-
PROVSYN: Synthesizing Provenance Graphs for Data Augmentation in Intrusion Detection Systems
Authors:
Yi Huang,
Wajih UI Hassan,
Yao Guo,
Xiangqun Chen,
Ding Li
Abstract:
Provenance graph analysis plays a vital role in intrusion detection, particularly against Advanced Persistent Threats (APTs), by exposing complex attack patterns. While recent systems combine graph neural networks (GNNs) with natural language processing (NLP) to capture structural and semantic features, their effectiveness is limited by class imbalance in real-world data. To address this, we intro…
▽ More
Provenance graph analysis plays a vital role in intrusion detection, particularly against Advanced Persistent Threats (APTs), by exposing complex attack patterns. While recent systems combine graph neural networks (GNNs) with natural language processing (NLP) to capture structural and semantic features, their effectiveness is limited by class imbalance in real-world data. To address this, we introduce PROVSYN, an automated framework that synthesizes provenance graphs through a three-phase pipeline: (1) heterogeneous graph structure synthesis with structural-semantic modeling, (2) rule-based topological refinement, and (3) context-aware textual attribute synthesis using large language models (LLMs). PROVSYN includes a comprehensive evaluation framework that integrates structural, textual, temporal, and embedding-based metrics, along with a semantic validation mechanism to assess the correctness of generated attack patterns and system behaviors. To demonstrate practical utility, we use the synthetic graphs to augment training datasets for downstream APT detection models. Experimental results show that PROVSYN produces high-fidelity graphs and improves detection performance through effective data augmentation.
△ Less
Submitted 6 June, 2025;
originally announced June 2025.
-
Exemplifying Emerging Phishing: QR-based Browser-in-The-Browser (BiTB) Attack
Authors:
Muhammad Wahid Akram,
Keshav Sood,
Muneeb Ul Hassan,
Basant Subba
Abstract:
Lately, cybercriminals constantly formulate productive approaches to exploit individuals. This article exemplifies an innovative attack, namely QR-based Browser-in-The-Browser (BiTB), using proficiencies of Large Language Model (LLM) i.e. Google Gemini. The presented attack is a fusion of two emerging attacks: BiTB and Quishing (QR code phishing). Our study underscores attack's simplistic implemen…
▽ More
Lately, cybercriminals constantly formulate productive approaches to exploit individuals. This article exemplifies an innovative attack, namely QR-based Browser-in-The-Browser (BiTB), using proficiencies of Large Language Model (LLM) i.e. Google Gemini. The presented attack is a fusion of two emerging attacks: BiTB and Quishing (QR code phishing). Our study underscores attack's simplistic implementation utilizing malicious prompts provided to Gemini-LLM. Moreover, we presented a case study to highlight a lucrative attack method, we also performed an experiment to comprehend the attack execution on victims' device. The findings of this work obligate the researchers' contributions in confronting this type of phishing attempts through LLMs.
△ Less
Submitted 24 May, 2025;
originally announced May 2025.
-
A Study on the Refining Handwritten Font by Mixing Font Styles
Authors:
Avinash Kumar,
Kyeolhee Kang,
Ammar ul Hassan,
Jaeyoung Choi
Abstract:
Handwritten fonts have a distinct expressive character, but they are often difficult to read due to unclear or inconsistent handwriting. FontFusionGAN (FFGAN) is a novel method for improving handwritten fonts by combining them with printed fonts. Our method implements generative adversarial network (GAN) to generate font that mix the desirable features of handwritten and printed fonts. By training…
▽ More
Handwritten fonts have a distinct expressive character, but they are often difficult to read due to unclear or inconsistent handwriting. FontFusionGAN (FFGAN) is a novel method for improving handwritten fonts by combining them with printed fonts. Our method implements generative adversarial network (GAN) to generate font that mix the desirable features of handwritten and printed fonts. By training the GAN on a dataset of handwritten and printed fonts, it can generate legible and visually appealing font images. We apply our method to a dataset of handwritten fonts and demonstrate that it significantly enhances the readability of the original fonts while preserving their unique aesthetic. Our method has the potential to improve the readability of handwritten fonts, which would be helpful for a variety of applications including document creation, letter writing, and assisting individuals with reading and writing difficulties. In addition to addressing the difficulties of font creation for languages with complex character sets, our method is applicable to other text-image-related tasks, such as font attribute control and multilingual font style transfer.
△ Less
Submitted 19 May, 2025;
originally announced May 2025.
-
Are We There Yet? Unraveling the State-of-the-Art Graph Network Intrusion Detection Systems
Authors:
Chenglong Wang,
Pujia Zheng,
Jiaping Gui,
Cunqing Hua,
Wajih Ul Hassan
Abstract:
Network Intrusion Detection Systems (NIDS) are vital for ensuring enterprise security. Recently, Graph-based NIDS (GIDS) have attracted considerable attention because of their capability to effectively capture the complex relationships within the graph structures of data communications. Despite their promise, the reproducibility and replicability of these GIDS remain largely unexplored, posing cha…
▽ More
Network Intrusion Detection Systems (NIDS) are vital for ensuring enterprise security. Recently, Graph-based NIDS (GIDS) have attracted considerable attention because of their capability to effectively capture the complex relationships within the graph structures of data communications. Despite their promise, the reproducibility and replicability of these GIDS remain largely unexplored, posing challenges for developing reliable and robust detection systems. This study bridges this gap by designing a systematic approach to evaluate state-of-the-art GIDS, which includes critically assessing, extending, and clarifying the findings of these systems. We further assess the robustness of GIDS under adversarial attacks. Evaluations were conducted on three public datasets as well as a newly collected large-scale enterprise dataset. Our findings reveal significant performance discrepancies, highlighting challenges related to dataset scale, model inputs, and implementation settings. We demonstrate difficulties in reproducing and replicating results, particularly concerning false positive rates and robustness against adversarial attacks. This work provides valuable insights and recommendations for future research, emphasizing the importance of rigorous reproduction and replication studies in developing robust and generalizable GIDS solutions.
△ Less
Submitted 26 March, 2025;
originally announced March 2025.
-
Who is Responsible? The Data, Models, Users or Regulations? A Comprehensive Survey on Responsible Generative AI for a Sustainable Future
Authors:
Shaina Raza,
Rizwan Qureshi,
Anam Zahid,
Joseph Fioresi,
Ferhat Sadak,
Muhammad Saeed,
Ranjan Sapkota,
Aditya Jain,
Anas Zafar,
Muneeb Ul Hassan,
Aizan Zafar,
Hasan Maqbool,
Ashmal Vayani,
Jia Wu,
Maged Shoman
Abstract:
Responsible Artificial Intelligence (RAI) has emerged as a crucial framework for addressing ethical concerns in the development and deployment of Artificial Intelligence (AI) systems. A significant body of literature exists, primarily focusing on either RAI guidelines and principles or the technical aspects of RAI, largely within the realm of traditional AI. However, a notable gap persists in brid…
▽ More
Responsible Artificial Intelligence (RAI) has emerged as a crucial framework for addressing ethical concerns in the development and deployment of Artificial Intelligence (AI) systems. A significant body of literature exists, primarily focusing on either RAI guidelines and principles or the technical aspects of RAI, largely within the realm of traditional AI. However, a notable gap persists in bridging theoretical frameworks with practical implementations in real-world settings, as well as transitioning from RAI to Responsible Generative AI (Gen AI). To bridge this gap, we present this article, which examines the challenges and opportunities in implementing ethical, transparent, and accountable AI systems in the post-ChatGPT era, an era significantly shaped by Gen AI. Our analysis includes governance and technical frameworks, the exploration of explainable AI as the backbone to achieve RAI, key performance indicators in RAI, alignment of Gen AI benchmarks with governance frameworks, reviews of AI-ready test beds, and RAI applications across multiple sectors. Additionally, we discuss challenges in RAI implementation and provide a philosophical perspective on the future of RAI. This comprehensive article aims to offer an overview of RAI, providing valuable insights for researchers, policymakers, users, and industry practitioners to develop and deploy AI systems that benefit individuals and society while minimizing potential risks and societal impacts. A curated list of resources and datasets covered in this survey is available on GitHub {https://github.com/anas-zafar/Responsible-AI}.
△ Less
Submitted 28 April, 2025; v1 submitted 15 January, 2025;
originally announced February 2025.
-
Mixed Delay/Nondelay Embeddings Based Neuromorphic Computing with Patterned Nanomagnet Arrays
Authors:
Changpeng Ti,
Usman Hassan,
Sairam Sri Vatsavai,
Margaret McCarter,
Aastha Vasdev,
Jincheng An,
Barat Achinuq,
Ulrich Welp,
Sen-Ching Cheung,
Ishan G Thakkar,
J. Todd Hastings
Abstract:
Patterned nanomagnet arrays (PNAs) have been shown to exhibit a strong geometrically frustrated dipole interaction. Some PNAs have also shown emergent domain wall dynamics. Previous works have demonstrated methods to physically probe these magnetization dynamics of PNAs to realize neuromorphic reservoir systems that exhibit chaotic dynamical behavior and high-dimensional nonlinearity. These PNA re…
▽ More
Patterned nanomagnet arrays (PNAs) have been shown to exhibit a strong geometrically frustrated dipole interaction. Some PNAs have also shown emergent domain wall dynamics. Previous works have demonstrated methods to physically probe these magnetization dynamics of PNAs to realize neuromorphic reservoir systems that exhibit chaotic dynamical behavior and high-dimensional nonlinearity. These PNA reservoir systems from prior works leverage echo state properties and linear/nonlinear short-term memory of component reservoir nodes to map and preserve the dynamical information of the input time-series data into nondelay spatial embeddings. Such mappings enable these PNA reservoir systems to imitate and predict/forecast the input time series data. However, these prior PNA reservoir systems are based solely on the nondelay spatial embeddings obtained at component reservoir nodes. As a result, they require a massive number of component reservoir nodes, or a very large spatial embedding (i.e., high-dimensional spatial embedding) per reservoir node, or both, to achieve acceptable imitation and prediction accuracy. These requirements reduce the practical feasibility of such PNA reservoir systems. To address this shortcoming, we present a mixed delay/nondelay embeddings-based PNA reservoir system. Our system uses a single PNA reservoir node with the ability to obtain a mixture of delay/nondelay embeddings of the dynamical information of the time-series data applied at the input of a single PNA reservoir node. Our analysis shows that when these mixed delay/nondelay embeddings are used to train a perceptron at the output layer, our reservoir system outperforms existing PNA-based reservoir systems for the imitation of NARMA 2, NARMA 5, NARMA 7, and NARMA 10 time series data, and for the short-term and long-term prediction of the Mackey Glass time series data.
