1
|
Faheem M, Al-Khasawneh MA, Khan AA, Madni SHH. Cyberattack patterns in blockchain-based communication networks for distributed renewable energy systems: A study on big datasets. Data Brief 2024; 53:110212. [PMID: 38439994 PMCID: PMC10910224 DOI: 10.1016/j.dib.2024.110212] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 11/24/2023] [Revised: 02/12/2024] [Accepted: 02/12/2024] [Indexed: 03/06/2024] Open
Abstract
Blockchain-based reliable, resilient, and secure communication for Distributed Energy Resources (DERs) is essential in Smart Grid (SG). The Solana blockchain, due to its high stability, scalability, and throughput, along with low latency, is envisioned to enhance the reliability, resilience, and security of DERs in SGs. This paper presents big datasets focusing on SQL Injection, Spoofing, and Man-in-the-Middle (MitM) cyberattacks, which have been collected from Solana blockchain-based Industrial Wireless Sensor Networks (IWSNs) for events monitoring and control in DERs. The datasets provided include both raw (unprocessed) and refined (processed) data, which highlight distinct trends in cyberattacks in DERs. These distinctive patterns demonstrate problems like superfluous mass data generation, transmitting invalid packets, sending deceptive data packets, heavily using network bandwidth, rerouting, causing memory overflow, overheads, and creating high latency. These issues result in ineffective real-time events monitoring and control of DERs in SGs. The thorough nature of these datasets is expected to play a crucial role in identifying and mitigating a wide range of cyberattacks across different smart grid applications.
Collapse
Affiliation(s)
- Muhammad Faheem
- School of Computing Technology and Innovations, University of Vaasa, Vaasa 65200, Finland
- Vaasa Energy Business and Innovation Centre (VEBIC), University of Vaasa, Vaasa 65200, Finland
- School of Digital Economy, University of Vaasa, Vaasa 65200, Finland
| | - Mahmoud Ahmad Al-Khasawneh
- School of Computing, Skyline University College, University City Sharjah, Sharjah 1797, the United Arab Emirates
| | - Arfat Ahmad Khan
- Department of Computer Science, College of Computing, Khon Kaen University, Khon Kaen 40002, Thailand
| | - Syed Hamid Hussain Madni
- School of Electronics and Computer Science, University of Southampton Malaysia, Johor Bahru 79100, Malaysia
| |
Collapse
|
2
|
Khasawneh AM, Bukhari A, Al-Khasawneh MA. Early Detection of Medical Image Analysis by Using Machine Learning Method. Comput Math Methods Med 2022; 2022:3041811. [PMID: 38170039 PMCID: PMC10761224 DOI: 10.1155/2022/3041811] [Citation(s) in RCA: 2] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 12/11/2021] [Revised: 02/02/2022] [Accepted: 02/07/2022] [Indexed: 01/05/2024]
Abstract
We develop effective medical image classification techniques, with an emphasis on histopathology and magnetic resonance imaging (MRI). The trainer utilized the curriculum as a starting point for a set of data and a restricted number of samples, and we used it as a starting point for a set of data. As calibrating a machine learning model is difficult, we used alternative methods as unsupervised feature extracts or weight-conditioning factors for identifying pathological histology pictures. As a result, the pretrained models will be trained on 3-channel RGB pictures, while the MRI sample has more slices. To alter the working model using the MRI data, the convolutional neural network (CNN) must be fine-tuned. Pretrained models are placed and then used as feature snippets. However, there is a scarcity of well-done medical photos, making training machine learning models a difficult endeavor to begin with. In any case, data augmentation aids in the generation of sufficient training samples; however, it is unclear if data augmentation aids in the prediction of unknown data samples. As a result, we fine-tuned machine learning models without using any additional data. Furthermore, rather than utilizing a standard machine learning classifier for the MRI data, we created a unique CNN that uses both 3D shear descriptors and deep features as input. This custom network identifies the MRI sample after processing our representation of the characteristics from beginning to end. On the hidden MRI dataset, our bespoke CNN outperforms traditional machine learning. Our CNN model is less prone to overfitting as a result of this. Furthermore, we have given cutting-edge outcomes employing machine learning.
