Amjad Gawanmeh's research while affiliated with University of Dubai and other places

Publications (122)

Article
Full-text available
The rapidly growing cloud computing paradigm provides a cost‐effective platform for storing, sharing, and delivering data and computation through internet connectivity. However, one of the biggest barriers for massive cloud adoption is the growing cybersecurity threats/risks that influence its confidence and feasibility. Existing threat models for...
Chapter
Patient’s privacy, electronic health records’ confidentiality, integrity and all related e-health security issues are the most critical elements of a successful digital health, as they support building trust between patients and healthcare stakeholders. Blockchain technology appears to cover a wide range of these elements. However, the use of this...
Chapter
Ensuring trust between Internet of Things (IoT) devices is crucial to ensure the quality and the functionality of the system. However, with the dynamism and distributed nature of IoT systems, finding a solution that not only provides trust among IoT systems but is also suitable to their nature of operation is considered a challenge. In recent years...
Chapter
Energy demand has increased significantly in the recent years due to the emerging of new technologies and industries, in particular in the developing countries. This increase requires much more developed power grid system than the existing traditional ones. Smart grid (SG) offers a potential solution to this problem. Being one of the most needed an...
Conference Paper
High-performance and cost-effective Heterogeneous Computing Systems (HCS) are highly dependent on the efficiency of task scheduling, which has been proven to be NP-complete. This makes scheduling problem a vital issue which researchers have attempted optimization in different aspects under the expense of tradeoffs. The problem of scheduling a singl...
Article
Full-text available
Internet of things (IoT) provides connectivity between different smart devices. IoT systems aim to make data collection, and processing easier. Studies show that we can expect over 75 billion IoT devices to be active by 2025. The increasing great interest in IoT systems is due to their ability to provide quality of services to end users. However, c...
Article
Full-text available
The COVID-19 Pandemic affected all sectors worldwide including education sector changing the students learning environment at a large scale. In the education sector, governments had to close schools and universities around the world and turn into online mode of delivery. The sudden transformation to online learning demands educators and institution...
Article
Full-text available
New technologies bring along many challenges including security and privacy. Wireless personal area networks (WPANs) are characterized by limited energy resources and computing power that calls for lightweight security mechanisms in these networks as a mandatory requirement. In this paper, a lightweight trust-based framework for node authentication...
Technical Report
Full-text available
The correctness of group key protocols in communication systems remains a great challenge because of dynamic characteristics of group key construction as we deal with an open number of group members. In this paper, we propose a solution to model group key protocols and to verify their required properties, in particular secrecy property, using the e...
Article
Full-text available
Group key security protocols play an important role in today's communication systems. Their verification, however, remains a great challenge because of the dynamic characteristics of group key construction and distribution protocols. Security properties that are well defined in normal two-party protocols have different meanings and different interp...
Chapter
Disruptive technologies continuously and significantly alter the way people communicate and collaborate as well as the way industries operate today and in the future. To create new business models and opportunities, several combinations of disruptive technologies are being introduced nowadays. Among these technologies, cloud computing, IoT, Blockch...
Conference Paper
Blockchain plays a significant role to connect end users with utmost security and reliability as it is well-suited to handle critical privacy issues in medical and business data sharing. It is considered as one of the best cutting edge technology in providing a suitable framework for sharing critical medical information across various experts globa...
Article
Internet of things (IoT) plays a key role in enabling smart sustainable cities. Pervasive computing over the IoT platform makes life more convenient by embedding sensors based on context-aware computing devices in the physical environment for the ubiquitous availability of computing resources. The sensors gather contextual information from the phys...
Conference Paper
Information security concerns are evolving and expanding in recent years due to the Internet era where people often transmit private information through the Internet. For this reason, steganography gained much attention and played an emerging role in digital communications. In steganographic technique, the concealed secret information can be carrie...
Article
One of the appealing applications of smart home is remote monitoring of vital signs, such as heart and respiratory, which has gained more attention during the last two decades. The recent developments in IoT, sensing devices, and smart technologies increased the demand for such technology due to the need for devices that can continuously monitor ph...
Conference Paper
This paper presents a methodology for verifying non-linear arithmetic circuits by applying diffident concepts. In our proposed methodology, a combination of gate-level netlist, Functionally Reduced And-inverter Graph (FRAIG) and Taylor Expansion Diagram (TED) is used to verify that the implementation satisfies the specification. Backward algebraic...
