17 research outputs found

    The dynamics of complex systems. Studies and applications in computer science and biology

    Get PDF
    Our research has focused on the study of complex dynamics and on their use in both information security and bioinformatics. Our first work has been on chaotic discrete dynamical systems, and links have been established between these dynamics on the one hand, and either random or complex behaviors. Applications on information security are on the pseudorandom numbers generation, hash functions, informationhiding, and on security aspects on wireless sensor networks. On the bioinformatics level, we have applied our studies of complex systems to theevolution of genomes and to protein folding

    Towards end-to-end security in internet of things based healthcare

    Get PDF
    Healthcare IoT systems are distinguished in that they are designed to serve human beings, which primarily raises the requirements of security, privacy, and reliability. Such systems have to provide real-time notifications and responses concerning the status of patients. Physicians, patients, and other caregivers demand a reliable system in which the results are accurate and timely, and the service is reliable and secure. To guarantee these requirements, the smart components in the system require a secure and efficient end-to-end communication method between the end-points (e.g., patients, caregivers, and medical sensors) of a healthcare IoT system. The main challenge faced by the existing security solutions is a lack of secure end-to-end communication. This thesis addresses this challenge by presenting a novel end-to-end security solution enabling end-points to securely and efficiently communicate with each other. The proposed solution meets the security requirements of a wide range of healthcare IoT systems while minimizing the overall hardware overhead of end-to-end communication. End-to-end communication is enabled by the holistic integration of the following contributions. The first contribution is the implementation of two architectures for remote monitoring of bio-signals. The first architecture is based on a low power IEEE 802.15.4 protocol known as ZigBee. It consists of a set of sensor nodes to read data from various medical sensors, process the data, and send them wirelessly over ZigBee to a server node. The second architecture implements on an IP-based wireless sensor network, using IEEE 802.11 Wireless Local Area Network (WLAN). The system consists of a IEEE 802.11 based sensor module to access bio-signals from patients and send them over to a remote server. In both architectures, the server node collects the health data from several client nodes and updates a remote database. The remote webserver accesses the database and updates the webpage in real-time, which can be accessed remotely. The second contribution is a novel secure mutual authentication scheme for Radio Frequency Identification (RFID) implant systems. The proposed scheme relies on the elliptic curve cryptography and the D-Quark lightweight hash design. The scheme consists of three main phases: (1) reader authentication and verification, (2) tag identification, and (3) tag verification. We show that among the existing public-key crypto-systems, elliptic curve is the optimal choice due to its small key size as well as its efficiency in computations. The D-Quark lightweight hash design has been tailored for resource-constrained devices. The third contribution is proposing a low-latency and secure cryptographic keys generation approach based on Electrocardiogram (ECG) features. This is performed by taking advantage of the uniqueness and randomness properties of ECG's main features comprising of PR, RR, PP, QT, and ST intervals. This approach achieves low latency due to its reliance on reference-free ECG's main features that can be acquired in a short time. The approach is called Several ECG Features (SEF)-based cryptographic key generation. The fourth contribution is devising a novel secure and efficient end-to-end security scheme for mobility enabled healthcare IoT. The proposed scheme consists of: (1) a secure and efficient end-user authentication and authorization architecture based on the certificate based Datagram Transport Layer Security (DTLS) handshake protocol, (2) a secure end-to-end communication method based on DTLS session resumption, and (3) support for robust mobility based on interconnected smart gateways in the fog layer. Finally, the fifth and the last contribution is the analysis of the performance of the state-of-the-art end-to-end security solutions in healthcare IoT systems including our end-to-end security solution. In this regard, we first identify and present the essential requirements of robust security solutions for healthcare IoT systems. We then analyze the performance of the state-of-the-art end-to-end security solutions (including our scheme) by developing a prototype healthcare IoT system

    Digital Signal Processing (Second Edition)

