Your browser doesn't support javascript.
loading
Show: 20 | 50 | 100
Results 1 - 14 de 14
Filter
Add more filters










Publication year range
1.
Article in English | MEDLINE | ID: mdl-38829758

ABSTRACT

The Internet of Medical Things (IoMT) has transformed traditional healthcare systems by enabling real-time monitoring, remote diagnostics, and data-driven treatment. However, security and privacy remain significant concerns for IoMT adoption due to the sensitive nature of medical data. Therefore, we propose an integrated framework leveraging blockchain and explainable artificial intelligence (XAI) to enable secure, intelligent, and transparent management of IoMT data. First, the traceability and tamper-proof of blockchain are used to realize the secure transaction of IoMT data, transforming the secure transaction of IoMT data into a two-stage Stackelberg game. The dual-chain architecture is used to ensure the security and privacy protection of the transaction. The main-chain manages regular IoMT data transactions, while the side-chain deals with data trading activities aimed at resale. Simultaneously, the perceptual hash technology is used to realize data rights confirmation, which maximally protects the rights and interests of each participant in the transaction. Subsequently, medical time-series data is modeled using bidirectional simple recurrent units to detect anomalies and cyberthreats accurately while overcoming vanishing gradients. Lastly, an adversarial sample generation method based on local interpretable model-agnostic explanations is provided to evaluate, secure, and improve the anomaly detection model, as well as to make it more explainable and resilient to possible adversarial attacks. Simulation results are provided to illustrate the high performance of the integrated secure data management framework leveraging blockchain and XAI, compared with the benchmarks.

2.
PLoS One ; 19(5): e0302634, 2024.
Article in English | MEDLINE | ID: mdl-38718001

ABSTRACT

In this paper, a new microstrip triplexer is designed to work at 2.5 GHz, 4.4 GHz and 6 GHz for mid-band 5G applications. All channels are flat with three low group delays (GDs) of 0.84 ns, 0.75 ns and 0.49 ns, respectively. Compared to the previously reported works, the proposed triplexer has the minimum group delay. The designed triplexer has 18.2%, 13.7%, 23.6% fractional bandwidths (FBW%) at 2.5 GHz, 4.4 GHz and 6 GHz, respectively. The obtained insertion losses (ILs) are low at all channels. These features are obtained without a noticeable increase in the overall size. A novel and simple resonator is used to design the proposed triplexer, which includes two pairs of coupled lines combined with a shunt stub. A perfect mathematical analysis is performed to find the resonator behavior and the layout optimization. The type of shunt stub is determined mathematically. Also, the smallness or largeness of some important physical dimensions is determined using the proposed mathematical analysis. Finally, the designed triplexer is fabricated and measured, where the measurement results verify the simulations.


Subject(s)
Equipment Design , Wireless Technology , Wireless Technology/instrumentation
3.
PLoS One ; 19(4): e0301980, 2024.
Article in English | MEDLINE | ID: mdl-38669276

ABSTRACT

This research introduces a new designing process and analysis of an innovative Silicon-on-Insulator Metal-Semiconductor Field-Effect (SOI MESFET) structure that demonstrates improved DC and RF characteristics. The design incorporates several modifications to control and reduce the electric field concentration within the channel. These modifications include relocating the transistor channel to sub-regions near the source and drain, adjusting the position of the gate electrode closer to the source, introducing an aluminum layer beneath the channel, and integrating an oxide layer adjacent to the gate. The results show that the AlOx-MESFET configuration exhibits a remarkable increase of 128% in breakdown voltage and 156% in peak power. Furthermore, due to enhanced conductivity and a significant reduction in gate-drain capacitance, there is a notable improvement of 53% in the cut-off frequency and a 28% increase in the maximum oscillation frequency. Additionally, the current gain experiences a boost of 15%. The improved breakdown voltage and peak power make it suitable for applications requiring robust performance under high voltage and power conditions. The increased maximum oscillation frequency and cut-off frequency make it ideal for high-frequency applications where fast signal processing is crucial. Moreover, the enhanced current gain ensures efficient amplification of signals. The introduced SOI MESFET structure with its modifications offers significant improvements in various performance metrics. It provides high oscillation frequency, better breakdown voltage and good cut-off frequency, and current gain compared to the traditional designs. These enhancements make it a highly desirable choice for applications that demand high-frequency and high-power capabilities.


