Hussam Al Hamadi | Khalifa University (original) (raw)
Uploads
Papers by Hussam Al Hamadi
2016 IEEE 59th International Midwest Symposium on Circuits and Systems (MWSCAS), 2016
This paper proposes a verification approach for testing the functionality of the algorithms in EC... more This paper proposes a verification approach for testing the functionality of the algorithms in ECG bio-sensor. Algorithms functionality is achieved once the medical target of the algorithm is achieved correctly within an acceptable processing time. The Pan Tompkins algorithm is one of the well-known methods, which is used to detect the QRS wave in ECG signal. The QRS detection and other design goals can be traced through the assertion technique. The proposed approach is based on inserting assertions within the model of ECG bio-sensor design. In addition, this approach depends on pre-defined generated ECG records to assist the assertions on evaluate the Pan Tompkins functionality and analysis stage of the ECG bio-sensor.
IEEE GCC Conference & Exhibition, 2011
This paper focuses on an efficient technology for implementing a Mobile Agent System (MAS). The m... more This paper focuses on an efficient technology for implementing a Mobile Agent System (MAS). The mobile agent is able to hold consumers' requests, migrates between platforms and executes its code autonomously. The agent is required to return results to its owner, so he or she can make the right decisions. Kerberos protocol is one of the best known authentication protocols based on symmetric key. Kerberos is a trusted third-party authentication protocol designed to establish network security. In this paper, we propose a new protocol that is based on enhancements modification of Kerberos and is suited to provide confidentiality, integrity, authentication and authorization. A security analysis of the new protocol is also provided.
This paper presents a formal model for the analysis and verification of a multi-agent system base... more This paper presents a formal model for the analysis and verification of a multi-agent system based on the Distributed Lightweight Kerberos (DLK) protocol. Verifying the security protocol exposes security defects and aids in fixing them. The verification process of the DLK protocol uses the ProVerif tool. Based on this tool, the security mechanism of the protocol is clearly exposed. The
2015 17th International Conference on E-health Networking, Application & Services (HealthCom), 2015
2015 10th International Design & Test Symposium (IDT), 2015
This paper adopts the Distributed Lightweight Kerberos (DLK) protocol, which is a result of enhan... more This paper adopts the Distributed Lightweight Kerberos (DLK) protocol, which is a result of enhancing the well-known Kerberos protocol. One of the advantages of the DLK protocol is that it addresses mutual authentication and confidentiality challenges while reducing the required number of messages to securely communicate with multiple service providers. In this paper we formally analyze and verify the DLK protocol that has been designed for multi-agent based systems. We use the ProVerif formal model checker in order to model and verify the DLK protocol. Using ProVerif exposed essential security problems in the DLK protocol as non-formal analysis had shown. ProVerif enabled us to detect that mutual authentication is compromised between the DLK participants. We propose a nonce-based authentication technique in order to redesign the protocol and fix this flaw. We then verified the correctness of the proposed protocol using the ProVerif tool.
2015 International Conference on Information and Communication Technology Research (ICTRC), 2015
2013 IEEE 20th International Conference on Electronics, Circuits, and Systems (ICECS), 2013
IEEE-EMBS International Conference on Biomedical and Health Informatics (BHI), 2014
2014 IEEE 16th International Conference on e-Health Networking, Applications and Services (Healthcom), 2014
Supervisory control and data acquisition (SCADA) are applications that collect data from a system... more Supervisory control and data acquisition (SCADA) are applications that collect data from a system in order to automate the monitoring and controlling of its activities. Several industrial fields such as, electric utilities, water supplies and buildings' facilities have already adopted SCADA systems to increase the efficiency and reduce cost. However, the IT community is concerned about the level of security that any applied SCADA system provides. This paper concentrates on the major security threats encountered in SCADA systems. In addition, it discusses a new proposed methodology in order to increase the system security with minimal impact on efficiency. The proposed scheme provides several security services which are mutual authentication, confidentiality, data integrity and accountability.
