SACM - United States of America

Permanent URI for this collectionhttps://drepo.sdl.edu.sa/handle/20.500.14154/9668

Browse

Search Results

Now showing 1 - 7 of 7
  • ItemRestricted
    A PUF-based Keyless Authentication Paradigm for Secure IoT Systems
    (University of Louisiana at Lafayette, 2024) Alahmadi, Sara; Bayoumi, Magdy
    The Internet of Things (IoT) drives innovation at individual and industrial scales, introducing massive interconnecting devices with varying security requirements. Authenticating these devices has emerged as a critical challenge, especially for constrained devices. In this context, Physically Unclonable Functions (PUFs) have gained popularity as promising hardware security primitives that offer lightweight and efficient solutions. Despite PUFs’ potential, they are susceptible to modeling attacks, leading researchers to explore new design approaches to increase their resiliency. This research addresses these challenges by developing different Arbiter PUF (APUF) solutions applicable to various applications from constrained devices to those requiring high security and post-quantum protection. First, a taxonomy of consumer IoT ( CIoT) and industrial IoT (IIoT) was presented to identify their distinguishing aspects. Addressing IoT security effectively requires considering the specific needs of different types of IoT applications, mainly consumer and industrial IoT. Second, a detailed analysis of APUF-based designs was conducted, measuring each design’s security scalability. This work evaluates the area and security of studied designs and defines an efficiency metric as security gain per area. Therefore, it showcases how the security of each of the studied design approaches scales in terms of area versus security, providing a guideline and insight for developers and for future improvement. Third, obfuscating techniques were introduced to secure APUF against modeling attacks. The methods implement transformation functions to obscure and safeguard the responses from modeling attacks. The first technique incorporates weak PUFs to fortify strong PUFs. The second technique encodes the challenges into constant weight vectors before generating the response. In addition, Dynamic Feedforward PUF was introduced to enhance the original Feedforward PUF. The method has two levels of configuration and incorporates randomness in the response generation process. Finally, a post-quantum PUF-driven authentication and message exchange framework (McPQ-PUF) was developed. This hybrid authentication and secret message exchange scheme utilizes two security primitives: APUF and McEliece, a post-quantum resilient Public Key Encryption (PKE). The McPQ-PUF framework is resilient against modeling and quantum attacks. This dissertation’s contribution should facilitate PUF-based authentication in an IoT environment. It provides secure and efficient solutions that address IoT ecosystems’ diverse security needs.
    9 0
  • ItemRestricted
    SMART INFRASTRUCTURE AND PARKING CITATION REVENUE IN THE PUBLIC SECTOR: THE ROLE OF SOCIOECONOMIC AND URBAN ENVIRONMENT FACTORS
    (University of Colorado Denver, 2024) Alharbi, Ahmad; Gregg, Dawn; Dincelli, Ersin
    This dissertation investigates the impact of IoT projects on parking citation revenue (PCR) generation in the public sector, focusing specifically on smart parking systems (SPS). The research uses two empirical case studies to understand how SPS affects PCR and how various moderators, how socioeconomic status (SES) and urban environment factors, such as business vitality (BV), population density (PD), and amenity per capita (APC), influence this relationship. Study 1 examines the moderating effect of SES on the relationship between SPS and PCR. Grounded in the Transaction Cost Economics (TCE) framework and digital divide literature, it hypothesizes that higher SES areas, characterized by better access to technology and higher digital literacy, would experience a weakened positive relationship between SPS and PCR due to improved compliance and fewer violations. Utilizing a longitudinal dataset of 263,578 parking citations from Los Angeles (2015–2023) and employing a random-effects (RE) model, the findings confirm that in higher SES districts, the positive impact of SPS on PCR is diminished. Conversely, SPS leads to increased PCR in lower SES areas, highlighting the importance of addressing the digital divide to ensure equitable benefits from smart city initiatives. Furthermore, applying time limit (TL) policies within the SPS yields differential outcomes depending on the durations established. Specifically, shorter time limits are associated with increased PCR, while longer time limits correspond to decreased PCR. This underscores the influence of TL policies on parking behavior and compliance rates. Study 2 uses the Technology-Organization-Environment (TOE) framework to investigate how urban environment factors, BV, PD, and APC, moderate the SPS-PCR relationship. The hypotheses suggest that BV, PD, and APC would strengthen the positive impact of SPS on PCR due to higher parking demand. The results reveal that PD positively moderates the SPS-PCR relationship, supporting the hypothesis. However, contrary to expectations, higher BV and APC weaken the positive impact of SPS on PCR, possibly due to the availability of private parking options and policies prioritizing accessibility over strict enforcement in amenity-rich areas. The dissertation highlights the influence of socioeconomic and urban environmental contexts on technology effectiveness, using TCE and TOE frameworks. Practically, it provides insights for policymakers and urban planners, emphasizing the need for context-sensitive strategies in implementing IoT technologies to optimize benefits, address the digital divide, and achieve equitable, efficient, and sustainable urban development.
    27 0
  • Thumbnail Image
    ItemRestricted
    AN INTEGRATED DIGITAL TWIN FRAMEWORK AND EVACUATION SIMULATION SYSTEM FOR ENHANCED SAFETY IN SMART BUILDINGS
    (Western Michigan University, 2024-06-29) Almatared, Manea Mohammed S; Liu, Hexu
