RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
        • 등재정보
        • 학술지명
        • 주제분류
        • 발행연도
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • Anonymous Authentication for Wireless Body Area Networks With Provable Security

        He, Debiao,Zeadally, Sherali,Kumar, Neeraj,Lee, Jong-Hyouk IEEE 2017 IEEE systems journal Vol.11 No.4

        <P>Advances in wireless communications, embedded systems, and integrated circuit technologies have enabled the wireless body area network (WBAN) to become a promising networking paradigm. Over the last decade, as an important part of the Internet of Things, we have witnessed WBANs playing an increasing role in modern medical systems because of its capabilities to collect real-time biomedical data through intelligent medical sensors in or around the patients’ body and send the collected data to remote medical personnel for clinical diagnostics. WBANs not only bring us conveniences but also bring along the challenge of keeping data’s confidentiality and preserving patients’ privacy. In the past few years, several anonymous authentication (AA) schemes for WBANs were proposed to enhance security by protecting patients’ identities and by encrypting medical data. However, many of these schemes are not secure enough. First, we review the most recent AA scheme for WBANs and point out that it is not secure for medical applications by proposing an impersonation attack. After that, we propose a new AA scheme for WBANs and prove that it is provably secure. Our detailed analysis results demonstrate that our proposed AA scheme not only overcomes the security weaknesses in previous schemes but also has the same computation costs at a client side.</P>

      • SCOPUSKCI등재

        Security and Privacy in Ubiquitous Sensor Networks

        Perez, Alfredo J.,Zeadally, Sherali,Jabeur, Nafaa Korea Information Processing Society 2018 Journal of information processing systems Vol.14 No.2

        The availability of powerful and sensor-enabled mobile and Internet-connected devices have enabled the advent of the ubiquitous sensor network (USN) paradigm. USN provides various types of solutions to the general public in multiple sectors, including environmental monitoring, entertainment, transportation, security, and healthcare. Here, we explore and compare the features of wireless sensor networks and USN. Based on our extensive study, we classify the security- and privacy-related challenges of USNs. We identify and discuss solutions available to address these challenges. Finally, we briefly discuss open challenges for designing more secure and privacy-preserving approaches in next-generation USNs.

      • KCI등재

        Security and Privacy in Ubiquitous Sensor Networks

        ( Alfredo J Perez ),( Sherali Zeadally ),( Nafaa Jabeur ) 한국정보처리학회 2018 Journal of information processing systems Vol.14 No.2

        The availability of powerful and sensor-enabled mobile and Internet-connected devices have enabled the advent of the ubiquitous sensor network (USN) paradigm. USN provides various types of solutions to the general public in multiple sectors, including environmental monitoring, entertainment, transportation, security, and healthcare. Here, we explore and compare the features of wireless sensor networks and USN. Based on our extensive study, we classify the security- and privacy-related challenges of USNs. We identify and discuss solutions available to address these challenges. Finally, we briefly discuss open challenges for designing more secure and privacy-preserving approaches in next-generation USNs.

      • KCI등재후보

        ISBORD: Internet Searching based on Resource Description

        Zhiwei Yan,Sherali Zeadally,Guanggang Geng 한국통신학회 2017 ICT Express Vol.3 No.1

        Based on the Information-Centric Networking (ICN) concept and the mature model of the current TCP/IP-based Internet, we propose content searching based on universal and scalable resource description, namely ISBORD (Internet Searching based on Resource Description). This novel concept aims to improve the efficiency of content searching and simplifies the end-user functionality to support the evolution of the content-centric Internet.

      • KCI등재후보

        Machine-to-Machine (M2M) Communications in Vehicular Networks

        ( M. J. Booysen ),( J. S. Gilmore ),( S. Zeadally ),( G. J. Van Rooyen ) 한국인터넷정보학회 2012 KSII Transactions on Internet and Information Syst Vol.6 No.2

        To address the need for autonomous control of remote and distributed mobile systems, Machine-to-Machine (M2M) communications are rapidly gaining attention from both academia and industry. M2M communications have recently been deployed in smart grid, home networking, health care, and vehicular networking environments. This paper focuses on M2M communications in the vehicular networking context and investigates areas where M2M principles can improve vehicular networking. Since connected vehicles are essentially a network of machines that are communicating, preferably autonomously, vehicular networks can benefit a lot from M2M communications support. The M2M paradigm enhances vehicular networking by supporting large-scale deployment of devices, cross-platform networking, autonomous monitoring and control, visualization of the system and measurements, and security. We also present some of the challenges that still need to be addressed to fully enable M2M support in the vehicular networking environment. Of these, component standardization and data security management are considered to be the most significant challenges.

      • Optimizing Channel Access in Wireless Local Area Network Environments with a New Backoff Approach

        Hao-Ming Liang,Ce-Kuen Shieh,Sherali Zeadally,Naveen K Chilamkurti 보안공학연구지원센터 2009 International Journal of Multimedia and Ubiquitous Vol.4 No.2

        Over the past few years, several backoff algorithms such as Exponential Increase Exponential Decrease (EIED) and Adaptive Enhanced Distributed Coordination Function (AEDCF)) have been proposed for wireless local area networks to improve channel access. We propose a new backoff technique that monitors the number of backoff counter pauses experienced and modifies the contention window accordingly. We evaluate and compare the performance of our proposed approach with EIED and AEDCF channel access techniques. Our simulations results, obtained under different network conditions, show improved performance for metrics such as the fairness index and end-to-end delay.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