Hany Habbak - Academia.edu (original) (raw)

Papers by Hany Habbak

Research paper thumbnail of Efficient One-Class False Data Detector Based on Deep SVDD for Smart Grids

Energies

In the smart grid, malicious consumers can hack their smart meters to report false power consumpt... more In the smart grid, malicious consumers can hack their smart meters to report false power consumption readings to steal electricity. Developing a machine-learning based detector for identifying these readings is a challenge due to the unavailability of malicious datasets. Most of the existing works in the literature assume attacks to compute malicious data. These detectors are trained to identify these attacks, but they cannot identify new attacks, which creates a vulnerability. Very few papers in the literature tried to address this problem by investigating anomaly detectors trained solely on benign data, but they suffer from these limitations: (1) low detection accuracy and high false alarm; (2) the need for knowledge on the malicious data to compute good detection thresholds; and (3) they cannot capture the temporal correlations of the readings and do not address the class overlapping issue caused by some deceptive attacks. To address these limitations, this paper presents a deep ...

Research paper thumbnail of Load Forecasting Techniques and Their Applications in Smart Grids

Energies

The growing success of smart grids (SGs) is driving increased interest in load forecasting (LF) a... more The growing success of smart grids (SGs) is driving increased interest in load forecasting (LF) as accurate predictions of energy demand are crucial for ensuring the reliability, stability, and efficiency of SGs. LF techniques aid SGs in making decisions related to power operation and planning upgrades, and can help provide efficient and reliable power services at fair prices. Advances in artificial intelligence (AI), specifically in machine learning (ML) and deep learning (DL), have also played a significant role in improving the precision of demand forecasting. It is important to evaluate different LF techniques to identify the most accurate and appropriate one for use in SGs. This paper conducts a systematic review of state-of-the-art forecasting techniques, including traditional techniques, clustering-based techniques, AI-based techniques, and time series-based techniques, and provides an analysis of their performance and results. The aim of this paper is to determine which LF t...

Research paper thumbnail of Privacy-Preserving Charging Coordination Scheme for Smart Power Grids Using a Blockchain

Energies

With the rapid emergence of smart grids, charging coordination is considered the intrinsic actor ... more With the rapid emergence of smart grids, charging coordination is considered the intrinsic actor that merges energy storage units (ESUs) into the grid in addition to its substantial role in boosting the resiliency and efficiency of the grid. However, it suffers from several challenges beginning with dependency on the energy service provider (ESP) as a single entity to manage the charging process, which makes the grid susceptible to several types of attacks such as a single point of failure or a denial-of-service attack (DoS). In addition, to schedule charging, the ESUs should submit charging requests including time to complete charging (TCC) and battery state of charge (SoC), which may disclose serious information relevant to the consumers. The analysis of this data could reveal the daily activities of those consumers. In this paper, we propose a privacy-preservation charging coordination scheme using a blockchain. The blockchain achieves decentralization and transparency to defeat ...

Research paper thumbnail of Securing Big Data: A Survey on Security Solutions

2022 13th International Conference on Electrical Engineering (ICEENG)

Research paper thumbnail of Securing Big Data: A Survey on Security Solutions

Research paper thumbnail of A new key management protocol for remote sensing satellite with multi ground stations

2012 International Conference on Engineering and Technology (ICET), 2012

ABSTRACT The key management in remote sensing satellites is the most critical and important part ... more ABSTRACT The key management in remote sensing satellites is the most critical and important part in the security scheme in general and especially in case of multi ground stations. These ground stations may be under official contract to receive the data from the satellite for particular period of time. The problem with the schemes is if any ground station leaks the key information to the other ground station whose official contract is expired the encryption schemes fails. Further if the satellite service provider leaks the key information to the intruder, the symmetric key schemes fails. This paper solves the key management problem of encryption scheme in remote sensing satellite. The solution is a new key management protocol uses both traditional security verification methods and new orbital parameter verification method.

Research paper thumbnail of A new key management protocol for remote sensing satellite with multi ground stations

2012 International Conference on Engineering and Technology (ICET), 2012

ABSTRACT The key management in remote sensing satellites is the most critical and important part ... more ABSTRACT The key management in remote sensing satellites is the most critical and important part in the security scheme in general and especially in case of multi ground stations. These ground stations may be under official contract to receive the data from the satellite for particular period of time. The problem with the schemes is if any ground station leaks the key information to the other ground station whose official contract is expired the encryption schemes fails. Further if the satellite service provider leaks the key information to the intruder, the symmetric key schemes fails. This paper solves the key management problem of encryption scheme in remote sensing satellite. The solution is a new key management protocol uses both traditional security verification methods and new orbital parameter verification method.