△ Less
Submitted 5 December, 2024;
originally announced December 2024.
-
Gated-Attention Feature-Fusion Based Framework for Poverty Prediction
Authors:
Muhammad Umer Ramzan,
Wahab Khaddim,
Muhammad Ehsan Rana,
Usman Ali,
Manohar Ali,
Fiaz ul Hassan,
Fatima Mehmood
Abstract:
This research paper addresses the significant challenge of accurately estimating poverty levels using deep learning, particularly in developing regions where traditional methods like household surveys are often costly, infrequent, and quickly become outdated. To address these issues, we propose a state-of-the-art Convolutional Neural Network (CNN) architecture, extending the ResNet50 model by inco…
▽ More
This research paper addresses the significant challenge of accurately estimating poverty levels using deep learning, particularly in developing regions where traditional methods like household surveys are often costly, infrequent, and quickly become outdated. To address these issues, we propose a state-of-the-art Convolutional Neural Network (CNN) architecture, extending the ResNet50 model by incorporating a Gated-Attention Feature-Fusion Module (GAFM). Our architecture is designed to improve the model's ability to capture and combine both global and local features from satellite images, leading to more accurate poverty estimates. The model achieves a 75% R2 score, significantly outperforming existing leading methods in poverty mapping. This improvement is due to the model's capacity to focus on and refine the most relevant features, filtering out unnecessary data, which makes it a powerful tool for remote sensing and poverty estimation.
△ Less
Submitted 29 November, 2024;
originally announced November 2024.
-
HADES: Detecting Active Directory Attacks via Whole Network Provenance Analytics
Authors:
Qi Liu,
Kaibin Bao,
Wajih Ul Hassan,
Veit Hagenmeyer
Abstract:
Due to its crucial role in identity and access management in modern enterprise networks, Active Directory (AD) is a top target of Advanced Persistence Threat (APT) actors. Conventional intrusion detection systems (IDS) excel at identifying malicious behaviors caused by malware, but often fail to detect stealthy attacks launched by APT actors. Recent advance in provenance-based IDS (PIDS) shows pro…
▽ More
Due to its crucial role in identity and access management in modern enterprise networks, Active Directory (AD) is a top target of Advanced Persistence Threat (APT) actors. Conventional intrusion detection systems (IDS) excel at identifying malicious behaviors caused by malware, but often fail to detect stealthy attacks launched by APT actors. Recent advance in provenance-based IDS (PIDS) shows promises by exposing malicious system activities in causal attack graphs. However, existing approaches are restricted to intra-machine tracing, and unable to reveal the scope of attackers' traversal inside a network. We propose HADES, the first PIDS capable of performing accurate causality-based cross-machine tracing by leveraging a novel concept called logon session based execution partitioning to overcome several challenges in cross-machine tracing. We design HADES as an efficient on-demand tracing system, which performs whole-network tracing only when it first identifies an authentication anomaly signifying an ongoing AD attack, for which we introduce a novel lightweight authentication anomaly detection model rooted in our extensive analysis of AD attacks. To triage attack alerts, we present a new algorithm integrating two key insights we identified in AD attacks. Our evaluations show that HADES outperforms both popular open source detection systems and a prominent commercial AD attack detector.
△ Less
Submitted 26 July, 2024;
originally announced July 2024.
-
Accurate and Scalable Detection and Investigation of Cyber Persistence Threats
Authors:
Qi Liu,
Muhammad Shoaib,
Mati Ur Rehman,
Kaibin Bao,
Veit Hagenmeyer,
Wajih Ul Hassan
Abstract:
In Advanced Persistent Threat (APT) attacks, achieving stealthy persistence within target systems is often crucial for an attacker's success. This persistence allows adversaries to maintain prolonged access, often evading detection mechanisms. Recognizing its pivotal role in the APT lifecycle, this paper introduces Cyber Persistence Detector (CPD), a novel system dedicated to detecting cyber persi…
▽ More
In Advanced Persistent Threat (APT) attacks, achieving stealthy persistence within target systems is often crucial for an attacker's success. This persistence allows adversaries to maintain prolonged access, often evading detection mechanisms. Recognizing its pivotal role in the APT lifecycle, this paper introduces Cyber Persistence Detector (CPD), a novel system dedicated to detecting cyber persistence through provenance analytics. CPD is founded on the insight that persistent operations typically manifest in two phases: the "persistence setup" and the subsequent "persistence execution". By causally relating these phases, we enhance our ability to detect persistent threats. First, CPD discerns setups signaling an impending persistent threat and then traces processes linked to remote connections to identify persistence execution activities. A key feature of our system is the introduction of pseudo-dependency edges (pseudo-edges), which effectively connect these disjoint phases using data provenance analysis, and expert-guided edges, which enable faster tracing and reduced log size. These edges empower us to detect persistence threats accurately and efficiently. Moreover, we propose a novel alert triage algorithm that further reduces false positives associated with persistence threats. Evaluations conducted on well-known datasets demonstrate that our system reduces the average false positive rate by 93% compared to state-of-the-art methods.
△ Less
Submitted 26 July, 2024;
originally announced July 2024.
-
Blockchain-enabled Circular Economy -- Collaborative Responsibility in Solar Panel Recycling
Authors:
Mohammad Jabed Morshed Chowdhury,
Naveed Ul Hassan,
Wayes Tushar,
Dustin Niyato,
Tapan Saha,
H Vincent Poor,
Chau Yuen
Abstract:
The adoption of renewable energy resources, such as solar power, is on the rise. However, the excessive installation and lack of recycling facilities pose environmental risks. This paper suggests a circular economy approach to address the issue. By implementing blockchain technology, the end-of-life (EOL) of solar panels can be tracked, and responsibilities can be assigned to relevant stakeholders…
▽ More
The adoption of renewable energy resources, such as solar power, is on the rise. However, the excessive installation and lack of recycling facilities pose environmental risks. This paper suggests a circular economy approach to address the issue. By implementing blockchain technology, the end-of-life (EOL) of solar panels can be tracked, and responsibilities can be assigned to relevant stakeholders. The degradation of panels can be monetized by tracking users' energy-related activities, and these funds can be used for future recycling. A new coin, the recycling coin (RC-Coin), incentivizes solar panel recycling and utilizes decentralized finance to stabilize the coin price and supply issue.
△ Less
Submitted 14 March, 2024;
originally announced March 2024.
-
Single-Stage Optimization of Open-loop Stable Limit Cycles with Smooth, Symbolic Derivatives
Authors:
Muhammad Saud Ul Hassan,
Christian Hubicki
Abstract:
Open-loop stable limit cycles are foundational to legged robotics, providing inherent self-stabilization that minimizes the need for computationally intensive feedback-based gait correction. While previous methods have primarily targeted specific robotic models, this paper introduces a general framework for rapidly generating limit cycles across various dynamical systems, with the flexibility to i…
▽ More
Open-loop stable limit cycles are foundational to legged robotics, providing inherent self-stabilization that minimizes the need for computationally intensive feedback-based gait correction. While previous methods have primarily targeted specific robotic models, this paper introduces a general framework for rapidly generating limit cycles across various dynamical systems, with the flexibility to impose arbitrarily tight stability bounds. We formulate the problem as a single-stage constrained optimization problem and use Direct Collocation to transcribe it into a nonlinear program with closed-form expressions for constraints, objectives, and their gradients.
Our method supports multiple stability formulations. In particular, we tested two popular formulations for limit cycle stability in robotics: (1) based on the spectral radius of a discrete return map, and (2) based on the spectral radius of the monodromy matrix, and tested five different constraint-satisfaction formulations of the eigenvalue problem to bound the spectral radius. We compare the performance and solution quality of the various formulations on a robotic swing-leg model, highlighting the Schur decomposition of the monodromy matrix as a method with broader applicability due to weaker assumptions and stronger numerical convergence properties.
As a case study, we apply our method on a hopping robot model, generating open-loop stable gaits in under 2 seconds on an Intel Core i7-6700K, while simultaneously minimizing energy consumption even under tight stability constraints.
△ Less
Submitted 17 September, 2024; v1 submitted 17 December, 2023;
originally announced December 2023.
