Kevin Kornegay - Academia.edu (original) (raw)

Papers by Kevin Kornegay

Research paper thumbnail of We Need a “Building Inspector for IoT” When Smart Homes Are Sold

IEEE security & privacy, 2024

Research paper thumbnail of Assuring Autonomous UAS Traffic Management Systems Using Explainable, Fuzzy Logic, Black Box Monitoring

2021 10th International Conference on Information and Automation for Sustainability (ICIAfS), 2021

Research paper thumbnail of An IoT Device Security Solution for Heterogeneous Networks

Research paper thumbnail of IEEE Solid-State Circuits Society AdCom Editor's Column

Research paper thumbnail of 6H-SiC CMOS digital ICs operating on a 5 V power supply

1997 55th Annual Device Research Conference Digest

Summary form only given. CMOS is a very attractive technology for digital circuits because it off... more Summary form only given. CMOS is a very attractive technology for digital circuits because it offers full rail-to-rail output swings and greater noise margins than NMOS circuits. CMOS also provides active loads for linear circuits. Implementation of CMOS in silicon carbide (SiC) devices is expected to provide reliable circuits for high temperature operation. However, previous implementations of CMOS in SiC resulted in very high PMOS threshold voltages. This requires a high supply voltage, which is not desirable for high temperature operations. In this paper, we present the first CMOS digital IC in 6H-SiC to operate with a single 5 V power supply.

Research paper thumbnail of Design of an Ultra-wideband Low Noise Amplifier in 0.13μm CMOS

2005 IEEE International Symposium on Circuits and Systems

Abstract—A low noise amplifier (LNA) in 0.13µm CMOS for ultra-wideband (UWB) front-ends is presen... more Abstract—A low noise amplifier (LNA) in 0.13µm CMOS for ultra-wideband (UWB) front-ends is presented. The LNA has a peak gain of 11.3 dB and a 3.0 – 10.7 GHz –3 dB bandwidth. Its broadband matching is better than -10 dB for S11 and -15 dB for S22. Its lowest noise ...

Research paper thumbnail of A discrete resizing and concurrent power combining structure for linear CMOS power amplifier

2010 IEEE Radio Frequency Integrated Circuits Symposium, 2010

Page 1. Fig. 1. Diagram of PCT-based PAs (a) conventional structure and (b) proposed structure. A... more Page 1. Fig. 1. Diagram of PCT-based PAs (a) conventional structure and (b) proposed structure. A Discrete Resizing and Concurrent Power Combining Structure for Linear CMOS Power Amplifier Jihwan Kim1, Hyungwook ...

Research paper thumbnail of A 91 GHz receiver front-end in silicon-germanium technology

2008 IEEE Radio Frequency Integrated Circuits Symposium, 2008

Page 1. A 91 GHz Receiver Front-End in Silicon-Germanium Technology Jihwan Kim1, Javier Alvarado ... more Page 1. A 91 GHz Receiver Front-End in Silicon-Germanium Technology Jihwan Kim1, Javier Alvarado Jr.1,2, and Kevin T. Kornegay1 1Georgia Electronic Design Center, Georgia Institute of Technology Atlanta, GA, 30308 USA ...

Research paper thumbnail of Class-AB SiC CMOS power opamp with stable voltage gain over wide temperature range

IEE Proceedings - Circuits, Devices and Systems, 1997

Research paper thumbnail of Comparative Study of S VCOs for Low Vottage High Performance Operation

Six IOGHz MOS VCOs were designed and fabricated in the IBM 6RF 0.25um CMOS process. Their oscilla... more Six IOGHz MOS VCOs were designed and fabricated in the IBM 6RF 0.25um CMOS process. Their oscillation frequency, output amplitude and phase noise performance are measured and compared, and the results confirm that replacing shielded-ground inductors with high-resistvity substrate inductors improves phase noise performance. Capacitive source degeneration has also been identified as a performance limiting mechanism in MOS based VCOs rather than performance enhancing as in BJT based VCOs.

