Search
Now showing items 1-10 of 21
A novel chaos-based physical layer security transmission scheme for internet of things
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
The Internet of Things (IoT) has attracted much attention in many fields, such as healthcare, transportation, finance and other critical infrastructures. But how to ensure the security of whole IoT system and the privacy ...
A survey on recent approaches in intrusion detection system in IoTs
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
Internet of Things (IoTs) are Internet-connected devices that integrate physical objects and internet in diverse areas of life like industries, home automation, hospitals and environment monitoring. Although IoTs ease daily ...
Mathematical Evaluation of Human Immune Systems for Securing Software Defined Networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
The immune system of the human body has massive potential in defending it against multiple harmful viruses and foreign bodies. All through their developmental history, human beings have been contaminated by micro-organisms. ...
Compress or Interfere?
(
IEEE Computer Society
, 2019 , Conference Paper)
Rapid evolution of wireless medical devices and network technologies has fostered the growth of remote monitoring systems. Such new technologies enable monitoring patients' medical records anytime and anywhere without ...
A secure and efficient medical data sharing protocol for cloud-assisted WBAN
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
The cloud-assisted wireless body area network (WBAN) can further the development of the telemedicine, providing larger health data storage space and more powerful computing capabilities for telemedicine. Under the ...
Solving security problems in MEC systems
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
We propose an algorithm for constructing efficient security strategies in the mobile edge computing (MEC), where the protected targets are nodes connected to the MEC and the mobile users (MUs) are agents capable of preventing ...
A bio-inspired framework to mitigate dos attacks in software defined networking
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
Software Defined Networking (SDN) is an emerging architecture providing services on a priority basis for real-time communication, by pulling out the intelligence from the hardware and developing a better management system ...
Empirical performance evaluation of QUIC protocol for Tor anonymity network
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
Tor's anonymity network is one of the most widely used anonymity networks online, it consists of thousands of routers run by volunteers. Tor preserves the anonymity of its users by relaying the traffic through a number of ...
Efficient EEG mobile edge computing and optimal resource allocation for smart health applications
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
In the past few years, a rapid increase in the number of patients requiring constant monitoring, which inspires researchers to develop intelligent and sustainable remote smart healthcare services. However, the transmission ...
Smart stock exchange market: A secure predictive decentralized model
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
Stock exchanges around the world are exploring the best possible solution that can improve trading efficiency, lower the risks and tighten secu- rity levels. The working and functioning of a stock exchange involves very ...