Now showing items 1816-1835 of 2211

    • Seamless Handoffs in Wireless HetNets: Transport-Layer Challenges and Multi-Path TCP Solutions with Cross-Layer Awareness 

      Sinky H.; Hamdaoui B.; Guizani M. ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)
      Complications and performance issues resulting from handoffs have widely been overlooked by transport layer protocols. In mobile scenarios, layer 2 protocols begin to see issues, especially when multiple handoffs are ...
    • SecAuthUAV: A Novel Authentication Scheme for UAV-Ground Station and UAV-UAV Communication 

      Alladi, T.; N, Naren; Bansal, G; Chamola, V; Guizani, M. ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)
      Unmanned Aerial Vehicles (UAVs) are becoming very popular nowadays due to the emergence of application areas such as the Internet of Drones (IoD). They are finding wide applicability in areas ranging from package delivery ...
    • SecCom: A prototype for integrating security-aware components 

      Khan, Khaled M.; Tan, Calvin ( Springer Verlag , 2009 , Conference Paper)
      This paper addresses information security from systems development point of view. This paper presents a prototype demonstrating how security-aware software components can be composed with other remote objects in terms of ...
    • Secret Key Agreement for Data Dissemination in Vehicular Platoons 

      Li K.; Lu L.; Ni W.; Tovar E.; Guizani M. ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)
      In a vehicular platoon, the lead vehicle that is responsible for managing the platoon's moving directions and velocity periodically disseminates messages to the following automated vehicles in a multi-hop vehicular network. ...
    • Secret key generation based on AoA estimation for low SNR conditions 

      Badawy A.; Khattab T.; El-Fouly T.; Mohamed A.; Trinchero D.; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)
      In the context of physical layer security, a physical layer characteristic is used as a common source of randomness to generate the secret key. Therefore an accurate estimation of this characteristic is the core for reliable ...
    • Secret key generation based on channel and distance measurements 

      Badawy A.; Khattab T.; ElFouly T.; Mohamed A.; Trinchero D. ( IEEE Computer Society , 2014 , Conference Paper)
      Within the paradigm of physical layer secrecy, typically a physical layer specific characteristic is used as key generator to guarantee information hiding from eavesdroppers. In this paper, we propose a novel secret key ...
    • Secure and distributed data discovery and dissemination in wireless sensor networks 

      He, Daojing; Chan, Sammy; Guizani, Mohsen; Yang, Haomiao; Zhou, Boyang ( IEEE Computer Society , 2015 , Article)
      A data discovery and dissemination protocol for wireless sensor networks (WSNs) is responsible for updating configuration parameters of, and distributing management commands to, the sensor nodes. All existing data discovery ...
    • Secure and efficient data transmission for cluster-based wireless sensor networks 

      Lu, Huang; Li, Jie; Guizani, Mohsen ( IEEE , 2014 , Article)
      Secure data transmission is a critical issue for wireless sensor networks (WSNs). Clustering is an effective and practical way to enhance the system performance of WSNs. In this paper, we study a secure data transmission ...
    • A secure and efficient medical data sharing protocol for cloud-assisted WBAN 

      Liu, Jingwei; Zhong, Qian; Sun, Rong; Du, Xiaojiang; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)
      The cloud-assisted wireless body area network (WBAN) can further the development of the telemedicine, providing larger health data storage space and more powerful computing capabilities for telemedicine. Under the ...
    • Secure and Lightweight Authentication Scheme for Smart Metering Infrastructure in Smart Grid 

      Garg, Sahil; Kaur, Kuljeet; Kaddoum, Georges; Rodrigues, Joel J.P.C.; Guizani, Mohsen ( IEEE Computer Society , 2020 , Article)
      In this article, a secure and lightweight authentication scheme, which provides trust, anonymity, and mutual authentication, with reduced energy, communicational, and computational overheads, is proposed for resource-constrained ...
    • Secure and Optimized Load Balancing for Multitier IoT and Edge-Cloud Computing Systems 

