hkr.sePublications
Change search
Link to record
Permanent link

Direct link
Publications (10 of 10) Show all publications
Wang, Q. (2021). Defending wireless communication against eavesdropping attacks using secret spreading codes and artificial interference. Computers & security (Print), 103, 1-29, Article ID 102175.
Open this publication in new window or tab >>Defending wireless communication against eavesdropping attacks using secret spreading codes and artificial interference
2021 (English)In: Computers & security (Print), ISSN 0167-4048, E-ISSN 1872-6208, Vol. 103, p. 1-29, article id 102175Article in journal (Refereed) Published
Abstract [en]

The broadcast nature of wireless communication makes it intrinsically vulnerable to eavesdropping attacks. This article suggests the using of secret spreading codes (i.e. only a legitimate receiver knows the spreading sequence) and artificial interference (i.e. by intentionally adding noise to the broadcast channel) on countering eavesdropping attacks. We have made a theoretical analysis on the potential performance degradation at the eavesdropper and at the legitimate receiver for a point-to-point wireless communication system using direct-sequence spread spectrum (DSSS) with coherent phase-shift keying (PSK) modulation. We have also proposed a lightweight non-cryptographic secret code generation scheme which leads to low correlation between the spreading codes used at the transmitter and at the eavesdropper. Simulation results confirms the good anti-eavesdropping performance on using the proposed non-cryptographic secret code generation scheme. Simulation results also conform with the theoretical analysis and motivate the using of artificial interference on countering eavesdropping attacks.

Keywords
Anti-eavesdropping, artificial interference, non-cryptograhic method, physical layer security, secret spreading code, wireless communication
National Category
Telecommunications
Identifiers
urn:nbn:se:hkr:diva-21490 (URN)10.1016/j.cose.2020.102175 (DOI)000623895800005 ()
Available from: 2021-01-08 Created: 2021-01-08 Last updated: 2021-04-08Bibliographically approved
Wang, Q., Westlund, V., Johansson, J. & Lindgren, M. (2021). Smart Sewage Water Management and Data Forecast. In: 33rd Workshop of the Swedish Artificial Intelligence Society, SAIS 2021: . Paper presented at 2021 Swedish Artificial Intelligence Society Workshop (SAIS), Luleå/Hybrid: Virtual, online, June 14-15, 2021. USA: Institute of Electrical and Electronics Engineers (IEEE), Article ID 9484017.
Open this publication in new window or tab >>Smart Sewage Water Management and Data Forecast
2021 (English)In: 33rd Workshop of the Swedish Artificial Intelligence Society, SAIS 2021, USA: Institute of Electrical and Electronics Engineers (IEEE), 2021, article id 9484017Conference paper, Oral presentation with published abstract (Other academic)
Abstract [en]

There is currently an ongoing digital transformation for sewage and wastewater management. By automating data collection and enabling remote monitoring, we will not only be able to save abundant human resources but also enabling predictive maintenance which is based on big data analytics. This paper presents a smart sewage water management system which is currently under development in southern Sweden. Real-time data can be collected from over 500 sensors which have already been partially deployed. Preliminary data analysis shows that we can build statistical data models for ground water, rainfall, and sewage water flows, and use those models for data forecast and anomaly detection.

Place, publisher, year, edition, pages
USA: Institute of Electrical and Electronics Engineers (IEEE), 2021
Keywords
Anomaly detection, Big data, Internet of things, Sewage water management
National Category
Computer Sciences Computer Systems Information Systems
Identifiers
urn:nbn:se:hkr:diva-22220 (URN)10.1109/SAIS53221.2021.9484017 (DOI)978-1-6654-4236-7 (ISBN)
Conference
2021 Swedish Artificial Intelligence Society Workshop (SAIS), Luleå/Hybrid: Virtual, online, June 14-15, 2021
Projects
Smart realtids övervakat VA-system för uppmätt bräddning med direktkopplad dataanalys (Vinnova). Arbetet utförts inom Strategiska innovationsprogrammet IoT Sverige, en gemensam satsning av Vinnova, Formas och Energimyndigheten
Funder
Vinnova, 2020-04108
Note

This work is supported by the strategic innovation programme IoT Sweden, which is a joint effort by Vinnova, the Swedish research council Formas and the Swedish Energy Agency.

