Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
Thaier Hayajneh
  • New York, New York, United States
  • Thaier Hayajneh, Ph.D., specializes in Cybersecurity, and Data Networks, is the founding director of Fordham Center f... moreedit
Hardware Trojans (HTs) are malicious and intentional modification of the hardware design, embedded by an adversary to leak sensitive data, modify functionality, or cause malfunction. Lightweight ciphers are designed for... more
Hardware Trojans (HTs) are malicious and intentional modification of the hardware design, embedded by an adversary to leak sensitive data, modify functionality, or cause malfunction. Lightweight ciphers are designed for resource‐constrained devices (RCDs) to balance resources and security, but often targeted by HTs. This work aims to create a trusted lightweight cipher design and detect complex sequential HTs using a runtime monitoring method with minimal resource overhead. The novelty of the approach is that it combines full or partial temporal redundancy, resource minimization, and runtime monitoring. The algorithm employs temporal redundancy, by executing a first run of the cipher, and then replays the cipher fully (ReplayN method) or partially (ReplayN/2 method). A mismatch indicates HT activity, and a third replay is executed to determine the correct results. The ReplayN/2 algorithm further optimizes time and energy by limiting replay to the second half of the cipher rounds. The proposed method is compared with other existing methods including triple modular redundancy (TMR), adapted triple modular redundancy (ATMR), and reverse‐function redundancy (RFR). All methods were implemented in field‐programmable gate array (FPGA) technology. Implementation performance metrics were measured and compared, including resource utilization (i.e., logical elements [LEs]), power, energy (E), and speed (i.e., Fmax). The results show that the proposed algorithm outperforms existing methods in most of the metrics. In terms of speed and area, the replay algorithm is faster by 24% and reduces total LEs by 42% when compared with existing methods. Regarding power, replay algorithm reduces power by 45% when compared with TMR and ATMR. With respect to energy, replay methods reduce energy by an average of 6% when compared with TMR and ATMR. The ReplayN/2 reduces energy by an average 15% when compared with TMR and ATMR. Based on the E×LE (i.e., energy × area) metric, ReplayN/2 is the top performing method as it balances area and energy metrics. Using E×LEFmax metric, the replay methods are the best performing methods as they best balance area, energy, and speed. Also, based on ThroughputLE2 metric, the replay methods are the top performing methods.
Recently, there has been a significant increase in number of resource-constrained devices, which are typically battery-powered. Encryption schemes are employed to protect privacy of exchanged data. In such devices, balancing data security... more
Recently, there has been a significant increase in number of resource-constrained devices, which are typically battery-powered. Encryption schemes are employed to protect privacy of exchanged data. In such devices, balancing data security and devices resources is a critical design challenge. For resource constrained devices, energy is the most crucial resource. The research motivation is to adapt cipher energy based to predefined power levels using a single cipher with multiple implementation options.In this paper we propose a scheme to adjust power and energy consumption of single lightweight cipher based on current device power level. The scheme adjusts cipher energy by varying design options and operation complexity of the cipher. This includes varying number of implemented rounds in hardware, key scheduling and number of algorithm iterations. While altering number of algorithm iteration reduces security, it is better than inhibiting encryption or shutting down the device. Our proposed scheme allows adjustable encryption for low power level. Results from Field-programmable gate array (FPGA) implementations show energy savings of 35%-39% compared with implementations of existing designs.
Security of IoT devices is getting a lot of attention from researchers as they are becoming prevalent everywhere. However, implementation of hardware security in these devices has been overlooked, and many researches have mainly focused... more
Security of IoT devices is getting a lot of attention from researchers as they are becoming prevalent everywhere. However, implementation of hardware security in these devices has been overlooked, and many researches have mainly focused on software, network, and cloud security. A deeper understanding of hardware Trojans (HTs) and protection against them is of utmost importance right now as they are the prime threat to the hardware. This paper emphasizes the need for a secure hardware-level foundation for security of these devices, as depending on software security alone is not adequate enough. These devices must be protected against sophisticated attacks, especially if the groundwork for the attacks is already laid in devices during design or manufacturing process, such as with HTs. This paper will discuss the stealthy nature of these HT, highlight HT taxonomy and insertion methods, and provide countermeasures.
