Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Engineering (13)
- Digital Communications and Networking (11)
- Physical Sciences and Mathematics (11)
- Computer Sciences (10)
- Social and Behavioral Sciences (6)
-
- Electrical and Computer Engineering (5)
- Information Security (5)
- Library and Information Science (4)
- Civil and Environmental Engineering (2)
- Computer and Systems Architecture (2)
- OS and Networks (2)
- Power and Energy (2)
- Systems and Communications (2)
- Transportation Engineering (2)
- Artificial Intelligence and Robotics (1)
- Biomedical (1)
- Communication (1)
- Communication Technology and New Media (1)
- Data Storage Systems (1)
- Databases and Information Systems (1)
- Electrical and Electronics (1)
- Environmental Monitoring (1)
- Environmental Sciences (1)
- Science and Technology Studies (1)
- Theory and Algorithms (1)
- Keyword
-
- Authentication (2)
- Cloud computing (2)
- Face detection (2)
- Face recognition (2)
- Intelligent transportation systems (2)
-
- Internet (2)
- Internet of Things (2)
- IoT (2)
- Smart grid (2)
- Wearables (2)
- Wireless sensor networks (2)
- Adversarial machine learning (1)
- Air quality (1)
- Algorithm (1)
- Amazon AWS (1)
- Applications (1)
- Biomedical monitoring (1)
- Biometrics (1)
- Bluetooth Low Energy (1)
- Body sensor network (1)
- Bystanders' privacy (1)
- Bystanders’ privacy (1)
- Communication system security (1)
- Computer security (1)
- Cooperative relaying (1)
- Cryptographic hash function (1)
- Cybersecurity (1)
- DNS (1)
- Data aggregation (1)
- Distributed mobility management (DMM) (1)
Articles 1 - 16 of 16
Full-Text Articles in Engineering
A User Study Of A Wearable System To Enhance Bystanders’ Facial Privacy, Alfredo J. Perez, Sherali Zeadally, Scott Griffith, Luis Y. Matos Garcia, Jaouad A. Mouloud
A User Study Of A Wearable System To Enhance Bystanders’ Facial Privacy, Alfredo J. Perez, Sherali Zeadally, Scott Griffith, Luis Y. Matos Garcia, Jaouad A. Mouloud
Information Science Faculty Publications
The privacy of users and information are becoming increasingly important with the growth and pervasive use of mobile devices such as wearables, mobile phones, drones, and Internet of Things (IoT) devices. Today many of these mobile devices are equipped with cameras which enable users to take pictures and record videos anytime they need to do so. In many such cases, bystanders’ privacy is not a concern, and as a result, audio and video of bystanders are often captured without their consent. We present results from a user study in which 21 participants were asked to use a wearable system called …
A Traffic-Aware Approach For Enabling Unmanned Aerial Vehicles (Uavs) In Smart City Scenarios, Hesham El-Sayed, Moumena Chaqfa, Sherali Zeadally, Deepak Puthal
A Traffic-Aware Approach For Enabling Unmanned Aerial Vehicles (Uavs) In Smart City Scenarios, Hesham El-Sayed, Moumena Chaqfa, Sherali Zeadally, Deepak Puthal
Information Science Faculty Publications
In smart cities, vehicular applications require high computation capabilities and low-latency communication. Edge computing offers promising solutions for addressing these requirements because of several features, such as geo-distribution, mobility, low latency, heterogeneity, and support for real-time interactions. To employ network edges, existing fixed roadside units can be equipped with edge computing servers. Nevertheless, there are situations where additional infrastructure units are required to handle temporary high traffic loads during public events, unexpected weather conditions, or extreme traffic congestion. In such cases, the use of flying roadside units are carried by unmanned aerial vehicles (UAVs), which provide the required infrastructure for …
Anonymous And Efficient Message Authentication Scheme For Smart Grid, Libing Wu, Jing Wang, Sherali Zeadally, Debiao He
Anonymous And Efficient Message Authentication Scheme For Smart Grid, Libing Wu, Jing Wang, Sherali Zeadally, Debiao He
Information Science Faculty Publications
Smart grid has emerged as the next-generation electricity grid with power flow optimization and high power quality. Smart grid technologies have attracted the attention of industry and academia in the last few years. However, the tradeoff between security and efficiency remains a challenge in the practical deployment of the smart grid. Most recently, Li et al. proposed a lightweight message authentication scheme with user anonymity and claimed that their scheme is provably secure. But we found that their scheme fails to achieve mutual authentication and mitigate some typical attacks (e.g., impersonation attack, denial of service attack) in the smart grid …
