-
FedPot: A Quality-Aware Collaborative and Incentivized Honeypot-Based Detector for Smart Grid Networks
Authors:
Abdullatif Albaseer,
Nima Abdi,
Mohamed Abdallah,
Marwa Qaraqe,
Saif Alkuwari
Abstract:
Honeypot technologies provide an effective defense strategy for the Industrial Internet of Things (IIoT), particularly in enhancing the Advanced Metering Infrastructure's (AMI) security by bolstering the network intrusion detection system. For this security paradigm to be fully realized, it necessitates the active participation of small-scale power suppliers (SPSs) in implementing honeypots and en…
▽ More
Honeypot technologies provide an effective defense strategy for the Industrial Internet of Things (IIoT), particularly in enhancing the Advanced Metering Infrastructure's (AMI) security by bolstering the network intrusion detection system. For this security paradigm to be fully realized, it necessitates the active participation of small-scale power suppliers (SPSs) in implementing honeypots and engaging in collaborative data sharing with traditional power retailers (TPRs). To motivate this interaction, TPRs incentivize data sharing with tangible rewards. However, without access to an SPS's confidential data, it is daunting for TPRs to validate shared data, thereby risking SPSs' privacy and increasing sharing costs due to voluminous honeypot logs. These challenges can be resolved by utilizing Federated Learning (FL), a distributed machine learning (ML) technique that allows for model training without data relocation. However, the conventional FL algorithm lacks the requisite functionality for both the security defense model and the rewards system of the AMI network. This work presents two solutions: first, an enhanced and cost-efficient FedAvg algorithm incorporating a novel data quality measure, and second, FedPot, the development of an effective security model with a fair incentives mechanism under an FL architecture. Accordingly, SPSs are limited to sharing the ML model they learn after efficiently measuring their local data quality, whereas TPRs can verify the participants' uploaded models and fairly compensate each participant for their contributions through rewards. Simulation results, drawn from realistic mircorgrid network log datasets, demonstrate that the proposed solutions outperform state-of-the-art techniques by enhancing the security model and guaranteeing fair reward distributions.
△ Less
Submitted 3 July, 2024;
originally announced July 2024.
-
Enhancing Trust and Security in the Vehicular Metaverse: A Reputation-Based Mechanism for Participants with Moral Hazard
Authors:
Ismail Lotfi,
Marwa Qaraqe,
Ali Ghrayeb,
Niyato Dusit
Abstract:
In this paper, we tackle the issue of moral hazard within the realm of the vehicular Metaverse. A pivotal facilitator of the vehicular Metaverse is the effective orchestration of its market elements, primarily comprised of sensing internet of things (SIoT) devices. These SIoT devices play a critical role by furnishing the virtual service provider (VSP) with real-time sensing data, allowing for the…
▽ More
In this paper, we tackle the issue of moral hazard within the realm of the vehicular Metaverse. A pivotal facilitator of the vehicular Metaverse is the effective orchestration of its market elements, primarily comprised of sensing internet of things (SIoT) devices. These SIoT devices play a critical role by furnishing the virtual service provider (VSP) with real-time sensing data, allowing for the faithful replication of the physical environment within the virtual realm. However, SIoT devices with intentional misbehavior can identify a loophole in the system post-payment and proceeds to deliver falsified content, which cause the whole vehicular Metaverse to collapse. To combat this significant problem, we propose an incentive mechanism centered around a reputation-based strategy. Specifically, the concept involves maintaining reputation scores for participants based on their interactions with the VSP. These scores are derived from feedback received by the VSP from Metaverse users regarding the content delivered by the VSP and are managed using a subjective logic model. Nevertheless, to prevent ``good" SIoT devices with false positive ratings to leave the Metaverse market, we build a vanishing-like system of previous ratings so that the VSP can make informed decisions based on the most recent and accurate data available. Finally, we validate our proposed model through extensive simulations. Our primary results show that our mechanism can efficiently prevent malicious devices from starting their poisoning attacks. At the same time, trustworthy SIoT devices that had a previous miss-classification are not banned from the market.
