Ala'a received his B.Sc. in Electrical Engineering from University of Jordan in Amman, Jordan. He received his M.Sc. in Electrical Engineering from Princess Sumaya University for Technology (PSUT) in Amman, Jordan in Collaboration with Ulm University in Ulm, Germany. Wireless communication, especially C2X fits his interest the best.
- Security & Privacy in Wireless Systems
- Vehicular Networks
- Wireless Communication
- Physical Layer-based Security Models
- Propagation Models
- IoT Security & Privacy Aspects
- Cellular Technologies
- Artificial Intelligence
- Machine Learning
- Privacy Enhancing Technologies (PETs) [WiSe15, WiSe16]
- Security and Privacy in Mobile Systems [SoSe16]
Please arrange by Email
Exploiting Propagation Effects for Authentication and Misbehavior Detection in VANETs
Proceedings of the 2016 IEEE Vehicular Networking Conference (VNC)
Abstract: Vehicular Ad-hoc Networks (VANETs) are a critical and potentially vulnerable target for attacks on both message integrity and authenticity. Existing approaches are based on computationally expensive digital signature, which also creates large message sizes due to the attachment of signatures and certificates to messages. This leads to high communication and verification overheads, both in terms of bandwidth and compu- tational effort. In this paper we discuss an alternative approach to ensure message integrity using characteristics of the received signal for authentication and misbehavior detection.
Enhanced Position Verification for VANETs using Subjective Logic
Proceedings of the 2016 IEEE 84th Vehicular Technology Conference: VTC2016-Fall
Abstract: The integrity of messages in vehicular ad-hoc networks has been extensively studied by the research community, resulting in the IEEE~1609.2 standard, which provides typical integrity guarantees. However, the correctness of message contents is still one of the main challenges of applying dependable and secure vehicular ad-hoc networks. One important use case is the validity of position information contained in messages: position verification mechanisms have been proposed in the literature to provide this functionality. A more general approach to validate such information is by applying misbehavior detection mechanisms. In this paper, we consider misbehavior detection by enhancing two position verification mechanisms and fusing their results in a generalized framework using subjective logic. We conduct extensive simulations using VEINS to study the impact of traffic density, as well as several types of attackers and fractions of attackers on our mechanisms. The obtained results show the proposed framework can validate position information as effectively as existing approaches in the literature, without tailoring the framework specifically for this use case.
Physical Layer-Based Message Authentication in VANETs
In Björn Scheuermann, Stefan Dietzel, editor, Fachgespräch Inter-Vehicle Communication 2016 (FG IVC 2016) , page 14-17.
Humboldt-Universität zu Berlin
Abstract: Authenticating legitimate nodes is a major concern of the envisioned vehicular networks. To achieve this, standards and literature propose to use asymmetric cryptographic mechanisms which generate significant overheads in terms of time and power consumption. In this paper, we address this problem and we propose a novel idea of exploiting physical layer characteristics to rely on them for re-authenticating future beacons after verifying the first one cryptographically. Despite the challenges in such high mobility networks, possible concrete approaches to start the evaluation of our scheme are presented. Our approaches are inspired by the vehicular channel related work conclusions which give signs of future success to our scheme in this critical field.
Wireless Channel-Based Message Authentication
Vehicular Networking Conference (VNC), 2015 IEEE , page 277-280.
Abstract: Inter-vehicle communication has attracted a lot of attention in the past. A major concern is the security and especially the integrity and authenticity of messages. Current standards and proposals in literature leverage asymmetric cryptographic mechanisms to achieve this, which is costly both in terms of consumed computational power, bandwidth, and introduced delay. We present a novel idea to use physical characteristics of the wireless channel to verify subsequent messages after initial trust in a first message has been established cryptographically. In this paper, we sketch the concept and provide a first evaluation on its potential for saving named resources.