Research paper thumbnail of Template Attack Against AES in Counter Mode With Unknown Initial Counter

2023 IEEE 13th Annual Computing and Communication Workshop and Conference (CCWC)

Research paper thumbnail of Precoding and Beamforming Techniques in mmWave-Massive MIMO: Performance Assessment

IEEE Access

Massive MIMO and mmWave communication are the technologies for achieving 5G design goals. Fortuna... more Massive MIMO and mmWave communication are the technologies for achieving 5G design goals. Fortunately, these two technologies share a symbiotic integration. As a result, amalgamating mmWave communications with massive MIMO forms,mmWave-massive MIMO,'' which significantly improves spectral and energy efficiency. It also achieves high multiplexing gains and increases mobile network capacity. However, massive MIMO, mmWave communications, and mmWave-massive MIMO systems have been studied independently. Consequently, this article explores the ideas, performances, comparisons, and discussions of these three 5G technologies jointly, considering their precoding and beamforming methods. On the other hand, the complexity of these technologies increases when a large number of antennas and radio frequencies (RFs) are used. Thus, several investigations are going on to search for the appropriate precoding and beamforming strategies with low cost, power, and complexity. Therefore, massive MIMO linear precoding techniques such as zero-forcing, maximum ratio transmission, regularized zero-forcing, truncated polynomial expansion and phased zero forcing are addressed in this work. In addition, the most common non-linear precoding schemes: dirty-paper coding, Tomlinson-Harashima, and vector perturbation, are presented. Furthermore, a detailed discussion of the beamforming techniques called analog, digital, and hybrid analog-digital beamforming schemes is included. We also examine the potential of hybrid analog-digital beamforming with its fully-connected and sub-connected architecture approaches in making mmWave massive MIMO a reality. We evaluate their performance with the parameters: bit error rate, signal to noise ratio, complexity, spectral efficiency, and energy efficiency. According to the analytical and simulation results, the partially-connected hybrid analog/digital beamforming architecture offers better all-over performance for mmWave-Massive MIMO communications by compromising: power consumption, cost, complexity, and performance. Finally, the potential future directions in mmWave-massive MIMO precoding and beamforming challenges are addressed.

Research paper thumbnail of Hardware Efficient Massive MIMO Systems with Optimal Antenna Selection

Sensors, 2022

An increase in the number of transmit antennas (M) poses an equivalent rise in the number of Radi... more An increase in the number of transmit antennas (M) poses an equivalent rise in the number of Radio Frequency (RF) chains associated with each antenna element, particularly in digital beamforming. The chain exhibits a substantial amount of power consumption accordingly. Hence, to alleviate such problems, one of the potential solutions is to reduce the number of RFs or to minimize their power consumption. In this paper, low-resolution Digital to Analogue Conversion (DAC) and transmit antenna selection at the downlink are evaluated to favour reducing the total power consumption and achieving energy efficiency in mMIMO with reasonable complexity. Antenna selection and low-resolution DAC techniques are proposed to leverage massive MIMO systems in free space and Close In (CI) path-loss models. The simulation results show that the power consumption decreases with antenna selection and low-resolution DAC. Then, the system achieves more energy efficiency than without low-resolution of DAC an...

Research paper thumbnail of Energy Efficiency Analysis of RLS-MUSIC based Smart Antenna System for 5G Network

