Skip to main content

Showing 1–7 of 7 results for author: Ghubaish, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2501.06989  [pdf

    cs.NI cs.CR quant-ph

    Layer-Wise Security Framework and Analysis for the Quantum Internet

    Authors: Zebo Yang, Ali Ghubaish, Raj Jain, Ala Al-Fuqaha, Aiman Erbad, Ramana Kompella, Hassan Shapourian, Reza Nejabati

    Abstract: With its significant security potential, the quantum internet is poised to revolutionize technologies like cryptography and communications. Although it boasts enhanced security over traditional networks, the quantum internet still encounters unique security challenges essential for safeguarding its Confidentiality, Integrity, and Availability (CIA). This study explores these challenges by analyzin… ▽ More

    Submitted 12 January, 2025; originally announced January 2025.

    Comments: This article has been accepted for publication in the IEEE Journal on Selected Areas in Communications (JSAC) UCP-QuantumEra special issue

    Journal ref: IEEE Journal on Selected Areas in Communications, vol. 43 , no. 8, 2025

  2. Multi-tree Quantum Routing in Realistic Topologies

    Authors: Zebo Yang, Ali Ghubaish, Raj Jain, Ramana Kompella, Hassan Shapourian

    Abstract: In entanglement distribution networks, communication between two nodes necessitates the generation of end-to-end entanglement by entanglement swapping at intermediate nodes. Efficiently creating end-to-end entanglements over long distances is a key objective. In our prior study on asynchronous routing, we enhanced these entanglement rates by leveraging solely the local knowledge of the entanglemen… ▽ More

    Submitted 12 August, 2024; originally announced August 2024.

    Comments: This article has been accepted for publication in IEEE Communications Magazine

    Journal ref: IEEE Communications Magazine, vol. 62, no. 10, pp. 78-85, 2024

  3. arXiv:2404.16870  [pdf, ps, other

    cs.CR cs.AI cs.LG

    LEMDA: A Novel Feature Engineering Method for Intrusion Detection in IoT Systems

    Authors: Ali Ghubaish, Zebo Yang, Aiman Erbad, Raj Jain

    Abstract: Intrusion detection systems (IDS) for the Internet of Things (IoT) systems can use AI-based models to ensure secure communications. IoT systems tend to have many connected devices producing massive amounts of data with high dimensionality, which requires complex models. Complex models have notorious problems such as overfitting, low interpretability, and high computational complexity. Adding model… ▽ More

    Submitted 20 April, 2024; originally announced April 2024.

  4. arXiv:2312.14300  [pdf, other

    cs.NI quant-ph

    Asynchronous Entanglement Routing for the Quantum Internet

    Authors: Zebo Yang, Ali Ghubaish, Raj Jain, Hassan Shapourian, Alireza Shabani

    Abstract: With the emergence of the Quantum Internet, the need for advanced quantum networking techniques has significantly risen. Various models of quantum repeaters have been presented, each delineating a unique strategy to ensure quantum communication over long distances. We focus on repeaters that employ entanglement generation and swapping. This revolves around establishing remote end-to-end entangleme… ▽ More

    Submitted 21 December, 2023; originally announced December 2023.

    Comments: This article has been accepted for publication in the AVS Quantum Science journal

    Report number: 013801

    Journal ref: AVS Quantum Sci. 6 (2024)

  5. Recent Advances in the Internet of Medical Things (IoMT) Systems Security

    Authors: Ali Ghubaish, Tara Salman, Maede Zolanvari, Devrim Unal, Abdulla Al-Ali, Raj Jain

    Abstract: The rapid evolutions in micro-computing, mini-hardware manufacturing, and machine to machine (M2M) communications have enabled novel Internet of Things (IoT) solutions to reshape many networking applications. Healthcare systems are among these applications that have been revolutionized with IoT, introducing an IoT branch known as the Internet of Medical Things (IoMT) systems. IoMT systems allow re… ▽ More

    Submitted 8 February, 2023; originally announced February 2023.

    Journal ref: IEEE Internet of Things Journal (Volume: 8, Issue: 11, 01 June 2021)

  6. arXiv:2205.01231  [pdf, other

    cs.DC cs.AI

    ADDAI: Anomaly Detection using Distributed AI

    Authors: Maede Zolanvari, Ali Ghubaish, Raj Jain

    Abstract: When dealing with the Internet of Things (IoT), especially industrial IoT (IIoT), two manifest challenges leap to mind. First is the massive amount of data streaming to and from IoT devices, and second is the fast pace at which these systems must operate. Distributed computing in the form of edge/cloud structure is a popular technique to overcome these two challenges. In this paper, we propose ADD… ▽ More

    Submitted 2 May, 2022; originally announced May 2022.

  7. arXiv:2004.07435  [pdf

    cs.NI eess.SP

    Experiments with a LoRaWAN-Based Remote ID System for Locating Unmanned Aerial Vehicles (UAVs)

    Authors: Ali Ghubaish, Tara Salman, Raj Jain

    Abstract: Federal Aviation Administration (FAA) of the United States is considering Remote ID systems for unmanned aerial vehicles (UAVs). These systems act as license plates used on automobiles, but they transmit information using radio waves. To be useful, the transmissions in such systems need to reach long distances to minimize the number of ground stations to capture these transmissions. LoRaWAN is des… ▽ More

    Submitted 15 April, 2020; originally announced April 2020.

    Comments: 11 pages

    Report number: Volume 2019, Article ID 9060121

    Journal ref: Wireless Communications and Mobile Computing 2019