51

Dr Ali Hilal Al-Bayatti

Job: Associate Professor in Cyber Security

Faculty: Computing, Engineering and Media

School/department: School of Computer Science and Informatics

Research group(s): Cyber Technology Institute (CTI) (Software Technology Research Laboratory (STRL))

Address: 51, The Gateway, Leicester, LE1 9BH, United Kingdom

T: +44 (0)116 207 8586

E: alihmohd@dmu.ac.uk

W:

 

Personal profile

Dr. Ali Al-Bayatti is a Senior Lecturer in Intelligent Transportation systems at Software Technology Research Laboratory, a research institute established within 51, Leicester, UK. , his research deals with vehicular (e.g. Vehicular Ad hoc Networks), Cyber Security (e.g. Security Management) and smart technologies (e.g. Context-aware Systems) that promote collective intelligence. Applications range from promoting comfort, to enabling safety in critical scenarios. The goal of his research is to improve the effectiveness, efficiency, mobility, security and safety of transportationsystems.

Dr. Ali Al-Bayatti is currently teaching Undergraduate module ‘CTEC3604 Multi-service Networks’ in Computer Science. He is currently the programme leader for MSc Cyber Technology, MSc Software Engineering, MSc Cyber Security and MSc Professional Practice in Digital Forensics and Security.

Publications and outputs


  • dc.title: Security, Privacy, and Decentralized Trust Management in VANETs: A Review of Current Research and Future Directions dc.contributor.author: Kiraz, Mehmet Sabir; AlMarshoud, Mishri Saleh; Al-Bayatti, Ali Hilal dc.description.abstract: Vehicular Ad Hoc Networks (VANETs) are powerful platforms for vehicular data services and applications. The increasing number of vehicles has made the vehicular network diverse, dynamic, and large-scale, making it difficult to meet the 5G network’s demanding requirements. Decentralized systems are interesting and provide attractive services because they are publicly available (transparency), have an append-only ledger (robust integrity protection), remove single points of failure, and enable distributed key management and communication in a peer-to-peer network. Researchers dedicated substantial efforts to advancing vehicle communications, however conventional cryptographic mechanisms are insufficient which enabled us to look at decentralized technologies. Therefore, we revisit decentralized approaches with VANETs. Endpoint devices hold a wallet which may incorporate threshold key management methods like MPC wallets, HD Wallets, or multi-party threshold ECDSA/EdDSA/BLS. We also discuss trust management approaches and demonstrate how decentralization can improve integrity, security, privacy, and resilience to single points of failure. We also conduct a comprehensive review, comparing them with current requirements, and the latest authentication and secure communication architectures, which require the involvement of trusted but non-transparent authorities in certificate issuance/revocation. We highlight the limitations of these schemes from PKI deployment and recommend future research, particularly in the realm of quantum cryptography. dc.description: The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.

  • dc.title: Mitigating MEV attacks with a two-tiered architecture utilizing verifiable decryption dc.contributor.author: Kiraz, Mehmet Sabir; Alnajjar, Mustafa Ibrahim; Al-Bayatti, Ali Hilal; Kardas, Suleyman dc.description.abstract: A distributed ledger is a shared and synchronized database across multiple designated nodes, often referred to as miners, validators, or peers. These nodes record, distribute, and access data to ensure security and transparency. However, these nodes can be compromised and manipulated by selectively choosing which user transactions to include, exclude, or reorder, thereby gaining an unfair advantage. This is known as a miner/maximal extractable value (MEV) attack. Existing solutions can be classified into various categories, such as MEV auction platforms and time-based ordering properties, which rely on private transaction Mempools. In this paper, we first identify some architectural weaknesses inherent in the latest proposals that divide the block creation and execution roles into separate functions: block builders and block executors. The existing schemes mainly suffer from the verifiability of the decryption process, where a corrupted builder or executor can simply deny the inclusion of specific targeted transactions by exploiting the fact that all transactions are in plain format. To address this, we propose an enhanced version that incorporates a verifiable decryption process. On a very high level, within our proposal, whenever an Executor or a Builder performs a decryption, the decrypted values must be broadcasted. This enables any entity in the network to publicly verify whether the decryption was executed correctly, thus preventing malicious behavior by either party from going undetected. We also define a new adversary model for MEV and conduct a comprehensive security analysis of our protocol against all kinds of potential adversaries related to MEV. Finally, we present the performance analysis of the proposed solution. dc.description: open access article

