Skip to main content

Showing 101–150 of 164 results for author: Guizani, M

.
  1. arXiv:1902.04009  [pdf

    cs.NI

    Automated Attack and Defense Framework for 5G Security on Physical and Logical Layers

    Authors: Zhihong Tian, Yanbin Sun, Shen Su, Mohan Li, Xiaojiang Du, Mohsen Guizani

    Abstract: The 5th generation (5G) network adopts a great number of revolutionary technologies to fulfill continuously increasing requirements of a variety of applications, including ultra-high bandwidth, ultra-low latency, ultra-massive device access, ultra-reliability, and so on. Correspondingly, traditional security focuses on the core network, and the logical (non-physical) layer is no longer suitable fo… ▽ More

    Submitted 11 February, 2019; originally announced February 2019.

  2. arXiv:1902.03902  [pdf

    cs.CR

    Achieving Secure and Efficient Cloud Search Services: Cross-Lingual Multi-Keyword Rank Search over Encrypted Cloud Data

    Authors: Xueyan Liu, Zhitao Guan, Longfei Wu, Zain Ul Abedin, Mohsen Guizani

    Abstract: Multi-user multi-keyword ranked search scheme in arbitrary language is a novel multi-keyword rank searchable encryption (MRSE) framework based on Paillier Cryptosystem with Threshold Decryption (PCTD). Compared to previous MRSE schemes constructed based on the k-nearest neighbor searcha-ble encryption (KNN-SE) algorithm, it can mitigate some draw-backs and achieve better performance in terms of fu… ▽ More

    Submitted 11 February, 2019; originally announced February 2019.

  3. arXiv:1902.03894  [pdf, ps, other

    eess.SP

    Mixed RF/FSO Relaying Systems with Hardware Impairments

    Authors: Elyes Balti, Mohsen Guizani, Bechir Hamdaoui, Bassem Khalfi

    Abstract: In this work, we provide a detailed analysis of a dual-hop fixed gain (FG) amplify-and-forward relaying system, consisting of a hybrid radio frequency (RF) and free-space optical (FSO) channels. We introduce an impairment model which is the soft envelope limiter (SEL). Additionally, we propose the partial relay selection (PRS) protocol with outdated channel state information (CSI) based on the kno… ▽ More

    Submitted 15 January, 2019; originally announced February 2019.

    Comments: arXiv admin note: text overlap with arXiv:1901.04249

  4. arXiv:1902.03710  [pdf, other

    cs.CR

    A Blockchain-based Self-tallying Voting Scheme in Decentralized IoT

    Authors: Yannan Li, Willy Susilo, Guomin Yang, Yong Yu, Dongxi Liu, Mohsen Guizani

    Abstract: The Internet of Things (IoT) is experiencing explosive growth and has gained extensive attention from academia and industry in recent years. Most of the existing IoT infrastructures are centralized, in which the presence of a cloud server is mandatory. However, centralized frameworks suffer from the issues of unscalability and single-point-of-failure. Consequently, decentralized IoT has been propo… ▽ More

    Submitted 10 February, 2019; originally announced February 2019.

    Comments: 9 pages, 9 figures

  5. arXiv:1902.03562  [pdf, ps, other

    cs.CR

    A Novel Secure Authentication Scheme for Heterogeneous Internet of Thing

    Authors: **gwei Liu, Ailian Ren, Lihuan Zhang, Rong Sun, Xiaojiang Du, Mohsen Guizani

    Abstract: Today, Internet of Things (IoT) technology is being increasingly popular which is applied in a wide range of industry sectors such as healthcare, transportation and some critical infrastructures. With the widespread applications of IoT technology, people's lives have changed dramatically. Due to its capabilities of sensitive data-aware, information collection, communication and processing, it rais… ▽ More

    Submitted 10 February, 2019; originally announced February 2019.

    Comments: 7 pages, 4 figures

  6. arXiv:1902.03177  [pdf

    eess.SP

    Aggregate Hardware Impairments Over Mixed RF/FSO Relaying Systems With Outdated CSI

    Authors: Elyes Balti, Mohsen Guizani, Bechir Hamdaoui, Bassem Khalfi

    Abstract: In this paper, we propose a dual-hop RF (Radio-Frequency)/FSO (Free-Space Optical) system with multiple relays employing the Decode-and-Forward (DF) and Amplify-and-Forward (AF) with a Fixed Gain (FG) relaying scheme. The RF channels are subject to a Rayleigh distribution while the optical links experience a unified fading model emcopassing the atmospheric turbulence that follows the Málaga distri… ▽ More

    Submitted 15 January, 2019; originally announced February 2019.