Subject(s)
Equipment Design , Silicon , Silicon/chemistry , Semiconductors , Transistors, Electronic , Electric Conductivity , Electric Power Supplies , Metals/chemistry
4.
Article in English | MEDLINE | ID: mdl-38349828

ABSTRACT

Cancer patients are known to have a higher likelihood of developing Cardiovascular Disease (CVD) compared to non-cancer individuals. Although various types of cancer can contribute to the onset of CVD, lung cancer is inherently linked with increased susceptibility. To bridge this hypothesis, we propose a Lung cancer detection and Cardiovascular Disease Prediction (LCDP) system through lung Computed Tomography (CT) scan images. The lung cancer detection module of the LCDP system utilizes Transfer Learning (TL) with AdaDenseNet for classification. It employs the improvised Proximity-based Synthetic Minority Over-sampling Technique (Prox-SMOTE), improving accuracy. In the CVD prediction module, the feature extraction was performed using the VGG-16 model, followed by classification using a Support Vector Machine (SVM) classifier. The impact and interdependence of lung cancer on CVD were evident in our evaluation, with high accuracies of 98.28% for lung cancer detection and 91.62% for CVD prediction.

5.
Sci Rep ; 14(1): 4012, 2024 Feb 18.
Article in English | MEDLINE | ID: mdl-38369545

ABSTRACT

Traffic congestion is one of the major challenges faced by daily commuters in smart cities. An autonomous transportation system with a 5 G-based Cellular Vehicle-to-Everything (C-V2X) communication system is the solution to meet the traffic challenges faced in smart cities. Vehicular networks provide wireless connectivity to enable a large number of connected vehicle applications. Vehicular networks allow vehicles to share their emergency and infotainment traffic by following vehicle-to-vehicle (V2V) or by using vehicle-to-infrastructure (V2I) communication. The infrastructure of vehicular networks mainly comprises multiple Road Side Units (RSUs). Fog computing nodes are placed adjacent to these RSUs to provide quick access to vehicles. For infotainment traffic, vehicles intend to download their required content from the content provider. Caching the same contents from the nearby fog computing node significantly reduces delay with improved quality of service. As there are millions of contents with varying sizes, caching all demanded contents on these fog nodes is not possible due to their limited caching capacity. In this work, we propose an improved content caching scheme for fog nodes to satisfy vehicles and content providers for fair content placement. The proposed algorithm is based on a modified Gale-Shapley technique that considers factors such as content popularity, vehicle connectivity, and quality of the communication channel to optimize the content caching process. Simulation results show that the proposed technique caches a higher number of popular contents with lower downloading time.

6.
BMB Rep ; 54(10): 497-504, 2021 Oct.
Article in English | MEDLINE | ID: mdl-34488929

ABSTRACT

EGR1 (early growth response 1) is dysregulated in many cancers and exhibits both tumor suppressor and promoter activities, making it an appealing target for cancer therapy. Here, we used a systematic multi-omics analysis to review the expression of EGR1 and its role in regulating clinical outcomes in breast cancer (BC). EGR1 expression, its promoter methylation, and protein expression pattern were assessed using various publicly available tools. COSMIC-based somatic mutations and cBioPortal-based copy number alterations were analyzed, and the prognostic roles of EGR1 in BC were determined using Prognoscan and Kaplan-Meier Plotter. We also used bc-GenEx- Miner to investigate the EGR1 co-expression profile. EGR1 was more often downregulated in BC tissues than in normal breast tissue, and its knockdown was positively correlated with poor survival. Low EGR1 expression levels were also associated with increased risk of ER+, PR+, and HER2- BCs. High positive correlations were observed among EGR1, DUSP1, FOS, FOSB, CYR61, and JUN mRNA expression in BC tissue. This systematic review suggested that EGR1 expression may serve as a prognostic marker for BC patients and that clinicopathological parameters influence its prognostic utility. In addition to EGR1, DUSP1, FOS, FOSB, CYR61, and JUN can jointly be considered prognostic indicators for BC. [BMB Reports 2021; 54(10): 497-504].