Collapse
Affiliation(s)
| | - Amal Bukhari
- College of Computer Science and Engineering, University of Jeddah, Saudi Arabia
| | - Mahmoud Ahmad Al-Khasawneh
- School of Information Technology, Skyline University College, University City Sharjah, 1797 Sharjah, UAE
| |
Collapse
|
3
|
Kumar V, Kumar S, AlShboul R, Aggarwal G, Kaiwartya O, Khasawneh AM, Lloret J, Al-Khasawneh MA. Grouping and Sponsoring Centric Green Coverage Model for Internet of Things. Sensors (Basel) 2021; 21:s21123948. [PMID: 34201100 PMCID: PMC8226805 DOI: 10.3390/s21123948] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 05/01/2021] [Revised: 06/01/2021] [Accepted: 06/04/2021] [Indexed: 11/16/2022]
Abstract
Recently, green computing has received significant attention for Internet of Things (IoT) environments due to the growing computing demands under tiny sensor enabled smart services. The related literature on green computing majorly focuses on a cover set approach that works efficiently for target coverage, but it is not applicable in case of area coverage. In this paper, we present a new variant of a cover set approach called a grouping and sponsoring aware IoT framework (GS-IoT) that is suitable for area coverage. We achieve non-overlapping coverage for an entire sensing region employing sectorial sensing. Non-overlapping coverage not only guarantees a sufficiently good coverage in case of large number of sensors deployed randomly, but also maximizes the life span of the whole network with appropriate scheduling of sensors. A deployment model for distribution of sensors is developed to ensure a minimum threshold density of sensors in the sensing region. In particular, a fast converging grouping (FCG) algorithm is developed to group sensors in order to ensure minimal overlapping. A sponsoring aware sectorial coverage (SSC) algorithm is developed to set off redundant sensors and to balance the overall network energy consumption. GS-IoT framework effectively combines both the algorithms for smart services. The simulation experimental results attest to the benefit of the proposed framework as compared to the state-of-the-art techniques in terms of various metrics for smart IoT environments including rate of overlapping, response time, coverage, active sensors, and life span of the overall network.
Collapse
Affiliation(s)
- Vinod Kumar
- School of Computer and Systems Sciences, Jawaharlal Nehru University (JNU), New Delhi 110067, India; (V.K.); (S.K.)
| | - Sushil Kumar
- School of Computer and Systems Sciences, Jawaharlal Nehru University (JNU), New Delhi 110067, India; (V.K.); (S.K.)
| | - Rabah AlShboul
- Computer Science Department, Faculty of Information Technology, Al al-Bayt University, Mafraq 25113, Jordan;
| | - Geetika Aggarwal
- School of Science & Technology, Clifton Campus, Nottingham Trent University, Nottingham NG11 8NS, UK;
- Correspondence:
| | - Omprakash Kaiwartya
- School of Science & Technology, Clifton Campus, Nottingham Trent University, Nottingham NG11 8NS, UK;
| | - Ahmad M. Khasawneh
- Department of Mobile Computing, Amman Arab University, Amman 11953, Jordan;
| | - Jaime Lloret
- Integrated Management Coastal Research Institue, Universitat Politecnica de Valencia, 46022 Valencia, Spain;
- School of Computing and Digital Technologies, Staffordshire University, Stoke ST4 2DE, UK
| | - Mahmoud Ahmad Al-Khasawneh
- Faculty of Computer & Information Technology, Al-Madinah International University, Kuala Lumpur 57100, Malaysia;
| |
Collapse
|
4
|
Rani R, Kumar S, Kaiwartya O, Khasawneh AM, Lloret J, Al-Khasawneh MA, Mahmoud M, Alarood AA. Towards Green Computing Oriented Security: A Lightweight Postquantum Signature for IoE. Sensors (Basel) 2021; 21:s21051883. [PMID: 33800227 PMCID: PMC7962526 DOI: 10.3390/s21051883] [Citation(s) in RCA: 8] [Impact Index Per Article: 2.7] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 01/05/2021] [Revised: 02/18/2021] [Accepted: 03/01/2021] [Indexed: 11/16/2022]
Abstract
Postquantum cryptography for elevating security against attacks by quantum computers in the Internet of Everything (IoE) is still in its infancy. Most postquantum based cryptosystems have longer keys and signature sizes and require more computations that span several orders of magnitude in energy consumption and computation time, hence the sizes of the keys and signature are considered as another aspect of security by green design. To address these issues, the security solutions should migrate to the advanced and potent methods for protection against quantum attacks and offer energy efficient and faster cryptocomputations. In this context, a novel security framework Lightweight Postquantum ID-based Signature (LPQS) for secure communication in the IoE environment is presented. The proposed LPQS framework incorporates a supersingular isogeny curve to present a digital signature with small key sizes which is quantum-resistant. To reduce the size of the keys, compressed curves are used and the validation of the signature depends on the commutative property of the curves. The unforgeability of LPQS under an adaptively chosen message attack is proved. Security analysis and the experimental validation of LPQS are performed under a realistic software simulation environment to assess its lightweight performance considering embedded nodes. It is evident that the size of keys and the signature of LPQS is smaller than that of existing signature-based postquantum security techniques for IoE. It is robust in the postquantum environment and efficient in terms of energy and computations.
