hh.sePublications
Change search
Link to record
Permanent link

Direct link
BETA
Publications (10 of 175) Show all publications
He, D., Kumar, N., Wang, H., Wang, L., Raymond Choo, K.-K. & Vinel, A. (2018). A Provably-Secure Cross-Domain Handshake Scheme with Symptoms-Matching for Mobile Healthcare Social Network. IEEE Transactions on Dependable and Secure Computing, 15(4), 633-645
Open this publication in new window or tab >>A Provably-Secure Cross-Domain Handshake Scheme with Symptoms-Matching for Mobile Healthcare Social Network
Show others...
2018 (English)In: IEEE Transactions on Dependable and Secure Computing, ISSN 1545-5971, E-ISSN 1941-0018, Vol. 15, no 4, p. 633-645Article in journal (Refereed) Published
Abstract [en]

With rapid developments of sensor, wireless and mobile communication technologies, Mobile Healthcare Social Networks (MHSNs) have emerged as a popular means of communication in healthcare services. Within MHSNs, patients can use their mobile devices to securely share their experiences, broaden their understanding of the illness or symptoms, form a supportive network, and transmit information (e.g. state of health and new symptoms) between users and other stake holders (e.g. medical center). Despite the benefits afforded by MHSNs, there are underlying security and privacy issues (e.g. due to the transmission of messages via a wireless channel). The handshake scheme is an important cryptographic mechanism, which can provide secure communication in MHSNs (e.g. anonymity and mutual authentication between users, such as patients). In this paper, we present a new framework for the handshake scheme in MHSNs, which is based on hierarchical identity-based cryptography. We then construct an efficient Cross-Domain HandShake (CDHS) scheme that allows symptoms-matching within MHSNs. For example, using the proposed CDHS scheme, two patients registered with different healthcare centers can achieve mutual authentication and generate a session key for future secure communications. We then prove the security of the scheme, and a comparative summary demonstrates that the proposed CDHS scheme requires fewer computation and lower communication costs. We also implement the proposed CDHS scheme and three related schemes in a proof of concept Android app to demonstrate utility of the scheme. Findings from the evaluations demonstrate that the proposed CDHS scheme achieves a reduction of 18.14% and 5.41% in computation cost and communication cost, in comparison to three other related handshake schemes. © 2016 IEEE. 

Place, publisher, year, edition, pages
Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), 2018
Keywords
Mobile healthcare social networks, cross-domain handshake, secure handshake, authentication, elliptic curve, security
National Category
Communication Systems Telecommunications
Identifiers
urn:nbn:se:hh:diva-32115 (URN)10.1109/TDSC.2016.2596286 (DOI)
Note

Funding: National Natural Science Foundation of China; Natural Science Foundation of Hubei Province of China; National Natural Science Foundation of China; National Natural Science Foundation of China; National High-Tech Research and Development Program of China (863 Program)

Available from: 2016-10-01 Created: 2016-10-01 Last updated: 2018-07-10Bibliographically approved
Díez Rodríguez, V., Detournay, J., Vinel, A. & Lyamin, N. (2018). An Approach for Receiver-Side Awareness Control in Vehicular Ad Hoc Networks. IEEE transactions on intelligent transportation systems (Print), 19(4), 1227-1236
Open this publication in new window or tab >>An Approach for Receiver-Side Awareness Control in Vehicular Ad Hoc Networks
2018 (English)In: IEEE transactions on intelligent transportation systems (Print), ISSN 1524-9050, E-ISSN 1558-0016, Vol. 19, no 4, p. 1227-1236Article in journal (Refereed) Published
Abstract [en]

Vehicular Ad hoc networks (VANET) are a key element of cooperative intelligent transport systems. One of the challenges in VANETs is dealing with awareness and congestion due to the high amount of messages received from the vehicles in communication range. As VANETs are used in critical applications, congestion on the receiver side caused by the buffering of the packets is a safety hazard. In this paper, we propose a streamwise queuing system on the receiver side and show how it improves the timeliness of the messages received and maintains the awareness of the system in a congestion situation. © Copyright 2017 IEEE