    Get PDF
    This book provides an account of the mathematical background, computational methods and software engineering associated with digital signal processing. The aim has been to provide the reader with the mathematical methods required for signal analysis which are then used to develop models and algorithms for processing digital signals and finally to encourage the reader to design software solutions for Digital Signal Processing (DSP). In this way, the reader is invited to develop a small DSP library that can then be expanded further with a focus on his/her research interests and applications. There are of course many excellent books and software systems available on this subject area. However, in many of these publications, the relationship between the mathematical methods associated with signal analysis and the software available for processing data is not always clear. Either the publications concentrate on mathematical aspects that are not focused on practical programming solutions or elaborate on the software development of solutions in terms of working ‘black-boxes’ without covering the mathematical background and analysis associated with the design of these software solutions. Thus, this book has been written with the aim of giving the reader a technical overview of the mathematics and software associated with the ‘art’ of developing numerical algorithms and designing software solutions for DSP, all of which is built on firm mathematical foundations. For this reason, the work is, by necessity, rather lengthy and covers a wide range of subjects compounded in four principal parts. Part I provides the mathematical background for the analysis of signals, Part II considers the computational techniques (principally those associated with linear algebra and the linear eigenvalue problem) required for array processing and associated analysis (error analysis for example). Part III introduces the reader to the essential elements of software engineering using the C programming language, tailored to those features that are used for developing C functions or modules for building a DSP library. The material associated with parts I, II and III is then used to build up a DSP system by defining a number of ‘problems’ and then addressing the solutions in terms of presenting an appropriate mathematical model, undertaking the necessary analysis, developing an appropriate algorithm and then coding the solution in C. This material forms the basis for part IV of this work. In most chapters, a series of tutorial problems is given for the reader to attempt with answers provided in Appendix A. These problems include theoretical, computational and programming exercises. Part II of this work is relatively long and arguably contains too much material on the computational methods for linear algebra. However, this material and the complementary material on vector and matrix norms forms the computational basis for many methods of digital signal processing. Moreover, this important and widely researched subject area forms the foundations, not only of digital signal processing and control engineering for example, but also of numerical analysis in general. The material presented in this book is based on the lecture notes and supplementary material developed by the author for an advanced Masters course ‘Digital Signal Processing’ which was first established at Cranfield University, Bedford in 1990 and modified when the author moved to De Montfort University, Leicester in 1994. The programmes are still operating at these universities and the material has been used by some 700++ graduates since its establishment and development in the early 1990s. The material was enhanced and developed further when the author moved to the Department of Electronic and Electrical Engineering at Loughborough University in 2003 and now forms part of the Department’s post-graduate programmes in Communication Systems Engineering. The original Masters programme included a taught component covering a period of six months based on two semesters, each Semester being composed of four modules. The material in this work covers the first Semester and its four parts reflect the four modules delivered. The material delivered in the second Semester is published as a companion volume to this work entitled Digital Image Processing, Horwood Publishing, 2005 which covers the mathematical modelling of imaging systems and the techniques that have been developed to process and analyse the data such systems provide. Since the publication of the first edition of this work in 2003, a number of minor changes and some additions have been made. The material on programming and software engineering in Chapters 11 and 12 has been extended. This includes some additions and further solved and supplementary questions which are included throughout the text. Nevertheless, it is worth pointing out, that while every effort has been made by the author and publisher to provide a work that is error free, it is inevitable that typing errors and various ‘bugs’ will occur. If so, and in particular, if the reader starts to suffer from a lack of comprehension over certain aspects of the material (due to errors or otherwise) then he/she should not assume that there is something wrong with themselves, but with the author

    Entropy in Image Analysis II

    Get PDF
    Image analysis is a fundamental task for any application where extracting information from images is required. The analysis requires highly sophisticated numerical and analytical methods, particularly for those applications in medicine, security, and other fields where the results of the processing consist of data of vital importance. This fact is evident from all the articles composing the Special Issue "Entropy in Image Analysis II", in which the authors used widely tested methods to verify their results. In the process of reading the present volume, the reader will appreciate the richness of their methods and applications, in particular for medical imaging and image security, and a remarkable cross-fertilization among the proposed research areas