  • dc.title: A New Framework for Enhancing VANETs through Layer 2 DLT Architectures with Multiparty Threshold Key Management and PETs dc.contributor.author: Kiraz, Mehmet Sabir; Al-Bayatti, Ali Hilal; Adarbah, Haitham; Kardas, Suleyman; Al-Bayatti, Hilal M. Y. dc.description.abstract: This work proposes a new architectural approach to enhance the security, privacy, and scalability of VANETs through threshold key management and Privacy Enhancing Technologies (PETs), such as homomorphic encryption and secure multiparty computation, integrated with Decentralized Ledger Technologies (DLTs). These advanced mechanisms are employed to eliminate centralization and protect the privacy of transferred and processed information in VANETs, thereby addressing privacy concerns. We begin by discussing the weaknesses of existing VANET architectures concerning trust, privacy, and scalability and then introduce a new architectural framework that shifts from centralized to decentralized approaches. This transition applies a decentralized ledger mechanism to ensure correctness, reliability, accuracy, and security against various known attacks. The use of Layer 2 DLTs in our framework enhances key management, trust distribution, and data privacy, offering cost and speed advantages over Layer 1 DLTs, thereby enabling secure vehicle-to-everything (V2X) communication. The proposed framework is superior to other frameworks as it improves decentralized trust management, adopts more efficient PETs, and leverages Layer 2 DLT for scalability. The integration of multiparty threshold key management and homomorphic encryption also enhances data confidentiality and integrity, thus securing against various existing cryptographic attacks. Finally, we discuss potential future developments to improve the security and reliability of VANETs in the next generation of networks, including 5G networks. dc.description: open access article

  • dc.title: Effect of roadway environment characteristics on pedestrian safety at signalised intersections in Amman dc.contributor.author: Shehadeh, Eman A.; Al-Bayatti, Ali Hilal; Bingol, Muhammed Ali dc.description.abstract: Pedestrian safety becoming a serious issue, especially in developing nations, wherein higher crash rates have been reported by the World Health Organization. Despite evidence suggesting higher pedestrian crash counts at signalised intersections in urban areas, there is a lack of in-depth analysis in most developing countries. Motivated by this need, this study aims to: 1) identify significant roadway environment characteristics and traffic volume factors influencing pedestrian – vehicle accidents at signalised intersections in Amman, Jordan, 2) elucidate relationships between pedestrian – vehicle accidents and these factors, and 3) discuss the limitations of pedestrian crash data and propose solutions for future research. We have analysed 166 accidents at 47 signalised intersections in Amman during the period of 2007–2019. The multilevel Generalised Linear Mixed Gamma regression model is the best fit for the data, indicating significant positive correlations between pedestrian crash frequencies and Annual Average Daily Traffic, pedestrian crossing volume, number of lanes, average lane width, and number of parking sides. Conversely, commercial land use and the presence of public transit facilities showed significant negative correlations with pedestrian crashes. This work presents a novel approach that will help developing countries to determine and explain pedestrian crash causes while considering various challenges in these contexts. dc.description: open access article

  • dc.title: Security, Privacy, and Decentralized Trust Management in VANETs: A Review of Current Research and Future Directions dc.contributor.author: AlMarshoud, Mishri Saleh; Al-Bayatti, Ali Hilal; Kiraz, Mehmet Sabir dc.description.abstract: Vehicular Ad Hoc Networks (VANETs) are powerful platforms for vehicular data services and applications. The increasing number of vehicles has made the vehicular network diverse, dynamic, and large-scale, making it difficult to meet the 5G network’s demanding requirements. Decentralized systems are interesting and provide attractive services because they are publicly available (transparency), have an append-only ledger (robust integrity protection), remove single points of failure, and enable distributed key management and communication in a peer-to-peer network. Researchers dedicated substantial efforts to advancing vehicle communications, however conventional cryptographic mechanisms are insufficient which enabled us to look at decentralized technologies. Therefore, we revisit decentralized approaches with VANETs. Endpoint devices hold a wallet which may incorporate threshold key management methods like MPC wallets, HD Wallets, or multi-party threshold ECDSA/EdDSA/BLS. We also discuss trust management approaches and demonstrate how decentralization can improve integrity, security, privacy, and resilience to single points of failure. We also conduct a comprehensive review, comparing them with current requirements, and the latest authentication and secure communication architectures, which require the involvement of trusted but non-transparent authorities in certificate issuance/revocation. We highlight the limitations of these schemes from PKI deployment and recommend future research, particularly in the realm of quantum cryptography. dc.description: The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.

