Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Fathi Amsaad is active.

Publication


Featured researches published by Fathi Amsaad.


long island systems, applications and technology conference | 2016

P-LEACH: Energy efficient routing protocol for Wireless Sensor Networks

Abdul Razaque; Musbah Abdulgader; Chaitrali Joshi; Fathi Amsaad; Mrunal Chauhan

Wireless Sensor Network (WSN) are of paramount significance since they are responsible for maintaining the routes in the network, data forwarding, and ensuring reliable multi-hop communication. The main requirement of a wireless sensor network is to prolong network energy efficiency and lifetime. Researchers have developed protocols Low Energy Adaptive Clustering Hierarchy (LEACH) and Power-Efficient Gathering in Sensor Information Systems (PEGASIS) for reducing energy consumption in the network. However, the existing routing protocols experience many shortcomings with respect to energy and power consumption. LEACH features the dynamicity but has limitations due to its cluster-based architecture, while PEGASIS overcomes the limitations of LEACH but lacks dynamicity. In this paper, we introduce PEGASIS-LEACH (P-LEACH), a near optimal cluster-based chain protocol that is an improvement over PEGASIS and LEACH both. This protocol uses an energy-efficient routing algorithm to transfer the data in WSN. To validate the energy effectiveness of P-LEACH, we simulate the performance using Network Simulator (NS2) and MATLAB.


long island systems, applications and technology conference | 2016

H-LEACH: Hybrid-low energy adaptive clustering hierarchy for wireless sensor networks

Abdul Razaque; Satwic Mudigulam; Kiran Gavini; Fathi Amsaad; Musbah Abdulgader; Gondal Sai Krishna

Wireless sensor networks are one of the fast growing technologies in communication field, because of their compact size and ability to work in rugged conditions where human reach is not possible. This paper discusses about H-LEACH, which is used to solve problems of energy considerations while electing a channel head. H-LEACH considers residual and maximum energy of nodes for every round while electing a channel head using threshold condition. H-LEACH is compared with LEACH and HEED protocol, and proved that it is efficient than both methods. Simulations for LEACH, HEED and H-LEACH are done using MATLAB.


international midwest symposium on circuits and systems | 2015

Analyzing the performance of a configurable ROPUF design controlled by programmable XOR gates

Fathi Amsaad; Tamzidul Hoque; Mohammed Niamat

Physical unclonable functions (PUFs), are physical entities that are embodied in a silicon chips and can be easily evaluated but they are difficult to predict. Ring Oscillators (ROPUFs) are appropriate security techniques for FPGA-based systems. This paper presents a Configurable design of ROPUF controlled with programmable XOR (PXORs) gates for area efficiency and stronger secret key production. PXORs gates are integrated in our design in order to control the frequencies of the Ring Oscillators. The proposed design is mapped on the entire area of five Xilinx Spartan-3E FPGAs, and takes advantage of the dedicated logic in the Configurable Logic Blocks (CLBs) to create multiple ROs. The Experimental results show that the design presented exhibits high performance in terms of average RO frequencies, average RO standard deviation, and a static variation ratio which is considerably higher than the dynamic variation. In addition, an efficient algorithm to reduce systematic variations and improve ROPUF uniqueness is presented.


national aerospace and electronics conference | 2016

Impact of temporal variations on the performance and reliability of configurable ring oscillator PUF

Chayanika Roy Chaudhuri; Fathi Amsaad; Mohammed Niamat

Physical Unclonable Functions (PUF) offer promising solution to security problems. A PUF is a die-specific random probabilistic function that is unique for every instance of the die. PUFs derive their randomness from the uncontrolled random manufacturing process variations in the IC. Apart from spatial variation or process variation, ICs are affected by temporal variation. In this work, we study the effects of aging, temperature, and voltage variation on configurable Ring Oscillator (RO) PUF. It is observed that the uniqueness of the ROPUF is not affected to a great extent, where the inter-chip HD is found to be 45.9% which is closer to the ideal value of 50%. The intra-chip HD of PUF degrades with aging with a value ranging between 2.34%–4.21%, so the reproducibility is 96.7%. Also, the ROs are found to be sensitive to temperature and voltage variations. Bit flips occur due to temperature and voltage variations but only when the frequency difference in the RO comparison pair is 1.5 MHz for temperature variation and 1 MHz for voltage variation.


long island systems, applications and technology conference | 2016

Pebble Watch security assessment

Abdul Razaque; Fathi Amsaad; Raveendra Kumar; Musbah Abdulgader; Sai Kiran Jagadabi; Srikhar Sheela

Security for Pebble Watch is necessary. The lack of security and efficient connection leads to major attacks. In this paper, we introduce a two way authentication process to improve the pebble watch security. This two way authentication uses a secured Bluetooth pairing. The main aim of this paper is to find the major factors which are attacking pebble and to find a way in solving these issues. There might be a chance of obtaining hardware issues in this pebble, so to find the possibilities to avoid these issues we introduced a simple algorithm for the two way authentication (TWA) process and introduced to the pebble. Malicious apps that connect to the Pebble Watch is the major problem. The flaws in the Pebble must be thoroughly investigated to make it much safer than the older one preventing these apps connecting to pebble watch. In order we used java tool to implement this project. This paper will help in building a more secured pebble watch.


