Conference Presentations by Emad ABD-ELRAHMAN
— An IoT-D2D cooperation framework for task allocation among objects in the IoT (Internet of Thin... more — An IoT-D2D cooperation framework for task allocation among objects in the IoT (Internet of Things) is presented. Proximity Services based on Device to Device (D2D) communication are used to enable direct interaction between IoT objects. The process is triggered by a node that decides to set up a cluster of nodes and then to coordinate the allocation strategy, where objects capable of performing the same tasks compete to get relevant remunerations. We then propose a game-theory based approach to find a solution maximizing objects utility functions. We prove that a Nash Equilibrium Point (NEP) can be found. Experimental results provide insights on the strategy performance.
Papers by Emad ABD-ELRAHMAN
International Journal on Smart Sensing and Intelligent Systems
Recently, most outdoor localizations use a hybrid mechanism that integrating some IoT devices occ... more Recently, most outdoor localizations use a hybrid mechanism that integrating some IoT devices occupying with GPS (Anchor Nodes) and other wireless sensor nodes like LoRaWAN (without GPS-Unknown node). This hybrid method employed to achieve low power consumption and low cost solution. Our proposed framework focuses on determining the Mobile Anchor node locations with high accuracy to enhance the overall accuracy of all IoT nodes. To achieve this goal, the installation of low power consummations and low-cost localization sensors modules will be used in the proposed Anchor IoT node. These modules are the inertial measuring unit (IMU) and the low cost Global Positioning System (GPS). Then, this method will be implemented on AVR microcontroller (ATMega 128) to develop an IoT enhanced localization unit. The achieved results for our proposal show how the IoT device's state can be known accurately and at a high update rate (100 Hz, 10 milliseconds).
Sensors
The Internet of Things (IoT) era is mainly dependent on the word “Smart”, such as smart cities, s... more The Internet of Things (IoT) era is mainly dependent on the word “Smart”, such as smart cities, smart homes, and smart cars. This aspect can be achieved through the merging of machine learning algorithms with IoT computing models. By adding the Artificial Intelligence (AI) algorithms to IoT, the result is the Cognitive IoT (CIoT). In the automotive industry, many researchers worked on self-diagnosis systems using deep learning, but most of them performed this process on the cloud due to the hardware limitations of the end-devices, and the devices obtain the decision via the cloud servers. Others worked with simple traditional algorithms of machine learning to solve these limitations of the processing capabilities of the end-devices. In this paper, a self-diagnosis smart device is introduced with fast responses and little overhead using the Multi-Layer Perceptron Neural Network (MLP-NN) as a deep learning technique. The MLP-NN learning stage is performed using a Tensorflow framework ...
IEEE Access
Edge Computing and Network Function Virtualization (NFV) concepts can improve network processing ... more Edge Computing and Network Function Virtualization (NFV) concepts can improve network processing and multi-resources allocation when intelligent optimization algorithms are deployed. Multiservice offloading and allocation approaches pose interesting challenges in the current and nextgeneration vehicle networks. The state-of-the-art optimization approaches still formulate exact algorithms, and tune approximation methods to get sufficient solutions. These approaches are data-centric that aim to use heterogeneous data inputs to find the near optimal solutions. In the context of connected and autonomous vehicles (CAVs), these techniques show an exponential computational time and deal only with small and medium scale networks. Therefore, we are motivated by using recent Deep Reinforcement Learning (DRL) techniques to learn the behavior of exact optimization algorithms while enhancing the Quality of Service (QoS) of network operators and satisfying the requirements of the next-generation Autonomous Vehicles (AVs). DRL algorithms can improve AVs service offloading and optimize edge resources. An Optimal Virtual Edge Autopilot Placement (OVEAP) algorithm is proposed using Integer Linear Programming (ILP). Moreover, an autopilot placement protocol is presented to support the algorithm. Optimal allocation and Virtual Network Function (VNF) placement and chaining of the autopilot, based on several new constraints such as computing and networking loads, network edge infrastructure, and placement cost, are designed. Further, a DRL approach is formulated to deal with dense Internet of Autonomous Vehicle (IoAV) networks. Extensive simulations and evaluations are carried out. Results show that the proposed allocation strategies outperform the state-of-the-art solutions and give better performance in terms of Total Edge Servers Utilization, Total Edge Servers Allocation Time, and Successfully Allocated autopilots.