2021 55th Annual Conference on Information Sciences and Systems (CISS), 2021

This paper proposes a novel energy efficient beamforming and DOA estimation scheme called RLS-MUS... more This paper proposes a novel energy efficient beamforming and DOA estimation scheme called RLS-MUSIC algorithm. First, we study different adaptive beamforming algorithms and receive signal Degree-of-Arrival (DOA) estimation techniques for wireless communication network application in reference to their effect on energy efficiency. Taking linear array smart antenna elements geometry, which is mostly used antenna array geometry, Recursive Least Square (RLS) adaptive beam-forming algorithm and Multiple Signal Classification (MUSIC) DOA estimation technique are identified as the reference input methods to model the new energy efficient scheme. Using an energy model, which is as a function of beam-width, signal transmission strength (range), and signal-to-noise-interference ratio (SNIR), we evaluate the total amount of energy spent during beam-formation. Finally, the energy gain due to RLS-MUSIC scheme is compared with that of RLS alone. The results show that the RLS-MUSIC scheme based access-points/base-station antenna systems consume less energy during beam formation and they generate beams with narrower beam-width, lower side lobe level and better deep null.

Research paper thumbnail of Secrecy Capacity and Energy Efficiency Evaluation of RLS-Kaiser Based Smart Antenna System

2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech), 2017

In this paper, physical layer security-secrecy capacity– is investigated with respect to energy e... more In this paper, physical layer security-secrecy capacity– is investigated with respect to energy efficient antenna beam forming mechanism. Energy consumption per RLS beam formation algorithm is studied and compared against the combination of RLS-Kaiser windowing function using a new energy model in the smart antenna system. The investigation is carried out on linear array geometry with element spacing of 0.5λ. The result shows that; RLS-Kaiser combination consumes less energy per beam formation than the RLS algorithm. In addition to that, we have shown the amount of energy saved by using RLS-Kaiser combination. Finally, we have shown the advantage of using RLS-Kaiser combination during beam formation. This combination helps in achieving both spectral efficiency and energy efficiency at the same time by avoiding interference because of side lobe and saving the energy that would be wasted at a side lobe respectively. On the other hand, physical layer security can be achieved by saving ...

Research paper thumbnail of Monitoring and Detection Time Optimization of Man in the Middle Attacks using Machine Learning

2020 IEEE Applied Imagery Pattern Recognition Workshop (AIPR), 2020

The Internet of Things (IoT) is growing with the advancement of technology. Many vendors are crea... more The Internet of Things (IoT) is growing with the advancement of technology. Many vendors are creating IoT devices to leverage the quality of life of consumers. These devices include smart grids, smart homes, smart health care systems, smart transportation, and many other applications. IoT devices interact with the environment and each other using sensors and actuators. However, the widespread proliferation of IoT devices poses many cybersecurity threats. The IoT devices’ interconnection opens the door to attackers who try to gain unauthorized access to these devices. For many IT networks, establishing trust and security during the device operation is challenging. Further, devices also may leak vital information, which is a significant concern in cybersecurity. Prior research has shown that security breaches have increased by 67% over the past five years, and 95% of HTTPs servers are vulnerable to Man-in-the-middle (MIM) attacks. This paper examines attack datasets from the Hacking and Countermeasure Research Lab (HCRL) collected from real-life IoT devices that include smart cameras, laptops, and smartphones [1]. We present a model using Random Forest, Logistic Regression, and Decision Tree. Results indicate that the overall detection accuracy is 98-100%, which is more promising than traditional Intrusion Detection Systems (IDS).

Research paper thumbnail of Exploring The Security Issues in Home-Based IoT Devices Through Denial of Service Attacks

2021 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/IOP/SCI), 2021

Internet of Things (IoT) has infiltrated the digital realm, and critical efforts are being made t... more Internet of Things (IoT) has infiltrated the digital realm, and critical efforts are being made to create robust security for these technologies. However, with increasingly sophisticated attacks, it is essential to understand IoT device security in depth. We orchestrated Denial of Service (DoS) attacks for four different IoT devices through network flooding to understand the device vulnerabilities from the network level. We conducted our experiment in the lab environment using other IoT devices, including the Amazon Echo, a smart light-bulb, a smart camera, and a smart garage door opener. We used Raspberry Pi as the main target to access other network devices with different protocols to conduct the DoS attack. We generated the DoS attack using Kali Linux installed in a virtual environment. This experiment demonstrated that hackers might exploit sensor vulnerabilities to gain unauthorized network access and use user data through various IoT devices. We proposed an effective Intrusion Detection technique using a combination of machine learning classifiers and deep learning. The machine learning models include logistic regression, decision tree, random forest, and support vector machine to detect and mitigate the attack. The outcomes show the algorithm which presents the highest degree of attack detection accuracy. Our findings also show that DoS attacks continue to be a significant concern even with improved technologies and security protocols. Finally, we provide design implications to address such critical security flaws.