Place, publisher, year, edition, pages
Piscataway: Institute of Electrical and Electronics Engineers (IEEE), 2018
Keywords
GCDC 2016, ETSI ITS-G5, vehicular communication, awareness control, priority queue
National Category
Communication Systems Telecommunications
Identifiers
urn:nbn:se:hh:diva-35188 (URN)10.1109/TITS.2017.2749966 (DOI)2-s2.0-85030764383 (Scopus ID)
Available from: 2017-10-12 Created: 2017-10-12 Last updated: 2018-04-03Bibliographically approved
Fiems, D. & Vinel, A. (2018). Connectivity Times in Vehicular Networks. IEEE Communications Letters
Open this publication in new window or tab >>Connectivity Times in Vehicular Networks
2018 (English)In: IEEE Communications Letters, ISSN 1089-7798, E-ISSN 1558-2558Article in journal (Refereed) Epub ahead of print
Abstract [en]

We propose an analytical model that accurately captures the service advertisement and access mechanisms in IEEE 1609.4/IEEE 802.11p multi-channel vehicular networks where road-side units announce non-safety services to passing vehicles on a dedicated channel. For a drive-thru scenario, we calculate various performance measures including the service discovery probability, the mean time till discovery and the channel utilization.

Place, publisher, year, edition, pages
Piscataway, NJ: IEEE, 2018
National Category
Communication Systems Telecommunications
Identifiers
urn:nbn:se:hh:diva-37869 (URN)10.1109/LCOMM.2018.2866558 (DOI)
Available from: 2018-08-30 Created: 2018-08-30 Last updated: 2018-08-31
Zhang, K., Mao, Y., Leng, S., Maharjan, S., Vinel, A. & Zhang, Y. (2018). Contract-theoretic Approach for Delay Constrained Offloading in Vehicular Edge Computing Networks. Journal on spesial topics in mobile networks and applications
Open this publication in new window or tab >>Contract-theoretic Approach for Delay Constrained Offloading in Vehicular Edge Computing Networks
Show others...
2018 (English)In: Journal on spesial topics in mobile networks and applications, ISSN 1383-469X, E-ISSN 1572-8153Article in journal (Refereed) Epub ahead of print
Abstract [en]

Mobile Edge Computing (MEC) is a promising solution to improve vehicular services through offloading computation to cloud servers in close proximity to mobile vehicles. However, the self-interested nature together with the high mobility characteristic of the vehicles make the design of the computation offloading scheme a significant challenge. In this paper, we propose a new Vehicular Edge Computing (VEC) framework to model the computation offloading process of the mobile vehicles running on a bidirectional road. Based on this framework, we adopt a contract theoretic approach to design optimal offloading strategies for the VEC service provider, which maximize the revenue of the provider while enhancing the utilities of the vehicles. To further improve the utilization of the computing resources of the VEC servers, we incorporate task priority distinction as well as additional resource providing into the design of the offloading scheme, and propose an efficient VEC server selection and computing resource allocation algorithm. Numerical results indicate that our proposed schemes greatly enhance the revenue of the VEC provider, and concurrently improve the utilization of cloud computing resources.

Place, publisher, year, edition, pages
New York, NY: Springer-Verlag New York, 2018
Keywords
Vehicular network, Cloud, Mobile edge computing, Contract theory
National Category
Communication Systems Telecommunications
Identifiers
urn:nbn:se:hh:diva-36337 (URN)10.1007/s11036-018-1032-0 (DOI)
Note

Funding: The National Natural Science Foundation of China under Grant No.61374189, the joint fund of the Ministry of Education of P.R. China and China Mobile under Grant MCM20160304.

