Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering

Publications

2.2 ELECTRICAL, ELECTRONIC, INFORMATION ENGINEERING

Publication Year

Articles 1 - 5 of 5

Full-Text Articles in Engineering

Parking Recommender System Privacy Preservation Through Anonymization And Differential Privacy, Yasir Saleem Shaikh, Mubashir Husain Rehmani, Noel Crespi, Roberto Minerva Feb 2021

Parking Recommender System Privacy Preservation Through Anonymization And Differential Privacy, Yasir Saleem Shaikh, Mubashir Husain Rehmani, Noel Crespi, Roberto Minerva

Publications

Recent advancements in the Internet of Things (IoT) have enabled the development of smart parking systems that use services of third-party parking recommender system to provide recommendations of personalized parking spot to users based on their past experience. However, the indiscriminate sharing of users’ data with an untrusted (or semitrusted) parking recommender system may breach the privacy because users’ behavior and mobility patterns could be inferred by analyzing their past history. Therefore, in this article, we present two solutions that preserve privacy of users in parking recommender systems while analyzing the past parking history using k-anonymity (anonymization) and differential privacy …


Differential Privacy Techniques For Cyber Physical Systems: A Survey, Muneeb Ul Hassan, Mubashir Husain Rehmani, Jinjun Chen Mar 2020

Differential Privacy Techniques For Cyber Physical Systems: A Survey, Muneeb Ul Hassan, Mubashir Husain Rehmani, Jinjun Chen

Publications

Modern cyber physical systems (CPSs) has widely being used in our daily lives because of development of information and communication technologies (ICT).With the provision of CPSs, the security and privacy threats associated to these systems are also increasing. Passive attacks are being used by intruders to get access to private information of CPSs. In order to make CPSs data more secure, certain privacy preservation strategies such as encryption, and k-anonymity have been presented in the past. However, with the advances in CPSs architecture, these techniques also need certain modifications. Meanwhile, differential privacy emerged as an efficient technique to protect CPSs …


Mac Protocols For Terahertz Communication: A Comprehensive Survey, Saim Ghafoor, Noureddine Boujnah, Mubashir Husain Rehmani, Alan Davy Jan 2020

Mac Protocols For Terahertz Communication: A Comprehensive Survey, Saim Ghafoor, Noureddine Boujnah, Mubashir Husain Rehmani, Alan Davy

Publications

Terahertz communication is emerging as a future technology to support Terabits per second link with highlighting features as high throughput and negligible latency. However, the unique features of the Terahertz band such as high path loss, scattering, and reflection pose new challenges and results in short communication distance. The antenna directionality, in turn, is required to enhance the communication distance and to overcome the high path loss. However, these features in combine negate the use of traditional medium access protocols (MAC). Therefore, novel MAC protocol designs are required to fully exploit their potential benefits including efficient channel access, control message …


Effective Capacity In Wireless Networks: A Comprehensive Survey, Muhammad Amjad, Mubashir Husain Rehmani, Leila Musavian Oct 2019

Effective Capacity In Wireless Networks: A Comprehensive Survey, Muhammad Amjad, Mubashir Husain Rehmani, Leila Musavian

Publications

Low latency applications, such as multimedia communications, autonomous vehicles, and Tactile Internet are the emerging applications for next-generation wireless networks, such as 5th generation (5G) mobile networks. Existing physical layer channel models, however, do not explicitly consider quality of service (QoS) aware related parameters under specific delay constraints. To investigate the performance of low-latency applications in future networks, a new mathematical framework is needed. Effective capacity (EC), which is a link-layer channel model with QoS-awareness, can be used to investigate the performance of wireless networks under certain statistical delay constraints. In this paper, we provide a comprehensive survey on existing …


Software Defined Networks Based Smart Grid Communication: A Comprehensive Survey, Mubashir Husain Rehmani, Alan Davy, Brendan Jennings, Chadi Assi Jan 2019

Software Defined Networks Based Smart Grid Communication: A Comprehensive Survey, Mubashir Husain Rehmani, Alan Davy, Brendan Jennings, Chadi Assi

Publications

The current power grid is no longer a feasible solution due to ever-increasing user demand of electricity, old infrastructure, and reliability issues and thus require transformation to a better grid a.k.a., smart grid (SG). The key features that distinguish SG from the conventional electrical power grid are its capability to perform two-way communication, demand side management, and real time pricing. Despite all these advantages that SG will bring, there are certain issues which are specific to SG communication system. For instance, network management of current SG systems is complex, time consuming, and done manually. Moreover, SG communication (SGC) system is …