Research paper thumbnail of Efficient One-Class False Data Detector Based on Deep SVDD for Smart Grids

Energies

In the smart grid, malicious consumers can hack their smart meters to report false power consumpt... more In the smart grid, malicious consumers can hack their smart meters to report false power consumption readings to steal electricity. Developing a machine-learning based detector for identifying these readings is a challenge due to the unavailability of malicious datasets. Most of the existing works in the literature assume attacks to compute malicious data. These detectors are trained to identify these attacks, but they cannot identify new attacks, which creates a vulnerability. Very few papers in the literature tried to address this problem by investigating anomaly detectors trained solely on benign data, but they suffer from these limitations: (1) low detection accuracy and high false alarm; (2) the need for knowledge on the malicious data to compute good detection thresholds; and (3) they cannot capture the temporal correlations of the readings and do not address the class overlapping issue caused by some deceptive attacks. To address these limitations, this paper presents a deep ...

Research paper thumbnail of Load Forecasting Techniques and Their Applications in Smart Grids

Energies

The growing success of smart grids (SGs) is driving increased interest in load forecasting (LF) a... more The growing success of smart grids (SGs) is driving increased interest in load forecasting (LF) as accurate predictions of energy demand are crucial for ensuring the reliability, stability, and efficiency of SGs. LF techniques aid SGs in making decisions related to power operation and planning upgrades, and can help provide efficient and reliable power services at fair prices. Advances in artificial intelligence (AI), specifically in machine learning (ML) and deep learning (DL), have also played a significant role in improving the precision of demand forecasting. It is important to evaluate different LF techniques to identify the most accurate and appropriate one for use in SGs. This paper conducts a systematic review of state-of-the-art forecasting techniques, including traditional techniques, clustering-based techniques, AI-based techniques, and time series-based techniques, and provides an analysis of their performance and results. The aim of this paper is to determine which LF t...

Research paper thumbnail of Privacy-Preserving Charging Coordination Scheme for Smart Power Grids Using a Blockchain

Energies

With the rapid emergence of smart grids, charging coordination is considered the intrinsic actor ... more With the rapid emergence of smart grids, charging coordination is considered the intrinsic actor that merges energy storage units (ESUs) into the grid in addition to its substantial role in boosting the resiliency and efficiency of the grid. However, it suffers from several challenges beginning with dependency on the energy service provider (ESP) as a single entity to manage the charging process, which makes the grid susceptible to several types of attacks such as a single point of failure or a denial-of-service attack (DoS). In addition, to schedule charging, the ESUs should submit charging requests including time to complete charging (TCC) and battery state of charge (SoC), which may disclose serious information relevant to the consumers. The analysis of this data could reveal the daily activities of those consumers. In this paper, we propose a privacy-preservation charging coordination scheme using a blockchain. The blockchain achieves decentralization and transparency to defeat ...

Research paper thumbnail of Securing Big Data: A Survey on Security Solutions

2022 13th International Conference on Electrical Engineering (ICEENG)

Research paper thumbnail of Securing Big Data: A Survey on Security Solutions

Research paper thumbnail of A new key management protocol for remote sensing satellite with multi ground stations

2012 International Conference on Engineering and Technology (ICET), 2012

ABSTRACT The key management in remote sensing satellites is the most critical and important part ... more ABSTRACT The key management in remote sensing satellites is the most critical and important part in the security scheme in general and especially in case of multi ground stations. These ground stations may be under official contract to receive the data from the satellite for particular period of time. The problem with the schemes is if any ground station leaks the key information to the other ground station whose official contract is expired the encryption schemes fails. Further if the satellite service provider leaks the key information to the intruder, the symmetric key schemes fails. This paper solves the key management problem of encryption scheme in remote sensing satellite. The solution is a new key management protocol uses both traditional security verification methods and new orbital parameter verification method.

Research paper thumbnail of A new key management protocol for remote sensing satellite with multi ground stations

2012 International Conference on Engineering and Technology (ICET), 2012

ABSTRACT The key management in remote sensing satellites is the most critical and important part ... more ABSTRACT The key management in remote sensing satellites is the most critical and important part in the security scheme in general and especially in case of multi ground stations. These ground stations may be under official contract to receive the data from the satellite for particular period of time. The problem with the schemes is if any ground station leaks the key information to the other ground station whose official contract is expired the encryption schemes fails. Further if the satellite service provider leaks the key information to the intruder, the symmetric key schemes fails. This paper solves the key management problem of encryption scheme in remote sensing satellite. The solution is a new key management protocol uses both traditional security verification methods and new orbital parameter verification method.