Endre søk
Begrens søket
1 - 6 of 6
RefereraExporteraLink til resultatlisten
Permanent link
Referera
Referensformat
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Treff pr side
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sortering
  • Standard (Relevans)
  • Forfatter A-Ø
  • Forfatter Ø-A
  • Tittel A-Ø
  • Tittel Ø-A
  • Type publikasjon A-Ø
  • Type publikasjon Ø-A
  • Eldste først
  • Nyeste først
  • Skapad (Eldste først)
  • Skapad (Nyeste først)
  • Senast uppdaterad (Eldste først)
  • Senast uppdaterad (Nyeste først)
  • Disputationsdatum (tidligste først)
  • Disputationsdatum (siste først)
  • Standard (Relevans)
  • Forfatter A-Ø
  • Forfatter Ø-A
  • Tittel A-Ø
  • Tittel Ø-A
  • Type publikasjon A-Ø
  • Type publikasjon Ø-A
  • Eldste først
  • Nyeste først
  • Skapad (Eldste først)
  • Skapad (Nyeste først)
  • Senast uppdaterad (Eldste først)
  • Senast uppdaterad (Nyeste først)
  • Disputationsdatum (tidligste først)
  • Disputationsdatum (siste først)
Merk
Maxantalet träffar du kan exportera från sökgränssnittet är 250. Vid större uttag använd dig av utsökningar.
  • 1.
    Baqer Mollah, Muhammad
    et al.
    Department of Computer Science and Engineering, Jahangirnagar University, Dhaka.
    Kalam Azad, Md. Abul
    Department of Computer Science and Engineering, Jahangirnagar University, Dhaka.
    Vasilakos, Athanasios
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Security and privacy challenges in mobile cloud computing: Survey and way ahead2017Inngår i: Journal of Network and Computer Applications, ISSN 1084-8045, E-ISSN 1095-8592, Vol. 84, s. 38-54Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    The rapid growth of mobile computing is seriously challenged by the resource constrained mobile devices. However, the growth of mobile computing can be enhanced by integrating mobile computing into cloud computing, and hence a new paradigm of computing called mobile cloud computing emerges. In here, the data is stored in cloud infrastructure and the actual execution is shifted to cloud environment so that a mobile user is set free from resource constrained issue of existing mobile devices. Moreover, to avail the cloud services, the communications between mobile devices and clouds are held through wireless medium. Thus, some new classes of security and privacy challenges are introduced. The purpose of this survey is to present the main security and privacy challenges in this field which have grown much interest among the academia and research community. Although, there are many challenges, corresponding security solutions have been proposed and identified in literature by many researchers to counter the challenges. We also present these recent works in short. Furthermore, we compare these works based on different security and privacy requirements, and finally present open issues.

  • 2.
    Lin, Chao
    et al.
    Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University.
    He, Debiao
    Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University.
    Huang, Xinyi
    School of Mathematics and Computer Science, Fujian Normal University.
    Choo, Kim-Kwang Raymond
    The University of Texas at San Antonio.
    Vasilakos, Athanasios
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    BSeIn: A blockchain-based secure mutual authentication with fine-grained access control system for industry 4.02018Inngår i: Journal of Network and Computer Applications, ISSN 1084-8045, E-ISSN 1095-8592, Vol. 116, s. 42-52Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    To be prepared for the ‘Industry 4.0’-era, we propose a hierarchical framework comprising four tangible layers, which is designed to vertically integrate inter-organizational value networks, engineering value chain, manufacturing factories, etc. The conceptual framework allows us to efficiently implement a flexible and reconfigurable smart factory. However, we need to consider security inherent in existing (stand-alone) devices and networks as well as those that may arise in such integrations. Especially the existing solutions are insufficient to address these fundamental security concerns. Thus, we present a blockchain-based system for secure mutual authentication, BSeIn, to enforce fine-grained access control polices. The proposed system (with integrated attribute signature, multi-receivers encryption and message authentication code) is designed to provide privacy and security guarantees such as anonymous authentication, auditability, and confidentiality. BSeIn also scales well due to the utilization of smart contract. We then evaluate the security and performance of BSeIn. For example, findings from the performance evaluation demonstrate that Initialization/Request Issuance/Chain Transaction/State Delivery/Permission Update phase only cost 12.123/4.810/6.978/0.013/2.559s, respectively.

  • 3.
    Mohd, Bassam Jamil
    et al.
    Computer Engineering Department, Hashemite University.
    Hayajneh, Thaier
    School of Engineering and Computing Sciences, New York Institute of Technology.
    Vasilakos, Athanasios
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    A survey on lightweight block ciphers for low-resource devices: Comparative study and open issues2015Inngår i: Journal of Network and Computer Applications, ISSN 1084-8045, E-ISSN 1095-8592, Vol. 58, s. 73-93Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    This paper investigates the lightweight block ciphers' implementations, which have received a fair amount of research for their essential security role in low-resource devices. Our objective is to present a comprehensive review of state-of-the-art research progress in lightweight block ciphers' implementation and highlight future research directions. At first, we present taxonomy of the cipher design space and accurately define the scope of lightweight ciphers for low-resource devices. Moreover, this paper discusses the performance metrics that are commonly reported in the literature when comparing cipher implementations. The sources of inaccuracies and deviations are carefully examined. In order to mitigate the confusion in the composite metrics, we developed a general metric which includes the basic metrics. Our analysis designated the energy/bit metric as the most appropriate metric for energy-constrained low-resource designs. Afterwards, the software and hardware implementations of the block cipher algorithms are surveyed, investigated, and compared. The paper selects the top performing ciphers in various metrics and suggests the Present cipher as a good reference for hardware implementations. What transpires from this survey is that unresolved research questions and issues are yet to be addressed by future research projects.