Is Dns Ready For Ubiquitous Internet Of Things?, Zhiwei Yan, Hongtao Li, Sherali Zeadally, Yu Zheng, Guanggang Geng
Is Dns Ready For Ubiquitous Internet Of Things?, Zhiwei Yan, Hongtao Li, Sherali Zeadally, Yu Zheng, Guanggang Geng
Information Science Faculty Publications
The vision of the Internet of Things (IoT) covers not only the well-regulated processes of specific applications in different areas but also includes ubiquitous connectivity of more generic objects (or things and devices) in the physical world and the related information in the virtual world. For example, a typical IoT application, such as a smart city, includes smarter urban transport networks, upgraded water supply, and waste-disposal facilities, along with more efficient ways to light and heat buildings. For smart city applications and others, we require unique naming of every object and a secure, scalable, and efficient name resolution which can …
A Hierarchical Spectrum Access Scheme For Tv White Space Coexistence In Hetergeneous Networks, Mohammad Zaeri-Amirani, Fatemeh Afghah, Sherali Zeadally
A Hierarchical Spectrum Access Scheme For Tv White Space Coexistence In Hetergeneous Networks, Mohammad Zaeri-Amirani, Fatemeh Afghah, Sherali Zeadally
Information Science Faculty Publications
Among current techniques for dynamic access to television (TV) white space (TVWS), geolocation database-based access provides a promising performance in protecting the TV-band incumbents from interference that cannot be efficiently achieved in other license-exempt models. However, in heterogeneous wireless networks, most portable devices do not have such access and may cause interference to TV incumbents. We propose a hierarchical model for spectrum sharing in TVWS that includes a wide range of fixed and portable devices. In the first tier, the TV broadcaster can lease the spectrum bands to local fixed users based on a soft license agreement. The fixed users …
Facepet: Enhancing Bystanders' Facial Privacy With Smart Wearables/Internet Of Things, Alfredo J. Perez, Sherali Zeadally, Luis Y. Matos Garcia, Jaouad A. Mouloud, Scott Griffith
Facepet: Enhancing Bystanders' Facial Privacy With Smart Wearables/Internet Of Things, Alfredo J. Perez, Sherali Zeadally, Luis Y. Matos Garcia, Jaouad A. Mouloud, Scott Griffith
Information Science Faculty Publications
Given the availability of cameras in mobile phones, drones and Internet-connected devices, facial privacy has become an area of major interest in the last few years, especially when photos are captured and can be used to identify bystanders’ faces who may have not given consent for these photos to be taken and be identified. Some solutions to protect facial privacy in photos currently exist. However, many of these solutions do not give a choice to bystanders because they rely on algorithms that de-identify photos or protocols to deactivate devices and systems not controlled by bystanders, thereby being dependent on the …
Compact Hardware Implementation Of A Sha-3 Core For Wireless Body Sensor Networks, Yi Yang, Debiao He, Neeraj Kumar, Sherali Zeadally
Compact Hardware Implementation Of A Sha-3 Core For Wireless Body Sensor Networks, Yi Yang, Debiao He, Neeraj Kumar, Sherali Zeadally
Information Science Faculty Publications
One of the most important Internet of Things applications is the wireless body sensor network (WBSN), which can provide universal health care, disease prevention, and control. Due to large deployments of small scale smart sensors in WBSNs, security, and privacy guarantees (e.g., security and safety-critical data, sensitive private information) are becoming a challenging issue because these sensor nodes communicate using an open channel, i.e., Internet. We implement data integrity (to resist against malicious tampering) using the secure hash algorithm 3 (SHA-3) when smart sensors in WBSNs communicate with each other using the Internet. Due to the limited resources (i.e., storage, …
Performance Evaluation Of Energy-Autonomous Sensors Using Power-Harvesting Beacons For Environmental Monitoring In Internet Of Things (Iot), George Dan Moiş, Teodora Sanislav, Silviu Corneliu Folea, Sherali Zeadally