Research paper thumbnail of A Comparative Analyses of Current IoT Middleware Platforms

2021 8th International Conference on Future Internet of Things and Cloud (FiCloud), 2021

Technology is evolving exponentially, and researchers are seeking solutions to answer questions r... more Technology is evolving exponentially, and researchers are seeking solutions to answer questions related to the benefits of using advanced IoT cloud computing platforms. There is a tremendous amount of research activity regarding cyberattacks on Internet of Things (IoT) devices. IoT ecosystems consist of physical objects or devices that interact with the environment, extract data, and communicate with a higher authority such as a cloud. Many IoT users are unaware of the underlying platforms that facilitate data collection. These platforms are also known as middleware, sit between the connectivity and application layers. There are more than 1000 IoT platforms on the market today, where many are open-source or commercial and provide services that include a device, data, and connection management. This paper presents a comparative analysis of some commercial and open-source IoT platforms such as Arm Pelion, Microsoft Azure cloud, ThingWorx, FIWARE, and ThingSpeak. We compare system architecture, management schemes, protocols, interoperability, and security. We used experimentation with real-world Internet of Things devices for the comparative study. We proposed a novel design architecture of a fully secure testbed that integrates critical components of an IoT platform. Hopefully, this study will motivate manufacturers to provide a better quality of service to help customers select the best IoT platform for their needs.

Research paper thumbnail of Energy Efficient Smart Antenna Beamforming Algorithms for Next-Generation Networks

2021 IEEE 11th Annual Computing and Communication Workshop and Conference (CCWC), 2021

Smart antenna consist of multiple antenna elements at the transmitting and/or receiving side of t... more Smart antenna consist of multiple antenna elements at the transmitting and/or receiving side of the communication link, whose signals are processed adaptively in order to exploit the spatial dimension of the wireless channel. Depending on the signal process at the transmitter, receiver, or both ends of the communication link, the smart antenna technique can increase the capacity of the wireless network by improving link quality using impairments mitigation mechanisms. This work investigates different smart antenna beamforming algorithms considering energy efficiency using adaptive antenna techniques with a uniform linear array geometry. The schemes used for investigation are half power beam width, side lobe level, array spacing and variable node distance (range). The results demonstrate that Constant module (CMA) algorithm makes antenna arrays more energy efficient while it has high mean square error. On the other hand, Recursive Least Square (RLS) is recommended for next-generation wireless networks because it provides significant energy efficiency while keeping mean square error minimum than the rest of the algorithms.

Research paper thumbnail of Design and analysis of an improved clocking methodology for next-generation physically aware synchronous architectures

The continued lithographic scaling of silicon devices together with the exponential increases in ... more The continued lithographic scaling of silicon devices together with the exponential increases in clock speed and integration density have produced phenomenal gains for the industry, but have led to emerging problems with clock skew, power consumption, and inductive power supply noise. In an attempt to create systems better able to adapt to these conditions while ensuring a robust range of design choices, two different implementation methodologies were developed. The first of these is the Improved Latency Globally Asynchronous Locally Synchronous (IL-GALS) methodology, which aims to improve the performance of typical GALS implementations by removing the need for either pauseable clocks or non-zero pipeline slack by paralleling the detection of a failure condition with the actual computation. This changes the problem of synchronization from one with some minimum forward latency for resolution to one where the latency penalty instead comes as a pipeline stall, much as is the case with ...

