Implantable Medical Device Security DOI Creative Commons
Luigi Catuogno, Clemente Galdi

Cryptography, Journal Year: 2024, Volume and Issue: 8(4), P. 53 - 53

Published: Nov. 15, 2024

Implantable medical devices, or IMDs for short, are instruments that placed into the human body through surgery. typically used treating chronic diseases. Currently available capable of communicating using wireless channels with other either in close proximity even connected to Internet, making part Internet Medical Things. This capability opens possibility developing a wide range services, like remote patient data control, localization case emergency, telemedicine, which can improve patients’ lifestyle. On hand, given limited resources such tiny and access there numerous security issues be considered when designing deploying their support infrastructures. In this paper, we highlight problems related Internet-connected IMDs, survey some solutions have been presented literature.

Language: Английский

Securing cross-domain data access with decentralized attribute-based access control DOI Creative Commons
Seyedmohammad Salehi, Carsten Rudolph, Hooman Alavizadeh

et al.

Ad Hoc Networks, Journal Year: 2025, Volume and Issue: unknown, P. 103807 - 103807

Published: March 1, 2025

Language: Английский

Citations

1

Two-Layered Multi-Factor Authentication Using Decentralized Blockchain in an IoT Environment DOI Creative Commons

Saeed Bamashmos,

Naveen Chilamkurti, Ahmad Salehi S.

et al.

Sensors, Journal Year: 2024, Volume and Issue: 24(11), P. 3575 - 3575

Published: June 1, 2024

Internet of Things (IoT) technology is evolving over the peak smart infrastructure with participation IoT devices in a wide range applications. Traditional authentication methods are vulnerable to threats due wireless data transmission. However, resource- and energy-constrained, so building lightweight security that provides stronger essential. This paper proposes novel, two-layered multi-factor (2L-MFA) framework using blockchain enhance user security. The first level for devices, one considers secret keys, geographical location, physically unclonable function (PUF). Proof-of-authentication (PoAh) elliptic curve Diffie–Hellman followed low latency support. Second-level users, which sub-categorized into four levels, each defined by specific factors such as identity, password, biometrics. involves matrix-based password; second utilizes digital signature algorithm (ECDSA); levels 3 4 secured iris finger vein, providing comprehensive robust authentication. We deployed fuzzy logic validate make system more robust. 2L-MFA model significantly improves performance, reducing registration, login, times up 25%, 50%, respectively, facilitating quicker cloud access post-authentication enhancing overall efficiency.

Language: Английский

Citations

4

Physical layer security techniques for grant-free massive Machine-Type Communications in 5G and beyond: A survey, challenges, and future directions DOI
Uchenna P. Enwereonye, Ahmad Salehi S., Hooman Alavizadeh

et al.

Computer Networks, Journal Year: 2025, Volume and Issue: unknown, P. 111268 - 111268

Published: April 1, 2025

Language: Английский

Citations

0

Visual Data and Pattern Analysis for Smart Education: A Robust DRL-Based Early Warning System for Student Performance Prediction DOI Creative Commons
Wala Bagunaid, Naveen Chilamkurti, Ahmad Salehi S.

et al.

Future Internet, Journal Year: 2024, Volume and Issue: 16(6), P. 206 - 206

Published: June 11, 2024

Artificial Intelligence (AI) and Deep Reinforcement Learning (DRL) have revolutionised e-learning by creating personalised, adaptive, secure environments. However, challenges such as privacy, bias, data limitations persist. E-FedCloud aims to address these issues providing more agile, experiences. This study introduces E-FedCloud, an AI-assisted, adaptive system that automates personalised recommendations tracking, thereby enhancing student performance. It employs federated learning-based authentication ensure private access for both course instructors students. Intelligent Software Agents (ISAs) evaluate weekly engagement using the Shannon Entropy method, classifying students into either engaged or not-engaged clusters. utilises status, demographic information, innovative DRL-based early warning system, specifically ID2QN, predict performance of Based on predictions, categorises three groups: risk dropping out, scoring lower in final exam, failing end exam. a multi-disciplinary ontology graph attention-based capsule network automated, recommendations. The also integrates tracking enhance engagement. Data are securely stored blockchain LWEA encryption method.