  • 4.
    Varga, Pal
    et al.
    Budapest University of Technology and Economics.
    Blomstedt, Fredrik
    BNearIT Inc., Lulea.
    Ferreira, Luis Lino
    ISEP, Polytechnic of Porto – School of Engineering.
    Eliasson, Jens
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, EISLAB.
    Johansson, Mats
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, EISLAB.
    Delsing, Jerker
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, EISLAB.
    Martínez de Soria, Iker
    Tecnalia Research and Innovation, Bilbao.
    Making system of systems interoperable: The core components of the arrowhead framework2017Inngår i: Journal of Network and Computer Applications, ISSN 1084-8045, E-ISSN 1095-8592, Vol. 81, s. 85-95Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    The objective of the Arrowhead Framework is to efficiently support the development, deployment and operation of interconnected, cooperative systems. It is based on the Service Oriented Architecture philosophy. The building elements of the framework are systems that provide and consume services, and cooperate as systems of systems. Some commonly used systems, such as orchestration, authorization or service registry are considered as core. These can be used by any system of systems that follow the guidelines of the Arrowhead Framework.

    Within the framework, systems – using different information exchange technologies during collaboration – are helped through various approaches. These include the so-called Interoperability Layer, as well as systems and services for translation. Furthermore, one of the main problems of developing such highly interoperable systems is the lack of understanding between various development groups. Adequate development and service documentation methodologies can help to overcome this issue.

    The design, development and verification methodology for each service, system and system of systems within the Arrowhead Framework supports that these can be implemented, verified, deployed, and run in an interoperable way. This paper presents an overview of the framework together with its core elements – and provides guidelines for the design and deployment of interoperable, Arrowhead-compliant cooperative systems.

  • 5.
    Vasilakos, Athanasios
    et al.
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Li, Zhe
    Institut Mine Telecom - Telecom Bretagne, France.
    Simon, Gwendal
    Institut Mine Telecom - Telecom Bretagne, France.
    You, Wei
    Orange, France.
    Information centric network: Research challenges and opportunities2015Inngår i: Journal of Network and Computer Applications, ISSN 1084-8045, E-ISSN 1095-8592, Vol. 52, s. 1-10Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    For more than a decade, the inherent drawbacks of current Internet have been calling for its revolutionary designs. The end-to-end model, which was designed for special data transmission in the early age of Internet, is causing troubles everywhere in nowadays content based web services. Consequently, Information Centric Network (ICN) is proposed to solve these problems. As the most permanent clean-slate approach for next generation Internet, ICN has attracted much attention from network researchers in the passed few years. This survey focuses on the current progress of the research work in ICN. It investigates various key aspects such as naming and routing schemes, in-network caching policies, etc., and highlights the benefit of implementing ICN, open research issues and new interests in this domain.

  • 6.
    Wazid, Mohammad
    et al.
    Cyber Security and Networks Lab, Innopolis University, Innopolis, Russia.
    Kumar Das, Ashok
    Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad, India.
    Vasilakos, Athanasios
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Authenticated key management protocol for cloud-assisted body area sensor networks2018Inngår i: Journal of Network and Computer Applications, ISSN 1084-8045, E-ISSN 1095-8592, Vol. 123, s. 112-126Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    Due to recent advances in various technologies such as integrated circuit, embedded systems and wireless communications, the wireless body area network (WBAN) becomes a propitious networking paradigm. WBANs play a very important role in modern medical systems as the real-time biomedical data through intelligent medical sensors in or around the patients' body can be collected and sent the data to remote medical personnel for clinical diagnostics. However, wireless nature of communication makes an adversary to intercept or modify the private and secret data collected by the sensors in WBANs. In critical applications of WBANs, there is a great requirement to access directly the sensing information collected by the body sensors by an external user (e.g., a doctor) in order to monitor the health condition of a patient. In order to do so, the user needs to first authenticate with the accessed body sensors, and only after mutual authentication between that user and the body sensors the real-time data can be directly accessed securely by the user.

    In this paper, we propose a new user authentication and key management scheme for this purpose. The proposed scheme allows mutual authentication between a user and personal server connected to WBAN via the healthcare server situated at the cloud, and once the mutual authentication is successful, both user and personal server are able to establish a secret session key for their future communication. In addition, key management process is provided for establishment of secret keys among the sensors and personal server for their secure communication. The formal security based on broadly-accepted Real-Or-Random (ROR) model and informal security give confidence that the proposed scheme can withstand several known attacks needed for WBAN security. A detailed comparative analysis among the proposed scheme and other schemes shows that the proposed scheme provides better security & functionality features, low computation and comparable communication costs as compared to recently proposed related schemes. Finally, the practical demonstration using the NS2 based simulation is shown for the proposed scheme and also for other schemes.

1 - 6 of 6
RefereraExporteraLink til resultatlisten
Permanent link
Referera
Referensformat
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf