-
Automated Attack and Defense Framework for 5G Security on Physical and Logical Layers
Authors:
Zhihong Tian,
Yanbin Sun,
Shen Su,
Mohan Li,
Xiaojiang Du,
Mohsen Guizani
Abstract:
The 5th generation (5G) network adopts a great number of revolutionary technologies to fulfill continuously increasing requirements of a variety of applications, including ultra-high bandwidth, ultra-low latency, ultra-massive device access, ultra-reliability, and so on. Correspondingly, traditional security focuses on the core network, and the logical (non-physical) layer is no longer suitable fo…
▽ More
The 5th generation (5G) network adopts a great number of revolutionary technologies to fulfill continuously increasing requirements of a variety of applications, including ultra-high bandwidth, ultra-low latency, ultra-massive device access, ultra-reliability, and so on. Correspondingly, traditional security focuses on the core network, and the logical (non-physical) layer is no longer suitable for the 5G network. 5G security presents a tendency to extend from the network center to the network edge and from the logical layer to the physical layer. The physical layer security is also an essential part of 5G security. However, the security of each layer in 5G is mostly studied separately, which causes a lack of comprehensive analysis for security issues across layers. Meanwhile, potential security threats are lack of automated solutions. This article explores the 5G security by combining the physical layer and the logical layer from the perspective of automated attack and defense, and dedicate to provide automated solution framework for 5G security.
△ Less
Submitted 11 February, 2019;
originally announced February 2019.
-
Achieving Secure and Efficient Cloud Search Services: Cross-Lingual Multi-Keyword Rank Search over Encrypted Cloud Data
Authors:
Xueyan Liu,
Zhitao Guan,
Longfei Wu,
Zain Ul Abedin,
Mohsen Guizani
Abstract:
Multi-user multi-keyword ranked search scheme in arbitrary language is a novel multi-keyword rank searchable encryption (MRSE) framework based on Paillier Cryptosystem with Threshold Decryption (PCTD). Compared to previous MRSE schemes constructed based on the k-nearest neighbor searcha-ble encryption (KNN-SE) algorithm, it can mitigate some draw-backs and achieve better performance in terms of fu…
▽ More
Multi-user multi-keyword ranked search scheme in arbitrary language is a novel multi-keyword rank searchable encryption (MRSE) framework based on Paillier Cryptosystem with Threshold Decryption (PCTD). Compared to previous MRSE schemes constructed based on the k-nearest neighbor searcha-ble encryption (KNN-SE) algorithm, it can mitigate some draw-backs and achieve better performance in terms of functionality and efficiency. Additionally, it does not require a predefined keyword set and support keywords in arbitrary languages. However, due to the pattern of exact matching of keywords in the new MRSE scheme, multilingual search is limited to each language and cannot be searched across languages. In this pa-per, we propose a cross-lingual multi-keyword rank search (CLRSE) scheme which eliminates the barrier of languages and achieves semantic extension with using the Open Multilingual Wordnet. Our CLRSE scheme also realizes intelligent and per-sonalized search through flexible keyword and language prefer-ence settings. We evaluate the performance of our scheme in terms of security, functionality, precision and efficiency, via extensive experiments.
△ Less
Submitted 11 February, 2019;
originally announced February 2019.
-
Mixed RF/FSO Relaying Systems with Hardware Impairments
Authors:
Elyes Balti,
Mohsen Guizani,
Bechir Hamdaoui,
Bassem Khalfi
Abstract:
In this work, we provide a detailed analysis of a dual-hop fixed gain (FG) amplify-and-forward relaying system, consisting of a hybrid radio frequency (RF) and free-space optical (FSO) channels. We introduce an impairment model which is the soft envelope limiter (SEL). Additionally, we propose the partial relay selection (PRS) protocol with outdated channel state information (CSI) based on the kno…
▽ More
In this work, we provide a detailed analysis of a dual-hop fixed gain (FG) amplify-and-forward relaying system, consisting of a hybrid radio frequency (RF) and free-space optical (FSO) channels. We introduce an impairment model which is the soft envelope limiter (SEL). Additionally, we propose the partial relay selection (PRS) protocol with outdated channel state information (CSI) based on the knowledge of the RF channels in order to select one relay for the communication. Moreover, the RF channels of the first hop experience Rayleigh fading while we propose a unified fading model for the FSO channels, called the unified Gamma Gamma (GG), taking into account the atmospheric turbulence, the path loss and the misalignment between the transmitter and the receiver aperture also called the pointing error. Novel closed-forms of the outage probability (OP), the bit error probability (BEP) and the average ergodic capacity (EC) are derived in terms of Meijer-G and Fox-H functions. Capitalizing on these metrics, we also derive the asymptotical high signal-to-noise ratio (SNR) in order to get engineering insights into the impacts of the hardware impairments and the system parameters as well. Finally, using Monte Carlo simulations, we validate numerically the derived mathematical formulations.
△ Less
Submitted 15 January, 2019;
originally announced February 2019.
-
A Blockchain-based Self-tallying Voting Scheme in Decentralized IoT
Authors:
Yannan Li,
Willy Susilo,
Guomin Yang,
Yong Yu,
Dongxi Liu,
Mohsen Guizani
Abstract:
The Internet of Things (IoT) is experiencing explosive growth and has gained extensive attention from academia and industry in recent years. Most of the existing IoT infrastructures are centralized, in which the presence of a cloud server is mandatory. However, centralized frameworks suffer from the issues of unscalability and single-point-of-failure. Consequently, decentralized IoT has been propo…
▽ More
The Internet of Things (IoT) is experiencing explosive growth and has gained extensive attention from academia and industry in recent years. Most of the existing IoT infrastructures are centralized, in which the presence of a cloud server is mandatory. However, centralized frameworks suffer from the issues of unscalability and single-point-of-failure. Consequently, decentralized IoT has been proposed by taking advantage of the emerging technology of Blockchain. Voting systems are widely adopted in IoT, such as a leader election in wireless sensor networks. Self-tallying voting systems are alternatives to traditional centralized voting systems in decentralized IoT since the traditional ones are not suitable for such scenarios. Unfortunately, self-tallying voting systems inherently suffer from fairness issues, such as adaptive and abortive issues caused by malicious voters. In this paper, we introduce a framework of self-tallying systems in decentralized IoT based on Blockchain. We propose a concrete construction and prove the proposed system satisfies all the security requirements including fairness, dispute-freeness and maximal ballot secrecy. The implementations on mobile phones demonstrate the practicability of our system.
△ Less
Submitted 10 February, 2019;
originally announced February 2019.
-
A Novel Secure Authentication Scheme for Heterogeneous Internet of Thing
Authors:
**gwei Liu,
Ailian Ren,
Lihuan Zhang,
Rong Sun,
Xiaojiang Du,
Mohsen Guizani
Abstract:
Today, Internet of Things (IoT) technology is being increasingly popular which is applied in a wide range of industry sectors such as healthcare, transportation and some critical infrastructures. With the widespread applications of IoT technology, people's lives have changed dramatically. Due to its capabilities of sensitive data-aware, information collection, communication and processing, it rais…
▽ More
Today, Internet of Things (IoT) technology is being increasingly popular which is applied in a wide range of industry sectors such as healthcare, transportation and some critical infrastructures. With the widespread applications of IoT technology, people's lives have changed dramatically. Due to its capabilities of sensitive data-aware, information collection, communication and processing, it raises security and privacy concerns. Moreover, a malicious attacker may impersonate a legitimate user, which may cause security threat and violation privacy. In allusion to the above problems, we propose a novel and lightweight anonymous authentication and key agreement scheme for heterogeneous IoT, which is innovatively designed to shift between the public key infrastructure (PKI) and certificateless cryptography (CLC) environment. The proposed scheme not only achieves secure communication among the legal authorized users, but also possesses more attributes with user anonymity, non-repudiation and key agreement fairness. Through the security analysis, it is proved that the proposed scheme can resist replay attacks and denial of service (DOS) attacks. Finally, the performance evaluation demonstrates that our scheme is more lightweight and innovative.
△ Less
Submitted 10 February, 2019;
originally announced February 2019.
-
Aggregate Hardware Impairments Over Mixed RF/FSO Relaying Systems With Outdated CSI
Authors:
Elyes Balti,
Mohsen Guizani,
Bechir Hamdaoui,
Bassem Khalfi
Abstract:
In this paper, we propose a dual-hop RF (Radio-Frequency)/FSO (Free-Space Optical) system with multiple relays employing the Decode-and-Forward (DF) and Amplify-and-Forward (AF) with a Fixed Gain (FG) relaying scheme. The RF channels are subject to a Rayleigh distribution while the optical links experience a unified fading model emcopassing the atmospheric turbulence that follows the Málaga distri…
▽ More
In this paper, we propose a dual-hop RF (Radio-Frequency)/FSO (Free-Space Optical) system with multiple relays employing the Decode-and-Forward (DF) and Amplify-and-Forward (AF) with a Fixed Gain (FG) relaying scheme. The RF channels are subject to a Rayleigh distribution while the optical links experience a unified fading model emcopassing the atmospheric turbulence that follows the Málaga distribution (or also called the $\mathcal{M}$-distribution), the atmospheric path loss and the pointing error. Partial relay selection (PRS) with outdated channel state information (CSI) is proposed to select the candidate relay to forward the signal to the destination. At the reception, the detection of the signal can be achieved following either heterodyne or Intensity Modulation and Direct Detection (IM/DD). Many previous attempts neglected the impact of the hardware impairments and assumed ideal hardware. This assumption makes sense for low data rate systems but it would no longer be valid for high data rate systems. In this work, we propose a general model of hardware impairment to get insight into quantifying its effects on the system performance. We will demonstrate that the hardware impairments have small impact on the system performance for low signal-to-noise ratio (SNR), but it can be destructive at high SNR values. Furthermore analytical expressions and upper bounds are derived for the outage probability and ergodic capacity while the symbol error probability is obtained through the numerical integration method. Capitalizing on these metrics, we also derive the high SNR asymptotes to get valuable insight into the system gains such as the diversity and the coding gains. Finally, analytical and numerical results are presented and validated by Monte Carlo simulation.
△ Less
Submitted 15 January, 2019;
originally announced February 2019.
