Article
Chemistry, Multidisciplinary
Vangelis Malamas, George Palaiologos, Panayiotis Kotzanikolaou, Mike Burmester, Dimitris Glynos
Summary: In this study, the HMBAC model and Janus system are proposed for flexible policy management in multi-authority and multi-domain environments, aiming to achieve interoperability and scalability without strong trust assumptions. The HMBAC model supports dynamic trust management, flexible access control policy enforcement, and a global source of truth. Janus implements the HMBAC model using a Hierarchical Multi-Blockchain architecture and a Multi-Authority Attribute-Based Encryption protocol. Experimental validation confirms the effectiveness and efficiency of Janus.
APPLIED SCIENCES-BASEL
(2023)
Article
Computer Science, Information Systems
Adam Ibrahim Abdi, Fathy Elbouraey Eassa, Kamal Jambi, Khalid Almarhabi, Maher Khemakhem, Abdullah Basuhail, Mohammad Yamin
Summary: The rapid growth of IoT and its distributed environment pose challenges to global device management. This paper proposes a lightweight hierarchical blockchain-based multi-chaincode access control system and validates its concept, showing its efficiency and effectiveness.
Article
Chemistry, Analytical
Nadine Kashmar, Mehdi Adda, Hussein Ibrahim
Summary: The advancements in information technologies have introduced challenges and concepts for integrating advanced and autonomous systems in dynamic and heterogeneous structures, such as IoT networks. Protecting resources by controlling access is complex due to the diversity and heterogeneity of access control models. A proposed HEAD AC metamodel aims to address this issue by encompassing existing AC models' heterogeneity and enabling the generation of various static and dynamic AC policies.
Article
Computer Science, Hardware & Architecture
Richa Sarma, Chandan Kumar, Ferdous Ahmed Barbhuiya
Summary: With the rapid development of IoT, the need for efficient data analysis and processing has led to the development of fog computing. However, data security risks arise due to multiple levels of storage and computation. To address these issues, a multi-authority CP-ABE scheme named MACFI is proposed, which offers efficient ciphertext and secret key size, reduces computation overhead for data users, and is secure and suitable for IoT applications.
JOURNAL OF SYSTEMS ARCHITECTURE
(2022)
Article
Computer Science, Information Systems
Leyou Zhang, Guang Yang, Chao Song, Qing Wu
Summary: This paper proposes an accountable multi-authority access control framework based on attribute-based encryption (ABE) to address security and privacy issues in smart grid systems.
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES
(2023)
Article
Computer Science, Information Systems
Meiyan Xiao, Qiong Huang, Ying Miao, Shunpeng Li, Willy Susilo
Summary: This article proposes a fine-grained access control system based on Key-Policy Attribute-Based Encryption scheme and blockchain to meet the needs of data sharing services, and provides security analysis and system implementation.
IEEE TRANSACTIONS ON SERVICES COMPUTING
(2022)
Article
Computer Science, Information Systems
Soumya Banerjee, Basudeb Bera, Ashok Kumar Das, Samiran Chattopadhyay, Muhammad Khurram Khan, Joel J. P. C. Rodrigues
Summary: Recent advances in LPWAN are expected to enhance the proliferation of IIoT, but concerns about security and privacy challenges remain. This work proposes a novel blockchain-based user access control scheme for data security and scalability in IIoT. The scheme encrypts data using CP-ABE, supports multiple attribute authorities, and provides secure data access through blockchain implementation. Security analysis shows the scheme's robustness against attacks, and comparison with existing schemes highlights its advantages.
COMPUTER COMMUNICATIONS
(2021)
Article
Computer Science, Information Systems
Peng Wang, Ning Xu, Haibin Zhang, Wen Sun, Abderrahim Benslimane
Summary: This article proposes a dynamic and lightweight attribute-based access control framework for blockchain-empowered IoT, which achieves secure and fine-grained authorization. The access policy is executed through smart contract in blockchain, and a decentralized application-based framework is designed to adapt to delay-intolerant applications.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Computer Science, Information Systems
Songbo Zhang, Kwok-Yan Lam, Bowen Shen, Li Wang, Feng Li
Summary: In IoT, the improvement of spectrum efficiency has become a research focus due to the proliferation of IoT terminals and the increasing demand for broadband services. Dynamic spectrum access or sharing is commonly used to address this challenge, and there has been growing research on dynamic spectrum access based on machine learning models such as Q-learning, deep reinforcement learning, and federated learning. However, when using federated learning for dynamic spectrum access, there are still key challenges to be investigated, such as personalized model selection and parameter updates, and meeting the needs of different devices with a single global model.