Available from: 2018-02-22 Created: 2018-02-22 Last updated: 2018-03-23
Lyamin, N., Vinel, A., Jonsson, M. & Bellalta, B. (2018). Cooperative awareness in VANETs: On ETSI EN 302 637-2 performance. IEEE Transactions on Vehicular Technology, 67(1), 17-28
Open this publication in new window or tab >>Cooperative awareness in VANETs: On ETSI EN 302 637-2 performance
2018 (English)In: IEEE Transactions on Vehicular Technology, ISSN 0018-9545, E-ISSN 1939-9359, Vol. 67, no 1, p. 17-28Article in journal (Refereed) Published
Abstract [en]

Cooperative Awareness on the road is aiming to support the road users with knowledge about the surroundings relying on the information exchange enabled by vehicular com- munications. To achieve this goal European Telecommunication Standard Institute (ETSI) delivered the standard EN 302 637-2 for Cooperative Awareness Messages (CAM). The CAM trig- gering conditions are based on the dynamics of the originating vehicle, which is checked periodically. In this paper, we show that standardized ETSI protocol may demonstrate a decrease in communication performance under several realistic mobility patterns. The potential influence of the discovered phenomena on two typical mobility scenarios is studied.

Place, publisher, year, edition, pages
Piscataway, NJ: IEEE Press, 2018
Keywords
VANET, Cooperative Awareness, Platooning, ETSI, ITS-G5
National Category
Communication Systems Telecommunications
Identifiers
urn:nbn:se:hh:diva-35466 (URN)10.1109/TVT.2017.2754584 (DOI)2-s2.0-85035747459 (Scopus ID)
Projects
ELLIITACDC: Autonomous Cooperative Driving: Communications Issues
Funder
Knowledge Foundation
Note

Partially supported by the Excellence Center at Linköping-Lund in Information Technology (ELLIIT) strategic research environment, NFITS - National ITS Postgraduate School (Sweden) and the ”ACDC: Autonomous Cooperative Driving: Communications Issues” project (2014- 2016) funded by the Knowledge Foundation (Sweden) in cooperation with Volvo GTT, Volvo Cars, Scania, Kapsch TrafficCom and Qamcom Research & Technology.

Available from: 2017-11-24 Created: 2017-11-24 Last updated: 2018-01-19Bibliographically approved
Nelson, C., Lyamin, N., Vinel, A., Gustafson, C. & Tufvesson, F. (2018). Geometry Based Channel Models with Cross- and Autocorrelation for Vehicular Network Simulations. In: 2018 IEEE 87th Vehicular Technology Conference (VTC Spring): . Paper presented at 2018 IEEE 87th Vehicular Technology Conference (VTC Spring), Porto, Portugal, 3–6 June, 2018. Piscataway, NJ: IEEE
Open this publication in new window or tab >>Geometry Based Channel Models with Cross- and Autocorrelation for Vehicular Network Simulations
Show others...
2018 (English)In: 2018 IEEE 87th Vehicular Technology Conference (VTC Spring), Piscataway, NJ: IEEE, 2018Conference paper, Published paper (Refereed)
Abstract [en]

Realistic network simulations are necessary to assess the performance of any communication system. In this paper, we describe an implementation of a channel model for vehicle-to-vehicle (V2V) communication in the OMNeT++/Plexe simulation environment. The model is based on previous extensive measurements in a V2V multilink highway scenario and cover line-of-sight (LOS) as well as obstructed LOS (OLOS) scenarios, which occurs when one or more vehicles obstruct the LOS component. The implementation captures both the temporal autocorrelation and the joint multilink cross-correlation processes to achieve a realistic behavior. Preliminary results show that the implementation now generates stochastic large-scale fading with an autocorrelation function that agrees well with measured data. A representation of the cross-correlation process is now implemented through proper channel model selection since the geometry and location of objects are known in Plexe. We also show the impact of the suggested V2V physical layer (PHY) on the performance evaluation results observed at the facilities layer. As a metric, we use the data age, which is a measure how old the information about a vehicle is. When considering the autocorrelation in simulations, the experienced data-age increases. Examples show an increase of the 10% percentile data-age from 0.1s to 1.5s, which may affect the application performance significantly in critical situations. © 2018 IEEE.