-
Impact of Non-Linear High-Power Amplifiers on Cooperative Relaying Systems
Authors:
Elyes Balti,
Mohsen Guizani
Abstract:
In this paper, we investigate the impact of the high-power amplifier non-linear distortion on multiple relay systems by introducing the soft envelope limiter, traveling wave tube amplifier, and solid-state power amplifier to the relays. The system employs amplify-and-forward either fixed or variable gain relaying and uses the opportunistic relay selection with outdated channel state information to…
▽ More
In this paper, we investigate the impact of the high-power amplifier non-linear distortion on multiple relay systems by introducing the soft envelope limiter, traveling wave tube amplifier, and solid-state power amplifier to the relays. The system employs amplify-and-forward either fixed or variable gain relaying and uses the opportunistic relay selection with outdated channel state information to select the best relay. The results show that the performance loss is small at low rates; however, it is significant for high rates. In particular, the outage probability and the bit error rate are saturated by an irreducible floor at high rates. The same analysis is pursued for the capacity and shows that it is saturated by a detrimental ceiling as the average signal-to-noise ratio becomes higher. This result contrasts the case of the ideal hardware where the capacity grows indefinitely. Moreover, the results show that the capacity ceiling is proportional to the impairment's parameter and for some special cases the impaired systems practically operate in acceptable conditions. Closed-forms and high SNR asymptotes of the outage probability, the bit error rate, and the capacity are derived. Finally, analytical expressions are validated by the Monte Carlo simulation.
△ Less
Submitted 15 January, 2019;
originally announced February 2019.
-
Mixed RF/FSO Cooperative Relaying Systems with Co-Channel Interference
Authors:
Elyes Balti,
Mohsen Guizani
Abstract:
In this paper, we provide a global framework analysis of a dual-hop mixed Radio Frequency (RF)/Free Space Optical (FSO) system with multiple branches/relays wherein the first and second hops, respectively, consist of RF and FSO channels. To cover various cases of fading, we propose generalized channels' models for RF and FSO links that follow the Nakagami-m and the Double Generalized Gamma (DGG) d…
▽ More
In this paper, we provide a global framework analysis of a dual-hop mixed Radio Frequency (RF)/Free Space Optical (FSO) system with multiple branches/relays wherein the first and second hops, respectively, consist of RF and FSO channels. To cover various cases of fading, we propose generalized channels' models for RF and FSO links that follow the Nakagami-m and the Double Generalized Gamma (DGG) distributions, respectively. Moreover, we suggest Channel State Information (CSI)-assisted relaying or variable relaying gain based Amplifiy-and-Forward (AF) amplification. Partial relay selection with outdated CSI is assumed as a relay selection protocol based on the knowledge of the RF CSI. In order to derive the end-to-end Signal-to-Interference-plus-Noise Ratio (SINR) statistics such as the Cumulative Distribution Function (CDF), the Probability Density Function (PDF), the higher order moments, the amount of fading and the Moment Generating Function (MGF), the numerical values of the fading severity parameters are only valid for integer values. Based on these statistics, we derive closed-forms of the outage probability, the bit error probability, the ergodic capacity and the outage capacity in terms of Meijer-G, univariate, bivariate and trivariate Fox-H functions. Capitalizing on these expressions, we derive the asymptotic high SNR to unpack valuable engineering insights of the system performance. Monte Carlo simulation is used to confirm the analytical expressions.
△ Less
Submitted 15 January, 2019;
originally announced February 2019.
-
Hybrid Rayleigh and Double-Weibull over Impaired RF/FSO System with Outdated CSI
Authors:
Elyes Balti,
Mohsen Guizani,
Bechir Hamdaoui
Abstract:
In this work, we present a global framework of a dual-hop RF/FSO system with multiple relays operating at the mode of amplify-and-forward (AF) with fixed gain. Partial relay selection (PRS) protocol with outdated channel state information (CSI) is assumed since the channels of the first hop are time-varying. The optical irradiance of the second hop are subject to the Double-Weibull model while the…
▽ More
In this work, we present a global framework of a dual-hop RF/FSO system with multiple relays operating at the mode of amplify-and-forward (AF) with fixed gain. Partial relay selection (PRS) protocol with outdated channel state information (CSI) is assumed since the channels of the first hop are time-varying. The optical irradiance of the second hop are subject to the Double-Weibull model while the RF channels of the first hop experience the Rayleigh fading. The signal reception is achieved either by heterodyne or intensity modulation and direct detection (IM/DD). In addition, we introduce an aggregate model of hardware impairments to the source (S) and the relays since they are not perfect nodes. In order to quantify the impairment impact on the system, we derive closed-form, approximate, upper bound and high signal-to-noise ratio (SNR) asymptotic of the outage probability (OP) and the ergodic capacity (EC). Finally, analytical and numerical results are in agreement using Monte Carlo simulation.
△ Less
Submitted 15 January, 2019;
originally announced February 2019.
-
Privacy Leakage in Smart Homes and Its Mitigation: IFTTT as a Case Study
Authors:
Rixin Xu,
Qiang Zeng,
Liehuang Zhu,
Haotian Chi,
Mohsen Guizani
Abstract:
The combination of smart home platforms and automation apps introduces much convenience to smart home users. However, this also brings the potential for privacy leakage. If a smart home platform is permitted to collect all the events of a user day and night, then the platform will learn the behavior patterns of this user before long. In this paper, we investigate how IFTTT, one of the most popular…
▽ More
The combination of smart home platforms and automation apps introduces much convenience to smart home users. However, this also brings the potential for privacy leakage. If a smart home platform is permitted to collect all the events of a user day and night, then the platform will learn the behavior patterns of this user before long. In this paper, we investigate how IFTTT, one of the most popular smart home platforms, has the capability of monitoring the daily life of a user in a variety of ways that are hardly noticeable. Moreover, we propose multiple ideas for mitigating privacy leakages, which altogether forms a Filter-and-Fuzz (F&F) process: first, it filters out events unneeded by the IFTTT platform; then, it fuzzes the values and frequencies of the remaining events. We evaluate the F&F process, and the results show that the proposed solution makes IFTTT unable to recognize any of the user's behavior patterns.
△ Less
Submitted 14 February, 2019; v1 submitted 8 February, 2019;
originally announced February 2019.
-
Achieving Data Utility-Privacy Tradeoff in Internet of Medical Things: A Machine Learning Approach
Authors:
Zhitao Guan,
Zefang Lv,
Xiaojiang Du,
Longfei Wu,
Mohsen Guizani
Abstract:
The emergence and rapid development of the Internet of Medical Things (IoMT), an application of the Internet of Things into the medical and healthcare systems, have brought many changes and challenges to modern medical and healthcare systems. Particularly, machine learning technology can be used to process the data involved in IoMT for medical analysis and disease diagnosis. However, in this proce…
▽ More
The emergence and rapid development of the Internet of Medical Things (IoMT), an application of the Internet of Things into the medical and healthcare systems, have brought many changes and challenges to modern medical and healthcare systems. Particularly, machine learning technology can be used to process the data involved in IoMT for medical analysis and disease diagnosis. However, in this process, the disclosure of personal privacy information must receive considerable attentions especially for sensitive medical data. Cluster analysis is an important technique for medical analysis and disease diagnosis. To enable privacy-preserving cluster analysis in IoMT, this paper proposed an Efficient Differentially Private Data Clustering scheme (EDPDCS) based on MapReduce framework. In EDPDCS, we optimize the allocation of privacy budgets and the selection of initial centroids to improve the accuracy of differentially private K-means clustering algorithm. Specifically, the number of iterations of the K-means algorithm is set to a fixed value according to the total privacy budget and the minimal privacy budget of each iteration. In addition, an improved initial centroids selection method is proposed to increase the accuracy and efficiency of the clustering algorithm. Finally, we prove that the proposed EDPDCS can improve the accuracy of the differentially private k-means algorithm by comparing the Normalized Intra-Cluster Variance (NICV) produced by our algorithm on two datasets with two other algorithms.
△ Less
Submitted 7 February, 2019;
originally announced February 2019.
-
Partial Relay Selection For Hybrid RF/FSO Systems with Hardware Impairments
Authors:
Elyes Balti,
Mohsen Guizani,
Bechir Hamdaoui,
Yassine Maalej
Abstract:
In this paper, we investigate the performance analysis of dual hop relaying system consisting of asymmetric Radio Frequency (RF)/Free Optical Space (FSO) links. The RF channels follow a Rayleigh distribution and the optical links are subject to Gamma-Gamma fading. We also introduce impairments to our model and we suggest Partial Relay Selection (PRS) protocol with Amplify-and-Forward (AF) fixed ga…
▽ More
In this paper, we investigate the performance analysis of dual hop relaying system consisting of asymmetric Radio Frequency (RF)/Free Optical Space (FSO) links. The RF channels follow a Rayleigh distribution and the optical links are subject to Gamma-Gamma fading. We also introduce impairments to our model and we suggest Partial Relay Selection (PRS) protocol with Amplify-and-Forward (AF) fixed gain relaying. The benefits of employing optical communication with RF, is to increase the system transfer rate and thus improving the system bandwidth. Many previous research attempts assuming ideal hardware (source, relays, etc.) without impairments. In fact, this assumption is still valid for low-rate systems. However, these hardware impairments can no longer be neglected for high-rate systems in order to get consistent results. Novel analytical expressions of outage probability and ergodic capacity of our model are derived taking into account ideal and non-ideal hardware cases. Furthermore, we study the dependence of the outage probability and the system capacity considering, the effect of the correlation between the outdated CSI (Channel State Information) and the current source-relay link, the number of relays, the rank of the selected relay and the average optical Signal to Noise Ratio (SNR) over weak and strong atmospheric turbulence. We also demonstrate that for a non-ideal case, the end-to-end Signal to Noise plus Distortion Ratio (SNDR) has a certain ceiling for high SNR range. However, the SNDR grows infinitely for the ideal case and the ceiling caused by impairments no longer exists. Finally, numerical and simulation results are presented.
△ Less
Submitted 15 January, 2019;
originally announced January 2019.
