-
An incremental hybrid adaptive network-based IDS in Software Defined Networks to detect stealth attacks
Authors:
Abdullah H Alqahtani
Abstract:
Network attacks have became increasingly more sophisticated and stealthy due to the advances in technologies and the growing sophistication of attackers. Advanced Persistent Threats (APTs) are a type of attack that implement a wide range of strategies to evade detection and be under the defence radar. Software Defined Network (SDN) is a network paradigm that implements dynamic configuration by sep…
▽ More
Network attacks have became increasingly more sophisticated and stealthy due to the advances in technologies and the growing sophistication of attackers. Advanced Persistent Threats (APTs) are a type of attack that implement a wide range of strategies to evade detection and be under the defence radar. Software Defined Network (SDN) is a network paradigm that implements dynamic configuration by separating the control plane from the network plane. This approach improves security aspects by facilitating the employment of network intrusion detection systems. Implementing Machine Learning (ML) techniques in Intrusion Detection Systems (IDSs) is widely used to detect such attacks but has a challenge when the data distribution changes. Concept drift is a term that describes the change in the relationship between the input data and the target value (label or class). The model is expected to degrade as certain forms of change occur. In this paper, the primary form of change will be in user behaviour (particularly changes in attacker behaviour). It is essential for a model to adapt itself to deviations in data distribution. SDN can help in monitoring changes in data distribution. This paper discusses changes in stealth attacker behaviour. The work described here investigates various concept drift detection algorithms. An incremental hybrid adaptive Network Intrusion Detection System (NIDS) is proposed to tackle the issue of concept drift in SDN. It can detect known and unknown attacks. The model is evaluated over different datasets showing promising results.
△ Less
Submitted 1 April, 2024;
originally announced April 2024.
-
A Machine Learning Ensemble Model for the Detection of Cyberbullying
Authors:
Abulkarim Faraj Alqahtani,
Mohammad Ilyas
Abstract:
The pervasive use of social media platforms, such as Facebook, Instagram, and X, has significantly amplified our electronic interconnectedness. Moreover, these platforms are now easily accessible from any location at any given time. However, the increased popularity of social media has also led to cyberbullying.It is imperative to address the need for finding, monitoring, and mitigating cyberbully…
▽ More
The pervasive use of social media platforms, such as Facebook, Instagram, and X, has significantly amplified our electronic interconnectedness. Moreover, these platforms are now easily accessible from any location at any given time. However, the increased popularity of social media has also led to cyberbullying.It is imperative to address the need for finding, monitoring, and mitigating cyberbullying posts on social media platforms. Motivated by this necessity, we present this paper to contribute to develo** an automated system for detecting binary labels of aggressive tweets.Our study has demonstrated remarkable performance compared to previous experiments on the same dataset. We employed the stacking ensemble machine learning method, utilizing four various feature extraction techniques to optimize performance within the stacking ensemble learning framework. Combining five machine learning algorithms,Decision Trees, Random Forest, Linear Support Vector Classification, Logistic Regression, and K-Nearest Neighbors into an ensemble method, we achieved superior results compared to traditional machine learning classifier models. The stacking classifier achieved a high accuracy rate of 94.00%, outperforming traditional machine learning models and surpassing the results of prior experiments that utilized the same dataset. The outcomes of our experiments showcased an accuracy rate of 0.94% in detection tweets as aggressive or non-aggressive.
△ Less
Submitted 19 February, 2024;
originally announced February 2024.