  7. arXiv:1902.03176  [pdf

    eess.SP

    Impact of Non-Linear High-Power Amplifiers on Cooperative Relaying Systems

    Authors: Elyes Balti, Mohsen Guizani

    Abstract: In this paper, we investigate the impact of the high-power amplifier non-linear distortion on multiple relay systems by introducing the soft envelope limiter, traveling wave tube amplifier, and solid-state power amplifier to the relays. The system employs amplify-and-forward either fixed or variable gain relaying and uses the opportunistic relay selection with outdated channel state information to… ▽ More

    Submitted 15 January, 2019; originally announced February 2019.

  8. arXiv:1902.03174  [pdf

    eess.SP

    Mixed RF/FSO Cooperative Relaying Systems with Co-Channel Interference

    Authors: Elyes Balti, Mohsen Guizani

    Abstract: In this paper, we provide a global framework analysis of a dual-hop mixed Radio Frequency (RF)/Free Space Optical (FSO) system with multiple branches/relays wherein the first and second hops, respectively, consist of RF and FSO channels. To cover various cases of fading, we propose generalized channels' models for RF and FSO links that follow the Nakagami-m and the Double Generalized Gamma (DGG) d… ▽ More

    Submitted 15 January, 2019; originally announced February 2019.

  9. arXiv:1902.03173  [pdf, ps, other

    eess.SP

    Hybrid Rayleigh and Double-Weibull over Impaired RF/FSO System with Outdated CSI

    Authors: Elyes Balti, Mohsen Guizani, Bechir Hamdaoui

    Abstract: In this work, we present a global framework of a dual-hop RF/FSO system with multiple relays operating at the mode of amplify-and-forward (AF) with fixed gain. Partial relay selection (PRS) protocol with outdated channel state information (CSI) is assumed since the channels of the first hop are time-varying. The optical irradiance of the second hop are subject to the Double-Weibull model while the… ▽ More

    Submitted 15 January, 2019; originally announced February 2019.

  10. arXiv:1902.03168  [pdf, other

    cs.CR

    Privacy Leakage in Smart Homes and Its Mitigation: IFTTT as a Case Study

    Authors: Rixin Xu, Qiang Zeng, Liehuang Zhu, Haotian Chi, Mohsen Guizani

    Abstract: The combination of smart home platforms and automation apps introduces much convenience to smart home users. However, this also brings the potential for privacy leakage. If a smart home platform is permitted to collect all the events of a user day and night, then the platform will learn the behavior patterns of this user before long. In this paper, we investigate how IFTTT, one of the most popular… ▽ More

    Submitted 14 February, 2019; v1 submitted 8 February, 2019; originally announced February 2019.

  11. arXiv:1902.02898  [pdf

    cs.CR

    Achieving Data Utility-Privacy Tradeoff in Internet of Medical Things: A Machine Learning Approach

    Authors: Zhitao Guan, Zefang Lv, Xiaojiang Du, Longfei Wu, Mohsen Guizani

    Abstract: The emergence and rapid development of the Internet of Medical Things (IoMT), an application of the Internet of Things into the medical and healthcare systems, have brought many changes and challenges to modern medical and healthcare systems. Particularly, machine learning technology can be used to process the data involved in IoMT for medical analysis and disease diagnosis. However, in this proce… ▽ More

    Submitted 7 February, 2019; originally announced February 2019.

  12. arXiv:1901.05097  [pdf, ps, other

    eess.SP

    Partial Relay Selection For Hybrid RF/FSO Systems with Hardware Impairments

    Authors: Elyes Balti, Mohsen Guizani, Bechir Hamdaoui, Yassine Maalej

    Abstract: In this paper, we investigate the performance analysis of dual hop relaying system consisting of asymmetric Radio Frequency (RF)/Free Optical Space (FSO) links. The RF channels follow a Rayleigh distribution and the optical links are subject to Gamma-Gamma fading. We also introduce impairments to our model and we suggest Partial Relay Selection (PRS) protocol with Amplify-and-Forward (AF) fixed ga… ▽ More

    Submitted 15 January, 2019; originally announced January 2019.

  13. arXiv:1812.08198  [pdf, ps, other

    cs.NI

    Toward Intelligent Network Optimization in Wireless Networking: An Auto-learning Framework

    Authors: Wenyu Zhang, Zhenjiang Zhang, Han-Chieh Chao, Mohsen Guizani

    Abstract: In wireless communication systems (WCSs), the network optimization problems (NOPs) play an important role in maximizing system performances by setting appropriate network configurations. When dealing with NOPs by using conventional optimization methodologies, there exist the following three problems: human intervention, model invalid, and high computation complexity. As such, in this article we pr… ▽ More

    Submitted 19 December, 2018; originally announced December 2018.