Subject(s)
Breast Neoplasms/metabolism , Early Growth Response Protein 1/metabolism , Biomarkers, Tumor/metabolism , DNA Methylation/genetics , Databases, Genetic , Early Growth Response Protein 1/genetics , Female , Gene Expression/genetics , Gene Expression Regulation, Neoplastic/genetics , Genes, Tumor Suppressor , Humans , Kaplan-Meier Estimate , Prognosis , Promoter Regions, Genetic/genetics , Transcriptome/genetics
7.
Sensors (Basel) ; 20(4)2020 Feb 17.
Article in English | MEDLINE | ID: mdl-32079352

ABSTRACT

Cloud computing supports many unprecedented cloud-based vehicular applications. To improve connectivity and bandwidth through programmable networking architectures, Software-Defined (SD) Vehicular Network (SDVN) is introduced. SDVN architecture enables vehicles to be equipped with SDN OpenFlow switch on which the routing rules are updated from a SDN OpenFlow controller. From SDVN, new vehicular architectures are introduced, for instance SD Vehicular Cloud (SDVC). In SDVC, vehicles are SDN devices that host virtualization technology for enabling deployment of cloud-based vehicular applications. In addition, the migration of Virtual Machines (VM) over SDVC challenges the performance of cloud-based vehicular applications due the highly mobility of vehicles. However, the current literature that discusses VM migration in SDVC is very limited. In this paper, we first analyze the evolution of computation and networking technologies of SDVC with a focus on its architecture within the cloud-based vehicular environment. Then, we discuss the potential cloud-based vehicular applications assisted by the SDVC along with its ability to manage several VM migration scenarios. Lastly, we provide a detailed comparison of existing frameworks in SDVC that integrate the VM migration approach and different emulators or simulators network used to evaluate VM frameworks' use cases.

8.
Sensors (Basel) ; 20(2)2020 Jan 19.
Article in English | MEDLINE | ID: mdl-31963887

ABSTRACT

In post-disaster scenarios, such as after floods, earthquakes, and in war zones, the cellular communication infrastructure may be destroyed or seriously disrupted. In such emergency scenarios, it becomes very important for first aid responders to communicate with other rescue teams in order to provide feedback to both the central office and the disaster survivors. To address this issue, rapidly deployable systems are required to re-establish connectivity and assist users and first responders in the region of incident. In this work, we describe the design, implementation, and evaluation of a rapidly deployable system for first response applications in post-disaster situations, named RDSP. The proposed system helps early rescue responders and victims by sharing their location information to remotely located servers by utilizing a novel routing scheme. This novel routing scheme consists of the Dynamic ID Assignment (DIA) algorithm and the Minimum Maximum Neighbor (MMN) algorithm. The DIA algorithm is used by relay devices to dynamically select their IDs on the basis of all the available IDs of networks. Whereas, the MMN algorithm is used by the client and relay devices to dynamically select their next neighbor relays for the transmission of messages. The RDSP contains three devices; the client device sends the victim's location information to the server, the relay device relays information between client and server device, the server device receives messages from the client device to alert the rescue team. We deployed and evaluated our system in the outdoor environment of the university campus. The experimental results show that the RDSP system reduces the message delivery delay and improves the message delivery ratio with lower communication overhead.