-
Toward Intelligent Network Optimization in Wireless Networking: An Auto-learning Framework
Authors:
Wenyu Zhang,
Zhenjiang Zhang,
Han-Chieh Chao,
Mohsen Guizani
Abstract:
In wireless communication systems (WCSs), the network optimization problems (NOPs) play an important role in maximizing system performances by setting appropriate network configurations. When dealing with NOPs by using conventional optimization methodologies, there exist the following three problems: human intervention, model invalid, and high computation complexity. As such, in this article we pr…
▽ More
In wireless communication systems (WCSs), the network optimization problems (NOPs) play an important role in maximizing system performances by setting appropriate network configurations. When dealing with NOPs by using conventional optimization methodologies, there exist the following three problems: human intervention, model invalid, and high computation complexity. As such, in this article we propose an auto-learning framework (ALF) to achieve intelligent and automatic network optimization by using machine learning (ML) techniques. We review the basic concepts of ML techniques, and propose their rudimentary employment models in WCSs, including automatic model construction, experience replay, efficient trial-and-error, RL-driven gaming, complexity reduction, and solution recommendation. We hope these proposals can provide new insights and motivations in future researches for dealing with NOPs in WCSs by using ML techniques.
△ Less
Submitted 19 December, 2018;
originally announced December 2018.
-
Proactive Video Chunks Caching and Processing for Latency and Cost Minimization in Edge Networks
Authors:
Emna Baccour,
Aiman Erbad,
Amr Mohamed,
Kashif Bilal,
Mohsen Guizani
Abstract:
Recently, the growing demand for rich multimedia content such as Video on Demand (VoD) has made the data transmission from content delivery networks (CDN) to end-users quite challenging. Edge networks have been proposed as an extension to CDN networks to alleviate this excessive data transfer through caching and to delegate the computation tasks to edge servers. To maximize the caching efficiency…
▽ More
Recently, the growing demand for rich multimedia content such as Video on Demand (VoD) has made the data transmission from content delivery networks (CDN) to end-users quite challenging. Edge networks have been proposed as an extension to CDN networks to alleviate this excessive data transfer through caching and to delegate the computation tasks to edge servers. To maximize the caching efficiency in the edge networks, different Mobile Edge Computing (MEC) servers assist each others to effectively select which content to store and the appropriate computation tasks to process. In this paper, we adopt a collaborative caching and transcoding model for VoD in MEC networks. However, unlike other models in the literature, different chunks of the same video are not fetched and cached in the same MEC server. Instead, neighboring servers will collaborate to store and transcode different video chunks and consequently optimize the limited resources usage. Since we are dealing with chunks caching and processing, we propose to maximize the edge efficiency by studying the viewers watching pattern and designing a probabilistic model where chunks popularities are evaluated. Based on this model, popularity-aware policies, namely Proactive caching policy (PcP) and Cache replacement Policy (CrP), are introduced to cache only highest probably requested chunks. In addition to PcP and CrP, an online algorithm (PCCP) is proposed to schedule the collaborative caching and processing. The evaluation results prove that our model and policies give better performance than approaches using conventional replacement policies. This improvement reaches up to 50% in some cases.
△ Less
Submitted 16 December, 2018;
originally announced December 2018.
-
Secure Data Access for Wireless Body Sensor Networks
Authors:
Zhitao Guan,
Tingting Yang,
Xiaojiang Du,
Mohsen Guizani
Abstract:
Recently, with the support of mobile cloud computing, a large number of health related data collected from various body sensor networks can be managed efficiently. However, to ensure data security and data privacy in cloud-integrated body sensor networks is an important and challenging issue. In this paper, we present a novel secure access control mechanism Mask Certificate Attribute Based Encrypt…
▽ More
Recently, with the support of mobile cloud computing, a large number of health related data collected from various body sensor networks can be managed efficiently. However, to ensure data security and data privacy in cloud-integrated body sensor networks is an important and challenging issue. In this paper, we present a novel secure access control mechanism Mask Certificate Attribute Based Encryption for cloud integrated body sensor networks. A specific signature is designed to mask the plaintext, then the masked data can be securely outsourced to cloud severs. An authorization certificate composing of the signature and related privilege items is constructed that is used to grant privileges to data receivers. To ensure security, a unique value is chosen to mask the certificate for each data receiver. The analysis shows that the proposed scheme has less computational cost and storage cost compared with other popular models.
△ Less
Submitted 25 October, 2018;
originally announced November 2018.
-
Mutual Heterogeneous Signcryption Schemes for 5G Network Slicings
Authors:
**gwei Liu,
Lihuan Zhang,
Rong Sun,
Xiaojiang Du,
Mohsen Guizani
Abstract:
With the emerging of mobile communication technologies, we are entering the fifth generation mobile communication system (5G) era. Various application scenarios will arise in the 5G era to meet the different service requirements. Different 5G network slicings may deploy different public key cryptosystems. The security issues among the heterogeneous systems should be considered. In order to ensure…
▽ More
With the emerging of mobile communication technologies, we are entering the fifth generation mobile communication system (5G) era. Various application scenarios will arise in the 5G era to meet the different service requirements. Different 5G network slicings may deploy different public key cryptosystems. The security issues among the heterogeneous systems should be considered. In order to ensure the secure communications between 5G network slicings, in different public cryptosystems, we propose two heterogeneous signcryption schemes which can achieve mutual communications between the Public Key Infrastructure (PKI) and the CertificateLess public key Cryptography (CLC) environment. We prove that our schemes have the INDistinguishability against Adaptive Chosen Ciphertext Attack (IND-CCA2) under the Computational Diffie-Hellman Problem (CDHP) and the Existential UnForgeability against adaptive Chosen Message Attack (EUF-CMA) under the Discrete Logarithm Problem (DLP) in the random oracle model. We also set up two heterogeneous cryptosystems on Raspberry Pi to simulate the interprocess communication between different public key environments. Furthermore, we quantify and analyze the performance of each scheme. Compared with the existing schemes, our schemes have greater efficiency and security.
△ Less
Submitted 8 November, 2018;
originally announced November 2018.
-
MDBV: Monitoring Data Batch Verification for Survivability of Internet of Vehicles
Authors:
**gwei Liu,
Qingqing Li,
Huijuan Cao,
Rong Sun,
Xiaojiang Du,
Mohsen Guizani
Abstract:
Along with the development of vehicular sensors and wireless communication technology, Internet of Vehicles (IoV) is emerging that can improve traffic efficiency and provide a comfortable driving environment. However, there is still a challenge how to ensure the survivability of IoV. Fortunately, this goal can be achieved by quickly verifying real-time monitoring data to avoid network failure. Agg…
▽ More
Along with the development of vehicular sensors and wireless communication technology, Internet of Vehicles (IoV) is emerging that can improve traffic efficiency and provide a comfortable driving environment. However, there is still a challenge how to ensure the survivability of IoV. Fortunately, this goal can be achieved by quickly verifying real-time monitoring data to avoid network failure. Aggregate signature is an efficient approach to realize quick data verification quickly. In this paper, we propose a monitoring data batch verification scheme based on an improved certificateless aggregate signature for IoV, named MDBV. The size of aggregated verification message is remain roughly constant even as the increasing number of vehicles in MDBV. Additionally, MDBV is proved to be secure in the random oracle model assuming the intractability of the computational Diffie-Hellman problem. In consideration of the network survivability and performance, the proposed MDBV can decrease the computation overhead and is more suitable for IoV.
△ Less
Submitted 8 November, 2018;
originally announced November 2018.
-
A Traceable Concurrent Data Anonymous Transmission Scheme for Heterogeneous VANETs
Authors:
**gwei Liu,
Qin Hu,
Chaoya Li,
Rong Sun,
Xiaojiang Du,
Mohsen Guizani
Abstract:
Vehicular Ad Hoc Networks (VANETs) are attractive scenarios that can improve the traffic situation and provide convenient services for drivers and passengers via vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication. However, there are still many security challenges in the traffic information transmission, especially in the intense traffic case. For ensuring the privacy of use…
▽ More
Vehicular Ad Hoc Networks (VANETs) are attractive scenarios that can improve the traffic situation and provide convenient services for drivers and passengers via vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication. However, there are still many security challenges in the traffic information transmission, especially in the intense traffic case. For ensuring the privacy of users and traceability of vehicles, we propose a traceable concurrent data anonymous transmission scheme for heterogeneous VANETs. The scheme is based on certificateless aggregate signcryption, so it supports batch verification. Moreover, conditional anonymity is also achieved due to the involving of the pseudo-ID technique. Furthermore, it is a pairing-free scheme for the merit of multi-trapdoor hash functions. As a result, the total computation overhead is greatly reduced.
△ Less
Submitted 7 November, 2018;
originally announced November 2018.
-
vFAC: Fine-Grained Access Control with Versatility for Cloud Storage
Authors:
**gwei Liu,
Huifang Tang,
Chaoya Li,
Rong Sun,
Xiaojiang Du,
Mohsen Guizani
Abstract:
In recent years, cloud storage technology has been widely used in many fields such as education, business, medical and more because of its convenience and low cost. With the widespread applications of cloud storage technology, data access control methods become more and more important in cloud-based network. The ciphertext policy attribute-based encryption (CP-ABE) scheme is very suitable for acce…
▽ More
In recent years, cloud storage technology has been widely used in many fields such as education, business, medical and more because of its convenience and low cost. With the widespread applications of cloud storage technology, data access control methods become more and more important in cloud-based network. The ciphertext policy attribute-based encryption (CP-ABE) scheme is very suitable for access control of data in cloud storage. However, in many practical scenarios, all attributes of a user cannot be managed by one authority, so many multi-authority CP-ABE schemes have emerged. Moreover, cloud servers are usually semi-trusted, which may leak user information. Aiming at the above problems, we propose a fine-grained access control scheme with versatility for cloud storage based on multi-authority CP-ABE, named vFAC. The proposed vFAC has the features of large universe, no key escrow problem, online/offline mechanism, hidden policy, verifiability and user revocation. Finally, we demonstrate vFAC is static security under the random oracle model. Through the comparison of several existing schemes in terms of features, computational overhead and storage cost, we can draw a conclusion that vFAC is more comprehensive and scalable.
△ Less
Submitted 7 November, 2018;
originally announced November 2018.
