SwePub
Sök i SwePub databas

  Extended search

Träfflista för sökning "WFRF:(Shafagh Hossein) "

Search: WFRF:(Shafagh Hossein)

  • Result 1-10 of 13
Sort/group result
   
EnumerationReferenceCoverFind
1.
  • Hithnawi, Anwar, et al. (author)
  • CrossZig: Combating Cross-Technology Interference in Low-power Wireless Networks
  • 2016
  • In: 2016 15th ACM/IEEE International Conference on Information Processing in Sensor Networks, IPSN 2016 - Proceedings. - : IEEE. - 9781509008025
  • Conference paper (peer-reviewed)abstract
    • Low-power wireless devices suffer notoriously from Cross- Technology Interference (CTI). To enable co-existence, researchers have proposed a variety of interference mitigation strategies. Existing solutions, however, are designed to work with the limitations of currently available radio chips. In this paper, we investigate how to exploit physical layer properties of 802.15.4 signals to better address CTI. We present CrossZig, a cross-layer solution that takes advantage of physical layer information and processing to improve low-power communication under CTI. To this end, CrossZig utilizes physical layer information to detect presence of CTI in a corrupted packet and to apply an adaptive packet recovery which incorporates a novel cross-layer based packet merging and an adaptive FEC coding. We implement a prototype of CrossZig for the low-power IEEE 802.15.4 in a software-defined radio platform. We show the adaptability and the performance gain of CrossZig through experimental evaluation considering both micro-benchmarking and system performance under various interference patterns. Our results demonstrate that CrossZig can achieve a high accuracy in error localization (94.3% accuracy) and interference type identification (less than 5% error rate for SINR ranges below 3 dB). Moreover, our system shows consistent performance improvements under interference from various interfering technologies.
  •  
2.
  • Hithnawi, Anwar, et al. (author)
  • Poster Abstract: Low-Power Wireless Channel Quality Estimation in the Presence of RF Smog
  • 2014. - 7
  • Conference paper (peer-reviewed)abstract
    • Low-power wireless networks deployed in indoor environments inevitably encounter high-power Cross Technology Interference (CTI) from a wide range of wireless devices operating in the shared RF spectrum bands. This severely reduces the performance of such networks and possibly causes loss of connectivity, which affects their availability and drains their resources. In this work, to address the channel uncertainty, a consequence of CTI, we propose a novel channel metric that (i) harnesses the local knowledge of a node about the wireless channel to discern the presence of persistent high-power interferers, and (ii) assists the node in inferring its proximity to the dominant interference sources in the physical space. In order to motivate and validate the necessity of such a metric, we empirically characterize the impact of the interaction between high/low-power cross technology interferers and IEEE 802.15.4.
  •  
3.
  • Hithnawi, Anwar, et al. (author)
  • TIIM : Technology-independent interference mitigation for low-power Wireless Networks
  • 2015
  • In: IPSN 2015 - Proceedings of the 14th International Symposium on Information Processing in Sensor Networks (Part of CPS Week). - New York, NY, USA : Association for Computing Machinery, Inc. - 9781450334754 ; , s. 1-12
  • Conference paper (peer-reviewed)abstract
    • The rise of heterogeneity in wireless technologies operating in the unlicensed bands has been shown to adversely affect the performance of low-power wireless networks. Cross-Technology Interference (CTI) is highly uncertain and raises the need for agile methods that assess the channel conditions and apply actions maximizing communication success. In this paper, we present TIIM, a lightweight Technology-Independent Interference Mitigation solution that detects, quantifies, and reacts to CTI in realtime. TIIM employs a lightweight machine learning classifier to (i) decide whether communication is viable over the interfered link, (ii) characterize the ambient conditions and apply the best coexistence mitigation strategy. We present an in-depth experimental characterization of the effect of CTI on 802.15.4 links, which motivated and influenced the design of TIIM. Our evaluation shows that TIIM, while exposed to extensive and heterogeneous interference, can achieve a total PRR improvement of 30% with an additional transmission overhead of 5.6%.
  •  
4.
  • Hithnawi, Anwar, et al. (author)
  • Understanding the Impact of Cross Technology Interference on IEEE 802.15.4
  • 2014. - 7
  • Conference paper (peer-reviewed)abstract
    • Over the last few decades, we witnessed notable progress in wireless communication. This has led to rapid emergence of heterogeneous wireless technologies that share the RF spectrum in an un-coordinated way. Such a coexistence introduces high uncertainty and complexity to the medium, affecting reliability and availability of wireless networks. This problem aggravates for technologies operating in the lightly regulated, yet crowded ISM bands. To address coexistence of different technologies in the scarce RF spectrum, provide proper interference-aware protocols, and mitigation schemes, we need to develop a good understanding of the interaction patterns of these technologies. In this paper, we provide a thorough study of the implications of Cross Technology Interference (CTI) on the particularly vulnerable low-power IEEE 802.15.4 wireless networks. We identify the underlying vulnerabilities that hamper 802.15.4 to withstand CTI. We show that the uncertainty that CTI induces on the wireless channel is not completely stochastic; CTI exhibits distinct patterns that can be exploited by interference-aware protocols.
  •  
5.
  • Hummen, René, et al. (author)
  • Delegation-based Authentication and Authorization for the IP-based Internet of Things
  • 2014. - 9
  • Conference paper (peer-reviewed)abstract
