Article
Computer Science, Information Systems
Lunzhi Deng, Yixian Yang, Ronghai Gao
Summary: The growing demand for healthcare and the lack of medical staff is a pressing issue that can be addressed by healthcare wireless sensor technology. This technology allows patients to collect health data with wearable devices and send it to doctors for diagnosis, overcoming traditional medical limitations. Protecting data security and patient privacy is crucial for healthcare wireless sensor networks, with the new certificateless designated verifier anonymous aggregate signature (CL-DVAAS) scheme showing computational efficiency.
IEEE INTERNET OF THINGS JOURNAL
(2021)
Article
Computer Science, Information Systems
Lunzhi Deng, Bo Wang, Yan Gao, Zhiwei Chen, Siwei Li
Summary: This article introduces a certificateless anonymous signcryption scheme for HWSNs, which encrypts the patient's vital signs parameters, authenticates the sensor, and achieves anonymity. It enables real-time remote monitoring for patients while protecting their privacy and anonymity.
IEEE INTERNET OF THINGS JOURNAL
(2023)
Article
Engineering, Electrical & Electronic
Guangjie Han, Aini Gong, Hao Wang, Chuan Lin, Miguel Martinez Garcia, Yan Peng
Summary: This paper proposes a source location privacy protection scheme based on an offshore oil acquisition platform, which reduces energy consumption and increases the safety time of the network through anonymous clusters and data fragmentation methods.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
(2021)
Article
Computer Science, Information Systems
Mengxia Shuai, Nenghai Yu, Hongxia Wang, Ling Xiong, Yue Li
Summary: In this paper, a lightweight three-factor anonymous authentication scheme with forward secrecy for personalized healthcare applications is proposed using lightweight cryptographic primitives. The scheme adopts pseudonym identity technique to protect users' real identities and employs one-way hash chain technique to ensure forward secrecy. Analysis and comparison results show that the proposed scheme can reduce execution time and achieve greater security and functional features.
JOURNAL OF ORGANIZATIONAL AND END USER COMPUTING
(2021)
Article
Public, Environmental & Occupational Health
Faiza Akram, Dongsheng Liu, Peibiao Zhao, Natalia Kryvinska, Sidra Abbas, Muhammad Rizwan
Summary: This paper presents an approach for effective intrusion detection in the e-healthcare environment using ANFIS, addressing security challenges researchers face in maintaining patient health records in a safe IoT-net.
FRONTIERS IN PUBLIC HEALTH
(2021)
Article
Automation & Control Systems
Jegadeesan Subramani, Azees Maria, Arun Sekar Rajasekaran, Fadi Al-Turjman
Summary: This article proposes a computationally efficient privacy-preserving anonymous authentication scheme for resource-limited WBAN, which protects the privacy and security of BI and user's personal data.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
(2022)
Article
Chemistry, Analytical
Arun Sekar Rajasekaran, Azees Maria, Maheswar Rajagopal, Josip Lorincz
Summary: The Internet of Health Things (IoHT) is an attractive networking paradigm that utilizes wireless communications, integrated devices, and embedded system technologies. In order to address the security challenges of maintaining patient data confidentiality and privacy in the IoHT, a novel blockchain-based privacy-preserving authentication scheme is proposed in this paper. Additionally, a secure handover authentication mechanism is developed to ensure efficient communication in multi-doctor scenarios and prevent malicious behavior. The performance analysis shows that the proposed scheme is resistant to security attacks and outperforms existing authentication schemes in terms of computational and storage costs.
Article
Computer Science, Information Systems
Xiaowei Shao, Yajun Guo, Yimin Guo
Summary: This paper proposes a new anonymous physically unclonable function (PUF)-based authentication protocol for WMSNs, which ensures secure transmission of data and protects patient privacy. The scheme is proven to be secure through formal security analysis, and it is capable of withstanding various known attacks. Compared to existing schemes, it provides more security and functionality features, while requiring less communication and computation costs.
Article
Computer Science, Information Systems
Xu Yang, Xun Yi, Surya Nepal, Ibrahim Khalil, Xinyi Huang, Jian Shen
Summary: This article discusses the importance of wireless body area networks technology in healthcare services and highlights the challenges it faces in terms of security, privacy, and efficiency. The authors propose a new authentication scheme to address the limitations of existing approaches and demonstrate its advantages through security analysis and performance evaluation.
IEEE TRANSACTIONS ON SERVICES COMPUTING
(2022)
Article
Chemistry, Analytical
Nicolas Lopez-Vilos, Claudio Valencia-Cordero, Cesar Azurdia-Meza, Samuel Montejo-Sanchez, Samuel Baraldi Mafra
Summary: Jamming attacks in WSNs significantly impact system performance metrics, with constant and reactive strategies affecting goodput, PRR, and energy efficiency. The experimental testbed results demonstrate a degradation in system performance with an increase in interferers, especially under reactive strategies.