  • dc.title: Location Privacy in VANETs: Provably Secure Anonymous Key Exchange Protocol Based on Self-Blindable Signatures dc.contributor.author: Kiraz, Mehmet Sabir; Al-Bayatti, Ali Hilal; AlMarshoud, Mishri Saleh dc.description.abstract: Security and privacy in vehicular ad hoc networks (VANETs) are challenging in terms of Intelligent Transportation Systems (ITS) features. The distribution and decentralisation of vehicles could threaten location privacy and confidentiality in the absence of trusted third parties (TTP)s or if they are otherwise compromised. If the same digital signatures (or the same certificates) are used for different communications, then adversaries could easily apply linking attacks. Unfortunately, most of the existing schemes for VANETs in the literature do not satisfy the required levels of security, location privacy, and efficiency simultaneously. This paper presents a new and efficient end-to-end anonymous key exchange protocol based on Yang et al. 's self-blindable signatures. In our protocol, vehicles first privately blind their own private certificates for each communication outside the mix-zone and then compute an anonymous shared key based on zero-knowledge proof of knowledge (PoK). The efficiency comes from the fact that once the signatures are verified, the ephemeral values in PoK are also used to compute a shared key through an authenticated Diffie-Hellman key exchange protocol. Therefore, the protocol does not require any further external information to generate a shared key. Our protocol also does not require an interference with the Roadside Units or Certificate Authorities, and hence can be securely run outside the mixed-zones. We demonstrate the security of our protocol in an ideal/real simulation paradigm. Hence, our protocol achieves secure authentication, forward unlinkability, and accountability. Furthermore, the performance analysis shows that our protocol is more efficient in terms of computational and communication overheads compared to existing schemes. dc.description: open access article

  • dc.title: Improved Chaff-Based CMIX for Solving Location Privacy Issues in VANETs dc.contributor.author: Kiraz, Mehmet Sabir; Al-Bayatti, Ali Hilal; Saleh AlMarshoud, Mishri dc.description.abstract: Safety application systems in Vehicular Ad-hoc Networks (VANETs) require the dissemination of contextual information about the scale of neighbouring vehicles; therefore, ensuring security and privacy is of utmost importance. Vulnerabilities in the messages and the system’s infrastructure introduce the potential for attacks that lessen safety and weaken passengers’ privacy. The purpose of short-lived anonymous identities, called “pseudo-identities”, is to divide the trip into unlinkable short passages. Researchers have proposed changing pseudo-identities more frequently inside a pre-defined area, called a cryptographic mix-zone (CMIX) to ensure enhanced protection. According to ETSI ITS technical report recommendations, the researchers must consider the low-density scenarios to achieve unlinkability in CMIX. Recently, Christian et al. proposed a Chaff-based CMIX scheme that sends fake messages under the consideration of low-density conditions to enhance vehicles’ privacy and confuse attackers. To accomplish full unlinkability, in this paper, we first show the following security and privacy vulnerabilities in the Christian et al. scheme: Linkability attacks outside the CMIX may occur due to deterministic data sharing during the authentication phase (e.g., duplicate certificates for each communication). Adversaries may inject fake certificates, which breaks Cuckoo Filters’ (CFs) updates authenticity, and the injection may be deniable. CMIX symmetric key leakage outside the coverage may occur. We propose a VPKI-based protocol to mitigate these issues. First, we use a modified version of Wang et al.’s scheme to provide mutual authentication without revealing the real identity. To this end, the messages of a vehicle are signed with a different pseudo-identity “certificate”. Furthermore, the density is increased via the sending of fake messages in low traffic periods to provide unlinkability outside the mix-zone. Second, unlike Christian et al.’s scheme, we use the Adaptive Cuckoo Filter (ACF) instead of CF to overcome the false positives’ effect on the whole filter. Moreover, to prevent any alteration of the ACFs, only RUSs distribute the updates, and they sign the new fingerprints. Third, the mutual authentication prevents any leakage from the mix zones’ symmetric keys by generating a fresh one for each communication through a Diffie–Hellman key exchange. dc.description: open access article