Article
Computer Science, Software Engineering
Hideyat Zerga, Asma Amraoui, Badr Benmammar
Summary: This article introduces the methods of achieving distributed and reliable access control for telehealth systems using smart contract-enabled blockchain technology. Three smart contract-based access control approaches are proposed and evaluated, with a comparison to related work in terms of access-request response latency and gas consumption. A security analysis is also provided.
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE
(2022)
Article
Computer Science, Information Systems
Maha Aboelmaged, Ali Shisha, Mohamed A. Abd El Ghany
Summary: This paper introduces a high-performance dynamic security system that utilizes dynamic partial reconfiguration to switch between different cipher algorithms, offering the flexibility to choose between algorithm hopping or power adaptive techniques based on system requirements, aiming to ensure IoT system data security.
Article
Computer Science, Information Systems
Zetian Wang, Yunfa Li, Guanxu Liu, Di Zhang
Summary: With the increasing threats to the Internet of Things (IoT), access control is widely used in various IoT information systems. However, the low computing power of IoT devices limits the use of high-performance methods for user access control. While the blockchain offers an alternative solution for access control, its implementation requires devices to complete proof of work (PoW) and have high computing power. Most existing access control schemes are designed for individual user use and cannot be applied to multi-user coordinated access. Therefore, this paper proposes a multi-user collaborative access control scheme based on a new hash chain, which uses the identity information of multiple users to construct the hash chain and utilizes it as the PoW for the blockchain. Efficiency analysis demonstrates that this method only requires a small amount of hash value calculation and can be applied to low-computing power IoT systems. Security analysis shows that the scheme can withstand various attack methods and provides high security.
Article
Computer Science, Information Systems
Jin Gu, Jianqiang Shen, Baoyun Wang
Summary: This paper proposes a robust multi-authority based CP-ABE scheme for cloud storage, where attribute associated keys can only be distributed if the active authorities involved exceed a specified threshold. The scheme can tolerate less than t authorities being compromised or no more than n - t authorities being crashed.
PEER-TO-PEER NETWORKING AND APPLICATIONS
(2021)
Article
Computer Science, Hardware & Architecture
Ruonan Ma, Leyou Zhang
Summary: The fog computing paradigm extends the facilities of IoT to the edge of the network, providing increased convenience. However, security challenges such as unauthorized access, collusion attacks, cloud attacks, and privacy leaks still exist. Xiong et al. proposed a scheme to address these issues, but it couldn't resist collusion attacks. This study analyzes SEM-ACSIT and proposes a secure and privacy-preserving multi-authority access control scheme named SPMAC, which achieves flexible revocation and resistance against various collusion attacks.
JOURNAL OF SYSTEMS ARCHITECTURE
(2023)
Article
Chemistry, Analytical
Reetu Gupta, Priyesh Kanungo, Nirmal Dagdee, Golla Madhu, Kshira Sagar Sahoo, N. Z. Jhanjhi, Mehedi Masud, Nabil Sharaf Almalki, Mohammed A. AlZain
Summary: With the advancement of Internet technology and increased use of cryptographic techniques, the cloud has become the preferred choice for data sharing. The SP-MAACS scheme proposed in this work provides a secure and privacy-preserving multi-authority access control system for cloud-based healthcare data sharing. It ensures policy privacy by only disclosing the names of policy attributes while keeping the attribute values hidden. The scheme offers features such as multi-authority setting, flexible access policy structure, privacy preservation, and scalability.
Article
Computer Science, Artificial Intelligence
Huali Ren, Teng Huang, Hongyang Yan
Summary: Deep learning technology is vulnerable to adversarial examples, which bring serious security risks to systems. This paper provides a comprehensive overview of adversarial attacks and defenses in the real physical world, analyzing challenges faced by applications and summarizing works on generating adversarial examples and defense strategies in various tasks. Based on this, potential research directions for adversarial examples in the physical world are proposed.
INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS
(2021)
Article
Chemistry, Analytical
Maged Mohammed, Khaled Riad, Nashi Alqahtani
Summary: This study utilized cloud IoT solutions to control a modern subsurface irrigation system for date palms in arid regions, achieving efficient irrigation management through sensor-based irrigation scheduling. The CSIS with the S-BIS method showed positive impact on water productivity and fruit yield of date palms.