Article
Chemistry, Analytical
Sarah Alyami, Randah Alharbi, Farag Azzedin
Summary: This article surveys fragmentation attacks and available countermeasures in the context of the Internet of Things. It specifically studies and simulates the buffer reservation attack, and proposes a reputation-scoring based countermeasure, demonstrating its effectiveness.
Article
Computer Science, Information Systems
Jingwei Liu, Weiyang Jiang, Rong Sun, Ali Kashif Bashir, Mohammad Dahman Alshehri, Qiaozhi Hua, Keping Yu
Summary: Electronic Medical Records (EMRs) are valuable research materials for AI and machine learning. Traditional centralized data sharing architectures cannot balance privacy and traceability effectively. Our proposed scheme using decentralized blockchain allows trackable anonymous remote healthcare data storing and sharing, providing efficient overall performance.
IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS
(2023)
Article
Medicine, General & Internal
Heon Jeong, Sang-Woong Lee, Mazhar Hussain Malik, Efat Yousefpoor, Mohammad Sadegh Yousefpoor, Omed Hassan Ahmed, Mehdi Hosseinzadeh, Amir Mosavi
Summary: This article introduces a secure routing scheme called SecAODV for wireless body sensor networks, which includes three phases: bootstrapping, routing, and communication security. Simulation results demonstrate that SecAODV improves performance in various metrics.
FRONTIERS IN MEDICINE
(2022)
Article
Computer Science, Information Systems
Rekha Goyat, Gulshan Kumar, Mamoun Alazab, Mauro Conti, Mritunjay Kumar Rai, Reji Thomas, Rahul Saha, Tai-Hoon Kim
Summary: This study develops a blockchain-based decentralized framework for secure communication in wireless sensor networks-enabled IoTs. By utilizing authentication and privacy-preserving schemes, as well as registration, certification, and revocation processes, the framework protects networks against illegal information access and utilizes storage efficiently.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Computer Science, Hardware & Architecture
Meng Li, Yifei Chen, Chhagan Lal, Mauro Conti, Mamoun Alazab, Donghui Hu
Summary: VDF is essential for accident liability awareness and crime prevention. However, ensuring privacy and evidence accountability in VDF is challenging. Eunomia proposes a blockchain-based anonymous and secure VDF scheme that protects privacy with decentralized credentials and achieves fine-grained evidence access control.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
(2023)
Article
Computer Science, Theory & Methods
Farman Ali, Shaker El-Sappagh, S. M. Riazul Islam, Amjad Ali, Muhammad Attique, Muhammad Imran, Kyung-Sup Kwak
Summary: Wearable sensors and social networking platforms are crucial for healthcare monitoring, generating large volumes of unstructured data. A novel healthcare monitoring framework based on the cloud environment and a big data analytics engine is proposed to efficiently store and analyze healthcare data, improving classification accuracy. Data mining techniques, ontologies, and Bi-LSTM are utilized for efficient preprocessing and classification of healthcare data, leading to accurate health condition classification and drug side effect predictions.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
(2021)
Article
Chemistry, Analytical
Tuo Xiao, Taiping Cui, S. M. Riazul Islam, Qianbin Chen
Summary: With the rapid growth of mobile communication and smart mobile devices, F-RAN is proposed to handle the increasing wireless data traffic by deploying content caching to reduce network traffic and latency. The framework based on federated learning aims to predict user demands and optimizes storage resource allocation and content placement through ILP formulation. Simulation results demonstrate the efficiency of the proposed algorithm in minimizing the total traffic cost of the network.
Editorial Material
Computer Science, Information Systems
S. M. Riazul Islam, Jaime Lloret, Yousaf Bin Zikria
Article
Biology
Fazla Rabbi Mashrur, Md. Saiful Islam, Dabasish Kumar Saha, S. M. Riazul Islam, Mohammad Ali Moni
Summary: This study proposes a novel SCNN for detecting sleep apnea, achieving high accuracy and performance in experiments.
COMPUTERS IN BIOLOGY AND MEDICINE
(2021)
Article
Computer Science, Theory & Methods
Lewis Nkenyereye, S. M. Riazul Islam, Muhammad Bilal, M. Abdullah-Al-Wadud, Atif Alamri, Anand Nayyar
Summary: The paper introduces a secure and privacy-preserving crowd-sensing scheme for fog-enabled vehicular computing, utilizing a double layer of fog nodes and ciphertext-policy attribute-based encryption. Data confidentiality and fine-grained access control are ensured in this proposed architecture.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
(2021)
Article
Telecommunications
Md. Fazlul Kader, S. M. Riazul Islam, Octavia A. Dobre
Summary: The novel D2D-UNOMA scheme utilizes non-orthogonal multiple access to improve uplink transmission performance through collaboration between multiple users in two time slots. Numerical results demonstrate a significant enhancement in ergodic sum rate compared to conventional orthogonal multiple access methods.