△ Less
Submitted 23 May, 2024;
originally announced May 2024.
-
Performance Analysis of Underwater Acoustic Channel Amid Jamming by Random Jammers
Authors:
Waqas Aman,
Saif Al-Kuwari,
Marwa Qaraqe
Abstract:
Underwater communication networks are increasingly popularized by various important maritime applications. However, this also leads to an increased threat landscape. This letter presents the first study that considers jamming attacks by random jammers present in the surroundings of legitimate transceivers in underwater acoustic communication systems. We investigate the impact of jamming attacks on…
▽ More
Underwater communication networks are increasingly popularized by various important maritime applications. However, this also leads to an increased threat landscape. This letter presents the first study that considers jamming attacks by random jammers present in the surroundings of legitimate transceivers in underwater acoustic communication systems. We investigate the impact of jamming attacks on various performance parameters of the legitimate underwater acoustic communication link. In particular, we investigate the legitimate link using stochastic geometry for important performance parameters, namely coverage probability, average rate, and energy efficiency of the link between two legitimate nodes, i.e., underwater and surface nodes. We then derive and present tractable expressions for these performance parameters. Finally, we performed a Monte Carlo simulation to validate our analysis. We plot the performance metrics against the transmit power, and jamming power for different intensities of the jammers in shallow, mid, and deep water scenarios. Results reveal that on average, jamming in deep water has a relatively high impact on the performance of legitimate link than in shallow water.
△ Less
Submitted 5 May, 2024;
originally announced May 2024.
-
On the Secrecy Enhancement of an Integrated Ground-Aerial Network with a Hybrid FSO/THz Feeder Link
Authors:
Elmehdi Illi,
Marwa Qaraqe
Abstract:
High altitude platforms (HAPs)-aided terrestrial-aerial communication technology based on free-space optical (FSO) and Terahertz (THz) feeder links has been attracting notable interest recently due to its great potential in reaching a higher data rate and connectivity. Nonetheless, the presence of harsh vertical propagation environments and potential aerial eavesdroppers are two of the main challe…
▽ More
High altitude platforms (HAPs)-aided terrestrial-aerial communication technology based on free-space optical (FSO) and Terahertz (THz) feeder links has been attracting notable interest recently due to its great potential in reaching a higher data rate and connectivity. Nonetheless, the presence of harsh vertical propagation environments and potential aerial eavesdroppers are two of the main challenges limiting the reliability and security of such a technology. In this work, a secrecy-enhancing scheme for HAP-aided ground-aerial communication is proposed. The considered network consists of HAP-assisted communication between a ground station and a legitimate user under the threat of an aerial and ground eavesdropper. Thus, the proposed scheme leverages (i) HAP diversity by exploiting the presence of multiple flying HAPs and (ii) the use of a hybrid FSO/THz transmission scheme to offer better resilience against eavesdrop** attacks. An analytical secrecy outage probability (SOP) expression is derived for the scheme in consideration. Results manifest the notable gain in security of the proposed scheme with respect to both (i) the single-HAP and (ii) THz feeder-based benchmark ones, where the proposed scheme's SOP is decreased by four orders of magnitude using $4$ HAPs with respect to the first benchmark scheme, while a $5$-dB secrecy gain is manifested with respect to the second benchmark one.
△ Less
Submitted 24 March, 2024;
originally announced March 2024.