    Comments: 8 pages, 5 figures, 1 table, magzine article

    Journal ref: IEEE Wireless Communications, 2019

  14. arXiv:1812.06501  [pdf, other

    cs.MM cs.NI

    Proactive Video Chunks Caching and Processing for Latency and Cost Minimization in Edge Networks

    Authors: Emna Baccour, Aiman Erbad, Amr Mohamed, Kashif Bilal, Mohsen Guizani

    Abstract: Recently, the growing demand for rich multimedia content such as Video on Demand (VoD) has made the data transmission from content delivery networks (CDN) to end-users quite challenging. Edge networks have been proposed as an extension to CDN networks to alleviate this excessive data transfer through caching and to delegate the computation tasks to edge servers. To maximize the caching efficiency… ▽ More

    Submitted 16 December, 2018; originally announced December 2018.

    Comments: Submitted to International Conference on Wireless Communications and Networking (WCNC) 2019

  15. arXiv:1811.07864  [pdf

    cs.CR

    Secure Data Access for Wireless Body Sensor Networks

    Authors: Zhitao Guan, Tingting Yang, Xiaojiang Du, Mohsen Guizani

    Abstract: Recently, with the support of mobile cloud computing, a large number of health related data collected from various body sensor networks can be managed efficiently. However, to ensure data security and data privacy in cloud-integrated body sensor networks is an important and challenging issue. In this paper, we present a novel secure access control mechanism Mask Certificate Attribute Based Encrypt… ▽ More

    Submitted 25 October, 2018; originally announced November 2018.

  16. arXiv:1811.03741  [pdf, ps, other

    cs.CR

    Mutual Heterogeneous Signcryption Schemes for 5G Network Slicings

    Authors: **gwei Liu, Lihuan Zhang, Rong Sun, Xiaojiang Du, Mohsen Guizani

    Abstract: With the emerging of mobile communication technologies, we are entering the fifth generation mobile communication system (5G) era. Various application scenarios will arise in the 5G era to meet the different service requirements. Different 5G network slicings may deploy different public key cryptosystems. The security issues among the heterogeneous systems should be considered. In order to ensure… ▽ More

    Submitted 8 November, 2018; originally announced November 2018.

  17. arXiv:1811.03730  [pdf, ps, other

    cs.CR

    MDBV: Monitoring Data Batch Verification for Survivability of Internet of Vehicles

    Authors: **gwei Liu, Qingqing Li, Huijuan Cao, Rong Sun, Xiaojiang Du, Mohsen Guizani

    Abstract: Along with the development of vehicular sensors and wireless communication technology, Internet of Vehicles (IoV) is emerging that can improve traffic efficiency and provide a comfortable driving environment. However, there is still a challenge how to ensure the survivability of IoV. Fortunately, this goal can be achieved by quickly verifying real-time monitoring data to avoid network failure. Agg… ▽ More

    Submitted 8 November, 2018; originally announced November 2018.

  18. arXiv:1811.03246  [pdf, ps, other

    cs.CR

    A Traceable Concurrent Data Anonymous Transmission Scheme for Heterogeneous VANETs

    Authors: **gwei Liu, Qin Hu, Chaoya Li, Rong Sun, Xiaojiang Du, Mohsen Guizani

    Abstract: Vehicular Ad Hoc Networks (VANETs) are attractive scenarios that can improve the traffic situation and provide convenient services for drivers and passengers via vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication. However, there are still many security challenges in the traffic information transmission, especially in the intense traffic case. For ensuring the privacy of use… ▽ More

    Submitted 7 November, 2018; originally announced November 2018.

  19. arXiv:1811.03243  [pdf, ps, other

    cs.CR

    vFAC: Fine-Grained Access Control with Versatility for Cloud Storage

    Authors: **gwei Liu, Huifang Tang, Chaoya Li, Rong Sun, Xiaojiang Du, Mohsen Guizani

    Abstract: In recent years, cloud storage technology has been widely used in many fields such as education, business, medical and more because of its convenience and low cost. With the widespread applications of cloud storage technology, data access control methods become more and more important in cloud-based network. The ciphertext policy attribute-based encryption (CP-ABE) scheme is very suitable for acce… ▽ More

    Submitted 7 November, 2018; originally announced November 2018.