Language: Английский

Citations

2

Secure Trust Node Acquisition and Access Control for Privacy-Preserving Expertise Trust in WBAN Networks DOI
Israa Al Barazanchi, Wahidah Hashim,

Reema Thabit

et al.

Lecture notes in networks and systems, Journal Year: 2024, Volume and Issue: unknown, P. 265 - 275

Published: Jan. 1, 2024

Language: Английский

Citations

2

The Role of Cloud Storage in Rebuilding Governmental Data After Conflict: A Case Study of Sudan 2023 DOI Open Access

Sabah Ahmed

International Journal of Computers and Informatics, Journal Year: 2024, Volume and Issue: 3(3), P. 42 - 62

Published: March 31, 2024

The aim of this research is to assess the Role Cloud Storage in Rebuilding Governmental Data After Conflict, with a deeper insight into Sudanese case. To investigate role cloud storage rebuilding governmental data after conflict Sudan, study employs quantitative methodology. primary collection instrument structured questionnaire designed gather insights and perspectives from 80 participants key stakeholders involved adoption reconstruction efforts including (IT professionals management experts, Senior-level government officials policymakers, Representatives service providers, End-users consumers various agencies). collected underwent accurate statistical analysis, descriptive inferential techniques, identify patterns, trends, relationships among variables under investigation. Quantitative was analyzed using "SPSS" software. findings revealed that, total 18 representing (22.5%) agree that there high level awareness understanding technologies agencies while 28 (35%) disagree. Which indicates need spreading Sudan. Furthermore, Pearson Chi-Square test used measure significance value (0.021) which less than (p-value=.05) suggests significant

Language: Английский

Citations

1

A lossless quantization approach for physical-layer key generation in vehicular ad hoc networks based on received signal strength DOI

Ibraheem Abdelazeem,

Weibin Zhang,

Abdeldime Mohamedsalih

et al.

Vehicular Communications, Journal Year: 2024, Volume and Issue: 49, P. 100809 - 100809

Published: June 5, 2024

Language: Английский

Citations

1

A Novel Endorsement Protocol to Secure BFT-Based Consensus in Permissionless Blockchain DOI
Ziqiang Xu, Ahmad Salehi S., Naveen Chilamkurti

et al.

2022 IEEE Wireless Communications and Networking Conference (WCNC), Journal Year: 2024, Volume and Issue: unknown, P. 1 - 6

Published: April 21, 2024

Permissionless blockchain technology offers numerous potential benefits for decentralised applications, such as security, transparency, and openness.BFT-based consensus mechanisms are widely adopted in the permissioned to meet high scalability requirements of network.Sybil attacks one most threats when applying BFT-based permissionless due lack effective verification participants' identities.This paper presents a novel endorsement-based bootstrapping protocol with signature algorithm that streamlined, scalable identity endorsement process.This approach effectively safeguards mechanism against Sybil attacks.Using our proposed method, we have conducted thorough security analyses simulation experiments assess robustness, advantages large-scale networks.Our results demonstrate scheme can address challenges blockchain.

Language: Английский

Citations

1

PROBLEMS OF ASSESSING TRUST IN INFORMATION SECURITY AUDIT PROCESSES DOI Open Access

Andrey Ivanov,

Igor A. Ognev

Voprosy kiberbezopasnosti, Journal Year: 2024, Volume and Issue: 3 (61)

Published: Jan. 1, 2024

Цель исследования: формирование алгоритма оценки доверия к процессу аудита информационной безопасности, состоящего из последовательного многоэтапного анализа доказательств по иерархической модели «объект-критерии-метрики»

Language: Русский

Citations

0

Secure and Efficient Classification of Trusted and Untrusted Nodes in Wireless Body Area Networks: A Survey of Techniques and Applications DOI

Israa Ibraheem Al Barazanchi,

Wahidah Hashim,

Reema Thabit

et al.

Lecture notes in networks and systems, Journal Year: 2024, Volume and Issue: unknown, P. 254 - 264

Published: Jan. 1, 2024

Language: Английский

Citations

0