-
An Efficient Anonymous Authentication Scheme for Internet of Vehicles
Authors:
**gwei Liu,
Qingqing Li,
Rong Sun,
Xiaojiang Du,
Mohsen Guizani
Abstract:
Internet of Vehicles (IoV) is an intelligent application of IoT in smart transportation, which can make intelligent decisions for passengers. It has drawn extensive attention to improve traffic safety and efficiency and create a more comfortable driving and riding environment. Vehicular cloud computing is a variant of mobile cloud computing, which can process local information quickly. The coopera…
▽ More
Internet of Vehicles (IoV) is an intelligent application of IoT in smart transportation, which can make intelligent decisions for passengers. It has drawn extensive attention to improve traffic safety and efficiency and create a more comfortable driving and riding environment. Vehicular cloud computing is a variant of mobile cloud computing, which can process local information quickly. The cooperation of the Internet and vehicular cloud can make the communication more efficient in IoV. In this paper, we mainly focus on the secure communication between vehicles and roadside units. We first propose a new certificateless short signature scheme (CLSS) and prove the unforgeability of it in random oracle model. Then, by combining CLSS and a regional management strategy we design an efficient anonymous mutual quick authentication scheme for IoV. Additionally, the quantitative performance analysis shows that the proposed scheme achieves higher efficiency in terms of interaction between vehicles and roadside units compared with other existing schemes.
△ Less
Submitted 7 November, 2018;
originally announced November 2018.
-
BPDS: A Blockchain based Privacy-Preserving Data Sharing for Electronic Medical Records
Authors:
**gwei Liu,
Xiaolu Li,
Lin Ye,
Hongli Zhang,
Xiaojiang Du,
Mohsen Guizani
Abstract:
Electronic medical record (EMR) is a crucial form of healthcare data, currently drawing a lot of attention. Sharing health data is considered to be a critical approach to improve the quality of healthcare service and reduce medical costs. However, EMRs are fragmented across decentralized hospitals, which hinders data sharing and puts patients' privacy at risks. To address these issues, we propose…
▽ More
Electronic medical record (EMR) is a crucial form of healthcare data, currently drawing a lot of attention. Sharing health data is considered to be a critical approach to improve the quality of healthcare service and reduce medical costs. However, EMRs are fragmented across decentralized hospitals, which hinders data sharing and puts patients' privacy at risks. To address these issues, we propose a blockchain based privacy-preserving data sharing for EMRs, called BPDS. In BPDS, the original EMRs are stored securely in the cloud and the indexes are reserved in a tamper-proof consortium blockchain. By this means, the risk of the medical data leakage could be greatly reduced, and at the same time, the indexes in blockchain ensure that the EMRs can not be modified arbitrarily. Secure data sharing can be accomplished automatically according to the predefined access permissions of patients through the smart contracts of blockchain. Besides, the joint-design of the CP-ABE-based access control mechanism and the content extraction signature scheme provides strong privacy preservation in data sharing. Security analysis shows that BPDS is a secure and effective way to realize data sharing for EMRs.
△ Less
Submitted 7 November, 2018;
originally announced November 2018.
-
Attention-Mechanism-based Tracking Method for Intelligent Internet of Vehicles
Authors:
Xu Kang,
Bin Song,
Jie Guo,
Xiaojiang Du,
Mohsen Guizani
Abstract:
Vehicle tracking task plays an important role on the internet of vehicles and intelligent transportation system. Beyond the traditional GPS sensor, the image sensor can capture different kinds of vehicles, analyze their driving situation and can interact with them. Aiming at the problem that the traditional convolutional neural network is vulnerable to background interference, this paper proposes…
▽ More
Vehicle tracking task plays an important role on the internet of vehicles and intelligent transportation system. Beyond the traditional GPS sensor, the image sensor can capture different kinds of vehicles, analyze their driving situation and can interact with them. Aiming at the problem that the traditional convolutional neural network is vulnerable to background interference, this paper proposes vehicle tracking method based on human attention mechanism for self-selection of deep features with an inter-channel fully connected layer. It mainly includes the following contents: 1) A fully convolutional neural network fused attention mechanism with the selection of the deep features for convolution. 2) A separation method for template and semantic background region to separate target vehicles from the background in the initial frame adaptively. 3) A two-stage method for model training using our traffic dataset. The experimental results show that the proposed method improves the tracking accuracy without an increase in tracking time. Meanwhile, it strengthens the robustness of algorithm under the condition of the complex background region. The success rate of the proposed method in overall traffic datasets is higher than Siamese network by about 10 percent, and the overall precision is higher than Siamese network by 8 percent.
△ Less
Submitted 29 October, 2018;
originally announced November 2018.
-
Vehicle Tracking Using Surveillance with Multimodal Data Fusion
Authors:
Yue Zhang,
Bin Song,
Xiaojiang Du,
Mohsen Guizani
Abstract:
Vehicle location prediction or vehicle tracking is a significant topic within connected vehicles. This task, however, is difficult if only a single modal data is available, probably causing bias and impeding the accuracy. With the development of sensor networks in connected vehicles, multimodal data are becoming accessible. Therefore, we propose a framework for vehicle tracking with multimodal dat…
▽ More
Vehicle location prediction or vehicle tracking is a significant topic within connected vehicles. This task, however, is difficult if only a single modal data is available, probably causing bias and impeding the accuracy. With the development of sensor networks in connected vehicles, multimodal data are becoming accessible. Therefore, we propose a framework for vehicle tracking with multimodal data fusion. Specifically, we fuse the results of two modalities, images and velocity, in our vehicle-tracking task. Images, being processed in the module of vehicle detection, provide direct information about the features of vehicles, whereas velocity estimation can further evaluate the possible location of the target vehicles, which reduces the number of features being compared, and decreases the time consumption and computational cost. Vehicle detection is designed with a color-faster R-CNN, which takes both the shape and color of the vehicles into consideration. Meanwhile, velocity estimation is through the Kalman filter, which is a classical method for tracking. Finally, a multimodal data fusion method is applied to integrate these outcomes so that vehicle-tracking tasks can be achieved. Experimental results suggest the efficiency of our methods, which can track vehicles using a series of surveillance cameras in urban areas.
△ Less
Submitted 29 October, 2018;
originally announced November 2018.
-
LRCoin: Leakage-resilient Cryptocurrency Based on Bitcoin for Data Trading in IoT
Authors:
Yong Yu,
Yujie Ding,
Yanqi Zhao,
Yannan Li,
Xiaojiang Du,
Mohsen Guizani
Abstract:
Currently, the number of Internet of Thing (IoT) devices making up the IoT is more than 11 billion and this number has been continuously increasing. The prevalence of these devices leads to an emerging IoT business model called Device-as-a-service(DaaS), which enables sensor devices to collect data disseminated to all interested devices. The devices sharing data with other devices could receive so…
▽ More
Currently, the number of Internet of Thing (IoT) devices making up the IoT is more than 11 billion and this number has been continuously increasing. The prevalence of these devices leads to an emerging IoT business model called Device-as-a-service(DaaS), which enables sensor devices to collect data disseminated to all interested devices. The devices sharing data with other devices could receive some financial reward such as Bitcoin. However, side-channel attacks, which aim to exploit some information leaked from the IoT devices during data trade execution, are possible since most of the IoT devices are vulnerable to be hacked or compromised. Thus, it is challenging to securely realize data trading in IoT environment due to the information leakage such as leaking the private key for signing a Bitcoin transaction in Bitcoin system. In this paper, we propose LRCoin, a kind of leakage-resilient cryptocurrency based on bitcoin in which the signature algorithm used for authenticating bitcoin transactions is leakage-resilient. LRCoin is suitable for the scenarios where information leakage is inevitable such as IoT applications. Our core contribution is proposing an efficient bilinear-based continual-leakage-resilient ECDSA signature. We prove the proposed signature algorithm is unforgeable against adaptively chosen messages attack in the generic bilinear group model under the continual leakage setting. Both the theoretical analysis and the implementation demonstrate the practicability of the proposed scheme.
△ Less
Submitted 25 October, 2018;
originally announced October 2018.
-
Towards Delay-Tolerant Flexible Data Access Control for Smart Grid with Renewable Energy Resources
Authors:
Zhitao Guan,
**g Li,
Liehuang Zhu,
Zijian Zhang,
Xiaojiang Du,
Mohsen Guizani
Abstract:
In the Smart Grid with Renewable Energy Resources (RERs), the Residential Units (RUs) with Distributed Energy Resources (DERs) are considered to be both power consumers and suppliers. Specifically, RUs with excessive renewable generations can trade with the utility in deficit of power supplies for mutual benefits. It causes two challenging issues. First, the trading data of RUs is quite sensitive,…
▽ More
In the Smart Grid with Renewable Energy Resources (RERs), the Residential Units (RUs) with Distributed Energy Resources (DERs) are considered to be both power consumers and suppliers. Specifically, RUs with excessive renewable generations can trade with the utility in deficit of power supplies for mutual benefits. It causes two challenging issues. First, the trading data of RUs is quite sensitive, which should be only accessed by authorized users with fine-grained policies. Second, the behaviors of the RUs to generate trading data are spontaneous and unpredictable, then the problem is how to guarantee system efficiency and delay tolerance simultaneously. In this paper, we propose a delay-tolerant flexible data access control scheme based on Key Policy Attribute Based Encryption (KP-ABE) for Smart Grid with Renewable Energy Resources (RERs). We adopt the secret sharing scheme (SSS) to realize a flexible access control with encryption delay tolerance. Furthermore, there is no central trusted server to perform the encryption/decryption. We reduce the computation cost on RUs and operators via a semi-trusted model. The analysis shows that the proposed scheme can meet the data security requirement of the Smart Grid with RERs, and it also has less cost compared with other popular models.
△ Less
Submitted 25 October, 2018;
originally announced October 2018.
