9 results on '"Gheisari, Mehdi"'
Search Results
2. Security and Privacy Challenges in SDN-Enabled IoT Systems: Causes, Proposed Solutions, and Future Directions.
- Author
-
Rahdari, Ahmad, Jalili, Ahmad, Esnaashari, Mehdi, Gheisari, Mehdi, Vorobeva, Alisa A., Fang, Zhaoxi, Sun, Panjun, Korzhuk, Viktoriia M., Popov, Ilya, Wu, Zongda, and Tahaei, Hamid
- Subjects
SOFTWARE-defined networking ,TECHNOLOGICAL innovations ,ACCESS control ,INTERNET of things ,INTERNET security ,DEEP learning - Abstract
Software-Defined Networking (SDN) represents a significant paradigm shift in network architecture, separating network logic from the underlying forwarding devices to enhance flexibility and centralize deployment. Concurrently, the Internet of Things (IoT) connects numerous devices to the Internet, enabling autonomous interactions with minimal human intervention. However, implementing and managing an SDN-IoT system is inherently complex, particularly for those with limited resources, as the dynamic and distributed nature of IoT infrastructures creates security and privacy challenges during SDN integration. The findings of this study underscore the primary security and privacy challenges across application, control, and data planes. A comprehensive review evaluates the root causes of these challenges and the defense techniques employed in prior works to establish sufficient secrecy and privacy protection. Recent investigations have explored cutting-edge methods, such as leveraging blockchain for transaction recording to enhance security and privacy, along with applying machine learning and deep learning approaches to identify and mitigate the impacts of Denial of Service (DoS) and Distributed DoS (DDoS) attacks. Moreover, the analysis indicates that encryption and hashing techniques are prevalent in the data plane, whereas access control and certificate authorization are prominently considered in the control plane, and authentication is commonly employed within the application plane. Additionally, this paper outlines future directions, offering insights into potential strategies and technological advancements aimed at fostering a more secure and privacy-conscious SDN-based IoT ecosystem. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
3. IoT-SDNPP: A Method for Privacy-Preserving in Smart City with Software Defined Networking
- Author
-
Gheisari, Mehdi, Wang, Guojun, Chen, Shuhong, Ghorbani, Hamidreza, Hutchison, David, Series Editor, Kanade, Takeo, Series Editor, Kittler, Josef, Series Editor, Kleinberg, Jon M., Series Editor, Mattern, Friedemann, Series Editor, Mitchell, John C., Series Editor, Naor, Moni, Series Editor, Pandu Rangan, C., Series Editor, Steffen, Bernhard, Series Editor, Terzopoulos, Demetri, Series Editor, Tygar, Doug, Series Editor, Weikum, Gerhard, Series Editor, Vaidya, Jaideep, editor, and Li, Jin, editor
- Published
- 2018
- Full Text
- View/download PDF
4. Privacy-Preserving Techniques in Cloud/Fog and Internet of Things.
- Author
-
Lee, Cheng-Chi, Gheisari, Mehdi, Shayegan, Mohammad Javad, Ahvanooey, Milad Taleby, and Liu, Yang
- Subjects
- *
INTERNET of things , *BATCH processing , *DIGITAL watermarking , *RANDOM numbers , *STYLOMETRY , *FOG , *COMPUTER passwords - Abstract
This document is a summary of a special issue on privacy-preserving techniques in cloud/fog and Internet of Things (IoT) networks. The issue explores various methods and strategies for protecting privacy in these networks, including cryptographic algorithms, federated learning models, and password-less authentication. The authors also discuss the challenges of securing IoT devices with limited computational power and the importance of safeguarding data in large networks. The special issue includes 10 selected papers out of a total of 21 submissions, covering topics such as true random number generation, shared key generation, watermarking, dependability assessment, authentication schemes, federated learning, batch processing, stylometry, and searchable encryption. The authors express their gratitude to the contributors for their valuable research in this field. [Extracted from the article]
- Published
- 2023
- Full Text
- View/download PDF
5. An intelligent sustainable efficient transmission internet protocol to switch between User Datagram Protocol and Transmission Control Protocol in IoT computing.
- Author
-
Mahmoodi Khaniabadi, Shadi, Javadpour, Amir, Gheisari, Mehdi, Zhang, Weizhe, Liu, Yang, and Sangaiah, Arun Kumar
- Subjects
INTERNET protocols ,COMPUTER network protocols ,INTERNET of things ,STREAMING video & television ,TCP/IP ,ENERGY consumption - Abstract
Today, Internet of things (IoT), Cloud and Fog networks have spread out around the world. The more these networks grow, the more their energy consumption comes to attention. Many efforts have been made during recent years to decrease this energy consumption, mainly focused on utilizing low‐power devices. Green algorithms are recently proposed to reduce energy consumption by modifying the structure of many algorithms employed in the network and its protocols. This paper proposes a new green reliability algorithm for Transmission Control Protocol/Internet Protocol (TCP/IP protocol) in Fog computing. The proposed algorithm does not require extensive TCP/IP protocol changes or relevant hardware. It is based on transferring less number of packets in the network by using the advantage of differences between TCP and User Datagram Protocol (UDP). TCP and User Datagram Protocol (UDP) are different in nature as the number of total packets in UDP is half that of TCP. As a result, the number of complete packets in UDP is half that of TCP. The proposed method is built around the loss of some packets in applications, such as voice and online video, does not severely degrade the end results. Therefore, the UDP protocol can substitute TCP in such situations. The criterion to switch between the two is the minimum acceptable Quality of Service (QoS) of the overall network. In other words, the UDP protocol will be used as long as QoS requirements are met. The switching process between UDP and TCP is dynamic, optimized by estimating network noise in the period. Additionally, we evaluated the proposed method based on several QoS functions, including delay, throughput, and energy usage. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