Subject(s)
Computer Communication Networks , Disasters , Rescue Work , Wireless Technology , Algorithms , Emergency Medical Services , Humans
9.
Sensors (Basel) ; 20(1)2019 Dec 25.
Article in English | MEDLINE | ID: mdl-31881766

ABSTRACT

Basic safety message (BSM) are messages that contain core elements of a vehicle such as vehicle's size, position, speed, acceleration and others. BSM are lightweight messages that can be regularly broadcast by the vehicles to enable a variety of applications. On the other hand, event-driven message (EDM) are messages generated at the time of occurrence such as accidents or roads sliding and can contain much more heavy elements including pictures, audio or videos. Security, architecture and communication solutions for BSM use cases have been largely documented on in the literature contrary to EDM due to several concerns such as the variant size of EDM, the appropriate architecture along with latency, privacy and security. In this paper, we propose a secure and blockchain based EDM protocol for 5G enabled vehicular edge computing. To offer scalability and latency for the proposed scenario, we adopt a 5G cellular architecture due to its projected features compared to 4G tong-term evaluation (LTE) for vehicular communications. We consider edge computing to provide local processing of EDM that can improve the response time of public agencies (ambulances or rescue teams) that may intervene to the scene. We make use of lightweight multi-receiver signcryption scheme without pairing that offers low time consuming operations, security, privacy and access control. EDM records need to be kept into a distributed system which can guarantee reliability and auditability of EDM. To achieve this, we construct a private blockchain based on the edge nodes to store EDM records. The performance analysis of the proposed protocol confirms its efficiency.

10.
Sensors (Basel) ; 19(22)2019 Nov 14.
Article in English | MEDLINE | ID: mdl-31739400

ABSTRACT

We present an innovative approach for a Cybersecurity Solution based on the Intrusion Detection System to detect malicious activity targeting the Distributed Network Protocol (DNP3) layers in the Supervisory Control and Data Acquisition (SCADA) systems. As Information and Communication Technology is connected to the grid, it is subjected to both physical and cyber-attacks because of the interaction between industrial control systems and the outside Internet environment using IoT technology. Often, cyber-attacks lead to multiple risks that affect infrastructure and business continuity; furthermore, in some cases, human beings are also affected. Because of the traditional peculiarities of process systems, such as insecure real-time protocols, end-to-end general-purpose ICT security mechanisms are not able to fully secure communication in SCADA systems. In this paper, we present a novel method based on the DNP3 vulnerability assessment and attack model in different layers, with feature selection using Machine Learning from parsed DNP3 protocol with additional data including malware samples. Moreover, we developed a cyber-attack algorithm that included a classification and visualization process. Finally, the results of the experimental implementation show that our proposed Cybersecurity Solution based on IDS was able to detect attacks in real time in an IoT-based Smart Grid communication environment.

11.
Sensors (Basel) ; 19(18)2019 Sep 19.
Article in English | MEDLINE | ID: mdl-31546764

ABSTRACT

Static sink-based wireless sensor networks (WSNs) suffer from an energy-hole problem. This incurs as the rate of energy consumption on sensor nodes around sinks and on critical paths is considerably faster. State-of-the-art en-routing filtering schemes save energy by countering false report injection attacks. In addition to their unique limitations, these schemes generally do not examine energy awareness in underlying routing. Mostly, these security methods are based on a fixed filtering capacity, unable to respond to changes in attack intensity. Therefore, these limitations cause network partition(s), exhibiting adverse effects on network lifetime. Extending network lifetime while preserving energy and security thus becomes an interesting challenge. In this article, we address the aforesaid shortcomings with the proposed adaptive en-route filtering (AEF) scheme. In energy-aware routing, the fitness function, which is used to select forwarding nodes, considers residual energy and other factors as opposed to distance only. In pre-deterministic key distribution, keys are distributed based on the consideration of having paths with a different number of verification nodes. This, consequently, permits us to have multiple paths with different security levels that can be exploited to counter different attack intensities. Taken together, the integration of the special fitness function with the new key distribution approach enables the AEF to adapt the underlying dynamic network conditions. The simulation experiments under different settings show significant improvements in network lifetime.