-
Design Challenges of Multi-UAV Systems in Cyber-Physical Applications: A Comprehensive Survey, and Future Directions
Authors:
Reza Shakeri,
Mohammed Ali Al-Garadi,
Ahmed Badawy,
Amr Mohamed,
Tamer Khattab,
Abdulla Al-Ali,
Khaled A. Harras,
Mohsen Guizani
Abstract:
Unmanned Aerial Vehicles (UAVs) have recently rapidly grown to facilitate a wide range of innovative applications that can fundamentally change the way cyber-physical systems (CPSs) are designed. CPSs are a modern generation of systems with synergic cooperation between computational and physical potentials that can interact with humans through several new mechanisms. The main advantages of using U…
▽ More
Unmanned Aerial Vehicles (UAVs) have recently rapidly grown to facilitate a wide range of innovative applications that can fundamentally change the way cyber-physical systems (CPSs) are designed. CPSs are a modern generation of systems with synergic cooperation between computational and physical potentials that can interact with humans through several new mechanisms. The main advantages of using UAVs in CPS application is their exceptional features, including their mobility, dynamism, effortless deployment, adaptive altitude, agility, adjustability, and effective appraisal of real-world functions anytime and anywhere. Furthermore, from the technology perspective, UAVs are predicted to be a vital element of the development of advanced CPSs. Therefore, in this survey, we aim to pinpoint the most fundamental and important design challenges of multi-UAV systems for CPS applications. We highlight key and versatile aspects that span the coverage and tracking of targets and infrastructure objects, energy-efficient navigation, and image analysis using machine learning for fine-grained CPS applications. Key prototypes and testbeds are also investigated to show how these practical technologies can facilitate CPS applications. We present and propose state-of-the-art algorithms to address design challenges with both quantitative and qualitative methods and map these challenges with important CPS applications to draw insightful conclusions on the challenges of each application. Finally, we summarize potential new directions and ideas that could shape future research in these areas.
△ Less
Submitted 23 October, 2018;
originally announced October 2018.
-
Semi-supervised Deep Reinforcement Learning in Support of IoT and Smart City Services
Authors:
Mehdi Mohammadi,
Ala Al-Fuqaha,
Mohsen Guizani,
Jun-Seok Oh
Abstract:
Smart services are an important element of the smart cities and the Internet of Things (IoT) ecosystems where the intelligence behind the services is obtained and improved through the sensory data. Providing a large amount of training data is not always feasible; therefore, we need to consider alternative ways that incorporate unlabeled data as well. In recent years, Deep reinforcement learning (D…
▽ More
Smart services are an important element of the smart cities and the Internet of Things (IoT) ecosystems where the intelligence behind the services is obtained and improved through the sensory data. Providing a large amount of training data is not always feasible; therefore, we need to consider alternative ways that incorporate unlabeled data as well. In recent years, Deep reinforcement learning (DRL) has gained great success in several application domains. It is an applicable method for IoT and smart city scenarios where auto-generated data can be partially labeled by users' feedback for training purposes. In this paper, we propose a semi-supervised deep reinforcement learning model that fits smart city applications as it consumes both labeled and unlabeled data to improve the performance and accuracy of the learning agent. The model utilizes Variational Autoencoders (VAE) as the inference engine for generalizing optimal policies. To the best of our knowledge, the proposed model is the first investigation that extends deep reinforcement learning to the semi-supervised paradigm. As a case study of smart city applications, we focus on smart buildings and apply the proposed model to the problem of indoor localization based on BLE signal strength. Indoor localization is the main component of smart city services since people spend significant time in indoor environments. Our model learns the best action policies that lead to a close estimation of the target locations with an improvement of 23% in terms of distance to the target and at least 67% more received rewards compared to the supervised DRL model.
△ Less
Submitted 9 October, 2018;
originally announced October 2018.
-
Privacy-Preserving DDoS Attack Detection Using Cross-Domain Traffic in Software Defined Networks
Authors:
Liehuang Zhu,
Xiangyun Tang,
Meng Shen,
Xiaojiang Du,
Mohsen Guizani
Abstract:
Existing distributed denial-of-service attack detection in software defined networks (SDNs) typically perform detection in a single domain. In reality, abnormal traffic usually affects multiple network domains. Thus, a cross-domain attack detection has been proposed to improve detection performance. However, when participating in detection, the domain of each SDN needs to provide a large amount of…
▽ More
Existing distributed denial-of-service attack detection in software defined networks (SDNs) typically perform detection in a single domain. In reality, abnormal traffic usually affects multiple network domains. Thus, a cross-domain attack detection has been proposed to improve detection performance. However, when participating in detection, the domain of each SDN needs to provide a large amount of real traffic data, from which private information may be leaked. Existing multiparty privacy protection schemes often achieve privacy guarantees by sacrificing accuracy or increasing the time cost. Achieving both high accuracy and reasonable time consumption is a challenging task. In this paper, we propose Predis, which is a privacypreserving cross-domain attack detection scheme for SDNs. Predis combines perturbation encryption and data encryption to protect privacy and employs a computationally simple and efficient algorithm k-Nearest Neighbors (kNN) as its detection algorithm. We also improve kNN to achieve better efficiency. Via theoretical analysis and extensive simulations, we demonstrate that Predis is capable of achieving efficient and accurate attack detection while securing sensitive information of each domain.
△ Less
Submitted 19 September, 2018;
originally announced September 2018.
-
A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security
Authors:
Mohammed Ali Al-Garadi,
Amr Mohamed,
Abdulla Al-Ali,
Xiaojiang Du,
Mohsen Guizani
Abstract:
The Internet of Things (IoT) integrates billions of smart devices that can communicate with one another with minimal human intervention. It is one of the fastest develo** fields in the history of computing, with an estimated 50 billion devices by the end of 2020. On the one hand, IoT play a crucial role in enhancing several real-life smart applications that can improve life quality. On the other…
▽ More
The Internet of Things (IoT) integrates billions of smart devices that can communicate with one another with minimal human intervention. It is one of the fastest develo** fields in the history of computing, with an estimated 50 billion devices by the end of 2020. On the one hand, IoT play a crucial role in enhancing several real-life smart applications that can improve life quality. On the other hand, the crosscutting nature of IoT systems and the multidisciplinary components involved in the deployment of such systems introduced new security challenges. Implementing security measures, such as encryption, authentication, access control, network security and application security, for IoT devices and their inherent vulnerabilities is ineffective. Therefore, existing security methods should be enhanced to secure the IoT system effectively. Machine learning and deep learning (ML/DL) have advanced considerably over the last few years, and machine intelligence has transitioned from laboratory curiosity to practical machinery in several important applications. Consequently, ML/DL methods are important in transforming the security of IoT systems from merely facilitating secure communication between devices to security-based intelligence systems. The goal of this work is to provide a comprehensive survey of ML /DL methods that can be used to develop enhanced security methods for IoT systems. IoT security threats that are related to inherent or newly introduced threats are presented, and various potential IoT system attack surfaces and the possible threats related to each surface are discussed. We then thoroughly review ML/DL methods for IoT security and present the opportunities, advantages and shortcomings of each method. We discuss the opportunities and challenges involved in applying ML/DL to IoT security. These opportunities and challenges can serve as potential future research directions.
△ Less
Submitted 29 July, 2018;
originally announced July 2018.
-
Exploiting wideband spectrum occupancy heterogeneity for weighted compressive spectrum sensing
Authors:
Bassem Khalfi,
Bechir Hamdaoui,
Mohsen Guizani,
Nizar Zorba
Abstract:
Compressive sampling has shown great potential for making wideband spectrum sensing possible at sub-Nyquist sampling rates. As a result, there have recently been research efforts that aimed to develop techniques that leverage compressive sampling to enable compressed wideband spectrum sensing. These techniques consider homogeneous wideband spectrum where all bands are assumed to have similar PU tr…
▽ More
Compressive sampling has shown great potential for making wideband spectrum sensing possible at sub-Nyquist sampling rates. As a result, there have recently been research efforts that aimed to develop techniques that leverage compressive sampling to enable compressed wideband spectrum sensing. These techniques consider homogeneous wideband spectrum where all bands are assumed to have similar PU traffic characteristics. In practice, however, wideband spectrum is not homogeneous, in that different spectrum bands could have different PU occupancy patterns. In fact, the nature of spectrum assignment, in which applications of similar types are often assigned bands within the same block, dictates that wideband spectrum is indeed heterogeneous, as different application types exhibit different behaviors. In this paper, we consider heterogeneous wideband spectrum, where we exploit this inherent, block-like structure of wideband spectrum to design efficient compressive spectrum sensing techniques that are well suited for heterogeneous wideband spectrum. We propose a weighted $\ell_1$-minimization sensing information recovery algorithm that achieves more stable recovery than that achieved by existing approaches while accounting for the variations of spectrum occupancy across both the time and frequency dimensions. Through intensive numerical simulations, we show that our approach achieves better performance when compared to the state-of-the-art approaches.
△ Less
Submitted 4 June, 2018;
originally announced June 2018.
-
Softwarization of Internet of Things Infrastructure for Secure and Smart Healthcare
Authors:
Mohammad A. Salahuddin,
Ala Al-Fuqaha,
Mohsen Guizani,
Khaled Shuaib,
Farag Sallabi
Abstract:
We propose an agile softwarized infrastructure for flexible, cost effective, secure and privacy preserving deployment of Internet of Things (IoT) for smart healthcare applications and services. It integrates state-of-the-art networking and virtualization techniques across IoT, fog and cloud domains, employing Blockchain, Tor and message brokers to provide security and privacy for patients and heal…
▽ More
We propose an agile softwarized infrastructure for flexible, cost effective, secure and privacy preserving deployment of Internet of Things (IoT) for smart healthcare applications and services. It integrates state-of-the-art networking and virtualization techniques across IoT, fog and cloud domains, employing Blockchain, Tor and message brokers to provide security and privacy for patients and healthcare providers. We propose a novel platform using Machine-to-Machine (M2M) messaging and rule-based beacons for seamless data management and discuss the role of data and decision fusion in the cloud and the fog, respectively, for smart healthcare applications and services.
△ Less
Submitted 28 May, 2018;
originally announced May 2018.
