-
Think Like a Person Before Responding: A Multi-Faceted Evaluation of Persona-Guided LLMs for Countering Hate
Authors:
Mikel K. Ngueajio,
Flor Miriam Plaza-del-Arco,
Yi-Ling Chung,
Danda B. Rawat,
Amanda Cercas Curry
Abstract:
Automated counter-narratives (CN) offer a promising strategy for mitigating online hate speech, yet concerns about their affective tone, accessibility, and ethical risks remain. We propose a framework for evaluating Large Language Model (LLM)-generated CNs across four dimensions: persona framing, verbosity and readability, affective tone, and ethical robustness. Using GPT-4o-Mini, Cohere's Command…
▽ More
Automated counter-narratives (CN) offer a promising strategy for mitigating online hate speech, yet concerns about their affective tone, accessibility, and ethical risks remain. We propose a framework for evaluating Large Language Model (LLM)-generated CNs across four dimensions: persona framing, verbosity and readability, affective tone, and ethical robustness. Using GPT-4o-Mini, Cohere's CommandR-7B, and Meta's LLaMA 3.1-70B, we assess three prompting strategies on the MT-Conan and HatEval datasets. Our findings reveal that LLM-generated CNs are often verbose and adapted for people with college-level literacy, limiting their accessibility. While emotionally guided prompts yield more empathetic and readable responses, there remain concerns surrounding safety and effectiveness.
△ Less
Submitted 4 June, 2025;
originally announced June 2025.
-
Digital Twin Enabled Site Specific Channel Precoding: Over the Air CIR Inference
Authors:
Majumder Haider,
Imtiaz Ahmed,
Zoheb Hassan,
Timothy J. O'Shea,
Lingjia Liu,
Danda B. Rawat
Abstract:
This paper investigates the significance of designing a reliable, intelligent, and true physical environment-aware precoding scheme by leveraging an accurately designed channel twin model to obtain realistic channel state information (CSI) for cellular communication systems. Specifically, we propose a fine-tuned multi-step channel twin design process that can render CSI very close to the CSI of th…
▽ More
This paper investigates the significance of designing a reliable, intelligent, and true physical environment-aware precoding scheme by leveraging an accurately designed channel twin model to obtain realistic channel state information (CSI) for cellular communication systems. Specifically, we propose a fine-tuned multi-step channel twin design process that can render CSI very close to the CSI of the actual environment. After generating a precise CSI, we execute precoding using the obtained CSI at the transmitter end. We demonstrate a two-step parameters' tuning approach to design channel twin by ray tracing (RT) emulation, then further fine-tuning of CSI by employing an artificial intelligence (AI) based algorithm can significantly reduce the gap between actual CSI and the fine-tuned digital twin (DT) rendered CSI. The simulation results show the effectiveness of the proposed novel approach in designing a true physical environment-aware channel twin model.
△ Less
Submitted 27 January, 2025;
originally announced January 2025.
-
AI-Driven Human-Autonomy Teaming in Tactical Operations: Proposed Framework, Challenges, and Future Directions
Authors:
Desta Haileselassie Hagos,
Hassan El Alami,
Danda B. Rawat
Abstract:
Artificial Intelligence (AI) techniques, particularly machine learning techniques, are rapidly transforming tactical operations by augmenting human decision-making capabilities. This paper explores AI-driven Human-Autonomy Teaming (HAT) as a transformative approach, focusing on how it empowers human decision-making in complex environments. While trust and explainability continue to pose significan…
▽ More
Artificial Intelligence (AI) techniques, particularly machine learning techniques, are rapidly transforming tactical operations by augmenting human decision-making capabilities. This paper explores AI-driven Human-Autonomy Teaming (HAT) as a transformative approach, focusing on how it empowers human decision-making in complex environments. While trust and explainability continue to pose significant challenges, our exploration focuses on the potential of AI-driven HAT to transform tactical operations. By improving situational awareness and supporting more informed decision-making, AI-driven HAT can enhance the effectiveness and safety of such operations. To this end, we propose a comprehensive framework that addresses the key components of AI-driven HAT, including trust and transparency, optimal function allocation between humans and AI, situational awareness, and ethical considerations. The proposed framework can serve as a foundation for future research and development in the field. By identifying and discussing critical research challenges and knowledge gaps in this framework, our work aims to guide the advancement of AI-driven HAT for optimizing tactical operations. We emphasize the importance of developing scalable and ethical AI-driven HAT systems that ensure seamless human-machine collaboration, prioritize ethical considerations, enhance model transparency through Explainable AI (XAI) techniques, and effectively manage the cognitive load of human operators.
△ Less
Submitted 28 October, 2024;
originally announced November 2024.
