Search results for "Security"

showing 10 items of 1693 documents

Secure random number generation in wireless sensor networks

2014

The increasing adoption of wireless sensor networks as a flexible and inexpensive tool for the most diverse applications, ranging from environmental monitoring to home automation, has raised more and more attention to the issues related to the design of specifically customized security mechanisms. The scarcity of computational, storage, and bandwidth resources cannot definitely be disregarded in such context, and this makes the implementation of security algorithms particularly challenging. This paper proposes a security framework for the generation of true random numbers, which are paramount as the core building block for many security algorithms; the intrinsic nature of wireless sensor no…

Computer Networks and CommunicationsComputer scienceRandom number generationNetwork securitybusiness.industryDistributed computingRangingComputer Science ApplicationsTheoretical Computer ScienceKey distribution in wireless sensor networksComputational Theory and MathematicsRobustness (computer science)Home automationWirelessbusinessWireless sensor networkSoftwareConcurrency and Computation: Practice and Experience
researchProduct

Communication and security in communicating things networks

2020

International audience

Computer Networks and CommunicationsHardware and ArchitectureComputer science0202 electrical engineering electronic engineering information engineering020206 networking & telecommunications020201 artificial intelligence & image processing[INFO]Computer Science [cs]02 engineering and technologyComputer securitycomputer.software_genrecomputerSoftwareComputingMilieux_MISCELLANEOUS
researchProduct

Recent advances on security and privacy in intelligent transportation systems (ITSs)

2019

Computer Networks and CommunicationsHardware and ArchitectureComputer scienceComputer securitycomputer.software_genrecomputerIntelligent transportation systemSoftwareAd Hoc Networks
researchProduct

Energy-Efficient and Secure Resource Allocation for Multiple-Antenna NOMA with Wireless Power Transfer

2018

Non-orthogonal multiple access (NOMA) is considered as one of the promising techniques for providing high data rates in the fifth generation mobile communication. By applying successive interference cancellation schemes and superposition coding at the NOMA receiver, multiple users can be multiplexed on the same subchannel. In this paper, we investigate resource allocation algorithm design for an OFDM-based NOMA system empowered by wireless power transfer. In the considered system, users who need to transmit data can only be powered by the wireless power transfer. With the consideration of an existing eavesdropper, the objective is to obtain secure and energy efficient transmission among mul…

Computer Networks and CommunicationsOrthogonal frequency-division multiplexingComputer sciencewireless power transfer02 engineering and technologysecurityNoma0203 mechanical engineering0202 electrical engineering electronic engineering information engineeringmedicineWirelessResource managementta113: Computer science [C05] [Engineering computing & technology]ta213Renewable Energy Sustainability and the Environmentbusiness.industry020206 networking & telecommunications020302 automobile design & engineeringnon-orthogonal multiple access (NOMA)medicine.disease: Sciences informatiques [C05] [Ingénierie informatique & technologie]power allocationSingle antenna interference cancellationChannel state informationResource allocationsubchannel allocationbusinessEfficient energy useComputer network
researchProduct

A novel secure aggregation scheme for wireless sensor networks using stateful public key cryptography

2015

International audience; Wireless sensor networks (WSNs) are nowadays considered as an important part of the Internet of Things (IoT). In these networks, data aggregation plays an essential role in energy preservation. However, WSNs are usually deployed in hostile and unattended environments (e.g. military applications) in which the confidentiality and integrity security services are widely desired. Recently, homomorphic encryptions have been applied to conceal sensitive information during aggregation such that algebraic operations are done directly on ciphertexts without decryption. The main benefit is that they offer the end-to-end data confidentiality and they do not require expensive com…

Computer Networks and Communicationsbusiness.industryComputer scienceWireless sensor networks WSNsSimple power analysisSecure data aggregationHomomorphic encryptionCryptographyEncryptionHomomorphic encryptionPublic-key cryptography[SPI]Engineering Sciences [physics]Key distribution in wireless sensor networksStateful firewallHardware and ArchitectureOverhead (computing)businessSecurity levelWireless sensor networkSoftwareComputer networkAd Hoc Networks
researchProduct

Collaborative body sensor networks: Taxonomy and open challenges

2018

International audience; Single Body Sensor Networks (BSNs) have gained a lot of interest during the past few years. However, the need to monitor the activity of many individuals to assess the group status and take action accordingly has created a new research domain called Collaborative Body Sensor Network (CBSN). In such a new field, understanding CBSN's concept and challenges over the roots requires investigation to allow the development of suitable algorithms and protocols. Although there are many research studies in BSN, CBSN is still in its early phases and studies around it are very few. In this paper, we define and taxonomize CBSN, describe its architecture, and discuss its applicati…

Computer science010401 analytical chemistry[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]02 engineering and technology[INFO.INFO-MO]Computer Science [cs]/Modeling and Simulation01 natural sciencesData science0104 chemical sciences[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]Open research[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]0202 electrical engineering electronic engineering information engineeringResearch studies[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET]020201 artificial intelligence & image processing[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]ArchitectureWireless sensor network2018 IEEE Middle East and North Africa Communications Conference (MENACOMM)
researchProduct