-
Bounded and Unbiased Composite Differential Privacy
Authors:
Kai Zhang,
Yanjun Zhang,
Ruoxi Sun,
Pei-Wei Tsai,
Muneeb Ul Hassan,
Xin Yuan,
Minhui Xue,
Jinjun Chen
Abstract:
The objective of differential privacy (DP) is to protect privacy by producing an output distribution that is indistinguishable between any two neighboring databases. However, traditional differentially private mechanisms tend to produce unbounded outputs in order to achieve maximum disturbance range, which is not always in line with real-world applications. Existing solutions attempt to address th…
▽ More
The objective of differential privacy (DP) is to protect privacy by producing an output distribution that is indistinguishable between any two neighboring databases. However, traditional differentially private mechanisms tend to produce unbounded outputs in order to achieve maximum disturbance range, which is not always in line with real-world applications. Existing solutions attempt to address this issue by employing post-processing or truncation techniques to restrict the output results, but at the cost of introducing bias issues. In this paper, we propose a novel differentially private mechanism which uses a composite probability density function to generate bounded and unbiased outputs for any numerical input data. The composition consists of an activation function and a base function, providing users with the flexibility to define the functions according to the DP constraints. We also develop an optimization algorithm that enables the iterative search for the optimal hyper-parameter setting without the need for repeated experiments, which prevents additional privacy overhead. Furthermore, we evaluate the utility of the proposed mechanism by assessing the variance of the composite probability density function and introducing two alternative metrics that are simpler to compute than variance estimation. Our extensive evaluation on three benchmark datasets demonstrates consistent and significant improvement over the traditional Laplace and Gaussian mechanisms. The proposed bounded and unbiased composite differentially private mechanism will underpin the broader DP arsenal and foster future privacy-preserving studies.
△ Less
Submitted 4 November, 2023;
originally announced November 2023.
-
Reconfigurable Intelligent Surfaces: Interplay of Unit-Cell- and Surface-Level Design and Performance under Quantifiable Benchmarks
Authors:
Ammar Rafique,
Naveed Ul Hassan,
Muhammad Zubair,
Ijaz Haider Naqvi,
Muhammad Qasim Mehmood,
Chau Yuen,
Marco Di Renzo,
Merouane Debbah
Abstract:
The ability of reconfigurable intelligent surfaces (RIS) to produce complex radiation patterns in the far-field is determined by various factors, such as the unit-cell's size, shape, spatial arrangement, tuning mechanism, the communication and control circuitry's complexity, and the illuminating source's type (point/planewave). Research on RIS has been mainly focused on two areas: first, the optim…
▽ More
The ability of reconfigurable intelligent surfaces (RIS) to produce complex radiation patterns in the far-field is determined by various factors, such as the unit-cell's size, shape, spatial arrangement, tuning mechanism, the communication and control circuitry's complexity, and the illuminating source's type (point/planewave). Research on RIS has been mainly focused on two areas: first, the optimization and design of unit-cells to achieve desired electromagnetic responses within a specific frequency band; and second, exploring the applications of RIS in various settings, including system-level performance analysis. The former does not assume any specific radiation pattern on the surface level, while the latter does not consider any particular unit-cell design. Both approaches largely ignore the complexity and power requirements of the RIS control circuitry. As we progress towards the fabrication and use of RIS in real-world settings, it is becoming increasingly necessary to consider the interplay between the unit-cell design, the required surface-level radiation patterns, the control circuit's complexity, and the power requirements concurrently. In this paper, a benchmarking framework for RIS is employed to compare performance and analyze tradeoffs between the unit-cell's specified radiation patterns and the control circuit's complexity for far-field beamforming, considering different diode-based unit-cell designs for a given surface size. This work lays the foundation for optimizing the design of the unit-cells and surface-level radiation patterns, facilitating the optimization of RIS-assisted wireless communication systems.
△ Less
Submitted 4 April, 2023;
originally announced April 2023.
-
Huff-DP: Huffman Coding based Differential Privacy Mechanism for Real-Time Data
Authors:
Muneeb Ul Hassan,
Mubashir Husain Rehmani,
Jinjun Chen
Abstract:
With the advancements in connected devices, a huge amount of real-time data is being generated. Efficient storage, transmission, and analysation of this real-time big data is important, as it serves a number of purposes ranging from decision making to fault prediction, etc. Alongside this, real-time big data has rigorous utility and privacy requirements, therefore, it is also significantly importa…
▽ More
With the advancements in connected devices, a huge amount of real-time data is being generated. Efficient storage, transmission, and analysation of this real-time big data is important, as it serves a number of purposes ranging from decision making to fault prediction, etc. Alongside this, real-time big data has rigorous utility and privacy requirements, therefore, it is also significantly important to choose the handling strategies meticulously. One of the optimal way to store and transmit data in the form of lossless compression is Huffman coding, which compresses the data into a variable length binary stream. Similarly, in order to protect the privacy of such big data, differential privacy is being used nowadays, which perturbs the data on the basis of privacy budget and sensitivity. Nevertheless, traditional differential privacy mechanisms provide privacy guarantees. However, on the other hand, real-time data cannot be dealt as an ordinary set of records, because it usually has certain underlying patterns and cycles, which can be used for forming a link to a specific individuals private information that can lead to severe privacy leakages (e.g., analysing smart metering data can lead to classification of individuals daily routine). Thus, it is equally important to develop a privacy preservation model, which preserves the privacy on the basis of occurrences and patterns in the data. In this paper, we design a novel Huff-DP mechanism, which selects the optimal privacy budget on the basis of privacy requirement for that specific record. In order to further enhance the budget determination, we propose static, sine, and fuzzy logic based decision algorithms. From the experimental evaluations, it can be concluded that our proposed Huff-DP mechanism provides effective privacy protection alongside reducing the privacy budget computational cost.
△ Less
Submitted 24 January, 2023;
originally announced January 2023.
-
Impact Of Missing Data Imputation On The Fairness And Accuracy Of Graph Node Classifiers
Authors:
Haris Mansoor,
Sarwan Ali,
Shafiq Alam,
Muhammad Asad Khan,
Umair ul Hassan,
Imdadullah Khan
Abstract:
Analysis of the fairness of machine learning (ML) algorithms recently attracted many researchers' interest. Most ML methods show bias toward protected groups, which limits the applicability of ML models in many applications like crime rate prediction etc. Since the data may have missing values which, if not appropriately handled, are known to further harmfully affect fairness. Many imputation meth…
▽ More
Analysis of the fairness of machine learning (ML) algorithms recently attracted many researchers' interest. Most ML methods show bias toward protected groups, which limits the applicability of ML models in many applications like crime rate prediction etc. Since the data may have missing values which, if not appropriately handled, are known to further harmfully affect fairness. Many imputation methods are proposed to deal with missing data. However, the effect of missing data imputation on fairness is not studied well. In this paper, we analyze the effect on fairness in the context of graph data (node attributes) imputation using different embedding and neural network methods. Extensive experiments on six datasets demonstrate severe fairness issues in missing data imputation under graph node classification. We also find that the choice of the imputation method affects both fairness and accuracy. Our results provide valuable insights into graph data fairness and how to handle missingness in graphs efficiently. This work also provides directions regarding theoretical studies on fairness in graph data.
△ Less
Submitted 1 November, 2022;
originally announced November 2022.
-
Reconfiguring Wireless Environment via Intelligent Surfaces for 6G: Reflection, Modulation, and Security
Authors:
Jindan Xu,
Chau Yuen,
Chongwen Huang,
Naveed Ul Hassan,
George C. Alexandropoulos,
Marco Di Renzo,
Merouane Debbah
Abstract:
Reconfigurable intelligent surface (RIS) has been recognized as an essential enabling technique for the sixth-generation (6G) mobile communication network. Specifically, an RIS is comprised of a large number of small and low-cost reflecting elements whose parameters are dynamically adjustable with a programmable controller. Each of these elements can effectively reflect a phase-shifted version of…
▽ More
Reconfigurable intelligent surface (RIS) has been recognized as an essential enabling technique for the sixth-generation (6G) mobile communication network. Specifically, an RIS is comprised of a large number of small and low-cost reflecting elements whose parameters are dynamically adjustable with a programmable controller. Each of these elements can effectively reflect a phase-shifted version of the incident electromagnetic wave. By adjusting the wave phases in real time, the propagation environment of the reflected signals can be dynamically reconfigured to enhance communication reliability, boost transmission rate, expand cellular coverage, and strengthen communication security. In this paper, we provide an overview on RIS-assisted wireless communications. Specifically, we elaborate on the state-of-the-art enabling techniques of RISs as well as their corresponding substantial benefits from the perspectives of RIS reflection and RIS modulation. With these benefits, we envision the integration of RIS into emerging applications for 6G. In addition, communication security is of unprecedented importance in the 6G network with ubiquitous wireless services in multifarious verticals and areas. We highlight potential contributions of RIS to physical-layer security in terms of secrecy rate and secrecy outage probability, exemplified by a typical case study from both theoretical and numerical aspects. Finally, we discuss challenges and opportunities on the deployment of RISs in practice to motivate future research.
△ Less
Submitted 23 August, 2022;
originally announced August 2022.
