http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
A secure billing protocol over attribute-based encryption in vehicular cloud computing
Nkenyereye, Lewis,Park, Youngho,Rhee, Kyung Hyune Springer (Biomed Central Ltd.) 2016 EURASIP journal on wireless communications and net Vol.2016 No.-
<P>The integration of cloud computing into vehicular ad hoc networks (VANETs) has allowed the possibility of offering multiple services to the vehicle owners ranging from safety to entertainment services. The ubiquitousness of cloud computing involves a multitude of service providers; thus, an efficient and secure access control mechanism is required. However, rigorous security features need to be addressed for such commercial-based services to be fully adopted. In this paper, we present a secure billing protocol over attribute-based encryption in vehicular cloud computing. We achieve the identity privacy of the vehicles and their requested services through pseudonym techniques. Certificateless signature scheme is used to assure the authentication of legitimate vehicles which can enjoy the provided services. We use attribute-based encryption to guarantee access control based on the purchased services. We make use of hash chain technique to provide authorization through electronic voucher (credits) which a vehicle has to possess in order to purchase a service. Unlike existing protocols in VANETS, the proposed protocol is not built on expensive bilinear pairing operations. We provide the efficiency of the proposed protocol through performance analysis and simulation.</P>
Nkenyereye, Lewis,Rhee, Kyung-Hyune Korea Multimedia Society 2016 멀티미디어학회논문지 Vol.19 No.7
Traffic violations such as moving while the traffic lights are red have come from a simple omission to a premeditated act. The traffic control center cannot timely monitor all the cameras installed on the roads to trace and pursue those traffic violators. Modern vehicles are equipped and controlled by several sensors in order to support monitoring and reporting those kind of behaviors which some time end up in severe causalities. However, such applications within the vehicle environment need to provide security guaranties. In this paper, we address the limitation of previous work and present a secure and privacy preserving protocol for traffic violation reporting system in vehicular cloud environment which enables the vehicles to report the traffic violators, thus the roadside clouds collect those information which can be used as evidence to pursue the traffic violators. Particularly, we provide the unlinkability security property within the proposed protocol which also offers lightweight computational overhead compared to previous protocol. We consider the concept of conditional privacy preserving authentication without pairing operations to provide security and privacy for the reporting vehicles.
Blockchain and Privacy for the Internet of Medical Things Enabled Healthcare Systems : A Survey
Niyera Asaph,Nkenyereye Lewis 한국디지털융합학회 2022 IJICTDC Vol.7 No.1
Using medical devices improves the quality of medical care and the work of health personnel. But this use of medical objects accumulates in its path a lot of sensitive personal medical data that must be managed and secured, which is why during the collection of data which is carried out by the medical object, the transmission of data which can be physical or not and storage of data which can be local or remote security must be maintained during all these steps. Blockchain technology is a better solution for medical data security because of its many advantages, integrity, auditability, and validity. In this article, we reviewed the techniques and means proposed by other research to improve security, whether during the collection, transmission, or storage of medical data, and the challenges of implementing blockchain technology in IoMT.
A Short Review On Swarm Of Unmanned Aerial Vehicles
Kelvin Dushime,Lewis Nkenyereye,Naqqash Dilshad,JaeSeung Song 한국통신학회 2022 한국통신학회 학술대회논문집 Vol.2022 No.2
Many social insects and animals exhibit collective behavior, which inspires the development of multi-vehicle control systems. The distributed nature of the multi-vehicle control problem improves the collective system’s performance in terms of scalability, robustness, and fault tolerance. The cooperative control task’s broadcast/decentralized nature introduces a slew of sub-problems frequently associated with the network control design of a swarm of drones. The purpose of this research is to present a classification of Unmanned Aerial vehicles (UAVs) based on their number of rotors and to examine the fundamental properties of swarming drones. Drones’ functionality, challenges, and importance are presented to achieve these objectives.
Collision Avoidance Systems for Internet of drones: An overview
Kelvin Dushime,Naqqash Dilshad,Lewis Nkenyereye,JaeSeung Song 한국통신학회 2021 한국통신학회 학술대회논문집 Vol.2021 No.6
Internet of Drones (IoD) paradigm offers a wide range of applications mainly targeting the military and civilian environments. Some of those applications include transportation, agriculture based systems, entertainment, weather monitoring, healthcare systems and road hazards monitoring. However, once an area is highly congested by various number of drones, dynamic or statics obstacles can hinder the overall performance of drones. In order to avoid those obstacles, one of the proposed solution is to apply collision avoidance techniques while the drones are on duty. In this paper, we present an brief survey of collision avoidance systems for the internet of drones. We have reviewed the current literature review ranging from the year 2010 to 2021. This work has taken into consideration two main frequently used database in the academia: Xplore for IEEE and ScienceDirect for Elsevier. After article selection, only 15 articles were retained and discussed. A detailed discussion and analysis of selected articles was made while most of the techniques used in collision avoidance systems include video based systems and swarm based intelligence approaches. Finally, this paper provides concluding remarks and future research orientation that will mainly focus on AI based systems for collision avoidance systems.
Prognostic role of EGR1 in breast cancer: a systematic review
( Subbroto Kumar Saha ),( S. M. Riazul Islam ),( Tripti Saha ),( Afsana Nishat ),( Polash Kumar Biswas ),( Minchan Gil ),( Lewis Nkenyereye ),( Shaker El-sappagh ),( Saiful Islam ),( Ssang-goo Cho ) 생화학분자생물학회 2021 BMB Reports Vol.54 No.10
EGR1 (early growth response 1) is dysregulated in many cancers and exhibits both tumor suppressor and promoter activities, making it an appealing target for cancer therapy. Here, we used a systematic multi-omics analysis to review the expression of EGR1 and its role in regulating clinical outcomes in breast cancer (BC). EGR1 expression, its promoter methylation, and protein expression pattern were assessed using various publicly available tools. COSMIC-based somatic mutations and cBioPortal-based copy number alterations were analyzed, and the prognostic roles of EGR1 in BC were determined using Prognoscan and Kaplan-Meier Plotter. We also used bc-GenEx-Miner to investigate the EGR1 co-expression profile. EGR1 was more often downregulated in BC tissues than in normal breast tissue, and its knockdown was positively correlated with poor survival. Low EGR1 expression levels were also associated with increased risk of ER+, PR+, and HER2- BCs. High positive correlations were observed among EGR1, DUSP1, FOS, FOSB, CYR61, and JUN mRNA expression in BC tissue. This systematic review suggested that EGR1 expression may serve as a prognostic marker for BC patients and that clinicopathological parameters influence its prognostic utility. In addition to EGR1, DUSP1, FOS, FOSB, CYR61, and JUN can jointly be considered prognostic indicators for BC. [BMB Reports 2021; 54(10): 497-504]