Bluetooth technology is a key component of wireless communications. It provides a low-energy and low-cost solution for short-range radio transmissions. Bluetooth, more specifically Bluetooth Low Energy (BLE) has become the predominant... more
Bluetooth technology is a key component of wireless communications. It provides a low-energy and low-cost solution for short-range radio transmissions. Bluetooth, more specifically Bluetooth Low Energy (BLE) has become the predominant technology for connecting IoT (Internet of Things). It can be found in cell phones, headsets, speakers, printers, keyboards, automobiles, children’s toys, and medical devices, as well as many other devices. The technology can also be found in automated smart homes, to provide monitors and controls for lights, thermostats, door locks, appliances, security systems, and cameras. Bluetooth offers convenience and ease of use, but it lacks a centralized security infrastructure. As a result, it has serious security vulnerabilities, and the need for awareness of the security risks are increasing as the technology becomes more widespread. This paper presents an overview of Bluetooth technology in IoT including its security, vulnerabilities, threats, and risk mi...
A Wireless Body Area Network (WBAN) is a network of wirelessly connected sensing and actuating devices. WBANs used for recording biometric information and administering medication are classified as part of a Cyber Physical System (CPS).... more
A Wireless Body Area Network (WBAN) is a network of wirelessly connected sensing and actuating devices. WBANs used for recording biometric information and administering medication are classified as part of a Cyber Physical System (CPS). Preserving user security and privacy is a fundamental concern of WBANs, which introduces the notion of using biometric readings as a mechanism for authentication. Extensive research has been conducted regarding the various methodologies (e.g. ECG, EEG, gait, head/arm motion, skin impedance). This paper seeks to analyze and evaluate the most prominent biometric authentication techniques based on accuracy, cost, and feasibility of implementation. We suggest several authentication schemes which incorporate multiple biometric properties.
The presence of wireless communication grows undeniably more prevalent each year. Since the introduction of the IEEE 802.11 standard for Wireless Local Area Networks (WLAN) in 1997, technologies have progressed to provide wireless... more
The presence of wireless communication grows undeniably more prevalent each year. Since the introduction of the IEEE 802.11 standard for Wireless Local Area Networks (WLAN) in 1997, technologies have progressed to provide wireless accessibility to industries and consumers with growing ease and convenience. As the usage of personal devices, such as phones and watches, that connect to the Internet through Wi-Fi increases, wireless attacks on users are becoming more critical. This paper provides a novel attack model to offer an organized and comprehensive view of the possible attacks on WiFi latest security standards. All exiting attacks will be investigated, with emphasis on more recent attacks, such as the KRACK and PMKID Dictionary attacks. This paper will then analyze the technology offered in the new Wi-Fi Protected Access III (WPA3) security scheme and provide a comprehensive security analysis and discussion to determine whether it has addressed the vulnerabilities of its predece...
As Internet of Things (IoT) devices and other remote patient monitoring systems increase in popularity, security concerns about the transfer and logging of data transactions arise. In order to handle the protected health information (PHI)... more
As Internet of Things (IoT) devices and other remote patient monitoring systems increase in popularity, security concerns about the transfer and logging of data transactions arise. In order to handle the protected health information (PHI) generated by these devices, we propose utilizing blockchain-based smart contracts to facilitate secure analysis and management of medical sensors. Using a private blockchain based on the Ethereum protocol, we created a system where the sensors communicate with a smart device that calls smart contracts and writes records of all events on the blockchain. This smart contract system would support real-time patient monitoring and medical interventions by sending notifications to patients and medical professionals, while also maintaining a secure record of who has initiated these activities. This would resolve many security vulnerabilities associated with remote patient monitoring and automate the delivery of notifications to all involved parties in a HI...