Performance Evaluation Of Energy-Autonomous Sensors Using Power-Harvesting Beacons For Environmental Monitoring In Internet Of Things (Iot), George Dan Moiş, Teodora Sanislav, Silviu Corneliu Folea, Sherali Zeadally
Information Science Faculty Publications
Environmental conditions and air quality monitoring have become crucial today due to the undeniable changes of the climate and accelerated urbanization. To efficiently monitor environmental parameters such as temperature, humidity, and the levels of pollutants, such as fine particulate matter (PM2.5) and volatile organic compounds (VOCs) in the air, and to collect data covering vast geographical areas, the development of cheap energy-autonomous sensors for large scale deployment and fine-grained data acquisition is required. Rapid advances in electronics and communication technologies along with the emergence of paradigms such as Cyber-Physical Systems (CPSs) and the Internet of Things (IoT) have led to …
Sensor Technologies For Intelligent Transportation Systems, Juan Guerrero-Ibáñez, Sherali Zeadally, Juan Contreras-Castillo
Sensor Technologies For Intelligent Transportation Systems, Juan Guerrero-Ibáñez, Sherali Zeadally, Juan Contreras-Castillo
Information Science Faculty Publications
Modern society faces serious problems with transportation systems, including but not limited to traffic congestion, safety, and pollution. Information communication technologies have gained increasing attention and importance in modern transportation systems. Automotive manufacturers are developing in-vehicle sensors and their applications in different areas including safety, traffic management, and infotainment. Government institutions are implementing roadside infrastructures such as cameras and sensors to collect data about environmental and traffic conditions. By seamlessly integrating vehicles and sensing devices, their sensing and communication capabilities can be leveraged to achieve smart and intelligent transportation systems. We discuss how sensor technology can be integrated with the …
Multiple Attributes Decision Fusion For Wireless Sensor Networks Based On Intuitionistic Fuzzy Set, Zhenjiang Zhang, Ziqi Hao, Sherali Zeadally, Jing Zhang, Bowen Han, Han-Chieh Chao
Multiple Attributes Decision Fusion For Wireless Sensor Networks Based On Intuitionistic Fuzzy Set, Zhenjiang Zhang, Ziqi Hao, Sherali Zeadally, Jing Zhang, Bowen Han, Han-Chieh Chao
Information Science Faculty Publications
Decision fusion is an important issue in wireless sensor networks (WSN), and intuitionistic fuzzy set (IFS) is a novel method for dealing with uncertain data. We propose a multi-attribute decision fusion model based on IFS, which includes two aspects: data distribution-based IFS construction algorithm (DDBIFCA) and the category similarity weight-based TOPSIS intuitionistic fuzzy decision algorithm (CSWBT-IFS). The DDBIFCA is an IFS construction algorithm that transforms the original attribute values into intuitionistic fuzzy measures, and the CSWBT-IFS is an intuitionistic fuzzy aggregation algorithm improved by the traditional TOPSIS algorithm, which combines intuitionistic fuzzy values of different attributes and obtains a final …
Lightweight Data Aggregation Scheme Against Internal Attackers In Smart Grid Using Elliptic Curve Cryptography, Debiao He, Sherali Zeadally, Huaqun Wang, Qin Liu
Lightweight Data Aggregation Scheme Against Internal Attackers In Smart Grid Using Elliptic Curve Cryptography, Debiao He, Sherali Zeadally, Huaqun Wang, Qin Liu
Information Science Faculty Publications
Recent advances of Internet and microelectronics technologies have led to the concept of smart grid which has been a widespread concern for industry, governments, and academia. The openness of communications in the smart grid environment makes the system vulnerable to different types of attacks. The implementation of secure communication and the protection of consumers’ privacy have become challenging issues. The data aggregation scheme is an important technique for preserving consumers’ privacy because it can stop the leakage of a specific consumer’s data. To satisfy the security requirements of practical applications, a lot of data aggregation schemes were presented over the …
Lightweight Three-Factor Authentication And Key Agreement Protocol For Internet-Integrated Wireless Sensor Networks, Qi Jiang, Sherali Zeadally, Jianfeng Ma, Debiao He