-
Privacy Preserving Machine Learning for Electric Vehicles: A Survey
Authors:
Abdul Rahman Sani,
Muneeb Ul Hassan,
Longxiang Gao,
Jinjun Chen
Abstract:
In the recent years, the interest of individual users in modern electric vehicles (EVs) has grown exponentially. An EV has two major components, which make it different from traditional vehicles, first is its environment friendly nature because of being electric, and second is the interconnection ability of these vehicles because of modern information and communication technologies (ICTs). Both of…
▽ More
In the recent years, the interest of individual users in modern electric vehicles (EVs) has grown exponentially. An EV has two major components, which make it different from traditional vehicles, first is its environment friendly nature because of being electric, and second is the interconnection ability of these vehicles because of modern information and communication technologies (ICTs). Both of these features are playing a key role in the development of EVs, and both academia and industry personals are working towards development of modern protocols for EV networks. All these interactions, whether from energy perspective or from communication perspective, both are generating a tremendous amount of data every day. In order to get most out of this data collected from EVs, research works have highlighted the use of machine/deep learning techniques for various EV applications. This interaction is quite fruitful, but it also comes with a critical concern of privacy leakage during collection, storage, and training of vehicular data. Therefore, alongside developing machine/deep learning techniques for EVs, it is also critical to ensure that they are resilient to private information leakage and attacks. In this paper, we begin with the discussion about essential background on EVs and privacy preservation techniques, followed by a brief overview of privacy preservation in EVs using machine learning techniques. Particularly, we also focus on an in-depth review of the integration of privacy techniques in EVs and highlighted different application scenarios in EVs. Alongside this, we provide a a very detailed survey of current works on privacy preserving machine/deep learning techniques used for modern EVs. Finally, we present the certain research issues, critical challenges, and future directions of research for researchers working in privacy preservation in EVs.
△ Less
Submitted 20 December, 2024; v1 submitted 17 May, 2022;
originally announced May 2022.
-
Anomaly Detection in Blockchain Networks: A Comprehensive Survey
Authors:
Muneeb Ul Hassan,
Mubashir Husain Rehmani,
Jinjun Chen
Abstract:
Over the past decade, blockchain technology has attracted a huge attention from both industry and academia because it can be integrated with a large number of everyday applications of modern information and communication technologies (ICT). Peer-to-peer (P2P) architecture of blockchain enhances these applications by providing strong security and trust-oriented guarantees, such as immutability, ver…
▽ More
Over the past decade, blockchain technology has attracted a huge attention from both industry and academia because it can be integrated with a large number of everyday applications of modern information and communication technologies (ICT). Peer-to-peer (P2P) architecture of blockchain enhances these applications by providing strong security and trust-oriented guarantees, such as immutability, verifiability, and decentralization. Despite these incredible features that blockchain technology brings to these ICT applications, recent research has indicated that the strong guarantees are not sufficient enough and blockchain networks may still be prone to various security, privacy, and reliability issues. In order to overcome these issues, it is important to identify the anomalous behaviour within the actionable time frame. In this article, we provide an in-depth survey regarding integration of anomaly detection models in blockchain technology. For this, we first discuss how anomaly detection can aid in ensuring security of blockchain based applications. Then, we demonstrate certain fundamental evaluation metrics and key requirements that can play a critical role while developing anomaly detection models for blockchain. Afterwards, we present a thorough survey of various anomaly detection models from the perspective of each layer of blockchain. Finally, we conclude the article by highlighting certain important challenges alongside discussing how they can serve as future research directions for new researchers in the field.
△ Less
Submitted 7 July, 2022; v1 submitted 11 December, 2021;
originally announced December 2021.
-
Differential Privacy in Cognitive Radio Networks: A Comprehensive Survey
Authors:
Muneeb Ul Hassan,
Mubashir Husain Rehmani,
Maaz Rehan,
Jinjun Chen
Abstract:
Background/Introduction: Integrating cognitive radio (CR) with traditional wireless networks is helping solve the problem of spectrum scarcity in an efficient manner. The opportunistic and dynamic spectrum access features of CR provide the functionality to its unlicensed users to utilize the underutilized spectrum at the time of need because CR nodes can sense vacant bands of spectrum and can also…
▽ More
Background/Introduction: Integrating cognitive radio (CR) with traditional wireless networks is helping solve the problem of spectrum scarcity in an efficient manner. The opportunistic and dynamic spectrum access features of CR provide the functionality to its unlicensed users to utilize the underutilized spectrum at the time of need because CR nodes can sense vacant bands of spectrum and can also access them to carry out communication. Various capabilities of CR nodes depend upon efficient and continuous reporting of data with each other and centralized base stations, which in turn can cause leakage in privacy. Experimental studies have shown that the privacy of CR users can be compromised easily during the cognition cycle, because they are knowingly or unknowingly sharing various personally identifiable information (PII), such as location, device ID, signal status, etc. In order to preserve this privacy leakage, various privacy preserving strategies have been developed by researchers, and according to us differential privacy is the most significant among them.
△ Less
Submitted 11 December, 2021; v1 submitted 3 November, 2021;
originally announced November 2021.
-
Locally Weighted Mean Phase Angle (LWMPA) Based Tone Mapping Quality Index (TMQI-3)
Authors:
Inaam Ul Hassan,
Abdul Haseeb,
Sarwan Ali
Abstract:
High Dynamic Range (HDR) images are the ones that contain a greater range of luminosity as compared to the standard images. HDR images have a higher detail and clarity of structure, objects, and color, which the standard images lack. HDR images are useful in capturing scenes that pose high brightness, darker areas, and shadows, etc. An HDR image comprises multiple narrow-range-exposure images comb…
▽ More
High Dynamic Range (HDR) images are the ones that contain a greater range of luminosity as compared to the standard images. HDR images have a higher detail and clarity of structure, objects, and color, which the standard images lack. HDR images are useful in capturing scenes that pose high brightness, darker areas, and shadows, etc. An HDR image comprises multiple narrow-range-exposure images combined into one high-quality image. As these HDR images cannot be displayed on standard display devices, the real challenge comes while converting these HDR images to Low dynamic range (LDR) images. The conversion of HDR image to LDR image is performed using Tone-mapped operators (TMOs). This conversion results in the loss of much valuable information in structure, color, naturalness, and exposures. The loss of information in the LDR image may not directly be visible to the human eye. To calculate how good an LDR image is after conversion, various metrics have been proposed previously. Some are not noise resilient, some work on separate color channels (Red, Green, and Blue one by one), and some lack capacity to identify the structure. To deal with this problem, we propose a metric in this paper called the Tone Mapping Quality Index (TMQI-3), which evaluates the quality of the LDR image based on its objective score. TMQI-3 is noise resilient, takes account of structure and naturalness, and works on all three color channels combined into one luminosity component. This eliminates the need to use multiple metrics at the same time. We compute results for several HDR and LDR images from the literature and show that our quality index metric performs better than the baseline models.
△ Less
Submitted 17 September, 2021;
originally announced September 2021.
-
Revenue Maximization through Cell Switching and Spectrum Leasing in 5G HetNets
Authors:
Attai Ibrahim Abubakar,
Cihat Ozturk,
Metin Ozturk,
Michael S. Mollel,
Syed Muhammad Asad,
Naveed Ul Hassan,
Sajjad Hussain,
MuhammadAli Imran
Abstract:
One of the ways of achieving improved capacity in mobile cellular networks is via network densification. Even though densification increases the capacity of the network, it also leads to increased energy consumption which can be curbed by dynamically switching off some base stations (BSs) during periods of low traffic. However, dynamic cell switching has the challenge of spectrum under-utilization…
▽ More
One of the ways of achieving improved capacity in mobile cellular networks is via network densification. Even though densification increases the capacity of the network, it also leads to increased energy consumption which can be curbed by dynamically switching off some base stations (BSs) during periods of low traffic. However, dynamic cell switching has the challenge of spectrum under-utilizationas the spectrum originally occupied by the BSs that are turned off remains dormant. This dormant spectrum can be leased by the primary network (PN) operators, who hold the license, to the secondary network (SN) operators who cannot afford to purchase the spectrum license. Thus enabling the PN to gain additional revenue from spectrum leasing as well as from electricity cost savings due to reduced energy consumption. Therefore, in this work, we propose a cell switching and spectrum leasing framework based on simulated annealing (SA) algorithm to maximize the revenue of the PN while respecting the quality-of-service constraints. The performance evaluation reveals that the proposed method is very close to optimal exhaustive search method with a significant reduction in the computation complexity.
△ Less
Submitted 26 August, 2021;
originally announced August 2021.
-
Blockchain and 6G: The Future of Secure and Ubiquitous Communication
Authors:
Ali Hussain Khan,
Naveed UL Hassan,
Chau Yuen,
Jun Zhao,
Dusit Niyato,
Yan Zhang,
H. Vincent Poor
Abstract:
The future communication will be characterized by ubiquitous connectivity and security. These features will be essential requirements for the efficient functioning of the futuristic applications. In this paper, in order to highlight the impact of blockchain and 6G on the future communication systems, we categorize these application requirements into two broad groups. In the first category, called…
▽ More
The future communication will be characterized by ubiquitous connectivity and security. These features will be essential requirements for the efficient functioning of the futuristic applications. In this paper, in order to highlight the impact of blockchain and 6G on the future communication systems, we categorize these application requirements into two broad groups. In the first category, called Requirement Group I \mbox{(RG-I)}, we include the performance-related needs on data rates, latency, reliability and massive connectivity, while in the second category, called Requirement Group II \mbox{(RG-II)}, we include the security-related needs on data integrity, non-repudiability, and auditability. With blockchain and 6G, the network decentralization and resource sharing would minimize resource under-utilization thereby facilitating RG-I targets. Furthermore, through appropriate selection of blockchain type and consensus algorithms, RG-II needs of 6G applications can also be readily addressed. Through this study, the combination of blockchain and 6G emerges as an elegant solution for secure and ubiquitous future communication.
△ Less
Submitted 10 June, 2021;
originally announced June 2021.