  20. arXiv:1811.03239  [pdf, ps, other

    cs.CR

    An Efficient Anonymous Authentication Scheme for Internet of Vehicles

    Authors: **gwei Liu, Qingqing Li, Rong Sun, Xiaojiang Du, Mohsen Guizani

    Abstract: Internet of Vehicles (IoV) is an intelligent application of IoT in smart transportation, which can make intelligent decisions for passengers. It has drawn extensive attention to improve traffic safety and efficiency and create a more comfortable driving and riding environment. Vehicular cloud computing is a variant of mobile cloud computing, which can process local information quickly. The coopera… ▽ More

    Submitted 7 November, 2018; originally announced November 2018.

  21. arXiv:1811.03223  [pdf, ps, other

    cs.CR

    BPDS: A Blockchain based Privacy-Preserving Data Sharing for Electronic Medical Records

    Authors: **gwei Liu, Xiaolu Li, Lin Ye, Hongli Zhang, Xiaojiang Du, Mohsen Guizani

    Abstract: Electronic medical record (EMR) is a crucial form of healthcare data, currently drawing a lot of attention. Sharing health data is considered to be a critical approach to improve the quality of healthcare service and reduce medical costs. However, EMRs are fragmented across decentralized hospitals, which hinders data sharing and puts patients' privacy at risks. To address these issues, we propose… ▽ More

    Submitted 7 November, 2018; originally announced November 2018.

  22. arXiv:1811.02682  [pdf

    cs.CV

    Attention-Mechanism-based Tracking Method for Intelligent Internet of Vehicles

    Authors: Xu Kang, Bin Song, Jie Guo, Xiaojiang Du, Mohsen Guizani

    Abstract: Vehicle tracking task plays an important role on the internet of vehicles and intelligent transportation system. Beyond the traditional GPS sensor, the image sensor can capture different kinds of vehicles, analyze their driving situation and can interact with them. Aiming at the problem that the traditional convolutional neural network is vulnerable to background interference, this paper proposes… ▽ More

    Submitted 29 October, 2018; originally announced November 2018.

  23. Vehicle Tracking Using Surveillance with Multimodal Data Fusion

    Authors: Yue Zhang, Bin Song, Xiaojiang Du, Mohsen Guizani

    Abstract: Vehicle location prediction or vehicle tracking is a significant topic within connected vehicles. This task, however, is difficult if only a single modal data is available, probably causing bias and impeding the accuracy. With the development of sensor networks in connected vehicles, multimodal data are becoming accessible. Therefore, we propose a framework for vehicle tracking with multimodal dat… ▽ More

    Submitted 29 October, 2018; originally announced November 2018.

    Comments: 8 pages,6 figures,33 conferences

  24. arXiv:1810.11175  [pdf, other

    cs.CR

    LRCoin: Leakage-resilient Cryptocurrency Based on Bitcoin for Data Trading in IoT

    Authors: Yong Yu, Yujie Ding, Yanqi Zhao, Yannan Li, Xiaojiang Du, Mohsen Guizani

    Abstract: Currently, the number of Internet of Thing (IoT) devices making up the IoT is more than 11 billion and this number has been continuously increasing. The prevalence of these devices leads to an emerging IoT business model called Device-as-a-service(DaaS), which enables sensor devices to collect data disseminated to all interested devices. The devices sharing data with other devices could receive so… ▽ More

    Submitted 25 October, 2018; originally announced October 2018.

    Comments: 9 pages, 3 figures, 1 table

  25. arXiv:1810.10748  [pdf

    cs.CR

    Towards Delay-Tolerant Flexible Data Access Control for Smart Grid with Renewable Energy Resources

    Authors: Zhitao Guan, **g Li, Liehuang Zhu, Zijian Zhang, Xiaojiang Du, Mohsen Guizani

    Abstract: In the Smart Grid with Renewable Energy Resources (RERs), the Residential Units (RUs) with Distributed Energy Resources (DERs) are considered to be both power consumers and suppliers. Specifically, RUs with excessive renewable generations can trade with the utility in deficit of power supplies for mutual benefits. It causes two challenging issues. First, the trading data of RUs is quite sensitive,… ▽ More

    Submitted 25 October, 2018; originally announced October 2018.

  26. arXiv:1810.09729  [pdf

    cs.RO cs.AI eess.SY

    Design Challenges of Multi-UAV Systems in Cyber-Physical Applications: A Comprehensive Survey, and Future Directions

    Authors: Reza Shakeri, Mohammed Ali Al-Garadi, Ahmed Badawy, Amr Mohamed, Tamer Khattab, Abdulla Al-Ali, Khaled A. Harras, Mohsen Guizani

    Abstract: Unmanned Aerial Vehicles (UAVs) have recently rapidly grown to facilitate a wide range of innovative applications that can fundamentally change the way cyber-physical systems (CPSs) are designed. CPSs are a modern generation of systems with synergic cooperation between computational and physical potentials that can interact with humans through several new mechanisms. The main advantages of using U… ▽ More

    Submitted 23 October, 2018; originally announced October 2018.