Article
Computer Science, Information Systems
Khaled Riad, Mohamed Elhoseny
Summary: This paper proposes an access control scheme using blockchain to protect sensitive data in open banking systems. Experimental results show that the proposed scheme has advantages in response time and security against attacks compared to other methods.
WIRELESS COMMUNICATIONS & MOBILE COMPUTING
(2022)
Editorial Material
Computer Science, Information Systems
Nan Jiang, Khaled Riad, Weiwei Lin
JOURNAL OF HIGH SPEED NETWORKS
(2022)
Article
Computer Science, Artificial Intelligence
Jiamin Zheng, Teng Huang, Jiahui Huang
Summary: Federated learning is an important learning paradigm in privacy-preserving machine learning systems. However, standard federated learning struggles with adjusting for large disparities in client datasets, leading to performance degradation. In this paper, a novel scheme called client reputation federated learning is proposed, which dynamically assesses client reputation to improve model accuracy and convergence rate.
INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS
(2022)
Article
Chemistry, Analytical
Maged Mohammed, Khaled Riad, Nashi Alqahtani
Summary: Cold storage is crucial for maintaining food quality and safety. The use of IoT-based control systems allows for remote monitoring and control of microclimate parameters, reducing risks and improving postharvest quality of fruits.
Article
Chemistry, Multidisciplinary
Khaled Riad, Mohamed Elhoseny
Summary: This study introduces a novel AFSA-WELM model for cybersecurity on social media, which can detect cyberbullying by processing data and word embedding. The model achieves high accuracy and performance in experiments.
APPLIED SCIENCES-BASEL
(2022)
Article
Computer Science, Artificial Intelligence
Guanbiao Lin, Hongyang Yan, Guang Kou, Teng Huang, Shiyu Peng, Yingying Zhang, Changyu Dong
Summary: In this paper, the authors investigate adaptive clipping in DP-SGD from an empirical perspective and propose two new adaptive clipping strategies based on fresh insights gained from extensive experiments. The strategies consistently outperform existing methods in terms of model accuracy.
INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS
(2022)
Article
Computer Science, Artificial Intelligence
Anli Yan, Ruitao Hou, Xiaozhang Liu, Hongyang Yan, Teng Huang, Xianmin Wang
Summary: Responsible utilization of Explainable Artificial Intelligence (XAI) is crucial for enhancing the applications of artificial intelligence (AI) in security-sensitive domains. However, existing XAI is vulnerable to model extraction attacks. This paper presents an XAI-aware dual-task model extraction attack (DTMEA) that can extract both the classification and explanation tasks of a target model.
INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS
(2022)
Article
Computer Science, Artificial Intelligence
Wenjun Li, Anli Yan, Di Wu, Taoyu Zhu, Teng Huang, Xuandi Luo, Shaowei Wang
Summary: With the increase in unlabeled data, contrastive learning has made significant progress in unsupervised learning. However, the privacy threats to contrastive learning have become a challenge, leading to the proposal of novel techniques based on differential privacy to address this issue.
INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS
(2022)
Article
Telecommunications
Jiahui Huang, Teng Huang, Huanchun Wei, Jiehua Zhang, Hongyang Yan, Duncan S. Wong, Haibo Hu
Summary: Blockchain, as a distributed public ledger technology, has been widely employed in various Internet interaction systems. However, privacy attacks hinder its widespread adoption. This article proposes a privacy-preserving model called zkChain, which utilizes zk-SNARKs and hash chain for efficient transfer of assets with effective privacy protection.
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES
(2022)
Article
Mathematics
Xu Jin, Teng Huang, Ke Wen, Mengxian Chi, Hong An
Summary: This work proposes a novel histopathology-oriented self-supervised representation learning framework (HistoSSL) to efficiently extract representations from unlabeled histopathology images at three levels: global, cell, and stain. The model achieves remarkable performance on downstream tasks: colorectal tissue phenotyping on the NCTCRC dataset and breast cancer metastasis recognition on the CAMELYON16 dataset.
Article
Computer Science, Artificial Intelligence
Behnam Zahednejad, Huang Teng, Saeed Kosari, Ren Xiaojun
Summary: With the rapid development of IoT, designing a secure two-factor authentication scheme that is compatible with resource-constrained devices is in demand. Existing schemes based on big data have shown weaknesses in achieving claimed security properties. In this paper, a novel scheme is proposed that addresses these weaknesses and provides real two-factor security, forward secrecy, key compromise impersonation and server compromise impersonation resilience, as well as revocability of the client.
INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS
(2023)
Article
Chemistry, Multidisciplinary
Khaled Riad
Summary: In order to increase the usage of renewable energy, it is important to combine various renewable-energy sources and store their data on the cloud. A token-revocation access control (TR-AC) system is proposed to revoke access authorization for malicious users before granting access to cloud-hosted energy optimization utilities. TR-AC utilizes multi-authorities to authenticate users and adjust their access levels to the energy optimization utility.
APPLIED SCIENCES-BASEL
(2023)
Article
Computer Science, Hardware & Architecture
Peng Zhang, Teng Huang, Xiaoqiang Sun, Wei Zhao, Hongwei Liu, Shangqi Lai, Joseph K. Liu
Summary: This paper presents a clustering algorithm based on multi-key fully homomorphic encryption to protect the privacy of medical data. Secure protocols and schemes are proposed to implement the secure multi-party k-means clustering algorithm, and their security and feasibility are proven.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
(2023)
Article
Computer Science, Hardware & Architecture
Zihang Zhen, Xiaoding Wang, Hui Lin, Sahil Garg, Prabhat Kumar, M. Shamim Hossain
Summary: In this paper, a blockchain architecture based on dynamic state sharding (DSSBD) is proposed to solve the problems caused by cross-shard transactions and reconfiguration. By utilizing deep reinforcement learning, the number of shards, block spacing, and block size can be dynamically adjusted to improve the performance of the blockchain. The experimental results show that the crowdsourcing system with DSSBD has better performance in terms of throughput, latency, balancing, cross-shard transaction proportion, and node reconfiguration proportion, while ensuring security.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2024)
Article
Computer Science, Hardware & Architecture
Gabriel F. C. de Queiroz, Jose F. de Rezende, Valmir C. Barbosa
Summary: Multi-access Edge Computing (MEC) is a technology that enables faster task processing at the network edge by deploying servers closer to end users. This paper proposes the FlexDO algorithm to solve the DAG application partitioning and offloading problem, and compares it with other solutions to demonstrate its superior performance in various test scenarios.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2024)
Article
Computer Science, Hardware & Architecture
Shahid Latif, Wadii Boulila, Anis Koubaa, Zhuo Zou, Jawad Ahmad
Summary: In the field of Industrial Internet of Things (IIoT), networks are increasingly vulnerable to cyberattacks. This research introduces an optimized Intrusion Detection System based on Deep Transfer Learning (DTL) for heterogeneous IIoT networks, combining Convolutional Neural Networks (CNNs), Genetic Algorithms (GA), and ensemble techniques. Through rigorous evaluation, the framework achieves exceptional performance and accurate detection of various cyberattacks.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2024)
Article
Computer Science, Hardware & Architecture
Rongji Liao, Yuan Zhang, Jinyao Yan, Yang Cai, Narisu Tao
Summary: This paper proposes a joint control approach called STOP to guarantee user-perceived deadline using curriculum-guided deep reinforcement learning. Experimental results show that the STOP scheme achieves a significantly higher average arrival ratio in NS-3.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2024)
Article
Computer Science, Hardware & Architecture
Miguel Rodriguez-Perez, Sergio Herreria-Alonso, J. Carlos Lopez-Ardao, Raul F. Rodriguez-Rubio
Summary: This paper presents an implementation of an active queue management (AQM) algorithm for the Named-Data Networking (NDN) architecture and its application in congestion control protocols. By utilizing the congestion mark field in NDN packets, information about each transmission queue is encoded to achieve a scalable AQM solution.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2024)
Article
Computer Science, Hardware & Architecture
Angel Canete, Mercedes Amor, Lidia Fuentes
Summary: This paper proposes an energy-aware placement of service function chains of Virtual Network Functions (VNFs) and a resource-allocation solution for heterogeneous edge infrastructures. The solution has been integrated with an open source management and orchestration project and has been successfully applied to augmented reality services, achieving significant reduction in power consumption and ensuring quality of service compliance.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2024)
Article
Computer Science, Hardware & Architecture
Sachin Kadam, Kaustubh S. Bhargao, Gaurav S. Kasbekar
Summary: This paper discusses the problem of estimating the node cardinality of each node type in a heterogeneous wireless network. Two schemes, HSRC-M1 and HSRC-M2, are proposed to rapidly estimate the number of nodes of each type. The accuracy and efficiency of these schemes are proven through mathematical analysis and simulation experiments.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2024)