Extrinsic calibration of a camera and a 2D laser range finder (lidar) sensors is crucial in sensor data fusion applications; for example SLAM algorithms used in mobile robot platforms. The fundamental challenge of extrinsic calibration is... more
Extrinsic calibration of a camera and a 2D laser range finder (lidar) sensors is crucial in sensor data fusion applications; for example SLAM algorithms used in mobile robot platforms. The fundamental challenge of extrinsic calibration is when the camera-lidar sensors do not overlap or share the same field of view. In this paper we propose a novel and flexible approach for the extrinsic calibration of a camera-lidar system without overlap, which can be used for robotic platform self-calibration. The approach is based on the robot-world hand-eye calibration (RWHE) problem; proven to have efficient and accurate solutions. First, the system was mapped to the RWHE calibration problem modeled as the linear relationship AX = ZB , where X and Z are unknown calibration matrices. Then, we computed the transformation matrix B , which was the main challenge in the above mapping. The computation is based on reasonable assumptions about geometric structure in the calibration environment. The rel...
Cooperative communication is a technique that helps to improve the communication performance in wireless networks. It allows the nodes to rely on their neighbors when transmitting packets providing some diversity gain. Wireless sensor... more
Cooperative communication is a technique that helps to improve the communication performance in wireless networks. It allows the nodes to rely on their neighbors when transmitting packets providing some diversity gain. Wireless sensor networks (WSNs) can benefit from cooperative communication to, which was proven by other researcher in the field. In this paper we consider security issues in WSNs with cooperative communications. We study such issues at each of the main protocol layers: physical layer, data link layer, network layer, services (topology) layer, and application layer. For each layer, we clarify the main task, enumerate the main attacks and threats, specify the primary security approaches and techniques, if any, and discuss possible new attacks and problems that may arise with the use of cooperative communications. Further, we showed for some attacks (e.g. jamming, packet dropping, and wormhole) that using cooperative communication improves the network resiliency and reliability. This paper builds the foundations and clarifies the specifications for a needed security protocol in WSNs with cooperative communications that can enhance its performance and resiliency against cyber-attacks.
Wireless body area network (WBAN) devices are resource-constraint devices, in particular for energy. Therefore, it is essential to select the cipher implementation with minimum en-ergy consumption. Determining optimum cipher... more
Wireless body area network (WBAN) devices are resource-constraint devices, in particular for energy. Therefore, it is essential to select the cipher implementation with minimum en-ergy consumption. Determining optimum cipher implementation is an arduous task due to lack of uniform platform for compari-son and deviations in measuring and reporting the performance metrics. Hence, it is important to model the performance of the cipher design. This article presents a novel energy model for light-weight block cipher hardware implementation based on the design parameters. The model usage is then demonstrated by studying the energy trend versus the number of rounds. It shows that there exists an optimum number of rounds per cycle to minimize energy.
Research Interests:
ABSTRACT Lightweight ciphers (e.g., Katan) are crucial for secure communication for resource-constrained devices. The Katan cipher algorithm was proposed for low-resource devices. This paper examines implementing Katan Cipher on field... more
ABSTRACT Lightweight ciphers (e.g., Katan) are crucial for secure communication for resource-constrained devices. The Katan cipher algorithm was proposed for low-resource devices. This paper examines implementing Katan Cipher on field programmable gate array (FPGA) platform. The paper discusses several implementations, with 80-bits key size and 64-bits block size. The energy and power dissipations are examined to select the optimum design. Models for resources and power are derived with average error of 12% and 17%
ABSTRACT Merging WBAN systems with cloud computing is an effi-cient solution to overcome limitations inherent in WBAN, especially in critical human-related applications such as re-mote health monitoring. In cloud-based WBAN, the nodes are... more
ABSTRACT Merging WBAN systems with cloud computing is an effi-cient solution to overcome limitations inherent in WBAN, especially in critical human-related applications such as re-mote health monitoring. In cloud-based WBAN, the nodes are classified into WBAN sensors that report measurements about the human body and WBAN actuators that receive commands from the medical staff and perform actions. Au-thenticating these commands is a critical security issue as any alteration may lead to serious consequences. This pa-per presents a light-weight public-key authentication pro-tocol for cloud-based WBAN systems. The proposed pro-tocol is based on the modified Rabin authentication algo-rithm which is customized in this paper by making some of its components run in parallel. To prove the efficiency of the modified Rabin we implemented the algorithm with different hardware settings using Tmote Sky motes. The Rabin algorithm with and without the parallel settings is also programmed on FPGA to evaluate its design and per-formance. The results show that secure, direct, instant, and authenticated commands can be delivered from the medical staff located at the cloud side to the WBAN nodes located in/on the human body. Compared to other public-key pro-tocols implemented on the motes, Rabin algorithm achieved extremely faster verification and reasonable signature gen- eration speed. Moreover, the suggested parallel settings of the Rabin signature generation significantly reduced the de-lays(by almost 80%) which is a critical issue in WBAN ap-plications.