2016 IEEE 59th International Midwest Symposium on Circuits and Systems (MWSCAS), 2016
This paper proposes a verification approach for testing the functionality of the algorithms in EC... more This paper proposes a verification approach for testing the functionality of the algorithms in ECG bio-sensor. Algorithms functionality is achieved once the medical target of the algorithm is achieved correctly within an acceptable processing time. The Pan Tompkins algorithm is one of the well-known methods, which is used to detect the QRS wave in ECG signal. The QRS detection and other design goals can be traced through the assertion technique. The proposed approach is based on inserting assertions within the model of ECG bio-sensor design. In addition, this approach depends on pre-defined generated ECG records to assist the assertions on evaluate the Pan Tompkins functionality and analysis stage of the ECG bio-sensor.
IEEE GCC Conference & Exhibition, 2011
This paper focuses on an efficient technology for implementing a Mobile Agent System (MAS). The m... more This paper focuses on an efficient technology for implementing a Mobile Agent System (MAS). The mobile agent is able to hold consumers' requests, migrates between platforms and executes its code autonomously. The agent is required to return results to its owner, so he or she can make the right decisions. Kerberos protocol is one of the best known authentication protocols based on symmetric key. Kerberos is a trusted third-party authentication protocol designed to establish network security. In this paper, we propose a new protocol that is based on enhancements modification of Kerberos and is suited to provide confidentiality, integrity, authentication and authorization. A security analysis of the new protocol is also provided.
This paper presents a formal model for the analysis and verification of a multi-agent system base... more This paper presents a formal model for the analysis and verification of a multi-agent system based on the Distributed Lightweight Kerberos (DLK) protocol. Verifying the security protocol exposes security defects and aids in fixing them. The verification process of the DLK protocol uses the ProVerif tool. Based on this tool, the security mechanism of the protocol is clearly exposed. The
2015 17th International Conference on E-health Networking, Application & Services (HealthCom), 2015
2015 10th International Design & Test Symposium (IDT), 2015
This paper adopts the Distributed Lightweight Kerberos (DLK) protocol, which is a result of enhan... more This paper adopts the Distributed Lightweight Kerberos (DLK) protocol, which is a result of enhancing the well-known Kerberos protocol. One of the advantages of the DLK protocol is that it addresses mutual authentication and confidentiality challenges while reducing the required number of messages to securely communicate with multiple service providers. In this paper we formally analyze and verify the DLK protocol that has been designed for multi-agent based systems. We use the ProVerif formal model checker in order to model and verify the DLK protocol. Using ProVerif exposed essential security problems in the DLK protocol as non-formal analysis had shown. ProVerif enabled us to detect that mutual authentication is compromised between the DLK participants. We propose a nonce-based authentication technique in order to redesign the protocol and fix this flaw. We then verified the correctness of the proposed protocol using the ProVerif tool.
2015 International Conference on Information and Communication Technology Research (ICTRC), 2015
2013 IEEE 20th International Conference on Electronics, Circuits, and Systems (ICECS), 2013
IEEE-EMBS International Conference on Biomedical and Health Informatics (BHI), 2014
2014 IEEE 16th International Conference on e-Health Networking, Applications and Services (Healthcom), 2014
Supervisory control and data acquisition (SCADA) are applications that collect data from a system... more Supervisory control and data acquisition (SCADA) are applications that collect data from a system in order to automate the monitoring and controlling of its activities. Several industrial fields such as, electric utilities, water supplies and buildings' facilities have already adopted SCADA systems to increase the efficiency and reduce cost. However, the IT community is concerned about the level of security that any applied SCADA system provides. This paper concentrates on the major security threats encountered in SCADA systems. In addition, it discusses a new proposed methodology in order to increase the system security with minimal impact on efficiency. The proposed scheme provides several security services which are mutual authentication, confidentiality, data integrity and accountability.