A value added service to broadband wireless network is the remote access virtual private network ... more A value added service to broadband wireless network is the remote access virtual private network (VPN). The corporate legitimate portable users can connect to their offices through a wireless network from different locations and get secure services as if they were ...
Wireless Communications and Mobile Computing, 2004
... This is accomplished during the session setup phase with the help of ICRQ message as discusse... more ... This is accomplished during the session setup phase with the help of ICRQ message as discussed in the algorithm previously. Encryption: The data that are sent across the tunnels are sensitive information and hence should be protected from unwanted attackers by encrypting it ...
International Journal of Future Computer and Communication
5G provides businesses with high-speed Internet access, faster bandwidth, and low latency. The us... more 5G provides businesses with high-speed Internet access, faster bandwidth, and low latency. The use of IoT and 5G-enabled sensors provides new opportunities within networks. There are several use cases of 5G with IoT health care, agriculture, remote learning, logistics, manufacturing, government, and retail. However, some security and privacy problems must be addressed within the 5G ecosystem. There is a need to secure user and device associations and data integrity as 5G is becoming more and more popular. In this research-in-progress, we seek to solve security and privacy problems in 5G by applying Blockchain technology to secure 5G connections. The research will consist of an interdisciplinary team of researchers from Illinois State University (ISU) and non-academic-industry partners. During the study, we build a prototype that solves problems in agriculture and healthcare. A private 5G network is installed at ISU. Moisture sensors and IoT devices are installed at the university fa...
Internet of things (IoT) has been attracting the technology world as an integral part for impleme... more Internet of things (IoT) has been attracting the technology world as an integral part for implementation of smart buildings, smart cities and actually, smart world (which is destination of the current trend with the aim of connecting everything to everything). However, some major problems like security issues, lack of sufficient processing power, etc. will prevent researchers and major tech companies to reach a consensus to finalize a highly-secure, efficient architecture for smart cities. In this paper, we’ve proposed a new model to tackle well-known IoT implementation challenges by using software-defined networking (SDN) architecture as an integral part for acting as the brain of the model and one of the significant components of the future 5G telecommunication networks. In addition to that, we’ve taken advantages of the Blockchain technology to enhance the security of IoT networks which will be an integral part of the future smart world paradigm. The security of the model is prov...
IEEE Global Telecommunications Conference, …, 2003
... Ali Bakirdan, Jihad Qaddour, and Imran Khan Jalozie Illinois State University School of Infor... more ... Ali Bakirdan, Jihad Qaddour, and Imran Khan Jalozie Illinois State University School of Information Technology Old Union Building, Campus Box 5150 Normal Il 61790-5150 Fax: (309 ... Introduced by Funk Software and Certicom, EAP-TTLS is essentially an extension to EAP-TLS. ...
... The paper concludes with a discussion of the impact of 4G on wireless technologies ... it pos... more ... The paper concludes with a discussion of the impact of 4G on wireless technologies ... it possible for users to participate in video conferences, receive streaming video for ... and entertainment, and interact with multimedia Web sites and applications using mobile handheld devices ...
A value added service to broadband wireless network is the remote access virtual private network ... more A value added service to broadband wireless network is the remote access virtual private network (VPN). The corporate legitimate portable users can connect to their offices through a wireless network from different locations and get secure services as if they were ...
Wireless Communications and Mobile Computing, 2004
... This is accomplished during the session setup phase with the help of ICRQ message as discusse... more ... This is accomplished during the session setup phase with the help of ICRQ message as discussed in the algorithm previously. Encryption: The data that are sent across the tunnels are sensitive information and hence should be protected from unwanted attackers by encrypting it ...
International Journal of Future Computer and Communication
5G provides businesses with high-speed Internet access, faster bandwidth, and low latency. The us... more 5G provides businesses with high-speed Internet access, faster bandwidth, and low latency. The use of IoT and 5G-enabled sensors provides new opportunities within networks. There are several use cases of 5G with IoT health care, agriculture, remote learning, logistics, manufacturing, government, and retail. However, some security and privacy problems must be addressed within the 5G ecosystem. There is a need to secure user and device associations and data integrity as 5G is becoming more and more popular. In this research-in-progress, we seek to solve security and privacy problems in 5G by applying Blockchain technology to secure 5G connections. The research will consist of an interdisciplinary team of researchers from Illinois State University (ISU) and non-academic-industry partners. During the study, we build a prototype that solves problems in agriculture and healthcare. A private 5G network is installed at ISU. Moisture sensors and IoT devices are installed at the university fa...
Internet of things (IoT) has been attracting the technology world as an integral part for impleme... more Internet of things (IoT) has been attracting the technology world as an integral part for implementation of smart buildings, smart cities and actually, smart world (which is destination of the current trend with the aim of connecting everything to everything). However, some major problems like security issues, lack of sufficient processing power, etc. will prevent researchers and major tech companies to reach a consensus to finalize a highly-secure, efficient architecture for smart cities. In this paper, we’ve proposed a new model to tackle well-known IoT implementation challenges by using software-defined networking (SDN) architecture as an integral part for acting as the brain of the model and one of the significant components of the future 5G telecommunication networks. In addition to that, we’ve taken advantages of the Blockchain technology to enhance the security of IoT networks which will be an integral part of the future smart world paradigm. The security of the model is prov...
IEEE Global Telecommunications Conference, …, 2003
... Ali Bakirdan, Jihad Qaddour, and Imran Khan Jalozie Illinois State University School of Infor... more ... Ali Bakirdan, Jihad Qaddour, and Imran Khan Jalozie Illinois State University School of Information Technology Old Union Building, Campus Box 5150 Normal Il 61790-5150 Fax: (309 ... Introduced by Funk Software and Certicom, EAP-TTLS is essentially an extension to EAP-TLS. ...
... The paper concludes with a discussion of the impact of 4G on wireless technologies ... it pos... more ... The paper concludes with a discussion of the impact of 4G on wireless technologies ... it possible for users to participate in video conferences, receive streaming video for ... and entertainment, and interact with multimedia Web sites and applications using mobile handheld devices ...
Uploads
Papers by jihad qaddour