  • dc.title: Measuring the Realtime Capability of Parallel-Discrete-Event-Simulations dc.contributor.author: Obermaier, Christina; Riebl, Raphael; Al-Bayatti, Ali Hilal; Khan, Sarmadullah; Facchi, Christian dc.description.abstract: Speeding up Discrete Event Simulations (DESs) is a broad research field. Promising Parallel Discrete Event Simulation (PDES) approaches with optimistic and conservative synchronisation schemes have emerged throughout the years. However, in the area of real-time simulation, PDESs are rarely considered. This is caused by the complex problem of fitting parallel executed DES models to a real-time clock. Hence, this paper gives an extensive review of existing conservative and optimistic synchronisation schemes for PDESs. It introduces a metric to compare their real-time capabilities to determine whether they can be used for soft or firm real-time simulation. Examples are given on how to apply this metric to evaluate PDESs using synthetic and real-world examples. The results of the investigation reveal that no final answer can be given if PDESs can be used for soft or firm real-time simulation as they are. However, boundary conditions were defined, which allow a use-case specific evaluation of the real-time capabilities of a certain parallel executed DES. Using this in-depth knowledge and can lead to predictability of the real-time behaviour of a simulation run. dc.description: open access article

  • dc.title: From Conventional to State-of-the-Art IoT Access Control Models dc.contributor.author: Al-Bayatti, Ali Hilal; Malik, Ahmad Kamran; Khan, Sarmadullah; Emmanuel, N.; Zafar, S.; Khattack, H.A.; Raza, B.; Alassafi, M.O.; Alfakheeh, A.S.; Alqarni, M.A. dc.description.abstract: The advent in Online Social Networks (OSN) and Internet of Things (IoT) has created a new world of collaboration and communication between people and devices. The domain of internet of things uses billions of devices (ranging from tiny sensors to macro scale devices) that continuously produce and exchange huge amounts of data with people and applications. Similarly, more than a billion people are connected through social networking sites to collaborate and share their knowledge. The applications of IoT such as smart health, smart city, social networking, video surveillance and vehicular communication are quickly evolving people’s daily lives. These applications provide accurate, information-rich and personalized services to the users. However, providing personalized information comes at the cost of accessing private information of users such as their location, social relationship details, health information and daily activities. When the information is accessible online, there is always a chance that it can be used maliciously by unauthorized entities. Therefore, an effective access control mechanism must be employed to ensure the security and privacy of entities using OSN and IoT services. Access control refers to a process which can restrict user’s access to data and resources. It enforces access rules to grant authorized users an access to resources and prevent others. This survey examines the increasing literature on access control for traditional models in general, and for OSN and IoT in specific. Challenges and problems related to access control mechanisms are explored to facilitate the adoption of access control solutions in OSN and IoT scenarios. The survey provides a review of the requirements for access control enforcement, discusses several security issues in access control, and elaborates underlying principles and limitations of famous access control models. We evaluate the feasibility of current access control models for OSN and IoT and provide the future development direction of access control for the same dc.description: open access article

  • dc.title: A Machine-Learning-Based Approach to Predict the Health Impacts of Commuting in Large Cities: Case Study of London dc.contributor.author: Raj Theeng Tamang, M.; Sharif, M.S.; Al-Bayatti, Ali Hilal; Alfakeeh, A.S.; Omar Alsayed, A. dc.description.abstract: The daily commute represents a source of chronic stress that is positively correlated with physiological consequences, including increased blood pressure, heart rate, fatigue, and other negative mental and physical health effects. The purpose of this research is to investigate and predict the physiological effects of commuting in Greater London on the human body based on machine-learning approaches. For each participant, the data were collected for five consecutive working days, before and after the commute, using non-invasive wearable biosensor technology. Multimodal behaviour, analysis and synthesis are the subjects of major efforts in computing field to realise the successful human–human and human–agent interactions, especially for developing future intuitive technologies. Current analysis approaches still focus on individuals, while we are considering methodologies addressing groups as a whole. This research paper employs a pool of machine-learning approaches to predict and analyse the effect of commuting objectively. Comprehensive experimentation has been carried out to choose the best algorithmic structure that suit the problem in question. The results from this study suggest that whether the commuting period was short or long, all objective bio-signals (heat rate and blood pressure) were higher post-commute than pre-commute. In addition, the results match both the subjective evaluation obtained from the Positive and Negative Affect Schedule and the proposed objective evaluation of this study in relation to the correlation between the effect of commuting on bio-signals. Our findings provide further support for shorter commutes and using the healthier or active modes of transportation. dc.description: open access article