Available from: 2021-07-20 Created: 2021-07-20 Last updated: 2021-09-22Bibliographically approved
Wang, Q. (2018). Lightweight session-key establishment for the internet of things. In: : . Paper presented at 14th Swedish National Computer Networking Workshop (SNCNW 2018), May 31- June 01, 2018, Karlskrona..
Open this publication in new window or tab >>Lightweight session-key establishment for the internet of things
2018 (English)Conference paper, Oral presentation only (Other academic)
Abstract [en]

Internet of Things is evolving from the theory into reality. It is increasingly embedded into our daily lives to provide critical services such as pervasive healthcare and intelligent transportation systems, for which our privacy and security highly rely on the proper functioning of the products. This paper proposes a lightweight session-key establishment protocol that provides fundamental protection for the sensitive information flow in the Internet of Things. The new session-key establishment scheme utilizes the fact that time synchronization is a standard service in most of the Internet of Things products, and relies on loose time synchronization information to achieve secure and fast key agreement. Compared to traditional session-key establishment methods such as the one used by Wi-Fi, the new scheme is more lightweight and also allows a faster session establishment which can be critical for real-time services.

National Category
Computer Sciences
Identifiers
urn:nbn:se:hkr:diva-18316 (URN)
Conference
14th Swedish National Computer Networking Workshop (SNCNW 2018), May 31- June 01, 2018, Karlskrona.
Note

Not formally published. The paper has been peer reviewed and circulated only within the conference participants. 

A modified version can be found as 'Session Key Agreement for End-to-End Security in Time-Synchronized Networks'.

Available from: 2018-07-01 Created: 2018-07-01 Last updated: 2021-03-23Bibliographically approved
Wang, Q., Huang, X. & Mengistu, D. (2018). Session key agreement for end-to-end security in time-synchronized networks. In: : . Paper presented at The 10th International Conference on Ubiquitous and Future Networks, Prague, July 3-6, 2018.. IEEE
Open this publication in new window or tab >>Session key agreement for end-to-end security in time-synchronized networks
2018 (English)Conference paper, Published paper (Other academic)
Place, publisher, year, edition, pages
IEEE, 2018
National Category
Computer Sciences
Identifiers
urn:nbn:se:hkr:diva-18315 (URN)10.1109/ICUFN.2018.8436968 (DOI)978-1-5386-4646-5 (ISBN)978-1-5386-4647-2 (ISBN)
Conference
The 10th International Conference on Ubiquitous and Future Networks, Prague, July 3-6, 2018.
Available from: 2018-07-01 Created: 2018-07-01 Last updated: 2020-07-06Bibliographically approved
Wang, Q. (2016). Kvalitetssäkring i högre utbildning. In: Claes Dahlqvist & Stefan Larsson (Ed.), Lärarlärdom 2016: Högskolan Kristianstad. Paper presented at Lärarlärdom, Högskolan Kristianstad, 17 augusti, 2016. Högskolan Kristianstad: Kristianstad University Press
Open this publication in new window or tab >>Kvalitetssäkring i högre utbildning
2016 (Swedish)In: Lärarlärdom 2016: Högskolan Kristianstad / [ed] Claes Dahlqvist & Stefan Larsson, Högskolan Kristianstad: Kristianstad University Press , 2016Conference paper, Oral presentation with published abstract (Other academic)
Abstract [sv]

Kvalitetssäkring är ganska viktigt i högre utbildning. Som den sista kursen i ett utbildningsprogram, självständig examensarbete har en tung roll. I de flesta lärosäten, har ett examensarbete en handledare och en examinator. Examinatorn bestämmer vilket betyg ett arbete ska få eller om det ska bli underkänd. Jag har upptäckt två problem i systemet: 1. Bedömning från en individuell examinator är subjektiv och detta har flera konsekvenser, bl.a. icke-förtroendefulla relationer mellan lärare och elev, orättvisa för studenter, och även ojämna kvalité hos universiteten och högskolor; 2. Handledare och examinatorer får en schablon resurstilldelning för varje student och faktiskt blir straffad när en student blir underkänd.