-
Deep Learning Model-Based Channel Estimation for THz Band Massive MIMO with RF Impairments
Authors:
Pulok Tarafder,
Imtiaz Ahmed,
Danda B. Rawat,
Ramesh Annavajjala,
Kumar Vijay Mishra
Abstract:
THz band enabled large scale massive MIMO (M-MIMO) is considered as a key enabler for the 6G technology, given its enormous bandwidth and for its low latency connectivity. In the large-scale M-MIMO configuration, enlarged array aperture and small wavelengths of THz results in an amalgamation of both far field and near field paths, which makes tasks such as channel estimation for THz M-MIMO highly…
▽ More
THz band enabled large scale massive MIMO (M-MIMO) is considered as a key enabler for the 6G technology, given its enormous bandwidth and for its low latency connectivity. In the large-scale M-MIMO configuration, enlarged array aperture and small wavelengths of THz results in an amalgamation of both far field and near field paths, which makes tasks such as channel estimation for THz M-MIMO highly challenging. Moreover, at the THz transceiver, radio frequency (RF) impairments such as phase noise (PN) of the analog devices also leads to degradation in channel estimation performance. Classical estimators as well as traditional deep learning (DL) based algorithms struggle to maintain their robustness when performing for large scale antenna arrays i.e., M-MIMO, and when RF impairments are considered for practical usage. To effectively address this issue, it is crucial to utilize a neural network (NN) that has the ability to study the behaviors of the channel and RF impairment correlations, such as a recurrent neural network (RNN). The RF impairments act as sequential noise data which is subsequently incorporated with the channel data, leading to choose a specific type of RNN known as bidirectional long short-term memory (BiLSTM) which is followed by gated recurrent units (GRU) to process the sequential data. Simulation results demonstrate that our proposed model outperforms other benchmark approaches at various signal-to-noise ratio (SNR) levels.
△ Less
Submitted 24 September, 2024;
originally announced September 2024.
-
Reinforcement Learning-enabled Satellite Constellation Reconfiguration and Retasking for Mission-Critical Applications
Authors:
Hassan El Alami,
Danda B. Rawat
Abstract:
The development of satellite constellation applications is rapidly advancing due to increasing user demands, reduced operational costs, and technological advancements. However, a significant gap in the existing literature concerns reconfiguration and retasking issues within satellite constellations, which is the primary focus of our research. In this work, we critically assess the impact of satell…
▽ More
The development of satellite constellation applications is rapidly advancing due to increasing user demands, reduced operational costs, and technological advancements. However, a significant gap in the existing literature concerns reconfiguration and retasking issues within satellite constellations, which is the primary focus of our research. In this work, we critically assess the impact of satellite failures on constellation performance and the associated task requirements. To facilitate this analysis, we introduce a system modeling approach for GPS satellite constellations, enabling an investigation into performance dynamics and task distribution strategies, particularly in scenarios where satellite failures occur during mission-critical operations. Additionally, we introduce reinforcement learning (RL) techniques, specifically Q-learning, Policy Gradient, Deep Q-Network (DQN), and Proximal Policy Optimization (PPO), for managing satellite constellations, addressing the challenges posed by reconfiguration and retasking following satellite failures. Our results demonstrate that DQN and PPO achieve effective outcomes in terms of average rewards, task completion rates, and response times.
△ Less
Submitted 3 September, 2024;
originally announced September 2024.
-
Neuro-Symbolic AI for Military Applications
Authors:
Desta Haileselassie Hagos,
Danda B. Rawat
Abstract:
Artificial Intelligence (AI) plays a significant role in enhancing the capabilities of defense systems, revolutionizing strategic decision-making, and shaping the future landscape of military operations. Neuro-Symbolic AI is an emerging approach that leverages and augments the strengths of neural networks and symbolic reasoning. These systems have the potential to be more impactful and flexible th…
▽ More
Artificial Intelligence (AI) plays a significant role in enhancing the capabilities of defense systems, revolutionizing strategic decision-making, and shaping the future landscape of military operations. Neuro-Symbolic AI is an emerging approach that leverages and augments the strengths of neural networks and symbolic reasoning. These systems have the potential to be more impactful and flexible than traditional AI systems, making them well-suited for military applications. This paper comprehensively explores the diverse dimensions and capabilities of Neuro-Symbolic AI, aiming to shed light on its potential applications in military contexts. We investigate its capacity to improve decision-making, automate complex intelligence analysis, and strengthen autonomous systems. We further explore its potential to solve complex tasks in various domains, in addition to its applications in military contexts. Through this exploration, we address ethical, strategic, and technical considerations crucial to the development and deployment of Neuro-Symbolic AI in military and civilian applications. Contributing to the growing body of research, this study represents a comprehensive exploration of the extensive possibilities offered by Neuro-Symbolic AI.