-
Securing the Invisible Thread: A Comprehensive Analysis of BLE Tracker Security in Apple AirTags and Samsung SmartTags
Authors:
Hosam Alamleh,
Michael Gogarty,
David Ruddell,
Ali Abdullah S. AlQahtani
Abstract:
This study presents an in-depth analysis of the security landscape in Bluetooth Low Energy (BLE) tracking systems, with a particular emphasis on Apple AirTags and Samsung SmartTags, including their cryptographic frameworks. Our investigation traverses a wide spectrum of attack vectors such as physical tampering, firmware exploitation, signal spoofing, eavesdrop**, jamming, app security flaws, Bl…
▽ More
This study presents an in-depth analysis of the security landscape in Bluetooth Low Energy (BLE) tracking systems, with a particular emphasis on Apple AirTags and Samsung SmartTags, including their cryptographic frameworks. Our investigation traverses a wide spectrum of attack vectors such as physical tampering, firmware exploitation, signal spoofing, eavesdrop**, jamming, app security flaws, Bluetooth security weaknesses, location spoofing, threats to owner devices, and cloud-related vulnerabilities. Moreover, we delve into the security implications of the cryptographic methods utilized in these systems. Our findings reveal that while BLE trackers like AirTags and SmartTags offer substantial utility, they also pose significant security risks. Notably, Apple's approach, which prioritizes user privacy by removing intermediaries, inadvertently leads to device authentication challenges, evidenced by successful AirTag spoofing instances. Conversely, Samsung SmartTags, designed to thwart beacon spoofing, raise critical concerns about cloud security and user privacy. Our analysis also highlights the constraints faced by these devices due to their design focus on battery life conservation, particularly the absence of secure boot processes, which leaves them susceptible to OS modification and a range of potential attacks. The paper concludes with insights into the anticipated evolution of these tracking systems. We predict that future enhancements will likely focus on bolstering security features, especially as these devices become increasingly integrated into the broader IoT ecosystem and face evolving privacy regulations. This shift is imperative to address the intricate balance between functionality and security in next-generation BLE tracking systems.
△ Less
Submitted 24 January, 2024;
originally announced January 2024.
-
Navigating Cybersecurity Training: A Comprehensive Review
Authors:
Saif Al-Dean Qawasmeh,
Ali Abdullah S. AlQahtani,
Muhammad Khurram Khan
Abstract:
In the dynamic realm of cybersecurity, awareness training is crucial for strengthening defenses against cyber threats. This survey examines a spectrum of cybersecurity awareness training methods, analyzing traditional, technology-based, and innovative strategies. It evaluates the principles, efficacy, and constraints of each method, presenting a comparative analysis that highlights their pros and…
▽ More
In the dynamic realm of cybersecurity, awareness training is crucial for strengthening defenses against cyber threats. This survey examines a spectrum of cybersecurity awareness training methods, analyzing traditional, technology-based, and innovative strategies. It evaluates the principles, efficacy, and constraints of each method, presenting a comparative analysis that highlights their pros and cons. The study also investigates emerging trends like artificial intelligence and extended reality, discussing their prospective influence on the future of cybersecurity training. Additionally, it addresses implementation challenges and proposes solutions, drawing on insights from real-world case studies. The goal is to bolster the understanding of cybersecurity awareness training's current landscape, offering valuable perspectives for both practitioners and scholars.
△ Less
Submitted 20 January, 2024;
originally announced January 2024.
-
Leveraging Machine Learning for Wi-Fi-based Environmental Continuous Two-Factor Authentication
Authors:
Ali Abdullah S. AlQahtani,
Thamraa Alshayeb,
Mahmoud Nabil,
Ahmad Patooghy
Abstract:
The traditional two-factor authentication (2FA) methods primarily rely on the user manually entering a code or token during the authentication process. This can be burdensome and time-consuming, particularly for users who must be authenticated frequently. To tackle this challenge, we present a novel 2FA approach replacing the user's input with decisions made by Machine Learning (ML) that continuou…
▽ More
The traditional two-factor authentication (2FA) methods primarily rely on the user manually entering a code or token during the authentication process. This can be burdensome and time-consuming, particularly for users who must be authenticated frequently. To tackle this challenge, we present a novel 2FA approach replacing the user's input with decisions made by Machine Learning (ML) that continuously verifies the user's identity with zero effort. Our system exploits unique environmental features associated with the user, such as beacon frame characteristics and Received Signal Strength Indicator (RSSI) values from Wi-Fi Access Points (APs). These features are gathered and analyzed in real-time by our ML algorithm to ascertain the user's identity. For enhanced security, our system mandates that the user's two devices (i.e., a login device and a mobile device) be situated within a predetermined proximity before granting access. This precaution ensures that unauthorized users cannot access sensitive information or systems, even with the correct login credentials. Through experimentation, we have demonstrated our system's effectiveness in determining the location of the user's devices based on beacon frame characteristics and RSSI values, achieving an accuracy of 92.4%. Additionally, we conducted comprehensive security analysis experiments to evaluate the proposed 2FA system's resilience against various cyberattacks. Our findings indicate that the system exhibits robustness and reliability in the face of these threats. The scalability, flexibility, and adaptability of our system render it a promising option for organizations and users seeking a secure and convenient authentication system.
△ Less
Submitted 12 January, 2024;
originally announced January 2024.