-
DNS attack mitigation Using OpenStack Isolation
Authors:
Hassnain ul hassan,
Rizal Mohd Nor,
Md Amiruzzaman,
Sharyar Wani,
Md. Rajibul Islam
Abstract:
The Domain Name System (DNS) is essential for the Internet, giving a mechanism to resolve hostnames into Internet Protocol (IP) addresses. DNS is known as the world's largest distributed database that manages hostnames and Internet Protocol. By having the DNS, only simple names that can be easily memorized will be used and then the domain name system will map it into the numeric Internet Protocol…
▽ More
The Domain Name System (DNS) is essential for the Internet, giving a mechanism to resolve hostnames into Internet Protocol (IP) addresses. DNS is known as the world's largest distributed database that manages hostnames and Internet Protocol. By having the DNS, only simple names that can be easily memorized will be used and then the domain name system will map it into the numeric Internet Protocol addresses that are used by computers to communicate. This research aims to propose a model for the development of a private cloud infrastructure to host DNS. The cloud infrastructure will be created using the OpenStack software platform where each server will be hosted separately in a different virtual machine. Virtual network architecture will be created using the Software Defined Networking (SDN) approach and it will be secured using Firewall as a Service (FWaaS). By hosting DNS in private cloud infrastructure, the DNS servers will be out of reach by attackers which will prevent DNS attacks. Besides, available research had proven that the cloud is the best choice for DNS. A prototype had been implemented and evaluated for its efficiencies. The findings from the evaluation carried out shown a positive result.
△ Less
Submitted 28 August, 2021; v1 submitted 8 June, 2021;
originally announced June 2021.
-
TabAug: Data Driven Augmentation for Enhanced Table Structure Recognition
Authors:
Umar Khan,
Sohaib Zahid,
Muhammad Asad Ali,
Adnan ul Hassan,
Faisal Shafait
Abstract:
Table Structure Recognition is an essential part of end-to-end tabular data extraction in document images. The recent success of deep learning model architectures in computer vision remains to be non-reflective in table structure recognition, largely because extensive datasets for this domain are still unavailable while labeling new data is expensive and time-consuming. Traditionally, in computer…
▽ More
Table Structure Recognition is an essential part of end-to-end tabular data extraction in document images. The recent success of deep learning model architectures in computer vision remains to be non-reflective in table structure recognition, largely because extensive datasets for this domain are still unavailable while labeling new data is expensive and time-consuming. Traditionally, in computer vision, these challenges are addressed by standard augmentation techniques that are based on image transformations like color jittering and random cropping. As demonstrated by our experiments, these techniques are not effective for the task of table structure recognition. In this paper, we propose TabAug, a re-imagined Data Augmentation technique that produces structural changes in table images through replication and deletion of rows and columns. It also consists of a data-driven probabilistic model that allows control over the augmentation process. To demonstrate the efficacy of our approach, we perform experimentation on ICDAR 2013 dataset where our approach shows consistent improvements in all aspects of the evaluation metrics, with cell-level correct detections improving from 92.16% to 96.11% over the baseline.
△ Less
Submitted 15 May, 2021; v1 submitted 29 April, 2021;
originally announced April 2021.
-
Privacy Enhanced Speech Emotion Communication using Deep Learning Aided Edge Computing
Authors:
Hafiz Shehbaz Ali,
Fakhar ul Hassan,
Siddique Latif,
Habib Ullah Manzoor,
Junaid Qadir
Abstract:
Speech emotion sensing in communication networks has a wide range of applications in real life. In these applications, voice data are transmitted from the user to the central server for storage, processing, and decision making. However, speech data contain vulnerable information that can be used maliciously without the user's consent by an eavesdropping adversary. In this work, we present a privac…
▽ More
Speech emotion sensing in communication networks has a wide range of applications in real life. In these applications, voice data are transmitted from the user to the central server for storage, processing, and decision making. However, speech data contain vulnerable information that can be used maliciously without the user's consent by an eavesdropping adversary. In this work, we present a privacy-enhanced emotion communication system for preserving the user personal information in emotion-sensing applications. We propose the use of an adversarial learning framework that can be deployed at the edge to unlearn the users' private information in the speech representations. These privacy-enhanced representations can be transmitted to the central server for decision making. We evaluate the proposed model on multiple speech emotion datasets and show that the proposed model can hide users' specific demographic information and improve the robustness of emotion identification without significantly impacting performance. To the best of our knowledge, this is the first work on a privacy-preserving framework for emotion sensing in the communication network.
△ Less
Submitted 31 March, 2021;
originally announced March 2021.
-
Optimizing Blockchain Based Smart Grid Auctions: A Green Revolution
Authors:
Muneeb Ul Hassan,
Mubashir Husain Rehmani,
Jinjun Chen
Abstract:
Traditional smart grid energy auctions cannot directly be integrated in blockchain due to its decentralized nature. Therefore, research works are being carried out to propose efficient decentralized auctions for energy trading. Since, blockchain is a novel paradigm which ensures trust, but it also comes up with a curse of high computation and communication complexity which eventually causes resour…
▽ More
Traditional smart grid energy auctions cannot directly be integrated in blockchain due to its decentralized nature. Therefore, research works are being carried out to propose efficient decentralized auctions for energy trading. Since, blockchain is a novel paradigm which ensures trust, but it also comes up with a curse of high computation and communication complexity which eventually causes resource scarcity. Therefore, there is a need to develop and encourage development of greener and computational-friendly auctions to carry out decentralized energy trading. In this paper, we first provide a thorough motivation of decentralized auctions over traditional auctions. Afterwards, we provide in-depth design requirements that can be taken into consideration while developing such auctions. After that, we analyze technical works that have developed blockchain based energy auctions from green perspective. Finally, we summarize the article by providing challenges and possible future research directions of blockchain based energy auction from green viewpoint.
△ Less
Submitted 27 June, 2021; v1 submitted 4 February, 2021;
originally announced February 2021.
-
VPT: Privacy Preserving Energy Trading and Block Mining Mechanism for Blockchain based Virtual Power Plants
Authors:
Muneeb Ul Hassan,
Mubashir Husain Rehmani,
Jinjun Chen
Abstract:
The desire to overcome reliability issues of distributed energy resources (DERs) lead researchers to development of a novel concept named as virtual power plant (VPP). VPPs are supposed to carry out intelligent, secure, and smart energy trading among prosumers, buyers, and generating stations along with providing efficient energy management. Therefore, integrating blockchain in a decentralized VPP…
▽ More
The desire to overcome reliability issues of distributed energy resources (DERs) lead researchers to development of a novel concept named as virtual power plant (VPP). VPPs are supposed to carry out intelligent, secure, and smart energy trading among prosumers, buyers, and generating stations along with providing efficient energy management. Therefore, integrating blockchain in a decentralized VPP network emerged as a new paradigm, and recent experiments over this integration have shown fruitful results. However, this decentralization also suffers with energy management, trust, reliability, and efficiency issues due to the dynamic nature of DERs. In order to overcome this, in this paper, we first work over providing an efficient energy management strategy for VPP to enhance demand response, then we propose an energy oriented trading and block mining protocol and name it as proof of energy market (PoEM). To enhance it further, we integrate differential privacy in PoEM and propose a Private PoEM (PPoEM) model. Collectively, we propose a private decentralized VPP trading model and named it as Virtual Private Trading (VPT) model. We further carry out extensive theoretical analysis and derive step-by-step valuations for market race probability, market stability probability, energy trading expectation, winning state probability, and prospective leading time profit values. Afterwards, we carry out simulation-based experiments of our proposed model. The performance evaluation and theoretical analysis of our VPT model make it one of the most viable models for blockchain based VPP networks as compared to other state-of-the-art works.
△ Less
Submitted 29 August, 2022; v1 submitted 2 February, 2021;
originally announced February 2021.
-
Differentially Private Demand Side Management for Incentivized Dynamic Pricing in Smart Grid
Authors:
Muneeb Ul Hassan,
Mubashir Husain Rehmani,
Jia Tina Du,
Jinjun Chen
Abstract:
In order to efficiently provide demand side management (DSM) in smart grid, carrying out pricing on the basis of real-time energy usage is considered to be the most vital tool because it is directly linked with the finances associated with smart meters. Hence, every smart meter user wants to pay the minimum possible amount along with getting maximum benefits. In this context, usage based dynamic p…
▽ More
In order to efficiently provide demand side management (DSM) in smart grid, carrying out pricing on the basis of real-time energy usage is considered to be the most vital tool because it is directly linked with the finances associated with smart meters. Hence, every smart meter user wants to pay the minimum possible amount along with getting maximum benefits. In this context, usage based dynamic pricing strategies of DSM plays their role and provide users with specific incentives that help shaping their load curve according to the forecasted load. However, these reported real-time values can leak privacy of smart meter users, which can lead to serious consequences such as spying, etc. Moreover, most dynamic pricing algorithms charge all users equally irrespective of their contribution in causing peak factor. Therefore, in this paper, we propose a modified usage based dynamic pricing mechanism that only charges the users responsible for causing peak factor. We further integrate the concept of differential privacy to protect the privacy of real-time smart metering data. To calculate accurate billing, we also propose a noise adjustment method. Finally, we propose Demand Response enhancing Differential Pricing (DRDP) strategy that effectively enhances demand response along with providing dynamic pricing to smart meter users. We also carry out theoretical analysis for differential privacy guarantees and for cooperative state probability to analyze behavior of cooperative smart meters. The performance evaluation of DRDP strategy at various privacy parameters show that the proposed strategy outperforms previous mechanisms in terms of dynamic pricing and privacy preservation.
△ Less
Submitted 25 January, 2022; v1 submitted 2 February, 2021;
originally announced February 2021.
