28 research outputs found

    Trust-based mechanisms for secure communication in cognitive radio networks

    Get PDF
    Cognitive radio (CR) technology was introduced to solve the problem of spectrum scarcity to support the growth of wireless communication. However, the inherent properties of CR technology make such networks more vulnerable to attacks. This thesis is an effort to develop a trust-based framework to ensure secure communication in CRN by authenticating trustworthy nodes to share spectrum securely and increasing system's availability and reliability by selecting the trustworthy key nodes in CRNs

    Digital signature-based secure communication in cognitive radio networks

    Get PDF
    Due to the rapid growth of wireless applications, Cognitive Radio (CR) has been considered as a demanding concept for improving the utilization of limited radio spectrum resources for future wireless communications and mobile computing. The unique characteristics of Cognitive Radio Networks (CRNs) make security more challenging. Since a member of Cognitive Radio Networks may join or leave the network at any time, the issue of supporting secure communication in CRNs becomes more critical than for other conventional wireless networks. This work thus proposes digital signature-based secure communication for identifying efficient primary users in CRNs. The security analysis is analyzed to guarantee that the proposed approach achieves security proof

    Big data analytics and internet of things for personalised healthcare: opportunities and challenges

    Get PDF
    With the increasing use of technologies and digitally driven healthcare systems worldwide, there will be several opportunities for the use of big data in personalized healthcare. In addition, With the advancements and availability of internet of things (IoT) based point-of-care (POC) technologies, big data analytics and artificial intelligence (AI) can provide useful methods and solutions in monitoring, diagnosis, and self-management of health issues for a better personalized healthcare. In this paper, we identify the current personalized healthcare trends and challenges. Then, propose an architecture to support big data analytics using POC test results of an individual. The proposed architecture can facilitate an integrated and self-managed healthcare as well as remote patient care by adapting three popular machine learning algorithms to leverage the current trends in IoT, big data infrastructures and data analytics for advancing personalized healthcare of the future

    Trust-based Throughput in Cognitive Radio Networks

    Get PDF
    Cognitive Radio Networks (CRNs) deal with opportunistic spectrum access in order to fully utilize the scarce of spectrum resources, with the development of cognitive radio technologies to greater utilization of the spectrum. Nowa- days Cognitive Radio (CR) is a promising concept for improving the utilization of limited radio spectrum resources for future wireless communications and mobile computing. In this paper, we propose two approaches. At first we propose a trust aware model to authenticate the secondary users (SUs) in CRNs which provides a reliable technique to establish trust for CRNs. Secondly, we propose trust throughput mechanism to measure throughput in CRNs

    A Key Management Protocol for Multiphase Hierarchical Wireless Sensor Networks

    Get PDF
    The security of Wireless Sensor Networks (WSNs) has a direct reliance on secure and efficient key management. This leaves key management as a fundamental research topic in the field of WSNs security. Among the proposed key management schemes for WSNs security, LEAP (Localized Encryption and Authentication Protocol) has been regarded as an efficient protocol over the last years. LEAP supports the establishment of four types of keys. The security of these keys is under the assumption that the initial deployment phase is secure and the initial key is erased from sensor nodes after the initialization phase. However, the initial key is used again for node addition after the initialization phase whereas the new node can be compromised before erasing the key. A time-based key management scheme rethought the security of LEAP. We show the deficiency of the time-based key management scheme and proposed a key management scheme for multi-phase WSNs in this paper. The proposed scheme disperses the damage resulting from the disclosure of the initial key. We show it has better resilience and higher key connectivity probability through the analysis

    A combinational approach for trust establishment in cognitive radio networks

    Get PDF
    Cognitive Radio is considered as a promising and demanding technology to examine whether a particular radio spectrum band is currently in use or not and to switch into the temporarily unoccupied spectrum band in order to improve the usage of the radio electromagnetic spectrum without creating interference to the transmissions of other users. Because of the dynamic properties of CRNs, the issue of supporting secure communication in CRNs becomes more critical than that of other conventional wireless networks. In this paper, we propose a combination of certificate-based trust with a behavior-based trust which will benefit both by representing the trust as certificates in the the predeployment trust relation and by providing a continuous behaviour-based evalution of trust