  27. Semi-supervised Deep Reinforcement Learning in Support of IoT and Smart City Services

    Authors: Mehdi Mohammadi, Ala Al-Fuqaha, Mohsen Guizani, Jun-Seok Oh

    Abstract: Smart services are an important element of the smart cities and the Internet of Things (IoT) ecosystems where the intelligence behind the services is obtained and improved through the sensory data. Providing a large amount of training data is not always feasible; therefore, we need to consider alternative ways that incorporate unlabeled data as well. In recent years, Deep reinforcement learning (D… ▽ More

    Submitted 9 October, 2018; originally announced October 2018.

    Comments: 11 pages, 7 figures. Accepted for publication in IEEE Internet of Things Journal

    Journal ref: IEEE Internet of Things Journal, Volume 5, Issue 2, 2018

  28. arXiv:1809.07046  [pdf, other

    cs.NI

    Privacy-Preserving DDoS Attack Detection Using Cross-Domain Traffic in Software Defined Networks

    Authors: Liehuang Zhu, Xiangyun Tang, Meng Shen, Xiaojiang Du, Mohsen Guizani

    Abstract: Existing distributed denial-of-service attack detection in software defined networks (SDNs) typically perform detection in a single domain. In reality, abnormal traffic usually affects multiple network domains. Thus, a cross-domain attack detection has been proposed to improve detection performance. However, when participating in detection, the domain of each SDN needs to provide a large amount of… ▽ More

    Submitted 19 September, 2018; originally announced September 2018.

  29. arXiv:1807.11023  [pdf

    cs.CR cs.LG cs.NI

    A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security

    Authors: Mohammed Ali Al-Garadi, Amr Mohamed, Abdulla Al-Ali, Xiaojiang Du, Mohsen Guizani

    Abstract: The Internet of Things (IoT) integrates billions of smart devices that can communicate with one another with minimal human intervention. It is one of the fastest develo** fields in the history of computing, with an estimated 50 billion devices by the end of 2020. On the one hand, IoT play a crucial role in enhancing several real-life smart applications that can improve life quality. On the other… ▽ More

    Submitted 29 July, 2018; originally announced July 2018.

  30. Exploiting wideband spectrum occupancy heterogeneity for weighted compressive spectrum sensing

    Authors: Bassem Khalfi, Bechir Hamdaoui, Mohsen Guizani, Nizar Zorba

    Abstract: Compressive sampling has shown great potential for making wideband spectrum sensing possible at sub-Nyquist sampling rates. As a result, there have recently been research efforts that aimed to develop techniques that leverage compressive sampling to enable compressed wideband spectrum sensing. These techniques consider homogeneous wideband spectrum where all bands are assumed to have similar PU tr… ▽ More

    Submitted 4 June, 2018; originally announced June 2018.

    Comments: 6 pages, 5 figures, IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)

    Journal ref: IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Atlanta, GA, 2017, pp. 613-618

  31. Softwarization of Internet of Things Infrastructure for Secure and Smart Healthcare

    Authors: Mohammad A. Salahuddin, Ala Al-Fuqaha, Mohsen Guizani, Khaled Shuaib, Farag Sallabi

    Abstract: We propose an agile softwarized infrastructure for flexible, cost effective, secure and privacy preserving deployment of Internet of Things (IoT) for smart healthcare applications and services. It integrates state-of-the-art networking and virtualization techniques across IoT, fog and cloud domains, employing Blockchain, Tor and message brokers to provide security and privacy for patients and heal… ▽ More

    Submitted 28 May, 2018; originally announced May 2018.

    Comments: 9 pages, 3 figures

    Journal ref: IEEE Computer Magazine, vol 50, issue 7, pp. 74 - 79, 2017

  32. Reinforcement Learning for Resource Provisioning in Vehicular Cloud

    Authors: Mohammad A. Salahuddin, Ala Al-Fuqaha, Mohsen Guizani

    Abstract: This article presents a concise view of vehicular clouds that incorporates various vehicular cloud models, which have been proposed, to date. Essentially, they all extend the traditional cloud and its utility computing functionalities across the entities in the vehicular ad hoc network (VANET). These entities include fixed road-side units (RSUs), on-board units (OBUs) embedded in the vehicle and p… ▽ More

    Submitted 28 May, 2018; originally announced May 2018.

