-
Proof of Deep Learning: Approaches, Challenges, and Future Directions
Authors:
Mahmoud Salhab,
Khaleel Mershad
Abstract:
The rise of computational power has led to unprecedented performance gains for deep learning models. As more data becomes available and model architectures become more complex, the need for more computational power increases. On the other hand, since the introduction of Bitcoin as the first cryptocurrency and the establishment of the concept of blockchain as a distributed ledger, many variants and…
▽ More
The rise of computational power has led to unprecedented performance gains for deep learning models. As more data becomes available and model architectures become more complex, the need for more computational power increases. On the other hand, since the introduction of Bitcoin as the first cryptocurrency and the establishment of the concept of blockchain as a distributed ledger, many variants and approaches have been proposed. However, many of them have one thing in common, which is the Proof of Work (PoW) consensus mechanism. PoW is mainly used to support the process of new block generation. While PoW has proven its robustness, its main drawback is that it requires a significant amount of processing power to maintain the security and integrity of the blockchain. This is due to applying brute force to solve a hashing puzzle. To utilize the computational power available in useful and meaningful work while keeping the blockchain secure, many techniques have been proposed, one of which is known as Proof of Deep Learning (PoDL). PoDL is a consensus mechanism that uses the process of training a deep learning model as proof of work to add new blocks to the blockchain. In this paper, we survey the various approaches for PoDL. We discuss the different types of PoDL algorithms, their advantages and disadvantages, and their potential applications. We also discuss the challenges of implementing PoDL and future research directions.
△ Less
Submitted 31 August, 2023;
originally announced August 2023.
-
Blockchain Model for Environment/Infrastructure Monitoring in Cloud-Enabled High-Altitude Platform Systems
Authors:
Khaleel Mershad,
Hayssam Dahrouj
Abstract:
The recently accentuated features of augmenting conventional wireless networks with high altitude platform systems (HAPS) have fueled a plethora of applications, which promise to offer new services to ground users, as well to enhance the efficiency and pervasion of existing applications. Cloud-enabled HAPS, which aims to create HAPS-based datacenters that offer cloud services to users, has particu…
▽ More
The recently accentuated features of augmenting conventional wireless networks with high altitude platform systems (HAPS) have fueled a plethora of applications, which promise to offer new services to ground users, as well to enhance the efficiency and pervasion of existing applications. Cloud-enabled HAPS, which aims to create HAPS-based datacenters that offer cloud services to users, has particularly emerged as a promising key enabler to provide large-scale equitable services from the sky. Although offering cloud services from the HAPS proves to be efficient, its practical deployment at the stratosphere level still faces many challenges such as high energy requirements, physical maintenance, and is particularly prone to security considerations. Safeguarding the cloud-enabled HAPS against various cyberattacks is a necessity to guarantee its safe operation. This paper proposes a blockchain model to secure cloud-enabled HAPS networks that contain a large number of HAPS stations from recurring cyberattacks within the context of the environment and infrastructure monitoring (EIM) application. To this end, the paper first presents a detailed blockchain framework, and describes the ways of integrating the developed framework into the various system components. We then discuss the details of the system implementation, including the storing and consuming of cloud transactions, the generation of new blocks, and the blockchain consensus protocol that is tailored to the EIM requirements. Finally, we present numerical simulations that illustrate the performance of the system in terms of throughput, latency, and resilience to attacks.
△ Less
Submitted 2 June, 2023;
originally announced June 2023.