12.
Sensors (Basel) ; 19(17)2019 Aug 31.
Article in English | MEDLINE | ID: mdl-31480479

ABSTRACT

There is a strong devotion in the automotive industry to be part of a wider progression towards the Fifth Generation (5G) era. In-vehicle integration costs between cellular and vehicle-to-vehicle networks using Dedicated Short Range Communication could be avoided by adopting Cellular Vehicle-to-Everything (C-V2X) technology with the possibility to re-use the existing mobile network infrastructure. More and more, with the emergence of Software Defined Networks, the flexibility and the programmability of the network have not only impacted the design of new vehicular network architectures but also the implementation of V2X services in future intelligent transportation systems. In this paper, we define the concepts that help evaluate software-defined-based vehicular network systems in the literature based on their modeling and implementation schemes. We first overview the current studies available in the literature on C-V2X technology in support of V2X applications. We then present the different architectures and their underlying system models for LTE-V2X communications. We later describe the key ideas of software-defined networks and their concepts for V2X services. Lastly, we provide a comparative analysis of existing SDN-based vehicular network system grouped according to their modeling and simulation concepts. We provide a discussion and highlight vehicular ad-hoc networks' challenges handled by SDN-based vehicular networks.

13.
Sensors (Basel) ; 19(14)2019 Jul 17.
Article in English | MEDLINE | ID: mdl-31319562

ABSTRACT

In the age of the Internet of Things, connected devices are changing the delivery system in the healthcare communication environment. With the integration of IoT in healthcare, there is a huge potential for improvement of the quality, safety, and efficiency of health care in addition to promising technological, economical, and social prospects. Nevertheless, this integration comes with security risks such as data breach that might be caused by credential-stealing malware. In addition, the patient valuable data can be disclosed when the perspective devices are compromised since they are connected to the internet. Hence, security has become an essential part of today's computing world regarding the ubiquitous nature of the IoT entities in general and IoT-based healthcare in particular. In this paper, research on the algorithm for anonymizing sensitive information about health data set exchanged in the IoT environment using a wireless communication system has been presented. To preserve the security and privacy, during the data session from the users interacting online, the algorithm defines records that cannot be revealed by providing protection to user's privacy. Moreover, the proposed algorithm includes a secure encryption process that enables health data anonymity. Furthermore, we have provided an analysis using mathematical functions to valid the algorithm's anonymity function. The results show that the anonymization algorithm guarantees safety features for the considered IoT system applied in context of the healthcare communication systems.


Subject(s)
Biosensing Techniques , Delivery of Health Care/trends , Internet of Things/trends , Algorithms , Communication , Humans
14.
Sensors (Basel) ; 17(10)2017 Sep 23.
Article in English | MEDLINE | ID: mdl-28946633

ABSTRACT

In the vehicular networks, the real-time video reporting service is used to send the recorded videos in the vehicle to the cloud. However, when facilitating the real-time video reporting service in the vehicular networks, the usage of the fourth generation (4G) long term evolution (LTE) was proved to suffer from latency while the IEEE 802.11p standard does not offer sufficient scalability for a such congested environment. To overcome those drawbacks, the fifth-generation (5G)-enabled vehicular network is considered as a promising technology for empowering the real-time video reporting service. In this paper, we note that security and privacy related issues should also be carefully addressed to boost the early adoption of 5G-enabled vehicular networks. There exist a few research works for secure video reporting service in 5G-enabled vehicular networks. However, their usage is limited because of public key certificates and expensive pairing operations. Thus, we propose a secure and lightweight protocol for cloud-assisted video reporting service in 5G-enabled vehicular networks. Compared to the conventional public key certificates, the proposed protocol achieves entities' authorization through anonymous credential. Also, by using lightweight security primitives instead of expensive bilinear pairing operations, the proposed protocol minimizes the computational overhead. From the evaluation results, we show that the proposed protocol takes the smaller computation and communication time for the cryptographic primitives than that of the well-known Eiza-Ni-Shi protocol.

SELECTION OF CITATIONS
SEARCH DETAIL
...