electro information technology | 2016

Multi-biometric system using Fuzzy Vault

Abdul Razaque; Prudhvi Sagar Sreeramoju; Fathi Amsaad; Chaitanya Kumar Nerella; Musbah Abdulgader; Harsha Saranu

Advancement of electronic media not only improved our living standard, but created several amenities that makes work bit easier. On the other hand, media faces several challenges. Biometric systems are promising technology with accurate data and secure features. However, many existing Biometric systems based on a single authentication process have higher vulnerability than a Multi-biometric systems. Multi-biometric systems accumulate evidence from more than one biometric trait in order to recognize a person. They provide higher recognition accuracy and larger population coverage. Multi-biometric systems store multiple biometric templates for each user, which results in increased risk to user privacy and system security. To secure the individual biometric template by using the fusion method to store the data. The fuzzy vault is proposed. By the end of this paper we would like to propose an idea to further improve the data security and also make this process take the less time.


Archive | 2018

A Dynamic Area-Efficient Technique to Enhance ROPUFs Security Against Modeling Attacks

Fathi Amsaad; Nitin Pundir; Mohammed Niamat

Physical Unclonable Function PUFs are probabilistic functions that are widely used for the security of silicon technology chips including ASIC/FPGA. Despite the prevalence of numerous techniques for fabrication of Silicon PUFs (SPUFs), to the best of our knowledge, a well-established dynamic technique that can provide updated secret keys to improve ROPUF security against modeling attacks does not exist. In this book chapter, an area-efficient technique that exploits an appropriate reconfiguration mechanism and utilizes dedicated FPGA resources to build a dynamic multi-stage ROPUF (d-ROPUF) structures is proposed. To determine the correlation between each structure and its performance, the normality of the generated RO frequencies is studied. Experimental results show that a structure with fewer stages has higher performance in terms of variability and diverseness. Statistical characteristics of the response bits are studied at normal and varying temperature and voltage variations in order to validate the performance of the proposed technique in terms of uniqueness, uniformity, bit-aliasing, and reliability. Our results show that the d-ROPUF exhibits better uniqueness, uniformity, bit-aliasing, and reliability at varying operating conditions when compared with other techniques.


international midwest symposium on circuits and systems | 2017

Novel technique to improve strength of weak arbiter PUF

Nitin Pundir; Fathi Amsaad; Muhtadi Choudhury; Mohammed Niamat

In this paper, we aim at increasing the strength of weak arbiter physical unclonable function (APUF) which are vulnerable to modeling attacks because of low uniqueness and randomness. We propose a unique technique which takes n × 1 challenge-response pairs (CRPs) from APUF and combines them with ring oscillators (ROs) implemented on the same FPGA to get n × n CRPs. We claim the proposed technique to be immune to modeling attacks to a great extent. The experimental results show that the uniqueness and randomness of the APUF increase by at least 19% and 16%, respectively after the implementation of proposed technique.


national aerospace and electronics conference | 2016

Hardware-based novel authentication scheme for advanced metering infrastructure

Atul Prasad Deb Nath; Fathi Amsaad; Muhtadi Choudhury; Mohammed Niamat

Security issues pertaining to Advanced Metering Infrastructure (AMI) system has been a major concern since the advent of the smart grid. In this paper, a novel authentication and key management scheme is proposed for AMI system based on Configurable Ring Oscillator Physically Unclonable Functions (RO PUFs). The scheme provides end-to-end security for the confidentiality and integrity of messages exchanged between utility centers and smart meters. The design is compatible with existing AMI technology and can be implemented on smart meters as PUFs on FPGAs or ASICs. To demonstrate the proof of concept, the proposed scheme is implemented on Xilinx Spartan 3E FPGA boards. The performance of the scheme is measured in terms of storage requirement and authentication time. In addition, a threat model analysis is performed to validate the design against modeling attacks and common wireless sensor network attacks.


national aerospace and electronics conference | 2016

Reliable and reproducible PUF based cryptographic keys under varying environmental conditions

Fathi Amsaad; Chayanika Roy Chaudhuri; Mohammed Niamat

In this paper, a configurable ring oscillator PUFs (c-ROPUFs) is utilized to improve PUF entropy and reliability. In addition, a novel security technique to enhance PUFs reproducibility using a newly defined parameter namely intra-die diverseness is introduced. An implementation of c-ROPUF on a Xilinx Spartan-3E FPGA on 30 different chips under different environmental conditions is shown. Experimental results show that the c-ROPUF design, improves the reliability from 94% to 100% and bit flip rate is reduced from 5.5% to 0% at varying supply voltage and temperatures. Experimental results show that average reproducibility, in terms of Hamming Distance, is enhanced to around 50%.

Collaboration


Dive into the Fathi Amsaad's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Abdul Razaque

New York Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Niraj

Cleveland State University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Ankit Trivedi

Cleveland State University

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge