hkr.sePublikasjoner
Endre søk
Link to record
Permanent link

Direct link
BETA
Publikasjoner (8 av 8) Visa alla publikasjoner
Wang, Q. (2018). Lightweight session: key establishment for the internet of things. In: : . Paper presented at 14th Swedish National Computer Networking Workshop (SNCNW 2018), May 31- June 01, 2018, Karlskrona..
Åpne denne publikasjonen i ny fane eller vindu >>Lightweight session: key establishment for the internet of things
2018 (engelsk)Konferansepaper, Oral presentation only (Fagfellevurdert)
HSV kategori
Identifikatorer
urn:nbn:se:hkr:diva-18316 (URN)
Konferanse
14th Swedish National Computer Networking Workshop (SNCNW 2018), May 31- June 01, 2018, Karlskrona.
Tilgjengelig fra: 2018-07-01 Laget: 2018-07-01 Sist oppdatert: 2019-01-21bibliografisk kontrollert
Wang, Q., Huang, X. & Mengistu, D. (2018). Session key agreement for end-to-end security in time-synchronized networks. In: : . Paper presented at The 10th International Conference on Ubiquitous and Future Networks, Prague, July 3-6, 2018.. IEEE
Åpne denne publikasjonen i ny fane eller vindu >>Session key agreement for end-to-end security in time-synchronized networks
2018 (engelsk)Konferansepaper, Publicerat paper (Annet vitenskapelig)
sted, utgiver, år, opplag, sider
IEEE, 2018
HSV kategori
Identifikatorer
urn:nbn:se:hkr:diva-18315 (URN)10.1109/ICUFN.2018.8436968 (DOI)978-1-5386-4646-5 (ISBN)978-1-5386-4647-2 (ISBN)
Konferanse
The 10th International Conference on Ubiquitous and Future Networks, Prague, July 3-6, 2018.
Tilgjengelig fra: 2018-07-01 Laget: 2018-07-01 Sist oppdatert: 2018-12-17bibliografisk kontrollert
Wang, Q. (2016). Kvalitetssäkring i högre utbildning. In: Claes Dahlqvist & Stefan Larsson (Ed.), Lärarlärdom 2016: Högskolan Kristianstad. Paper presented at Lärarlärdom, Högskolan Kristianstad, 17 augusti, 2016. Högskolan Kristianstad: Kristianstad University Press
Åpne denne publikasjonen i ny fane eller vindu >>Kvalitetssäkring i högre utbildning
2016 (svensk)Inngår i: Lärarlärdom 2016: Högskolan Kristianstad / [ed] Claes Dahlqvist & Stefan Larsson, Högskolan Kristianstad: Kristianstad University Press , 2016Konferansepaper, Oral presentation with published abstract (Annet vitenskapelig)
Abstract [sv]

Kvalitetssäkring är ganska viktigt i högre utbildning. Som den sista kursen i ett utbildningsprogram, självständig examensarbete har en tung roll. I de flesta lärosäten, har ett examensarbete en handledare och en examinator. Examinatorn bestämmer vilket betyg ett arbete ska få eller om det ska bli underkänd. Jag har upptäckt två problem i systemet: 1. Bedömning från en individuell examinator är subjektiv och detta har flera konsekvenser, bl.a. icke-förtroendefulla relationer mellan lärare och elev, orättvisa för studenter, och även ojämna kvalité hos universiteten och högskolor; 2. Handledare och examinatorer får en schablon resurstilldelning för varje student och faktiskt blir straffad när en student blir underkänd.

Medan det första problemet är en allmän fråga, det andra kan vara ett specialfall för oss. Båda problemen undergräver kvalitetssäkringssystemet. Diskussioner här gäller att hitta en lösning till problemen. Bland annat, peer-review, grupp examinering, och arbetsbelastning baserad resursfördelning ska diskuteras.