    Comments: 8 pages, 6 figures

    Journal ref: IEEE Wireless Communications, vol. 23, no. 4, pp. 128-135, August 2016

  33. Compressed Wideband Spectrum Sensing: Concept, Challenges and Enablers

    Authors: Bechir Hamdaoui, Bassem Khalfi, Mohsen Guizani

    Abstract: Spectrum sensing research has mostly been focusing on narrowband access, and not until recently have researchers started looking at wideband spectrum. Broadly speaking, wideband spectrum sensing approaches can be categorized into two classes: Nyquist-rate and sub-Nyquist-rate sampling approaches. Nyquist-rate approaches have major practical issues that question their suitability for realtime appli… ▽ More

    Submitted 10 May, 2018; originally announced May 2018.

    Comments: 6 pages, 5 figures, and 1 table

    Journal ref: B. Hamdaoui, B. Khalfi and M. Guizani, "Compressed Wideband Spectrum Sensing: Concept, Challenges, and Enablers," in IEEE Communications Magazine, vol. 56, no. 4, pp. 136-141, APRIL 2018

  34. Unmanned Aerial Vehicles: A Survey on Civil Applications and Key Research Challenges

    Authors: Hazim Shakhatreh, Ahmad Sawalmeh, Ala Al-Fuqaha, Zuochao Dou, Eyad Almaita, Issa Khalil, Noor Shamsiah Othman, Abdallah Khreishah, Mohsen Guizani

    Abstract: The use of unmanned aerial vehicles (UAVs) is growing rapidly across many civil application domains including real-time monitoring, providing wireless coverage, remote sensing, search and rescue, delivery of goods, security and surveillance, precision agriculture, and civil infrastructure inspection. Smart UAVs are the next big revolution in UAV technology promising to provide new opportunities in… ▽ More

    Submitted 19 April, 2018; originally announced May 2018.

    Comments: arXiv admin note: text overlap with arXiv:1602.03602, arXiv:1704.04813 by other authors

  35. arXiv:1804.02834  [pdf, other

    cs.CR

    Assured Data Deletion with Fine-grained Access Control for Fog-based Industrial Applications

    Authors: Yong Yu, Liang Xue, Yannan Li, Xiaojiang Du, Mohsen Guizani, Bo Yang

    Abstract: The advances of cloud computing, fog computing and Internet of Things (IoT) make the industries more prosperous than ever. A wide range of industrial systems such as transportation systems and manufacturing systems have been developed by integrating cloud computing, fog computing and IoT successfully. Security and privacy issues are a major concern that hinders the wide adoptions of these novel te… ▽ More

    Submitted 9 April, 2018; originally announced April 2018.

    Comments: 9 pages, 4 figures

  36. arXiv:1804.02498  [pdf

    cs.NI cs.CR eess.SP

    Bus Trajectory-Based Street-Centric Routing for Message Delivery in Urban Vehicular Ad hoc Networks

    Authors: Gang Sun, Yi**g Zhang, Dan Liao, Hongfang Yu, Xiaojiang Du, Mohsen Guizani

    Abstract: This paper focuses on the routing algorithm for the communications between vehicles and places in urban VANET. As one of the basic transportation facilities in an urban setting, buses periodically run along their fixed routes and widely cover city streets. The trajectory of bus lines can be seen as a sub map of a city. Based on the characters of bus networks, we propose a bus trajectory-based stre… ▽ More

    Submitted 6 April, 2018; originally announced April 2018.

  37. arXiv:1804.02496  [pdf

    cs.NI cs.CR eess.SP

    A Performance Analysis Model of TCP over Multiple Heterogeneous Paths for 5G Mobile Services

    Authors: Jiayang Song, ** Dong, Huachun Zhou, Tao Zheng, Xiaojiang Du, Mohsen Guizani

    Abstract: Driven by the primary requirement of emerging 5G mobile services, the demand for concurrent multipath transfer (CMT) is still prominent. Yet, multipath transport protocols are not widely adopted and TCP-based CMT schemes will still be in dominant position in 5G. However, the performance of TCP flow transferred over multiple heterogeneous paths is prone to the link quality asymmetry, the extent of… ▽ More

    Submitted 6 April, 2018; originally announced April 2018.