Key research outputs

 

Research interests/expertise

  • Intelligent transpiration
  • Vehicular Ad hoc Networks
  • Mobile Computing
  • Wireless Computing
  • Context-aware Systems
  • Pervasive Computing
  • Computer/Mobile Security.

Areas of teaching

CTEC3604 Multi-service Networks (30 credit).

Qualifications

B.Sc. in Computer Engineering and Information Technology at the University of Technology, Iraq.

Ph.D. in Computer Science at 51, UK.  

Courses taught

Programme leader for MSc Cyber Technology, MSc Software Engineering, MSc Cyber Security and MSc Professional Practice in Digital Forensics and Security.

Current research students

Successful PhD Completion 


Dr. Khalid Alodadi “Solving Non-Line of Sight using Context-aware Systems in Vehicle Ad Hoc Networks” 51 (2016). 

Dr. Ahmed Alghamdi “Features interaction: detection and resolution in Smart Homes Systems” 51 (2016).

Dr. Tareq Binjammaz “GPS Integrity Monitoring for an Intelligent Transport System“ 51 (2015). 

Dr. Abdullah Aldawsari “Context-aware Driving Behaviour Detection System in Vehicle Ad Hoc Networks“ 51 (2015).

Dr. Yasser Almajed “Privacy Management in Data Warehousing” 51 (2015). Dr. Fahad Alqahtani “E-commerce Customer Anonymity and Fair Exchange Protocol for Digital Contents” 51 (2015). 

Dr. Abdulmalik Alhammad “Intelligent Parking Systems in Vehicle Ad Hoc Networks” 51 (2015).

Dr. Hani Alquhayz “Security Management System for 4G Heterogenous Networks“ 51 (2015).

Dr. Mussab Aswad “Crash Detection Model Using Dynamic Bayesian Networks” 51 (2014). 

Dr. Mafawez Alharbi “Context-aware PLE Architecture”, 51 (2014). 

Dr. Laila Alhimale “Fall Detection Algorithm for Video Images”, 51 (2013).

Dr. Saif Al-Sultan “Context Aware Driving Behaviour Model for VANET”, 51 (2013). 

Dr. Awatef Rahuma “Semantically Enhanced Image Tagging System”, 51 (2013).

Dr. Moath Al-Doori “Directional Routing Technique in Vehicle Ad hoc Networks, 51 (2011). 

Dr. Muhammed Khan “A Co-Evolutionary Framework to Reducing the Gap between and Information Technology (2011).


Current PhD Students (Main Supervisor) 

Mr. Dennis Bohmlander "Innovative Crash-sensing Architectures - A new approach in contactless vehicle crash detection" 51. 

Mr. Raphael Riebl "Perfomance Testing methodology for Vehicle Ad hoc Networks" 51.

Mr. Sadir Fadhil "Context-aware overtaking assistant system. 51.

Mr. Nawaf Alqabandi “Context-aware Intrusion Detection system using Artificial intelligence in VANET” 51.

 

Successful MSc Completion 

Mr. Shadman Salah (2014). 

Mr. Ahmed Malik (2013) “Factors effecting Delivering Insulin for diabetic patients using Bayesian Networks”

Mr. Anjanna Silva (2013) “Car Polling System”

Mr. Anas Alsharif (2012) “Automated Taxi Dispatch System (Taxi Business) 51.

Mr. Mahran Alsubee (2012) “Intelligent Car Parking System - A case of City of Medina, Saudi Arabia” 51.

Mr. Salman Alenezi (2012) “The Lines Between Augmented Reality and Virtual Reality” 51. 

Mr. Uqonna Ekwueme (2011)“Intelligent Car Parking Schemes” 51.