Ischemic optic neuropathy (ION), is one of the most well-known disease which could lead to vision loss or blindness. ION impacts the head of the optic nerve (ONH),referred to as anterior (AION), and the other parts of the optic nerve,... more
Ischemic optic neuropathy (ION), is one of the most well-known disease which could lead to vision loss or blindness. ION impacts the head of the optic nerve (ONH),referred to as anterior (AION), and the other parts of the optic nerve, referred to as posterior (PION).This article presents a customized image processing method based on low pass filtration and segmentation of the area around the ONH , which is the region of interest (ROI) to detect ION. The extracted RIOs features for the optic nerve were analyzed and employed by statistical analysis's such as descriptive analysis and test of hypothesis. To test the sensitivity of the proposed imaging method to discriminate images of individuals with ION from healthy ones, 76 fluorescein angiography images were analyzed. The images were classified based on participants status such as: healthy, ION over the age of 45, ION under the age of 45. The proposed method demonstrated a 95% accuracy in discriminating healthy images from those with ION, and consequently would help identify the clinical features of ION.
Steganography has become an important method for concealed communication especially through image files. Recent proposed steganographic methods employ multiple levels of complex techniques. Hence, there is an increasing significance for... more
Steganography has become an important method for concealed communication especially through image files. Recent proposed steganographic methods employ multiple levels of complex techniques. Hence, there is an increasing significance for hardware implementation and its performance metrics. The objective of this article is to analyze and model the performance of FPGA hardware implementations of several spatial steganography methods, including: least significant bit (LSB), random LSB, mix-bit LSB and texture method. This paper presents innovative models to estimate energy-to-embed-secret-bit, peak signal-to-noise-ratio (PSNR) energy cost, power and resources in complex systems. Examining the performance results of the FPGA implementations shows that embedding misalignment degrades the performance, and random embedding increases resources by 43% and power by 13%. Furthermore, the mix-bit method has the best results in terms of balancing the energy consumption and PSNR. Moreover, the acc...
Page 1. A Modified Optical Network for Interactive Video-on-Demand Services Mohammad M. Banat and Thaier S. Hayajneh Department of Electrical Engineering, Jordan University of Science and Technology, Irbid, Jordan E-mails:... more
Page 1. A Modified Optical Network for Interactive Video-on-Demand Services Mohammad M. Banat and Thaier S. Hayajneh Department of Electrical Engineering, Jordan University of Science and Technology, Irbid, Jordan E-mails: banat@iust.edu.io , t-hayajneh@hotmail.com ...
Research Interests:
Distance health monitoring is becoming an attractive option for both the patients and the medical sector staff. However, these systems face many design challenges including the large amount of processed data, users’ mobility, and network... more
Distance health monitoring is becoming an attractive option for both the patients and the medical sector staff. However, these systems face many design challenges including the large amount of processed data, users’ mobility, and network coverage area. Accordingly, integrating cloud computing with Wireless Body Area Networks (WBANs) is amongst the best solutions to promote health monitoring systems. In this paper, we propose a cloud-based real-time remote health monitoring system. Several novel techniques are developed to optimize the performance of the proposed system. First, we utilize the concept of data classification and aggregation to reduce the traffic flow in the cloud. Second, a dynamic channel assignment policy is developed to distribute the users’ WBANs among the available frequency channels to manage interference. Third, to optimize the delay of the delivered data a delay-aware routing metric is proposed to be used in the multi-hop routing. In addition, this metric is fu...