-
Reinforcement Learning for Resource Provisioning in Vehicular Cloud
Authors:
Mohammad A. Salahuddin,
Ala Al-Fuqaha,
Mohsen Guizani
Abstract:
This article presents a concise view of vehicular clouds that incorporates various vehicular cloud models, which have been proposed, to date. Essentially, they all extend the traditional cloud and its utility computing functionalities across the entities in the vehicular ad hoc network (VANET). These entities include fixed road-side units (RSUs), on-board units (OBUs) embedded in the vehicle and p…
▽ More
This article presents a concise view of vehicular clouds that incorporates various vehicular cloud models, which have been proposed, to date. Essentially, they all extend the traditional cloud and its utility computing functionalities across the entities in the vehicular ad hoc network (VANET). These entities include fixed road-side units (RSUs), on-board units (OBUs) embedded in the vehicle and personal smart devices of the driver and passengers. Cumulatively, these entities yield abundant processing, storage, sensing and communication resources. However, vehicular clouds require novel resource provisioning techniques, which can address the intrinsic challenges of (i) dynamic demands for the resources and (ii) stringent QoS requirements. In this article, we show the benefits of reinforcement learning based techniques for resource provisioning in the vehicular cloud. The learning techniques can perceive long term benefits and are ideal for minimizing the overhead of resource provisioning for vehicular clouds.
△ Less
Submitted 28 May, 2018;
originally announced May 2018.
-
Compressed Wideband Spectrum Sensing: Concept, Challenges and Enablers
Authors:
Bechir Hamdaoui,
Bassem Khalfi,
Mohsen Guizani
Abstract:
Spectrum sensing research has mostly been focusing on narrowband access, and not until recently have researchers started looking at wideband spectrum. Broadly speaking, wideband spectrum sensing approaches can be categorized into two classes: Nyquist-rate and sub-Nyquist-rate sampling approaches. Nyquist-rate approaches have major practical issues that question their suitability for realtime appli…
▽ More
Spectrum sensing research has mostly been focusing on narrowband access, and not until recently have researchers started looking at wideband spectrum. Broadly speaking, wideband spectrum sensing approaches can be categorized into two classes: Nyquist-rate and sub-Nyquist-rate sampling approaches. Nyquist-rate approaches have major practical issues that question their suitability for realtime applications; this is mainly because their high-rate sampling requirement calls for complex hardware and signal processing algorithms that incur significant delays. Sub-Nyquist-rate approaches, on the other hand, are more appealing due to their less stringent sampling-rate requirement. Although various concepts have been investigated to ensure sub-Nyquist rates, compressive sampling theory is definitely one concept that has attracted so much interest. This paper explains and illustrates how compressive sampling has been leveraged to improve wideband spectrum sensing by enabling spectrum occupancy recovery with sub-Nyquist sampling rates. The paper also introduces new ideas with great potential for further wideband spectrum sensing enhancements, and identifies key future research challenges and directions that remain to be investigated.
△ Less
Submitted 10 May, 2018;
originally announced May 2018.
-
Unmanned Aerial Vehicles: A Survey on Civil Applications and Key Research Challenges
Authors:
Hazim Shakhatreh,
Ahmad Sawalmeh,
Ala Al-Fuqaha,
Zuochao Dou,
Eyad Almaita,
Issa Khalil,
Noor Shamsiah Othman,
Abdallah Khreishah,
Mohsen Guizani
Abstract:
The use of unmanned aerial vehicles (UAVs) is growing rapidly across many civil application domains including real-time monitoring, providing wireless coverage, remote sensing, search and rescue, delivery of goods, security and surveillance, precision agriculture, and civil infrastructure inspection. Smart UAVs are the next big revolution in UAV technology promising to provide new opportunities in…
▽ More
The use of unmanned aerial vehicles (UAVs) is growing rapidly across many civil application domains including real-time monitoring, providing wireless coverage, remote sensing, search and rescue, delivery of goods, security and surveillance, precision agriculture, and civil infrastructure inspection. Smart UAVs are the next big revolution in UAV technology promising to provide new opportunities in different applications, especially in civil infrastructure in terms of reduced risks and lower cost. Civil infrastructure is expected to dominate the more that $45 Billion market value of UAV usage. In this survey, we present UAV civil applications and their challenges. We also discuss current research trends and provide future insights for potential UAV uses. Furthermore, we present the key challenges for UAV civil applications, including: charging challenges, collision avoidance and swarming challenges, and networking and security related challenges. Based on our review of the recent literature, we discuss open research challenges and draw high-level insights on how these challenges might be approached.
△ Less
Submitted 19 April, 2018;
originally announced May 2018.
-
Assured Data Deletion with Fine-grained Access Control for Fog-based Industrial Applications
Authors:
Yong Yu,
Liang Xue,
Yannan Li,
Xiaojiang Du,
Mohsen Guizani,
Bo Yang
Abstract:
The advances of cloud computing, fog computing and Internet of Things (IoT) make the industries more prosperous than ever. A wide range of industrial systems such as transportation systems and manufacturing systems have been developed by integrating cloud computing, fog computing and IoT successfully. Security and privacy issues are a major concern that hinders the wide adoptions of these novel te…
▽ More
The advances of cloud computing, fog computing and Internet of Things (IoT) make the industries more prosperous than ever. A wide range of industrial systems such as transportation systems and manufacturing systems have been developed by integrating cloud computing, fog computing and IoT successfully. Security and privacy issues are a major concern that hinders the wide adoptions of these novel techniques. In this paper, we focus on assured data deletion, an issue which is important but received less attention in academia and industry. We firstly propose a framework to integrate the cloud, the fog and the things together to manage the stored data from industries or individuals. We then focus on secure data deletion in this framework by proposing an assured data deletion scheme which fulfills fine-grained access control over sensitive data and verifiable data deletion. Only the data owners and the fog devices are involved when deleting a data key and validating the data deletion, which makes the protocol practical due to the features of low latency and real-time interaction of fog computing. The proposed protocol takes advantage of attribute-based encryption and is provably secure under the standard model. The theoretical analysis shows the good performance and functionality requirements while the implementation results demonstrate the feasibility of our proposal.
△ Less
Submitted 9 April, 2018;
originally announced April 2018.
-
Bus Trajectory-Based Street-Centric Routing for Message Delivery in Urban Vehicular Ad hoc Networks
Authors:
Gang Sun,
Yi**g Zhang,
Dan Liao,
Hongfang Yu,
Xiaojiang Du,
Mohsen Guizani
Abstract:
This paper focuses on the routing algorithm for the communications between vehicles and places in urban VANET. As one of the basic transportation facilities in an urban setting, buses periodically run along their fixed routes and widely cover city streets. The trajectory of bus lines can be seen as a sub map of a city. Based on the characters of bus networks, we propose a bus trajectory-based stre…
▽ More
This paper focuses on the routing algorithm for the communications between vehicles and places in urban VANET. As one of the basic transportation facilities in an urban setting, buses periodically run along their fixed routes and widely cover city streets. The trajectory of bus lines can be seen as a sub map of a city. Based on the characters of bus networks, we propose a bus trajectory-based street-centric routing algorithm (BTSC), which uses bus as main relay to deliver message. In BTSC, we build a routing graph based on the trajectories of bus lines by analyzing the probability of bus appearing on every street. We propose two novel concepts, i.e. the probability of street consistency (PSC) and the probability of path consistency (PPC) which is used as metrics to determine routing paths for message delivery. This aims to choose the best path with higher density of busses and lower probability of transmission direction deviating from the routing path. In order to improve the bus forwarding opportunity, we design a bus-based forwarding strategy with ant colony optimization (FACO) to find a reliable and steady multi-hop link between two relay buses in order to decrease end-to-end delay. BTSC makes the improvements in the selection of routing path and the strategy of message forwarding. Simulation results show that our proposed routing algorithm has a better performance in transmission ratio, transmission delay and adaptability to different networks.
△ Less
Submitted 6 April, 2018;
originally announced April 2018.
-
A Performance Analysis Model of TCP over Multiple Heterogeneous Paths for 5G Mobile Services
Authors:
Jiayang Song,
** Dong,
Huachun Zhou,
Tao Zheng,
Xiaojiang Du,
Mohsen Guizani
Abstract:
Driven by the primary requirement of emerging 5G mobile services, the demand for concurrent multipath transfer (CMT) is still prominent. Yet, multipath transport protocols are not widely adopted and TCP-based CMT schemes will still be in dominant position in 5G. However, the performance of TCP flow transferred over multiple heterogeneous paths is prone to the link quality asymmetry, the extent of…
▽ More
Driven by the primary requirement of emerging 5G mobile services, the demand for concurrent multipath transfer (CMT) is still prominent. Yet, multipath transport protocols are not widely adopted and TCP-based CMT schemes will still be in dominant position in 5G. However, the performance of TCP flow transferred over multiple heterogeneous paths is prone to the link quality asymmetry, the extent of which was revealed to be significant by our field investigation. In this paper, we present a performance analysis model for TCP over multiple heterogeneous paths in 5G scenarios, where both bandwidth and delay asymmetry are taken into consideration. The evaluation adopting parameters from field investigation shows that the proposed model can achieve high accuracy in practical environments. Some interesting inferences can be drawn from the proposed model, such as the dominant factor that affect the performance of TCP over heterogeneous networks, and the criteria of determining the appropriate number of links to be used under different circumstances of path heterogeneity. Thus, the proposed model can provide a guidance to the design of TCP-based CMT solutions for 5G mobile services.
△ Less
Submitted 6 April, 2018;
originally announced April 2018.
-
PRIF: A Privacy-Preserving Interest-Based Forwarding Scheme for Social Internet of Vehicles
Authors:
Liehuang Zhu,
Chuan Zhang,
Chang Xu,
Xiaojiang Du,
Rixin Xu,
Kashif Sharif,
Mohsen Guizani
Abstract:
Recent advances in Socially Aware Networks (SANs) have allowed its use in many domains, out of which social Internet of vehicles (SIOV) is of prime importance. SANs can provide a promising routing and forwarding paradigm for SIOV by using interest-based communication. Though able to improve the forwarding performance, existing interest-based schemes fail to consider the important issue of protecti…
▽ More
Recent advances in Socially Aware Networks (SANs) have allowed its use in many domains, out of which social Internet of vehicles (SIOV) is of prime importance. SANs can provide a promising routing and forwarding paradigm for SIOV by using interest-based communication. Though able to improve the forwarding performance, existing interest-based schemes fail to consider the important issue of protecting users' interest information. In this paper, we propose a PRivacy-preserving Interest-based Forwarding scheme (PRIF) for SIOV, which not only protects the interest information, but also improves the forwarding performance. We propose a privacy-preserving authentication protocol to recognize communities among mobile nodes. During data routing and forwarding, a node can know others' interests only if they are affiliated with the same community. Moreover, to improve forwarding performance, a new metric {\em community energy} is introduced to indicate vehicular social proximity. Community energy is generated when two nodes encounter one another and information is shared among them. PRIF considers this energy metric to select forwarders towards the destination node or the destination community. Security analysis indicates PRIF can protect nodes' interest information. In addition, extensive simulations have been conducted to demonstrate that PRIF outperforms the existing algorithms including the BEEINFO, Epidemic, and PRoPHET.