△ Less
Submitted 24 August, 2024; v1 submitted 17 August, 2024;
originally announced August 2024.
-
Recent Advances in Generative AI and Large Language Models: Current Status, Challenges, and Perspectives
Authors:
Desta Haileselassie Hagos,
Rick Battle,
Danda B. Rawat
Abstract:
The emergence of Generative Artificial Intelligence (AI) and Large Language Models (LLMs) has marked a new era of Natural Language Processing (NLP), introducing unprecedented capabilities that are revolutionizing various domains. This paper explores the current state of these cutting-edge technologies, demonstrating their remarkable advancements and wide-ranging applications. Our paper contributes…
▽ More
The emergence of Generative Artificial Intelligence (AI) and Large Language Models (LLMs) has marked a new era of Natural Language Processing (NLP), introducing unprecedented capabilities that are revolutionizing various domains. This paper explores the current state of these cutting-edge technologies, demonstrating their remarkable advancements and wide-ranging applications. Our paper contributes to providing a holistic perspective on the technical foundations, practical applications, and emerging challenges within the evolving landscape of Generative AI and LLMs. We believe that understanding the generative capabilities of AI systems and the specific context of LLMs is crucial for researchers, practitioners, and policymakers to collaboratively shape the responsible and ethical integration of these technologies into various domains. Furthermore, we identify and address main research gaps, providing valuable insights to guide future research endeavors within the AI research community.
△ Less
Submitted 23 August, 2024; v1 submitted 20 July, 2024;
originally announced July 2024.
-
Metaverse Survey & Tutorial: Exploring Key Requirements, Technologies, Standards, Applications, Challenges, and Perspectives
Authors:
Danda B. Rawat,
Hassan El alami,
Desta Haileselassie Hagos
Abstract:
In this paper, we present a comprehensive survey of the metaverse, envisioned as a transformative dimension of next-generation Internet technologies. This study not only outlines the structural components of our survey but also makes a substantial scientific contribution by elucidating the foundational concepts underlying the emergence of the metaverse. We analyze its architecture by defining key…
▽ More
In this paper, we present a comprehensive survey of the metaverse, envisioned as a transformative dimension of next-generation Internet technologies. This study not only outlines the structural components of our survey but also makes a substantial scientific contribution by elucidating the foundational concepts underlying the emergence of the metaverse. We analyze its architecture by defining key characteristics and requirements, thereby illuminating the nascent reality set to revolutionize digital interactions. Our analysis emphasizes the importance of collaborative efforts in developing metaverse standards, thereby fostering a unified understanding among industry stakeholders, organizations, and regulatory bodies. We extend our scrutiny to critical technologies integral to the metaverse, including interactive experiences, communication technologies, ubiquitous computing, digital twins, artificial intelligence, and cybersecurity measures. For each technological domain, we rigorously assess current contributions, principal techniques, and representative use cases, providing a nuanced perspective on their potential impacts. Furthermore, we delve into the metaverse's diverse applications across education, healthcare, business, social interactions, industrial sectors, defense, and mission-critical operations, highlighting its extensive utility. Each application is thoroughly analyzed, demonstrating its value and addressing associated challenges. The survey concludes with an overview of persistent challenges and future directions, offering insights into essential considerations and strategies necessary to harness the full potential of the metaverse. Through this detailed investigation, our goal is to articulate the scientific contributions of this survey paper, transcending a mere structural overview to highlight the transformative implications of the metaverse.
△ Less
Submitted 7 May, 2024;
originally announced May 2024.
-
Trustworthy Artificial Intelligence Framework for Proactive Detection and Risk Explanation of Cyber Attacks in Smart Grid
Authors:
Md. Shirajum Munir,
Sachin Shetty,
Danda B. Rawat
Abstract:
The rapid growth of distributed energy resources (DERs), such as renewable energy sources, generators, consumers, and prosumers in the smart grid infrastructure, poses significant cybersecurity and trust challenges to the grid controller. Consequently, it is crucial to identify adversarial tactics and measure the strength of the attacker's DER. To enable a trustworthy smart grid controller, this w…
▽ More
The rapid growth of distributed energy resources (DERs), such as renewable energy sources, generators, consumers, and prosumers in the smart grid infrastructure, poses significant cybersecurity and trust challenges to the grid controller. Consequently, it is crucial to identify adversarial tactics and measure the strength of the attacker's DER. To enable a trustworthy smart grid controller, this work investigates a trustworthy artificial intelligence (AI) mechanism for proactive identification and explanation of the cyber risk caused by the control/status message of DERs. Thus, proposing and developing a trustworthy AI framework to facilitate the deployment of any AI algorithms for detecting potential cyber threats and analyzing root causes based on Shapley value interpretation while dynamically quantifying the risk of an attack based on Ward's minimum variance formula. The experiment with a state-of-the-art dataset establishes the proposed framework as a trustworthy AI by fulfilling the capabilities of reliability, fairness, explainability, transparency, reproducibility, and accountability.