-
Comprehensive Survey: Biometric User Authentication Application, Evaluation, and Discussion
Authors:
Reem Alrawili,
Ali Abdullah S. AlQahtani,
Muhammad Khurram Khan
Abstract:
This paper conducts an extensive review of biometric user authentication literature, addressing three primary research questions: (1) commonly used biometric traits and their suitability for specific applications, (2) performance factors such as security, convenience, and robustness, and potential countermeasures against cyberattacks, and (3) factors affecting biometric system accuracy and po-tent…
▽ More
This paper conducts an extensive review of biometric user authentication literature, addressing three primary research questions: (1) commonly used biometric traits and their suitability for specific applications, (2) performance factors such as security, convenience, and robustness, and potential countermeasures against cyberattacks, and (3) factors affecting biometric system accuracy and po-tential improvements. Our analysis delves into physiological and behavioral traits, exploring their pros and cons. We discuss factors influencing biometric system effectiveness and highlight areas for enhancement. Our study differs from previous surveys by extensively examining biometric traits, exploring various application domains, and analyzing measures to mitigate cyberattacks. This paper aims to inform researchers and practitioners about the biometric authentication landscape and guide future advancements.
△ Less
Submitted 20 January, 2024; v1 submitted 7 July, 2023;
originally announced November 2023.
-
Deep learning in computed tomography pulmonary angiography imaging: a dual-pronged approach for pulmonary embolism detection
Authors:
Fabiha Bushra,
Muhammad E. H. Chowdhury,
Rusab Sarmun,
Saidul Kabir,
Menatalla Said,
Sohaib Bassam Zoghoul,
Adam Mushtak,
Israa Al-Hashimi,
Abdulrahman Alqahtani,
Anwarul Hasan
Abstract:
The increasing reliance on Computed Tomography Pulmonary Angiography (CTPA) for Pulmonary Embolism (PE) diagnosis presents challenges and a pressing need for improved diagnostic solutions. The primary objective of this study is to leverage deep learning techniques to enhance the Computer Assisted Diagnosis (CAD) of PE. With this aim, we propose a classifier-guided detection approach that effective…
▽ More
The increasing reliance on Computed Tomography Pulmonary Angiography (CTPA) for Pulmonary Embolism (PE) diagnosis presents challenges and a pressing need for improved diagnostic solutions. The primary objective of this study is to leverage deep learning techniques to enhance the Computer Assisted Diagnosis (CAD) of PE. With this aim, we propose a classifier-guided detection approach that effectively leverages the classifier's probabilistic inference to direct the detection predictions, marking a novel contribution in the domain of automated PE diagnosis. Our classification system includes an Attention-Guided Convolutional Neural Network (AG-CNN) that uses local context by employing an attention mechanism. This approach emulates a human expert's attention by looking at both global appearances and local lesion regions before making a decision. The classifier demonstrates robust performance on the FUMPE dataset, achieving an AUROC of 0.927, sensitivity of 0.862, specificity of 0.879, and an F1-score of 0.805 with the Inception-v3 backbone architecture. Moreover, AG-CNN outperforms the baseline DenseNet-121 model, achieving an 8.1% AUROC gain. While previous research has mostly focused on finding PE in the main arteries, our use of cutting-edge object detection models and ensembling techniques greatly improves the accuracy of detecting small embolisms in the peripheral arteries. Finally, our proposed classifier-guided detection approach further refines the detection metrics, contributing new state-of-the-art to the community: mAP$_{50}$, sensitivity, and F1-score of 0.846, 0.901, and 0.779, respectively, outperforming the former benchmark with a significant 3.7% improvement in mAP$_{50}$. Our research aims to elevate PE patient care by integrating AI solutions into clinical workflows, highlighting the potential of human-AI collaboration in medical diagnostics.
△ Less
Submitted 5 January, 2024; v1 submitted 9 November, 2023;
originally announced November 2023.
