Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleOctober 2024
Anonymous and reliable ultralightweight RFID-enabled authentication scheme for IoT systems in cloud computing
- Mohd Shariq,
- Mauro Conti,
- Karan Singh,
- Chhagan Lal,
- Ashok Kumar Das,
- Shehzad Ashraf Chaudhry,
- Mehedi Masud
Computer Networks: The International Journal of Computer and Telecommunications Networking (CNTW), Volume 252, Issue Chttps://doi.org/10.1016/j.comnet.2024.110678AbstractWith the continuing growth in various research domains such as Artificial Intelligence (AI), Machine Learning (ML), Big Data Analytics (BDA), and Cloud Computing (CC), the Internet of Things (IoT) has become a popular technology nowadays. It ...
- research-articleMay 2024
SYNTROPY: TCP SYN DDoS attack detection for Software Defined Network based on Rényi entropy
Computer Networks: The International Journal of Computer and Telecommunications Networking (CNTW), Volume 244, Issue Chttps://doi.org/10.1016/j.comnet.2024.110327AbstractThe rapidly evolving landscape of network security, particularly in Software Defined Networks (SDNs), presents a critical need for efficient and adaptive DDoS attack detection methods, especially in the face of TCP SYN DDoS attacks. These attacks ...
- research-articleMarch 2024
Explainable artificial intelligence for intrusion detection in IoT networks: A deep learning based approach
Expert Systems with Applications: An International Journal (EXWA), Volume 238, Issue PAhttps://doi.org/10.1016/j.eswa.2023.121751AbstractThe Internet of Things (IoT) is currently seeing tremendous growth due to new technologies and big data. Research in the field of IoT security is an emerging topic. IoT networks are becoming more vulnerable to new assaults as a result of the ...
Highlights- A Deep Learning based model is designed for attack classification in IoT networks.
- The speed and accuracy are improved with the fewest possible features.
- Hyperparameter tuning was performed for optimization.
- Model explanation ...
- research-articleFebruary 2024
SPARQ: SYN Protection using Acyclic Redundancy check and Quartile range on P4 switches
Computer Communications (COMS), Volume 216, Issue CPages 283–294https://doi.org/10.1016/j.comcom.2023.12.027AbstractSoftware-defined networking (SDN), enabled by high-performance programmable switches, offers a new avenue to counter cyber attacks. Programmable switches offer the ability to customize and conduct in-depth packet analysis, thus providing ...
- research-articleFebruary 2024
A Location-Aware and Healing Attestation Scheme for Air-Supported Internet of Vehicles
IEEE Transactions on Intelligent Transportation Systems (ITS-TRANSACTIONS), Volume 25, Issue 2Pages 2017–2033https://doi.org/10.1109/TITS.2023.3316775With the rapid technological advancement in the Internet of Things (IoT) and Internet of Vehicles (IoV), we witness exponential growth of Connected and Autonomous Vehicles (CAVs). However, these integrations of IoV with other technologies make the IoV ...
-
- research-articleJuly 2023
Astraea: Anonymous and Secure Auditing Based on Private Smart Contracts for Donation Systems
IEEE Transactions on Dependable and Secure Computing (TDSC), Volume 20, Issue 4Pages 3002–3018https://doi.org/10.1109/TDSC.2022.3204287Many regions are in urgent need of facial masks for slowing down the spread of COVID-19. To fight the pandemic, people are contributing masks through donation systems. Most existing systems are built on a centralized architecture which is prone to the ...
- research-articleJuly 2023
Nereus: Anonymous and Secure Ride-Hailing Service Based on Private Smart Contracts
IEEE Transactions on Dependable and Secure Computing (TDSC), Volume 20, Issue 4Pages 2849–2866https://doi.org/10.1109/TDSC.2022.3192367Security and privacy issues have become a major hindrance to the broad adoption of Ride-Hailing Services (RHSs). In this article, we introduce a new collusion attack initiated by the Ride-Hailing Service Provider (RHSP) and a driver that could easily link ...
- research-articleMay 2023
Authenticated Message-Exchange Protocol for Fog-Assisted Vehicular Cloud Computing
Wireless Personal Communications: An International Journal (WPCO), Volume 131, Issue 2Pages 1295–1312https://doi.org/10.1007/s11277-023-10480-7AbstractThe Vehicular Cloud Computing (VCC) provides significant benefits (e.g., higher resource availability, and low communication latency) to vehicular applications. However, still there exists latency related issues with applications that require real-...
- research-articleMay 2023
EQRSRL: an energy-aware and QoS-based routing schema using reinforcement learning in IoMT
Wireless Networks (WIRE), Volume 29, Issue 7Pages 3239–3253https://doi.org/10.1007/s11276-023-03367-9AbstractInternet of Medical Thing (IoMT) is an emerging technology in healthcare that can be used to realize a wide variety of medical applications. It improves people’s quality of life and makes it easier to care for the sick individuals in an efficient ...