IEEE COMMUNICATIONS LETTERS
(2021)
Article
Energy & Fuels
Habib Ur Rehman, Sajjad Ali Haider, Syed Rameez Naqvi, Muhammad Naeem, Kyung-Sup Kwak, S. M. Riazul Islam
Summary: This paper proposes an energy cooperation mechanism among neighboring buildings, which adjusts renewable energy tariff and uses a mathematical model to minimize operational costs. Simulation results show that the proposed cooperation model can save over 20% of energy costs.
Article
Engineering, Electrical & Electronic
Md Fazlul Kader, S. M. Riazul Islam, Octavia A. Dobre
Summary: This paper proposes a novel device-to-device aided cooperative non-orthogonal multiple access (D2D-SG-NOMA) scheme, which improves the delay-tolerant capacity (DTC) by employing decode-and-forward relaying and reducing interference. The results show that D2D-SG-NOMA achieves higher DTC compared to the existing SR-NOMA scheme in different scenarios, although it may suffer from increased inter-symbol interference at high signal-to-noise ratios (SNR).
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS
(2022)
Article
Computer Science, Information Systems
Mahmud Hossain, Golam Kayas, Yasser Karim, Ragib Hasan, Jamie Payton, S. M. Riazul Islam
Summary: This article introduces a compression-aware authorization protocol called CATComp, which enables IoT devices to exchange small-sized certificates and capability tokens over the IEEE 802.15.4 medium. By reducing the size of security materials, CATComp decreases communication latency and energy consumption, thereby improving device response speed and battery life.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Computer Science, Information Systems
Md. Omaer Faruq Goni, Md. Nazrul Islam Mondal, S. M. Riazul Islam, Md. Nahiduzzaman, Md. Robiul Islam, Md. Shamim Anower, Kyung-Sup Kwak
Summary: Malaria, a worldwide life-threatening disease, requires a reliable and fast early prognosis infrastructure. This paper proposes an unorthodox method based on an extreme learning machine (ELM) algorithm to detect malaria. The proposed CNN-DELM model achieves high accuracy and robustness in detecting malaria, outperforming traditional methods and producing comparable or better results.
Article
Computer Science, Information Systems
Owais Asif, Sajjad Ali Haider, Syed Rameez Naqvi, John F. W. Zaki, Kyung-Sup Kwak, S. M. Riazul Islam
Summary: This paper highlights the importance of accurately predicting the remaining useful life (RUL) of industrial machinery and proposes the use of deep learning-based LSTM networks to improve prediction accuracy. Additionally, an improved piecewise linear degradation model and pre-processing techniques are introduced to enhance predictive performance.
Article
Computer Science, Information Systems
John Zaki, S. M. Riazul Islam, Norah Saleh Alghamdi, M. Abdullah-Al-Wadud, Kyung-Sup Kwak
Summary: The development of healthcare applications is considered complex and time-consuming. Traditional approaches such as monolithic and service-oriented architecture (SOA) generate problems in service availability, remote access, provisioning, scalability, and integration with other healthcare systems. This paper proposes a microservices framework using cloud computing infrastructure to address these issues. The approach improves efficiency, scalability, and performance, and contributes to system design and analysis in healthcare application development.
Article
Computer Science, Information Systems
Syed Rameez Naqvi, Adnan Ahmad, S. M. Riazul Islam, Tallha Akram, M. Abdullah-Al-Wadud, Atif Alamri
Summary: This article discusses the complexity of scheduling sports tournaments, especially those with strict time constraints. It emphasizes the importance of ensuring fairness between teams in terms of rest days, travel time, and successive games. The article proposes competitive parameters and uses root mean squared error to measure the unfairness in rest day distribution.
CMC-COMPUTERS MATERIALS & CONTINUA
(2022)
Article
Computer Science, Information Systems
Noor Ahmad Sarker, A. S. M. Badrudduza, S. M. Riazul Islam, Sheikh Habibul Islam, Milton Kumar Kundu, Imran Shafique Ansari, Kyung-Sup Kwak
Summary: This study investigates the secrecy performance of a dual-hop RF-FSO DF relaying network, deriving closed-form analytical expressions and conducting Monte-Carlo simulations for verification. The results demonstrate that fading, shadowing, detection techniques, atmospheric turbulence, and pointing error significantly impact secrecy performance, with better performance achieved using the HD technique compared to the IM/DD technique at the destination.
Article
Computer Science, Information Systems
Minh-Sang Van Nguyen, Dinh-Thuan Do, Fatemeh Afghah, S. M. Riazul Islam, Anh-Tu Le
Summary: The study focuses on secrecy transmission in uplink non-orthogonal multiple access (NOMA) with the presence of an eavesdropper, analyzing metrics such as secrecy outage probability (SOP) and strictly positive secrecy capacity (SPSC). The proposed schemes are evaluated for system secure performance, showing that better secrecy performance can be achieved by improving channel conditions and signal-to-noise ratio (SNR) at the base station. Results indicate existence of secrecy performance gaps among users due to different power allocation factors assigned to them.