-
Secure Mobile Payment Architecture Enabling Multi-factor Authentication
Authors:
Hosam Alamleh,
Ali Abdullah S. AlQahtani,
Baker Al Smadi
Abstract:
The rise of smartphones has led to a significant increase in the usage of mobile payments. Mobile payments allow individuals to access financial resources and make transactions through their mobile devices while on the go. However, the current mobile payment systems were designed to align with traditional payment structures, which limits the full potential of smartphones, including their security…
▽ More
The rise of smartphones has led to a significant increase in the usage of mobile payments. Mobile payments allow individuals to access financial resources and make transactions through their mobile devices while on the go. However, the current mobile payment systems were designed to align with traditional payment structures, which limits the full potential of smartphones, including their security features. This has become a major concern in the rapidly growing mobile payment market. To address these security concerns,in this paper we propose new mobile payment architecture. This architecture leverages the advanced capabilities of modern smartphones to verify various aspects of a payment, such as funds, biometrics, location, and others. The proposed system aims to guarantee the legitimacy of transactions and protect against identity theft by verifying multiple elements of a payment. The security of mobile payment systems is crucial, given the rapid growth of the market. Evaluating mobile payment systems based on their authentication, encryption, and fraud detection capabilities is of utmost importance. The proposed architecture provides a secure mobile payment solution that enhances the overall payment experience by taking advantage of the advanced capabilities of modern smartphones. This will not only improve the security of mobile payments but also offer a more user-friendly payment experience for consumers.
△ Less
Submitted 19 April, 2023;
originally announced April 2023.
-
Zero-Effort Two-Factor Authentication Using Wi-Fi Radio Wave Transmission and Machine Learning
Authors:
Ali Abdullah S. AlQahtani,
Thamraa Alshayeb
Abstract:
The proliferation of sensitive information being stored online highlights the pressing need for secure and efficient user authentication methods. To address this issue, this paper presents a novel zero-effort two-factor authentication (2FA) approach that combines the unique characteristics of a users environment and Machine Learning (ML) to confirm their identity. Our proposed approach utilizes Wi…
▽ More
The proliferation of sensitive information being stored online highlights the pressing need for secure and efficient user authentication methods. To address this issue, this paper presents a novel zero-effort two-factor authentication (2FA) approach that combines the unique characteristics of a users environment and Machine Learning (ML) to confirm their identity. Our proposed approach utilizes Wi-Fi radio wave transmission and ML algorithms to analyze beacon frame characteristics and Received Signal Strength Indicator (RSSI) values from Wi-Fi access points to determine the users location. The aim is to provide a secure and efficient method of authentication without the need for additional hardware or software. A prototype was developed using Raspberry Pi devices and experiments were conducted to demonstrate the effectiveness and practicality of the proposed approach. Results showed that the proposed system can significantly enhance the security of sensitive information in various industries such as finance, healthcare, and retail. This study sheds light on the potential of Wi-Fi radio waves and RSSI values as a means of user authentication and the power of ML to identify patterns in wireless signals for security purposes. The proposed system holds great promise in revolutionizing the field of 2FA and user authentication, offering a new era of secure and seamless access to sensitive information.
△ Less
Submitted 4 March, 2023;
originally announced March 2023.
-
ML for Location Prediction Using RSSI On WiFi 2.4 GHZ Frequency Band
Authors:
Ali Abdullah S. AlQahtani,
Nazim Choudhury
Abstract:
For decades, the determination of an objects location has been implemented utilizing different technologies. Despite GPS (Global Positioning System) provides a scalable efficient and cost effective location services however the satellite emitted signals cannot be exploited indoor to effectively determine the location. In contrast to GPS which is a cost effective localization technology for outdoor…
▽ More
For decades, the determination of an objects location has been implemented utilizing different technologies. Despite GPS (Global Positioning System) provides a scalable efficient and cost effective location services however the satellite emitted signals cannot be exploited indoor to effectively determine the location. In contrast to GPS which is a cost effective localization technology for outdoor locations several technologies have been studied for indoor localization. These include Wireless Fidelity (Wi-Fi) Bluetooth Low Energy (BLE) and Received Signal Strength Indicator (RSSI) etc. This paper presents an enhanced method of using RSSI as a mean to determine an objects location by applying some Machine Learning (ML) concepts. The binary classification is defined by considering the adjacency of the coordinates denoting objects locations. The proposed features were tested empirically via multiple classifiers that achieved a maximum of 96 percent accuracy.
△ Less
Submitted 1 October, 2022;
originally announced October 2022.