A Novel Priority-Based Ambulance-to-Traffic Light Communication for Delay Reduction in Emergency Rescue Operations

2019

Rescue operations are very critical and sensitive. Only one-second delay could make a serious difference between life and death. Therefore, the delay in rescue operations must be reduced as much as possible. The siren signal can be used to warn other vehicles nearby the ambulance. However, it has no impact on the traffic lights, which is normally a main cause of delay in rescue operations. For this reason, many ambulances get stuck and experience long delay at the intersections, which should not happen by any means. To enhance the rescue operations, this paper proposes a novel Priority-based Ambulance-to-Traffic Light Communication (PATCom). PATCom allows information exchanging between traf…

Computer science020302 automobile design & engineering020206 networking & telecommunications02 engineering and technologyComputer securitycomputer.software_genreEmergency rescuelaw.inventionReduction (complexity)Traffic signal0203 mechanical engineeringlawOn demand0202 electrical engineering electronic engineering information engineeringEvaluation resultStop timeSiren (alarm)Intelligent transportation systemcomputer2019 International Conference on Information and Communication Technologies for Disaster Management (ICT-DM)
researchProduct

Combining conjunctive rule extraction with diffusion maps for network intrusion detection

2013

Network security and intrusion detection are important in the modern world where communication happens via information networks. Traditional signature-based intrusion detection methods cannot find previously unknown attacks. On the other hand, algorithms used for anomaly detection often have black box qualities that are difficult to understand for people who are not algorithm experts. Rule extraction methods create interpretable rule sets that act as classifiers. They have mostly been combined with already labeled data sets. This paper aims to combine unsupervised anomaly detection with rule extraction techniques to create an online anomaly detection framework. Unsupervised anomaly detectio…

Computer scienceAnomaly-based intrusion detection systemNetwork securityintrusion detectiontunkeutumisen havaitseminenFeature extractionDiffusion mapdiffusion mapIntrusion detection systemMachine learningcomputer.software_genrepoikkeavuuden havaitseminenBlack boxtiedon louhintan-grammiCluster analysista113Training setrule extractionbusiness.industryn-gramanomaly detectiondiffuusiokarttakoneoppiminensääntöjen erottaminenAnomaly detectionArtificial intelligenceData miningtiedonlouhintabusinesscomputer2013 IEEE Symposium on Computers and Communications (ISCC)
researchProduct

Encriptación óptica empleando llaves Weierstrass-Mandelbrot

2013

[EN] This paper presents the generation of encryption keys using the local oscillating properties of the partial sums of Weierstrass-Mandelbrot fractal function. In this way, the security key can be replicated if the parameters used to obtain it are known. Therefore, these parameters can be sent instead of sending the key. This procedure reduces the amount of information to be sent and prevents possible interception of the key. Moreover, the key can not be affected by data loss or pollution. The effectiveness of the Weierstrass-Mandelbrot keys were demonstrated by computer simulation in a 4f optical encryption system and the double random phase encoding technique. These keys allow us to enc…

Computer scienceCiencias FísicasÓptica y FotónicaData securityLlaveData lossEncryptionComputer securitycomputer.software_genrelcsh:Education (General)Doble máscaraDouble-masked//purl.org/becyt/ford/1 [https]FractalEncoding (memory)Encriptación ópticaOptical cryptographyCiencias ExactasÓpticaclaves o llavesbusiness.industryFunction (mathematics)//purl.org/becyt/ford/1.3 [https]encriptaciónOptical encryptionoptical cryptography fractal key double-maskedFractal keybusinesslcsh:L7-991FractalAlgorithmcomputerCIENCIAS NATURALES Y EXACTAScriptografíaencriptación óptica fractal llave doble máscara
researchProduct

A self-adaptable distributed CBR version of the EquiVox system

2016

Three dimensional (3D) voxel phantoms are numerical representations of human bodies, used by physicians in very different contexts. In the controlled context of hospitals, where from 2 to 10 subjects may arrive per day, phantoms are used to verify computations before therapeutic exposure to radiation of cancerous tumors. In addition, 3D phantoms are used to diagnose the gravity of accidental exposure to radiation. In such cases, there may be from 10 to more than 1000 subjects to be diagnosed simultaneously. In all of these cases, computation accuracy depends on a single such representation. In this paper, we present EquiVox which is a tool composed of several distributed functions and enab…

Computer scienceComputation0206 medical engineeringBiomedical EngineeringBiophysicsTherapeutic exposureBioengineeringContext (language use)02 engineering and technology[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]computer.software_genreMachine learning[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]Voxel0202 electrical engineering electronic engineering information engineeringComputer visionRepresentation (mathematics)Adaptation (computer science)business.industryMulti-agent system020601 biomedical engineering[INFO.INFO-MO]Computer Science [cs]/Modeling and Simulation[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]Key (cryptography)020201 artificial intelligence & image processing[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET]Artificial intelligence[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businesscomputer
researchProduct