Browsing by Subject "Network security"
Now showing items 21-40 of 53
-
DistPrivacy: Privacy-Aware Distributed Deep Neural Networks in IoT surveillance systems
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)With the emergence of smart cities, Internet of Things (IoT) devices as well as deep learning technologies have witnessed an increasing adoption. To support the requirements of such paradigm in terms of memory and computation, ... -
Distributed Event-Triggered Consensus-Based Control of DC Microgrids in Presence of DoS Cyber Attacks
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)In this paper, the problem of distributed event-based control of large scale power systems in presence of denial-of-service (DoS) cyber attacks is addressed. Towards this end, a direct current (DC) microgrid composed of ... -
Dynamical observer for continuous linear Roesser systems
( Elsevier B.V. , 2020 , Conference Paper)Monitoring of industrial systems for anomalies such as faults and cyber-attacks as unknown and extremely undesirable inputs in the presence of other inputs (like disturbances) is an important issue for ensuring the safety ... -
Evolution of Internet of Things from Blockchain to IOTA: A Survey
( Institute of Electrical and Electronics Engineers Inc. , 2022 , Article)Internet of Things (IoT) is the new paradigm to the scaling nature of things and their elements, interconnected, exchanging data over a network supported with nodes. The Ubiquitous use of tiny devices and embedded sensor ... -
Flow-based intrusion detection algorithm for supervisory control and data acquisition systems: A real-time approach
( John Wiley and Sons Inc , 2021 , Article)Intrusion detection in supervisory control and data acquisition (SCADA) systems is integral because of the critical roles of these systems in industries. However, available approaches in the literature lack representative ... -
Fuzzy Elliptic Curve Cryptography for Authentication in Internet of Things
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)The security and privacy of the network in Internet of Things (IoT) systems are becoming more critical as we are still more dependent on smart systems. Considering that packets are exchanged between the end user and the ... -
Hierarchical Federated Learning for Collaborative IDS in IoT Applications
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference Paper)As the Internet-of-Things devices are being very widely adopted in all fields, such as smart houses, healthcare, and transportation, extremely huge amounts of data are being gathered, shared, and processed. This fact raises ... -
Hierarchical security paradigm for iot multiaccess edge computing
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)The rise in embedded and IoT device usage comes with an increase in LTE usage as well. About 70% of an estimated 18 billion IoT devices will be using cellular LTE networks for efficient connections. This introduces several ... -
Impact of forced and unforced system parameter variations on network stability and system economics of radial MTDC networks
( Elsevier Ltd , 2020 , Article)This paper focuses on investigating the impact of system parameters uncertainty on voltage droop-controlled Multi-Terminal High-Voltage DC (MTDC) networks. The voltage droop typically controls the power-sharing among the ... -
Improved relay selection for decode-and-forward cooperative wireless networks under secrecy rate maximization
( Institute of Electrical and Electronics Engineers Inc. , 2014 , Conference Paper)Privacy and security have an increasingly important role in wireless networks. A secure communication enables a legitimate destination to successfully retrieve information sent by a source, while it disables the eavesdropper ... -
Integrating Blockchain Technology in 5G enabled IoT: A Review
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)In the digitized world, Internet of thing(IoT) is growing rapidly and most of the devices are connected by internet technology. IoT connected more than 5 million devices across the world and it needs high power internet ... -
Iterative per Group Feature Selection for Intrusion Detection
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)Network security is an critical subject in any distributed network. Recently, machine learning has proven their efficiency for intrusion detection. By using a comprehensive dataset with multiple attack types, a well-trained ... -
Joint physical-application layer security for wireless multimedia delivery
( Institute of Electrical and Electronics Engineers Inc. , 2014 , Article)In recent years, there have been increasing demands for the security of wireless multimedia applications. Essentially, wireless networks, compared to traditional wired networks, are more likely to suffer from malicious ... -
Light-weight encryption of wireless communication for implantable medical devices using henon chaotic system
( Institute of Electrical and Electronics Engineers Inc. , 2017 , Conference Paper)Implantable Medical Devices (IMDs) are a growing industry regarding personal health care and monitoring. In addition, they provide patients with efficient treatments. In general, these devices use wireless communication ... -
Mitigation and resiliency of multi-agent systems subject to malicious cyber attacks on communication links
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)This paper aims at investigating a novel type of cyber attack that is injected to multi-agent systems (MAS) having an underlying directed graph. The cyber attack, which is designated as the controllability attack, is ... -
Monitoring and detection of malicious adversarial zero dynamics attacks in cyber-physical systems
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)This paper is mainly concerned with monitoring and detection of zero dynamics (ZD) cyber attacks that are injected by malicious hackers and adversaries to safety critical cyber-physical systems (CPS). We consider a CPS ... -
Network Coding versus Replication Based Resilient Techniques to Mitigate Insider Attacks for Smart Metering
( SAGE publications , 2015 , Article)The main focus of this paper is the resilience of communication protocols for data gathering in distributed, large scale, and dense networks. In our previous work, we have proposed the resilient methods based on random ... -
Performance Analysis of PLS key generation-based Secure NOMA-enabled IoT Networks in the presence of Untrusted Users
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference Paper)In Internet of Things (IoT), a massive amount of sensitive data is generated and transmitted by IoT devices. Security risks represent a major concern in IoT, especially when using innovative techniques such as Non-Orthogonal ... -
Performance Evaluation of Multimedia Transmission over Error-Prone Wireless Channel Using Block and Stream Ciphers.
(2021 , Professional Masters Project)Network security is one of the crucial topics discussed nowadays, as the world is emerging towards new systems and technologies such as Artificial Intelligence (AI), blockchain, and Internet of Things (IoT). Cryptography ... -
Privacy-Preserving Distributed IDS Using Incremental Learning for IoT Health Systems
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)Existing techniques for incremental learning are computationally expensive and produce duplicate features leading to higher false positive and true negative rates. We propose a novel privacy-preserving intrusion detection ...