-
Technical Report-IoT Devices Proximity Authentication In Ad Hoc Network Environment
Authors:
Ali Abdullah S. AlQahtani,
Hosam Alamleh,
Baker Al Smadi
Abstract:
Internet of Things (IoT) is a distributed communication technology system that offers the possibility for physical devices (e.g. vehicles home appliances sensors actuators etc.) known as Things to connect and exchange data more importantly without human interaction. Since IoT plays a significant role in our daily lives we must secure the IoT environment to work effectively. Among the various secur…
▽ More
Internet of Things (IoT) is a distributed communication technology system that offers the possibility for physical devices (e.g. vehicles home appliances sensors actuators etc.) known as Things to connect and exchange data more importantly without human interaction. Since IoT plays a significant role in our daily lives we must secure the IoT environment to work effectively. Among the various security requirements authentication to the IoT devices is essential as it is the first step in preventing any negative impact of possible attackers. Using the current IEEE 802.11 infrastructure this paper implements an IoT devices authentication scheme based on something that is in the IoT devices environment (i.e. ambient access points). Data from the broadcast messages (i.e. beacon frame characteristics) are utilized to implement the authentication factor that confirms proximity between two devices in an ad hoc IoT network.
△ Less
Submitted 30 September, 2022;
originally announced October 2022.
-
Preprint: Privacy-preserving IoT Data Sharing Scheme
Authors:
Ali Abdullah S. AlQahtani,
Hosam Alamleh,
Reem Alrawili
Abstract:
Data sharing can be granted using different factors one of which is something in a users or an IoT devices environment which is in this paper broadcast signals. Using broadcast signals to measure Received Signal Strength Indicator values and Machine Learning models this paper implements an IoT data sharing scheme based on something that is in an IoT devices environment. The proposed scheme is expe…
▽ More
Data sharing can be granted using different factors one of which is something in a users or an IoT devices environment which is in this paper broadcast signals. Using broadcast signals to measure Received Signal Strength Indicator values and Machine Learning models this paper implements an IoT data sharing scheme based on something that is in an IoT devices environment. The proposed scheme is experimentally tested using different ML models and shows 97.78 percent as its highest accuracy.
△ Less
Submitted 26 September, 2022;
originally announced September 2022.
-
Energy Efficient VM Placement in a Heterogeneous Fog Computing Architecture
Authors:
Abdullah M. Alqahtani,
Barzan Yosuf,
Sanaa H. Mohamed,
Taisir E. H. El-Gorashi,
Jaafar M. H. Elmirghani
Abstract:
Recent years have witnessed a remarkable development in communication and computing systems, mainly driven by the increasing demands of data and processing intensive applications such as virtual reality, M2M, connected vehicles, IoT services, to name a few. Massive amounts of data will be collected by various mobile and fixed terminals that will need to be processed in order to extract knowledge f…
▽ More
Recent years have witnessed a remarkable development in communication and computing systems, mainly driven by the increasing demands of data and processing intensive applications such as virtual reality, M2M, connected vehicles, IoT services, to name a few. Massive amounts of data will be collected by various mobile and fixed terminals that will need to be processed in order to extract knowledge from the data. Traditionally, a centralized approach is taken for processing the collected data using large data centers connected to a core network. However, due to the scale of the Internet-connected things, transporting raw data all the way to the core network is costly in terms of the power consumption, delay, and privacy. This has compelled researchers to propose different decentralized computing paradigms such as fog computing to process collected data at the network edge close to the terminals and users. In this paper, we study, in a Passive Optical Network (PON)-based collaborative-fog computing system, the impact of the heterogeneity of the fog units capacity and energy-efficiency on the overall energy-efficiency of the fog system. We optimized the virtual machine (VM) placement in this fog system with three fog cells and formulated the problem as a mixed integer linear programming (MILP) optimization model with the objective of minimizing the networking and processing power consumption of the fog system. The results indicate that in our proposed architecture, the processing power consumption is the crucial element to achieve energy efficient VMs placement.
△ Less
Submitted 26 March, 2022;
originally announced March 2022.
-
A Quantitative and Qualitative Analysis of Schizophrenia Language
Authors:
Amal Alqahtani,
Efsun Sarioglu Kay,
Sardar Hamidian,
Michael Compton,
Mona Diab
Abstract:
Schizophrenia is one of the most disabling mental health conditions to live with. Approximately one percent of the population has schizophrenia which makes it fairly common, and it affects many people and their families. Patients with schizophrenia suffer different symptoms: formal thought disorder (FTD), delusions, and emotional flatness. In this paper, we quantitatively and qualitatively analyze…
▽ More
Schizophrenia is one of the most disabling mental health conditions to live with. Approximately one percent of the population has schizophrenia which makes it fairly common, and it affects many people and their families. Patients with schizophrenia suffer different symptoms: formal thought disorder (FTD), delusions, and emotional flatness. In this paper, we quantitatively and qualitatively analyze the language of patients with schizophrenia measuring various linguistic features in two modalities: speech and written text. We examine the following features: coherence and cohesion of thoughts, emotions, specificity, level of committed belief (LCB), and personality traits. Our results show that patients with schizophrenia score high in fear and neuroticism compared to healthy controls. In addition, they are more committed to their beliefs, and their writing lacks details. They score lower in most of the linguistic features of cohesion with significant p-values.
