Change search
Link to record
Permanent link

Direct link
BETA
Publications (10 of 45) Show all publications
Hassan, A. M. & Awad, A. I. (2018). Urban Transition in the Era of the Internet of Things: Social Implications and Privacy Challenges. IEEE Access, 6, 36428-36440
Open this publication in new window or tab >>Urban Transition in the Era of the Internet of Things: Social Implications and Privacy Challenges
2018 (English)In: IEEE Access, E-ISSN 2169-3536, Vol. 6, p. 36428-36440Article in journal (Refereed) Published
Abstract [en]

The Internet of Things (IoT) could become an important aspect of urban life in the next decade. In the IoT paradigm, various information and communication technologies (ICTs) are used in concert to substantially reduce urban problems. Smart cities and ubiquitous cities will adopt ICTs in the urban development process; however, IoT-based cities will experience considerably stronger effects than those that adopt conventional ICTs. IoT cities allow urban residents and “things”to be connected to the Internet by virtue of the extension of the Internet Protocol from IPv4 to IPv6 and of cutting-edge device and sensor technology. Therefore, the urban transition resulting from the influence of IoT may be a critical issue. The privacy-related vulnerabilities of IoT technologies may negatively affect city residents. Furthermore, disparities in the spread of IoT systems across different countries may allow some countries to subvert the privacy of other countries' citizens. The aim of this paper is to identify the potential prospects and privacy challenges that will emerge from IoT deployment in urban environments. This paper reviews the prospects of and barriers to IoT implementation at the regional, city, and residential scales from the perspectives of security and privacy. The IoT technology will be a continual presence in life in general and in urban life in particular. However, the adoption of the IoT paradigm in cities will be complicated due to the inherent presence of unsecured connections. Moreover, the IoT systems may rob people of some of their humanity, infringing on their privacy, because people are also regarded as “things”in the IoT paradigm. Given the social trepidation surrounding IoT implementation, local and international associations related to IoT privacy, and legislation and international laws, are needed to maintain the personal right to privacy and to satisfy the demands of institutional privacy in urban contexts.

Place, publisher, year, edition, pages
IEEE, 2018
National Category
Information Systems, Social aspects
Research subject
Information systems
Identifiers
urn:nbn:se:ltu:diva-69008 (URN)10.1109/ACCESS.2018.2838339 (DOI)000439022000103 ()2-s2.0-85047198293 (Scopus ID)
Note

Validerad;2018;Nivå 2;2018-08-06 (rokbeg)

Available from: 2018-05-31 Created: 2018-05-31 Last updated: 2018-08-16Bibliographically approved
Abd-Ellah, M. K., Awad, A. I., Khalaf, A. A. M. & Hamed, H. F. A. (2017). Design and implementation of a computer-aided diagnosis system for brain tumor classification. In: 2016 28th International Conference on Microelectronics (ICM): . Paper presented at 28th International Conference on Microelectronics (ICM), Cairo, Egypt, 17-20 Dec. 2016 (pp. 73-76). , Article ID 7847911.
Open this publication in new window or tab >>Design and implementation of a computer-aided diagnosis system for brain tumor classification
2017 (English)In: 2016 28th International Conference on Microelectronics (ICM), 2017, p. 73-76, article id 7847911Conference paper, Published paper (Refereed)
Abstract [en]

Computer-aided diagnosis (CAD) systems have become very important for the medical diagnosis of brain tumors. The systems improve the diagnostic accuracy and reduce the required time. In this paper, a two-stage CAD system has been developed for automatic detection and classification of brain tumor through magnetic resonance images (MRIs). In the first stage, the system classifies brain tumor MRI into normal and abnormal images. In the second stage, the type of tumor is classified as benign (Noncancerous) or malignant (Cancerous) from the abnormal MRIs. The proposed CAD ensembles the following computational methods: MRI image segmentation by K-means clustering, feature extraction using discrete wavelet transform (DWT), feature reduction by applying principal component analysis (PCA). The two-stage classification has been conducted using a support vector machine (SVM). Performance evaluation of the proposed CAD has achieved promising results using a non-standard MRIs database.