    • IP technology for resource-constrained devices enables transparent end-to-end connections between a vast variety of devices and services in the Internet of Things (IoT). To protect these connections, several variants of traditional IP security protocols have recently been proposed for standardization, most notably the DTLS protocol. In this paper, we identify significant resource requirements for the DTLS handshake when employing public-key cryptography for peer authentication and key agreement purposes. These overheads particularly hamper secure communication for memory-constrained devices. To alleviate these limitations, we propose a delegation architecture that offloads the expensive DTLS connection establishment to a delegation server. By handing over the established security context to the constrained device, our delegation architecture significantly reduces the resource requirements of DTLS-protected communication for constrained devices. Additionally, our delegation architecture naturally provides authorization functionality when leveraging the central role of the delegation server in the initial connection establishment. Hence, in this paper, we present a comprehensive, yet compact solution for authentication, authorization, and secure data transmission in the IP-based IoT. The evaluation results show that compared to a public-key-based DTLS handshake our delegation architecture reduces the memory overhead by 64 %, computations by 97 %, network transmissions by 68 %.
  •  
6.
  •  
7.
  • Hummen, Rene, et al. (author)
  • Towards viable certificate-based authentication for the Internet of Things
  • 2013
  • In: HotWiSec 2013 - Proceedings of the 2013 ACM Workshop on Hot Topics on Wireless Network Security and Privacy. - New York, NY, USA : ACM. - 9781450320030 ; , s. 37-41
  • Conference paper (peer-reviewed)abstract
    • The vision of the Internet of Things considers smart objects in the physical world as first-class citizens of the digital world. Especially IP technology and RESTful web services on smart objects promise simple interactions with Internet services in the Web of Things, e.g., for building automation or in e-health scenarios. Peer authentication and secure data transmission are vital aspects in many of these scenarios to prevent leakage of personal information and harmful actuating tasks. While standard security solutions exist for traditional IP networks, the constraints of smart objects demand for more lightweight security mechanisms. Thus, the use of certificates for peer authentication is predominantly considered impracticable. In this paper, we investigate if this assumption is valid. To this end, we present preliminary overhead estimates for the certificate-based DTLS handshake and argue that certificates - with improvements to the handshake - are a viable method of authentication in many network scenarios. We propose three design ideas to reduce the overheads of the DTLS handshake. These ideas are based on (i) pre-validation, (ii) session resumption, and (iii) handshake delegation. We qualitatively analyze the expected overhead reductions and discuss their applicability. 
  •  
8.
  •  
9.
  • Raza, Shahid, 1980-, et al. (author)
  • Lithe: Lightweight Secure CoAP for the Internet of Things
  • 2013
  • In: IEEE Sensors Journal. - 1530-437X .- 1558-1748. ; 13, s. 3711-3720
  • Journal article (peer-reviewed)abstract
    • The Internet of Things (IoT) enables a wide range of application scenarios with potentially critical actuating and sensing tasks, e.g., in the e-health domain. For communication at the application layer, resource-constrained devices are expected to employ the Constrained Application Protocol (CoAP) that is currently being standardized at the IETF. To protect the transmission of sensitive information, secure CoAP (CoAPs) mandates the use of Datagram TLS (DTLS) as the underlying security protocol for authenticated and confidential communica- tion. DTLS, however, was originally designed for comparably powerful devices that are interconnected via reliable, high- bandwidth links.In this paper, we present Lithe – an integration of DTLS and CoAP for the IoT. With Lithe, we additionally propose a novel DTLS header compression scheme that aims to significantly reduce the header overhead of DTLS leveraging the 6LoWPAN standard. Most importantly, our proposed DTLS header com- pression scheme does not compromise the end-to-end security properties provided by DTLS. At the same time, it considerably reduces the number of transmitted bytes while maintaining DTLS standard compliance. We evaluate our approach based on a DTLS implementation for the Contiki operating system. Our evaluation results show significant gains in terms of packet size, energy consumption, processing time, and network-wide response times, when compressed DTLS is enabled. 
  •  
10.
  • Shafagh, Hossein, et al. (author)
  • Poster: Towards Encrypted Query Processing for the Internet of Things
  • 2015. - 10
  • In: Proceedings of the 21st Annual International Conference on Mobile Computing and Networking (MobiCom '15). - New York, NY, USA : ACM. - 9781450336192 ; , s. 251-253
  • Conference paper (peer-reviewed)abstract
    • The Internet of Things (IoT) is envisioned to digitize the physical world, resulting in a digital representation of our proximate living space. The possibility of inferring privacy violating information from IoT data necessitates adequate security measures regarding data storage and communication. To address these privacy and security concerns, we introduce our system that stores IoT data securely in the Cloud database while still allowing query processing over the encrypted data. We enable this by encrypting IoT data with a set of cryptographic schemes such as order-preserving and partially homomorphic encryptions. To achieve this on resource-limited devices, our system relies on optimized algorithms that accelerate partial homomorphic and order preserving encryptions by 1 to 2 orders of magnitude. Our early results show the feasibility of our system on low-power devices. We envision our system as an enabler of secure IoT applications.
  •  
Skapa referenser, mejla, bekava och länka
  • Result 1-10 of 13

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Close

Copy and save the link in order to return to this view