△ Less
Submitted 25 January, 2022;
originally announced January 2022.
-
Energy Efficient Resource Allocation in Federated Fog Computing Networks
Authors:
Abdullah M. Alqahtani,
Barzan Yosuf,
Sanaa H. Mohamed,
Taisir E. H. El-Gorashi,
Jaafar M. H. Elmirghani
Abstract:
There is a continuous growth in demand for time sensitive applications which has shifted the cloud paradigm from a centralized computing architecture towards distributed heterogeneous computing platforms where resources located at the edge of the network are used to provide cloud-like services. This paradigm is widely known as fog computing. Virtual machines (VMs) have been widely utilized in both…
▽ More
There is a continuous growth in demand for time sensitive applications which has shifted the cloud paradigm from a centralized computing architecture towards distributed heterogeneous computing platforms where resources located at the edge of the network are used to provide cloud-like services. This paradigm is widely known as fog computing. Virtual machines (VMs) have been widely utilized in both paradigms to enhance the network scalability, improve resource utilization, and energy efficiency. Moreover, Passive Optical Networks (PONs) are a technology suited to handling the enormous volumes of data generated in the access network due to their energy efficiency and large bandwidth. In this paper, we utilize a PON to provide the connectivity between multiple distributed fog units to achieve federated (i.e. cooperative) computing units in the access network to serve intensive demands. We propose a mixed integer linear program (MILP) to optimize the VM placement in the federated fog computing units with the objective of minimizing the total power consumption while considering inter-VM traffic. The results show a significant power saving as a result of the proposed optimization model by up to 52%, in the VM-allocation compared to a baseline approach that allocates the VM requests while neglecting the power consumption and inter-VMs traffic in the optimization framework.
△ Less
Submitted 28 October, 2021;
originally announced October 2021.
-
Energy Minimized Federated Fog Computing over Passive Optical Networks
Authors:
Abdullah M. Alqahtani,
Barzan Yosuf,
Sanaa H. Mohamed,
Taisir E. H. El-Gorashi,
Jaafar M. H. Elmirghani
Abstract:
The rapid growth of time-sensitive applications and services has driven enhancements to computing infrastructures. The main challenge that needs addressing for these applications is the optimal placement of the end-users demands to reduce the total power consumption and delay. One of the widely adopted paradigms to address such a challenge is fog computing. Placing fog units close to end-users at…
▽ More
The rapid growth of time-sensitive applications and services has driven enhancements to computing infrastructures. The main challenge that needs addressing for these applications is the optimal placement of the end-users demands to reduce the total power consumption and delay. One of the widely adopted paradigms to address such a challenge is fog computing. Placing fog units close to end-users at the edge of the network can help mitigate some of the latency and energy efficiency issues. Compared to the traditional hyperscale cloud data centres, fog computing units are constrained by computational power, hence, the capacity of fog units plays a critical role in meeting the stringent demands of the end-users due to intensive processing workloads. In this paper, we aim to optimize the placement of virtual machines (VMs) demands originating from end-users in a fog computing setting by formulating a Mixed Integer Linear Programming (MILP) model to minimize the total power consumption through the use of a federated architecture made up of multiple distributed fog cells. The obtained results show an increase in processing capacity in the fog layer and a reduction in the power consumption by up to 26% compared to the Non-Federated fogs network.
△ Less
Submitted 21 May, 2021;
originally announced May 2021.
-
PON-based connectivity for fog computing
Authors:
Abdullah M. Alqahtani,
Sanaa H. Mohamed,
Taisir E. H. El-Gorashi,
Jaafar M. H. Elmirghani
Abstract:
Fog computing plays a crucial role in satisfying the requirements of delay-sensitive applications such as connected vehicles, smart grids, and actuator networks by moving data processing close to end users. Passive optical networks (PONs) are widely used in access networks to reduce the power consumption while providing high bandwidth to end users under flexible designs. Typically, distributed fog…
▽ More
Fog computing plays a crucial role in satisfying the requirements of delay-sensitive applications such as connected vehicles, smart grids, and actuator networks by moving data processing close to end users. Passive optical networks (PONs) are widely used in access networks to reduce the power consumption while providing high bandwidth to end users under flexible designs. Typically, distributed fog computing units in access networks have limited processing and storage capacities that can be under or over utilized depending on instantaneous demands. To extend the available capacity in access network, this paper proposes a fog computing architecture based on SDN-enabled PONs to achieve full connectivity among distributed fog computing servers. The power consumption results show that this architecture can achieve up to about 80% power savings in comparison to legacy fog computing based on spine and leaf data centers with the same number of servers.