△ Less
Submitted 11 June, 2023;
originally announced June 2023.
-
Use of Federated Learning and Blockchain towards Securing Financial Services
Authors:
Pushpita Chatterjee,
Debashis Das,
Danda B Rawat
Abstract:
In recent days, the proliferation of several existing and new cyber-attacks pose an axiomatic threat to the stability of financial services. It is hard to predict the nature of attacks that can trigger a serious financial crisis. The unprecedented digital transformation to financial services has been accelerated during the COVID-19 pandemic and it is still ongoing. Attackers are taking advantage o…
▽ More
In recent days, the proliferation of several existing and new cyber-attacks pose an axiomatic threat to the stability of financial services. It is hard to predict the nature of attacks that can trigger a serious financial crisis. The unprecedented digital transformation to financial services has been accelerated during the COVID-19 pandemic and it is still ongoing. Attackers are taking advantage of this transformation and pose a new global threat to financial stability and integrity. Many large organizations are switching from centralized finance (CeFi) to decentralized finance (DeFi) because decentralized finance has many advantages. Blockchain can bring big and far-reaching effects on the trustworthiness, safety, accessibility, cost-effectiveness, and openness of the financial sector. The present paper gives an in-depth look at how blockchain and federated learning (FL) are used in financial services. It starts with an overview of recent developments in both use cases. This paper explores and discusses existing financial service vulnerabilities, potential threats, and consequent risks. So, we explain the problems that can be fixed in financial services and how blockchain and FL could help solve them. These problems include data protection, storage optimization, and making more money in financial services. We looked at many blockchain-enabled FL methods and came up with some possible solutions that could be used in financial services to solve several challenges like cost-effectiveness, automation, and security control. Finally, we point out some future directions at the end of this study.
△ Less
Submitted 4 February, 2023;
originally announced March 2023.
-
Metaverse: Requirements, Architecture, Standards, Status, Challenges, and Perspectives
Authors:
Danda B Rawat,
Hassan El alami
Abstract:
The Metaverse is driving the next wave of innovation for new opportunities by replacing the digital world (Internet) with the virtual world through a single, shared, immersive, persistent 3D virtual space. In this paper, we present requirements, architecture, standards, challenges, and solutions for Metaverse. Specifically, we provide Metaverse architecture and requirements, and different standard…
▽ More
The Metaverse is driving the next wave of innovation for new opportunities by replacing the digital world (Internet) with the virtual world through a single, shared, immersive, persistent 3D virtual space. In this paper, we present requirements, architecture, standards, challenges, and solutions for Metaverse. Specifically, we provide Metaverse architecture and requirements, and different standards for Metaverse which serve as the basis for the development and deployment. Moreover, we present recent status, challenges such as integration of AI and Metaverse, security and privacy in Metaverse, etc., and perspectives and solutions.
△ Less
Submitted 2 February, 2023;
originally announced February 2023.
-
Intrusion Detection Systems Using Support Vector Machines on the KDDCUP'99 and NSL-KDD Datasets: A Comprehensive Survey
Authors:
Mikel K. Ngueajio,
Gloria Washington,
Danda B. Rawat,
Yolande Ngueabou
Abstract:
With the growing rates of cyber-attacks and cyber espionage, the need for better and more powerful intrusion detection systems (IDS) is even more warranted nowadays. The basic task of an IDS is to act as the first line of defense, in detecting attacks on the internet. As intrusion tactics from intruders become more sophisticated and difficult to detect, researchers have started to apply novel Mach…
▽ More
With the growing rates of cyber-attacks and cyber espionage, the need for better and more powerful intrusion detection systems (IDS) is even more warranted nowadays. The basic task of an IDS is to act as the first line of defense, in detecting attacks on the internet. As intrusion tactics from intruders become more sophisticated and difficult to detect, researchers have started to apply novel Machine Learning (ML) techniques to effectively detect intruders and hence preserve internet users' information and overall trust in the entire internet network security. Over the last decade, there has been an explosion of research on intrusion detection techniques based on ML and Deep Learning (DL) architectures on various cyber security-based datasets such as the DARPA, KDDCUP'99, NSL-KDD, CAIDA, CTU-13, UNSW-NB15. In this research, we review contemporary literature and provide a comprehensive survey of different types of intrusion detection technique that applies Support Vector Machines (SVMs) algorithms as a classifier. We focus only on studies that have been evaluated on the two most widely used datasets in cybersecurity namely: the KDDCUP'99 and the NSL-KDD datasets. We provide a summary of each method, identifying the role of the SVMs classifier, and all other algorithms involved in the studies. Furthermore, we present a critical review of each method, in tabular form, highlighting the performance measures, strengths, and limitations of each of the methods surveyed.