    Fire hazards in buildings continue to pose a substantial risk to human life and property safety despite declining deaths, injuries, and damages over the past decade. Consequently, fire safety management (FSM) is crucial to effectively preventing and controlling fire hazards. However, several challenges need to be addressed to ensure optimal FSM in buildings, such as the lack of effective integration of advanced technologies such as Internet of Things (IoT) sensors, fire detection systems, and automated response mechanisms, the reliance on insufficient fire safety equipment (FSE) maintenance and a lack of operational skills among occupants. In particular, traditional manual methods of searching for information, such as using two-dimensional drawings and relying on paper documents, have become inefficient and costly as buildings have become larger and more complex. This leaves room for improvement in current FSM practices— specifically, high-efficiency evacuation- the best approach for minimizing mortality and property loss. Digital twin (DT) technologies have been widely used in other industries, such as manufacturing and transportation, to improve efficiency, reduce costs, and enhance safety. However, the FSM sector has been a slow adopter of DT technology. This study investigated the adoption of DT technologies in the FSM sector. This research aims to explore the limitations, opportunities, and challenges associated with adopting DT technology in the FSM sector and further develop a DT-based FSM framework towards smart facility management (FM). This framework lets decision-makers obtain comprehensive information about the building's communication and safety systems. It can also enable the real time monitoring of FSE and provide predictive maintenance. Toward this objective, several DTs for FSM were first reviewed, including building information modeling (BIM), the Internet of Things (IoT), artificial intelligence (AI), and augmented reality (AR). These technologies can be used to enhance the efficiency and safety of FSM in smart buildings. The framework was then synthesized based on the literature review, application requirements, and industry needs. A questionnaire survey was conducted for FM professionals to evaluate the framework and identify the challenges of adopting DT and the proposed framework in the FSM sector. The survey results identify the current state of DT technology in the FSM sector, provide insights into the perception of DT technology among FM practitioners, and validate its expected benefits and potential challenges. The main barriers to adopting DTs in FSM are a lack of knowledge about DTs, their initial costs, user acceptance, difficulties in systems integration and data management, education training costs, a lack of competence, development complexity, and data security. Furthermore, the research develops a building fire evacuation simulation system based on the validated framework, i.e., smart lighting. This system integrates the data from the BIM platform, Fire Dynamic Simulator (FDS), and Agent-Based Simulation (ABS) platform for evacuation through customized developments. Real-time fire situation is transmitted to the evacuation simulation platform to assess the impact of dynamic fire spread on the evacuation of people. A model for optimizing evacuation route planning is designed to improve the utilization of each evacuation exit and provide a visualization of evacuation routes as smart lighting in Dynamo. This proposed system was validated by conducting a case study on three fire evacuation scenarios. An average of 20.9 % increases the evacuation efficiency in three scenarios. The main contributions of this research include (1) Developing a DT-based FSM framework for smart buildings, (2) Developing a fire emergency evacuation simulation system for buildings by integrating DT technologies, and 3) Achieving the integration and interoperability of BIM data, fire data, and evacuation data from different platforms.
    38 0
  • Thumbnail Image
    ItemRestricted
    Machine Learning (ML) Technologies
    (John Jay College of Criminal Justice, 2024-04-03) Alanazi, Mosa; Seferaj, Gentiana
    Integrating Machine Learning (ML) technologies into physical security has ignited significant discourse within scholarly circles, focusing on identifying specific ML technologies currently employed and elucidating their tangible outcomes. This integration occurs against a rapidly evolving technological landscape, encompassing advancements such as cloud computing, 5G wireless technology, real-time Internet of Things (IoT) data, surveillance cameras fortified with biometric technologies, and predictive data analytics. Collectively, these innovations augment the transformative potential of ML within security frameworks, ranging from sophisticated video analytics facilitating advanced threat detection to predictive algorithms aiding in comprehensive risk assessment. Moreover, the seamless fusion of disparate data streams and the capability to extract actionable insights in real-time present profound implications for the future trajectory of security protocols, heralding a paradigm shift in the conceptualization, implementation, and Student No: 10001 Page 2 of 14 Comprehensive Exam/Project ̶̶̶ Spring24 Department of Security, Fire and Emergency Management maintenance of physical security measures. This study endeavors to delve into the specifics of ML technologies currently operationalized in physical security contexts, scrutinize the tangible outcomes they yield, and forecast how these trends will shape the future security landscape— additionally, strategic recommendations aimed at optimizing the efficacy of ML-driven security solutions in safeguarding physical environments.
    133 0
  • Thumbnail Image
    ItemRestricted
    Production Planning in the Context of Industry 4.0 with Focus on Efficient Job Allocation & Workers’ Real-Time Status
    (Saudi Digital Library, 2023-08-15) Albassam, Abdullah Mohammed; Niknam, Seyed A