National Category
Information Systems, Social aspects
Research subject
Information systems
Identifiers
urn:nbn:se:ltu:diva-61988 (URN)10.1109/ICM.2016.7847911 (DOI)000399706600019 ()2-s2.0-85014917541 (Scopus ID)978-1-5090-5721-4 (ISBN)
Conference
28th International Conference on Microelectronics (ICM), Cairo, Egypt, 17-20 Dec. 2016
Available from: 2017-02-14 Created: 2017-02-14 Last updated: 2018-03-09Bibliographically approved
Grzenda, M., Furtak, J., Legierski, J. & Awad, A. I. (2017). Network Architectures, Security, and Applications: An Introduction. In: Maciej Grzenda, Ali Ismail Awad, Janusz Furtak, Jarosław Legierski (Ed.), Advances in Network Systems: Architectures, Security, and Applications (pp. 1-10). Berlin: Springer Berlin/Heidelberg
Open this publication in new window or tab >>Network Architectures, Security, and Applications: An Introduction
2017 (English)In: Advances in Network Systems: Architectures, Security, and Applications / [ed] Maciej Grzenda, Ali Ismail Awad, Janusz Furtak, Jarosław Legierski, Berlin: Springer Berlin/Heidelberg, 2017, p. 1-10Chapter in book (Refereed)
Abstract [en]

Owing to the ever growing communication systems, modern networks currently encompass a wide range of solutions and technologies, including wireless and wired networks and provide basis for network systems from multiple partly overlapping domains such as the Internet of Things (IoT), cloud services, and network applications. This appears in numerous active research areas with particular attention paid to the architecture and security of network systems. In parallel, novel applications are developed, in some cases strongly linked to rapidly developing network-based data acquisition and processing frameworks. This chapter presents a general introduction to the topics of network architectures, security, and applications in addition to short descriptions of the chapters included in this volume

Place, publisher, year, edition, pages
Berlin: Springer Berlin/Heidelberg, 2017
Series
Advances in Intelligent Systems and Computing, ISSN 2194-5357 ; 461
National Category
Information Systems, Social aspects
Research subject
Information systems
Identifiers
urn:nbn:se:ltu:diva-61302 (URN)10.1007/978-3-319-44354-6_1 (DOI)2-s2.0-85007502875 (Scopus ID)978-3-319-44352-2 (ISBN)978-3-319-44354-6 (ISBN)
Available from: 2017-01-02 Created: 2017-01-02 Last updated: 2018-03-09Bibliographically approved
Awad, A. I. & Andrzej, B. (Eds.). (2017). Proceedings of the 2017 Federated Conference on Computer Science and Information Systems (FedCSIS 2017). Paper presented at 1st International Conference on Security, Privacy, and Trust (INSERT'17), Prague, Czech Republic, 3-6 September, 2017. Prague, Czech Republic: Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>Proceedings of the 2017 Federated Conference on Computer Science and Information Systems (FedCSIS 2017)
2017 (English)Conference proceedings (editor) (Refereed)
Abstract [en]

https://fedcsis.org/2017/insert

Place, publisher, year, edition, pages
Prague, Czech Republic: Institute of Electrical and Electronics Engineers (IEEE), 2017
Series
Annals of Computer Science and Information Systems, ISSN 2300-5963 ; 11
National Category
Information Systems, Social aspects
Research subject
Information systems
Identifiers
urn:nbn:se:ltu:diva-63720 (URN)10.15439/978-83-946253-7-5 (DOI)978-83-946253-7-5 (ISBN)
Conference
1st International Conference on Security, Privacy, and Trust (INSERT'17), Prague, Czech Republic, 3-6 September, 2017
Note

2018-02-23: Redaktör för konferensen 1st International Conference on Security, Privacy, and Trust (INSERT'17) som ingår i Proceedings of the 2017 Federated Conference on Computer Science and Information Systems (FedCSIS 2017). (marisr, andbra)