△ Less
Submitted 12 September, 2022;
originally announced September 2022.
-
Federated Learning for Medical Applications: A Taxonomy, Current Trends, Challenges, and Future Research Directions
Authors:
Ashish Rauniyar,
Desta Haileselassie Hagos,
Debesh Jha,
Jan Erik Håkegård,
Ulas Bagci,
Danda B. Rawat,
Vladimir Vlassov
Abstract:
With the advent of the IoT, AI, ML, and DL algorithms, the landscape of data-driven medical applications has emerged as a promising avenue for designing robust and scalable diagnostic and prognostic models from medical data. This has gained a lot of attention from both academia and industry, leading to significant improvements in healthcare quality. However, the adoption of AI-driven medical appli…
▽ More
With the advent of the IoT, AI, ML, and DL algorithms, the landscape of data-driven medical applications has emerged as a promising avenue for designing robust and scalable diagnostic and prognostic models from medical data. This has gained a lot of attention from both academia and industry, leading to significant improvements in healthcare quality. However, the adoption of AI-driven medical applications still faces tough challenges, including meeting security, privacy, and quality of service (QoS) standards. Recent developments in \ac{FL} have made it possible to train complex machine-learned models in a distributed manner and have become an active research domain, particularly processing the medical data at the edge of the network in a decentralized way to preserve privacy and address security concerns. To this end, in this paper, we explore the present and future of FL technology in medical applications where data sharing is a significant challenge. We delve into the current research trends and their outcomes, unravelling the complexities of designing reliable and scalable \ac{FL} models. Our paper outlines the fundamental statistical issues in FL, tackles device-related problems, addresses security challenges, and navigates the complexity of privacy concerns, all while highlighting its transformative potential in the medical field. Our study primarily focuses on medical applications of \ac{FL}, particularly in the context of global cancer diagnosis. We highlight the potential of FL to enable computer-aided diagnosis tools that address this challenge with greater effectiveness than traditional data-driven methods. We hope that this comprehensive review will serve as a checkpoint for the field, summarizing the current state-of-the-art and identifying open problems and future research directions.
△ Less
Submitted 29 October, 2023; v1 submitted 5 August, 2022;
originally announced August 2022.
-
Towards Smart Networking with SDN Enabled IPv6 Network
Authors:
Babu R. Dawadi,
Danda B. Rawat,
Shashidhar R. Joshi,
Pietro Manzoni
Abstract:
This paper presents the features and benefits of legacy IPv4 network migration towards major two latest networking paradigms viz. Internet protocol version 6 (IPv6) and the software-defined networking (SDN). These latest networking paradigms are the enabler of future generation networking so that the standards and requirements of fifth generation (5G) wireless networking can be achieved. Features…
▽ More
This paper presents the features and benefits of legacy IPv4 network migration towards major two latest networking paradigms viz. Internet protocol version 6 (IPv6) and the software-defined networking (SDN). These latest networking paradigms are the enabler of future generation networking so that the standards and requirements of fifth generation (5G) wireless networking can be achieved. Features and migration approaches of IPv6 and SDN will be separately discussed, then a joint migration approach of SDN and IPv6 network termed as SoDIP6 network migration will be presented, and the integration of SoDIP6 network as a backbone of 5G network will be introduced.
△ Less
Submitted 3 March, 2022;
originally announced March 2022.
-
Blockchain Meets AI for Resilient and Intelligent Internet of Vehicles
Authors:
Pranav Kumar Singh,
Sukumar Nandi,
Sunit K. Nandi,
Uttam Ghosh,
Danda B. Rawat
Abstract:
The Internet of Vehicles (IoV) is flourishing and offers various applications relating to road safety, traffic and fuel efficiency, and infotainment. Dealing with security and privacy threats and managing the trust (detecting malicious and misbehaving peers) in IoV remains the most significant concern. Artificial Intelligence is one of the most revolutionizing technologies, and the predictive powe…
▽ More
The Internet of Vehicles (IoV) is flourishing and offers various applications relating to road safety, traffic and fuel efficiency, and infotainment. Dealing with security and privacy threats and managing the trust (detecting malicious and misbehaving peers) in IoV remains the most significant concern. Artificial Intelligence is one of the most revolutionizing technologies, and the predictive power of its machine learning models can help detect intrusions and misbehaviors. Similarly, empowering the state-of-the-art IoV security framework with blockchain can make it secure and resilient. This article discusses joint AI and blockchain for security, privacy and trust-related risks in IoV. This paper also presents problems, challenges, requirements and solutions using ML and blockchain to address aforementioned issues in IoV.
△ Less
Submitted 28 December, 2021;
originally announced December 2021.