△ Less
Submitted 2 May, 2020;
originally announced May 2020.
-
Constrained Clustering: General Pairwise and Cardinality Constraints
Authors:
Adel Bibi,
Ali Alqahtani,
Bernard Ghanem
Abstract:
We study constrained clustering, where constraints guide the clustering process. In existing works, two categories of constraints have been widely explored, namely pairwise and cardinality constraints. Pairwise constraints enforce the cluster labels of two instances to be the same (must-link constraints) or different (cannot-link constraints). Cardinality constraints encourage cluster sizes to sat…
▽ More
We study constrained clustering, where constraints guide the clustering process. In existing works, two categories of constraints have been widely explored, namely pairwise and cardinality constraints. Pairwise constraints enforce the cluster labels of two instances to be the same (must-link constraints) or different (cannot-link constraints). Cardinality constraints encourage cluster sizes to satisfy a user-specified distribution. Most existing constrained clustering models can only utilize one category of constraints at a time. We enforce the above two categories into a unified clustering model starting with the integer program formulation of the standard K-means. As the two categories provide different useful information, utilizing both allow for better clustering performance. However, the optimization is difficult due to the binary and quadratic constraints in the unified formulation. To solve this, we utilize two techniques: equivalently replacing the binary constraints by the intersection of two continuous constraints; the other is transforming the quadratic constraints into bi-linear constraints by introducing extra variables. We derive an equivalent continuous reformulation with simple constraints, which can be efficiently solved by Alternating Direction Method of Multipliers. Extensive experiments on both synthetic and real data demonstrate when: (1) utilizing a single category of constraint, the proposed model is superior to or competitive with SOTA constrained clustering models, and (2) utilizing both categories of constraints jointly, the proposed model shows better performance than the case of the single category. The experiments show that the proposed method exploits the constraints to achieve perfect clustering performance with improved clustering to 2%-5% in classical clustering metrics, e.g. Adjusted Random, Mirkin's, and Huber's, indices outerperfomring other methods.
△ Less
Submitted 27 January, 2023; v1 submitted 24 July, 2019;
originally announced July 2019.
-
Social Credibility Incorporating Semantic Analysis and Machine Learning: A Survey of the State-of-the-Art and Future Research Directions
Authors:
Bilal Abu-Salih,
Bushra Bremie,
Pornpit Wongthongtham,
Kevin Duan,
Tomayess Issa,
Kit Yan Chan,
Mohammad Alhabashneh,
Teshreen Albtoush,
Sulaiman Alqahtani,
Abdullah Alqahtani,
Muteeb Alahmari,
Naser Alshareef,
Abdulaziz Albahlal
Abstract:
The wealth of Social Big Data (SBD) represents a unique opportunity for organisations to obtain the excessive use of such data abundance to increase their revenues. Hence, there is an imperative need to capture, load, store, process, analyse, transform, interpret, and visualise such manifold social datasets to develop meaningful insights that are specific to an application domain. This paper lays…
▽ More
The wealth of Social Big Data (SBD) represents a unique opportunity for organisations to obtain the excessive use of such data abundance to increase their revenues. Hence, there is an imperative need to capture, load, store, process, analyse, transform, interpret, and visualise such manifold social datasets to develop meaningful insights that are specific to an application domain. This paper lays the theoretical background by introducing the state-of-the-art literature review of the research topic. This is associated with a critical evaluation of the current approaches, and fortified with certain recommendations indicated to bridge the research gap.
△ Less
Submitted 27 February, 2019;
originally announced February 2019.
