Browsing by Author "Guizani, M."
Now showing items 1-20 of 150
-
3-D Stochastic Geometry-based Modeling and Performance Analysis of Efficient Security Enhancement scheme for IoT Systems
Chamkhia H.; Erbad A.; Al-Ali A.; Mohamed A.; Refaey A.; Guizani M.... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)Internet of Things (IoT) systems are becoming core building blocks for different services and applications supporting every day’s life. The heterogeneous nature of IoT devices and the complex use scenarios make it ... -
3D Beamforming with Massive Cylindrical Arrays for Physical Layer Secure Data Transmission
Yaacoub E.; Al-Husseini M.; Chehab A.; Abualsaud K.; Khattab T.; Guizani M.... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)In this letter, a novel approach for physical layer security is implemented using massive cylindrical antenna arrays. A part of the arrays is used for transmitting a signal reliably from source to destination using highly ... -
5G wireless backhaul networks: Challenges and research advances
Ge, X.; Cheng, H.; Guizani, M.; Han, T. ( Institute of Electrical and Electronics Engineers Inc. , 2014 , Article)5G networks are expected to achieve gigabit-level throughput in future cellular networks. However, it is a great challenge to treat 5G wireless backhaul traffic in an effective way. In this article, we analyze the wireless ... -
A blockchain-based fog computing framework for activity recognition as an application to e-Healthcare services
Islam N.; Faheem Y.; Din I.U.; Talha M.; Guizani M.; Khalil M.... more authors ... less authors ( Elsevier B.V. , 2019 , Article)In modern e-Healthcare systems, human activity recognition (HAR) is one of the most challenging tasks in remote monitoring of patients suffering from mental illness or disabilities for necessary assistance. One of the major ... -
A Computation Offloading Incentive Mechanism with Delay and Cost Constraints under 5G Satellite-Ground IoV Architecture
Liwang M.; Dai S.; Gao Z.; Du X.; Guizani M.; Dai H.... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)The 5G Internet of Vehicles has become a new paradigm alongside the growing popularity and variety of computation-intensive applications with high requirements for computational resources and analysis capabilities. Existing ... -
A Fatigue Measuring Protocol for Wireless Body Area Sensor Networks
Akram, S.; Javaid, N.; Ahmad, A.; Khan, Z.A.; Imran, M.; Guizani, M.; Hayat, A.; Ilahi, M.... more authors ... less authors ( Springer New York LLC , 2015 , Article)As players and soldiers preform strenuous exercises and do difficult and tiring duties, they are usually the common victims of muscular fatigue. Keeping this in mind, we propose FAtigue MEasurement (FAME) protocol for ... -
A fog computing solution for context-based privacy leakage detection for android healthcare devices
Gu J.; Huang R.; Jiang L.; Qiao G.; Du X.; Guizani M.... more authors ... less authors ( MDPI AG , 2019 , Article)Intelligent medical service system integrates wireless internet of things (WIoT), including medical sensors, wireless communications, and middleware techniques, so as to collect and analyze patients' data to examine their ... -
A Friendly and Low-Cost Technique for Capturing Non-Cooperative Civilian Unmanned Aerial Vehicles
He D.; Qiao Y.; Chen S.; Du X.; Chen W.; Zhu S.; Guizani M.... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)As a result of continuous cost reduction and device miniaturization, small UAVs are now more easily accessible to the public. Consequently, numerous new applications in the civilian and commercial domains have emerged. ... -
A Heuristic Statistical Testing Based Approach for Encrypted Network Traffic Identification
Niu W.; Zhuo Z.; Zhang X.; Du X.; Yang G.; Guizani M.... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)In recent years, malware with strong concealment uses encrypted protocol to evade detection. Thus, encrypted traffic identification can help security analysts to be more effective in narrowing down those encrypted network ... -
A Multicharger Cooperative Energy Provision Algorithm Based on Density Clustering in the Industrial Internet of Things