6. Recent trends towards privacy‐preservation in Internet of Things, its challenges and future directions.
- Author
-
Safaei Yaraziz, Mahdi, Jalili, Ahmad, Gheisari, Mehdi, and Liu, Yang
- Subjects
INTERNET of things ,DATA encryption ,SMART devices ,MACHINE learning ,SECURITY systems ,PRIVACY - Abstract
The Internet of Things (IoT) is a self‐configuring, intelligent system in which autonomous things connect to the Internet and communicate with each other. As 'things' are autonomous, it may raise privacy concerns. In this study, the authors describe the background of IoT systems and privacy and security measures, including (a) approaches to preserving privacy in IoT‐based systems, (b) existing privacy solutions, and (c) recommending privacy models for different layers of IoT applications. Based on the results of our study, it is clear that new methods such as Blockchain, Machine Learning, Data Minimisation, and Data Encryption can greatly impact privacy issues to ensure security and privacy. Moreover, it makes sense that users can protect their personal information easier if there is fewer data to collect, store, and share by smart devices. Thus, this study proposes a machine learning‐based data minimisation method that, in these networks, can be very beneficial for privacy‐preserving. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
7. Internet of Medical Things Privacy and Security: Challenges, Solutions, and Future Trends from a New Perspective.
- Author
-
Kamalov, Firuz, Pourghebleh, Behrouz, Gheisari, Mehdi, Liu, Yang, and Moussa, Sherif
- Abstract
The Internet of Medical Things (IoMT), an application of the Internet of Things (IoT) in the medical domain, allows data to be transmitted across communication networks. In particular, IoMT can help improve the quality of life of citizens and older people by monitoring and managing the body's vital signs, including blood pressure, temperature, heart rate, and others. Since IoMT has become the main platform for information exchange and making high-level decisions, it is necessary to guarantee its reliability and security. The growth of IoMT in recent decades has attracted the interest of many experts. This study provides an in-depth analysis of IoT and IoMT by focusing on security concerns from different points of view, making this comprehensive survey unique compared to other existing studies. A total of 187 articles from 2010 to 2022 are collected and categorized according to the type of applications, year of publications, variety of applications, and other novel perspectives. We compare the current studies based on the above criteria and provide a comprehensive analysis to pave the way for researchers working in this area. In addition, we highlight the trends and future work. We have found that blockchain, as a key technology, has solved many problems of security, authentication, and maintenance of IoT systems due to the decentralized nature of the blockchain. In the current study, this technology is examined from the application fields' points of view, especially in the health sector, due to its additional importance compared to other fields. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
8. An IoT and machine learning‐based routing protocol for reconfigurable engineering application.
- Author
-
Natarajan, Yuvaraj, Srihari, Kannan, Dhiman, Gaurav, Chandragandhi, Selvaraj, Gheisari, Mehdi, Liu, Yang, Lee, Cheng‐Chi, Singh, Krishna Kant, Yadav, Kusum, and Alharbi, Hadeel Fahad
- Subjects
INTERNET of things ,COGNITIVE radio ,ENGINEERING ,POWER resources ,TELECOMMUNICATION ,DATA transmission systems ,MACHINE learning - Abstract
With new telecommunications engineering applications, the cognitive radio (CR) network‐based internet of things (IoT) resolves the bandwidth problem and spectrum problem. However, the CR‐IoT routing method sometimes presents issues in terms of road finding, spectrum resource diversity and mobility. This study presents an upgradable cross‐layer routing protocol based on CR‐IoT to improve routing efficiency and optimize data transmission in a reconfigurable network. In this context, the system is developing a distributed controller which is designed with multiple activities, including load balancing, neighbourhood sensing and machine‐learning path construction. The proposed approach is based on network traffic and load and various other network metrics including energy efficiency, network capacity and interference, on an average of 2 bps/Hz/W. The trials are carried out with conventional models, demonstrating the residual energy and resource scalability and robustness of the reconfigurable CR‐IoT. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
9. An Edge Computing-enhanced Internet of Things Framework for Privacy-preserving in Smart City.
- Author
-
Gheisari, Mehdi, Wang, Guojun, and Chen, Shuhong
- Subjects
- *
INTERNET of things , *SMART cities , *DATA privacy , *EDGES (Geometry) , *ONTOLOGIES (Information retrieval) , *DATA modeling - Abstract
To supervise massive generated data by the Internet of Things (IoT) efficiently, we face two issues that should be addressed which are: (1) heterogeneity or satisfying diversity among IoT devices, and (2) privacy-preserving or preventing unintentional disclosure of sensitive data. Through observation, we found that existing solutions apply one common privacy-preserving rule for all devices while they address the heterogeneity issue separately that lead to unappealing performance. In this paper, we propose a framework for addressing the heterogeneity issue and privacy-preserving of IoT devices at the network edge using a novel proposed ontology data model. Besides, it leverages the proposed ontology to obtain a privacy-preserving method by frequently changing the privacy-preserving behaviors of IoT devices. Through simulation, we show that our solution overhead is less than 9 percent in the worst situation so that it is affordable to most IoT devices in one of its applications that is smart city. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.