Medan det första problemet är en allmän fråga, det andra kan vara ett specialfall för oss. Båda problemen undergräver kvalitetssäkringssystemet. Diskussioner här gäller att hitta en lösning till problemen. Bland annat, peer-review, grupp examinering, och arbetsbelastning baserad resursfördelning ska diskuteras.

Place, publisher, year, edition, pages
Högskolan Kristianstad: Kristianstad University Press, 2016
National Category
Pedagogy
Identifiers
urn:nbn:se:hkr:diva-16580 (URN)
Conference
Lärarlärdom, Högskolan Kristianstad, 17 augusti, 2016
Available from: 2017-03-07 Created: 2017-03-07 Last updated: 2017-03-07Bibliographically approved
Wang, Q., Yigitler, H., Huang, X. & Jäntti, R. (2016). Localizing multiple objects using radio tomographic imaging technology. IEEE Transactions on Vehicular Technology, 65(5), 3641-3656
Open this publication in new window or tab >>Localizing multiple objects using radio tomographic imaging technology
2016 (English)In: IEEE Transactions on Vehicular Technology, ISSN 0018-9545, E-ISSN 1939-9359, Vol. 65, no 5, p. 3641-3656Article in journal (Refereed) Published
Abstract [en]

Low data rate wireless networks can be deployed for physical intrusion detection and localization purposes. The intrusion of a physical object (or human) will disrupt the radio frequency magnetic field, and can be detected by observing the change of radio attenuation. This gives the basis for the radio tomographic imaging technology which has been recently developed for passively monitoring and tracking objects. Due to noise and the lack of knowledge about the number and the sizes of intruding objects, multi-object intrusion detection and localization is a challenging issue. This article proposes an extended VB-GMM (i.e. variational Bayesian Gaussian mixture model) algorithm in treating this problem. The extended VBGMM algorithm applies a Gaussian mixture model to model the changed radio attenuation in a monitored field due to the intrusion of an unknown number of objects, and uses a modified version of the variational Bayesian approach for model estimation. Real world data from both outdoor and indoor experiments (using the radio tomographic imaging technology) have been used to verify the high accuracy and the robustness of the proposed multi-object localization algorithm.

Keywords
Gaussian mixture model, multiple object localization, physical intrusion detection, radio tomographic imaging, variational Bayesian
National Category
Embedded Systems
Identifiers
urn:nbn:se:hkr:diva-14043 (URN)10.1109/TVT.2015.2432038 (DOI)000376094500060 ()
Available from: 2015-06-16 Created: 2015-06-16 Last updated: 2017-12-04Bibliographically approved
Huang, X., Craig, P. & Wang, Q. (2015). Identity-based association protocols for wireless personal area networks. In: Proceedings of The 13th IEEE International Conference on Dependable, Autonomic, and Secure Computing: . Paper presented at The 13th IEEE International Conference on Dependable, Autonomic, and Secure Computing (DASC'15), 26-28 October, United Kingdom. IEEE conference proceedings
Open this publication in new window or tab >>Identity-based association protocols for wireless personal area networks
2015 (English)In: Proceedings of The 13th IEEE International Conference on Dependable, Autonomic, and Secure Computing, IEEE conference proceedings, 2015Conference paper, Published paper (Refereed)
Abstract [en]

Identity based infrastructure allows the public keyof a user to be derived easily from a predefined aspect of theirknown identity such as a phone number, passport number orother universally unique identifier. Recently, H¨olbl and Welzerhave proposed an identity-based key establishment protocol.However, this protocol is found to be vulnerable to man-inthe-middle attacks and impersonation attacks. In this paper,we propose multi-channel identity based protocols for wirelesspersonal area networks which can eliminate these attacks.These protocols alleviate the certificate overhead by using apublic key infrastructure which is suitable for wireless personalarea networks.