Research paper thumbnail of We Need a “Building Inspector for IoT” When Smart Homes Are Sold

IEEE security & privacy, 2024

Research paper thumbnail of Assuring Autonomous UAS Traffic Management Systems Using Explainable, Fuzzy Logic, Black Box Monitoring

2021 10th International Conference on Information and Automation for Sustainability (ICIAfS), 2021

Research paper thumbnail of An IoT Device Security Solution for Heterogeneous Networks

Research paper thumbnail of IEEE Solid-State Circuits Society AdCom Editor's Column

Research paper thumbnail of 6H-SiC CMOS digital ICs operating on a 5 V power supply

1997 55th Annual Device Research Conference Digest

Summary form only given. CMOS is a very attractive technology for digital circuits because it off... more Summary form only given. CMOS is a very attractive technology for digital circuits because it offers full rail-to-rail output swings and greater noise margins than NMOS circuits. CMOS also provides active loads for linear circuits. Implementation of CMOS in silicon carbide (SiC) devices is expected to provide reliable circuits for high temperature operation. However, previous implementations of CMOS in SiC resulted in very high PMOS threshold voltages. This requires a high supply voltage, which is not desirable for high temperature operations. In this paper, we present the first CMOS digital IC in 6H-SiC to operate with a single 5 V power supply.

Research paper thumbnail of Design of an Ultra-wideband Low Noise Amplifier in 0.13μm CMOS

2005 IEEE International Symposium on Circuits and Systems

Abstract—A low noise amplifier (LNA) in 0.13µm CMOS for ultra-wideband (UWB) front-ends is presen... more Abstract—A low noise amplifier (LNA) in 0.13µm CMOS for ultra-wideband (UWB) front-ends is presented. The LNA has a peak gain of 11.3 dB and a 3.0 – 10.7 GHz –3 dB bandwidth. Its broadband matching is better than -10 dB for S11 and -15 dB for S22. Its lowest noise ...

Research paper thumbnail of A discrete resizing and concurrent power combining structure for linear CMOS power amplifier

2010 IEEE Radio Frequency Integrated Circuits Symposium, 2010

Page 1. Fig. 1. Diagram of PCT-based PAs (a) conventional structure and (b) proposed structure. A... more Page 1. Fig. 1. Diagram of PCT-based PAs (a) conventional structure and (b) proposed structure. A Discrete Resizing and Concurrent Power Combining Structure for Linear CMOS Power Amplifier Jihwan Kim1, Hyungwook ...

Research paper thumbnail of A 91 GHz receiver front-end in silicon-germanium technology

2008 IEEE Radio Frequency Integrated Circuits Symposium, 2008

Page 1. A 91 GHz Receiver Front-End in Silicon-Germanium Technology Jihwan Kim1, Javier Alvarado ... more Page 1. A 91 GHz Receiver Front-End in Silicon-Germanium Technology Jihwan Kim1, Javier Alvarado Jr.1,2, and Kevin T. Kornegay1 1Georgia Electronic Design Center, Georgia Institute of Technology Atlanta, GA, 30308 USA ...

Research paper thumbnail of Class-AB SiC CMOS power opamp with stable voltage gain over wide temperature range

IEE Proceedings - Circuits, Devices and Systems, 1997

Research paper thumbnail of Comparative Study of S VCOs for Low Vottage High Performance Operation

Six IOGHz MOS VCOs were designed and fabricated in the IBM 6RF 0.25um CMOS process. Their oscilla... more Six IOGHz MOS VCOs were designed and fabricated in the IBM 6RF 0.25um CMOS process. Their oscillation frequency, output amplitude and phase noise performance are measured and compared, and the results confirm that replacing shielded-ground inductors with high-resistvity substrate inductors improves phase noise performance. Capacitive source degeneration has also been identified as a performance limiting mechanism in MOS based VCOs rather than performance enhancing as in BJT based VCOs.