-
Expanding Boundaries: Cross-Media Routing for Seamless Underwater and Aerial Communication
Authors:
Waqas Aman,
Flavio Giorgi,
Giulio Attenni,
Saif Al-Kuwari,
Elmehdi Illi,
Marwa Qaraqe,
Gaia Maselli,
Roberto Di Pietro
Abstract:
The colossal evolution of wireless communication technologies over the past few years has driven increased interest in its integration in a variety of less-explored environments, such as the underwater medium. In this magazine paper, we present a comprehensive discussion on a novel concept of routing protocol known as cross-media routing, incorporating the marine and aerial interfaces. In this reg…
▽ More
The colossal evolution of wireless communication technologies over the past few years has driven increased interest in its integration in a variety of less-explored environments, such as the underwater medium. In this magazine paper, we present a comprehensive discussion on a novel concept of routing protocol known as cross-media routing, incorporating the marine and aerial interfaces. In this regard, we discuss the limitation of single-media routing and advocate the need for cross-media routing along with the current status of research development in this direction. To this end, we also propose a novel cross-media routing protocol known as bubble routing for autonomous marine systems where different sets of AUVs, USVs, and airborne nodes are considered for the routing problem. We evaluate the performance of the proposed routing protocol by using the two key performance metrics, i.e., packet delivery ratio (PDR) and end-to-end delay. Moreover, we delve into the challenges encountered in cross-media routing, unveiling exciting opportunities for future research and innovation. As wireless communication expands its horizons to encompass the underwater and aerial domains, understanding and addressing these challenges will pave the way for enhanced cross-media communication and exploration.
△ Less
Submitted 24 July, 2023;
originally announced July 2023.
-
Can Artificial Noise Boost Further the Secrecy of Dual-hop RIS-aided Networks?
Authors:
Elmehdi Illi,
Marwa K. Qaraqe,
Faissal El Bouanani,
Saif M. Al-Kuwari
Abstract:
In this paper, we quantify the physical layer security of a dual-hop regenerative relaying-based wireless communication system assisted by reconfigurable intelligent surfaces (RISs). In particular, the setup consists of a source node communicating with a destination node via a regenerative relay. In this setup, a RIS is installed in each hop to increase the source-relay and relay-destination commu…
▽ More
In this paper, we quantify the physical layer security of a dual-hop regenerative relaying-based wireless communication system assisted by reconfigurable intelligent surfaces (RISs). In particular, the setup consists of a source node communicating with a destination node via a regenerative relay. In this setup, a RIS is installed in each hop to increase the source-relay and relay-destination communications reliability, where the RISs' phase shifts are subject to quantization errors. The legitimate transmission is performed under the presence of a malicious eavesdropper attempting to compromise the legitimate transmissions by overhearing the broadcasted signal from the relay. To overcome this problem, we incorporate a jammer to increase the system's secrecy by disrupting the eavesdropper through a broadcasted jamming signal. Leveraging the well-adopted Gamma and Exponential distributions approximations, the system's secrecy level is quantified by deriving approximate and asymptotic expressions of the secrecy intercept probability (IP) metric in terms of the main network parameters. The results show that the secrecy is enhanced significantly by increasing the jamming power and/or the number of reflective elements (REs). In particular, an IP of approximately $10^{-4}$ can be reached with $40$ REs and $10$ dB of jamming power-to-noise ratio even when the legitimate links' average signal-to-noise ratios are $10$-dB less than the eavesdropper's one. We show that cooperative jamming is very helpful in strong eavesdrop** scenarios with a fixed number of REs, and the number of quantization bits does not influence the secrecy when exceeding $3$ bits. All the analytical results are endorsed by Monte Carlo simulations.
△ Less
Submitted 2 August, 2022;
originally announced August 2022.