Collapse
Affiliation(s)
- Rinki Rani
- School of Computer and Systems Sciences, Jawaharlal Nehru University (JNU), New Delhi 110067, India; (R.R.); (S.K.)
| | - Sushil Kumar
- School of Computer and Systems Sciences, Jawaharlal Nehru University (JNU), New Delhi 110067, India; (R.R.); (S.K.)
| | - Omprakash Kaiwartya
- Department of Computer Science, Clifton Campus, Nottingham Trent University, Nottingham NG11 8NS, UK
- Correspondence:
| | - Ahmad M. Khasawneh
- Department of Mobile Computing, Amman Arab University, Amman 11953, Jordan;
| | - Jaime Lloret
- Integrated Management Coastal Research Institute, Universitat Politecnica de Valencia, 46022 Valencia, Spain;
- School of Computing and Digital Technologies, Staffordshire University, Stoke ST4 2DE, UK
| | - Mahmoud Ahmad Al-Khasawneh
- Faculty of Computer & Information Technology, Al-Madinah International University, Kuala Lumpur 57100, Malaysia;
| | - Marwan Mahmoud
- Department of Computer and Information Technology, Faculty of Applied Studies, King Abdulaziz University, Jeddah 21589, Saudi Arabia;
| | - Alaa Abdulsalm Alarood
- College of Computer Science and Engineering, University of Jeddah, Jeddah 21959, Saudi Arabia;
| |
Collapse
|
5
|
Abstract
COVID-19 has changed the lifestyle of many people due to its rapid human-to-human transmission. The spread started at the end of January 2020, and different countries used different approaches in terms of testing, sanitization, lock down and quarantine centres to control the spread of the virus. People are getting back to working and routine life activities with new normal standards of testing, sanitization, social distancing and lock down. People are regularly tested to identify those who are infected with COVID-19 and isolate them from general public. However, testing all people unnecessarily is an expensive operation in terms of resources usage. There must be an optimal policy to test only those who have higher chances of being COVID-19 positive. Similarly, sanitization is used for individuals and streets to disinfect people and places. However, sanitization is also an expensive operation in terms of resources, and it is not possible to disinfect each and every individual and street. Social separating or lock down or quarantine centres focuses are different methodologies that are utilised to control the human-to-human transmission of the infection and separate the individuals who are contaminated with COVID-19. However, lock down and quarantine centres are expensive operations in terms of resources as it disturbs the affairs of state and the growth of economy. At the same time, it negatively affects the quality of life of a society. It is also not possible to provide resources to all citizens by locking them inside homes or quarantine centres for infinite time. All these parameters are expensive in terms of resources and have an effect on controlling the spread of the virus, quality of life of human, resources and economy. In this article, a novel intelligent method based on reinforcement learning (RL) is built up that quantifies the unique levels of testing, disinfection and lock down alongside its impact on the spread of the infection, personal satisfaction or quality of life, resource use and economy. Different RL algorithms are actualized and agents are prepared with these algorithms to interact with the environment to gain proficiency with the best strategy. The examinations exhibit that deep learning–based algorithms, for example, DQN and DDPG are performing better than customary RL algorithms, for example, Q-Learning and SARSA.
Collapse
Affiliation(s)
- M Irfan Uddin
- Institute of Computing, Kohat University of Science and Technology, Pakistan
| | - Syed Atif Ali Shah
- Faculty of Engineering and Information Technology, Northern University, Pakistan; Faculty of Computer and Information Technology, Al-Madinah International University, Malaysia
| | | | | | - Eesa Alsolami
- Department of Cyber Security, College of Computer Science and Engineering, University of Jeddah, Saudi Arabia
| |
Collapse
|