scispace - formally typeset
Search or ask a question
Author

Mohsen Guizani

Bio: Mohsen Guizani is an academic researcher from Qatar University. The author has contributed to research in topics: Computer science & Cloud computing. The author has an hindex of 79, co-authored 1110 publications receiving 31282 citations. Previous affiliations of Mohsen Guizani include Jaypee Institute of Information Technology & University College for Women.


Papers
More filters
Journal ArticleDOI
TL;DR: A cross-domain robust distributed trust management (RobustTrust) system is proposed, which makes a device fit for assessing trust towards different devices locally and is event-driven that helps nodes to evaluate trust more effectively as well as enhance the system efficiency.
Abstract: In the promising time of the Internet, connected things have the ability to communicate and share information. The Internet of Things (IoT) cannot be implemented unless the security-related concerns have been resolved. Sharing information among different devices can compromise the private information of users. Thus, a suitable mechanism is needed to exclude the risk of malicious and compromised nodes. As follows, trust has been proposed in the literature as a useful technology to maintain users' security. Prior studies have proposed diverse trust management mechanisms to achieve adequate trust. The approach of cross-domain trust management is neglected that requires enormous considerations to address the difficulties related to cross-domain communication. In this paper, a cross-domain robust distributed trust management (RobustTrust) system is proposed, which makes a device fit for assessing trust towards different devices locally. In this system, the trust is divided into three components of security that help IoT nodes to become robust against compromised and malicious devices/nodes. The novelty of the proposed mechanism can be summarized in these aspects: A highly scalable trust mechanism, multiple components of evaluation to enhance robustness against attacks, and use of recommendations along with the feedback to build knowledge. Furthermore, the proposed mechanism is event-driven that helps nodes to evaluate trust more effectively as well as enhance the system efficiency. The proposed work is compared with the available trust evaluation schemes by concentrating on various attributes, such as trustworthiness, usability, and accuracy among others. The RobustTrust is validated by the extensive simulations considering absolute trust value's performance, the accuracy of trust estimation, and several potential attacks.

62 citations

Journal ArticleDOI
TL;DR: Comprehensive security analysis shows that BASA achieves both privacy preservation and security protection during battery state transitions, and indicates that battery status awareness is crucial for BVs' secure operations for V2G networks in smart grid.
Abstract: Vehicle-to-grid (V2G) is emerging as an attractive paradigm in smart grid, and provides power and information services by periodically collecting power status of battery vehicles (BVs). During a BV's interaction with power grid, it may be in one of the following states: charging, fully-charged (FC), and discharging. In this paper, we identify that there are unique security challenges in a BV's different battery states. Accordingly, we propose a battery status-aware authentication scheme (BASA) to address the issue for V2G networks. In BASA, 1) an aggregated-identifier is proposed during the charging-to-FC state transition to ensure that BVs can be authenticated without disclosing their real identities; 2) selective disclosure based challenge-response authentication is presented during the FC-to-discharging phase to realize anonymous data transmission; 3) an aggregated-status is reported during the discharging-to-charging transition in order to hide a BV's power level from an aggregator. In addition, we perform comprehensive security analysis, which shows that BASA achieves both privacy preservation and security protection during battery state transitions. The analysis also indicates that battery status awareness is crucial for BVs' secure operations for V2G networks in smart grid.

61 citations

Journal ArticleDOI
TL;DR: This paper investigates the impact of the high-power amplifier non-linear distortion on multiple relay systems by introducing the soft envelope limiter, traveling wave tube amplifier, and solid-state power amplifier to the relays.
Abstract: In this paper, we investigate the impact of the high-power amplifier non-linear distortion on multiple relay systems by introducing the soft envelope limiter, traveling wave tube amplifier, and solid-state power amplifier to the relays. The system employs amplify-and-forward either fixed or variable gain relaying and uses the opportunistic relay selection with outdated channel state information to select the best relay. The results show that the performance loss is small at low rates; however, it is significant for high rates. In particular, the outage probability and the bit error rate are saturated by an irreducible floor at high rates. The same analysis is pursued for the capacity and shows that it is saturated by a detrimental ceiling as the average signal-to-noise ratio becomes higher. This result contrasts the case of the ideal hardware where the capacity grows indefinitely. Moreover, the results show that the capacity ceiling is proportional to the impairment’s parameter and for some special cases the impaired systems practically operate in acceptable conditions. Closed-forms and high SNR asymptotes of the outage probability, the bit error rate, and the capacity are derived. Finally, analytical expressions are validated by the Monte Carlo simulation.