Software Defined Networking (SDN) is based basically on three features: centralization of the con... more Software Defined Networking (SDN) is based basically on three features: centralization of the control plane, programmability of network functions and traffic engineering. The network function migration poses interesting problems that we try to expose and solve in this paper. Content Distribution Network virtualization is presented as use case.
2016 23rd International Conference on Telecommunications (ICT), 2016
An IoT-D2D cooperation framework for task allocation among objects in the IoT (Internet of Things... more An IoT-D2D cooperation framework for task allocation among objects in the IoT (Internet of Things) is presented. Proximity Services based on Device to Device (D2D) communication are used to enable direct interaction between IoT objects. The process is triggered by a node that decides to set up a cluster of nodes and then to coordinate the allocation strategy, where objects capable of performing the same tasks compete to get relevant remunerations. We then propose a game-theory based approach to find a solution maximizing objects utility functions. We prove that a Nash Equilibrium Point (NEP) can be found. Experimental results provide insights on the strategy performance.
This work aims to introduce an Utility-based approach for Video Service Delivery Optimization (U-... more This work aims to introduce an Utility-based approach for Video Service Delivery Optimization (U-VSDO). Through this optimization, a global utility function is calculated based on different constraints. Those constraints are considered based on separate utility function for each actor in the video service delivery chain (Content Provider (CP), Operator (OP) and Client (CL)). However, each actor has a global score for his vision, the overall optimization aims to satisfy the three actors. Our proposed methodology for this optimization is validated through different types of evaluation. First, a simulation based utility function is done for obtaining the optimal values of our optimization problem. Then, a complete GUI (Graphical User Interface) interface is built based on the main parameters for each actor. Finally, a test-bed is conducted to differentiate between two types of flows using open source Software Defined Network (SDN) controller. This part considered the standard use case ...
The prospection of video streaming security has been changed considerably during the last years. ... more The prospection of video streaming security has been changed considerably during the last years. With the new generation of hand healed devices and the delivery rate up to 2 Mb/s, the new prospection searched for fast security measures that have no great effects on the streaming fluidity. The hash chain has been largely used for such applications. The benefits from this deployment are the fast and the light calculations. But, the hash chain still suffers from some drawbacks related to chain link and robustness. This work studies different methods for achieving resynchronisation state for hash chain link. It also proposes a hybrid algorithm based on redundancy codes and windows flow which called Redundancy Code Synchronization Recovery State (RC-SRS). This technique merges the pros of all methods and avoids the cons of them. In the end, analytical and simulation results for the hybrid algorithm have been made. The results indicate that, that proposal has a good overall performance in...
2017 International Conference on Electrical and Computing Technologies and Applications (ICECTA), 2017
The rapid development of Internet and virtualization technologies are increased later, due to a b... more The rapid development of Internet and virtualization technologies are increased later, due to a burst of the amount of data that are made by the cloud computing distributed services. Therefore, the privacy and security of online services in business, organizations, corporations, small scale and large-scale manufactures are increasing extremely. Two virtual identity approaches based IBE and PBE for anonymous communication to secure online services in the cloud environments are proposed. This paper is focused on vulnerabilities detection and analyzing the performance of security measures for different possible attacks on the proposed approaches. AVISPA is the verification tool used in this work, which proved that our approaches merits for security resistance against the common attacks.