Research paper thumbnail of Template Attack Against AES in Counter Mode With Unknown Initial Counter

2023 IEEE 13th Annual Computing and Communication Workshop and Conference (CCWC)

Research paper thumbnail of Precoding and Beamforming Techniques in mmWave-Massive MIMO: Performance Assessment

IEEE Access

Massive MIMO and mmWave communication are the technologies for achieving 5G design goals. Fortuna... more Massive MIMO and mmWave communication are the technologies for achieving 5G design goals. Fortunately, these two technologies share a symbiotic integration. As a result, amalgamating mmWave communications with massive MIMO forms,mmWave-massive MIMO,'' which significantly improves spectral and energy efficiency. It also achieves high multiplexing gains and increases mobile network capacity. However, massive MIMO, mmWave communications, and mmWave-massive MIMO systems have been studied independently. Consequently, this article explores the ideas, performances, comparisons, and discussions of these three 5G technologies jointly, considering their precoding and beamforming methods. On the other hand, the complexity of these technologies increases when a large number of antennas and radio frequencies (RFs) are used. Thus, several investigations are going on to search for the appropriate precoding and beamforming strategies with low cost, power, and complexity. Therefore, massive MIMO linear precoding techniques such as zero-forcing, maximum ratio transmission, regularized zero-forcing, truncated polynomial expansion and phased zero forcing are addressed in this work. In addition, the most common non-linear precoding schemes: dirty-paper coding, Tomlinson-Harashima, and vector perturbation, are presented. Furthermore, a detailed discussion of the beamforming techniques called analog, digital, and hybrid analog-digital beamforming schemes is included. We also examine the potential of hybrid analog-digital beamforming with its fully-connected and sub-connected architecture approaches in making mmWave massive MIMO a reality. We evaluate their performance with the parameters: bit error rate, signal to noise ratio, complexity, spectral efficiency, and energy efficiency. According to the analytical and simulation results, the partially-connected hybrid analog/digital beamforming architecture offers better all-over performance for mmWave-Massive MIMO communications by compromising: power consumption, cost, complexity, and performance. Finally, the potential future directions in mmWave-massive MIMO precoding and beamforming challenges are addressed.

Research paper thumbnail of Hardware Efficient Massive MIMO Systems with Optimal Antenna Selection

Sensors, 2022

An increase in the number of transmit antennas (M) poses an equivalent rise in the number of Radi... more An increase in the number of transmit antennas (M) poses an equivalent rise in the number of Radio Frequency (RF) chains associated with each antenna element, particularly in digital beamforming. The chain exhibits a substantial amount of power consumption accordingly. Hence, to alleviate such problems, one of the potential solutions is to reduce the number of RFs or to minimize their power consumption. In this paper, low-resolution Digital to Analogue Conversion (DAC) and transmit antenna selection at the downlink are evaluated to favour reducing the total power consumption and achieving energy efficiency in mMIMO with reasonable complexity. Antenna selection and low-resolution DAC techniques are proposed to leverage massive MIMO systems in free space and Close In (CI) path-loss models. The simulation results show that the power consumption decreases with antenna selection and low-resolution DAC. Then, the system achieves more energy efficiency than without low-resolution of DAC an...

Research paper thumbnail of Energy Efficiency Analysis of RLS-MUSIC based Smart Antenna System for 5G Network

