Search
Now showing items 1-10 of 11
QuicTor: Enhancing Tor for Real-Time Communication Using QUIC Transport Protocol
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
In the past decades, the internet has emerged as the fastest way to access information. However, this revolutionary information age comes with its own set of challenges. The privacy of Internet users is at increasing risk ...
Integration of federated machine learning and blockchain for the provision of secure big data analytics for Internet of Things
(
Elsevier
, 2021 , Article)
Big data enables the optimization of complex supply chains through Machine Learning (ML)-based data analytics. However, data analytics comes with challenges such as the loss of control and privacy leading to increased risk ...
Applying zero trust security principles to defence mechanisms against data exfiltration attacks
(
wiley
, 2021 , Book chapter)
The zero-trust principle explicitly verifies that the authentication and authorization of all actions are performed regardless of the requesting user's credentials or permissions. This chapter presents the details of a ...
A Service-Oriented Approach for Sensing in the Internet of Things: Intelligent Transportation Systems and Privacy Use Cases
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
This paper presents a Sensing-as-a-Service run-time Service Oriented Architecture (SOA), called 3SOA, for the development of Internet of Things (IoT) applications. 3SOA aims to allow interoperability among various IoT ...
Threat-specific security risk evaluation in the cloud
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
Existing security risk evaluation approaches (e.g., asset-based) do not consider specific security requirements of individual cloud computing clients in the security risk evaluation. In this paper, we propose a threat-specific ...
A Testbed Implementation of a Biometric Identity-Based Encryption for IoMT-enabled Healthcare System
(
Association for Computing Machinery
, 2021 , Conference Paper)
Historically, health data was stored locally on the hospital's server as patient health records, and we had to rely on the planned check-up during doctor's visits. Now, we can monitor health continuously and in real-time. ...
Bringing Coordination Languages Back to the Future Using Blockchain Smart Contracts
(
Association for Computing Machinery
, 2021 , Conference Paper)
This paper presents a blockchain extension of the run-time Sensing as a Service SOA (3SOA) approach presented in [5]. 3SOA defines a practical approach for implementing service-oriented Internet of Things (IoT) using ...
A secure and efficient Internet of Things cloud encryption scheme with forensics investigation compatibility based on identity-based encryption
(
Elsevier B.V.
, 2021 , Article)
Data security is a challenge for end-users of cloud services as the users have no control over their data once it is transmitted to the cloud. A potentially corrupt cloud service provider can obtain the end-users’ data. ...
Advanced Deep Learning for Resource Allocation and Security Aware Data Offloading in Industrial Mobile Edge Computing
(
Mary Ann Liebert Inc.
, 2021 , Article)
The Internet of Things (IoT) is permeating our daily lives through continuous environmental monitoring and data collection. The promise of low latency communication, enhanced security, and efficient bandwidth utilization ...
Vulnerabilities and countermeasures in electrical substations
(
Elsevier
, 2021 , Article)
The impending and continued threat of cyberattacks on modern utility grids has called for action from the different stakeholders of the electricity sector. This calls for a thorough investigation and review of the weaknesses ...