△ Less
Submitted 6 April, 2018;
originally announced April 2018.
-
PPLS: A Privacy-Preserving Location-Sharing Scheme in Vehicular Social Networks
Authors:
Chang Xu,
Xuan Xie,
Liehuang Zhu,
Kashif Sharif,
Chuan Zhang,
Xiaojiang Du,
Mohsen Guizani
Abstract:
Recent advances in Socially Aware Networks (SANs) have allowed its use in many domains, out of which social Internet of vehicles (SIOV) is of prime importance. SANs can provide a promising routing and forwarding paradigm for SIOV by using interest-based communication. Though able to improve the forwarding performance, existing interest-based schemes fail to consider the important issue of protecti…
▽ More
Recent advances in Socially Aware Networks (SANs) have allowed its use in many domains, out of which social Internet of vehicles (SIOV) is of prime importance. SANs can provide a promising routing and forwarding paradigm for SIOV by using interest-based communication. Though able to improve the forwarding performance, existing interest-based schemes fail to consider the important issue of protecting users' interest information. In this paper, we propose a PRivacy-preserving Interest-based Forwarding scheme (PRIF) for SIOV, which not only protects the interest information, but also improves the forwarding performance. We propose a privacy-preserving authentication protocol to recognize communities among mobile nodes. During data routing and forwarding, a node can know others' interests only if they are affiliated with the same community. Moreover, to improve forwarding performance, a new metric {\em community energy} is introduced to indicate vehicular social proximity. Community energy is generated when two nodes encounter one another and information is shared among them. PRIF considers this energy metric to select forwarders towards the destination node or the destination community. Security analysis indicates PRIF can protect nodes' interest information. In addition, extensive simulations have been conducted to demonstrate that PRIF outperforms the existing algorithms including the BEEINFO, Epidemic, and PRoPHET.
△ Less
Submitted 6 April, 2018;
originally announced April 2018.
-
Reinforcement Learning based QoS/QoE-aware Service Function Chaining in Software-Driven 5G Slices
Authors:
Xi Chen,
Zonghang Li,
Yupeng Zhang,
Ruiming Long,
Hongfang Yu,
Xiaojiang Du,
Mohsen Guizani
Abstract:
With the ever growing diversity of devices and applications that will be connected to 5G networks, flexible and agile service orchestration with acknowledged QoE that satisfies end-user's functional and QoS requirements is necessary. SDN (Software-Defined Networking) and NFV (Network Function Virtualization) are considered key enabling technologies for 5G core networks. In this regard, this paper…
▽ More
With the ever growing diversity of devices and applications that will be connected to 5G networks, flexible and agile service orchestration with acknowledged QoE that satisfies end-user's functional and QoS requirements is necessary. SDN (Software-Defined Networking) and NFV (Network Function Virtualization) are considered key enabling technologies for 5G core networks. In this regard, this paper proposes a reinforcement learning based QoS/QoE-aware Service Function Chaining (SFC) in SDN/NFV-enabled 5G slices. First, it implements a lightweight QoS information collector based on LLDP, which works in a piggyback fashion on the southbound interface of the SDN controller, to enable QoS-awareness. Then, a DQN (Deep Q Network) based agent framework is designed to support SFC in the context of NFV. The agent takes into account the QoE and QoS as key aspects to formulate the reward so that it is expected to maximize QoE while respecting QoS constraints. The experiment results show that this framework exhibits good performance in QoE provisioning and QoS requirements maintenance for SFC in dynamic network environments.
△ Less
Submitted 5 April, 2018;
originally announced April 2018.
-
LPTD: Achieving Lightweight and Privacy-Preserving Truth Discovery in CIoT
Authors:
Chuan Zhang,
Liehuang Zhu,
Chang Xu,
Kashif Sharif,
Xiaojiang Du,
Mohsen Guizani
Abstract:
In recent years, cognitive Internet of Things (CIoT) has received considerable attention because it can extract valuable information from various Internet of Things (IoT) devices. In CIoT, truth discovery plays an important role in identifying truthful values from large scale data to help CIoT provide deeper insights and value from collected information. However, the privacy concerns of IoT device…
▽ More
In recent years, cognitive Internet of Things (CIoT) has received considerable attention because it can extract valuable information from various Internet of Things (IoT) devices. In CIoT, truth discovery plays an important role in identifying truthful values from large scale data to help CIoT provide deeper insights and value from collected information. However, the privacy concerns of IoT devices pose a major challenge in designing truth discovery approaches. Although existing schemes of truth discovery can be executed with strong privacy guarantees, they are not efficient or cannot be applied in real-life CIoT applications. This article proposes a novel framework for lightweight and privacy-preserving truth discovery called LPTD-I, which is implemented by incorporating fog and cloud platforms, and adopting the homomorphic Paillier encryption and one-way hash chain techniques. This scheme not only protects devices' privacy, but also achieves high efficiency. Moreover, we introduce a fault tolerant (LPTD-II) framework which can effectively overcome malfunctioning CIoT devices. Detailed security analysis indicates the proposed schemes are secure under a comprehensively designed threat model. Experimental simulations are also carried out to demonstrate the efficiency of the proposed schemes.
△ Less
Submitted 5 April, 2018;
originally announced April 2018.
-
FPAN: Fine-grained and Progressive Attention Localization Network for Data Retrieval
Authors:
Sijia Chen,
Bin Song,
Jie Guo,
Xiaojiang Du,
Mohsen Guizani
Abstract:
The Localization of the target object for data retrieval is a key issue in the Intelligent and Connected Transportation Systems (ICTS). However, due to lack of intelligence in the traditional transportation system, it can take tremendous resources to manually retrieve and locate the queried objects among a large number of images. In order to solve this issue, we propose an effective method to quer…
▽ More
The Localization of the target object for data retrieval is a key issue in the Intelligent and Connected Transportation Systems (ICTS). However, due to lack of intelligence in the traditional transportation system, it can take tremendous resources to manually retrieve and locate the queried objects among a large number of images. In order to solve this issue, we propose an effective method to query-based object localization that uses artificial intelligence techniques to automatically locate the queried object in the complex background. The presented method is termed as Fine-grained and Progressive Attention Localization Network (FPAN), which uses an image and a queried object as input to accurately locate the target object in the image. Specifically, the fine-grained attention module is naturally embedded into each layer of the convolution neural network (CNN), thereby gradually suppressing the regions that are irrelevant to the queried object and eventually shrinking attention to the target area. We further employ top-down attentions fusion algorithm operated by a learnable cascade up-sampling structure to establish the connection between the attention map and the exact location of the queried object in the original image. Furthermore, the FPAN is trained by multi-task learning with box segmentation loss and cosine loss. At last, we conduct comprehensive experiments on both queried-based digit localization and object tracking with synthetic and benchmark datasets, respectively. The experimental results show that our algorithm is far superior to other algorithms in the synthesis datasets and outperforms most existing trackers on the OTB and VOT datasets.
△ Less
Submitted 5 April, 2018;
originally announced April 2018.
-
A Computation Offloading Incentive Mechanism with Delay and Cost Constraints under 5G Satellite-ground IoV architecture
Authors:
Minghui LiWang,
Shijie Dai,
Zhibin Gao,
Xiaojiang Du,
Mohsen Guizani,
Huaiyu Dai
Abstract:
The 5G Internet of Vehicles has become a new paradigm alongside the growing popularity and variety of computation-intensive applications with high requirements for computational resources and analysis capabilities. Existing network architectures and resource management mechanisms may not sufficiently guarantee satisfactory Quality of Experience and network efficiency, mainly suffering from coverag…
▽ More
The 5G Internet of Vehicles has become a new paradigm alongside the growing popularity and variety of computation-intensive applications with high requirements for computational resources and analysis capabilities. Existing network architectures and resource management mechanisms may not sufficiently guarantee satisfactory Quality of Experience and network efficiency, mainly suffering from coverage limitation of Road Side Units, insufficient resources, and unsatisfactory computational capabilities of onboard equipment, frequently changing network topology, and ineffective resource management schemes. To meet the demands of such applications, in this article, we first propose a novel architecture by integrating the satellite network with 5G cloud-enabled Internet of Vehicles to efficiently support seamless coverage and global resource management. A incentive mechanism based joint optimization problem of opportunistic computation offloading under delay and cost constraints is established under the aforementioned framework, in which a vehicular user can either significantly reduce the application completion time by offloading workloads to several nearby vehicles through opportunistic vehicle-to-vehicle channels while effectively controlling the cost or protect its own profit by providing compensated computing service. As the optimization problem is non-convex and NP-hard, simulated annealing based on the Markov Chain Monte Carlo as well as the metropolis algorithm is applied to solve the optimization problem, which can efficaciously obtain both high-quality and cost-effective approximations of global optimal solutions. The effectiveness of the proposed mechanism is corroborated through simulation results.
△ Less
Submitted 5 April, 2018;
originally announced April 2018.
-
A Large-scale Concurrent Data Anonymous Batch Verification Scheme for Mobile Healthcare Crowd Sensing
Authors:
**gwei Liu,
Huijuan Cao,
Qingqing Li,
Fanghui Cai,
Xiaojiang Du,
Mohsen Guizani
Abstract:
Recently, with the rapid development of big data, Internet of Things (IoT) brings more and more intelligent and convenient services to people's daily lives. Mobile healthcare crowd sensing (MHCS), as a typical application of IoT, is becoming an effective approach to provide various medical and healthcare services to individual or organizations. However, MHCS still have to face to different securit…
▽ More
Recently, with the rapid development of big data, Internet of Things (IoT) brings more and more intelligent and convenient services to people's daily lives. Mobile healthcare crowd sensing (MHCS), as a typical application of IoT, is becoming an effective approach to provide various medical and healthcare services to individual or organizations. However, MHCS still have to face to different security challenges in practice. For example, how to quickly and effectively authenticate masses of bio-information uploaded by IoT terminals without revealing the owners' sensitive information. Therefore, we propose a large-scale concurrent data anonymous batch verification scheme for MHCS based on an improved certificateless aggregate signature. The proposed scheme can authenticate all sensing bio-information at once in a privacy preserving way. The individual data generated by different users can be verified in batch, while the actual identity of participants is hidden. Moreover, assuming the intractability of CDHP, our scheme is proved to be secure. Finally, the performance evaluation shows that the proposed scheme is suitable for MHCS, due to its high efficiency.