Article
Full-text available
The lack of national security standardization bodies can have adverse impact on the adoption of international security standards and best practices. To assure security confidence among various organizations and to promote systematic adoption of standards and best standards, a practical framework that can support comparative measures is needed. . Th...
Article
Full-text available
Blockchain is a very promising technology that spans many use cases other than cryptocurrencies. For example, its implementation in the Internet of Things (IoT) based networks is still unclear and demands further research. This is mainly due to the limited constraints of IoT devices and the ledger-based design of blockchain protocol. IoT may offer...
Article
Full-text available
Multi-agent systems are automated form of software technology to enhance many applications in our life. However, this technology does not come along with embedded security features which hindering its widespread usage in commercial systems such as those that depend on location-based services. This paper aims to design, develop, test and evaluate an...
Article
Full-text available
This paper presents focusing of microparticles in multiple paths within the direction of the flow using dielectrophoresis. The focusing of microparticles is realized through partially perforated electrodes within the microchannel. A continuous electrode on the top surface of the microchannel is considered, while the bottom side is made of a circula...
Conference Paper
Abstract—The healthcare industry is a complex system of inter- connected entities. Each of these entities has disjoint information systems to manage patient data and records. The current IT solutions in healthcare systems have several challenges such as sharing and accessing medical records across several stakeholders while still maintaining securi...
Chapter
The agriculture sector is facing major challenges to enhance production in a situation of dwindling natural resources. The growing demand for agricultural products, however, also offers opportunities for producers to sustain, improve productivity and reduce waste in the supply chain. Recent advancements in information and communication technologies...
Article
In this Letter, we present a theoretical investigation for collision occurrence between adjacent IEEE 802.15.4 WPANs, thus laying the foundation for collision-prevention approaches. Specifically, we identify and present the necessary and sufficient conditions to prevent collisions. The identified conditions can be used to devise collision-preventio...
Article
Full-text available
Energy-efficient Cloud Infrastructure Resource Allocation Framework is getting popularity as it is paying effective attention to cloud data management with a view to achieve maximize revenue and minimize cost. This infrastructure can encourage for both cloud providers and users for allocating cloud infrastructure resources for fulfilling not only g...
Chapter
Secured cyber-physical systems (CPS) requires reliable handling of a high volume of sensitive data, which is in many cases integrated from several distributed sources. This data can usually be interconnected with physical applications, such as power grids or SCADA systems. As most of these datasets store records using numerical values, many of the...
Chapter
Energy demand has increased significantly in the recent years due to the emerging of new technologies and industries, in particular in the developing countries. This increase requires much more developed power grid system than the existing traditional ones. Smart grid (SG) offers a potential solution to this problem. Being one of the most needed an...
Article
Full-text available
Decision trees are among the best-known decision-making techniques and have been used extensively for both data analysis and predictive modeling. BPM+ is a novel process modeling approach that helps represent business process models in a consistent and structured way to meet different stakeholders' process representation needs. This paper reports o...
Article
Electrocardiography (ECG) is a heart signal wave that is recorded using medical sensors, which are normally attached to the human body by the heart. ECG waves have repetitive patterns that can be efficiently used in the diagnosis of heart problems as they carry several characteristics of heart operation. Traditionally, the analysis of ECG waves is...
Chapter
The era of cloud computing allowed the instant scale up of provided services into massive capacities without the need for investing in any new on site infrastructure. Hence, the interest of this type of services has been increased, in particular, by medium scale entities who can afford to completely outsource their data-center and their infrastruct...
Chapter
CPS uses recent computing, communication, and control methods to monitor and control geographically dispersed field sites in order provide and maintain a high level of confidence about their operation and, hence, plays an important role in several sustainable systems and has extraordinary significance for the future of several industrial domains. T...
Article
This article is a survey of the latest technologies, algorithms and state of the art localization techniques that can be used to serve as Internet of Things communication protocol by automating an RFID system. There is a lack of a reliable and up-to- date reference that can help inventory management systems developers and operators to enhance the m...
Article
Full-text available
Testing and verifying the operation of bio-sensor nodes is essential due to the sensitivity and safetycritical aspects of their applications. Simulation technique is frequently used for this task; however, a proper set of test cases is required in order to carry out the simulation process. This paper focuses on enhancing the verification operations...
Article
Cyber Physical Systems (CPS) use emerging computing, communication, and control methods to monitor and control geographically dispersed critical system components to allow a high level of confidence about their operation. Simulation methods are frequently used in testing such critical system components, however, it might not be adequate to show the...