    Industry 4.0 (I4.0) has emerged a distinct impact on industrial workforce and created demand for diverse set of workforce skills and domain knowledge. Accordingly, I4.0 production systems are in need for developing and utilizing an appropriate workforce planning that considers workers with different type of skills to cope with the production requirements and keep up an efficient production. The I4.0 philosophy advocates the usage of advanced wearable technologies. Such wearable devices are able to monitor workers’ status and record vital signs and physiological data. It is well known in literature that workers’ performance in production systems is linked to their job satisfaction level as well as psychological well-being. There is much active research in the area of advanced physiology measurement technologies and incorporating the workers’ health data into industrial applications in real time. In essence, it is expected that smart wearable health devices provide the ability to boost job satisfaction, reduce human errors, and affect performance by helping managers for more efficient task matching and scheduling. This research is focused on developing job assignment models in the context of I4.0 and has considered both workers’ physiological status and the skills required to achieve the production goals. The ultimate goal of the proposed models is to maximize productivity by matching operations tasks to workers with different required skills and various skill levels. This study also considers workers' performance indicator which is predicted by machine learning models using workers’ physiology measurement. The assignment model could provide promising results in moving toward real-time application of workers’ physiological status in order to better assign production tasks and maximize production value.
    13 0
  • Thumbnail Image
    ItemRestricted
    SCALABLE NEXT GENERATION BLOCKCHAINS FOR LARGE SCALE COMPLEX CYBER-PHYSICAL SYSTEMS AND THEIR EMBEDDED SYSTEMS IN SMART CITIES
    (Saudi Digital Library, 2023-07-13) Alkhodair, Ahmad; Mohanty, Saraju; Kougianos, Elias
    The original FlexiChain and its descendants are a revolutionary distributed ledger technology (DLT) for cyber-physical systems (CPS) and their embedded systems (ES). FlexiChain, a DLT implementation, uses cryptography, distributed ledgers, peer-to-peer communications, scalable networks, and consensus. FlexiChain facilitates data structure agreements. This thesis offers a Block Directed Acyclic Graph (BDAG) architecture to link blocks to their forerunners to speed up validation. These data blocks are securely linked. This dissertation introduces Proof of Rapid Authentication, a novel consensus algorithm. This innovative method uses a distributed file to safely store a unique identifier (UID) based on node attributes to verify two blocks faster. This study also addresses CPS hardware security. A system of interconnected, user-unique identifiers allows each block's history to be monitored. This maintains each transaction and the validators who checked the block to ensure trustworthiness and honesty. We constructed a digital version that stays in sync with the distributed ledger as all nodes are linked by a NodeChain. The ledger is distributed without compromising node autonomy. Moreover, FlexiChain Layer 0 distributed ledger is also introduced and can connect and validate Layer 1 blockchains. This project produced a DAG-based blockchain integration platform with hardware security. The results illustrate a practical technique for creating a system depending on diverse applications' needs. This research's design and execution showed faster authentication, less cost, less complexity, greater scalability, higher interoperability, and reduced power consumption.
    37 0
  • Thumbnail Image
    ItemRestricted
    Internet of Things Supply Chain Risks and Defences
    (Alotaibi, Saad, 2019-04-29) Alotaibi, Saad; Song, Houbing
    The unprecedented emergence of network preinstalled devices which are designed to connect to the internet by default, promises convenience by recurrent and consistent advancement every day. It also has a promise of better security and efficient functionality. But even the lat- est gadget launched in the market to consumers comes with potential security flaws which later skilled hackers, who al- ways seem to a step ahead of executive security technicians, exploit these weak spots, infect the system with malicious malware and penetrate with ease in the private and wide area networks. These tech-savvy devices are collectively called internet of things or simply IOT. They are the tradition non-networking devices aside from personal computers, laptops, tablets, and smartphones. Some of them are in our house vicinity such, electric cars, kettles, LED light bulbs, electric kettles, Bluetooth speakers and many more. While others are in the industrial scale, such as the execution of tasks in robotic factory assembly and artificial intelligence used in war and commercial planes such as autopilot systems. Due to these rapid modifications and avid application IOT in the industrial sector, most early adopters of the technology have ways attempted to get the upper hand over their business rivals. There are various objectives while undertaking IOT projects at an industrial scale, but mainly advanced customer support and smooth ground operations and as a source of new Streams incomes top the priorities of the majorities of industrial giants and conglomerate corporations. IOT security cannot be discriminated rather be the major priority of the IOT system at every level, and must support the safety, data privacy, high standards of confidentiality and a reliable security system. There is a notable convergence of the operating system and the information technology sector which contends with a cultural clash, but always be accompanied by trustworthiness. The need to countermeasure these emerging challenges led to the Industrial Internet Consortium (IIC). It was founded in 2014 to make way for realizing the monetary value in IIOT and tackle the threats that face those that depend and live proximal to the IOT systems.
    19 0

Copyright owned by the Saudi Digital Library (SDL) © 2025