  38. arXiv:1804.02440  [pdf, other

    cs.CR

    PRIF: A Privacy-Preserving Interest-Based Forwarding Scheme for Social Internet of Vehicles

    Authors: Liehuang Zhu, Chuan Zhang, Chang Xu, Xiaojiang Du, Rixin Xu, Kashif Sharif, Mohsen Guizani

    Abstract: Recent advances in Socially Aware Networks (SANs) have allowed its use in many domains, out of which social Internet of vehicles (SIOV) is of prime importance. SANs can provide a promising routing and forwarding paradigm for SIOV by using interest-based communication. Though able to improve the forwarding performance, existing interest-based schemes fail to consider the important issue of protecti… ▽ More

    Submitted 6 April, 2018; originally announced April 2018.

  39. arXiv:1804.02431  [pdf, other

    cs.CR

    PPLS: A Privacy-Preserving Location-Sharing Scheme in Vehicular Social Networks

    Authors: Chang Xu, Xuan Xie, Liehuang Zhu, Kashif Sharif, Chuan Zhang, Xiaojiang Du, Mohsen Guizani

    Abstract: Recent advances in Socially Aware Networks (SANs) have allowed its use in many domains, out of which social Internet of vehicles (SIOV) is of prime importance. SANs can provide a promising routing and forwarding paradigm for SIOV by using interest-based communication. Though able to improve the forwarding performance, existing interest-based schemes fail to consider the important issue of protecti… ▽ More

    Submitted 6 April, 2018; originally announced April 2018.

  40. arXiv:1804.02099  [pdf

    cs.NI cs.AI

    Reinforcement Learning based QoS/QoE-aware Service Function Chaining in Software-Driven 5G Slices

    Authors: Xi Chen, Zonghang Li, Yupeng Zhang, Ruiming Long, Hongfang Yu, Xiaojiang Du, Mohsen Guizani

    Abstract: With the ever growing diversity of devices and applications that will be connected to 5G networks, flexible and agile service orchestration with acknowledged QoE that satisfies end-user's functional and QoS requirements is necessary. SDN (Software-Defined Networking) and NFV (Network Function Virtualization) are considered key enabling technologies for 5G core networks. In this regard, this paper… ▽ More

    Submitted 5 April, 2018; originally announced April 2018.

  41. arXiv:1804.02060  [pdf, ps, other

    cs.CR

    LPTD: Achieving Lightweight and Privacy-Preserving Truth Discovery in CIoT

    Authors: Chuan Zhang, Liehuang Zhu, Chang Xu, Kashif Sharif, Xiaojiang Du, Mohsen Guizani

    Abstract: In recent years, cognitive Internet of Things (CIoT) has received considerable attention because it can extract valuable information from various Internet of Things (IoT) devices. In CIoT, truth discovery plays an important role in identifying truthful values from large scale data to help CIoT provide deeper insights and value from collected information. However, the privacy concerns of IoT device… ▽ More

    Submitted 5 April, 2018; originally announced April 2018.

  42. arXiv:1804.02056  [pdf

    cs.CV

    FPAN: Fine-grained and Progressive Attention Localization Network for Data Retrieval

    Authors: Sijia Chen, Bin Song, Jie Guo, Xiaojiang Du, Mohsen Guizani

    Abstract: The Localization of the target object for data retrieval is a key issue in the Intelligent and Connected Transportation Systems (ICTS). However, due to lack of intelligence in the traditional transportation system, it can take tremendous resources to manually retrieve and locate the queried objects among a large number of images. In order to solve this issue, we propose an effective method to quer… ▽ More

    Submitted 5 April, 2018; originally announced April 2018.

  43. arXiv:1804.02035  [pdf, other

    cs.NI

    A Computation Offloading Incentive Mechanism with Delay and Cost Constraints under 5G Satellite-ground IoV architecture

    Authors: Minghui LiWang, Shijie Dai, Zhibin Gao, Xiaojiang Du, Mohsen Guizani, Huaiyu Dai

    Abstract: The 5G Internet of Vehicles has become a new paradigm alongside the growing popularity and variety of computation-intensive applications with high requirements for computational resources and analysis capabilities. Existing network architectures and resource management mechanisms may not sufficiently guarantee satisfactory Quality of Experience and network efficiency, mainly suffering from coverag… ▽ More

    Submitted 5 April, 2018; originally announced April 2018.

  44. arXiv:1804.01822  [pdf, ps, other

    cs.CR

    A Large-scale Concurrent Data Anonymous Batch Verification Scheme for Mobile Healthcare Crowd Sensing

    Authors: **gwei Liu, Huijuan Cao, Qingqing Li, Fanghui Cai, Xiaojiang Du, Mohsen Guizani

    Abstract: Recently, with the rapid development of big data, Internet of Things (IoT) brings more and more intelligent and convenient services to people's daily lives. Mobile healthcare crowd sensing (MHCS), as a typical application of IoT, is becoming an effective approach to provide various medical and healthcare services to individual or organizations. However, MHCS still have to face to different securit… ▽ More

    Submitted 5 April, 2018; originally announced April 2018.