-
End-to-End Service Level Agreement Specification for IoT Applications
Authors:
Awatif Alqahtani,
Yinhao Li,
Pankesh Patel,
Ellis Solaiman,
Rajiv Ranjan
Abstract:
The Internet of Things (IoT) promises to help solve a wide range of issues that relate to our wellbeing within application domains that include smart cities, healthcare monitoring, and environmental monitoring. IoT is bringing new wireless sensor use cases by taking advantage of the computing power and flexibility provided by Edge and Cloud Computing. However, the software and hardware resources u…
▽ More
The Internet of Things (IoT) promises to help solve a wide range of issues that relate to our wellbeing within application domains that include smart cities, healthcare monitoring, and environmental monitoring. IoT is bringing new wireless sensor use cases by taking advantage of the computing power and flexibility provided by Edge and Cloud Computing. However, the software and hardware resources used within such applications must perform correctly and optimally. Especially in applications where a failure of resources can be critical. Service Level Agreements (SLA) where the performance requirements of such applications are defined, need to be specified in a standard way that reflects the end-to-end nature of IoT application domains, accounting for the Quality of Service (QoS) metrics within every layer including the Edge, Network Gateways, and Cloud. In this paper, we propose a conceptual model that captures the key entities of an SLA and their relationships, as a prior step for end-to-end SLA specification and composition. Service level objective (SLO) terms are also considered to express the QoS constraints. Moreover, we propose a new SLA grammar which considers workflow activities and the multi-layered nature of IoT applications. Accordingly, we develop a tool for SLA specification and composition that can be used as a template to generate SLAs in a machine-readable format. We demonstrate the effectiveness of the proposed specification language through a literature survey that includes an SLA language comparison analysis, and via reflecting the user satisfaction results of a usability study.
△ Less
Submitted 13 October, 2018;
originally announced October 2018.
-
Demonstration Abstract: A Toolkit for Specifying Service Level Agreements for IoT applications
Authors:
Awatif Alqahtani,
Pankesh Patel,
Ellis Solaiman,
Rajiv Ranjan
Abstract:
Today we see the use of the Internet of Things (IoT) in various application domains such as healthcare, smart homes, smart cars, and smart-x applications in smart cities. The number of applications based on IoT and cloud computing is projected to increase rapidly over the next few years. IoT-based services must meet the guaranteed levels of quality of service (QoS) to match users' expectations. En…
▽ More
Today we see the use of the Internet of Things (IoT) in various application domains such as healthcare, smart homes, smart cars, and smart-x applications in smart cities. The number of applications based on IoT and cloud computing is projected to increase rapidly over the next few years. IoT-based services must meet the guaranteed levels of quality of service (QoS) to match users' expectations. Ensuring QoS through specifying the QoS constraints using Service Level Agreements (SLAs) is crucial. Therefore, as a first step toward SLA management, it is essential to provide an SLA specification in a machine-readable format. In this paper, we demonstrate a toolkit for creating SLA specifications for IoT applications. The toolkit is used to simplify the process of capturing the requirements of IoT applications. We present a demonstration of the toolkit using a Remote Health Monitoring Service (RHMS) usecase. The toolkit supports the following: (1) specifying the Service-Level Objectives (SLO) of an IoT application at the application level; (2) specifying the workflow activities of the IoT application; (3) map** each activity to the required software and hardware resources and specifying the constraints of SLOs and other configuration- related metrics of the required hardware and software; and (4) creating the composed SLA in JSON format.
△ Less
Submitted 5 October, 2018;
originally announced October 2018.
-
A Unified Knowledge Representation and Context-aware Recommender System in Internet of Things
Authors:
Yinhao Li,
Awa Alqahtani,
Ellis Solaiman,
Charith Perera,
Prem Prakash Jayaraman,
Boualem Benatallah,
Rajiv Ranjan
Abstract:
Within the rapidly develo** Internet of Things (IoT), numerous and diverse physical devices, Edge devices, Cloud infrastructure, and their quality of service requirements (QoS), need to be represented within a unified specification in order to enable rapid IoT application development, monitoring, and dynamic reconfiguration. But heterogeneities among different configuration knowledge representat…
▽ More
Within the rapidly develo** Internet of Things (IoT), numerous and diverse physical devices, Edge devices, Cloud infrastructure, and their quality of service requirements (QoS), need to be represented within a unified specification in order to enable rapid IoT application development, monitoring, and dynamic reconfiguration. But heterogeneities among different configuration knowledge representation models pose limitations for acquisition, discovery and curation of configuration knowledge for coordinated IoT applications. This paper proposes a unified data model to represent IoT resource configuration knowledge artifacts. It also proposes IoT-CANE (Context-Aware recommendatioN systEm) to facilitate incremental knowledge acquisition and declarative context driven knowledge recommendation.
△ Less
Submitted 24 May, 2018; v1 submitted 10 May, 2018;
originally announced May 2018.