Skip to main content

Showing 1–9 of 9 results for author: Alasmary, W

Searching in archive cs. Search in all archives.
.
  1. arXiv:2104.02263  [pdf, other

    cs.CR cs.CY

    Efficient and Privacy-Preserving Infection Control System for Covid-19-Like Pandemics using Blockchain

    Authors: Seham A. Alansar, Mahmoud M. Badr, Mohamed Mahmoud, Waleed Alasmary

    Abstract: Contact tracing is a very effective way to control the COVID-19-like pandemics. It aims to identify individuals who closely contacted an infected person during the incubation period of the virus and notify them to quarantine. However, the existing systems suffer from privacy, security, and efficiency issues. To address these limitations, in this paper, we propose an efficient and privacy-preservin… ▽ More

    Submitted 5 April, 2021; originally announced April 2021.

  2. arXiv:2012.01983  [pdf, other

    cs.CR cs.LG

    Detection of False-Reading Attacks in the AMI Net-Metering System

    Authors: Mahmoud M. Badr, Mohamed I. Ibrahem, Mohamed Mahmoud, Mostafa M. Fouda, Waleed Alasmary

    Abstract: In smart grid, malicious customers may compromise their smart meters (SMs) to report false readings to achieve financial gains illegally. Reporting false readings not only causes hefty financial losses to the utility but may also degrade the grid performance because the reported readings are used for energy management. This paper is the first work that investigates this problem in the net-metering… ▽ More

    Submitted 2 December, 2020; originally announced December 2020.

  3. arXiv:2011.03814  [pdf, other

    cs.CR

    Privacy-Preserving and Efficient Data Collection Scheme for AMI Networks Using Deep Learning

    Authors: Mohamed I. Ibrahem, Mohamed Mahmoud, Mostafa M. Fouda, Fawaz Alsolami, Waleed Alasmary, Xuemin, Shen

    Abstract: In advanced metering infrastructure (AMI), smart meters (SMs), which are installed at the consumer side, send fine-grained power consumption readings periodically to the electricity utility for load monitoring and energy management. Change and transmit (CAT) is an efficient approach to collect these readings, where the readings are not transmitted when there is no enough change in consumption. How… ▽ More

    Submitted 7 November, 2020; originally announced November 2020.

    Comments: 16 pages, 11 figures

  4. Applying Machine Learning Techniques for Caching in Edge Networks: A Comprehensive Survey

    Authors: Junaid Shuja, Kashif Bilal, Waleed Alasmary, Hassan Sinky, Eisa Alanazi

    Abstract: Edge networking is a complex and dynamic computing paradigm that aims to push cloud resources closer to the end user improving responsiveness and reducing backhaul traffic. User mobility, preferences, and content popularity are the dominant dynamic features of edge networks. Temporal and social features of content, such as the number of views and likes are leveraged to estimate the popularity of c… ▽ More

    Submitted 3 November, 2020; v1 submitted 21 June, 2020; originally announced June 2020.

    Comments: This is the updated article submitted for publication

    Journal ref: Journal of Network and Computer Applications,2021,103005

  5. arXiv:2005.13813  [pdf, other

    cs.CR eess.SP

    Detection of Lying Electrical Vehicles in Charging Coordination Application Using Deep Learning

    Authors: Ahmed Shafee, Mostafa M. Fouda, Mohamed Mahmoud, Waleed Alasmary, Abdulah J. Aljohani, Fathi Amsaad

    Abstract: The simultaneous charging of many electric vehicles (EVs) stresses the distribution system and may cause grid instability in severe cases. The best way to avoid this problem is by charging coordination. The idea is that the EVs should report data (such as state-of-charge (SoC) of the battery) to run a mechanism to prioritize the charging requests and select the EVs that should charge during this t… ▽ More

    Submitted 28 May, 2020; originally announced May 2020.

  6. arXiv:2005.13793  [pdf, other

    cs.CR

    Efficient Privacy-Preserving Electricity Theft Detection with Dynamic Billing and Load Monitoring for AMI Networks

    Authors: Mohamed I. Ibrahem, Mahmoud Nabil, Mostafa M. Fouda, Mohamed Mahmoud, Waleed Alasmary, Fawaz Alsolami

    Abstract: In advanced metering infrastructure (AMI), smart meters (SMs) are installed at the consumer side to send fine-grained power consumption readings periodically to the system operator (SO) for load monitoring, energy management, billing, etc. However, fraudulent consumers launch electricity theft cyber-attacks by reporting false readings to reduce their bills illegally. These attacks do not only caus… ▽ More

    Submitted 28 May, 2020; originally announced May 2020.

    Comments: 14 pages, 6 figures

  7. arXiv:1905.04666  [pdf, other

    cs.CR

    Privacy-Preserving and Collusion-Resistant Charging Coordination Schemes for Smart Grid

    Authors: Mohamed Baza, Marbin Pazos-Revilla, Mahmoud Nabil, Ahmed Sherif, Mohamed Mahmoud, Waleed Alasmary

    Abstract: Energy storage units (ESUs) including EVs and home batteries enable several attractive features of the modern smart grids such as effective demand response and reduced electric bills. However, uncoordinated charging of ESUs stresses the power system. In this paper, we propose privacy-preserving and collusion-resistant charging coordination centralized and decentralized schemes for the smart grid.… ▽ More

    Submitted 20 February, 2020; v1 submitted 12 May, 2019; originally announced May 2019.

  8. arXiv:1904.11105  [pdf, other

    cs.CR

    A Multi-Authority Attribute-Based Signcryption Scheme with Efficient Revocation for Smart Grid Downlink Communication

    Authors: Ahmad Alsharif, Ahmad Shafee, Mahmoud Nabil, Mohamed Mahmoud, Waleed S. Alasmary

    Abstract: In this paper, we propose a multi-authority attribute-based signcryption scheme with efficient revocation for smart grid downlink communications. In the proposed scheme, grid operators and electricity vendors can send multicast messages securely to different groups of consumers which is required in different applications such as firmware update distribution and sending direct load control messages… ▽ More

    Submitted 24 April, 2019; originally announced April 2019.

  9. arXiv:1904.09703  [pdf, other

    cs.CR

    Privacy-Preserving Smart Parking System Using Blockchain and Private Information Retrieval

    Authors: Wesam Al Amiri, Mohamed Baza, Karim Banawan, Mohamed Mahmoud, Waleed Alasmary, Kemal Akkaya

    Abstract: Searching for available parking spaces is a major problem for drivers especially in big crowded cities, causing traffic congestion and air pollution, and wasting drivers' time. Smart parking systems are a novel solution to enable drivers to have real-time parking information for pre-booking. However, current smart parking requires drivers to disclose their private information, such as desired dest… ▽ More

    Submitted 27 January, 2021; v1 submitted 21 April, 2019; originally announced April 2019.