-
Gradient Ascent Algorithm for Enhancing Secrecy Rate in Wireless Communications for Smart Grid
Authors:
Neji Mensi,
Danda B. Rawat,
Elyes Balti
Abstract:
The emerging Internet of Things (IoT) and bidirectional communications in smart grid are expected to improve smart grid capabilities and electricity management. Because of massive number of IoT devices in smart grid, size of the data to be transmitted increases, that demands a high data rate to meet the real-time smart grid communications requirements. Sub-6 GHz, millimeter-wave (mmWave) technolog…
▽ More
The emerging Internet of Things (IoT) and bidirectional communications in smart grid are expected to improve smart grid capabilities and electricity management. Because of massive number of IoT devices in smart grid, size of the data to be transmitted increases, that demands a high data rate to meet the real-time smart grid communications requirements. Sub-6 GHz, millimeter-wave (mmWave) technologies, and massive multiple-input multiple-output (MIMO) technologies can meet high data rate demands. However, IoT enabled smart grid is still subject to various security challenges such as eavesdropping, where attackers attempt to overhear the transmitted signals and the jamming attack, where the attacker perturbs the received signals at the receiver. In this paper, our goal is to investigate jamming and eavesdropping attacks while improving secrecy capacity for smart grid communications. Specifically, we propose to employ a hybrid beamforming design for wireless communications in smart energy grid. In previous works, the secrecy capacity is increased by randomly augmenting the source power or setting the system combiners. Unlike state-of-the-art, we design and evaluate the Gradient Ascent algorithm to search for the best combiners/waveform that maximizes the secrecy capacity in smart grid communications. We also study two different optimization scenarios by considering both fixed and variable transmit power. Numerical results are used for performance evaluation and supporting our formal analysis.
△ Less
Submitted 11 August, 2021;
originally announced August 2021.
-
Reinforcement Learning for IoT Security: A Comprehensive Survey
Authors:
Aashma Uprety,
Danda B. Rawat
Abstract:
The number of connected smart devices has been increasing exponentially for different Internet-of-Things (IoT) applications. Security has been a long run challenge in the IoT systems which has many attack vectors, security flaws and vulnerabilities. Securing billions of B connected devices in IoT is a must task to realize the full potential of IoT applications. Recently, researchers have proposed…
▽ More
The number of connected smart devices has been increasing exponentially for different Internet-of-Things (IoT) applications. Security has been a long run challenge in the IoT systems which has many attack vectors, security flaws and vulnerabilities. Securing billions of B connected devices in IoT is a must task to realize the full potential of IoT applications. Recently, researchers have proposed many security solutions for IoT. Machine learning has been proposed as one of the emerging solutions for IoT security and Reinforcement learning is gaining more popularity for securing IoT systems. Reinforcement learning, unlike other machine learning techniques, can learn the environment by having minimum information about the parameters to be learned. It solves the optimization problem by interacting with the environment adapting the parameters on the fly. In this paper, we present an comprehensive survey of different types of cyber-attacks against different IoT systems and then we present reinforcement learning and deep reinforcement learning based security solutions to combat those different types of attacks in different IoT systems. Furthermore, we present the Reinforcement learning for securing CPS systems (i.e., IoT with feedback and control) such as smart grid and smart transportation system. The recent important attacks and countermeasures using reinforcement learning B in IoT are also summarized in the form of tables. With this paper, readers can have a more thorough understanding of IoT security attacks and countermeasures using Reinforcement Learning, as well as research trends in this area.
△ Less
Submitted 14 February, 2021;
originally announced February 2021.
-
Resilient Machine Learning for Networked Cyber Physical Systems: A Survey for Machine Learning Security to Securing Machine Learning for CPS
Authors:
Felix Olowononi,
Danda B. Rawat,
Chunmei Liu
Abstract:
Cyber Physical Systems (CPS) are characterized by their ability to integrate the physical and information or cyber worlds. Their deployment in critical infrastructure have demonstrated a potential to transform the world. However, harnessing this potential is limited by their critical nature and the far reaching effects of cyber attacks on human, infrastructure and the environment. An attraction fo…
▽ More
Cyber Physical Systems (CPS) are characterized by their ability to integrate the physical and information or cyber worlds. Their deployment in critical infrastructure have demonstrated a potential to transform the world. However, harnessing this potential is limited by their critical nature and the far reaching effects of cyber attacks on human, infrastructure and the environment. An attraction for cyber concerns in CPS rises from the process of sending information from sensors to actuators over the wireless communication medium, thereby widening the attack surface. Traditionally, CPS security has been investigated from the perspective of preventing intruders from gaining access to the system using cryptography and other access control techniques. Most research work have therefore focused on the detection of attacks in CPS. However, in a world of increasing adversaries, it is becoming more difficult to totally prevent CPS from adversarial attacks, hence the need to focus on making CPS resilient. Resilient CPS are designed to withstand disruptions and remain functional despite the operation of adversaries. One of the dominant methodologies explored for building resilient CPS is dependent on machine learning (ML) algorithms. However, rising from recent research in adversarial ML, we posit that ML algorithms for securing CPS must themselves be resilient. This paper is therefore aimed at comprehensively surveying the interactions between resilient CPS using ML and resilient ML when applied in CPS. The paper concludes with a number of research trends and promising future research directions. Furthermore, with this paper, readers can have a thorough understanding of recent advances on ML-based security and securing ML for CPS and countermeasures, as well as research trends in this active research area.