Article
Computer Science, Hardware & Architecture
Jean Nestor M. Dahj, Kingsley A. Ogudo, Leandro Boonzaaier
Summary: The launch of commercial 5G networks has opened up opportunities for heavy data users and highspeed applications, but traditional monitoring and evaluation techniques have limitations in the 5G networks. This paper presents a cost-effective hybrid analytical approach for detecting and evaluating user experience in real-time 5G networks, using statistical methods to calculate the user quality index.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2024)
Article
Computer Science, Hardware & Architecture
Ali Nauman, Haya Mesfer Alshahrani, Nadhem Nemri, Kamal M. Othman, Nojood O. Aljehane, Mashael Maashi, Ashit Kumar Dutta, Mohammed Assiri, Wali Ullah Khan
Summary: The integration of terrestrial and satellite wireless communication networks offers a practical solution to enhance network coverage, connectivity, and cost-effectiveness. This study introduces a resource allocation framework that leverages local cache pool deployments and non-orthogonal multiple access (NOMA) to improve energy efficiency. Through the use of a multi-agent enabled deep deterministic policy gradient algorithm (MADDPG), the proposed approach optimizes user association, cache design, and transmission power control, resulting in enhanced energy efficiency and reduced time delays compared to existing methods.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2024)
Article
Computer Science, Hardware & Architecture
Wu Chen, Jiayi Zhu, Jiajia Liu, Hongzhi Guo
Summary: With advancements in technology, large-scale drone swarms will be widely used in commercial and military fields. Current application methods are mainly divided into autonomous methods and controlled methods. This paper proposes a new framework for global coordination through local interaction.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2024)
Article
Computer Science, Hardware & Architecture
Peiying Zhang, Zhihu Luo, Neeraj Kumar, Mohsen Guizani, Hongxia Zhang, Jian Wang
Summary: With the development of Industry 5.0, the demand for network access devices is increasing, especially in areas such as financial transactions, drone control, and telemedicine where low latency is crucial. However, traditional network architectures limit the construction of low-latency networks due to the tight coupling of control and data forwarding functions. To overcome this problem, researchers propose a constraint escalation virtual network embedding algorithm assisted by Graph Convolutional Networks (GCN), which automatically extracts network features and accelerates the learning process to improve network performance.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2024)
Review
Computer Science, Hardware & Architecture
P. Anitha, H. S. Vimala, J. Shreyas
Summary: Congestion control is crucial for maintaining network stability, reliability, and performance in IoT. It ensures that critical applications can operate seamlessly and that IoT devices can communicate efficiently without overwhelming the network. Congestion control algorithms ensure that the network operates within its capacity, preventing network overload and maintaining network performance.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2024)
Article
Computer Science, Hardware & Architecture
Shunmugapriya Ramanathan, Abhishek Bhattacharyya, Koteswararao Kondepu, Andrea Fumagalli
Summary: This article presents an experiment that achieves live migration of a containerized 5G Central Unit module using modified open-source migration software. By comparing different migration techniques, it is found that the hybrid migration technique can reduce end-user service recovery time by 36% compared to the traditional cold migration technique.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2024)
Article
Computer Science, Hardware & Architecture
Fatma Foad Ashrif, Elankovan A. Sundararajan, Rami Ahmad, Mohammad Kamrul Hasan, Elaheh Yadegaridehkordi
Summary: This article introduces the development and current status of authentication protocols in 6LoWPAN, and proposes an innovative perspective to fill the research gap. The article comprehensively surveys and evaluates AKA protocols, analyzing their suitability in wireless sensor networks and the Internet of Things, and proposes future research directions and issues.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2024)
Article
Computer Science, Hardware & Architecture
Pranjal Kumar Nandi, Md. Rejaul Islam Reaj, Sujan Sarker, Md. Abdur Razzaque, Md. Mamun-or-Rashid, Palash Roy
Summary: This paper proposes a task offloading policy for IoT devices to a mobile edge computing system, aiming to balance device utility and execution cost. A meta heuristic approach is developed to solve the offloading problem, and the results show its potential in terms of task execution latency, energy consumption, utility per unit cost, and task drop rate.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2024)