Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Engineering

A Provable Secure And Efficient Authentication Framework For Smart Manufacturing Industry, Muhammad Hammad, Akhtar Badshah, Ghulam Abbas, Hisham Alasmary, Muhammad Waqas, Wasim A. Khan Jan 2023

A Provable Secure And Efficient Authentication Framework For Smart Manufacturing Industry, Muhammad Hammad, Akhtar Badshah, Ghulam Abbas, Hisham Alasmary, Muhammad Waqas, Wasim A. Khan

Research outputs 2022 to 2026

Smart manufacturing is transforming the manufacturing industry by enhancing productivity and quality, driving growth in the global economy. The Internet of Things (IoT) has played a crucial role in realizing Industry 4.0, where machines can communicate and interact in real-time. Despite these advancements, security remains a major challenge in developing and deploying smart manufacturing. As cyber-attacks become more prevalent, researchers are making security a top priority. Although IoT and Industrial IoT (IIoT) are used to establish smart industries, these systems remain vulnerable to various types of attacks. To address these security issues, numerous authentication methods have been proposed. However, many …


Physical Layer Authentication Using Ensemble Learning Technique In Wireless Communications, Muhammad Waqas, Shehr Bano, Fatima Hassan, Shanshan Tu, Ghulam Abbas, Ziaul Haq Abbas Jan 2022

Physical Layer Authentication Using Ensemble Learning Technique In Wireless Communications, Muhammad Waqas, Shehr Bano, Fatima Hassan, Shanshan Tu, Ghulam Abbas, Ziaul Haq Abbas

Research outputs 2022 to 2026

Cyber-physical wireless systems have surfaced as an important data communication and networking research area. It is an emerging discipline that allows effective monitoring and efficient real-time communication between the cyber and physical worlds by embedding computer software and integrating communication and networking technologies. Due to their high reliability, sensitivity and connectivity, their security requirements are more comparable to the Internet as they are prone to various security threats such as eavesdropping, spoofing, botnets, man-in-the-middle attack, denial of service (DoS) and distributed denial of service (DDoS) and impersonation. Existing methods use physical layer authentication (PLA), the most promising solution to detect …


Green And Secure Computation Offloading For Cache-Enabled Iot Networks, M. Ishtiaque A. Zahed, Iftekhar Ahmad, Daryoush Habibi, Quoc Viet Phung Jan 2020

Green And Secure Computation Offloading For Cache-Enabled Iot Networks, M. Ishtiaque A. Zahed, Iftekhar Ahmad, Daryoush Habibi, Quoc Viet Phung

Research outputs 2014 to 2021

The ever-increasing number of diverse and computation-intensive Internet of things (IoT) applications is bringing phenomenal growth in global Internet traffic. Mobile devices with limited resource capacity (i.e., computation and storage resources) and battery lifetime are experiencing technical challenges to satisfy the task requirements. Mobile edge computing (MEC) integrated with IoT applications offloads computation-intensive tasks to the MEC servers at the network edge. This technique shows remarkable potential in reducing energy consumption and delay. Furthermore, caching popular task input data at the edge servers reduces duplicate content transmission, which eventually saves associated energy and time. However, the offloaded tasks are exposed …


Cradg: A Chaotic Radg Security System, Salah Albermany, Maryam Nathim, Zahir Hussain Jan 2017

Cradg: A Chaotic Radg Security System, Salah Albermany, Maryam Nathim, Zahir Hussain

Research outputs 2014 to 2021

A high-performance ciphering algorithm is presented. The proposed method combines old school ciphering (Reaction Automata Direct Graph (RADG)) with chaotic systems to obtain higher level of security. Chaotic sequences are highly sensitive to any changes in their parameters, adding a higher level of security to the proposed approach, called CRADG.


Optical Fiber Sensors In Physical Intrusion Detection Systems: A Review, Gary Andrew Allwood, Graham Wild, Steven Hinkley Jan 2016

Optical Fiber Sensors In Physical Intrusion Detection Systems: A Review, Gary Andrew Allwood, Graham Wild, Steven Hinkley

Research outputs 2014 to 2021

Fiber optic sensors have become a mainstream sensing technology within a large array of applications due to their inherent benefits. They are now used significantly in structural health monitoring, and are an essential solution for monitoring harsh environments. Since their first development over 30 years ago, they have also found promise in security applications. This paper reviews all of the optical fiber-based techniques used in physical intrusion detection systems. It details the different approaches used for sensing, interrogation, and networking, by research groups, attempting to secure both commercial and residential premises from physical security breaches. The advantages and the disadvantages …