ABSTRACT Distance health monitoring is becoming an attractive option for both the patients and the medical sector staff. However, these systems face many design challenges including the large amount of processed data, users’ mobility, and... more
ABSTRACT Distance health monitoring is becoming an attractive option for both the patients and the medical sector staff. However, these systems face many design challenges including the large amount of processed data, users’ mobility, and network coverage area. Accordingly, integrating cloud computing with Wireless Body Area Networks (WBANs) is amongst the best solutions to promote health monitoring systems. In this paper, we propose a cloud-based real-time remote health monitoring system. Several novel techniques are developed to optimize the performance of the proposed system. First, we utilize the concept of data classification and aggregation to reduce the traffic flow in the cloud. Second, a dynamic channel assignment policy is developed to distribute the users’ WBANs among the available frequency channels to manage interference. Third, to optimize the delay of the delivered data a delay-aware routing metric is proposed to be used in the multi-hop routing. In addition, this metric is further utilized by the association protocols used by the WBANs to connect with the cloud. The simulation results prove the efficiency of the proposed architecture in optimizing the end-to-end delay, managing interference, maximizing the network capacity, and tracking the mobility of the users.
Page 1. Proceeding o/the 6th International Symposium on Mechatronics and its Applications (ISMA09), Sharjah, UAE, Mar 23-26,2009 A Graph-Coloring-Based Navigational Algorithm for Personnel Safety in Nuclear Applications ...
Abstract—The ability to correctly determine their neighbor-hood is a fundamental requirement for nodes in ad hoc and sensor networks. Many applications, protocols, and system functionality rely on neighborhood discovery. Malicious nodes... more
Abstract—The ability to correctly determine their neighbor-hood is a fundamental requirement for nodes in ad hoc and sensor networks. Many applications, protocols, and system functionality rely on neighborhood discovery. Malicious nodes that taint neigh-borhood information ...
Abstract. Wireless Sensor networks have become one of the most widely-used forms of ad-hoc networks which have countless number of applications in the modern life. Due to the unreliable communication medium and the failure-prone sensors,... more
Abstract. Wireless Sensor networks have become one of the most widely-used forms of ad-hoc networks which have countless number of applications in the modern life. Due to the unreliable communication medium and the failure-prone sensors, coverage is an important ...
ABSTRACT Multimedia traffic support over Wireless Local Area Networks (WLANs) witnessed a huge demand recently with market fusion toward personal smart digital devices. Bandwidth utilization, minimum delay and jitter are some of the... more
ABSTRACT Multimedia traffic support over Wireless Local Area Networks (WLANs) witnessed a huge demand recently with market fusion toward personal smart digital devices. Bandwidth utilization, minimum delay and jitter are some of the critical requirements to provide real-time applications with good quality of service (QoS) level. In this paper, we evaluate the performance of the traditional IEEE 802.11 standard in supporting multimedia traffic, in particular audio and video streams. Furthermore, we evaluate the performance of the IEEE 802.11e standard which targets QoS support in WLANs. Extensive simulation scenarios were conducted using ns-2 to evaluate the standards under different traffic loads, parameters values, and different topologies. The exhibited results show the enhancement that IEEE 802.11e offers to applications that require high QoS in terms of network throughput, medium utilization, collision rate, jitter, and packet access delay. However, it is noted that video traffic received delay optimization more than the audio traffic under this standard. For this purpose, we propose a modified scheme of the IEEE 802.11e to optimize the delay and jitter of audio traffic. The simulation results proved the efficiency of the proposed scheme in enhancing the performance of the audio traffic while preserving the good performance of the video traffic gained by the original standard.
ABSTRACT Steganography is one of the most powerful techniques to conceal the existence of hidden secret data inside a cover object. Images are the most popular cover objects for steganography, and thus the importance of image... more
ABSTRACT Steganography is one of the most powerful techniques to conceal the existence of hidden secret data inside a cover object. Images are the most popular cover objects for steganography, and thus the importance of image steganography. Embedding secret information inside images requires intensive computations, and therefore, designing steganography in hardware speeds up steganography. This work presents a hardware design of Least Significant Bit (LSB) steganography technique in a cyclone II FPGA of the Altera family. The design utilizes the Nios embedded processor as well as specialized logic to perform the steganography steps. The design balances the tradeoffs such as imperceptibility, quality and capacity.

And 13 more