Search results for "Access control"

showing 10 items of 79 documents

Investigating Low Level Protocols for Wireless Body Sensor Networks

2016

The rapid development of medical sensors has increased the interest in Wireless Body Area Network (WBAN) applications where physiological data from the human body and its environment is gathered, monitored, and analyzed to take the proper measures. In WBANs, it is essential to design MAC protocols that ensure adequate Quality of Service (QoS) such as low delay and high scalability. This paper investigates Medium Access Control (MAC) protocols used in WBAN, and compares their performance in a high traffic environment. Such scenario can be induced in case of emergency for example, where physiological data collected from all sensors on human body should be sent simultaneously to take appropria…

FOS: Computer and information sciencesComputer scienceComputer Science - Information TheoryTime division multiple accessAccess control[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]02 engineering and technology[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]Body area network0202 electrical engineering electronic engineering information engineeringWirelessProtocol (science)business.industryInformation Theory (cs.IT)Quality of service020208 electrical & electronic engineeringComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020206 networking & telecommunications[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationComputer Science - Distributed Parallel and Cluster Computing[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]Scalability[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET]Distributed Parallel and Cluster Computing (cs.DC)[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businessWireless sensor networkComputer network
researchProduct

A Proposed Access Control-Based Privacy Preservation Model to Share Healthcare Data in Cloud

2020

Healthcare data in cloud computing facilitates the treatment of patients efficiently by sharing information about personal health data between the healthcare providers for medical consultation. Furthermore, retaining the confidentiality of data and patients' identity is a another challenging task. This paper presents the concept of an access control-based (AC) privacy preservation model for the mutual authentication of users and data owners in the proposed digital system. The proposed model offers a high-security guarantee and high efficiency. The proposed digital system consists of four different entities, user, data owner, cloud server, and key generation center (KGC). This approach makes…

FOS: Computer and information sciencesKey generationComputer Science - Cryptography and Security020205 medical informaticsbusiness.industryComputer science020206 networking & telecommunicationsAccess controlCloud computing02 engineering and technologyMutual authenticationEncryptionPublic-key cryptographyData sharingComputer Science - Computers and SocietyComputers and Society (cs.CY)0202 electrical engineering electronic engineering information engineeringSession keybusinessCryptography and Security (cs.CR)Computer network2020 16th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)
researchProduct

UML/OCL-based modeling of work-based access control policies for collaborative healthcare systems

2016

A work-based access control (WBAC) model is proposed by introducing the team role concept and modifying the user-role assignment model from a previous work. The main goals of WBAC are flexibility, easy manageability, security, as well as suitability to support cooperative work of dynamic teams in healthcare environments. One of the major challenges of WBAC regards authorization constraints in terms of organizational policies. In this article, we show how Unified Modeling Language (UML) and Object Constraints Language (OCL) are utilized to design and analyze the authorization constraints of WBAC in cooperative engagements with complex scenarios in the collaborative healthcare domain. We also…

Flexibility (engineering)021110 strategic defence & security studies021103 operations researchKnowledge managementComputer sciencebusiness.industry0211 other engineering and technologiesAccess control02 engineering and technologyObject (computer science)Domain (software engineering)Work (electrical)Unified Modeling LanguagebusinessSoftware engineeringcomputerObject Constraint Languagecomputer.programming_languageEclipse2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom)
researchProduct

A “Best Current Practice” for 3GPP-based cellular system security

2014

This paper is an attempt at formulating a Best Current Practice (BCP) for access security and a baseline for core network security in the 3GPP-based systems. This encompasses the 2G circuit-switched GSM system, the 2.5G packet-switched GPRS system, the 3G UMTS system and the 4G LTE/LTE-A system. The 3GPP have defined several security standards, but many measures are optional and there are several areas deliberately not covered by the 3GPP standards. The present document is therefore an attempt at pointing out the best available options and providing advice on how to achieve an overall system hardening, which is badly needed as the cellular systems have undoubtedly become one of the most cri…

GPRS core networkCustomised Applications for Mobile networks Enhanced LogicSecurity serviceComputer scienceGSMNetwork Access ControlGeneral Packet Radio ServiceComputer securitycomputer.software_genreBest current practicecomputerUMTS frequency bands2014 4th International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems (VITAE)
researchProduct

Safeguarding the Ultra-dense Networks with the aid of Physical Layer Security: A review and a case study

2016

In the wake of the extensive application of the fourth generation system, investigations of new technologies have been moving ahead vigorously to embrace the next generation communications in 2020. Thereinto, the technique of ultra-dense networks (UDNs) serves as a key enabler in meeting the roaring mobile traffic demands. With the prevalence of mobile Internet services especially those involve the mobile payment, security has gained an unprecedented amount of attention and become a highlighted feature for the fifth generation. Resource allocation, one of the most significant tools on getting over the obstacle of ubiquitous interference as well as elevating the spectrum/energy efficiency, h…

