events. In this paper, the problem of optimizing and managing the resilience of CIs is studied. In particular, a comprehensive two-fold framework is proposed to improve CI resilience by considering both the individual CIs and their collective contribution to an entire system of multiple CIs. To this end, a novel analytical resilience index is proposed to measure the effect of each CI's physical components on its probability of failure. In particular, a Markov chain defining each CI's performance state and a Bayesian network modeling the probability of failure are introduced to infer each CI's resilience index. Then, to maximize the resilience of a system of CIs, a novel approach for allocating resources, such as drones or maintenance personnel, is proposed. In particular, a comprehensive resource allocation framework, based on the tools of contract theory, is proposed enabling the system operator to optimally allocate resources, such as, redundant components or monitoring devices to each individual CI based on its economic contribution to the entire system. The optimal solution of the contract-based resilience resource allocation problem is analytically derived using dynamic programming. The proposed framework is then evaluated using a case study pertaining to hydropower dams and their interdependence to the power grid. Simulation results, within the case study, show that the system operator can economically benefit from allocating the resources while dams have a 60% average improvement over their initial resilience indices.
△ Less
Submitted 30 August, 2017;
originally announced September 2017.
-
Contract-Theoretic Resource Allocation for Critical Infrastructure Protection
Authors:
AbdelRahman Eldosouky,
Walid Saad,
Charles Kamhoua,
and Kevin Kwiat
Abstract:
Critical infrastructure protection (CIP) is envisioned to be one of the most challenging security problems in the coming decade. One key challenge in CIP is the ability to allocate resources, either personnel or cyber, to critical infrastructures with different vulnerability and criticality levels. In this work, a contract-theoretic approach is proposed to solve the problem of resource allocation…
▽ More
Critical infrastructure protection (CIP) is envisioned to be one of the most challenging security problems in the coming decade. One key challenge in CIP is the ability to allocate resources, either personnel or cyber, to critical infrastructures with different vulnerability and criticality levels. In this work, a contract-theoretic approach is proposed to solve the problem of resource allocation in critical infrastructure with asymmetric information. A control center (CC) is used to design contracts and offer them to infrastructures' owners. A contract can be seen as an agreement between the CC and infrastructures using which the CC allocates resources and gets rewards in return. Contracts are designed in a way to maximize the CC's benefit and motivate each infrastructure to accept a contract and obtain proper resources for its protection. Infrastructures are defined by both vulnerability levels and criticality levels which are unknown to the CC. Therefore, each infrastructure can claim that it is the most vulnerable or critical to gain more resources. A novel mechanism is developed to handle such an asymmetric information while providing the optimal contract that motivates each infrastructure to reveal its actual type. The necessary and sufficient conditions for such resource allocation contracts under asymmetric information are derived. Simulation results show that the proposed contract-theoretic approach maximizes the CC's utility while ensuring that no infrastructure has an incentive to ask for another contract, despite the lack of exact information at the CC.
△ Less
Submitted 21 February, 2017;
originally announced February 2017.
-
Single Controller Stochastic Games for Optimized Moving Target Defense
Authors:
AbdelRahman Eldosouky,
Walid Saad,
Dusit Niyato
Abstract:
Moving target defense (MTD) techniques that enable a system to randomize its configuration to thwart prospective attacks are an effective security solution for tomorrow's wireless networks. However, there is a lack of analytical techniques that enable one to quantify the benefits and tradeoffs of MTDs. In this paper, a novel approach for implementing MTD techniques that can be used to randomize cr…
▽ More
Moving target defense (MTD) techniques that enable a system to randomize its configuration to thwart prospective attacks are an effective security solution for tomorrow's wireless networks. However, there is a lack of analytical techniques that enable one to quantify the benefits and tradeoffs of MTDs. In this paper, a novel approach for implementing MTD techniques that can be used to randomize cryptographic techniques and keys in wireless networks is proposed. In particular, the problem is formulated as a stochastic game in which a base station (BS), acting as a defender seeks to strategically change its cryptographic techniques and keys in an effort to deter an attacker that is trying to eavesdrop on the data. The game is shown to exhibit a single-controller property in which only one player, the defender, controls the state of the game. For this game, the existence and properties of the Nash equilibrium are studied, in the presence of a defense cost for using MTD. Then, a practical algorithm for deriving the equilibrium MTD strategies is derived. Simulation results show that the proposed game-theoretic MTD framework can significantly improve the overall utility of the defender, while enabling effective randomization over cryptographic techniques.
△ Less
Submitted 12 October, 2016;
originally announced October 2016.