Fathi Amsaad

Fathi Amsaad
Eastern Michigan University | EMU · School of Information Security and Applied Computing

Doctor of Philosophy

About

66
Publications
10,297
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
310
Citations

Publications

Publications (66)
Article
In today’s world, the use of computer networks is everywhere, and to access the home network we use the Internet. IoT networks are the new range of these networks in which we try to connect different home appliances and try to give commands from a remote place. Access to any device over an insecure network invites various types of attacks. User aut...
Preprint
Full-text available
Internet of Vehicles (IoVs) consist of smart vehicles, Autonomous Vehicles (AVs) as well as roadside units (RSUs) that communicate wirelessly to provide enhanced transportation services such as improved traffic efficiency and reduced traffic congestion and accidents. IoVs, however, suffer from issues of security, privacy and trust. Blockchain techn...
Article
Full-text available
Cyber-physical systems (CPS) have developed rapidly in recent years, contributing to an efficient integration between the cyber and physical worlds in intelligent and connected city environments. However, efficient mobility in a CPS is not well solved. Here, we present a prototype for a privacy-aware secure human-centric mobility-aware (SHM) model...
Article
Full-text available
When people use social networks, they often fall prey to a clickbait scam. The scammer attempts to create a striking headline that attracts the majority of users and attaches a link. The user follows the link and can be redirected to a fraudulent resource where the user easily loses personal data. To solve this problem, a Blockchain-enabled deep re...
Article
Full-text available
Smart plug-in electrical vehicles (PEVs) have recently become essential components of the energy storage units (ESUs) in a smart power grid network. ESUs need to frequently communicate with charging stations for authentication before their battery systems are securely and efficiently charged. In this paper, an efficient lightweight hardware-assiste...
Article
Full-text available
Lightweight physical unclonable functions (LPUFs) exploit manufacturing process variations of semiconductor integrated circuits (ICs) to protect IoT-based electronic and smart devices from new cyberattacks. This paper proposes two novel security techniques to enhance the robustness of LPUFs using configurable-based ring oscillator PUFs (CF-ROPUFs)....
Chapter
Telemedicine applications have been recently evolved to allow patients in underdeveloped areas to receive medical services. Meanwhile, machine learning (ML) techniques have been widely adopted in such telemedicine applications to help in disease diagnosis. The performance of these ML techniques, however, are limited by the fact that attackers can m...
Chapter
Full-text available
A person’s sentiment is rigorously influenced by his emotional feelings which is evoked from every single incident, occurring every day in his surroundings. In this case, the decision that he makes is greatly affected by his sentiment rather than facts. Sentimental behavior can be applied to many applications in health, business, education, etc. Th...
Book
This textbook provides a piece of adequate information about cryptographic methods, which are of paramount significance for the cyberspace world. It involves the state-of-the-art cryptographic algorithms that are either being used commercially or become standard. This book is about building the influential concept of the learners to identify the si...
Article
In this paper, an area-efficient dynamic ring oscillator based physical unclonable function (d-ROPUF) design utilizing field-programmable gate arrays (FPGA) technology is proposed. An enormous amount of secret keys are generated to securely authenticate advanced metering infrastructure (AMI) nodes throughout their useful lifetime meting National In...
Conference Paper
Full-text available
Phishing sends malicious links or attachments through emails that can perform various functions, including capturing the victim's login credentials or account information. These emails harm the victims, cause money loss, and identity theft. In this paper, we contribute to solving the phishing problem by developing an extension for the Google Chrome...
Preprint
The simultaneous charging of many electric vehicles (EVs) stresses the distribution system and may cause grid instability in severe cases. The best way to avoid this problem is by charging coordination. The idea is that the EVs should report data (such as state-of-charge (SoC) of the battery) to run a mechanism to prioritize the charging requests a...
Article
Full-text available
The cloud computing environment provides easy-to-access service for private and confidential data. However, there are many threats to the leakage of private data. This paper focuses on investigating the vulnerabilities of cloud service providers (CSPs) from three risk aspects: management risks, law risks, and technology risks. Additionally, this pa...
Article
Full-text available
Because charging coordination is a solution for avoiding grid instability by prioritizing charging requests, electric vehicles may lie and send false data to illegally receive higher charging priorities. In this article, we first study the impact of such attacks on both the lying and honest electric vehicles. Our evaluations indicate that lying ele...
Article
Full-text available
Recently, an increasing number of cyber-attacks in the medical field has resulted in great losses in the health care industry, since medical information plays an essential role in human health. To introduce a comprehensive survey about possible cyber-attacks and solutions for these attacks, our paper first presents a brief overview of the necessary...
Conference Paper
Full-text available
