Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Engineering

A Traffic-Aware Approach For Enabling Unmanned Aerial Vehicles (Uavs) In Smart City Scenarios, Hesham El-Sayed, Moumena Chaqfa, Sherali Zeadally, Deepak Puthal Jun 2019

A Traffic-Aware Approach For Enabling Unmanned Aerial Vehicles (Uavs) In Smart City Scenarios, Hesham El-Sayed, Moumena Chaqfa, Sherali Zeadally, Deepak Puthal

Information Science Faculty Publications

In smart cities, vehicular applications require high computation capabilities and low-latency communication. Edge computing offers promising solutions for addressing these requirements because of several features, such as geo-distribution, mobility, low latency, heterogeneity, and support for real-time interactions. To employ network edges, existing fixed roadside units can be equipped with edge computing servers. Nevertheless, there are situations where additional infrastructure units are required to handle temporary high traffic loads during public events, unexpected weather conditions, or extreme traffic congestion. In such cases, the use of flying roadside units are carried by unmanned aerial vehicles (UAVs), which provide the required infrastructure for …


Anonymous And Efficient Message Authentication Scheme For Smart Grid, Libing Wu, Jing Wang, Sherali Zeadally, Debiao He May 2019

Anonymous And Efficient Message Authentication Scheme For Smart Grid, Libing Wu, Jing Wang, Sherali Zeadally, Debiao He

Information Science Faculty Publications

Smart grid has emerged as the next-generation electricity grid with power flow optimization and high power quality. Smart grid technologies have attracted the attention of industry and academia in the last few years. However, the tradeoff between security and efficiency remains a challenge in the practical deployment of the smart grid. Most recently, Li et al. proposed a lightweight message authentication scheme with user anonymity and claimed that their scheme is provably secure. But we found that their scheme fails to achieve mutual authentication and mitigate some typical attacks (e.g., impersonation attack, denial of service attack) in the smart grid …


Is Dns Ready For Ubiquitous Internet Of Things?, Zhiwei Yan, Hongtao Li, Sherali Zeadally, Yu Zheng, Guanggang Geng Feb 2019

Is Dns Ready For Ubiquitous Internet Of Things?, Zhiwei Yan, Hongtao Li, Sherali Zeadally, Yu Zheng, Guanggang Geng

Information Science Faculty Publications

The vision of the Internet of Things (IoT) covers not only the well-regulated processes of specific applications in different areas but also includes ubiquitous connectivity of more generic objects (or things and devices) in the physical world and the related information in the virtual world. For example, a typical IoT application, such as a smart city, includes smarter urban transport networks, upgraded water supply, and waste-disposal facilities, along with more efficient ways to light and heat buildings. For smart city applications and others, we require unique naming of every object and a secure, scalable, and efficient name resolution which can …