△ Less
Submitted 14 February, 2021;
originally announced February 2021.
-
Securing V2I Communications in 5G and Beyond Wireless System Using Gradient Ascent Approach
Authors:
Neji Mensi,
Danda B. Rawat,
Elyes Balti
Abstract:
The 5G and beyond wireless systems, instead of being just an extension of 4G, are regarded as `network of networks' which is expected to integrate heterogeneous wireless networks including wireless vehicular networks (WVN). The WVN promises to solve many issues such as reducing road accidents, traffic jams, fuel consumption and commute time, which is subject to various security issues such as eave…
▽ More
The 5G and beyond wireless systems, instead of being just an extension of 4G, are regarded as `network of networks' which is expected to integrate heterogeneous wireless networks including wireless vehicular networks (WVN). The WVN promises to solve many issues such as reducing road accidents, traffic jams, fuel consumption and commute time, which is subject to various security issues such as eavesdropping, where attackers attempt to overhear the secret transmitted signal passively (which makes the detection/defense very difficult). In this work, our objective is to implement a security scheme by improving the secrecy capacity in Sub-6 GHz and millimeter-wave (mmWave) bands. Vehicle-to-Infrastructure (V2I) for 5G and beyond wireless network. Unlike previous works where the secrecy capacity is increased by randomly augmenting the source power or setting the system combiners/precoders, in this work we employ the Gradient Ascent algorithm to search for the best combiners/precoders that maximize the secrecy rate performance. We further present two different optimization scenarios: fixed and variable transmission power.
△ Less
Submitted 5 February, 2021; v1 submitted 1 February, 2021;
originally announced February 2021.
-
Temporal CSI Correlation in Mixed RF/FSO Cooperative Relaying Systems Under Joint Effects of HPA Nonlinearities and IQ Imbalance
Authors:
Elyes Balti,
Neji Mensi,
Danda B. Rawat
Abstract:
In this paper, we present the performance analysis of mixed RF/FSO system with multiple relays. To select the best relay, we adopt partial relay selection with outdated CSI wherein we investigate the effect of the temporal correlation of the channels. Unlike the vast majority of work, we introduce the impairments to the relays and the destination and we compare the performance against conventional…
▽ More
In this paper, we present the performance analysis of mixed RF/FSO system with multiple relays. To select the best relay, we adopt partial relay selection with outdated CSI wherein we investigate the effect of the temporal correlation of the channels. Unlike the vast majority of work, we introduce the impairments to the relays and the destination and we compare the performance against conventional RF relaying systems. We further derive the expressions of the outage probability and the ergodic capacity as well as the bounds to unpack engineering insights into the system robustness.
△ Less
Submitted 15 March, 2021; v1 submitted 1 February, 2021;
originally announced February 2021.
-
PLS for V2I Communications Using Friendly Jammer and Double kappa-mu Shadowed Fading
Authors:
Neji Mensi,
Danda B. Rawat,
Elyes Balti
Abstract:
The concept of intelligent transportation systems (ITS) is considered to be a highly promising area of research due to its diversity of unique features. It is based mainly on the wireless vehicular network (WVN), where vehicles can perform sophisticated services such as sharing real-time safety information. To ensure high-quality service, WVN needs to solve the security challenges like eavesdroppi…
▽ More
The concept of intelligent transportation systems (ITS) is considered to be a highly promising area of research due to its diversity of unique features. It is based mainly on the wireless vehicular network (WVN), where vehicles can perform sophisticated services such as sharing real-time safety information. To ensure high-quality service, WVN needs to solve the security challenges like eavesdropping, where malicious entities try to intercept the confidential transmitted signal. In this paper, we are going to provide a security scheme under the Double kappa-mu Shadowed fading. Our solution is based on the use of a friendly jammer that will transmit an artificial noise (AN) to jam the attacker's link and decrease its eavesdropping performances. To evaluate the efficiency of our solution, we investigated the outage probability for two special cases: Nakagami-m and Rician shadowed while taking into consideration the density of the blockage and the shadowing effects. We also studied the average secrecy capacity via deriving closed-form expressions of the ergodic capacity at the legitimate receiver and the attacker for the special case: Nakagami-m fading distribution.