Place, publisher, year, edition, pages
Piscataway, NJ: IEEE, 2018
Keywords
Correlation, Channel models, Fading channels, Geometry, Mathematical model, Stochastic processes, Veins
National Category
Communication Systems Telecommunications Signal Processing
Identifiers
urn:nbn:se:hh:diva-37667 (URN)10.1109/VTCSpring.2018.8417740 (DOI)2-s2.0-85050983616 (Scopus ID)978-1-5386-6355-4 (ISBN)978-1-5386-6354-7 (ISBN)978-1-5386-6356-1 (ISBN)
Conference
2018 IEEE 87th Vehicular Technology Conference (VTC Spring), Porto, Portugal, 3–6 June, 2018
Funder
Wallenberg FoundationsELLIIT - The Linköping‐Lund Initiative on IT and Mobile Communications
Available from: 2018-07-27 Created: 2018-07-27 Last updated: 2018-08-13Bibliographically approved
Vinel, A., Lyamin, N. & Isachenkov, P. (2018). Modeling of V2V Communications for C-ITS Safety Applications: A CPS Perspective. IEEE Communications Letters, 22(8), 1600-1603
Open this publication in new window or tab >>Modeling of V2V Communications for C-ITS Safety Applications: A CPS Perspective
2018 (English)In: IEEE Communications Letters, ISSN 1089-7798, E-ISSN 1558-2558, Vol. 22, no 8, p. 1600-1603Article in journal (Refereed) Published
Abstract [en]

Tight coupling between the performance of vehicleto-vehicle (V2V) communications and the performance of Cooperative Intelligent Transportation Systems (C-ITS) safety applications is addressed. A Cyber-Physical System (CPS) analytical framework is developed that links the characteristics of V2V communications (such as packet loss probability and packet transmission delay) with the physical mobility characteristics of the vehicular system (such as safe inter-vehicular distance). The study is applied to the Day 1 C-ITS application, Emergency Electronic Brake Lights (EEBL), enabled by ETSI ITS-G5 and IEEE 802.11p standards. © 2018 IEEE

Place, publisher, year, edition, pages
Piscataway: IEEE, 2018
Keywords
Cyber-physical system (CPS), cooperative intelligent transportation system (C-ITS), emergency electronic brake lights (EEBL), vehicle-to-vehicle (V2V) communications, emergency breaking, road safety, ITS-G5, IEEE 802.11p
National Category
Communication Systems Telecommunications
Identifiers
urn:nbn:se:hh:diva-36765 (URN)10.1109/LCOMM.2018.2835484 (DOI)2-s2.0-85046829629 (Scopus ID)
Funder
Knowledge FoundationELLIIT - The Linköping‐Lund Initiative on IT and Mobile Communications
Available from: 2018-05-15 Created: 2018-05-15 Last updated: 2018-08-13Bibliographically approved
Marinho, M., Antreich, F., da Costa, J. P. .., Caizzone, S., Vinel, A. & Pignaton de Freitas, E. (2018). Robust Nonlinear Array Interpolation for Direction of Arrival Estimation of Highly Correlated Signals. Signal Processing, 144, 19-28
Open this publication in new window or tab >>Robust Nonlinear Array Interpolation for Direction of Arrival Estimation of Highly Correlated Signals
Show others...
2018 (English)In: Signal Processing, ISSN 0165-1684, E-ISSN 1872-7557, Vol. 144, p. 19-28Article in journal (Refereed) Published
Abstract [en]

Important signal processing techniques need that the response of the different elements of a sensor array has specific characteristics. For physical systems this often is not achievable as the array elements’ responses are affected by mutual coupling or other effects. In such cases, it is necessary to apply array interpolation to allow the application of ESPRIT, Forward Backward Averaging (FBA), and Spatial Smoothing (SPS). Array interpolation provides a model or transformation between the true and a desired array response. If the true response of the array becomes more distorted with respect to the desired one or the considered region of the field of view of the array increases, nonlinear approaches becomes necessary. This work presents two novel methods for sector discretization. An Unscented Transform (UT) based method and a principal component analysis (PCA) based method are discussed. Additionally, two novel nonlinear interpolation methods are developed based on the nonlinear regression schemes Multivariate Adaptive Regression Splines (MARS) and Generalized Regression Neural Networks (GRNNs). These schemes are extended and applied to the array interpolation problem. The performance of the proposed methods is examined using simulated and measured array responses of a physical system used for research on mutual coupling in antenna arrays. © 2017 The Author(s). Published by Elsevier B.V.

