Publications

Seyed Ahmad Soleymani, Shidrokh Goudarzi, Mohammad Hossein Anisi, Pei Xiao, Lyudmila Mihaylova, Wenwu Wang (2024)MI3SE: A Multi-User Index-based Searchable Symmetric Encryption Scheme for Improving Security of Data in Connected Electronic Devices, In: IEEE Transactions on Consumer Electronics IEEE

—In the Industrial Internet of Things (IIoT), outdoor electronic devices serve crucial roles across sectors, providing vital data for decision-making. However, their exposure to open outdoor environments makes them vulnerable to unauthorized access, physical theft, or compromise, endangering both the device and its data. Ensuring the security of outdoor devices and their data is thus critical. This study addresses data security in outdoor IIoT devices by supporting the encryption of all IIoT-related data in device memory. Accessing and retrieving this data requires operations on encrypted data. Hence, we introduce a Searchable Symmetric Encryption (SSE) scheme called MI3SE, which ensures each device's encryption key is unique and valid for a period based on the device's security sensitivity. Moreover, MI3SE meets key security requirements, including confidentiality, integrity, forward secrecy, and backward secrecy. It is specifically designed to mitigate physical compromise and query pattern analysis through a two-keyword query approach and withstand various attacks, as validated by rigorous security analysis. Comparative evaluations against benchmark schemes underscore the efficacy of MI3SE in terms of both security and performance. Moreover, comprehensive non-mathematical security analysis and simulation experiments affirm the enhanced accuracy and efficacy of MI3SE in securing sensitive data stored in outdoor IIoT devices.

Seyed Ahmad Soleymani, Shidrokh Goudarzi, Mohammad Hossein Anisi, Anish Jindal, Nazri Kama, Saiful Adli Ismail (2023)A Privacy-Preserving Authentication Scheme for Real-Time Medical Monitoring Systems, In: IEEE journal of biomedical and health informatics27(5)pp. 2314-2322 IEEE

In real-time medical monitoring systems, given the significance of medical data and disease symptoms, a secure and always-on connection with the medical centre over the public channels is essential. To this end, an edge-enabled Internet of Medical Things (IoMT) scheme is designed to improve flexibility and scalability of the network and provide seamless connectivity with minimum latency. The entities involved in such network are vulnerable to various attacks and can potentially be compromised. To address this issue, an authentication scheme comprised of digital signature and Authenticated Key Exchange (AKE) protocol is proposed which guarantees only authorized entities get access to the services available in the medical system. Moreover, to fulfill the privacy-preserving, each entity is mapped to a different pseudo-identity. The non-mathematical and performance analysis show that the proposed scheme is robust against various attacks such as impersonation and replay attacks.

Shidrokh Goudarzi, Seyed Ahmad Soleymani, Wenwu Wang, Pei Xiao (2023)UAV-enabled Mobile Edge Computing for Resource Allocation using Cooperative Evolutionary Computation

Edge computing is a viable paradigm for supporting the Industrial Internet of Things deployment by shifting computationally demanding tasks from resource-constrained devices to powerful edge servers. In this study, mobile edge computing (MEC) services are provided for multiple ground mobile nodes (MNs) through a time-division multiple access protocol using the unmanned aerial vehicle (UAV)-enabled edge servers. Remotely controlled UAVs can serve as MEC servers due to their adaptability and flexibility. However, the current MEC approaches have proven ineffective in situations where the number of MNs rapidly increases, or network resources are sparsely distributed. Furthermore, suitable accessibility across wireless networks via MNs with an acceptable quality of service is a fundamental problem for conventional UAV-assisted communications. To tackle this issue, we present an optimized computation resource allocation model using cooperative evolutionary computation to solve the joint optimization problem of queuebased computation offloading and adaptive computing resource allocation. The developed method ensures the task computation delay of all MNs within a time block, optimizes the sum of MN’s accessibility rates, and reduces the energy consumption of the UAV and MNs while meeting task computation restrictions. Moreover, we propose a multilayer data flow processing system to make full use of the computational capability across the system. The top layer of the system contains the cloud centre, the middle layer contains the UAV-assisted MEC (U-MEC) servers, and the bottom layer contains the mobile devices. Our numerical analysis and simulation results prove that the proposed scheme outperforms conventional techniques such as equal offloading time allocation and straight-line flight.

