Hussam Al Hamadi | Khalifa University (original) (raw)

Uploads

Papers by Hussam Al Hamadi

Research paper thumbnail of Assertion-based verification technique for ECG bio-sensor algorithms

2016 IEEE 59th International Midwest Symposium on Circuits and Systems (MWSCAS), 2016

This paper proposes a verification approach for testing the functionality of the algorithms in EC... more This paper proposes a verification approach for testing the functionality of the algorithms in ECG bio-sensor. Algorithms functionality is achieved once the medical target of the algorithm is achieved correctly within an acceptable processing time. The Pan Tompkins algorithm is one of the well-known methods, which is used to detect the QRS wave in ECG signal. The QRS detection and other design goals can be traced through the assertion technique. The proposed approach is based on inserting assertions within the model of ECG bio-sensor design. In addition, this approach depends on pre-defined generated ECG records to assist the assertions on evaluate the Pan Tompkins functionality and analysis stage of the ECG bio-sensor.

Research paper thumbnail of Distributed lightweight Kerberos protocol for Mobile Agent Systems

IEEE GCC Conference & Exhibition, 2011

This paper focuses on an efficient technology for implementing a Mobile Agent System (MAS). The m... more This paper focuses on an efficient technology for implementing a Mobile Agent System (MAS). The mobile agent is able to hold consumers' requests, migrates between platforms and executes its code autonomously. The agent is required to return results to its owner, so he or she can make the right decisions. Kerberos protocol is one of the best known authentication protocols based on symmetric key. Kerberos is a trusted third-party authentication protocol designed to establish network security. In this paper, we propose a new protocol that is based on enhancements modification of Kerberos and is suited to provide confidentiality, integrity, authentication and authorization. A security analysis of the new protocol is also provided.

Research paper thumbnail of Formal modeling and verification of DLK protocol

This paper presents a formal model for the analysis and verification of a multi-agent system base... more This paper presents a formal model for the analysis and verification of a multi-agent system based on the Distributed Lightweight Kerberos (DLK) protocol. Verifying the security protocol exposes security defects and aids in fixing them. The verification process of the DLK protocol uses the ProVerif tool. Based on this tool, the security mechanism of the protocol is clearly exposed. The

Research paper thumbnail of Reliability analysis of healthcare information systems: State of the art and future directions

2015 17th International Conference on E-health Networking, Application & Services (HealthCom), 2015

Research paper thumbnail of An automatic ECG generator for testing and evaluating ECG sensor algorithms

2015 10th International Design & Test Symposium (IDT), 2015

Research paper thumbnail of Verifying Mutual Authentication for the DLK Protocol using ProVerif tool

This paper adopts the Distributed Lightweight Kerberos (DLK) protocol, which is a result of enhan... more This paper adopts the Distributed Lightweight Kerberos (DLK) protocol, which is a result of enhancing the well-known Kerberos protocol. One of the advantages of the DLK protocol is that it addresses mutual authentication and confidentiality challenges while reducing the required number of messages to securely communicate with multiple service providers. In this paper we formally analyze and verify the DLK protocol that has been designed for multi-agent based systems. We use the ProVerif formal model checker in order to model and verify the DLK protocol. Using ProVerif exposed essential security problems in the DLK protocol as non-formal analysis had shown. ProVerif enabled us to detect that mutual authentication is compromised between the DLK participants. We propose a nonce-based authentication technique in order to redesign the protocol and fix this flaw. We then verified the correctness of the proposed protocol using the ProVerif tool.

Research paper thumbnail of Formal validation of QRS wave within ECG

2015 International Conference on Information and Communication Technology Research (ICTRC), 2015

Research paper thumbnail of Extended abstract: Theorem proving verification of privacy in WBSN for healthcare systems

2013 IEEE 20th International Conference on Electronics, Circuits, and Systems (ICECS), 2013

Research paper thumbnail of A verification methodology for a wireless body sensor network functionality

IEEE-EMBS International Conference on Biomedical and Health Informatics (BHI), 2014

Research paper thumbnail of Formalizing electrocardiogram (ECG) signal behavior in event-B

2014 IEEE 16th International Conference on e-Health Networking, Applications and Services (Healthcom), 2014

Research paper thumbnail of A novel security scheme for the smart grid and SCADA networks

Supervisory control and data acquisition (SCADA) are applications that collect data from a system... more Supervisory control and data acquisition (SCADA) are applications that collect data from a system in order to automate the monitoring and controlling of its activities. Several industrial fields such as, electric utilities, water supplies and buildings' facilities have already adopted SCADA systems to increase the efficiency and reduce cost. However, the IT community is concerned about the level of security that any applied SCADA system provides. This paper concentrates on the major security threats encountered in SCADA systems. In addition, it discusses a new proposed methodology in order to increase the system security with minimal impact on efficiency. The proposed scheme provides several security services which are mutual authentication, confidentiality, data integrity and accountability.

