Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Computer Engineering

Ggnb: Graph-Based Gaussian Naive Bayes Intrusion Detection System For Can Bus, Riadul Islam, Maloy K. Devnath, Manar D. Samad, Syed Md Jaffrey Al Kadry Nov 2021

Ggnb: Graph-Based Gaussian Naive Bayes Intrusion Detection System For Can Bus, Riadul Islam, Maloy K. Devnath, Manar D. Samad, Syed Md Jaffrey Al Kadry

Computer Science Faculty Research

The national highway traffic safety administration (NHTSA) identified cybersecurity of the automobile systems are more critical than the security of other information systems. Researchers already demonstrated remote attacks on critical vehicular electronic control units (ECUs) using controller area network (CAN). Besides, existing intrusion detection systems (IDSs) often propose to tackle a specific type of attack, which may leave a system vulnerable to numerous other types of attacks. A generalizable IDS that can identify a wide range of attacks within the shortest possible time has more practical value than attack-specific IDSs, which is not a trivial task to accomplish. In this …


Implementing A Lightweight Schmidt-Samoa Cryptosystem (Ssc) For Sensory Communications, Qasem Abu Al-Haija, Ibrahim Marouf, Mohammad M. Asad, Kamal Al Nasr Aug 2019

Implementing A Lightweight Schmidt-Samoa Cryptosystem (Ssc) For Sensory Communications, Qasem Abu Al-Haija, Ibrahim Marouf, Mohammad M. Asad, Kamal Al Nasr

Computer Science Faculty Research

One of the remarkable issues that face wireless sensor networks (WSNs) nowadays is security. WSNs should provide a way to transfer data securely particularly when employed for mission-critical purposes. In this paper, we propose an enhanced architecture and implementation for 128-bit Schmidt-Samoa cryptosystem (SSC) to secure the data communication for wireless sensor networks (WSN) against external attacks. The proposed SSC cryptosystem has been efficiently implemented and verified using FPGA modules by exploiting the maximum allowable parallelism of the SSC internal operations. To verify the proposed SSC implementation, we have synthesized our VHDL coding using Quartus II CAD tool targeting the …


Routing Algorithm With Uneven Clustering For Energy Heterogeneous Wireless Sensor Networks, Ying Zhang, Wei Xiong, Dezhi Han, Wei Chen, Jun Wang Sep 2016

Routing Algorithm With Uneven Clustering For Energy Heterogeneous Wireless Sensor Networks, Ying Zhang, Wei Xiong, Dezhi Han, Wei Chen, Jun Wang

Computer Science Faculty Research

Aiming at the “hotspots” problem in energy heterogeneous wireless sensor networks, a routing algorithm of heterogeneous sensor network with multilevel energies based on uneven clustering is proposed. In this algorithm, the energy heterogeneity of the nodes is fully reflected in the mechanism of cluster-heads’ election. It optimizes the competition radius of the cluster-heads according to the residual energy of the nodes. This kind of uneven clustering prolongs the lifetime of the cluster-heads with lower residual energies or near the sink nodes. In data transmission stage, the hybrid multihop transmission mode is adopted, and the next-hop routing election fully takes account …


A Hybrid Key Management Scheme For Wsns Based On Ppbr And A Tree-Based Path Key Establishment Method, Ying Zhang, Jixing Liang, Bingxin Zheng, Wei Chen Apr 2016

A Hybrid Key Management Scheme For Wsns Based On Ppbr And A Tree-Based Path Key Establishment Method, Ying Zhang, Jixing Liang, Bingxin Zheng, Wei Chen

Computer Science Faculty Research

With the development of wireless sensor networks (WSNs), in most application scenarios traditional WSNs with static sink nodes will be gradually replaced by Mobile Sinks (MSs), and the corresponding application requires a secure communication environment. Current key management researches pay less attention to the security of sensor networks with MS. This paper proposes a hybrid key management schemes based on a Polynomial Pool-based key pre-distribution and Basic Random key pre-distribution (PPBR) to be used in WSNs with MS. The scheme takes full advantages of these two kinds of methods to improve the cracking difficulty of the key system. The storage …


A Localization Method For Underwater Wireless Sensor Networks Based On Mobility Prediction And Particle Swarm Optimization Algorithms, Ying Zhang, Jixing Liang, Shengming Jiang, Wei Chen Feb 2016

A Localization Method For Underwater Wireless Sensor Networks Based On Mobility Prediction And Particle Swarm Optimization Algorithms, Ying Zhang, Jixing Liang, Shengming Jiang, Wei Chen