2017 IEEE 42nd Conference on Local Computer Networks (LCN), 2017
Virtual Content Delivery Network (vCDN) orchestration is necessary to optimize the use of resourc... more Virtual Content Delivery Network (vCDN) orchestration is necessary to optimize the use of resources and improve the performance of the overall SDN/NFV-based CDN function in terms of network operator cost reduction and high streaming quality. It requires intelligent and enticed joint SDN/NFV orchestration algorithm due to the evident huge amount of traffic to be delivered to end customers of the network. In this paper, a global vCDN architecture and an exact approach for finding the optimal path orchestration(s) and vCDN component instantiation(s) (OCPA) are proposed. Moreover, several scenarios are considered to quantify the OCPA behavior and to compare its efficiency in terms of caching and streaming cost, orchestration time, vCDN replication number, and other cost factors. Then, it is implemented and evaluated under different deployment flavors. Several scenarios are considered to study the algorithm’s behavior and to quantify the impact of both network and system parameters.
ArXiv, 2015
Consumers of short videos on Internet can have a bad Quality of Experience QoE due to the long di... more Consumers of short videos on Internet can have a bad Quality of Experience QoE due to the long distance between the consumers and the servers that hosting the videos. We propose an optimization of the file allocation in telecommunication operators content sharing servers to improve the QoE through files duplication, thus bringing the files closer to the consumers. This optimization allows the network operator to set the level of QoE and to have control over the users access cost by setting a number of parameters. Two optimization methods are given and are followed by a comparison of their efficiency. Also, the hosting costs versus the gain of optimization are analytically discussed.
ArXiv, 2011
Hash chains provide a secure and light way of security to data authentication including two aspec... more Hash chains provide a secure and light way of security to data authentication including two aspects: Data Integrity and Data Origin Authentication. The real challenge of using the hash chains is how it could recover the synchronization state and continue keeping the hash link in case of packet loss? Based on the packet loss tolerance and some accepted delay of video delivery which are representing the permitted tolerance for heavy loaded applications, we propose different mechanisms for such synchronization recovery. Each mechanism is suitable to use according to the video use case and the low capabilities of end devices. This paper proposes comparative results between them based on the status of each one and its overhead. Then, we propose a hybrid technique based Redundancy Code (RC). This hybrid algorithm is simulated and compared analytically against the other techniques (SHHC, TSP, MLHC and TSS). Moreover, a global performance evaluation in terms of delay and overhead is conduct...
2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC)
In multimedia delivery, especially for mobile users, the Multi-Path Transmission Control Protocol... more In multimedia delivery, especially for mobile users, the Multi-Path Transmission Control Protocol (MPTCP) can ameliorate the sustainability of multimedia sessions continuity. MPTCP establishes a number of sub-flows equals to the number of the available wireless active connections so, the chance of service interruptions decreases. This paper investigates the performance evaluation of using MPTCP in heterogeneous wireless networks (HetNets). Through this evaluation, we propose two dimensional Markov model for MPTCP seamless handover between two wireless connections. Then, we implement the handover algorithm using MPTCP open source Linux Kernel. Moreover, an implementation for Intelligent Transportation System (ITS) platform is conducted in order to valorise the MPTCP aspect in such real time platforms. The overall results show that MPTCP outperforms classical methodologies of handover.
2017 International Conference on Electrical and Computing Technologies and Applications (ICECTA)
In this work, a green adaptive transportation decision system is proposed for choosing the best t... more In this work, a green adaptive transportation decision system is proposed for choosing the best transportation route calculated for different means of transportation (train, metro and bus) to reach a certain destination at time t. This selection will be based on significant parameters like CO2 emissions of these transport means, travel duration, ticket tariff, waiting connection time to catch such a transport mean, connection time between the different transport means to reach the destination, and comfortability feedback. Q-Learning, a reinforcement learning technique based reward is applied for validating the first phase in this work. The second contribution is to build the prediction of the best transport route by using Support Vector Machine (SVM) learning techniques.
Wireless Personal Communications, 2021
Nowadays, we are moving quickly to a new Identity concept due to the cloud computing paradigm cal... more Nowadays, we are moving quickly to a new Identity concept due to the cloud computing paradigm called Identity as a Service (IDaaS). However, the one Identity adoption for all services access does not bring only good news. Hackers are increasing more and more their attacks based Identity theft. This means that the security of Identity itself becomes a threat vector. Therefore, this paper focuses on the concept of using Virtual Identity ( $$V_{ID}$$ V ID ) under the framework of IDaaS. This IDaaS is well known for Software as a Service (SaaS) cloud deployment model authentication. It can be delivered by a a third party Identity providers for the whole identity management approach including the creation process, the authentication mechanism and the identity privacy assurance level. Moreover, the proposed $$V_{ID}$$ V ID mechanism for IDaaS framework is considered as a new realization for anonymous Single Sign On (SSO) in this distributed cloud services environments. Actually, we propos...
Energies
IoT-based applications operate in a client–server architecture, which requires a specific communi... more IoT-based applications operate in a client–server architecture, which requires a specific communication protocol. This protocol is used to establish the client–server communication model, allowing all clients of the system to perform specific tasks through internet communications. Many data communication protocols for the Internet of Things are used by IoT platforms, including message queuing telemetry transport (MQTT), advanced message queuing protocol (AMQP), MQTT for sensor networks (MQTT-SN), data distribution service (DDS), constrained application protocol (CoAP), and simple object access protocol (SOAP). These protocols only support single-topic messaging. Thus, in this work, an IoT message protocol that supports multi-topic messaging is proposed. This protocol will add a simple “brain” for IoT platforms in order to realize an intelligent IoT architecture. Moreover, it will enhance the traffic throughput by reducing the overheads of messages and the delay of multi-topic messag...
Advances in Science, Technology and Engineering Systems Journal
Intelligent Transportation Systems (ITS) applications can take big advantage of Context Awareness... more Intelligent Transportation Systems (ITS) applications can take big advantage of Context Awareness approaches. Parameters such as user mobility, passengers comfort reaction and pollution emission levels (CO 2 ) can enrich such applications during the decision making phase. Moreover, the expanding in ITS services offers great opportunities for travelers to find the best route to reach their destinations with the lowest or fair costs. It can offer a selecting methodology for optimal route that adapted with some processing parameters like CO 2 level, ticket cost, waiting or connection times and the overall traveling time plus the comfortability reaction for each means of transportation) in real time environment using Machine Learning (ML) tools like Q-Learning or SVM: Support Vector Machines. This paper aims at conducting a comparison study for green ITS routes (i.e. the lowest CO 2 levels). The study compares between Q-Learning and SVM techniques for identifying different variety of routes between two stops as ranked routes from best to lowest based on some traces gathered from some known transportation traces. Reinforcement Q-Learning is applied to validate the first phase in our approach to recommend the best means and SVM is used to validate the prediction phase about the best route among different routes built based on three means of transportation (metro, train and bus).
IEEE Access
Identity-as-a-Service (IDaaS) is one of the most famous fruitful authentication services for clou... more Identity-as-a-Service (IDaaS) is one of the most famous fruitful authentication services for cloud deployment to Software-as-a-Service (SaaS) model. It is a third party approach for identity management including creation, authentication and privacy assurance. In this work, the Virtual Identity (V ID ), as a new realization for IDaaS terminology which can be used in virtual environments is proposed to improve the user privacy and to provide the anonymous Single sign-on (SSO) in such types of distributed environments. Actually, two V ID frameworks based on Identity-Based Encryption (IBE) and Pseudonym-Based Encryption (PBE) approaches are proposed and then implemented using M IRACL library. The V ID approaches performance is evaluated analytically by implementing a mathematical model based on BCM P (Baskett Chandy Muntz Palacios) queuing model. In addition, a simulation based evaluation using OP N ET Modeler is introduced to compare the analytical based BCM P queuing model against the OP N ET simulation results. Moreover, the proposed approaches are compared against state of the art work.
Procedia Computer Science
Uploads
Conference Presentations by Emad ABD-ELRAHMAN
Papers by Emad ABD-ELRAHMAN