2021 55th Annual Conference on Information Sciences and Systems (CISS), 2021

This paper proposes a novel energy efficient beamforming and DOA estimation scheme called RLS-MUS... more This paper proposes a novel energy efficient beamforming and DOA estimation scheme called RLS-MUSIC algorithm. First, we study different adaptive beamforming algorithms and receive signal Degree-of-Arrival (DOA) estimation techniques for wireless communication network application in reference to their effect on energy efficiency. Taking linear array smart antenna elements geometry, which is mostly used antenna array geometry, Recursive Least Square (RLS) adaptive beam-forming algorithm and Multiple Signal Classification (MUSIC) DOA estimation technique are identified as the reference input methods to model the new energy efficient scheme. Using an energy model, which is as a function of beam-width, signal transmission strength (range), and signal-to-noise-interference ratio (SNIR), we evaluate the total amount of energy spent during beam-formation. Finally, the energy gain due to RLS-MUSIC scheme is compared with that of RLS alone. The results show that the RLS-MUSIC scheme based access-points/base-station antenna systems consume less energy during beam formation and they generate beams with narrower beam-width, lower side lobe level and better deep null.

Research paper thumbnail of Secrecy Capacity and Energy Efficiency Evaluation of RLS-Kaiser Based Smart Antenna System

2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech), 2017

In this paper, physical layer security-secrecy capacity– is investigated with respect to energy e... more In this paper, physical layer security-secrecy capacity– is investigated with respect to energy efficient antenna beam forming mechanism. Energy consumption per RLS beam formation algorithm is studied and compared against the combination of RLS-Kaiser windowing function using a new energy model in the smart antenna system. The investigation is carried out on linear array geometry with element spacing of 0.5λ. The result shows that; RLS-Kaiser combination consumes less energy per beam formation than the RLS algorithm. In addition to that, we have shown the amount of energy saved by using RLS-Kaiser combination. Finally, we have shown the advantage of using RLS-Kaiser combination during beam formation. This combination helps in achieving both spectral efficiency and energy efficiency at the same time by avoiding interference because of side lobe and saving the energy that would be wasted at a side lobe respectively. On the other hand, physical layer security can be achieved by saving ...

Research paper thumbnail of Monitoring and Detection Time Optimization of Man in the Middle Attacks using Machine Learning

2020 IEEE Applied Imagery Pattern Recognition Workshop (AIPR), 2020

The Internet of Things (IoT) is growing with the advancement of technology. Many vendors are crea... more The Internet of Things (IoT) is growing with the advancement of technology. Many vendors are creating IoT devices to leverage the quality of life of consumers. These devices include smart grids, smart homes, smart health care systems, smart transportation, and many other applications. IoT devices interact with the environment and each other using sensors and actuators. However, the widespread proliferation of IoT devices poses many cybersecurity threats. The IoT devices’ interconnection opens the door to attackers who try to gain unauthorized access to these devices. For many IT networks, establishing trust and security during the device operation is challenging. Further, devices also may leak vital information, which is a significant concern in cybersecurity. Prior research has shown that security breaches have increased by 67% over the past five years, and 95% of HTTPs servers are vulnerable to Man-in-the-middle (MIM) attacks. This paper examines attack datasets from the Hacking and Countermeasure Research Lab (HCRL) collected from real-life IoT devices that include smart cameras, laptops, and smartphones [1]. We present a model using Random Forest, Logistic Regression, and Decision Tree. Results indicate that the overall detection accuracy is 98-100%, which is more promising than traditional Intrusion Detection Systems (IDS).

Research paper thumbnail of Exploring The Security Issues in Home-Based IoT Devices Through Denial of Service Attacks

2021 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/IOP/SCI), 2021

Internet of Things (IoT) has infiltrated the digital realm, and critical efforts are being made t... more Internet of Things (IoT) has infiltrated the digital realm, and critical efforts are being made to create robust security for these technologies. However, with increasingly sophisticated attacks, it is essential to understand IoT device security in depth. We orchestrated Denial of Service (DoS) attacks for four different IoT devices through network flooding to understand the device vulnerabilities from the network level. We conducted our experiment in the lab environment using other IoT devices, including the Amazon Echo, a smart light-bulb, a smart camera, and a smart garage door opener. We used Raspberry Pi as the main target to access other network devices with different protocols to conduct the DoS attack. We generated the DoS attack using Kali Linux installed in a virtual environment. This experiment demonstrated that hackers might exploit sensor vulnerabilities to gain unauthorized network access and use user data through various IoT devices. We proposed an effective Intrusion Detection technique using a combination of machine learning classifiers and deep learning. The machine learning models include logistic regression, decision tree, random forest, and support vector machine to detect and mitigate the attack. The outcomes show the algorithm which presents the highest degree of attack detection accuracy. Our findings also show that DoS attacks continue to be a significant concern even with improved technologies and security protocols. Finally, we provide design implications to address such critical security flaws.