△ Less
Submitted 5 April, 2018;
originally announced April 2018.
-
Lclean: A Plausible Approach to Individual Trajectory Data Sanitization
Authors:
Qilong Han,
Dan Lu,
Kejia Zhang,
Xiaojiang Du,
Mohsen Guizani
Abstract:
In recent years, with the continuous development of significant data industrialization, trajectory data have more and more critical analytical value for urban construction and environmental monitoring. However, the trajectory contains a lot of personal privacy, and rashly publishing trajectory data set will cause serious privacy leakage risk. At present, the privacy protection of trajectory data m…
▽ More
In recent years, with the continuous development of significant data industrialization, trajectory data have more and more critical analytical value for urban construction and environmental monitoring. However, the trajectory contains a lot of personal privacy, and rashly publishing trajectory data set will cause serious privacy leakage risk. At present, the privacy protection of trajectory data mainly uses the methods of data anonymity and generalization, without considering the background knowledge of attackers and ignores the risk of adjacent location points may leak sensitive location points. In this paper, based on the above problems, combined with the location correlation of trajectory data, we proposed a plausible replacement method. Firstly, the correlation of trajectory points is proposed to classify the individual trajectories containing sensitive points. Then, according to the relevance of location points and the randomized response mechanism, a reasonable candidate set is selected to replace the sensitive points in the trajectory to satisfy the local differential privacy. Theoretical and experimental results show that the proposed method not only protects the sensitive information of individuals, but also does not affect the overall data distribution.
△ Less
Submitted 5 April, 2018;
originally announced April 2018.
-
Discovering Communities of Malapps on Android-based Mobile Cyber-physical Systems
Authors:
Dan Su,
Jiqiang Liu,
Wei Wang,
Xiaoyang Wang,
Xiaojiang Du,
Mohsen Guizani
Abstract:
Android-based devices like smartphones have become ideal mobile cyber-physical systems (MCPS) due to their powerful processors and variety of sensors. In recent years, an explosively and continuously growing number of malicious applications (malapps) have posed a great threat to Android-based MCPS as well as users' privacy. The effective detection of malapps is an emerging yet crucial task. How to…
▽ More
Android-based devices like smartphones have become ideal mobile cyber-physical systems (MCPS) due to their powerful processors and variety of sensors. In recent years, an explosively and continuously growing number of malicious applications (malapps) have posed a great threat to Android-based MCPS as well as users' privacy. The effective detection of malapps is an emerging yet crucial task. How to establish relationships among malapps, discover their potential communities, and explore their evolution process has become a challenging issue in effective detection of malapps. To deal with this issue, in this work, we are motivated to propose an automated community detection method for Android malapps by building a relation graph based on their static features. First, we construct a large feature set to profile the behaviors of malapps. Second, we propose an E-N algorithm by combining epsilon graph and k-nearest neighbor (k-NN) graph for graph construction. It solves the problem of an incomplete graph led by epsilon method and the problem of noise generated by k-NN graph. Finally, a community detection method, Infomap, is employed to explore the underlying structures of the relation graph, and obtain the communities of malapps. We evaluate our community detection method with 3996 malapp samples. Extensive experimental results show that our method outperforms the traditional clustering methods and achieves the best performance with rand statistic of 94.93% and accuracy of 79.53%.
△ Less
Submitted 4 April, 2018;
originally announced April 2018.
-
Preserving Location Privacy in Mobile Edge Computing
Authors:
Hongli Zhang,
Yuhang Wang,
Xiaojiang Du,
Mohsen Guizani
Abstract:
The burgeoning technology of Mobile Edge Computing is attracting the traditional LBS and LS to deploy due to its nature characters such as low latency and location awareness. Although this transplant will avoid the location privacy threat from the central cloud provider, there still exists the privacy concerns in the LS of MEC scenario. Location privacy threat arises during the procedure of the fi…
▽ More
The burgeoning technology of Mobile Edge Computing is attracting the traditional LBS and LS to deploy due to its nature characters such as low latency and location awareness. Although this transplant will avoid the location privacy threat from the central cloud provider, there still exists the privacy concerns in the LS of MEC scenario. Location privacy threat arises during the procedure of the fingerprint localization, and the previous studies on location privacy are ineffective because of the different threat model and information semantic. To address the location privacy in MEC environment, we designed LoPEC, a novel and effective scheme for protecting location privacy for the MEC devices. By the proper model of the RAN access points, we proposed the noise-addition method for the fingerprint data, and successfully induce the attacker from recognizing the real location. Our evaluation proves that LoPEC effectively prevents the attacker from obtaining the user's location precisely in both single-point and trajectory scenarios.
△ Less
Submitted 4 April, 2018;
originally announced April 2018.
-
A high-performance virtual machine filesystem monitor in cloud-assisted cognitive IoT
Authors:
Dongyang Zhan,
Lin Ye,
Hongli Zhang,
Binxing Fang,
Huhua Li,
Yang Liu,
Xiaojiang Du,
Mohsen Guizani
Abstract:
Cloud-assisted Cognitive Internet of Things has powerful data analytics abilities based on the computing and data storage capabilities of cloud virtual machines, which makes protecting virtual machine filesystem very important for the whole system security. Agentless periodic filesystem monitors are optimal solutions to protect cloud virtual machines because of the secure and low-overhead features…
▽ More
Cloud-assisted Cognitive Internet of Things has powerful data analytics abilities based on the computing and data storage capabilities of cloud virtual machines, which makes protecting virtual machine filesystem very important for the whole system security. Agentless periodic filesystem monitors are optimal solutions to protect cloud virtual machines because of the secure and low-overhead features. However, most of the periodic monitors usually scan all of the virtual machine filesystem or protected files in every scanning poll, so lots of secure files are scanned again and again even though they are not corrupted. In this paper, we propose a novel agentless periodic filesystem monitor framework for virtual machines with different image formats to improve the performance of agentless periodic monitors. Our core idea is to minimize the scope of the scanning files in both file integrity checking and virus detection. In our monitor, if a file is considered secure, it will not be scanned when it has not been modified. Since our monitor only scans the newly created and modified files, it can check fewer files than other filesystem monitors. To that end, we propose two monitor methods for different types of virtual machine disks to reduce the number of scanning files. For virtual machine with single disk image, we hook the backend driver to capture the disk modification information. For virtual machine with multiple copy-onwrite images, we leverage the copy-on-write feature of QCOW2 images to achieve the disk modification analysis. In addition, our system can restore and remove the corrupted files. The experimental results show that our system is effective for both Windows and Linux virtual machines with different image formats and can reduce the number of scanning files and scanning time.
△ Less
Submitted 4 April, 2018;
originally announced April 2018.
-
POKs Based Secure and Energy-Efficient Access Control for Implantable Medical Devices
Authors:
Chenglong Fu,
Xiaojiang Du,
Longfei Wu,
Qiang Zeng,
Amr Mohamed,
Mohsen Guizani
Abstract:
Implantable medical devices (IMDs), such as pacemakers, implanted cardiac defibrillators, and neurostimulators are medical devices implanted into patients' bodies for monitoring physiological signals and performing medical treatments. Many IMDs have built-in wireless communication modules to facilitate data collecting and device reprogramming by external programmers. The wireless communication bri…
▽ More
Implantable medical devices (IMDs), such as pacemakers, implanted cardiac defibrillators, and neurostimulators are medical devices implanted into patients' bodies for monitoring physiological signals and performing medical treatments. Many IMDs have built-in wireless communication modules to facilitate data collecting and device reprogramming by external programmers. The wireless communication brings significant conveniences for advanced applications such as real-time and remote monitoring but also introduces the risk of unauthorized wireless access. The absence of effective access control mechanisms exposes patients' life to cyber attacks. In this paper, we present a lightweight and universally applicable access control system for IMDs. By leveraging Physically Obfuscated Keys (POKs) as the hardware root of trust, provable security is achieved based on standard cryptographic primitives while attaining high energy efficiency. In addition, barrier-free IMD access under emergent situations is realized by utilizing the patient's biometrical information. We evaluate our proposed scheme through extensive security analysis and a prototype implementation, which demonstrates our work's superiority on security and energy efficiency.
△ Less
Submitted 16 February, 2020; v1 submitted 27 March, 2018;
originally announced March 2018.
-
LCD: Low Latency Command Dissemination for A Platoon of Vehicles
Authors:
Kai Li,
Wei Ni,
Eduardo Tovar,
Mohsen Guizani
Abstract:
In a vehicular platoon, a lead vehicle that is responsible for managing the platoon's moving directions and velocity periodically disseminates control commands to following vehicles based on vehicle-to-vehicle communications. However, reducing command dissemination latency with multiple vehicles while ensuring successful message delivery to the tail vehicle is challenging. We propose a new linear…
▽ More
In a vehicular platoon, a lead vehicle that is responsible for managing the platoon's moving directions and velocity periodically disseminates control commands to following vehicles based on vehicle-to-vehicle communications. However, reducing command dissemination latency with multiple vehicles while ensuring successful message delivery to the tail vehicle is challenging. We propose a new linear dynamic programming algorithm using backward induction and interchange arguments to minimize the dissemination latency of the vehicles. Furthermore, a closed form of dissemination latency in vehicular platoon is obtained by utilizing Markov chain with M/M/1 queuing model. Simulation results confirm that the proposed dynamic programming algorithm improves the dissemination rate by at least 50.9%, compared to similar algorithms in the literature. Moreover, it also approximates the best performance with the maximum gap of up to 0.2 second in terms of latency.
△ Less
Submitted 18 January, 2018;
originally announced January 2018.