-
On the Physical Layer Security of a Dual-Hop UAV-based Network in the Presence of per-hop Eavesdrop** and Imperfect CSI
Authors:
Elmehdi Illi,
Marwa K. Qaraqe,
F. El Bouanani,
Saif M. Al-Kuwari
Abstract:
In this paper, the physical layer security of a dual-hop unmanned aerial vehicle-based wireless network, subject to imperfect channel state information (CSI) and mobility effects, is analyzed. Specifically, a source node $(S)$ communicates with a destination node $(D)$ through a decode-and-forward relay $(R)$, in the presence of two wiretappers $\left(E_{1},E_{2}\right)$ independently trying to co…
▽ More
In this paper, the physical layer security of a dual-hop unmanned aerial vehicle-based wireless network, subject to imperfect channel state information (CSI) and mobility effects, is analyzed. Specifically, a source node $(S)$ communicates with a destination node $(D)$ through a decode-and-forward relay $(R)$, in the presence of two wiretappers $\left(E_{1},E_{2}\right)$ independently trying to compromise the two hops. Furthermore, the transmit nodes $\left(S,R\right) $ have a single transmit antenna, while the receivers $\left(R,D,E_{1},E_{2}\right) $ are equipped with multiple receive antennas. Based on the per-hop signal-to-noise ratios (SNRs) and correlated secrecy capacities' statistics, a closed-form expression for the secrecy intercept probability (IP) metric is derived, in terms of key system parameters. Additionally, asymptotic expressions are revealed for two scenarios, namely (i) mobile nodes with imperfect CSI and (ii) static nodes with perfect CSI. The results show that a zero secrecy diversity order is manifested for the first scenario, due to the presence of a ceiling value of the average SNR, while the IP drops linearly at high average SNR in the second one, where the achievable diversity order depends on the fading parameters and number of antennas of the legitimate links/nodes. Furthermore, for static nodes, the system can be castigated by a $15$ dB secrecy loss at IP$=3\times10^{-3},$ when the CSI imperfection power raises from $0$ to $10^{-3}$. Lastly, the higher the legitimate nodes' speed, carrier frequency, delay, and/or relay's decoding threshold SNR, the worse is the system's secrecy. Monte Carlo simulations endorse the derived analytical results.
△ Less
Submitted 15 May, 2022;
originally announced May 2022.
-
A Mobile Food Recognition System for Dietary Assessment
Authors:
Şeymanur Aktı,
Marwa Qaraqe,
Hazım Kemal Ekenel
Abstract:
Food recognition is an important task for a variety of applications, including managing health conditions and assisting visually impaired people. Several food recognition studies have focused on generic types of food or specific cuisines, however, food recognition with respect to Middle Eastern cuisines has remained unexplored. Therefore, in this paper we focus on develo** a mobile friendly, Mid…
▽ More
Food recognition is an important task for a variety of applications, including managing health conditions and assisting visually impaired people. Several food recognition studies have focused on generic types of food or specific cuisines, however, food recognition with respect to Middle Eastern cuisines has remained unexplored. Therefore, in this paper we focus on develo** a mobile friendly, Middle Eastern cuisine focused food recognition application for assisted living purposes. In order to enable a low-latency, high-accuracy food classification system, we opted to utilize the Mobilenet-v2 deep learning model. As some of the foods are more popular than the others, the number of samples per class in the used Middle Eastern food dataset is relatively imbalanced. To compensate for this problem, data augmentation methods are applied on the underrepresented classes. Experimental results show that using Mobilenet-v2 architecture for this task is beneficial in terms of both accuracy and the memory usage. With the model achieving 94% accuracy on 23 food classes, the developed mobile application has potential to serve the visually impaired in automatic food recognition via images.
△ Less
Submitted 20 April, 2022;
originally announced April 2022.
-
On Optimizing the Power Allocation and the Decoding Order in Uplink Cooperative NOMA
Authors:
Mohamed Elhattab,
Mohamed Amine Arfaoui,
Chadi Assi,
Ali Ghrayeb,
Marwa Qaraqe
Abstract:
In this paper, we investigate for the first time the dynamic power allocation and decoding order at the base station (BS) of two-user uplink (UL) cooperative non-orthogonal multiple access (C-NOMA)-based cellular networks. In doing so, we formulate a joint optimization problem aiming at maximizing the minimum user achievable rate, which is a non-convex optimization problem and hard to be directly…
▽ More
In this paper, we investigate for the first time the dynamic power allocation and decoding order at the base station (BS) of two-user uplink (UL) cooperative non-orthogonal multiple access (C-NOMA)-based cellular networks. In doing so, we formulate a joint optimization problem aiming at maximizing the minimum user achievable rate, which is a non-convex optimization problem and hard to be directly solved. To tackle this issue, an iterative algorithm based on successive convex approximation (SCA) is proposed. The numerical results reveal that the proposed scheme provides superior performance in comparison with the traditional UL NOMA. In addition, we demonstrated that in UL C-NOMA, decoding the far NOMA user first at the BS provides the best performance.
