Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Social and Behavioral Sciences

Compact Hardware Implementation Of A Sha-3 Core For Wireless Body Sensor Networks, Yi Yang, Debiao He, Neeraj Kumar, Sherali Zeadally Jul 2018

Compact Hardware Implementation Of A Sha-3 Core For Wireless Body Sensor Networks, Yi Yang, Debiao He, Neeraj Kumar, Sherali Zeadally

Information Science Faculty Publications

One of the most important Internet of Things applications is the wireless body sensor network (WBSN), which can provide universal health care, disease prevention, and control. Due to large deployments of small scale smart sensors in WBSNs, security, and privacy guarantees (e.g., security and safety-critical data, sensitive private information) are becoming a challenging issue because these sensor nodes communicate using an open channel, i.e., Internet. We implement data integrity (to resist against malicious tampering) using the secure hash algorithm 3 (SHA-3) when smart sensors in WBSNs communicate with each other using the Internet. Due to the limited resources (i.e., storage, …


A Framework For The Performance Analysis And Tuning Of Virtual Private Networks, Fridrich Shane Perez Jun 2018

A Framework For The Performance Analysis And Tuning Of Virtual Private Networks, Fridrich Shane Perez

Theses and Dissertations

With the rising trend of personal devices like laptops and smartphones being used in businesses and significant enterprises, the concern for preserving security arises. In addition to preserving security measures in outside devices, the network speed and performance capable by these devices need to be balanced with the security aspect to avoid slowing down virtual private network (VPN) activity. Performance tests have been done in the past to evaluate available software, hardware, and network security protocol options that will best benefit an entity according to its specific needs. With a variety of comparable frameworks available currently, it is a matter …


Nothing To Hide, Nothing To Fear? Tools And Suggestions For Digital Data Protection, Jedidiah C. Anderson, Erik Skare, Courtney Dorroll May 2018

Nothing To Hide, Nothing To Fear? Tools And Suggestions For Digital Data Protection, Jedidiah C. Anderson, Erik Skare, Courtney Dorroll

The Qualitative Report

The developing cyber-infrastructure has provided new tools, methods, and opportunities to conduct research. However, the Snowden leaks and subsequent developments proved that the same infrastructure has made all-encompassing surveillance possible – posing new challenges for researchers when engaging with those they are obligated to protect. As the cyber-infrastructure simultaneously opens up new possibility-spaces for circumventing structures of surveillance, while drawing on the authors’ own experiences, this article presents a number of tools and suggestions that will aid the researcher to engage more responsibly and safely with the research subject digitally.