Article
Finding an optimal node deployment strategy in Wireless Sensor networks (WSNs) that would reduce cost, be robust to node failures, reduce computation and communication overhead, and guarantee a high level of coverage along with network connectivity is a difficult problem. In fact, Sensing coverage and network connectivity are two of the most fundam...
Article
Full-text available
Securing biomedical information is a critical issue in wireless body sensor networks (WBSNs). However, since sensors used in a WBSN tend to have limited processing capabilities and energy sources, minimizing the overhead imposed by security protocol is a challenging problem. This paper proposes a scheme that uses the electrocardiogram (ECG) feature...
Article
The era of cloud computing allows the instant scale up of provided services into massive capacities without the need for investing in any new on-site infrastructure. Hence, the interest of these type of services has been increased. In addition, large companies may wish to provide support for wide range of load capacities, including peak ones. This,...
Article
Blood cell separation microdevices are designed in biomedical engineering for the separation of particular cells from blood, such as cancer cells. The movement of blood microparticles, specially these cancer cells, in a continuous flow microfluidic device is controlled by several forces, as a result, understanding and guiding the movement of these...
Conference Paper
Full-text available
Internet of Things (IoT) is a hot and debated subjectin current digitalized era. IoT enables internet connectivity for all kinds of devices and physical objects. The current world isapproaching towards virtualization of different types of systems that enables performing activities without direct physical inter-action. The combination of high-speed...
Article
Full-text available
ElectroCardioGram(ECG) bio-sensors are used to detect and transmit the electrical activity of the heart over a period of time. The ECGs are treated by a signal processing unit inside the bio-sensor to detect and identify heart related medical conditions. Testing and verification of bio-sensor is of paramount importance as faults in these critical s...
Article
Full-text available
Resource allocation in cloud computing systems is getting more complex and demanding due to the increasing requirements for cloud-based services. Scheduling services using a limited number of resources is problem that has been under study since the evolution of cloud computing. However, there are several open areas for improvements due to the large...
Article
Full-text available
This paper discusses implementing a Location-Aware Library RFID service employing Radio Frequency Identification as a communication technology. Automating a library system with passive RFID tag infrastructure is proven to be feasible, and can be achieved with even distribution of RFID Antennas, well designed RFID network, an appropriate middleware,...
Article
There are several challenges in the design and operation of Wireless Personal Area Networks (WPANs) such as wireless networking and communication, power consumption, and mobility. Hence, the operation of several WPANs within the same area can result in collision if two WPANs operate in the same wireless channel and come in close range. Therefore, m...
Article
Full-text available
This paper is a baseline document to review the latest technologies, algorithms and available hardware that can be used to build and automate a library system using Radio Frequency Identification technology as the infrastructure, allowing the librarian to track and manage real-life objects. The purpose is to review the current research that have be...
Conference Paper
Full-text available
This paper proposes a verification approach for testing the functionality of the algorithms in ECG bio-sensor. Algorithms functionality is achieved once the medical target of the algorithm is achieved correctly within an acceptable processing time. The Pan Tompkins algorithm is one of the well-known methods, which is used to detect the QRS wave in...
Conference Paper
Full-text available
Information and Communication Technologies (ICT) based applications for Ambient Assisted Living (AAL) help elderly or individual people living home alone. AAL system reliability is mostly based on the recent emerging class of network that is known as wireless mesh network (WiMesh). In WiMesh the information security is the most difficult problem to...
Article
Full-text available
Cloud computing applications (CCA) are defined by their elasticity, on-demand provisioning and ability to address, cost-effectively, volatile workloads. These new cloud computing (CC) applications are being increasingly deployed by organizations but without a means of managing their performance proactively. While CCA provide advantages and disadvan...
Article
Ensuring the correctness of middleware that ensures interoperability of various medical devices is one of the biggest challenges in the e-health domain. Traditionally, these Device Interoperability Middleware (DIM) are analyzed using software testing. However, given the inherent incompleteness of testing and the randomness of the user behaviours, t...
Article
Full-text available
With the increasing population and aging society in several countries, healthcare providers aim to enhance the quality of the healthcare services while balancing the risk mitigation and service cost. Therefore, several new information technologies and innovative communication methodologies have evolved to improve the healthcare sector. ICT-based te...
Article
Blood cell separation microdevices are designed in biomedical engineering for separation of cancer cells from blood. The movement of cancer cells particles in a continuous flow microfluidic device is a challenging problem since there are several forces incorporated. For instance, forces due to inertia, gravity, buoyancy, dielectrophoresis and virtu...