Seyed Ahmad Soleymani, Shidrokh Goudarzi, Mohammad Hossein Anisi, Haitham Cruickshank, Anish Jindal, Nazri Kama (2023)TRUTH: Trust and Authentication Scheme in 5G-IIoT, In: IEEE transactions on industrial informatics19(1)pp. 880-889
Seyed Ahmad Soleymani, Shidrokh Goudarzi, Mohammad Hossein Anisi, Zeinab Movahedi, Anish Jindal, Nazri Kama (2022)PACMAN: Privacy-Preserving Authentication Scheme for Managing Cybertwin-Based 6G Networking, In: IEEE transactions on industrial informatics18(7)pp. 4902-4911 IEEE

Security and privacy of data-in-transit are critical issues in Industry 4.0, which are further amplified by the use of faster communication technologies such as 6G. Along with security issues, computation and communication costs, as well as data confidentiality, must be also accommodated. In this article, we design a cybertwin-based cloud-centric network architecture to improve the flexibility and scalability of 6G industrial networks. Cybertwin not only enables the deployment of advanced security solutions but also provides an always-on connection. However, the security of data-in-transit over wireless communication between users/things and cybertwin remains a concern. Hence, a privacy-preserving authentication scheme based on digital signature and authenticated key exchange protocol is designed to address the security concerns of data exchanged. In addition, we conduct a security analysis that proves that the scheme resists several attacks in the Industry 4.0 environment. Moreover, the evaluation performed confirmed the superiority of the proposed work comparing to the existing works.

Seyed Ahmad Soleymani, Shidrokh Goudarzi, Xingchi Liu, Lyudmila Mihaylova, Wenwu Wang, Pei Xiao (2023)Multi-Target Tracking Using a Swarm of UAVs by Q-learning Algorithm, In: 2023 Sensor Signal Processing for Defence Conference (SSPD)pp. 1-5 IEEE

This paper proposes a scheme for multiple un-manned aerial vehicles (UAVs) to track multiple targets in challenging 3-D environments while avoiding obstacle collisions. The scheme relies on Received-Signal-Strength-Indicator (RSSI) measurements to estimate and track target positions and uses a Q-Learning (QL) algorithm to enhance the intelligence of UAVs for autonomous navigation and obstacle avoidance. Considering the limitation of UAVs in their power and computing capacity, a global reward function is used to determine the optimal actions for the joint control of energy consumption, computation time, and tracking accuracy. Extensive simulations demonstrate the effectiveness of the proposed scheme, achieving accurate and efficient target tracking with low energy consumption.

S. Goudarzi, S. A. Soleymani, M. H. Anisi, A. Jindal, F. Dinmohammadi, Pei Xiao (2023)Sustainable Edge Node Computing Deployments in Distributed Manufacturing Systems, In: IEEE Transactions on Consumer Electronics Institute of Electrical and Electronics Engineers (IEEE)

The advancement of mobile internet technology has created opportunities for integrating the Industrial Internet of Things (IIoT) and edge computing in smart manufacturing. These sustainable technologies enable intelligent devices to achieve high-performance computing with minimal latency. This paper introduces a novel approach to deploy edge computing nodes in smart manufacturing environments at a low cost. However, the intricate interactions among network sensors, equipment, service levels, and network topologies in smart manufacturing systems pose challenges to node deployment. To address this, the proposed sustainable game theory method identifies the optimal edge computing node for deployment to attain the desired outcome. Additionally, the standard design of Software Defined Network (SDN) in conjunction with edge computing serves as forwarding switches to enhance overall computing services. Simulations demonstrate the effectiveness of this approach in reducing network delay and deployment costs associated with computing resources. Given the significance of sustainability, cost efficiency plays a critical role in establishing resilient edge networks. Our numerical and simulation results validate that the proposed scheme surpasses existing techniques like shortest estimated latency first (SELF), shortest estimated buffer first (SEBF), and random deployment (RD) in minimizing the total cost of deploying edge nodes, network delay, packet loss, and energy consumption.