-
A Lightweight Blockchain and Fog-enabled Secure Remote Patient Monitoring System
Authors:
Omar Cheikhrouhou,
Khaleel Mershad,
Faisal Jamil,
Redowan Mahmud,
Anis Koubaa,
Sanaz Rahimi Moosavi
Abstract:
IoT has enabled the rapid growth of smart remote healthcare applications. These IoT-based remote healthcare applications deliver fast and preventive medical services to patients at risk or with chronic diseases. However, ensuring data security and patient privacy while exchanging sensitive medical data among medical IoT devices is still a significant concern in remote healthcare applications. Alte…
▽ More
IoT has enabled the rapid growth of smart remote healthcare applications. These IoT-based remote healthcare applications deliver fast and preventive medical services to patients at risk or with chronic diseases. However, ensuring data security and patient privacy while exchanging sensitive medical data among medical IoT devices is still a significant concern in remote healthcare applications. Altered or corrupted medical data may cause wrong treatment and create grave health issues for patients. Moreover, current remote medical applications' efficiency and response time need to be addressed and improved. Considering the need for secure and efficient patient care, this paper proposes a lightweight Blockchain-based and Fog-enabled remote patient monitoring system that provides a high level of security and efficient response time. Simulation results and security analysis show that the proposed lightweight blockchain architecture fits the resource-constrained IoT devices well and is secure against attacks. Moreover, the augmentation of Fog computing improved the responsiveness of the remote patient monitoring system by 40%.
△ Less
Submitted 9 January, 2023;
originally announced January 2023.
-
Lightweight Blockchain Solutions: Taxonomy, Research Progress, and Comprehensive Review
Authors:
Khaleel Mershad,
Omar Cheikhrouhou
Abstract:
The proliferation of resource-constrained devices has become prevalent across various digital applications, including smart homes, smart healthcare, and smart transportation, among others. However, the integration of these devices brings many security issues. To address these concerns, Blockchain technology has been widely adopted due to its robust security characteristics, including immutability,…
▽ More
The proliferation of resource-constrained devices has become prevalent across various digital applications, including smart homes, smart healthcare, and smart transportation, among others. However, the integration of these devices brings many security issues. To address these concerns, Blockchain technology has been widely adopted due to its robust security characteristics, including immutability, cryptography, and distributed consensus. However, implementing blockchain within these networks is highly challenging due to the limited resources of the employed devices and the resource-intensive requirements of the blockchain. To overcome these challenges, a multitude of researchers have proposed lightweight blockchain solutions specifically designed for resource-constrained networks. In this paper, we present a taxonomy of lightweight blockchain solutions proposed in the literature. More precisely, we identify five areas within the "lightweight" concept, namely, blockchain architecture, device authentication, cryptography model, consensus algorithm, and storage method. We discuss the various methods employed in each "lightweight" category, highlighting existing gaps and identifying areas for improvement. Our review highlights the missing points in existing systems and paves the way to building a complete lightweight blockchain solution for networks of resource-constrained devices.
△ Less
Submitted 5 November, 2023; v1 submitted 12 December, 2022;
originally announced December 2022.
-
PROACT: Parallel Multi-Miner Proof of Accumulated Trust Protocol for Internet of Drones
Authors:
Khaleel Mershad
Abstract:
Several types of networks that comprise unmanned aerial vehicles (UAV or drone) are being utilized in important applications such as emergency response, environment and infrastructure monitoring, defense and security, and commerce. In such networks, swarms of UAVs cooperate in executing one or more missions to achieve the application's objectives. The UAVs communicate with terrestrial networks by…
▽ More
Several types of networks that comprise unmanned aerial vehicles (UAV or drone) are being utilized in important applications such as emergency response, environment and infrastructure monitoring, defense and security, and commerce. In such networks, swarms of UAVs cooperate in executing one or more missions to achieve the application's objectives. The UAVs communicate with terrestrial networks by connecting to fixed or mobile ground control stations (GCS). The ability of drones to connect to online applications and offer services to Internet users has led to the proliferation of the Internet of Drones (IoD). However, IoD applications are highly vulnerable to many types of cyberattacks. Hence, mechanisms must be deployed to secure the IoD operations and data. Recently, the blockchain has been proposed as a solution to detect and prevent malicious attacks on the UAV network (UAVN). Due to the UAV's limited resources, it becomes a challenge to integrate the blockchain into the IoD. In this paper, we propose a model that enables a drone to store the important data that it requires during its flight within a lightweight blockchain system. In addition, we propose a new blockchain consensus mechanism in which several miners produce their blocks in parallel, which decreases the time needed to add transactions securely to the blockchain and meets the requirements of delay-sensitive applications. Our simulations prove the advantages of the proposed model in decreasing the transaction-to-blockchain delay, the average drone energy consumption, and the blockchain block size as compared to other IoD blockchain systems.
△ Less
Submitted 14 June, 2022;
originally announced June 2022.
-
Blockchain for the Cybersecurity of Smart City Applications
Authors:
Omar Cheikhrouhou,
Ichrak Amdouni,
Khaleel Mershad,
Maryem Ammi,
Tuan Nguyen Gia
Abstract:
Cybersecurity is an inherent characteristic that should be addressed before the large deployment of smart city applications. Recently, Blockchain appears as a promising technology to provide several cybersecurity aspects of smart city applications. This paper provides a comprehensive review of the existing blockchain-based solutions for the cybersecurity of the main smart city applications, namely…
▽ More
Cybersecurity is an inherent characteristic that should be addressed before the large deployment of smart city applications. Recently, Blockchain appears as a promising technology to provide several cybersecurity aspects of smart city applications. This paper provides a comprehensive review of the existing blockchain-based solutions for the cybersecurity of the main smart city applications, namely smart healthcare, smart transportation, smart agriculture, supply chain management, smart grid, and smart homes. We describe the existing solutions and we discuss their merits and limits. Moreover, we define the security requirements of each smart city application and we give a mapping of the studied solutions to these defined requirements. Additionally, future directions are given. We believe that the present survey is a good starting point for every researcher in the fields of cybersecurity, blockchain, and smart cities.
△ Less
Submitted 6 June, 2022;
originally announced June 2022.
-
Cloud-Enabled High-Altitude Platform Systems: Challenges and Opportunities
Authors:
Khaleel Mershad,
Hayssam Dahrouj,
Hadi Sarieddeen,
Basem Shihada,
Tareq Al-Naffouri,
Mohamed-Slim Alouini
Abstract:
Augmenting ground-level communications with flying networks, such as the high-altitude platform system (HAPS), is among the major innovative initiatives of the next generation of wireless systems (6G). Given HAPS quasi-static positioning at the stratosphere, HAPS-to-ground and HAPS-to-air connectivity frameworks are expected to be prolific in terms of data acquisition and computing, especially giv…
▽ More
Augmenting ground-level communications with flying networks, such as the high-altitude platform system (HAPS), is among the major innovative initiatives of the next generation of wireless systems (6G). Given HAPS quasi-static positioning at the stratosphere, HAPS-to-ground and HAPS-to-air connectivity frameworks are expected to be prolific in terms of data acquisition and computing, especially given the mild weather and quasi-constant wind speed characteristics of the stratospheric layer. This paper explores the opportunities stemming from the realization of cloud-enabled HAPS in the context of telecommunications applications and services. The paper first advocates for the potential physical advantages of deploying HAPS as flying data-centers, also known as super-macro base stations. The paper then describes various cloud services that can be offered from the HAPS and the merits that can be achieved by this integration, such as enhancing the quality, speed, and range of the offered services. The proposed services span a wide range of fields, including satellites, Internet of Things (IoT), ad hoc networks (such as sensor; vehicular; and aerial networks), gaming, and social networks. For each service, the paper illustrates the methods that would be used by cloud providers to offload the service data to the HAPS and enable the cloud customers to consume the service. The paper further sheds light on the challenges that need to be addressed for realizing practical cloud-enabled HAPS, mainly, those related to high energy, processing power, quality of service (QoS), and security considerations. Finally, the paper discusses some open issues on the topic, namely, HAPS mobility and message routing, HAPS security via blockchain and machine learning, artificial intelligence-based resource allocation in cloud-enabled HAPS, and integration with vertical heterogeneous networks.
△ Less
Submitted 28 June, 2021; v1 submitted 3 June, 2021;
originally announced June 2021.