61 citations

Proceedings ArticleDOI
01 Dec 2019
TL;DR: This paper addressed the computational issues of existing ethereum blockchain by proposing a proof of authority consensus protocol through the Pagerank mechanism in order to derive the reputation scores and shows the efficiency of the proposed model to minimize privacy risk, and maximize aggregator's profit.
Abstract: The emergence of smart home appliances has generated a high volume of data on smart meters belonging to different customers. However, customers can not share their data in deregulated smart grids due to privacy concern. Although, these data are important for the service provider in order to provide an efficient service. To encourage the customers' participation, this paper proposes an access control mechanism by fairly compensating customers for their participation in data sharing via blockchain using the concept of differential privacy. We addressed the computational issues of existing ethereum blockchain by proposing a proof of authority consensus protocol through the Pagerank mechanism in order to derive the reputation scores. Experimental results show the efficiency of the proposed model to minimize privacy risk, and maximize aggregator's profit. In addition, gas consumption, as well as the cost of the computational resources, is reduced.

61 citations

Journal ArticleDOI
TL;DR: A distributed sensing resource discovery and virtualization algorithms that efficiently deploy virtual sensor networks on top of a subset of the selected IoT devices and an uncoordinated, distributed algorithm that relies on the selected sensors to estimate a set of parameters without requiring synchronization among the sensors are designed.
Abstract: We propose Cloud of Things for sensing-as-a-service: a global architecture that scales up cloud computing by exploiting the global sensing resources of the Internet of Things (IoT) to enable remote sensing. Cloud of Things enables in-network distributed processing of sensors data offered by the globally available IoT devices and provides a global platform for meaningful and responsive data analysis and decision making. We propose a distributed sensing resource discovery and virtualization algorithms that efficiently deploy virtual sensor networks on top of a subset of the selected IoT devices. We show, through analysis and simulations, the potential of the proposed solutions to realize virtual sensor networks with minimal physical resources, reduced communication overhead, and low complexity. We also design an uncoordinated, distributed algorithm that relies on the selected sensors to estimate a set of parameters without requiring synchronization among the sensors. Our simulations show that the proposed estimation algorithm, when compared to conventional alternating direction method of multipliers (ADMMs), reduces communication overhead significantly without compromising the estimation error. In addition, the convergence time, though increases slightly, is still linear as in the case of conventional ADMM.

61 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: Machine learning addresses many of the same research questions as the fields of statistics, data mining, and psychology, but with differences of emphasis.
Abstract: Machine Learning is the study of methods for programming computers to learn. Computers are applied to a wide range of tasks, and for most of these it is relatively easy for programmers to design and implement the necessary software. However, there are many tasks for which this is difficult or impossible. These can be divided into four general categories. First, there are problems for which there exist no human experts. For example, in modern automated manufacturing facilities, there is a need to predict machine failures before they occur by analyzing sensor readings. Because the machines are new, there are no human experts who can be interviewed by a programmer to provide the knowledge necessary to build a computer system. A machine learning system can study recorded data and subsequent machine failures and learn prediction rules. Second, there are problems where human experts exist, but where they are unable to explain their expertise. This is the case in many perceptual tasks, such as speech recognition, hand-writing recognition, and natural language understanding. Virtually all humans exhibit expert-level abilities on these tasks, but none of them can describe the detailed steps that they follow as they perform them. Fortunately, humans can provide machines with examples of the inputs and correct outputs for these tasks, so machine learning algorithms can learn to map the inputs to the outputs. Third, there are problems where phenomena are changing rapidly. In finance, for example, people would like to predict the future behavior of the stock market, of consumer purchases, or of exchange rates. These behaviors change frequently, so that even if a programmer could construct a good predictive computer program, it would need to be rewritten frequently. A learning program can relieve the programmer of this burden by constantly modifying and tuning a set of learned prediction rules. Fourth, there are applications that need to be customized for each computer user separately. Consider, for example, a program to filter unwanted electronic mail messages. Different users will need different filters. It is unreasonable to expect each user to program his or her own rules, and it is infeasible to provide every user with a software engineer to keep the rules up-to-date. A machine learning system can learn which mail messages the user rejects and maintain the filtering rules automatically. Machine learning addresses many of the same research questions as the fields of statistics, data mining, and psychology, but with differences of emphasis. Statistics focuses on understanding the phenomena that have generated the data, often with the goal of testing different hypotheses about those phenomena. Data mining seeks to find patterns in the data that are understandable by people. Psychological studies of human learning aspire to understand the mechanisms underlying the various learning behaviors exhibited by people (concept learning, skill acquisition, strategy change, etc.).

13,246 citations

Christopher M. Bishop1
01 Jan 2006
TL;DR: Probability distributions of linear models for regression and classification are given in this article, along with a discussion of combining models and combining models in the context of machine learning and classification.
Abstract: Probability Distributions.- Linear Models for Regression.- Linear Models for Classification.- Neural Networks.- Kernel Methods.- Sparse Kernel Machines.- Graphical Models.- Mixture Models and EM.- Approximate Inference.- Sampling Methods.- Continuous Latent Variables.- Sequential Data.- Combining Models.

10,141 citations

01 Jan 2002

9,314 citations