  45. arXiv:1804.01818  [pdf

    cs.CR

    Lclean: A Plausible Approach to Individual Trajectory Data Sanitization

    Authors: Qilong Han, Dan Lu, Kejia Zhang, Xiaojiang Du, Mohsen Guizani

    Abstract: In recent years, with the continuous development of significant data industrialization, trajectory data have more and more critical analytical value for urban construction and environmental monitoring. However, the trajectory contains a lot of personal privacy, and rashly publishing trajectory data set will cause serious privacy leakage risk. At present, the privacy protection of trajectory data m… ▽ More

    Submitted 5 April, 2018; originally announced April 2018.

  46. arXiv:1804.01641  [pdf

    cs.CR

    Discovering Communities of Malapps on Android-based Mobile Cyber-physical Systems

    Authors: Dan Su, Jiqiang Liu, Wei Wang, Xiaoyang Wang, Xiaojiang Du, Mohsen Guizani

    Abstract: Android-based devices like smartphones have become ideal mobile cyber-physical systems (MCPS) due to their powerful processors and variety of sensors. In recent years, an explosively and continuously growing number of malicious applications (malapps) have posed a great threat to Android-based MCPS as well as users' privacy. The effective detection of malapps is an emerging yet crucial task. How to… ▽ More

    Submitted 4 April, 2018; originally announced April 2018.

  47. arXiv:1804.01636  [pdf

    cs.CR

    Preserving Location Privacy in Mobile Edge Computing

    Authors: Hongli Zhang, Yuhang Wang, Xiaojiang Du, Mohsen Guizani

    Abstract: The burgeoning technology of Mobile Edge Computing is attracting the traditional LBS and LS to deploy due to its nature characters such as low latency and location awareness. Although this transplant will avoid the location privacy threat from the central cloud provider, there still exists the privacy concerns in the LS of MEC scenario. Location privacy threat arises during the procedure of the fi… ▽ More

    Submitted 4 April, 2018; originally announced April 2018.

  48. arXiv:1804.01633  [pdf

    cs.CR

    A high-performance virtual machine filesystem monitor in cloud-assisted cognitive IoT

    Authors: Dongyang Zhan, Lin Ye, Hongli Zhang, Binxing Fang, Huhua Li, Yang Liu, Xiaojiang Du, Mohsen Guizani

    Abstract: Cloud-assisted Cognitive Internet of Things has powerful data analytics abilities based on the computing and data storage capabilities of cloud virtual machines, which makes protecting virtual machine filesystem very important for the whole system security. Agentless periodic filesystem monitors are optimal solutions to protect cloud virtual machines because of the secure and low-overhead features… ▽ More

    Submitted 4 April, 2018; originally announced April 2018.

  49. POKs Based Secure and Energy-Efficient Access Control for Implantable Medical Devices

    Authors: Chenglong Fu, Xiaojiang Du, Longfei Wu, Qiang Zeng, Amr Mohamed, Mohsen Guizani

    Abstract: Implantable medical devices (IMDs), such as pacemakers, implanted cardiac defibrillators, and neurostimulators are medical devices implanted into patients' bodies for monitoring physiological signals and performing medical treatments. Many IMDs have built-in wireless communication modules to facilitate data collecting and device reprogramming by external programmers. The wireless communication bri… ▽ More

    Submitted 16 February, 2020; v1 submitted 27 March, 2018; originally announced March 2018.

    Comments: updated version, the version is published on SecureComm 2019

    Journal ref: International Conference on Security and Privacy in Communication Systems. Springer, Cham, 2019

  50. arXiv:1801.06153  [pdf, other

    cs.PF eess.SY

    LCD: Low Latency Command Dissemination for A Platoon of Vehicles

    Authors: Kai Li, Wei Ni, Eduardo Tovar, Mohsen Guizani

    Abstract: In a vehicular platoon, a lead vehicle that is responsible for managing the platoon's moving directions and velocity periodically disseminates control commands to following vehicles based on vehicle-to-vehicle communications. However, reducing command dissemination latency with multiple vehicles while ensuring successful message delivery to the tail vehicle is challenging. We propose a new linear… ▽ More

    Submitted 18 January, 2018; originally announced January 2018.

    Comments: 8 pages, 5 figures, accepted in IEEE International Conference on Communications (ICC), 2018