Research paper thumbnail of A Comparative Analyses of Current IoT Middleware Platforms

2021 8th International Conference on Future Internet of Things and Cloud (FiCloud), 2021

Technology is evolving exponentially, and researchers are seeking solutions to answer questions r... more Technology is evolving exponentially, and researchers are seeking solutions to answer questions related to the benefits of using advanced IoT cloud computing platforms. There is a tremendous amount of research activity regarding cyberattacks on Internet of Things (IoT) devices. IoT ecosystems consist of physical objects or devices that interact with the environment, extract data, and communicate with a higher authority such as a cloud. Many IoT users are unaware of the underlying platforms that facilitate data collection. These platforms are also known as middleware, sit between the connectivity and application layers. There are more than 1000 IoT platforms on the market today, where many are open-source or commercial and provide services that include a device, data, and connection management. This paper presents a comparative analysis of some commercial and open-source IoT platforms such as Arm Pelion, Microsoft Azure cloud, ThingWorx, FIWARE, and ThingSpeak. We compare system architecture, management schemes, protocols, interoperability, and security. We used experimentation with real-world Internet of Things devices for the comparative study. We proposed a novel design architecture of a fully secure testbed that integrates critical components of an IoT platform. Hopefully, this study will motivate manufacturers to provide a better quality of service to help customers select the best IoT platform for their needs.

Research paper thumbnail of Energy Efficient Smart Antenna Beamforming Algorithms for Next-Generation Networks

2021 IEEE 11th Annual Computing and Communication Workshop and Conference (CCWC), 2021

Smart antenna consist of multiple antenna elements at the transmitting and/or receiving side of t... more Smart antenna consist of multiple antenna elements at the transmitting and/or receiving side of the communication link, whose signals are processed adaptively in order to exploit the spatial dimension of the wireless channel. Depending on the signal process at the transmitter, receiver, or both ends of the communication link, the smart antenna technique can increase the capacity of the wireless network by improving link quality using impairments mitigation mechanisms. This work investigates different smart antenna beamforming algorithms considering energy efficiency using adaptive antenna techniques with a uniform linear array geometry. The schemes used for investigation are half power beam width, side lobe level, array spacing and variable node distance (range). The results demonstrate that Constant module (CMA) algorithm makes antenna arrays more energy efficient while it has high mean square error. On the other hand, Recursive Least Square (RLS) is recommended for next-generation wireless networks because it provides significant energy efficiency while keeping mean square error minimum than the rest of the algorithms.

Research paper thumbnail of Design and analysis of an improved clocking methodology for next-generation physically aware synchronous architectures

The continued lithographic scaling of silicon devices together with the exponential increases in ... more The continued lithographic scaling of silicon devices together with the exponential increases in clock speed and integration density have produced phenomenal gains for the industry, but have led to emerging problems with clock skew, power consumption, and inductive power supply noise. In an attempt to create systems better able to adapt to these conditions while ensuring a robust range of design choices, two different implementation methodologies were developed. The first of these is the Improved Latency Globally Asynchronous Locally Synchronous (IL-GALS) methodology, which aims to improve the performance of typical GALS implementations by removing the need for either pauseable clocks or non-zero pipeline slack by paralleling the detection of a failure condition with the actual computation. This changes the problem of synchronization from one with some minimum forward latency for resolution to one where the latency penalty instead comes as a pipeline stall, much as is the case with ...