Place, publisher, year, edition, pages
IEEE conference proceedings, 2015
Keywords
Security, wireless sensor network, identity based protocol, out-of-band channel
National Category
Electrical Engineering, Electronic Engineering, Information Engineering
Identifiers
urn:nbn:se:hkr:diva-14612 (URN)000380514500276 ()978-1-5090-0154-5 (ISBN)
Conference
The 13th IEEE International Conference on Dependable, Autonomic, and Secure Computing (DASC'15), 26-28 October, United Kingdom
Available from: 2015-09-18 Created: 2015-09-18 Last updated: 2016-12-07Bibliographically approved
Wang, Q. (2014). A practice of using research seminars in teaching advanced students. In: : . Paper presented at Den årliga Högskolepedagogiska konferensen - LÄRARLÄRDOM 20 augusti 2014 på Blekinge Tekniska Högskola (pp. 1-3). Karlskrona
Open this publication in new window or tab >>A practice of using research seminars in teaching advanced students
2014 (English)Conference paper, Oral presentation with published abstract (Refereed)
Abstract [en]

Research seminar, as a teaching form, is excellent in helping students achieve active learning. This work presents the author's experience on the using of research seminars at Kristianstad University.

Place, publisher, year, edition, pages
Karlskrona: , 2014
Keywords
Research seminar, teaching
National Category
Pedagogy
Identifiers
urn:nbn:se:hkr:diva-14045 (URN)
Conference
Den årliga Högskolepedagogiska konferensen - LÄRARLÄRDOM 20 augusti 2014 på Blekinge Tekniska Högskola
Available from: 2015-06-16 Created: 2015-06-16 Last updated: 2015-06-29Bibliographically approved
Huang, X., Chen, B., Markham, A., Wang, Q., Zheng, Y. & Roscoe, A. W. (2013). Human interactive secure key and ID exchange protocols in body sensor networks. IET Information Security, 7(1), 30-38
Open this publication in new window or tab >>Human interactive secure key and ID exchange protocols in body sensor networks
Show others...
2013 (English)In: IET Information Security, ISSN 1751-8709, E-ISSN 1751-8717, Vol. 7, no 1, p. 30-38Article in journal (Refereed) Published
Abstract [en]

A body sensor network (BSN) is typically a wearable wireless sensor network. Security protection is critical to BSNs, since they collect sensitive personal information. Generally speaking, security protection of BSN relies on identity (ID) and key distribution protocols. Most existing protocols are designed to run in general wireless sensor networks, and are not suitable for BSNs. After carefully examining the characteristics of BSNs, the authors propose human interactive empirical channel-based security protocols, which include an elliptic curve Diffie–Hellman version of symmetric hash commitment before knowledge protocol and an elliptic curve Diffie–Hellman version of hash commitment before knowledge protocol. Using these protocols, dynamically distributing keys and IDs become possible. As opposite to present solutions, these protocols do not need any pre-deployment of keys or secrets. Therefore compromised and expired keys or IDs can be easily changed. These protocols exploit human users as temporary trusted third parties. The authors, thus, show that the human interactive channels can help them to design secure BSNs.

Keywords
Data security, ; Biomedical communication, Protocols, Cryptography, Wireless sensor networks
National Category
Communication Systems Embedded Systems Medical Laboratory and Measurements Technologies
Identifiers
urn:nbn:se:hkr:diva-11329 (URN)10.1049/iet-ifs.2012.0080 (DOI)
Available from: 2013-11-29 Created: 2013-11-29 Last updated: 2017-12-06Bibliographically approved
Wang, Q., Yigitler, H. & Jäntti, R. (2012). System monitoring and fault diagnosis in wireless sensor systems. In: Aalto University Workshop on Wireless Sensor Systems, WoWSS 2012: . Paper presented at Aalto University Workshop on Wireless Sensor Systems, WoWSS 2012.
Open this publication in new window or tab >>System monitoring and fault diagnosis in wireless sensor systems
2012 (English)In: Aalto University Workshop on Wireless Sensor Systems, WoWSS 2012, 2012Conference paper, Oral presentation with published abstract (Refereed)
Abstract [en]

In this paper, we discuss fault diagnosis for wireless sensor systems. Fault diagnosis is only possible if comprehensive system monitoring is in place. We thus also present architecture for in-depth system monitoring.

Keywords
Wireless sensor networks, fault diagnosis
National Category
Embedded Systems
Identifiers
urn:nbn:se:hkr:diva-11328 (URN)
Conference
Aalto University Workshop on Wireless Sensor Systems, WoWSS 2012
Available from: 2013-11-28 Created: 2013-11-28 Last updated: 2016-01-21Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0002-8032-6291

Search in DiVA

Show all publications