Computer Science Faculty Research

Due to their special environment, Underwater Wireless Sensor Networks (UWSNs) are usually deployed over a large sea area and the nodes are usually floating. This results in a lower beacon node distribution density, a longer time for localization, and more energy consumption. Currently most of the localization algorithms in this field do not pay enough consideration on the mobility of the nodes. In this paper, by analyzing the mobility patterns of water near the seashore, a localization method for UWSNs based on a Mobility Prediction and a Particle Swarm Optimization algorithm (MP-PSO) is proposed. In this method, the range-based PSO …


Key Management Scheme Based On Route Planning Of Mobile Sink In Wireless Sensor Networks, Ying Zhang, Jixing Liang, Bingxin Zheng, Shengming Jiang, Wei Chen Jan 2016

Key Management Scheme Based On Route Planning Of Mobile Sink In Wireless Sensor Networks, Ying Zhang, Jixing Liang, Bingxin Zheng, Shengming Jiang, Wei Chen

Computer Science Faculty Research

In many wireless sensor network application scenarios the key management scheme with a Mobile Sink (MS) should be fully investigated. This paper proposes a key management scheme based on dynamic clustering and optimal-routing choice of MS. The concept of Traveling Salesman Problem with Neighbor areas (TSPN) in dynamic clustering for data exchange is proposed, and the selection probability is used in MS route planning. The proposed scheme extends static key management to dynamic key management by considering the dynamic clustering and mobility of MSs, which can effectively balance the total energy consumption during the activities. Considering the different resources available …


A Network Topology Control And Identity Authentication Protocol With Support For Movable Sensor Nodes, Ying Zhang, Wei Chen, Jixing Liang, Bingxin Zheng, Shengming Jiang Dec 2015

A Network Topology Control And Identity Authentication Protocol With Support For Movable Sensor Nodes, Ying Zhang, Wei Chen, Jixing Liang, Bingxin Zheng, Shengming Jiang

Computer Science Faculty Research

It is expected that in the near future wireless sensor network (WSNs) will be more widely used in the mobile environment, in applications such as Autonomous Underwater Vehicles (AUVs) for marine monitoring and mobile robots for environmental investigation. The sensor nodes’ mobility can easily cause changes to the structure of a network topology, and lead to the decline in the amount of transmitted data, excessive energy consumption, and lack of security. To solve these problems, a kind of efficient Topology Control algorithm for node Mobility (TCM) is proposed. In the topology construction stage, an efficient clustering algorithm is adopted, which …


Dynamic Deployment For Hybrid Sensor Networks Based On Potential Field-Directed Particle Swarm Optimization, Ying Zhang, Yunlong Qiao, Wei Zhao, Wei Chen, Jinde Cao Sep 2015

Dynamic Deployment For Hybrid Sensor Networks Based On Potential Field-Directed Particle Swarm Optimization, Ying Zhang, Yunlong Qiao, Wei Zhao, Wei Chen, Jinde Cao

Computer Science Faculty Research

For a hybrid sensor network, the effective coverage rate can be optimized by adjusting the location of the mobile nodes. For many deployments by APF (artificial potential field), due to the common problem of barrier effect, it is difficult for mobile nodes to diffuse by the weaker attraction when the nodes initially distribute densely in some places. The proposed deployment algorithm PFPSO (Potential Field-Directed Particle Swarm Optimization) can overcome this problem and guide the mobile nodes to the optimal positions. Normally the requirement is different for the effective coverage rate between the hotspot area and the ordinary area. On the …


Efficient Cooperative Mimo Paradigms For Cognitive Radio Networks, Wei Chen, Liang Hong, Xiaoqian Chen Jan 2014

Efficient Cooperative Mimo Paradigms For Cognitive Radio Networks, Wei Chen, Liang Hong, Xiaoqian Chen

Computer Science Faculty Research

This paper investigates the benefits that cooperative communication brings to cognitive radio networks. We focus on cooperative Multiple Input Multiple Output (MIMO) technology, where multiple distributed single-antenna secondary users cooperate on data transmission and reception. Three cooperative MIMO paradigms are proposed to maximize the diversity gain and significantly improve the performance of overlay, underlay and interweave systems. In the paradigm for overlay systems the secondary users can assist (relay) the primary transmissions even when they are far away from the primary users. In the paradigm for underlay systems the secondary users can share the primary users’ frequency resources without any …