sted, utgiver, år, opplag, sider
Högskolan Kristianstad: Kristianstad University Press, 2016
HSV kategori
Identifikatorer
urn:nbn:se:hkr:diva-16580 (URN)
Konferanse
Lärarlärdom, Högskolan Kristianstad, 17 augusti, 2016
Tilgjengelig fra: 2017-03-07 Laget: 2017-03-07 Sist oppdatert: 2017-03-07bibliografisk kontrollert
Wang, Q., Yigitler, H., Huang, X. & Jäntti, R. (2016). Localizing multiple objects using radio tomographic imaging technology. IEEE Transactions on Vehicular Technology, 65(5), 3641-3656
Åpne denne publikasjonen i ny fane eller vindu >>Localizing multiple objects using radio tomographic imaging technology
2016 (engelsk)Inngår i: IEEE Transactions on Vehicular Technology, ISSN 0018-9545, E-ISSN 1939-9359, Vol. 65, nr 5, s. 3641-3656Artikkel i tidsskrift (Fagfellevurdert) Published
Abstract [en]

Low data rate wireless networks can be deployed for physical intrusion detection and localization purposes. The intrusion of a physical object (or human) will disrupt the radio frequency magnetic field, and can be detected by observing the change of radio attenuation. This gives the basis for the radio tomographic imaging technology which has been recently developed for passively monitoring and tracking objects. Due to noise and the lack of knowledge about the number and the sizes of intruding objects, multi-object intrusion detection and localization is a challenging issue. This article proposes an extended VB-GMM (i.e. variational Bayesian Gaussian mixture model) algorithm in treating this problem. The extended VBGMM algorithm applies a Gaussian mixture model to model the changed radio attenuation in a monitored field due to the intrusion of an unknown number of objects, and uses a modified version of the variational Bayesian approach for model estimation. Real world data from both outdoor and indoor experiments (using the radio tomographic imaging technology) have been used to verify the high accuracy and the robustness of the proposed multi-object localization algorithm.

Emneord
Gaussian mixture model, multiple object localization, physical intrusion detection, radio tomographic imaging, variational Bayesian
HSV kategori
Identifikatorer
urn:nbn:se:hkr:diva-14043 (URN)10.1109/TVT.2015.2432038 (DOI)000376094500060 ()
Tilgjengelig fra: 2015-06-16 Laget: 2015-06-16 Sist oppdatert: 2017-12-04bibliografisk kontrollert
Huang, X., Craig, P. & Wang, Q. (2015). Identity-based association protocols for wireless personal area networks. In: Proceedings of The 13th IEEE International Conference on Dependable, Autonomic, and Secure Computing: . Paper presented at The 13th IEEE International Conference on Dependable, Autonomic, and Secure Computing (DASC'15), 26-28 October, United Kingdom. IEEE conference proceedings
Åpne denne publikasjonen i ny fane eller vindu >>Identity-based association protocols for wireless personal area networks
2015 (engelsk)Inngår i: Proceedings of The 13th IEEE International Conference on Dependable, Autonomic, and Secure Computing, IEEE conference proceedings, 2015Konferansepaper, Publicerat paper (Fagfellevurdert)
Abstract [en]

Identity based infrastructure allows the public keyof a user to be derived easily from a predefined aspect of theirknown identity such as a phone number, passport number orother universally unique identifier. Recently, H¨olbl and Welzerhave proposed an identity-based key establishment protocol.However, this protocol is found to be vulnerable to man-inthe-middle attacks and impersonation attacks. In this paper,we propose multi-channel identity based protocols for wirelesspersonal area networks which can eliminate these attacks.These protocols alleviate the certificate overhead by using apublic key infrastructure which is suitable for wireless personalarea networks.

sted, utgiver, år, opplag, sider
IEEE conference proceedings, 2015
Emneord
Security, wireless sensor network, identity based protocol, out-of-band channel
HSV kategori
Identifikatorer
urn:nbn:se:hkr:diva-14612 (URN)000380514500276 ()978-1-5090-0154-5 (ISBN)
Konferanse
The 13th IEEE International Conference on Dependable, Autonomic, and Secure Computing (DASC'15), 26-28 October, United Kingdom
Tilgjengelig fra: 2015-09-18 Laget: 2015-09-18 Sist oppdatert: 2016-12-07bibliografisk kontrollert
Wang, Q. (2014). A practice of using research seminars in teaching advanced students. In: : . Paper presented at Den årliga Högskolepedagogiska konferensen - LÄRARLÄRDOM 20 augusti 2014 på Blekinge Tekniska Högskola (pp. 1-3). Karlskrona
Åpne denne publikasjonen i ny fane eller vindu >>A practice of using research seminars in teaching advanced students
2014 (engelsk)Konferansepaper, Oral presentation with published abstract (Fagfellevurdert)
Abstract [en]

Research seminar, as a teaching form, is excellent in helping students achieve active learning. This work presents the author's experience on the using of research seminars at Kristianstad University.

sted, utgiver, år, opplag, sider
Karlskrona: , 2014
Emneord
Research seminar, teaching
HSV kategori
Identifikatorer
urn:nbn:se:hkr:diva-14045 (URN)
Konferanse
Den årliga Högskolepedagogiska konferensen - LÄRARLÄRDOM 20 augusti 2014 på Blekinge Tekniska Högskola
Tilgjengelig fra: 2015-06-16 Laget: 2015-06-16 Sist oppdatert: 2015-06-29bibliografisk kontrollert
Huang, X., Chen, B., Markham, A., Wang, Q., Zheng, Y. & Roscoe, A. W. (2013). Human interactive secure key and ID exchange protocols in body sensor networks. IET Information Security, 7(1), 30-38
Åpne denne publikasjonen i ny fane eller vindu >>Human interactive secure key and ID exchange protocols in body sensor networks
Vise andre…
2013 (engelsk)Inngår i: IET Information Security, ISSN 1751-8709, E-ISSN 1751-8717, Vol. 7, nr 1, s. 30-38Artikkel i tidsskrift (Fagfellevurdert) Published
Abstract [en]

A body sensor network (BSN) is typically a wearable wireless sensor network. Security protection is critical to BSNs, since they collect sensitive personal information. Generally speaking, security protection of BSN relies on identity (ID) and key distribution protocols. Most existing protocols are designed to run in general wireless sensor networks, and are not suitable for BSNs. After carefully examining the characteristics of BSNs, the authors propose human interactive empirical channel-based security protocols, which include an elliptic curve Diffie–Hellman version of symmetric hash commitment before knowledge protocol and an elliptic curve Diffie–Hellman version of hash commitment before knowledge protocol. Using these protocols, dynamically distributing keys and IDs become possible. As opposite to present solutions, these protocols do not need any pre-deployment of keys or secrets. Therefore compromised and expired keys or IDs can be easily changed. These protocols exploit human users as temporary trusted third parties. The authors, thus, show that the human interactive channels can help them to design secure BSNs.

Emneord
Data security, ; Biomedical communication, Protocols, Cryptography, Wireless sensor networks
HSV kategori
Identifikatorer
urn:nbn:se:hkr:diva-11329 (URN)10.1049/iet-ifs.2012.0080 (DOI)
Tilgjengelig fra: 2013-11-29 Laget: 2013-11-29 Sist oppdatert: 2017-12-06bibliografisk kontrollert
Wang, Q., Yigitler, H. & Jäntti, R. (2012). System monitoring and fault diagnosis in wireless sensor systems. In: Aalto University Workshop on Wireless Sensor Systems, WoWSS 2012: . Paper presented at Aalto University Workshop on Wireless Sensor Systems, WoWSS 2012.
Åpne denne publikasjonen i ny fane eller vindu >>System monitoring and fault diagnosis in wireless sensor systems
2012 (engelsk)Inngår i: Aalto University Workshop on Wireless Sensor Systems, WoWSS 2012, 2012Konferansepaper, Oral presentation with published abstract (Fagfellevurdert)
Abstract [en]

In this paper, we discuss fault diagnosis for wireless sensor systems. Fault diagnosis is only possible if comprehensive system monitoring is in place. We thus also present architecture for in-depth system monitoring.

Emneord
Wireless sensor networks, fault diagnosis
HSV kategori
Identifikatorer
urn:nbn:se:hkr:diva-11328 (URN)
Konferanse
Aalto University Workshop on Wireless Sensor Systems, WoWSS 2012
Tilgjengelig fra: 2013-11-28 Laget: 2013-11-28 Sist oppdatert: 2016-01-21bibliografisk kontrollert
Organisasjoner
Identifikatorer
ORCID-id: ORCID iD iconorcid.org/0000-0002-8032-6291