- research-articleMay 2023
An efficient and reliable ultralightweight RFID authentication scheme for healthcare systems
Computer Communications (COMS), Volume 205, Issue CPages 147–157https://doi.org/10.1016/j.comcom.2023.04.013AbstractIn the era of the Internet of Communication Technologies (ICT), the Internet is becoming more popular and widely used across the world. Radio Frequency IDentification (RFID) has become a prominent technology in healthcare systems for ...
- research-articleApril 2023
Anomaly based network intrusion detection for IoT attacks using deep learning technique
Computers and Electrical Engineering (CENG), Volume 107, Issue Chttps://doi.org/10.1016/j.compeleceng.2023.108626AbstractInternet of Things (IoT) applications are growing in popularity for being widely used in many real-world services. In an IoT ecosystem, many devices are connected with each other via internet, making IoT networks more vulnerable to ...
Graphical abstractDisplay Omitted
- research-articleJanuary 2023
A Survey on Blockchain for Healthcare: Challenges, Benefits, and Future Directions
- Mohammad Salar Arbabi,
- Chhagan Lal,
- Narasimha Raghavan Veeraragavan,
- Dusica Marijan,
- Jan F. Nygård,
- Roman Vitenberg
IEEE Communications Surveys & Tutorials (IEEE_ICST), Volume 25, Issue 1Pages 386–424https://doi.org/10.1109/COMST.2022.3224644Continuously generated volumes of health data make healthcare a data-intensive domain. This data needs to be collected, stored, and shared among different healthcare actors for various purposes, such as reporting, analysis, collaborative research, and ...
- research-articleDecember 2022
HTTPScout: A Machine Learning based Countermeasure for HTTP Flood Attacks in SDN
International Journal of Information Security (IJOIS), Volume 22, Issue 2Pages 367–379https://doi.org/10.1007/s10207-022-00641-3AbstractNowadays, the number of Distributed Denial of Service (DDoS) attacks is growing rapidly. The aim of these type of attacks is to make the prominent and critical services unavailable for legitimate users. HTTP flooding is one of the most common DDoS ...
- research-articleNovember 2022
ESRAS: An efficient and secure ultra-lightweight RFID authentication scheme for low-cost tags
Computer Networks: The International Journal of Computer and Telecommunications Networking (CNTW), Volume 217, Issue Chttps://doi.org/10.1016/j.comnet.2022.109360AbstractInternet of Things (IoT) technologies rapidly evolve and are used in many real-life applications. One of the core technologies used in various IoT applications is Radio Frequency IDentification (RFID) technology. RFID wirelessly and ...
- ArticleSeptember 2022
Repetitive, Oblivious, and Unlinkable SkNN Over Encrypted-and-Updated Data on Cloud
AbstractLocation-Based Services (LBSs) depend on a Service Provider (SP) to store data owners’ geospatial data and to process data users’ queries. For example, a Yelp user queries the SP to retrieve the k nearest Starbucks by submitting her/his current ...
- review-articleAugust 2022
Blockchain verification and validation: Techniques, challenges, and research directions
AbstractAs blockchain technology is gaining popularity in industry and society, solutions for Verification and Validation (V&V) of blockchain-based software applications (BC-Apps) have started gaining equal attention. To ensure that BC-Apps ...
- research-articleJuly 2022
Software defined network-based HTTP flooding attack defender
Computers and Electrical Engineering (CENG), Volume 101, Issue Chttps://doi.org/10.1016/j.compeleceng.2022.108019AbstractIn recent years, the explosive growth of the Internet has led to an increment in the number of Distributed Denial of Service (DDoS) attacks. HTTP Flooding is a critical DDoS attack that targets HTTP servers to prohibit users from ...
Graphical abstract
Display Omitted
Highlights- SHFD is proposed for mitigating slow and high rate HTTP flooding attacks in SDN-based networks.
- research-articleMarch 2022
User-Defined Privacy-Preserving Traffic Monitoring Against n-by-1 Jamming Attack
IEEE/ACM Transactions on Networking (TON), Volume 30, Issue 5Pages 2060–2073https://doi.org/10.1109/TNET.2022.3157654Traffic monitoring services collect traffic reports and respond to users’ traffic queries. However, the reports and queries may reveal the user’s identity and location. Although different anonymization techniques have been applied to protect ...
- ArticleOctober 2021
Where to Meet a Driver Privately: Recommending Pick-Up Locations for Ride-Hailing Services
AbstractRide-Hailing Service (RHS) has motivated the rise of innovative transportation services. It enables riders to hail a cab or private vehicle at the roadside by sending a ride request to the Ride-Hailing Service Provider (RHSP). Such a request ...
- research-articleMarch 2021
AEGIS: Detection and Mitigation of TCP SYN Flood on SDN Controller
IEEE Transactions on Network and Service Management (ITNSM), Volume 18, Issue 1Pages 745–759https://doi.org/10.1109/TNSM.2020.3037124Software-Defined Network (SDN) segregates the control plane and the data plane to bring about a programmable network. The controller at the control plane runs network modules and sets rules for forwarding the packets in the switches that resides at the ...