Mohamed Younis

Mohamed Younis
University of Maryland, Baltimore County | UMBC · Department of Computer Science and Electrical Engineering

Doctor of Philosophy

About

372
Publications
69,149
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
17,083
Citations

Publications

Publications (372)
Preprint
Full-text available
In most PUF-based authentication schemes, a central server is usually engaged to verify the response of the device's PUF to challenge bit-streams. However, the server availability may be intermittent in practice. To tackle such an issue, this paper proposes a new protocol for supporting distributed authentication while avoiding vulnerability to inf...
Article
Full-text available
The current era is notably characterized by the major advances in communication technologies. The increased connectivity has been transformative in terrestrial, space, and undersea applications. Nonetheless, the water medium imposes unique constraints on the signals that can be pursued for establishing wireless links. While numerous studies have be...
Article
This paper opts to mitigate the energy-inefficiency of the Blockchain Proof-of-Work (PoW) consensus algorithm by rationally repurposing the power spent during the mining process. The original PoW mining scheme is designed to consider one block at a time and assign a reward to the first place winner of a computation race. To reduce the mining-relate...
Article
Full-text available
Hardware fingerprinting has emerged as a viable option for safeguarding IoT devices from cyberattacks. Such a fingerprint is used to not only authenticate the interconnected devices but also to derive cryptographic keys for ensuring data integrity and confidentiality. A Physically Unclonable Function (PUF) is deemed as an effective fingerprinting m...
Conference Paper
Full-text available
In most PUF-based authentication schemes, a central server is usually engaged to verify the response of the device's PUF to challenge bit-streams. However, the server availability may be intermittent in practice. To tackle such an issue, this paper proposes a new protocol for supporting distributed authentication while avoiding vulnerability to inf...
Article
Chronic obstructive pulmonary disease (COPD) is the third leading cause of death worldwide with over 3�106 deaths in 2019. Such an alarming figure becomes frightening when combined with the number of lost lives resulting from COVID-caused respiratory failure. Because COPD exacerbations identified early can commonly be treated at home, early symptom...
Preprint
Full-text available
Localization of underwater networks is important in many military and civil applications. Because GPS receivers do not work below the water surface, traditional localization methods form a relative topology of underwater nodes (UWNs) and utilize either anchor nodes or floating gateways with dual transceivers in order to determine global coordinates...
Conference Paper
Full-text available
Pervasive sensing is shaping up modern societies and opening the door for many unconventional applications. Instead of the contemporary access model where sensor data is disseminated to a single user, multi-access scenarios are becoming more prevalent, which raises the issue of how to authenticate users, how to ensure access authorization, and how...
Article
Full-text available
The inclusion of distributed energy resources (DER) in Microgrids (MGs) comes at the expense of increased changes in current direction and magnitude. In the autonomous mode of MG operation, the penetration of synchronous distributed generators (DGs) induces lower short circuit current than when the MG operates in the grid-connected mode. Such behav...
Preprint
Full-text available
With the development of autonomous vehicles, a mixed traffic flow scenario of Connected Autonomous Vehicles (CAV) and Human-Driven Vehicles (HVs) would be popular in the near future. The traditional traffic light control systems (TLCSs) for HVs do not make full use of traffic information collected via VANET; meanwhile emerging traffic light systems...
Conference Paper
Full-text available
With the development of autonomous vehicles, a mixed traffic flow scenario of Connected Autonomous Vehicles (CAV) and Human-Driven Vehicles (HVs) would be popular in the near future. The traditional traffic light control systems (TLCSs) for HVs do not make full use of traffic information collected via VANET; meanwhile emerging traffic light systems...
Preprint
Full-text available
The impact and reaction to COVID-19 have shown that ICT technologies at large will have a prominent role in handling current and future epidemics and that we need to start preparing now, before the next one will strike bringing on social and economic catastrophe. Since pandemics are intrinsically distributed and decentralised, the Internet of Thing...
Preprint
Full-text available
In this paper we discuss the state of the art of (mobile) multi-hop ad hoc networking with the aim to present the current status of the research activities and identify the consolidated research areas, with limited research opportunities, and the hot and emerging research areas for which further research is required. We start by briefly discussing...
Article
Full-text available
Physical Unclonable Functions (PUFs) offer a promising solution for authentication of IoT devices as they provide unique fingerprints for the underlying devices through their challenge-response pairs. However, PUFs have been shown to be vulnerable to modeling attacks. In this paper, we propose a novel protocol to thwart such vulnerability by limiti...
Article
The major advances in body-mounted sensors and wireless technologies have been revolutionizing the healthcare industry, where patient’s conditions can be remotely monitored by medical staff. Such a model is gaining broad support due to its economic and social advantages. However, the wealth of sensor measurements pose major technical challenges on...
Conference Paper
Full-text available