General Computer Scienceinformation securityComputer scienceMobile computingresource allocationMobile Web02 engineering and technologyComputer securitycomputer.software_genreSecurity information and event managementPublic land mobile network0203 mechanical engineeringSecurity association0202 electrical engineering electronic engineering information engineeringMobile paymentGeneral Materials ScienceResource managementCloud computing securityIMT AdvancedGeneral EngineeringPhysical layer020302 automobile design & engineering020206 networking & telecommunicationsInformation securityComputer security modelultra-dense networksSecurity serviceNetwork Access ControlNetwork security policyResource allocationlcsh:Electrical engineering. Electronics. Nuclear engineeringlcsh:TK1-9971computer5GEfficient energy useIEEE Access
researchProduct

Review of detection, assessment and mitigation of security risk in smart grid

2017

The integration of Information and Communication Technology (ICT) into the existing power grid has created new problems to the grid. The grid network has become more vulnerable to security threats and risk which is a corollary to the modern data network. Smart Grid has strict latency requirement for data communication and the violation of this latency is very costly. This paper assesses the threats and vulnerabilities associated with the Smart Grid network and reviews the methods to mitigate these security risks.

Grid networkComputer sciencebusiness.industryAccess controlComputer securitycomputer.software_genreGridSmart gridInformation and Communications TechnologyMalwareRisk assessmentbusinesscomputerRisk management2017 2nd International Conference on Power and Renewable Energy (ICPRE)
researchProduct

Revisit of RTS/CTS Exchange in High-Speed IEEE 802.11 Networks

2005

IEEE 802.11 medium access control (MAC), called distributed coordination function (DCF), provides two different access modes, namely, 2-way (basic access) and 4-way (RTS/CTS) handshaking. The 4-way handshaking has been introduced in order to combat the hidden terminal phenomenon. It has been also proved that such a mechanism can be beneficial even in the absence of hidden terminals, because of the collision time reduction. We analyze the effectiveness of the RTS/CTS access mode, in current 802.11b and 802.11a networks. Since the rates employed for control frame transmissions can be much lower than the rate employed for data frames, the assumption on the basis of the 4-way handshaking introd…

Hidden node problembusiness.industryComputer scienceReal-time computingFrame (networking)Wireless local area networks (WLAN)Distributed coordination functionThroughputbackoff algorithmHandshakingMedia access controlMultiple Access with Collision Avoidance for WirelessIEEE 802.11e-2005businessCarrier sense multiple access with collision avoidanceComputer networkSixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks
researchProduct

Scheduling solution for the IEEE 802.16 base station

2008

The IEEE 802.16 standard defines a wireless broadband access network technology called WiMAX. It introduces several advantages, one of which is the support for QoS at the MAC level. To ensure meeting the QoS requirements, the 802.16 base station must run some algorithm to allocate slots between connections. This algorithm is not defined in the 802.16 specification but rather is open for alternative implementations. We propose a simple, yet efficient, solution that is capable of allocating slots based on the QoS requirements, bandwidth request sizes, and the 802.16 network parameters. To test the proposed solution, we have implemented the 802.16 MAC and PHY layers in the NS-2 simulator. Seve…

IEEE 802Access networkComputer Networks and CommunicationsComputer sciencebusiness.industryBroadband networksQuality of serviceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSAccess controlWiMAXScheduling (computing)Base stationPHYResource allocationResource managementbusinessComputer networkComputer Networks
researchProduct

A performance analysis of block ACK scheme for IEEE 802.11e networks

2010

The demand for the IEEE 802.11 wireless local-area networks (WLANs) has been drastically increasing along with many emerging applications and services over WLAN. However, the IEEE 802.11 medium access control (MAC) is known to be limited in terms of its throughput performance due to the high MAC overhead, such as interframe spaces (IFS) or per-frame based acknowledgement (ACK) frame transmissions. The IEEE 802.11e MAC introduces the block ACK scheme for improving the system efficiency of the WLAN. Using the block ACK scheme can reduce the ACK transmission overhead by integrating multiple ACKs for a number of data frames into a bitmap that is contained in a block ACK frame, thus increasing t…

IEEE 802Settore ING-INF/03 - TelecomunicazioniComputer Networks and CommunicationsComputer sciencebusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSAcknowledgementFrame (networking)medium access controlThroughputCode rateWireless lanOverhead (computing)Wirelessperformance analysisbusinesswireless lanBlock (data storage)Computer networkComputer Networks
researchProduct

Privacy preserving mechanisms for enforcing security and privacy requirements in E-health solutions

2016

In the last few decades, there have been significant efforts in integrating information and communication technologies (ICT) into healthcare practices. This new paradigm commonly identified as electronic healthcare (e-health) allows provisioning of healthcare services at an affordable price to its consumers. However, there have been questions raised about the security of the sensitive information such as health records as well as the privacy of involving parties raising doubts on the minds of the general public. Thus, it is important to understand the potential security challenges in e-health systems and successfully resolve them by taking adequate measures to ensure fair utilization of suc…

Information privacy020205 medical informaticsPrivacy by DesignComputer Networks and Communicationsbusiness.industryPrivacy softwareComputer scienceInternet privacyAccess controlProvisioning02 engineering and technologyLibrary and Information SciencesComputer securitycomputer.software_genreInformation sensitivityInformation and Communications Technology0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingbusinesscomputerPersonally identifiable informationInformation SystemsInternational Journal of Information Management
researchProduct