Network & Distributed Systems
Recent Submissions
-
Enhancing Healthcare Systems With Deep Reinforcement Learning: Insights Into D2D Communications and Remote Monitoring
( IEEE , 2024 , Article)The traditional healthcare system is increasingly challenged by its dependence on inperson consultations and manual monitoring, struggling with issues of scalability, the immediacy of care, and efficient resource allocation. ... -
The Future of Aerial Communications: A Survey of IRS-Enhanced UAV Communication Technologies
( IEEE , 2024 , Conference Paper)The advent of Intelligent Reflecting Surfaces (IRS) and Unmanned Aerial Vehicles (UAVs) is setting a new benchmark in the field of wireless communications. IRS, with their groundbreaking ability to manipulate electromagnetic ... -
Security-Driven Performance Analysis of Lightweight Cryptography for Energy Efficiency Applications
( IEEE , 2024 , Conference Paper)This paper provides a comprehensive analysis of the security-centric performance of the Lightweight Cryptography (LWC) algorithms ASCON, TinyJambu, and Xoodyak, finalists in the NIST standardization process, through their ... -
Improved Handshaking Procedures for Transport Layer Security in Software Defined Networks
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference Paper)Software defined networking (SDN) has emerged as a new technology to enhance the flexibility, resilience, and automated centralized management of a network. Recently several reports have identified possible vulnerabilities, ... -
A Blockchain-Based Security Scheme for Vehicular Ad Hoc Networks in Smart Cities
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference Paper)The development of Vehicular Ad Hoc Networks (VANET) has brought many advantages to facilitate the deployment of the Intelligent Transportation System (ITS). However, without proper protection, VANETs can be vulnerable to ... -
Malware detection for mobile computing using secure and privacy-preserving machine learning approaches: A comprehensive survey
( Elsevier , 2024 , Article)Mobile devices have become an essential element in our day-to-day lives. The chances of mobile attacks are rapidly increasing with the growing use of mobile devices. Exploiting vulnerabilities from devices as well as ... -
Intrusion Detection System for Healthcare Systems Using Medical and Network Data: A Comparison Study
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)Introducing IoT systems to healthcare applications has made it possible to remotely monitor patients' information and provide proper diagnostics whenever needed. However, providing high-security features that guarantee the ... -
Policy specification and verification for blockchain and smart contracts in 5G networks
( Korean Institute of Communications Information Sciences , 2020 , Article)Blockchain offers unprecedented opportunities for innovation in financial transactions. A whole new world of opportunities for banking, lending, insurance, money transfer, investments, and stock markets awaits. However, ... -
Factors Affecting the Performance of Sub-1 GHz IoT Wireless Networks
( Hindawi Limited , 2021 , Article)Internet of Things (IoT) devices frequently utilize wireless networks operating in the Industrial, Scientific, and Medical (ISM) Sub-1 GHz spectrum bands. Compared with higher frequency bands, the Sub-1 GHz band provides ... -
Recent Advances in the Internet-of-Medical-Things (IoMT) Systems Security
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)The rapid evolutions in microcomputing, mini-hardware manufacturing, and machine-to-machine (M2M) communications have enabled novel Internet-of-Things (IoT) solutions to reshape many networking applications. Healthcare ... -
A secure and efficient Internet of Things cloud encryption scheme with forensics investigation compatibility based on identity-based encryption
( Elsevier B.V. , 2021 , Article)Data security is a challenge for end-users of cloud services as the users have no control over their data once it is transmitted to the cloud. A potentially corrupt cloud service provider can obtain the end-users’ data. ... -
A Testbed Implementation of a Biometric Identity-Based Encryption for IoMT-enabled Healthcare System
( Association for Computing Machinery , 2021 , Conference Paper)Historically, health data was stored locally on the hospital's server as patient health records, and we had to rely on the planned check-up during doctor's visits. Now, we can monitor health continuously and in real-time. ... -
Detection of Botnet Attacks against Industrial IoT Systems by Multilayer Deep Learning Approaches
( Hindawi Limited , 2022 , Article)Industry 4.0 is the next revolution in manufacturing technology that is going to change the production and distribution of goods and services within the following decade. Powered by different enabling technologies that are ... -
Machine learning for the security of healthcare systems based on Internet of Things and edge computing
( Elsevier , 2022 , Book chapter)Using the Internet of Medical Things (IoMT) for treatment and diagnosis has exponentially grown due to its diverse use cases and efficient planning with defined resources. IoMT in the e-healthcare system enables continuous ... -
Cybersecurity of multi-cloud healthcare systems: A hierarchical deep learning approach
( Elsevier Ltd , 2022 , Article)With the increase in sophistication and connectedness of the healthcare networks, their attack surfaces and vulnerabilities increase significantly. Malicious agents threaten patients’ health and life by stealing or altering ... -
Security concerns on machine learning solutions for 6G networks in mmWave beam prediction
( Elsevier B.V. , 2022 , Article)6G – sixth generation – is the latest cellular technology currently under development for wireless communication systems. In recent years, machine learning (ML) algorithms have been applied widely in various fields, such ... -
Watermarking: A review of software and hardware techniques
( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)Watermarking is a well-known technique traditionally used in banknotes and other documents to discourage counterfeiting. It usually consists of semi-transparent symbols embedded on paper. Similar concepts were applied to ... -
A Practical Universal Consortium Blockchain Paradigm for Patient Data Portability on the Cloud Utilizing Delegated Identity Management
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)This paper presents a blockchain system that exploits the base modular features of the Hyperledger Fabric framework to allow for a new, patient-centric, practical data portability paradigm. The system empowers patients by ... -
Design and Implementation of a Threat-Specific Security Risk Assessment Tool
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)Security threats posed to individual cloud computing clients vary depending on their specific security requirements. However, Cloud Providers apply generic security risk assessment approaches which result do not consider ... -
Threat-specific security risk evaluation in the cloud
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)Existing security risk evaluation approaches (e.g., asset-based) do not consider specific security requirements of individual cloud computing clients in the security risk evaluation. In this paper, we propose a threat-specific ...