Research paper thumbnail of Assertion-based verification technique for ECG bio-sensor algorithms

2016 IEEE 59th International Midwest Symposium on Circuits and Systems (MWSCAS), 2016

This paper proposes a verification approach for testing the functionality of the algorithms in EC... more This paper proposes a verification approach for testing the functionality of the algorithms in ECG bio-sensor. Algorithms functionality is achieved once the medical target of the algorithm is achieved correctly within an acceptable processing time. The Pan Tompkins algorithm is one of the well-known methods, which is used to detect the QRS wave in ECG signal. The QRS detection and other design goals can be traced through the assertion technique. The proposed approach is based on inserting assertions within the model of ECG bio-sensor design. In addition, this approach depends on pre-defined generated ECG records to assist the assertions on evaluate the Pan Tompkins functionality and analysis stage of the ECG bio-sensor.

Research paper thumbnail of Distributed lightweight Kerberos protocol for Mobile Agent Systems

IEEE GCC Conference & Exhibition, 2011

This paper focuses on an efficient technology for implementing a Mobile Agent System (MAS). The m... more This paper focuses on an efficient technology for implementing a Mobile Agent System (MAS). The mobile agent is able to hold consumers' requests, migrates between platforms and executes its code autonomously. The agent is required to return results to its owner, so he or she can make the right decisions. Kerberos protocol is one of the best known authentication protocols based on symmetric key. Kerberos is a trusted third-party authentication protocol designed to establish network security. In this paper, we propose a new protocol that is based on enhancements modification of Kerberos and is suited to provide confidentiality, integrity, authentication and authorization. A security analysis of the new protocol is also provided.

Research paper thumbnail of Formal modeling and verification of DLK protocol

This paper presents a formal model for the analysis and verification of a multi-agent system base... more This paper presents a formal model for the analysis and verification of a multi-agent system based on the Distributed Lightweight Kerberos (DLK) protocol. Verifying the security protocol exposes security defects and aids in fixing them. The verification process of the DLK protocol uses the ProVerif tool. Based on this tool, the security mechanism of the protocol is clearly exposed. The

Research paper thumbnail of Reliability analysis of healthcare information systems: State of the art and future directions

2015 17th International Conference on E-health Networking, Application & Services (HealthCom), 2015

Research paper thumbnail of An automatic ECG generator for testing and evaluating ECG sensor algorithms

2015 10th International Design & Test Symposium (IDT), 2015

Research paper thumbnail of Verifying Mutual Authentication for the DLK Protocol using ProVerif tool

This paper adopts the Distributed Lightweight Kerberos (DLK) protocol, which is a result of enhan... more This paper adopts the Distributed Lightweight Kerberos (DLK) protocol, which is a result of enhancing the well-known Kerberos protocol. One of the advantages of the DLK protocol is that it addresses mutual authentication and confidentiality challenges while reducing the required number of messages to securely communicate with multiple service providers. In this paper we formally analyze and verify the DLK protocol that has been designed for multi-agent based systems. We use the ProVerif formal model checker in order to model and verify the DLK protocol. Using ProVerif exposed essential security problems in the DLK protocol as non-formal analysis had shown. ProVerif enabled us to detect that mutual authentication is compromised between the DLK participants. We propose a nonce-based authentication technique in order to redesign the protocol and fix this flaw. We then verified the correctness of the proposed protocol using the ProVerif tool.

Research paper thumbnail of Formal validation of QRS wave within ECG

2015 International Conference on Information and Communication Technology Research (ICTRC), 2015

Research paper thumbnail of Extended abstract: Theorem proving verification of privacy in WBSN for healthcare systems

2013 IEEE 20th International Conference on Electronics, Circuits, and Systems (ICECS), 2013

Research paper thumbnail of A verification methodology for a wireless body sensor network functionality

IEEE-EMBS International Conference on Biomedical and Health Informatics (BHI), 2014

Research paper thumbnail of Formalizing electrocardiogram (ECG) signal behavior in event-B

2014 IEEE 16th International Conference on e-Health Networking, Applications and Services (Healthcom), 2014

Research paper thumbnail of A novel security scheme for the smart grid and SCADA networks

Supervisory control and data acquisition (SCADA) are applications that collect data from a system... more Supervisory control and data acquisition (SCADA) are applications that collect data from a system in order to automate the monitoring and controlling of its activities. Several industrial fields such as, electric utilities, water supplies and buildings' facilities have already adopted SCADA systems to increase the efficiency and reduce cost. However, the IT community is concerned about the level of security that any applied SCADA system provides. This paper concentrates on the major security threats encountered in SCADA systems. In addition, it discusses a new proposed methodology in order to increase the system security with minimal impact on efficiency. The proposed scheme provides several security services which are mutual authentication, confidentiality, data integrity and accountability.