2,456 research outputs found

    Secure Wireless Communications Based on Compressive Sensing: A Survey

    Get PDF
    IEEE Compressive sensing (CS) has become a popular signal processing technique and has extensive applications in numerous fields such as wireless communications, image processing, magnetic resonance imaging, remote sensing imaging, and anology to information conversion, since it can realize simultaneous sampling and compression. In the information security field, secure CS has received much attention due to the fact that CS can be regarded as a cryptosystem to attain simultaneous sampling, compression and encryption when maintaining the secret measurement matrix. Considering that there are increasing works focusing on secure wireless communications based on CS in recent years, we produce a detailed review for the state-of-the-art in this paper. To be specific, the survey proceeds with two phases. The first phase reviews the security aspects of CS according to different types of random measurement matrices such as Gaussian matrix, circulant matrix, and other special random matrices, which establishes theoretical foundations for applications in secure wireless communications. The second phase reviews the applications of secure CS depending on communication scenarios such as wireless wiretap channel, wireless sensor network, internet of things, crowdsensing, smart grid, and wireless body area networks. Finally, some concluding remarks are given

    Energy harvesting Internet of Things health-based paradigm: toward outage probability reduction through inter-wireless body area network cooperation

    Get PDF
    In today’s healthcare environment, the Internet of Things technology provides suitability among physicians and patients, as it is valuable in numerous medicinal fields. Wireless body sensor network technologies are essential technologies in the growth of Internet of Things healthcare paradigm, where every patient is monitored utilising small-powered and lightweight sensor nodes. A dual-hop, inter–wireless body sensor network cooperation and an incremental inter–wireless body sensor network cooperation with energy harvesting in the Internet of Things health-based paradigm have been investigated and designed in this work. The three protocols have been named and abbreviated as follows: energy harvesting–based dual-hop cooperation, energy harvesting–based inter–wireless body sensor network cooperation and energy harvesting–based incremental inter–wireless body sensor network cooperation. Outage probabilities for the three designed protocols were investigated and inspected, and mathematical expressions of the outage probabilities were derived. The simulation and numerical results showed that the energy harvesting–based incremental inter–wireless body sensor network cooperation provided superior performance over the energy harvesting–based inter–wireless body sensor network cooperation and energy harvesting–based dual-hop cooperation by 1.38 times and 5.72 times, respectively; while energy harvesting–based inter–wireless body sensor network cooperation achieved better performance over energy harvesting–based dual-hop cooperation by 1.87 times

    Privacy-Preserving Non-Wearable Occupancy Monitoring System Exploiting Wi-Fi Imaging for Next-Generation Body Centric Communication

    Get PDF
    Nano-scaled structures, wireless sensing, wearable devices, and wireless communications systems are anticipated to support the development of new next-generation technologies in the near future. Exponential rise in future Radio-Frequency (RF) sensing systems have demonstrated its applications in areas such as wearable consumer electronics, remote healthcare monitoring, wireless implants, and smart buildings. In this paper, we propose a novel, non-wearable, device-free, privacy-preserving Wi-Fi imaging-based occupancy detection system for future smart buildings. The proposed system is developed using off-the-shelf non-wearable devices such as Wi-Fi router, network interface card, and an omnidirectional antenna for future body centric communication. The core idea is to detect presence of person along its activities of daily living without deploying a device on person's body. The Wi-Fi signals received using non-wearable devices are converted into time-frequency scalograms. The occupancy is detected by classifying the scalogram images using an auto-encoder neural network. In addition to occupancy detection, the deep neural network also identifies the activity performed by the occupant. Moreover, a novel encryption algorithm using Chirikov and Intertwining map-based is also proposed to encrypt the scalogram images. This feature enables secure storage of scalogram images in a database for future analysis. The classification accuracy of the proposed scheme is 91.1%

    Crowdfunding Non-fungible Tokens on the Blockchain

    Get PDF
    Non-fungible tokens (NFTs) have been used as a way of rewarding content creators. Artists publish their works on the blockchain as NFTs, which they can then sell. The buyer of an NFT then holds ownership of a unique digital asset, which can be resold in much the same way that real-world art collectors might trade paintings. However, while a deal of effort has been spent on selling works of art on the blockchain, very little attention has been paid to using the blockchain as a means of fundraising to help finance the artist’s work in the first place. Additionally, while blockchains like Ethereum are ideal for smaller works of art, additional support is needed when the artwork is larger than is feasible to store on the blockchain. In this paper, we propose a fundraising mechanism that will help artists to gain financial support for their initiatives, and where the backers can receive a share of the profits in exchange for their support. We discuss our prototype implementation using the SpartanGold framework. We then discuss how this system could be expanded to support large NFTs with the 0Chain blockchain, and describe how we could provide support for ongoing storage of these NFTs

    Fake Malware Generation Using HMM and GAN

    Get PDF
    In the past decade, the number of malware attacks have grown considerably and, more importantly, evolved. Many researchers have successfully integrated state-of-the-art machine learning techniques to combat this ever present and rising threat to information security. However, the lack of enough data to appropriately train these machine learning models is one big challenge that is still present. Generative modelling has proven to be very efficient at generating image-like synthesized data that can match the actual data distribution. In this paper, we aim to generate malware samples as opcode sequences and attempt to differentiate them from the real ones with the goal to build fake malware data that can be used to effectively train the machine learning models. We use and compare different Generative Adversarial Networks (GAN) algorithms and Hidden Markov Models (HMM) to generate such fake samples obtaining promising results

    Privacy-Preserving Wandering Behavior Sensing in Dementia Patients Using Modified Logistic and Dynamic Newton Leipnik Maps

    Get PDF
    The health status of an elderly person can be identified by examining the additive effects of aging along disease linked to it and can lead to the ’unstable incapacity’. This health status is essentially determined by the apparent decline of independence in Activities of Daily Living (ADLs). Detecting ADLs provide possibilities of improving the home life of elderly people as it can be applied to fall detection systems.. This article looks at Radar images to detect large scale body movements. Using a publicly available Radar spectogram dataset, Deep Learning and Machine Learning techniques are used for image classification of Walking, Sitting, Standing, Picking up Object, Drinking Water and Falling Radar spectograms. The Machine Learning algorithm used were Random Forest, K Nearest Neighbours and Support Vector Machine. The Deep Learning algorithms used in this article were Long Short Term Memory, Bi-directional Long Short-Term Memory and Convolutional Neural Network. In addition to using Machine Learning and Deep Learning on the spectograms, data processing techniques such as Principal Component Analysis and Data Augmentation is applied to the spectogram images. The work done in this article is divided into 4 experiments. The first experiment applies Machine and Deep Learning to the the Raw images data, the second experiment applies Principal Component Analysis to the Raw image Data, the third experiment applies Data Augmentation to the Raw image data and the fourth and final experiment applies Principal Component Analysis and Data Augmentation to the Raw image data. The results obtained in these experiments found that the best results were obtained using the CNN algorithm with Principal Component Analysis and Data Augmentation together to obtain a result of 95.30 % accuracy. Results also showed how Principal Component Analysis was most beneficial when the training data was expanded by augmentation of the available data
    • …
    corecore