Place, publisher, year, edition, pages
Amsterdam: Elsevier, 2018
Keywords
Array Interpolation, Array Mapping, Antenna Arrays, Direction of Arrival Estimation
National Category
Signal Processing Communication Systems
Identifiers
urn:nbn:se:hh:diva-35082 (URN)10.1016/j.sigpro.2017.09.025 (DOI)2-s2.0-85030321519 (Scopus ID)
Funder
ELLIIT - The Linköping‐Lund Initiative on IT and Mobile Communications
Note

Funding: Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES) under the PVE grant number 88881.030392/2013-01 and by the ELLIIT Strategic Research Network.

Available from: 2017-09-28 Created: 2017-09-28 Last updated: 2018-03-23Bibliographically approved
Lin, C., He, D., Kumar, N., Choo, K.-K. R., Vinel, A. & Huang, X. (2018). Security and Privacy for the Internet of Drones: Challenges and Solutions. IEEE Communications Magazine, 56(1), 64-69
Open this publication in new window or tab >>Security and Privacy for the Internet of Drones: Challenges and Solutions
Show others...
2018 (English)In: IEEE Communications Magazine, ISSN 0163-6804, E-ISSN 1558-1896, Vol. 56, no 1, p. 64-69Article in journal (Refereed) Published
Abstract [en]

A recent trend in both industry and research is the Internet of Drones, which has applications in both civilian and military settings. However, drones (also known as unmanned aerial vehicles) are generally not designed with security in mind, and there are fundamental security and privacy issues that need study. Hence, in this article, we study the architecture and its security and privacy requirements. We also outline potential solutions to address challenging issues such as privacy leakage, data confidentiality protection, and flexible accessibility, with the hope that this article will provide the basis for future research in this emerging area.

Place, publisher, year, edition, pages
Piscataway: IEEE, 2018
National Category
Communication Systems Telecommunications
Identifiers
urn:nbn:se:hh:diva-36069 (URN)10.1109/MCOM.2017.1700390 (DOI)
Available from: 2018-01-13 Created: 2018-01-13 Last updated: 2018-01-17Bibliographically approved
Lyu, X., Tian, H., Jiang, L., Vinel, A., Maharjan, S., Gjessing, S. & Zhang, Y. (2018). Selective Offloading in Mobile Edge Computing for the Green Internet of Things. IEEE Network, 32(1), 54-60
Open this publication in new window or tab >>Selective Offloading in Mobile Edge Computing for the Green Internet of Things
Show others...
2018 (English)In: IEEE Network, ISSN 0890-8044, E-ISSN 1558-156X, Vol. 32, no 1, p. 54-60Article in journal (Refereed) Published
Abstract [en]

Mobile edge computing provides the radio access networks with cloud computing capabilities to fulfill the requirements of the Internet of Things services such as high reliability and low latency. Offloading services to edge servers can alleviate the storage and computing limitations and prolong the lifetimes of the IoT devices. However, offloading in MEC faces scalability problems due to the massive number of IoT devices. In this article, we present a new integration architecture of the cloud, MEC, and IoT, and propose a lightweight request and admission framework to resolve the scalability problem. Without coordination among devices, the proposed framework can be operated at the IoT devices and computing servers separately, by encapsulating latency requirements in offloading requests. Then a selective offloading scheme is designed to minimize the energy consumption of devices, where the signaling overhead can be further reduced by enabling the devices to be self-nominated or self-denied for offloading. Simulation results show that our proposed selective offloading scheme can satisfy the latency requirements of different services and reduce the energy consumption of IoT devices. © 2018 IEEE 

Place, publisher, year, edition, pages
Piscataway: IEEE, 2018
National Category
Communication Systems Telecommunications
Identifiers
urn:nbn:se:hh:diva-36194 (URN)10.1109/MNET.2018.1700101 (DOI)
Note

This work was supported in part by the National Natural Science Foundation of China under Grant 61471060 and Grant 61421061, and in part by the National Key Research and Development Program of China under Grant 2017ZX03001003.

Available from: 2018-01-30 Created: 2018-01-30 Last updated: 2018-01-31Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0003-4894-4134

Search in DiVA

Show all publications