    New Game Physics - Added Value for Transdisciplinary Teams

    Get PDF
    This study focused on game physics, an area of computer game design where physics is applied in interactive computer software. The purpose of the research was a fresh analysis of game physics in order to prove that its current usage is limited and requires advancement. The investigations presented in this dissertation establish constructive principles to advance game physics design. The main premise was that transdisciplinary approaches provide significant value. The resulting designs reflected combined goals of game developers, artists and physicists and provide novel ways to incorporate physics into games. The applicability and user impact of such new game physics across several target audiences was thoroughly examined. In order to explore the transdisciplinary nature of the premise, valid evidence was gathered using a broad range of theoretical and practical methodologies. The research established a clear definition of game physics within the context of historical, technological, practical, scientific, and artistic considerations. Game analysis, literature reviews and seminal surveys of game players, game developers and scientists were conducted. A heuristic categorization of game types was defined to create an extensive database of computer games and carry out a statistical analysis of game physics usage. Results were then combined to define core principles for the design of unconventional new game physics elements. Software implementations of several elements were developed to examine the practical feasibility of the proposed principles. This research prototype was exposed to practitioners (artists, game developers and scientists) in field studies, documented on video and subsequently analyzed to evaluate the effectiveness of the elements on the audiences. The findings from this research demonstrated that standard game physics is a common but limited design element in computer games. It was discovered that the entertainment driven design goals of game developers interfere with the needs of educators and scientists. Game reviews exemplified the exaggerated and incorrect physics present in many commercial computer games. This “pseudo physics” was shown to have potentially undesired effects on game players. Art reviews also indicated that game physics technology remains largely inaccessible to artists. The principal conclusion drawn from this study was that the proposed new game physics advances game design and creates value by expanding the choices available to game developers and designers, enabling artists to create more scientifically robust artworks, and encouraging scientists to consider games as a viable tool for education and research. The practical portion generated tangible evidence that the isolated “silos” of engineering, art and science can be bridged when game physics is designed in a transdisciplinary way. This dissertation recommends that scientific and artistic perspectives should always be considered when game physics is used in computer-based media, because significant value for a broad range of practitioners in succinctly different fields can be achieved. The study has thereby established a state of the art research into game physics, which not only offers other researchers constructive principles for future investigations, but also provides much-needed new material to address the observed discrepancies in game theory and digital media design

    Modified progressive random walk with chaotic PRNG

    No full text
    In this paper, two modifications are proposed to the Progressive Random Walk (PRW) algorithm in order to address its potentially insufficient search space coverage. The first modification replaces the Pseudo-Random Number Generator (PRNG) with the uniform distribution by the chaotic map based PRNG for generating of the offset values and the second modification is called direction switching and is based on experiment observation. The modifications are implemented into the PRW and the resulting algorithm is called modified Progressive Random Walk. The search space coverage of the two algorithms is compared. Both algorithms are used in macro ruggedness estimation of the CEC2015 benchmark set and the results are discussed. © 2017, © 2017 Informa UK Limited, trading as Taylor & Francis Group.CZ.1.05/2.1.00/03.0089, FEDER, European Regional Development Fund; IGA/CebiaTech/2017/004; MSMT-7778/2014, MĆ MT, Ministerstvo Ć kolstvĂ­, MlĂĄdeĆŸe a TělovĂœchovy; LO1303, MĆ MT, Ministerstvo Ć kolstvĂ­, MlĂĄdeĆŸe a TělovĂœchovy; P103/15/06700SGrant Agency of the Czech Republic - GACR [P103/15/06700S]; Ministry of Education, Youth and Sports of the Czech Republic within the National Sustainability Programme [LO1303 (MSMT-7778/2014)]; European Regional Development Fund - CEBIA-Tech [CZ.1.05/2.1.00/03.0089]; Internal Grant Agency of Tomas Bata University [IGA/CebiaTech/2017/004
    corecore