-
Déjà Vu: Side-Channel Analysis of Mozilla's NSS
Authors:
Sohaib ul Hassan,
Iaroslav Gridin,
Ignacio M. Delgado-Lozano,
Cesar Pereida García,
Jesús-Javier Chi-Domínguez,
Alejandro Cabrera Aldaya,
Billy Bob Brumley
Abstract:
Recent work on Side Channel Analysis (SCA) targets old, well-known vulnerabilities, even previously exploited, reported, and patched in high-profile cryptography libraries. Nevertheless, researchers continue to find and exploit the same vulnerabilities in old and new products, highlighting a big issue among vendors: effectively tracking and fixing security vulnerabilities when disclosure is not do…
▽ More
Recent work on Side Channel Analysis (SCA) targets old, well-known vulnerabilities, even previously exploited, reported, and patched in high-profile cryptography libraries. Nevertheless, researchers continue to find and exploit the same vulnerabilities in old and new products, highlighting a big issue among vendors: effectively tracking and fixing security vulnerabilities when disclosure is not done directly to them. In this work, we present another instance of this issue by performing the first library-wide SCA security evaluation of Mozilla's NSS security library. We use a combination of two independently-developed SCA security frameworks to identify and test security vulnerabilities. Our evaluation uncovers several new vulnerabilities in NSS affecting DSA, ECDSA, and RSA cryptosystems. We exploit said vulnerabilities and implement key recovery attacks using signals---extracted through different techniques such as timing, microarchitecture, and EM---and improved lattice methods.
△ Less
Submitted 13 August, 2020;
originally announced August 2020.
-
Dense Small Satellite Networks for Modern Terrestrial Communication Systems: Benefits, Infrastructure, and Technologies
Authors:
Naveed UL Hassan,
Chongwen Huang,
Chau Yuen,
Ayaz Ahmad,
Yan Zhang
Abstract:
Dense small satellite networks (DSSN) in low earth orbits (LEO) can benefit several mobile terrestrial communication systems (MTCS). However, the potential benefits can only be achieved through careful consideration of DSSN infrastructure and identification of suitable DSSN technologies. In this paper, we discuss several components of DSSN infrastructure including satellite formations, orbital pat…
▽ More
Dense small satellite networks (DSSN) in low earth orbits (LEO) can benefit several mobile terrestrial communication systems (MTCS). However, the potential benefits can only be achieved through careful consideration of DSSN infrastructure and identification of suitable DSSN technologies. In this paper, we discuss several components of DSSN infrastructure including satellite formations, orbital paths, inter-satellite communication (ISC) links, and communication architectures for data delivery from source to destination. We also review important technologies for DSSN as well as the challenges involved in the use of these technologies in DSSN. Several open research directions to enhance the benefits of DSSN for MTCS are also identified in the paper. A case study showing the integration benefits of DSSN in MTCS is also included.
△ Less
Submitted 30 July, 2020;
originally announced July 2020.
-
Performance Evaluation of Differential Privacy Mechanisms in Blockchain based Smart Metering
Authors:
Muneeb Ul Hassan,
Mubashir Husain Rehmani,
Jinjun Chen
Abstract:
The concept of differential privacy emerged as a strong notion to protect database privacy in an untrusted environment. Later on, researchers proposed several variants of differential privacy in order to preserve privacy in certain other scenarios, such as real-time cyber physical systems. Since then, differential privacy has rigorously been applied to certain other domains which has the need of p…
▽ More
The concept of differential privacy emerged as a strong notion to protect database privacy in an untrusted environment. Later on, researchers proposed several variants of differential privacy in order to preserve privacy in certain other scenarios, such as real-time cyber physical systems. Since then, differential privacy has rigorously been applied to certain other domains which has the need of privacy preservation. One such domain is decentralized blockchain based smart metering, in which smart meters acting as blockchain nodes sent their real-time data to grid utility databases for real-time reporting. This data is further used to carry out statistical tasks, such as load forecasting, demand response calculation, etc. However, in case if any intruder gets access to this data it can leak privacy of smart meter users. In this context, differential privacy can be used to protect privacy of this data. In this chapter, we carry out comparison of four variants of differential privacy (Laplace, Gaussian, Uniform, and Geometric) in blockchain based smart metering scenario. We test these variants on smart metering data and carry out their performance evaluation by varying different parameters. Experimental outcomes shows at low privacy budget ($\varepsilon$) and at low reading sensitivity value ($δ$), these privacy preserving mechanisms provide high privacy by adding large amount of noise. However, among these four privacy preserving parameters Geometric parameters is more suitable for protecting high peak values and Laplace mechanism is more suitable for protecting low peak values at ($\varepsilon$ = 0.01).
△ Less
Submitted 19 July, 2020;
originally announced July 2020.
-
Efficient Data Analytics on Augmented Similarity Triplets
Authors:
Sarwan Ali,
Muhammad Ahmad,
Umair ul Hassan,
Muhammad Asad Khan,
Shafiq Alam,
Imdadullah Khan
Abstract:
Data analysis require a pairwise proximity measure over objects. Recent work has extended this to situations where the distance information between objects is given as comparison results of distances between three objects (triplets). Humans find the comparison tasks much easier than the exact distance computation and such data can be easily obtained in big quantity via crowd-sourcing. In this work…
▽ More
Data analysis require a pairwise proximity measure over objects. Recent work has extended this to situations where the distance information between objects is given as comparison results of distances between three objects (triplets). Humans find the comparison tasks much easier than the exact distance computation and such data can be easily obtained in big quantity via crowd-sourcing. In this work, we propose triplets augmentation, an efficient method to extend the triplets data by inferring the hidden implicit information form the existing data. Triplets augmentation improves the quality of kernel-based and kernel-free data analytics. We also propose a novel set of algorithms for common data analysis tasks based on triplets. These methods work directly with triplets and avoid kernel evaluations, thus are scalable to big data. We demonstrate that our methods outperform the current best-known techniques and are robust to noisy data.
△ Less
Submitted 18 February, 2023; v1 submitted 27 December, 2019;
originally announced December 2019.
-
Differential Privacy in Blockchain Technology: A Futuristic Approach
Authors:
Muneeb Ul Hassan,
Mubashir Husain Rehmani,
Jinjun Chen
Abstract:
Blockchain has received a widespread attention because of its decentralized, tamper-proof, and transparent nature. Blockchain works over the principle of distributed, secured, and shared ledger, which is used to record, and track data within a decentralized network. This technology has successfully replaced certain systems of economic transactions in organizations and has the potential to overtake…
▽ More
Blockchain has received a widespread attention because of its decentralized, tamper-proof, and transparent nature. Blockchain works over the principle of distributed, secured, and shared ledger, which is used to record, and track data within a decentralized network. This technology has successfully replaced certain systems of economic transactions in organizations and has the potential to overtake various industrial business models in future. Blockchain works over peer-to-peer (P2P) phenomenon for its operation and does not require any trusted-third party authorization for data tracking and storage. The information stored in blockchain is distributed throughout the decentralized network and is usually protected using cryptographic hash functions. Since the beginning of blockchain technology, its use in different applications is increasing exponentially, but this increased use has also raised some questions regarding privacy and security of data being stored in it. Protecting privacy of blockchain data using data perturbation strategy such as differential privacy could be a novel approach to overcome privacy issues in blockchain. In this article, we cover the topic of integration of differential privacy in each layer of blockchain and in certain blockchain based scenarios. Moreover, we highlight some future challenges and application scenarios in which integration of differential privacy in blockchain can produce fruitful results.
△ Less
Submitted 18 April, 2020; v1 submitted 9 October, 2019;
originally announced October 2019.
-
Blockchain Technologies for Smart Energy Systems: Fundamentals, Challenges and Solutions
Authors:
Naveed UL Hassan,
Chau Yuen,
Dusit Niyato
Abstract:
In this paper, we discuss the integration of blockchain in smart energy systems. We present various blockchain technology solutions, review important blockchain platforms, and several blockchain based smart energy projects in different smart energy domains. The majority of blockchain platforms with embedded combination of blockchain technology solutions are computing- and resource- intensive, and…
▽ More
In this paper, we discuss the integration of blockchain in smart energy systems. We present various blockchain technology solutions, review important blockchain platforms, and several blockchain based smart energy projects in different smart energy domains. The majority of blockchain platforms with embedded combination of blockchain technology solutions are computing- and resource- intensive, and hence not entirely suitable for smart energy applications. We consider the requirements of smart energy systems and accordingly identify appropriate blockchain technology solutions for smart energy applications. Our analysis can help in the development of flexible blockchain platforms for smart energy systems.
△ Less
Submitted 6 September, 2019;
originally announced September 2019.
-
Certified Side Channels
Authors:
Cesar Pereida García,
Sohaib ul Hassan,
Nicola Tuveri,
Iaroslav Gridin,
Alejandro Cabrera Aldaya,
Billy Bob Brumley
Abstract:
We demonstrate that the format in which private keys are persisted impacts Side Channel Analysis (SCA) security. Surveying several widely deployed software libraries, we investigate the formats they support, how they parse these keys, and what runtime decisions they make. We uncover a combination of weaknesses and vulnerabilities, in extreme cases inducing completely disjoint multi-precision arith…
▽ More
We demonstrate that the format in which private keys are persisted impacts Side Channel Analysis (SCA) security. Surveying several widely deployed software libraries, we investigate the formats they support, how they parse these keys, and what runtime decisions they make. We uncover a combination of weaknesses and vulnerabilities, in extreme cases inducing completely disjoint multi-precision arithmetic stacks deep within the cryptosystem level for keys that otherwise seem logically equivalent. Exploiting these vulnerabilities, we design and implement key recovery attacks utilizing signals ranging from electromagnetic (EM) emanations, to granular microarchitecture cache timings, to coarse traditional wall clock timings.