Advancement in technology improved living standard. Several known and unknown threats are handled using emerging technology. However, burglary threat is not fully addressed. In this paper, we introduce burglary detection (BD) framework to reduce the house thievery crime rate. BD involves secure home application, and framework. Secure home applicati...
Article
Full-text available
Silicon Physical Unclonable Functions (sPUFs) are one of the security primitives and state-of-the-art topics in hardware-oriented security and trust research. This paper presents an efficient and dynamic ring oscillator PUFs (d-ROPUFs) technique to improve sPUFs security against modeling attacks. In addition to enhancing the Entropy of weak ROPUF d...
Article
Physical unclonable functions (PUFs) provide a unique signature based on the variations during the fabrication process of the integrated circuits. The additional features of controllability and reconfigurability to a PUF implementation enable the reuse of the existing hardware as a new modified PUF, enhancing the capabilities of a PUF for more vers...
Conference Paper
Full-text available
Electronic commerce has become integral part of business operation and individual person’s life. It is easy, fast and reliable way of money transfer. However, with new technology security related issues have increased drastically. In this research, we have proposed secured payment protocol using self- certified key generation method. To measure per...
Chapter
Physical Unclonable Function PUFs are probabilistic functions that are widely used for the security of silicon technology chips including ASIC/FPGA. Despite the prevalence of numerous techniques for fabrication of Silicon PUFs (SPUFs), to the best of our knowledge, a well-established dynamic technique that can provide updated secret keys to improve...
Conference Paper
Physical Unclonable Functions (PUFs) are the state-of-the-art topic in hardware oriented security and trust (HOST). PUFs have recently emerged as a promising solution for cyber security related issues including low-cost chip authentication, hacking of digital systems and tampering of physical systems. In this paper, a dynamic area efficient design...
Conference Paper
Full-text available
Security issues pertaining to Advanced Metering Infrastructure (AMI) system has been a major concern since the advent of the smart grid. In this paper, a novel authentication and key management scheme is proposed for AMI system based on Configurable Ring Oscillator Physically Unclonable Functions (RO PUFs). The scheme provides end-to-end security f...
Conference Paper
Physical Unclonable Functions (PUF) offer promising solution to security problems. A PUF is a die-specific random probabilistic function that is unique for every instance of the die. PUFs derive their randomness from the uncontrolled random manufacturing process variations in the IC. Apart from spatial variation or process variation, ICs are affect...
Conference Paper
In this paper, a configurable ring oscillator PUFs (c-ROPUFs) is utilized to improve PUF entropy and reliability. In addition, a novel security technique to enhance PUF's reproducibility using a newly defined parameter namely intra-die diverseness is introduced. An implementation of c-ROPUF on a Xilinx Spartan-3E FPGA on 30 different chips under di...
Conference Paper
Security for Pebble Watch is necessary. The lack of security and efficient connection leads to major attacks. In this paper, we introduce a two way authentication process to improve the pebble watch security. This two way authentication uses a secured Bluetooth pairing. The main aim of this paper is to find the major factors which are attacking peb...
Conference Paper
Wireless sensor networks are one of the fast growing technologies in communication field, because of their compact size and ability to work in rugged conditions where human reach is not possible. This paper discusses about H-LEACH, which is used to solve problems of energy considerations while electing a channel head. H-LEACH considers residual and...
Conference Paper
Wireless Sensor Network (WSN) are of paramount significance since they are responsible for maintaining the routes in the network, data forwarding, and ensuring reliable multi-hop communication. The main requirement of a wireless sensor network is to prolong network energy efficiency and lifetime. Researchers have developed protocols Low Energy Adap...
Article
Full-text available
Electronic commerce has become integral part of business operation and individual person’s life. It is easy, fast and reliable way of money transfer. However with new technology security related issues have increased drastically. In this research, study of a payment application “Square Cash” has been done from different aspects like checking securi...
Article
Full-text available
The use of Radio Frequency Identification technology enhances efficiency and security of many real-time systems. The features of RFID makes it adaptable in many fields such as transportation, security, agriculture, healthcare focusing mainly on tracking and storage of information. The addition of RFID system to the healthcare sector would improve o...
Conference Paper
Malicious inclusion inside integrated circuits (ICs) is a recently evolved concept in the semiconductor industry. This has become a matter of concern with the increase in outsourcing of semiconductors which are used both in military and commercial sectors. To facilitate the detection of Trojans using power based analysis, NOT gate based ring oscill...
Conference Paper
Physical unclonable functions (PUFs), are physical entities that are embodied in a silicon chips and can be easily evaluated but they are difficult to predict. Ring Oscillators (ROPUFs) are appropriate security techniques for FPGA-based systems. This paper presents a Configurable design of ROPUF controlled with programmable XOR (PXORs) gates for ar...

Network

Cited By