Mrs. Nada Al-Fakih (2011) “Cloud Based Personal Health Record” 51.

Mrs. Entisar Alshirf (2011) “Selection of Computer Programming Languages for Developing Distributed Systems. 51.

Mrs. Ohud Almutairi (2011) “Designing an Effective Intersection Collision Warning System: An Investigation into Important Criteria” 51. 

Mrs. Ruqayah Aljameel (2011) “The Application’s Usability Evaluation of Web-based Geographic Information System for Pst Office Webs” 51. 

Mr. Khalid Shaban (2011) “Evaluating Mobile Application Performance and Power Consumption Trough Model-Driven Engineering Methodology” 51.

Mrs. Laila Elgamel (2011) “ Selection of Programming Languages for Developing Distributed Systems” 51.

Mr. Ahmed Alghamdi (2010) “Feasibility of Separating Control/Data in 802.11 Family” 51. 

Mr. Mafawez Alharbi (2010) “Mobile Lecture” 51. 

Mr. Abdulkariem Alqarni (2010) “Global Intelligent Parking Schemes” 51. 

Mr. Abdullah Algashami (2010) “Good Practice for Effective E-assessment” 51. 

Mr. Sharaf Alzhrani (2010) “Intelligent Application for Car Hiring (Mileage Tracking Application)” 51.

Mr. Anas Alsharif (2010) “Automated Taxi Dispatch System” 51. 

Mrs. Asma Alothaim (2010) “Location Finder and Weather Forecast Application” 51. 

Mr. Fauwaz Alshammari “Risk Management in Software Development Projects” 51.

Mr. Ali Almiman “Security Survey in VoIP” 51. Mr. Thamir Alghamdi “Comparison of Two Parking Management Systems” 51.

Professional esteem indicators

Journal Article Reviewing
Networking [IET] 2016. Vehicular Communications [Elsevier] 2014, 2015, 2016. Sensors [MDPI] 2016. Frontiers of Information Technology & Electronic Engineering [Springer] 2014, 2015. The Journal of Engineering [IET] 2014, 2015; Journal of Advances in Engineering Software [Elsevier]; Journal of Network & Computer Applications 2013 [Elsevier]; Computer & Electrical Engineering Journal (CEE) 2011, 2012 [Elsevier]; International Journal of Ad Hoc Ubiquitous Computing (IJAHUC) 2010

Program Committee Member / Other Conference & Workshop Reviewing
IEEE 83rd Vehicular Technology Conference: VTC2016-Spring 15–18 May 2016, Nanjing, ChinaIEEE Vehicular Technology Conference: VTC2015-Spring 11–14 May 2015, Glasgow, ScotlandInternational Conference on Computer, Communications, and Control Technology (I4CT) 2014Springer based Applied Electromagnetic International Conference (APPEIC) 2014Renewable Energy and Green Technology International Conference (REEGETECH) 2014International Symposium on Technology Management and Emerging Technologies (ISTMET) 2014International Conference on Communication and Computer Engineering, focusing on Industrial and Manufacturing Theory and Applications of Electronics, Communications, Computing, and Information Technology (ICOCOE) 2014IEEE Symposium on Computer Application & Industrial Electronics (ISCAIE) 2013IEEE International RF and Microwave Conference (RFM) 2013IEEE Symposium on Industrial Electronics and Applications (ISIEA) 2013IEEE Conference on Wireless Sensors (ICWiSE) 2013IEEE Symposium on Computer & Informatics (ISCI) 2013IEEE Asia-Pacific Conference on Applied Electromagnetic (APACE ) 2012IEEE Symposium on Wireless Technology & Applications (ISWTA) 2012, 2013IEEE Symposium on Industrial Electronic & Applications (ISIEA ) 2012ICNS Networking and Services 2008, 2009, 2010, 2011, 2012, 2013, 2014International Symposium on Innovation in Information & Communication Technology (ISIICT) 2011, 2012, 2013, 2014International Conference on Computer Science & Information Technology (ICCSIT) 2011, 2012, 2013, 2014 International Symposium on Wireless Pervasive Computing (ISWPC) 2010 Member of the Steering committee of the International Online Workshop on writing a research paper (IOW-WRP) 2011AIRCC Worldwide Conferences

Ali_Corridor