A Physically Unclonable Function (PUF) is an effective option for device authentication, especially for IoT frameworks with resource-constrained devices. However, PUFs are vulnerable to modeling attacks which build a PUF model using a small subset of its Challenge-Response Pairs (CRPs). We propose an effective countermeasure against such an attack...
Article
Wearable sensors have emerged as viable and attractive solutions for monitoring the health of people under risk of major problems such as hypertension, heart attacks, and athletes overstressing their bodies. These devices would report on the status of certain body organs to a gateway node over wireless links. A major challenge for effective use of...
Conference Paper
Full-text available
A Cyber-Physical System (CPS) refers to the inter-connection of control (actuation), computational nodes and sensors , in order to manage physical processes. In recent years, the CPS design methodology has been adopted in several large-scale infrastructures such as smart power grids. Given the application criticality, sustaining the security of the...
Article
The COVID-19 pandemic has highlighted how the healthcare system could be overwhelmed. Telehealth stands out to be an effective solution, where patients can be monitored remotely without packing hospitals and exposing healthcare givers to the deadly virus. This article presents our Intel award winning solution for diagnosing COVID-19 related symptom...
Article
Full-text available
Cellular to air communication is critical for the booming aerial package delivery and transportation business. Detecting cellular signals in airborne applications is challenging because it requires receiving and processing waveforms that are subject to significantly more interference than those experienced in terrestrial settings. This paper highli...
Article
Full-text available
The base station (BS) in a Wireless Sensor Network (WSN) plays the role of a data sink, a point of contact with the upper hierarchy, and an in-situ command and control unit. Such an essential role makes the BS a target for attacks in a hostile environment. Even if its presence is camouflaged, an adversary may locate the BS by applying traffic analy...
Article
A Radiometric signature refers to transceiver specific features that are caused by variations in the manufacturing process even for the same circuit design. While such a radiometric signature constitutes a fingerprint that can be exploited for device authentication, it is a threat to privacy. Particularly, in the realm of wireless networks, an adve...
Conference Paper
Full-text available
Physically Unclonable Functions (PUFs) have been considered as promising lightweight primitives for random number generation and device authentication. Thanks to the imperfections occurring during the fabrication process of integrated circuits, each PUF generates a unique signature which can be used for chip identification. Although supposed to be...
Article
Existing Long Term Evolution (LTE) networks have untapped radio frequency resources, also known as white space, that can be repurposed for cognitive radio applications. A secondary network can opportunistically interweave communication within the white space of an existing LTE signal by leveraging cognitive radio. In this paper, we present CIAO-LTE...
Article
The increased urbanization and the drive for realizing smart cities have motivated extensive research and development in the realm of Intelligent Transportation Systems (ITS) in order to deal with the increased traffic intensity. Yet, the scope of ITS is not limited to vehicles, as pedestrians are special road users that play an important role in a...
Article
Conventionally, network and cloud infrastructure security is handled by firewalls which monitor traffic and block malicious access by matching certain observables, e.g., IP, and DNS, to blacklisted entries in intelligence databases. Therefore, such an approach fails to deal with emerging threats that utilize unclassified observables, and to report...
Preprint
Full-text available
This paper opts to mitigate the energy-inefficiency of the Blockchain Proof-of-Work (PoW) consensus algorithm by rationally repurposing the power spent during the mining process. The original PoW mining scheme is designed to consider one block at a time and assign a reward to the first place winner of a computation race. To reduce the mining-relate...
Article
Full-text available
This paper presents a novel blockchain-based energy trading architecture for electric vehicles (EVs) within smart cities. By allowing local renewable energy providers to supply public charging stations, EV drivers can gain access to affordable energy and optimally plan for their charging operations. For this purpose, we present a smart-contract bas...
Article
This article focuses on cyber-physical systems involving a set of robots and sensors that are interconnected through wireless links. In applications that operate in harsh environments, wireless sensors and robot networks (WSRNs) may suffer simultaneous failures, which lead to partitioning the WSRN into unconnected subnetworks. The loss of connectiv...
Article
Full-text available
Opportunistic networking enables users to communicate in an environment where connectivity is intermittent or unstable. However, such networking scheme assumes that mobile nodes voluntary cooperate, which cannot be guaranteed. Some nodes can simply exhibit selfish behavior and thus diminish the effectiveness of the approach. In this paper, a game s...
Article
Microgrids (MGs) could be subject to cascaded line failures due to their restricted power supply and power flow paths. This paper introduces a novel scheme for cascaded failure containment (CFC). CFC employs power flow and topology reconfiguration optimization in order to prevent the spreading of failure and enable the microgrid to sustain its oper...
Article
A wireless sensor network consists of a set of nodes connected by wireless links. These nodes probe their surroundings and send their data over multi-hop routes to a base-station (BS) for processing. The BS further interfaces the network to remote command centres. Given the critical role that the BS plays, it becomes a natural target for adversary...