△ Less
Submitted 24 March, 2022;
originally announced March 2022.
-
LoRa-RL: Deep Reinforcement Learning for Resource Management in Hybrid Energy LoRa Wireless Networks
Authors:
Rami Hamdi,
Emna Baccour,
Aiman Erbad,
Marwa Qaraqe,
Mounir Hamdi
Abstract:
LoRa wireless networks are considered as a key enabling technology for next generation internet of things (IoT) systems. New IoT deployments (e.g., smart city scenarios) can have thousands of devices per square kilometer leading to huge amount of power consumption to provide connectivity. In this paper, we investigate green LoRa wireless networks powered by a hybrid of the grid and renewable energ…
▽ More
LoRa wireless networks are considered as a key enabling technology for next generation internet of things (IoT) systems. New IoT deployments (e.g., smart city scenarios) can have thousands of devices per square kilometer leading to huge amount of power consumption to provide connectivity. In this paper, we investigate green LoRa wireless networks powered by a hybrid of the grid and renewable energy sources, which can benefit from harvested energy while dealing with the intermittent supply. This paper proposes resource management schemes of the limited number of channels and spreading factors (SFs) with the objective of improving the LoRa gateway energy efficiency. First, the problem of grid power consumption minimization while satisfying the system's quality of service demands is formulated. Specifically, both scenarios the uncorrelated and time-correlated channels are investigated. The optimal resource management problem is solved by decoupling the formulated problem into two sub-problems: channel and SF assignment problem and energy management problem. Since the optimal solution is obtained with high complexity, online resource management heuristic algorithms that minimize the grid energy consumption are proposed. Finally, taking into account the channel and energy correlation, adaptable resource management schemes based on Reinforcement Learning (RL), are developed. Simulations results show that the proposed resource management schemes offer efficient use of renewable energy in LoRa wireless networks.
△ Less
Submitted 6 September, 2021;
originally announced September 2021.
-
Federated Learning over Energy Harvesting Wireless Networks
Authors:
Rami Hamdi,
Mingzhe Chen,
Ahmed Ben Said,
Marwa Qaraqe,
H. Vincent Poor
Abstract:
In this paper, the deployment of federated learning (FL) is investigated in an energy harvesting wireless network in which the base station (BS) employs massive multiple-input multiple-output (MIMO) to serve a set of users powered by independent energy harvesting sources. Since a certain number of users may not be able to participate in FL due to the interference and energy constraints, a joint en…
▽ More
In this paper, the deployment of federated learning (FL) is investigated in an energy harvesting wireless network in which the base station (BS) employs massive multiple-input multiple-output (MIMO) to serve a set of users powered by independent energy harvesting sources. Since a certain number of users may not be able to participate in FL due to the interference and energy constraints, a joint energy management and user scheduling problem in FL over wireless systems is formulated. This problem is formulated as an optimization problem whose goal is to minimize the FL training loss via optimizing user scheduling. To find how the factors such as transmit power and number of scheduled users affect the training loss, the convergence rate of the FL algorithm is first analyzed. Given this analytical result, the user scheduling and energy management optimization problem can be decomposed, simplified, and solved. Further, the system model is extended by considering multiple BSs. Hence, a joint user association and scheduling problem in FL over wireless systems is studied. The optimal user association problem is solved using the branch-and-bound technique. Simulation results show that the proposed user scheduling and user association algorithm can reduce training loss compared to a standard FL algorithm.
△ Less
Submitted 16 June, 2021;
originally announced June 2021.