Lightweight Three-Factor Authentication And Key Agreement Protocol For Internet-Integrated Wireless Sensor Networks, Qi Jiang, Sherali Zeadally, Jianfeng Ma, Debiao He
Information Science Faculty Publications
Wireless sensor networks (WSNs) will be integrated into the future Internet as one of the components of the Internet of Things, and will become globally addressable by any entity connected to the Internet. Despite the great potential of this integration, it also brings new threats, such as the exposure of sensor nodes to attacks originating from the Internet. In this context, lightweight authentication and key agreement protocols must be in place to enable end-to-end secure communication. Recently, Amin et al. proposed a three-factor mutual authentication protocol for WSNs. However, we identified several flaws in their protocol. We found that their …
Efficient Revocable Id-Based Signature With Cloud Revocation Server, Xiaoying Jia, Debiao He, Sherali Zeadally, Li Li
Efficient Revocable Id-Based Signature With Cloud Revocation Server, Xiaoying Jia, Debiao He, Sherali Zeadally, Li Li
Information Science Faculty Publications
Over the last few years, identity-based cryptosystem (IBC) has attracted widespread attention because it avoids the high overheads associated with public key certificate management. However, an unsolved but critical issue about IBC is how to revoke a misbehaving user. There are some revocable identity-based encryption schemes that have been proposed recently, but little work on the revocation problem of identity-based signature has been undertaken so far. One approach for revocation in identity-based settings is to update users' private keys periodically, which is usually done by the key generation center (KGC). But with this approach, the load on the KGC will …
Isbord: Internet Searching Based On Resource Description, Zhiwei Yan, Sherali Zeadally, Guanggang Geng
Isbord: Internet Searching Based On Resource Description, Zhiwei Yan, Sherali Zeadally, Guanggang Geng
Information Science Faculty Publications
Based on the Information-Centric Networking (ICN) concept and the mature model of the current TCP/IP-based Internet, we propose content searching based on universal and scalable resource description, namely ISBORD (Internet Searching based on Resource Description). This novel concept aims to improve the efficiency of content searching and simplifies the end-user functionality to support the evolution of the content-centric Internet.
Distributed All-Ip Mobility Management Architecture Supported By The Ndn Overlay, Zhiwei Yan, Guanggang Geng, Sherali Zeadally, Yong-Jin Park
Distributed All-Ip Mobility Management Architecture Supported By The Ndn Overlay, Zhiwei Yan, Guanggang Geng, Sherali Zeadally, Yong-Jin Park
Information Science Faculty Publications
Two of the most promising candidate solutions for realizing the next-generation all-IP mobile networks are Mobile IPv6 (MIPv6), which is the host-based and global mobility supporting protocol, and Proxy MIPv6 (PMIPv6), which is the network-based and localized mobility supporting protocol. However, the unprecedented growth of mobile Internet traffic has resulted in the development of distributed mobility management (DMM) architecture by the Internet engineering task force DMM working group. The extension of the basic MIPv6 and PMIPv6 to support their distributed and scalable deployment in the future is one of the major goals of the DMM working group. We propose an …
Teaching Cybersecurity Using The Cloud, Khaled Salah, Mohammad Hammoud, Sherali Zeadally
Teaching Cybersecurity Using The Cloud, Khaled Salah, Mohammad Hammoud, Sherali Zeadally
Information Science Faculty Publications
Cloud computing platforms can be highly attractive to conduct course assignments and empower students with valuable and indispensable hands-on experience. In particular, the cloud can offer teaching staff and students (whether local or remote) on-demand, elastic, dedicated, isolated, (virtually) unlimited, and easily configurable virtual machines. As such, employing cloud-based laboratories can have clear advantages over using classical ones, which impose major hindrances against fulfilling pedagogical objectives and do not scale well when the number of students and distant university campuses grows up. We show how the cloud paradigm can be leveraged to teach a cybersecurity course. Specifically, we share our …