Han G.; Wu J.; Wang H.; Guizani M.; Ansere J.A.; Zhang W.... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)Wireless sensor networks (WSNs) are an important core of the Industrial Internet of Things (IIoT). Wireless rechargeable sensor networks (WRSNs) are sensor networks that are charged by mobile chargers (MCs), and can achieve ... -
A novel control plane optimization strategy for important nodes in SDN-IoT networks
Ren W.; Sun Y.; Luo H.; Guizani M. ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)One of the crucial technologies for future Internet of Things (IoT) is software defined networks, which provides a centralized and programmable control ability for operators. However, the current single control plane ... -
A Novel DCT-Based Compression Scheme for 5G Vehicular Networks
Su Y.; Lu X.; Huang L.; Du X.; Guizani M. ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)Next-generation (5G) vehicular networks will support various network applications, leading to specific requirements and challenges for wireless access technologies. This trend has motivated the development of the long-term ... -
A privacy-preserving traffic monitoring scheme via vehicular crowdsourcing
Zhang C.; Zhu L.; Xu C.; Du X.; Guizani M. ( MDPI AG , 2019 , Article)The explosive number of vehicles has given rise to a series of traffic problems, such as traffic congestion, road safety, and fuel waste. Collecting vehicles’ speed information is an effective way to monitor the traffic ... -
A Probabilistic Source Location Privacy Protection Scheme in Wireless Sensor Networks
Wang H.; Han G.; Zhang W.; Guizani M.; Chan S. ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)With the recent developments of wireless sensor networks (WSNs), computing and communication have experienced huge advancement. Meanwhile, security has not received the same attention to go along with such developments. ... -
A review of information centric network-based internet of things: communication architectures, design issues, and research opportunities
Din I.U.; Asmat H.; Guizani M. ( Springer New York LLC , 2019 , Article)In the perspective of Internet advancements for the future Internet, Information Centric Network (ICN) offers a communication model, which is different from the current IP-based paradigm. ICN is a name based communication ... -
A Scheme for Delay-Sensitive Spatiotemporal Routing in SDN-Enabled Underwater Acoustic Sensor Networks
Lin C.; Han G.; Guizani M.; Bi Y.; Du J. ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)In underwater acoustic sensor networks (UASNs), the sensors are deployed at different areas of the ocean, which perform information collection and delay-sensitive routing to the data center for further processing or ... -
A secure and efficient renewable energy trading scheme based on blockchain in smart grid
Lu X.; Guan Z.; Zhou X.; Du X.; Wu L.; Guizani M.... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)Nowadays, with the diversification and decentralization of energy systems, the energy Internet makes it possible to interconnect distributed energy sources and consumers. In the energy trading market, the traditional ... -
A secure client-side framework for protecting the privacy of health data stored on the cloud
Sakr A.; Yaacoub E.; Noura H.; Al-Husseini M.; Abualsaud K.; Khattab T.; Guizani M.... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)In the past decade, Cloud-Computing emerged as a new computing concept with a distributed nature using virtual network and systems. Many businesses rely on this technology to keep their systems running but concerns are ... -
A Secure, Lightweight, and Privacy-Preserving Authentication Scheme for V2G Connections in Smart Grid
Kaur K.; Garg S.; Kaddoum G.; Gagnon F.; Ahmed S.H.; Guizani M.... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)Vehicle to Grid (V2G) is a crucial technology that enables the bidirectional flow of communication between electric vehicles (EVs) and the smart grid (SG). Undoubtedly security and privacy are inherent requirements of these ... -
A Secured Proxy-Based Data Sharing Module in IoT Environments Using Blockchain
Obour Agyekum K.O.-B.; Xia Q.; Sifah E.B.; Gao J.; Xia H.; Du X.; Guizani M.... more authors ... less authors ( NLM (Medline) , 2019 , Article)Access and utilization of data are central to the cloud computing paradigm. With the advent of the Internet of Things (IoT), the tendency of data sharing on the cloud has seen enormous growth. With data sharing comes ...