Search results for "Security"
showing 10 items of 1693 documents
Secure random number generation in wireless sensor networks
2014
The increasing adoption of wireless sensor networks as a flexible and inexpensive tool for the most diverse applications, ranging from environmental monitoring to home automation, has raised more and more attention to the issues related to the design of specifically customized security mechanisms. The scarcity of computational, storage, and bandwidth resources cannot definitely be disregarded in such context, and this makes the implementation of security algorithms particularly challenging. This paper proposes a security framework for the generation of true random numbers, which are paramount as the core building block for many security algorithms; the intrinsic nature of wireless sensor no…
Communication and security in communicating things networks
2020
International audience
Recent advances on security and privacy in intelligent transportation systems (ITSs)
2019
Energy-Efficient and Secure Resource Allocation for Multiple-Antenna NOMA with Wireless Power Transfer
2018
Non-orthogonal multiple access (NOMA) is considered as one of the promising techniques for providing high data rates in the fifth generation mobile communication. By applying successive interference cancellation schemes and superposition coding at the NOMA receiver, multiple users can be multiplexed on the same subchannel. In this paper, we investigate resource allocation algorithm design for an OFDM-based NOMA system empowered by wireless power transfer. In the considered system, users who need to transmit data can only be powered by the wireless power transfer. With the consideration of an existing eavesdropper, the objective is to obtain secure and energy efficient transmission among mul…
A novel secure aggregation scheme for wireless sensor networks using stateful public key cryptography
2015
International audience; Wireless sensor networks (WSNs) are nowadays considered as an important part of the Internet of Things (IoT). In these networks, data aggregation plays an essential role in energy preservation. However, WSNs are usually deployed in hostile and unattended environments (e.g. military applications) in which the confidentiality and integrity security services are widely desired. Recently, homomorphic encryptions have been applied to conceal sensitive information during aggregation such that algebraic operations are done directly on ciphertexts without decryption. The main benefit is that they offer the end-to-end data confidentiality and they do not require expensive com…
Collaborative body sensor networks: Taxonomy and open challenges
2018
International audience; Single Body Sensor Networks (BSNs) have gained a lot of interest during the past few years. However, the need to monitor the activity of many individuals to assess the group status and take action accordingly has created a new research domain called Collaborative Body Sensor Network (CBSN). In such a new field, understanding CBSN's concept and challenges over the roots requires investigation to allow the development of suitable algorithms and protocols. Although there are many research studies in BSN, CBSN is still in its early phases and studies around it are very few. In this paper, we define and taxonomize CBSN, describe its architecture, and discuss its applicati…
A Novel Priority-Based Ambulance-to-Traffic Light Communication for Delay Reduction in Emergency Rescue Operations
2019
Rescue operations are very critical and sensitive. Only one-second delay could make a serious difference between life and death. Therefore, the delay in rescue operations must be reduced as much as possible. The siren signal can be used to warn other vehicles nearby the ambulance. However, it has no impact on the traffic lights, which is normally a main cause of delay in rescue operations. For this reason, many ambulances get stuck and experience long delay at the intersections, which should not happen by any means. To enhance the rescue operations, this paper proposes a novel Priority-based Ambulance-to-Traffic Light Communication (PATCom). PATCom allows information exchanging between traf…
Combining conjunctive rule extraction with diffusion maps for network intrusion detection
2013
Network security and intrusion detection are important in the modern world where communication happens via information networks. Traditional signature-based intrusion detection methods cannot find previously unknown attacks. On the other hand, algorithms used for anomaly detection often have black box qualities that are difficult to understand for people who are not algorithm experts. Rule extraction methods create interpretable rule sets that act as classifiers. They have mostly been combined with already labeled data sets. This paper aims to combine unsupervised anomaly detection with rule extraction techniques to create an online anomaly detection framework. Unsupervised anomaly detectio…
Encriptación óptica empleando llaves Weierstrass-Mandelbrot
2013
[EN] This paper presents the generation of encryption keys using the local oscillating properties of the partial sums of Weierstrass-Mandelbrot fractal function. In this way, the security key can be replicated if the parameters used to obtain it are known. Therefore, these parameters can be sent instead of sending the key. This procedure reduces the amount of information to be sent and prevents possible interception of the key. Moreover, the key can not be affected by data loss or pollution. The effectiveness of the Weierstrass-Mandelbrot keys were demonstrated by computer simulation in a 4f optical encryption system and the double random phase encoding technique. These keys allow us to enc…
A self-adaptable distributed CBR version of the EquiVox system
2016
Three dimensional (3D) voxel phantoms are numerical representations of human bodies, used by physicians in very different contexts. In the controlled context of hospitals, where from 2 to 10 subjects may arrive per day, phantoms are used to verify computations before therapeutic exposure to radiation of cancerous tumors. In addition, 3D phantoms are used to diagnose the gravity of accidental exposure to radiation. In such cases, there may be from 10 to more than 1000 subjects to be diagnosed simultaneously. In all of these cases, computation accuracy depends on a single such representation. In this paper, we present EquiVox which is a tool composed of several distributed functions and enab…