Article
Full-text available
Wireless sensor networks (WSNs) serving in hostile environments are susceptible to multiple collocated failures due to explosives, and natural calamities such as avalanches, landslides etc., which could partition the network into disjoint segments. A similar scenario is encountered when autonomous WSNs need to collaborate for achieving a common tas...
Article
Full-text available
The Internet of Things (IoT) refers to the internetworking of diverse devices in an ad-hoc manner to support pervasive applications. IoT devices often generate a wealth of data that ought to be accessible and managed in a distributed manner. Such operational model requires architecture that supports contextual and information centric retrieval of d...
Preprint
Full-text available
With the technological drive for realizing smart cities, work on Autonomous Intersection Management (AIM) protocols opts to replace the traditional traffic light system by using cooperative Vehicle-to-Vehicle (V2V) communication in order to decrease road congestion and increase vehicular throughput. However, these protocols simply ignore pedestrian...
Article
Full-text available
To realize the vision of ubiquitous computing and reachability, major technological advances have been achieved to make smart portable devices both highly capable and affordable. To facilitate connectivity to the Internet, these smart devices are equipped with different network interface cards (4G, Bluetooth and Wi-Fi). However, such connectivity m...
Chapter
A wireless body area network (WBAN) consists of a single coordinator and multiple low-power sensors to monitor the biological signals and functions of the human body. Due to the highly mobile and social nature of WBANs, the performance of the individual WBANs could be degraded due to the adverse co-channel interference that results from their uncoo...
Chapter
In recent years, wireless sensor networks (WSNs) have been attracting increased attention from the research and engineering communities, motivated by applications like security surveillance, border protection, combat field reconnaissance, environment and habitat monitoring, and target tracking. In these applications, a WSN typically consists of a l...
Article
Full-text available
In underwater wireless networks (UWNs), conventionally there is no direct communication between an underwater node and a remote command center. A floating base-station is often used to serve as an interface to a UWN; such a base-station would typically have both acoustic and radio modems to communicate with underwater nodes and off-shore centers, r...
Conference Paper
Full-text available
Long distance transportation of various fluid commodities like water, oil, natural gas liquids is achieved through a distribution network of pipelines. Many of these pipelines operates unattended in harsh environments. Therefore, pipes are often susceptible to corrosion, leakage, cracking and third party damage leading to economic and resource infr...
Article
Full-text available
To increase underwater acoustic signal detectability and conserve energy, nodes leverage directional transmissions. In addition, nodes operate in a three-dimensional (3D) environment that is categorized as inhomogeneous where a propagating signal changes its direction based on the observed sound speed profile (SSP). Coupling 3D directional transmis...
Article
Full-text available
In most Wireless Sensor Network (WSN) applications the sensor nodes forward their measurements to a central base station (BS). The unique role of the BS makes it a natural target for an adversary’s attack. Even if a WSN employs conventional security mechanisms such as encryption and authentication, an adversary may apply traffic analysis techniques...
Article
To extend the lifetime of the individual nodes in a wireless sensor network (WSN), energy conservation has been a prominent design goal. Among the most popular energy optimization schemes is the pursuance of a hierarchical topology, e.g., forming clusters, and energy aware routing. Recent advances in the area of energy harvesting from ambient sourc...
Article
Full-text available
Dynamic management of vehicular traffic congestion to maximize throughput in urban areas has been drawing increased attention in recent years. For that purpose, a number of adaptive control algorithms have been proposed for individual traffic lights based on the in-flow rate. However, little attention has been given to the traffic throughput maximi...
Preprint
Full-text available
The commodity Single Board Computers (SBCs) are increasingly becoming powerful and can execute standard operating systems and mainstream workloads. In the context of cloud-based smart city applications, SBCs can be utilized as Edge computing devices reducing the network communication. In this paper, we investigate the design and implementation of a...
Chapter
A smart city, mainly describing a city of the future, has three main goals: to be beautiful, healthy, and prosperous. The realization of such an ambitious vision is full of challenges, such as sustainable and easy transportation, connected citizens, employment availability, economic stability, and smart logistics. While each of these challenges is...
Article
The current era can be characterized by the massive reliance on computing platforms in almost all domains, such as manufacturing, defense, healthcare, government. However, with the increased productivity, flexibility, and effectiveness that computers provide, comes the vulnerability to cyber-attacks where software, or even firmware, gets subtly mod...
Article
The impact of advanced communication and networking technologies spans all aspects of our life and is visible in the way people interact, shop, do business, etc. This article reflects the view of the author on what is emerging nowadays and future trends. In the next few years the research community is expected to stay focused on communication techn...