    Trust-Based Authentication for Secure Communication in Cognitive Radio Networks

    Get PDF
    Over the past few years, Cognitive Radio (CR) has been considered as a demanding concept for improving the utilization of limited radio spectrum resources for future wireless communications and mobile computing. Since a member of Cognitive Radio Networks may join or leave the network at any time, the issue of supporting secure communication in CRNs becomes more critical than for the other conventional wireless networks. This work thus proposes a secure trust-based authentication approach for CRNs. A CR node’s trust value is determined from its previous trust behavior in the network and depending on this trust value, it is decided whether or not this CR node will obtain access to the Primary User’s free spectrum. The security analysis is performed to guarantee that the proposed approach achieves security proof

    A Secure Key Management Model for Wireless Mesh Networks

    Get PDF
    As Wireless Mesh Networks (WMNs) are newly emerging wireless technologies, they are designed to have huge potential for strengthening Internet deployment and access. However, they are far from muture for large-scale deployment in some applications due to the lack of the satisfactory guarantees on security. The main challenges exposed to the security of WMNs come from the facts of the shared nature of the wireless architecture and the lack of globally trusted central authorities. A well-performed security framework for WMNs will contribute to network survivability and strongly support the network growth. A low-computational and scalable key management model for WMNs is proposed in this paper which aims to guarantee well-performed key management services and protection from potential attacks

    Assessment Re-Think: Income-Generating and Industry-Based Assessments

    Get PDF
    Assessments are the fundamental media between students and educators. This paper aims to evaluate how to create assessments, how students learn from them, and how to link them to the industry and entrepreneurism. The implementation plan postulates how students can generate income from income-generation assessments or business innovation assessments. In this paper, we discuss the involvement of modern industry in assessment. We examine evidence from approximately 100 assessments detailed in 32 subject outlines. We employ a descriptive, pragmatic research methodology to consider whether they can be aligned more with industry expectations and expected duties. We propose a framework to connect with industry and create student income-generating projects. This proposed income-generating assessments framework recommended industry-based assessments with which students can not only earn marks towards a subject but potentially earn an income based on it. This paper extends the idea of peer learning to expert or industry learning: an approach that did not employ in higher education. Our approach supports educators in keeping the assessment up-to-date, enabling students to add more value to their learning of industry products and procedures. Students can directly contribute to the product and procedures and learn from the strategies actively employed in the workplace

    Framework to Maintain Specialisations in a General Degrees Structure: An economical high-value degree structure

    Get PDF
    Structuring a degree is a common activity for course developers. Analyzing appropriate subjects and year levels, establishing pre- and co-requisite, and benchmarking against similar degrees are common academic activities. However, the degree structure itself has not had significant changes until now. A degree often lacks flexibility and cohesion and arguably may even lose the main concept of making students highly skilled in the selected labor market more employable. After examining different degree structures, approaches, and employability incentives, we identified a degree structure that can divide each subject into components. Subjects' learning activities, tutorials, and assessments are tailored to align more closely with employment skills. We then proposed breaking all subjects into components relative to year levels, such as majors, minors, streams, and more. This sub-division of work can be performed to any degree. Particular advantages come with a general degree with standard core units and majors—creating learning activities closer to the major and offering students a more robust academic scaffold of their subjects. In addition, higher Education providers benefit by having a cost-efficient degree with minimum overhead to pass the benefits onto students. We discussed several examples from engineering, business, and information technology. Showing how learning opportunities can be divided per degree and subjects into degrees, majors, streams, and specializations. Students studying this framework will have developed skills firmly built on each other, enabling specialization in employment careers and academically. Closing the gap between employment and graduation
    corecore