-
The Diabetic Buddy: A Diet Regulator andTracking System for Diabetics
Authors:
Muhammad Usman,
Kashif Ahmad,
Amir Sohail,
Marwa Qaraqe
Abstract:
The prevalence of Diabetes mellitus (DM) in the Middle East is exceptionally high as compared to the rest of the world. In fact, the prevalence of diabetes in the Middle East is 17-20%, which is well above the global average of 8-9%. Research has shown that food intake has strong connections with the blood glucose levels of a patient. In this regard, there is a need to build automatic tools to mon…
▽ More
The prevalence of Diabetes mellitus (DM) in the Middle East is exceptionally high as compared to the rest of the world. In fact, the prevalence of diabetes in the Middle East is 17-20%, which is well above the global average of 8-9%. Research has shown that food intake has strong connections with the blood glucose levels of a patient. In this regard, there is a need to build automatic tools to monitor the blood glucose levels of diabetics and their daily food intake. This paper presents an automatic way of tracking continuous glucose and food intake of diabetics using off-the-shelf sensors and machine learning, respectively. Our system not only helps diabetics to track their daily food intake but also assists doctors to analyze the impact of the food in-take on blood glucose in real-time. For food recognition, we collected a large-scale Middle-Eastern food dataset and proposed a fusion-based framework incorporating several existing pre-trained deep models for Middle-Eastern food recognition.
△ Less
Submitted 8 January, 2021;
originally announced January 2021.
-
KaFHCa: Key-establishment via Frequency Hop** Collisions
Authors:
Muhammad Usman,
Simone Raponi,
Marwa Qaraqe,
Gabriele Oligeri
Abstract:
The massive deployment of IoT devices being utilized by home automation, industrial and military scenarios demands for high security and privacy standards to be achieved through innovative solutions. This paper proposes KaFHCa, a crypto-less protocol that generates shared secret keys by combining random frequency hop** collisions and source indistinguishability independently of the radio channel…
▽ More
The massive deployment of IoT devices being utilized by home automation, industrial and military scenarios demands for high security and privacy standards to be achieved through innovative solutions. This paper proposes KaFHCa, a crypto-less protocol that generates shared secret keys by combining random frequency hop** collisions and source indistinguishability independently of the radio channel status. While other solutions tie the secret bit rate generation to the current radio channel conditions, thus becoming unpractical in static environments, KaFHCa guarantees almost the same secret bitrate independently of the channel conditions. KaFHCa generates shared secrets through random collisions of the transmitter and the receiver in the radio spectrum, and leverages on the fading phenomena to achieve source indistinguishability, thus preventing unauthorized eavesdroppers from inferring the key. The proposed solution is (almost) independent of the adversary position, works under the conservative assumption of channel fading (σ = 8dB), and is capable of generating a secret key of 128 bits with less than 564 transmissions.
△ Less
Submitted 20 October, 2020; v1 submitted 19 October, 2020;
originally announced October 2020.
-
Experimental Characterization of In Vivo Wireless Communication Channels
Authors:
A. Fatih Demir,
Qammer H. Abbasi,
Z. Esat Ankarali,
Marwa Qaraqe,
Erchin Serpedin,
Huseyin Arslan
Abstract:
In vivo wireless medical devices have a critical role in healthcare technologies due to their continuous health monitoring and noninvasive surgery capabilities. In order to fully exploit the potential of such devices, it is necessary to characterize the in vivo wireless communication channel which will help to build reliable and high-performance communication systems. This paper presents prelimina…
▽ More
In vivo wireless medical devices have a critical role in healthcare technologies due to their continuous health monitoring and noninvasive surgery capabilities. In order to fully exploit the potential of such devices, it is necessary to characterize the in vivo wireless communication channel which will help to build reliable and high-performance communication systems. This paper presents preliminary results of experimental characterization for this fascinating communications medium on a human cadaver and compares the results with numerical studies.
△ Less
Submitted 9 September, 2016;
originally announced October 2016.