-
Blockchain in the Quantum World
Authors:
Arman Rasoodl Faridi,
Faraz Masood,
Ali Haider Thabet Shamsan,
Mohammad Luqman,
Monir Yahya Salmony
Abstract:
Blockchain is one of the most discussed and highly accepted technologies, primarily due to its application in almost every field where third parties are needed for trust. Blockchain technology relies on distributed consensus for trust, which is accomplished using hash functions and public-key cryptography. Most of the cryptographic algorithms in use today are vulnerable to quantum attacks. In this…
▽ More
Blockchain is one of the most discussed and highly accepted technologies, primarily due to its application in almost every field where third parties are needed for trust. Blockchain technology relies on distributed consensus for trust, which is accomplished using hash functions and public-key cryptography. Most of the cryptographic algorithms in use today are vulnerable to quantum attacks. In this work, a systematic literature review is done so that it can be repeated, starting with identifying the research questions. Focusing on these research questions, literature is analysed to find the answers to these questions. The survey is completed by answering the research questions and identification of the research gaps. It is found in the literature that 30% of the research solutions are applicable for the data layer, 24% for the application and presentation layer, 23% for the network layer, 16% for the consensus layer and only 1% for hardware and infrastructure layer. We also found that 6% of the solutions are not blockchain-based but present different distributed ledger technology.
△ Less
Submitted 1 February, 2022;
originally announced February 2022.
-
An Experimental Analysis of Attack Classification Using Machine Learning in IoT Networks
Authors:
Andrew Churcher,
Rehmat Ullah,
Jawad Ahmad,
Sadaqat ur Rehman,
Fawad Masood,
Mandar Gogate,
Fehaid Alqahtani,
Boubakr Nour,
William J. Buchanan
Abstract:
In recent years, there has been a massive increase in the amount of Internet of Things (IoT) devices as well as the data generated by such devices. The participating devices in IoT networks can be problematic due to their resource-constrained nature, and integrating security on these devices is often overlooked. This has resulted in attackers having an increased incentive to target IoT devices. As…
▽ More
In recent years, there has been a massive increase in the amount of Internet of Things (IoT) devices as well as the data generated by such devices. The participating devices in IoT networks can be problematic due to their resource-constrained nature, and integrating security on these devices is often overlooked. This has resulted in attackers having an increased incentive to target IoT devices. As the number of attacks possible on a network increases, it becomes more difficult for traditional intrusion detection systems (IDS) to cope with these attacks efficiently. In this paper, we highlight several machine learning (ML) methods such as k-nearest neighbour (KNN), support vector machine (SVM), decision tree (DT), naive Bayes (NB), random forest (RF), artificial neural network (ANN), and logistic regression (LR) that can be used in IDS. In this work, ML algorithms are compared for both binary and multi-class classification on Bot-IoT dataset. Based on several parameters such as accuracy, precision, recall, F1 score, and log loss, we experimentally compared the aforementioned ML algorithms. In the case of HTTP distributed denial-of-service (DDoS) attack, the accuracy of RF is 99%. Furthermore, other simulation results-based precision, recall, F1 score, and log loss metric reveal that RF outperforms on all types of attacks in binary classification. However, in multi-class classification, KNN outperforms other ML algorithms with an accuracy of 99%, which is 4% higher than RF.
△ Less
Submitted 10 January, 2021;
originally announced January 2021.
-
Application of Fuzzy Logic in Design of Smart Washing Machine
Authors:
Rao Farhat Masood
Abstract:
Washing machine is of great domestic necessity as it frees us from the burden of washing our clothes and saves ample of our time. This paper will cover the aspect of designing and develo** of Fuzzy Logic based, Smart Washing Machine. The regular washing machine (timer based) makes use of multi-turned timer based start-stop mechanism which is mechanical as is prone to breakage. In addition to its…
▽ More
Washing machine is of great domestic necessity as it frees us from the burden of washing our clothes and saves ample of our time. This paper will cover the aspect of designing and develo** of Fuzzy Logic based, Smart Washing Machine. The regular washing machine (timer based) makes use of multi-turned timer based start-stop mechanism which is mechanical as is prone to breakage. In addition to its starting and stop** issues, the mechanical timers are not efficient with respect of maintenance and electricity usage. Recent developments have shown that merger of digital electronics in optimal functionality of this machine is possible and nowadays in practice. A number of international renowned companies have developed the machine with the introduction of smart artificial intelligence. Such a machine makes use of sensors and smartly calculates the amount of run-time (washing time) for the main machine motor. Realtime calculations and processes are also catered in optimizing the run-time of the machine. The obvious result is smart time management, better economy of electricity and efficiency of work. This paper deals with the indigenization of FLC (Fuzzy Logic Controller) based Washing Machine, which is capable of automating the inputs and getting the desired output (wash-time).
△ Less
Submitted 15 March, 2017; v1 submitted 4 January, 2017;
originally announced January 2017.
-
Adaptive Modulation (QPSK, QAM)
Authors:
Rao Farhat Masood
Abstract:
In this paper, introduced below are the concepts of digital modulation used in many communication systems today. Techniques described include quadrature phase shift keying (QPSK) and quadrature amplitude modulation (QAM) and how these techniques can be used to increase the capacity and speed of a wireless network. These modulation techniques are the basis of communications for systems like cable m…
▽ More
In this paper, introduced below are the concepts of digital modulation used in many communication systems today. Techniques described include quadrature phase shift keying (QPSK) and quadrature amplitude modulation (QAM) and how these techniques can be used to increase the capacity and speed of a wireless network. These modulation techniques are the basis of communications for systems like cable modems, DSL modems, CDMA, 3G, Wi-Fi* (IEEE 802.11) and WiMAX* (IEEE 802.16).
△ Less
Submitted 28 February, 2013;
originally announced February 2013.
-
A Study on Digital Video Broadcasting to a Handheld Device (DVB-H), Operating in UHF Band
Authors:
Farhat Masood
Abstract:
In this paper, we will understand that the development of the Digital Video Broadcasting to a Handheld (DVB-H) standard makes it possible to deliver live broadcast television to a mobile handheld device. Building upon the strengths of the Digital Video Broadcasting - Terrestrial (DVB-T) standard in use in millions of homes, DVB-H recognizes the trend towards the personal consumption of media.
In this paper, we will understand that the development of the Digital Video Broadcasting to a Handheld (DVB-H) standard makes it possible to deliver live broadcast television to a mobile handheld device. Building upon the strengths of the Digital Video Broadcasting - Terrestrial (DVB-T) standard in use in millions of homes, DVB-H recognizes the trend towards the personal consumption of media.
△ Less
Submitted 8 February, 2011;
originally announced February 2011.
-
RISC and CISC
Authors:
Farhat Masood
Abstract:
Comparison of RISC & CISC in details, encompassing the addressing modes, evolution, definitions and characteristics. Pre - RISC design is also elaborated. Both the architectures are explained with the help of example. Analysis is made based on performance.
Comparison of RISC & CISC in details, encompassing the addressing modes, evolution, definitions and characteristics. Pre - RISC design is also elaborated. Both the architectures are explained with the help of example. Analysis is made based on performance.
△ Less
Submitted 27 January, 2011;
originally announced January 2011.