Available from: 2017-06-05 Created: 2017-06-05 Last updated: 2018-03-09Bibliographically approved
Okoh, E., Makame, H. M. & Awad, A. I. (2017). Toward online education for fingerprint recognition: A proof-of-concept web platform. Information Security Journal, 26(4), 186-197
Open this publication in new window or tab >>Toward online education for fingerprint recognition: A proof-of-concept web platform
2017 (English)In: Information Security Journal, ISSN 1939-3555, E-ISSN 1939-3547, Vol. 26, no 4, p. 186-197Article in journal (Refereed) Published
Abstract [en]

Recent advances in information and communication technology (ICT) have pushed education systems into the online paradigm. Although fingerprint recognition has received considerable attention from researchers, the concept of creating online or distance education systems for fingerprint recognition systems is a valid problem that requires further investigation. This article addresses the problem and presents a web platform for online education of a fingerprint recognition system. This study focused on the technical design and implementation of the web platform solely as a proof of concept to illustrate the possibility of creating distance education for fingerprint recognition. The developed platform offers students a way to gain knowledge about the full range of fingerprint recognition system technology. The significance of using a web platform stems from the need to supplement students’ theoretical knowledge with practical hands-on experience with information security in general and with fingerprint recognition in particular. Demonstrations such as fingerprint image enhancement and fingerprint feature extraction are included in the current platform prototype. Plots of fingerprint recognition performance curves such as false match rate (FMR) and false non-match rate (FNMR) as functions of the matching threshold curve, the receiver operating characteristic (ROC) curve, and the detection error trade-off (DET) curve are plotted as part of the platform. From a technical viewpoint, the platform was successfully implemented; however, its educational impact needs further evaluation.

Place, publisher, year, edition, pages
Taylor & Francis, 2017
National Category
Information Systems, Social aspects
Research subject
Information systems
Identifiers
urn:nbn:se:ltu:diva-64279 (URN)10.1080/19393555.2017.1329462 (DOI)2-s2.0-85021100806 (Scopus ID)
Note

Validerad;2017;Nivå 2;2017-09-07 (andbra)

Available from: 2017-06-20 Created: 2017-06-20 Last updated: 2018-05-04Bibliographically approved
King, J. & Awad, A. I. (2016). A Distributed Security Mechanism for Resource-Constrained IoT Devices (ed.). Paper presented at . Informatica, 40(1), 133-143
Open this publication in new window or tab >>A Distributed Security Mechanism for Resource-Constrained IoT Devices
2016 (English)In: Informatica, ISSN 0350-5596, E-ISSN 1854-3871, Vol. 40, no 1, p. 133-143Article in journal (Refereed) Published
Abstract [en]

Internet of Things (IoT) devices have developed to comprise embedded systems and sensors with the ability to connect, collect, and transmit data over the Internet. Although solutions to secure IoT systems exist, Class-0 IoT devices with insufficient resources to support such solutions are considered a resource constrained in terms of secure communication. This paper provides a distributed security mechanism that targets Class-0 IoT devices. The research goal is to secure the entire data path in two segments, device-to-gateway and gateway-to-server data communications. The main concern in the provided solution is that lighter security operations with minimal resource requirements are performed in the IoT device, while heavier tasks are performed in the gateway side. The proposed mechanism utilizes a symmetric encryption for data objects combined with the native wireless security to offer a layered security technique between the device and the gateway. In the offered solution, the IoT gateways provide additional protection by securing data using Transport Layer Security (TLS). Real-time experimental evaluations have demonstrated the applicability of the proposed mechanism pertaining to the security assurance and the consumed resources of the target Class-0 IoT devices.

National Category
Information Systems, Social aspects
Research subject
Information systems
Identifiers
urn:nbn:se:ltu:diva-9632 (URN)84b7b131-da76-4410-80c0-9867bb35a477 (Local ID)84b7b131-da76-4410-80c0-9867bb35a477 (Archive number)84b7b131-da76-4410-80c0-9867bb35a477 (OAI)
Note
Validerad; 2016; Nivå 2; 20160317 (ismawa)Available from: 2016-09-29 Created: 2016-09-29 Last updated: 2018-03-09Bibliographically approved
Awad, A. I. (2016). Aktivitet: Concurrency and Computation: Practice and Experience (ed.). Paper presented at .
Open this publication in new window or tab >>Aktivitet: Concurrency and Computation: Practice and Experience
2016 (English)Other (Other (popular science, discussion, etc.))
National Category
Information Systems, Social aspects
Research subject
Information systems
Identifiers
urn:nbn:se:ltu:diva-36804 (URN)f6d1b853-e19f-4c7c-9d36-2d3e31de1712 (Local ID)f6d1b853-e19f-4c7c-9d36-2d3e31de1712 (Archive number)f6d1b853-e19f-4c7c-9d36-2d3e31de1712 (OAI)
Note
Startdatum: 01/01/2016; Roll: Vetenskaplig granskare; Typ: Fortlöpande redaktionsarbete / peer review - Peer review av manuskriptAvailable from: 2016-09-30 Created: 2016-09-30 Last updated: 2018-03-09Bibliographically approved
Awad, A. I. (2016). Aktivitet: Health Information Science and Systems (HISS) (ed.). Paper presented at .
Open this publication in new window or tab >>Aktivitet: Health Information Science and Systems (HISS)
2016 (English)Other (Other (popular science, discussion, etc.))
National Category
Information Systems, Social aspects
Research subject
Information systems
Identifiers
urn:nbn:se:ltu:diva-36335 (URN)0644bf9a-427f-4d65-9dd0-67e370a95da7 (Local ID)0644bf9a-427f-4d65-9dd0-67e370a95da7 (Archive number)0644bf9a-427f-4d65-9dd0-67e370a95da7 (OAI)
Note
Startdatum: 01/01/2016; Slutdatum: 01/01/2016; Roll: Redaktör; Typ: Fortlöpande redaktionsarbete / peer review - Redaktör för vetenskaplig tidskriftAvailable from: 2016-09-30 Created: 2016-09-30 Last updated: 2018-03-09Bibliographically approved
Awad, A. I. (2016). Aktivitet: International Conference on Telecommunications (ed.). Paper presented at .
Open this publication in new window or tab >>Aktivitet: International Conference on Telecommunications
2016 (English)Other (Other (popular science, discussion, etc.))
National Category
Information Systems, Social aspects
Research subject
Information systems
Identifiers
urn:nbn:se:ltu:diva-36720 (URN)ce83a634-64ca-48f9-936b-d6d8b4c2f99a (Local ID)ce83a634-64ca-48f9-936b-d6d8b4c2f99a (Archive number)ce83a634-64ca-48f9-936b-d6d8b4c2f99a (OAI)
Note
Evenemang (konferens etc): International Conference on Telecommunications : Special Session on IoT Emerging Technologies: Design and Security (ITEMS'16) 16/05/2016 - 18/05/2016; Startdatum: 16/05/2016; Slutdatum: 18/05/2016; Roll: Organisatör; Typ: Organiserade av och deltagande i konferenser, workshops, kurser, seminarier - Organiserande av och deltagande i konferensAvailable from: 2016-09-30 Created: 2016-09-30 Last updated: 2018-03-09Bibliographically approved
Awad, A. I. (2016). Aktivitet: International Conference on Telecommunications (ed.). Paper presented at .
Open this publication in new window or tab >>Aktivitet: International Conference on Telecommunications
2016 (English)Other (Other (popular science, discussion, etc.))
National Category
Information Systems, Social aspects
Research subject
Information systems
Identifiers
urn:nbn:se:ltu:diva-36376 (URN)1dd116e6-c810-42d7-8c87-8c727a79aba1 (Local ID)1dd116e6-c810-42d7-8c87-8c727a79aba1 (Archive number)1dd116e6-c810-42d7-8c87-8c727a79aba1 (OAI)
Note
Evenemang (konferens etc): International Conference on Telecommunications : Special Session on IoT Emerging Technologies: Design and Security (ITEMS'16) 16/05/2016 - 18/05/2016; Startdatum: 16/05/2016; Slutdatum: 18/05/2016; Projekt: International Conference on Telecommunications; Roll: Deltagare; Typ: Organiserade av och deltagande i konferenser, workshops, kurser, seminarier - Organiserande av och deltagande i konferensAvailable from: 2016-09-30 Created: 2016-09-30 Last updated: 2018-03-09Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0002-3800-0757

Search in DiVA

Show all publications