△ Less
Submitted 17 October, 2020;
originally announced October 2020.
-
Physical Layer Security for V2I Communications: Reflecting Surfaces Vs. Relaying
Authors:
Neji Mensi,
Danda B. Rawat,
Elyes Balti
Abstract:
Wireless vehicular network (WVN) is exponentially gaining attention from industries and researchers since it is the Keystone of intelligent transportation systems (ITS). Despite the sophisticated features and services that it can offer, it is susceptible to networking attacks such as eavesdropping threats where the confidential transmitted signal could be overheard by a malicious entity. In this p…
▽ More
Wireless vehicular network (WVN) is exponentially gaining attention from industries and researchers since it is the Keystone of intelligent transportation systems (ITS). Despite the sophisticated features and services that it can offer, it is susceptible to networking attacks such as eavesdropping threats where the confidential transmitted signal could be overheard by a malicious entity. In this paper, we intend to study the physical layer security (PLS) where we consider the eavesdropping attack for vehicle-to-infrastructure (V2I) communications. We analyze the average secrecy capacity, under different scenarios by comparing the performances of employing the decode-and-forward (D relay, the amplify-and-forward fixed gain (AFFG) relay, and the intelligent reflecting surface (IRS). Actually, this comparison investigates the efficiency of IRS comparing to the traditional relaying systems, since it was introduced as a novel paradigm in wireless technology with highly promising potential, especially in 5G and 6G.
△ Less
Submitted 14 October, 2020;
originally announced October 2020.
-
A Novel AI-enabled Framework to Diagnose Coronavirus COVID 19 using Smartphone Embedded Sensors: Design Study
Authors:
Halgurd S. Maghdid,
Kayhan Zrar Ghafoor,
Ali Safaa Sadiq,
Kevin Curran,
Danda B. Rawat,
Khaled Rabie
Abstract:
Coronaviruses are a famous family of viruses that cause illness in both humans and animals. The new type of coronavirus COVID-19 was firstly discovered in Wuhan, China. However, recently, the virus has widely spread in most of the world and causing a pandemic according to the World Health Organization (WHO). Further, nowadays, all the world countries are striving to control the COVID-19. There are…
▽ More
Coronaviruses are a famous family of viruses that cause illness in both humans and animals. The new type of coronavirus COVID-19 was firstly discovered in Wuhan, China. However, recently, the virus has widely spread in most of the world and causing a pandemic according to the World Health Organization (WHO). Further, nowadays, all the world countries are striving to control the COVID-19. There are many mechanisms to detect coronavirus including clinical analysis of chest CT scan images and blood test results. The confirmed COVID-19 patient manifests as fever, tiredness, and dry cough. Particularly, several techniques can be used to detect the initial results of the virus such as medical detection Kits. However, such devices are incurring huge cost, taking time to install them and use. Therefore, in this paper, a new framework is proposed to detect COVID-19 using built-in smartphone sensors. The proposal provides a low-cost solution, since most of radiologists have already held smartphones for different daily-purposes. Not only that but also ordinary people can use the framework on their smartphones for the virus detection purposes. Nowadays Smartphones are powerful with existing computation-rich processors, memory space, and large number of sensors including cameras, microphone, temperature sensor, inertial sensors, proximity, colour-sensor, humidity-sensor, and wireless chipsets/sensors. The designed Artificial Intelligence (AI) enabled framework reads the smartphone sensors signal measurements to predict the grade of severity of the pneumonia as well as predicting the result of the disease.
△ Less
Submitted 30 May, 2020; v1 submitted 16 March, 2020;
originally announced March 2020.
-
Blockchain: Emerging Applications and Use Cases
Authors:
Danda B. Rawat,
Vijay Chaudhary,
Ronald Doku
Abstract:
Blockchain also known as a distributed ledger technology stores different transactions/operations in a chain of blocks in a distributed manner without needing a trusted third-party. Blockchain is proven to be immutable which helps for integrity and accountability, and, to some extent, confidentiality through a pair of public and private keys. Blockchain has been in the spotlight after successful b…
▽ More
Blockchain also known as a distributed ledger technology stores different transactions/operations in a chain of blocks in a distributed manner without needing a trusted third-party. Blockchain is proven to be immutable which helps for integrity and accountability, and, to some extent, confidentiality through a pair of public and private keys. Blockchain has been in the spotlight after successful boom of the Bitcoin. There have been efforts to leverage salient features of Blockchain for different applications and use cases. This paper present a comprehensive survey of applications and use cases of Blockchain technology. Specifically, readers of this paper can have thorough understanding of applications and user cases of Blockchain technology.
△ Less
Submitted 27 April, 2019;
originally announced April 2019.