△ Less
Submitted 1 April, 2020; v1 submitted 4 September, 2019;
originally announced September 2019.
-
Blockchain And The Future of the Internet: A Comprehensive Review
Authors:
Fakhar ul Hassan,
Anwaar Ali,
Mohamed Rahouti,
Siddique Latif,
Salil Kanhere,
Jatinder Singh,
AlaAl-Fuqaha,
Umar Janjua,
Adnan Noor Mian,
Junaid Qadir,
Jon Crowcroft
Abstract:
Blockchain is challenging the status quo of the central trust infrastructure currently prevalent in the Internet towards a design principle that is underscored by decentralization, transparency, and trusted auditability. In ideal terms, blockchain advocates a decentralized, transparent, and more democratic version of the Internet. Essentially being a trusted and decentralized database, blockchain…
▽ More
Blockchain is challenging the status quo of the central trust infrastructure currently prevalent in the Internet towards a design principle that is underscored by decentralization, transparency, and trusted auditability. In ideal terms, blockchain advocates a decentralized, transparent, and more democratic version of the Internet. Essentially being a trusted and decentralized database, blockchain finds its applications in fields as varied as the energy sector, forestry, fisheries, mining, material recycling, air pollution monitoring, supply chain management, and their associated operations. In this paper, we present a survey of blockchain-based network applications. Our goal is to cover the evolution of blockchain-based systems that are trying to bring in a renaissance in the existing, mostly centralized, space of network applications. While re-imagining the space with blockchain, we highlight various common challenges, pitfalls, and shortcomings that can occur. Our aim is to make this work as a guiding reference manual for someone interested in shifting towards a blockchain-based solution for one's existing use case or automating one from the ground up.
△ Less
Submitted 13 November, 2020; v1 submitted 23 February, 2019;
originally announced April 2019.
-
A Bibliometric Analysis of Publications in Computer Networking Research
Authors:
Waleed Iqbal,
Junaid Qadir,
Gareth Tyson,
Adnan Noor Mian,
Saeed Ul Hassan,
Jon Crowcroft
Abstract:
This study uses the article content and metadata of four important computer networking periodicals-IEEE Communications Surveys and Tutorials (COMST), IEEE/ACM Transactions on Networking (TON), ACM Special Interest Group on Data Communications (SIGCOMM), and IEEE International Conference on Computer Communications (INFOCOM)-obtained using ACM, IEEE Xplore, Scopus and CrossRef, for an 18-year period…
▽ More
This study uses the article content and metadata of four important computer networking periodicals-IEEE Communications Surveys and Tutorials (COMST), IEEE/ACM Transactions on Networking (TON), ACM Special Interest Group on Data Communications (SIGCOMM), and IEEE International Conference on Computer Communications (INFOCOM)-obtained using ACM, IEEE Xplore, Scopus and CrossRef, for an 18-year period (2000-2017) to address important bibliometrics questions. All of the venues are prestigious, yet they publish quite different research. The first two of these periodicals (COMST and TON) are highly reputed journals of the fields while SIGCOMM and INFOCOM are considered top conferences of the field. SIGCOMM and INFOCOM publish new original research. TON has a similar genre and publishes new original research as well as the extended versions of different research published in the conferences such as SIGCOMM and INFOCOM, while COMST publishes surveys and reviews (which not only summarize previous works but highlight future research opportunities). In this study, we aim to track the co-evolution of trends in the COMST and TON journals and compare them to the publication trends in INFOCOM and SIGCOMM. Our analyses of the computer networking literature include: (a) metadata analysis; (b) content-based analysis; and (c) citation analysis. In addition, we identify the significant trends and the most influential authors, institutes and countries, based on the publication count as well as article citations. Through this study, we are proposing a methodology and framework for performing a comprehensive bibliometric analysis on computer networking research. To the best of our knowledge, no such study has been undertaken in computer networking until now.
△ Less
Submitted 4 March, 2019;
originally announced March 2019.
-
Differential Privacy Techniques for Cyber Physical Systems: A Survey
Authors:
Muneeb Ul Hassan,
Mubashir Husain Rehmani,
Jinjun Chen
Abstract:
Modern cyber physical systems (CPSs) has widely being used in our daily lives because of development of information and communication technologies (ICT).With the provision of CPSs, the security and privacy threats associated to these systems are also increasing. Passive attacks are being used by intruders to get access to private information of CPSs. In order to make CPSs data more secure, certain…
▽ More
Modern cyber physical systems (CPSs) has widely being used in our daily lives because of development of information and communication technologies (ICT).With the provision of CPSs, the security and privacy threats associated to these systems are also increasing. Passive attacks are being used by intruders to get access to private information of CPSs. In order to make CPSs data more secure, certain privacy preservation strategies such as encryption, and k-anonymity have been presented in the past. However, with the advances in CPSs architecture, these techniques also needs certain modifications. Meanwhile, differential privacy emerged as an efficient technique to protect CPSs data privacy. In this paper, we present a comprehensive survey of differential privacy techniques for CPSs. In particular, we survey the application and implementation of differential privacy in four major applications of CPSs named as energy systems, transportation systems, healthcare and medical systems, and industrial Internet of things (IIoT). Furthermore, we present open issues, challenges, and future research direction for differential privacy techniques for CPSs. This survey can serve as basis for the development of modern differential privacy techniques to address various problems and data privacy scenarios of CPSs.
△ Less
Submitted 27 September, 2019; v1 submitted 5 December, 2018;
originally announced December 2018.
-
ISLAND: In-Silico Prediction of Proteins Binding Affinity Using Sequence Descriptors
Authors:
Wajid Arshad Abbasi,
Fahad Ul Hassan,
Adiba Yaseen,
Fayyaz Ul Amir Afsar Minhas
Abstract:
Determination of binding affinity of proteins in the formation of protein complexes requires sophisticated, expensive and time-consuming experimentation which can be replaced with computational methods. Most computational prediction techniques require protein structures which limit their applicability to protein complexes with known structures. In this work, we explore sequence based protein bindi…
▽ More
Determination of binding affinity of proteins in the formation of protein complexes requires sophisticated, expensive and time-consuming experimentation which can be replaced with computational methods. Most computational prediction techniques require protein structures which limit their applicability to protein complexes with known structures. In this work, we explore sequence based protein binding affinity prediction using machine learning. Our paper highlights the fact that the generalization performance of even the state of the art sequence-only predictor of binding affinity is far from satisfactory and that the development of effective and practical methods in this domain is still an open problem. We also propose a novel sequence-only predictor of binding affinity called ISLAND which gives better accuracy than existing methods over the same validation set as well as on external independent test dataset. A cloud-based webserver implementation of ISLAND and its Python code are available at the URL: http://faculty.pieas.edu.pk/fayyaz/software.html#island.
△ Less
Submitted 22 March, 2018; v1 submitted 22 November, 2017;
originally announced November 2017.
-
Societal impacts of big data: challenges and opportunities in Europe
Authors:
Martí Cuquet,
Guillermo Vega-Gorgojo,
Hans Lammerant,
Rachel Finn,
Umair ul Hassan
Abstract:
This paper presents the risks and opportunities of big data and the potential social benefits it can bring. The research is based on an analysis of the societal impacts observed in a set of six case studies across different European sectors. These impacts are divided into economic, social and ethical, legal and political impacts, and affect areas such as improved efficiency, innovation and decisio…
▽ More
This paper presents the risks and opportunities of big data and the potential social benefits it can bring. The research is based on an analysis of the societal impacts observed in a set of six case studies across different European sectors. These impacts are divided into economic, social and ethical, legal and political impacts, and affect areas such as improved efficiency, innovation and decision making, changing business models, dependency on public funding, participation, equality, discrimination and trust, data protection and intellectual property rights, private and public tensions and losing control to actors abroad. A special focus is given to the risks and opportunities coming from the legal framework and how to counter the negative impacts of big data. Recommendations are presented for four specific legal frameworks: copyright and database protection, protection of trade secrets, privacy and data protection and anti-discrimination. In addition, the potential social benefits of big data are exemplified in six domains: improved decision making and event detection; data-driven innovations and new business models; direct social, environmental and other citizen benefits; citizen participation, transparency and public trust; privacy-aware data practices; and big data for identifying discrimination. Several best practices are suggested to capture these benefits.
△ Less
Submitted 11 April, 2017;
originally announced April 2017.
-
HiFrames: High Performance Data Frames in a Scripting Language
Authors:
Ehsan Totoni,
Wajih Ul Hassan,
Todd A. Anderson,
Tatiana Shpeisman
Abstract:
Data frames in scripting languages are essential abstractions for processing structured data. However, existing data frame solutions are either not distributed (e.g., Pandas in Python) and therefore have limited scalability, or they are not tightly integrated with array computations (e.g., Spark SQL). This paper proposes a novel compiler-based approach where we integrate data frames into the High…
▽ More
Data frames in scripting languages are essential abstractions for processing structured data. However, existing data frame solutions are either not distributed (e.g., Pandas in Python) and therefore have limited scalability, or they are not tightly integrated with array computations (e.g., Spark SQL). This paper proposes a novel compiler-based approach where we integrate data frames into the High Performance Analytics Toolkit (HPAT) to build HiFrames. It provides expressive and flexible data frame APIs which are tightly integrated with array operations. HiFrames then automatically parallelizes and compiles relational operations along with other array computations in end-to-end data analytics programs, and generates efficient MPI/C++ code. We demonstrate that HiFrames is significantly faster than alternatives such as Spark SQL on clusters, without forcing the programmer to switch to embedded SQL for part of the program. HiFrames is 3.6x to 70x faster than Spark SQL for basic relational operations, and can be up to 20,000x faster for advanced analytics operations, such as weighted moving averages (WMA), that the map-reduce paradigm cannot handle effectively. HiFrames is also 5x faster than Spark SQL for TPCx-BB Q26 on 64 nodes of Cori supercomputer.