      Zhang, Wei Zhe; Elgendy, Ibrahim A.; Hammad, Mohamed; Iliyasu, Abdullah M.; Du, Xiaojiang; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)
      Mobile-edge computing (MEC) has emerged as a new computing paradigm with great potential to alleviate resource limitations attributed to mobile device users (MDUs) by offloading intensive computations to ubiquitous MEC ...
    • Secure and Reliable Resource Allocation and Caching in Aerial-Terrestrial Cloud Networks (ATCNs) 

      Sharma, Vishal; You, Ilsun; Seo, Jung Taek; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)
      Aerial-terrestrial cloud networks (ATCNs), global integration of air and ground communication systems, pave a way for a large set of applications such as surveillance, on-demand transmissions, data-acquisition, and navigation. ...
    • Secure Authentication and Key Agreement Protocol for Tactile Internet-based Tele-Surgery Ecosystem 

      Kaur, Kuljeet; Garg, Sahil; Kaddoum, Georges; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      With the recent advancements in wireless communications, Tactile Internet (TI) has witnessed a major blow. TI is considered the next big evolution that will provide real-time control in industrial setups, particularly in ...
    • Secure Bluetooth Communication in Smart Healthcare Systems: A Novel Community Dataset and Intrusion Detection System 

      Zubair, Mohammed; Ghubaish, Ali; Unal, Devrim; Al-Ali, Abdulla; Reimann, Thomas; ... more authors ( MDPI , 2022 , Article)
      Smart health presents an ever-expanding attack surface due to the continuous adoption of a broad variety of Internet of Medical Things (IoMT) devices and applications. IoMT is a common approach to smart city solutions that ...
    • Secure cloud services: Matrix multiplication revisited 

      Khan, Khaled M.; Shaheen, Mahboob ( IEEE , 2013 , Conference Paper)
      This paper revisits the issue of secure outsourcing of services. It proposes a data scrambling approach of transforming private data into public without public key encryption in the cloud computing context. The approach ...
    • Secure Data Access Control with Fair Accountability in Smart Grid Data Sharing: An Edge Blockchain Approach 

      Yang, Wenti; Guan, Zhitao; Wu, Longfei; Du, Xiaojiang; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)
      Nowadays, the advance of smart grid technology has fostered the development of microgrids, which can efficiently control and manage the distributed energy resources (DERs). In smart grid, IoT devices generate huge amounts ...
    • Secure data access for wireless body sensor networks 

      Guan, Zhitao; Yang, Tingting; Du, Xiaojiang; uizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)
      Recently, with the support of mobile cloud computing, large number of health-related data collected from various body sensor networks can be managed efficiently. However, it is an important and challenging issue to keep ...
    • Secure Data Discovery and Dissemination based on Hash Tree for Wireless Sensor Networks 

      He, Daojing; Chan, Sammy; Tang, Shaohua; Guizani, Mohsen (2013 , Article)
      Wireless sensor networks (WSNs) are widely applicable in monitoring and control of environment parameters. It is sometimes necessary to disseminate data through wireless links after they are deployed in order to adjust ...
    • Secure DoF for the MIMO MAC: The case of knowing eavesdropper's channel statistics only 

      Amir M.; Khattab T.; Yaacoub E.; Abualsaud K.; Guizani M. ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)
      Physical layer security has attracted research attention as a means to achieve secure communication without the need for complicated upper layer encryption techniques. The secure degrees of freedom (SDoF) of various networks ...
    • A Secure Energy Efficient Scheme for Cooperative IoT Networks 

      Gouissem, Ala; Abualsaud, Khalid; Yaacoub, Elias; Khattab, Tamer; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2022 , Article)
      A secure energy efficient approach is proposed to connect Internet of Things (IoT) sensors that operate with limited power resources. This is done by optimizing simultaneously the energy efficiency, the communication rate ...