△ Less
Submitted 7 April, 2017;
originally announced April 2017.
-
Don't cry over spilled records: Memory elasticity of data-parallel applications and its application to cluster scheduling
Authors:
Calin Iorgulescu,
Florin Dinu,
Aunn Raza,
Wajih Ul Hassan,
Willy Zwaenepoel
Abstract:
Understanding the performance of data-parallel workloads when resource-constrained has significant practical importance but unfortunately has received only limited attention. This paper identifies, quantifies and demonstrates memory elasticity, an intrinsic property of data-parallel tasks. Memory elasticity allows tasks to run with significantly less memory that they would ideally want while only…
▽ More
Understanding the performance of data-parallel workloads when resource-constrained has significant practical importance but unfortunately has received only limited attention. This paper identifies, quantifies and demonstrates memory elasticity, an intrinsic property of data-parallel tasks. Memory elasticity allows tasks to run with significantly less memory that they would ideally want while only paying a moderate performance penalty. For example, we find that given as little as 10% of ideal memory, PageRank and NutchIndexing Hadoop reducers become only 1.2x/1.75x and 1.08x slower. We show that memory elasticity is prevalent in the Hadoop, Spark, Tez and Flink frameworks. We also show that memory elasticity is predictable in nature by building simple models for Hadoop and extending them to Tez and Spark.
To demonstrate the potential benefits of leveraging memory elasticity, this paper further explores its application to cluster scheduling. In this setting, we observe that the resource vs. time trade-off enabled by memory elasticity becomes a task queuing time vs task runtime trade-off. Tasks may complete faster when scheduled with less memory because their waiting time is reduced. We show that a scheduler can turn this task-level trade-off into improved job completion time and cluster-wide memory utilization. We have integrated memory elasticity into Apache YARN. We show gains of up to 60% in average job completion time on a 50-node Hadoop cluster. Extensive simulations show similar improvements over a large number of scenarios.
△ Less
Submitted 14 February, 2017;
originally announced February 2017.
-
Exploiting QoS Flexibility for Smart Grid and IoT Applications Using TV White Spaces: Extended Version
Authors:
Naveed UL Hassan,
Chau Yuen,
Muhammad Bershgal Atique
Abstract:
In this paper, we consider the utilization of TV White Spaces (TVWS) by small Cognitive Radio (CR) wireless network operators (SCWNO) to support the communication needs of various smart grid and internet of things (IoT) applications. Spectrum leasing could be essential for SCWNO to support a wide range of applications. In our paper, we assume that in order to ensure Quality of service (QoS) requir…
▽ More
In this paper, we consider the utilization of TV White Spaces (TVWS) by small Cognitive Radio (CR) wireless network operators (SCWNO) to support the communication needs of various smart grid and internet of things (IoT) applications. Spectrum leasing could be essential for SCWNO to support a wide range of applications. In our paper, we assume that in order to ensure Quality of service (QoS) requirements, the CR operator has the option of leasing the specially designated high priority TVWS channels (HPC) for short term use by paying a small fee according to the actual usage. Based on Lyapunov drift plus penalty function framework, we develop an online algorithm to exploit QoS flexibility. Such flexibility might be available in terms of data transmission delays as well as data quality reduction in order to minimize the overall HPC leasing cost. The developed algorithm also provides three adjustable parameters that could be controlled to tradeoff the total cost and QoS. The performance of the proposed algorithm is very close to the optimal offline lower bound solution.
△ Less
Submitted 10 February, 2017;
originally announced February 2017.
-
Guaranteeing QoS using Unlicensed TV White Spaces for Smart Grid Applications
Authors:
Naveed Ul Hassan,
Wayes Tushar,
Chau Yuen,
See Gim Kerk,
Ser Wah Oh
Abstract:
In this paper, we consider the utilization of TV White Spaces (TVWS) by small Cognitive Radio (CR) network operators to support the communication needs of various smart grid applications. We first propose a multi-tier communication network architecture for smart metering applications in dense urban environments. Our measurement campaign, without any competition from other CR operators, reveals tha…
▽ More
In this paper, we consider the utilization of TV White Spaces (TVWS) by small Cognitive Radio (CR) network operators to support the communication needs of various smart grid applications. We first propose a multi-tier communication network architecture for smart metering applications in dense urban environments. Our measurement campaign, without any competition from other CR operators, reveals that the communication architecture can achieve more than 1Mbps data rates using the free unlicensed TVWS spectrum. However, anticipating stiff competition for the unlicensed TVWS spectrum among CR operators and to support smart grid applications with stringent Quality of Service (QoS) requirements, we further exploit the novel idea of high priority channels (HPC) that the CR operator can temporarily lease by paying a small fee. This poses several new challenges for the CR operators, such as, their economic viability while providing QoS guarantees. We develop a real-time decision support framework with several adjustable parameters for the CR operators that enables them to tradeoff HPC leasing cost and QoS. The developed algorithms are simple rules that provide significant opportunities to the CR operators to maintain a balance between spectrum cost and QoS depending on dynamic spectrum availability and smart grid application requirements.
△ Less
Submitted 6 December, 2016;
originally announced January 2017.
-
Challenges and some new directions in channel coding
Authors:
Erdal Arikan,
Najeeb ul Hassan,
Michael Lentmaier,
Guido Montorsi,
Jossy Sayir
Abstract:
Three areas of ongoing research in channel coding are surveyed, and recent developments are presented in each area: spatially coupled Low-Density Parity-Check (LDPC) codes, non-binary LDPC codes, and polar coding.
Three areas of ongoing research in channel coding are surveyed, and recent developments are presented in each area: spatially coupled Low-Density Parity-Check (LDPC) codes, non-binary LDPC codes, and polar coding.
△ Less
Submitted 15 April, 2015;
originally announced April 2015.
-
Power Control for Sum Rate Maximization on Interference Channels Under Sum Power Constraint
Authors:
Naveed Ul Hassan,
Chau Yuen,
Shayan Saeed,
Zhaoyang Zhang
Abstract:
In this paper, we consider the problem of power control for sum rate maximization on multiple interfering links (TX-RX pairs)under sum power constraint. We consider a single frequency network, where all pairs are operating in same frequency band,thereby creating interference for each other. We study the power allocation problem for sum rate maximization with and without QoS requirements on individ…
▽ More
In this paper, we consider the problem of power control for sum rate maximization on multiple interfering links (TX-RX pairs)under sum power constraint. We consider a single frequency network, where all pairs are operating in same frequency band,thereby creating interference for each other. We study the power allocation problem for sum rate maximization with and without QoS requirements on individual links. When the objective is only sum rate maximization without QoS guarantees, we develop an analytic solution to decide optimal power allocation for two TX-RX pair problem. We also develop a low complexity iterative algorithm for three TX-RX pair problem. For a generic N>3 TX-RX pair problem, we develop two low-complexity sub-optimal power allocation algorithms. The first algorithm is based on the idea of making clusters of two or three TX-RX pairs and then leverage the power allocation results obtained for two and three TX-RX pair problems. The second algorithm is developed by using a high SINR approximation and this algorithm can also be implemented in a distributed manner by individual TXs. We then consider the same problem but with additional QoS guarantees for individual links. We again develop an analytic solution for two TX-RX pair problem, and a distributed algorithm for N>2 TX-RX pairs.
△ Less
Submitted 15 July, 2014;
originally announced July 2014.
-
Design of A Scalable Hybrid MAC Protocol for Heterogeneous M2M Networks
Authors:
Yi Liu,
Chau Yuen,
Xianghui Cao,
Naveed Ul Hassan,
Jiming Chen
Abstract:
A robust and resilient Medium Access Control (MAC) protocol is crucial for numerous machine-type devices to concurrently access the channel in a Machine-to-Machine (M2M) network. Simplex (reservation or contention based) MAC protocols are studied in most literatures which may not be able to provide a scalable solution for M2M networks with large number of heterogeneous devices. In this paper, a sc…
▽ More
A robust and resilient Medium Access Control (MAC) protocol is crucial for numerous machine-type devices to concurrently access the channel in a Machine-to-Machine (M2M) network. Simplex (reservation or contention based) MAC protocols are studied in most literatures which may not be able to provide a scalable solution for M2M networks with large number of heterogeneous devices. In this paper, a scalable hybrid MAC protocol, which consists of a contention period and a transmission period, is designed for heterogeneous M2M networks. In this protocol, different devices with pre-set priorities (hierarchical contending probabilities) firstly contend the transmission opportunities following the convention based $p$-persistent CSMA mechanism. Only the successful devices will be assigned a time slot for transmission following the reservation based TDMA mechanism. If the devices failed in contention at previous frame, to ensure the fairness among all devices, their contending priorities will be raised by increasing their contending probabilities at the next frame. To balance the tradeoff between the contention and transmission period in each frame, an optimization problem is formulated to maximize the channel utility by finding the key design parameters: the contention duration, initial contending probability and the incremental indicator. Analytical and simulation results demonstrate the effectiveness of the proposed Hybrid MAC protocol.
△ Less
Submitted 25 May, 2014;
originally announced May 2014.