hkr.sePublications
Change search
Link to record
Permanent link

Direct link
BETA
Publications (8 of 8) Show all publications
Wang, Q. (2018). Lightweight session: key establishment for the internet of things. In: : . Paper presented at 14th Swedish National Computer Networking Workshop (SNCNW 2018), May 31- June 01, 2018, Karlskrona..
Open this publication in new window or tab >>Lightweight session: key establishment for the internet of things
2018 (English)Conference paper, Oral presentation only (Refereed)
National Category
Computer Sciences
Identifiers
urn:nbn:se:hkr:diva-18316 (URN)
Conference
14th Swedish National Computer Networking Workshop (SNCNW 2018), May 31- June 01, 2018, Karlskrona.
Available from: 2018-07-01 Created: 2018-07-01 Last updated: 2019-01-21Bibliographically approved
Wang, Q., Huang, X. & Mengistu, D. (2018). Session key agreement for end-to-end security in time-synchronized networks. In: : . Paper presented at The 10th International Conference on Ubiquitous and Future Networks, Prague, July 3-6, 2018.. IEEE
Open this publication in new window or tab >>Session key agreement for end-to-end security in time-synchronized networks
2018 (English)Conference paper, Published paper (Other academic)
Place, publisher, year, edition, pages
IEEE, 2018
National Category
Computer Sciences
Identifiers
urn:nbn:se:hkr:diva-18315 (URN)10.1109/ICUFN.2018.8436968 (DOI)978-1-5386-4646-5 (ISBN)978-1-5386-4647-2 (ISBN)
Conference
The 10th International Conference on Ubiquitous and Future Networks, Prague, July 3-6, 2018.
Available from: 2018-07-01 Created: 2018-07-01 Last updated: 2018-12-17Bibliographically approved
Wang, Q. (2016). Kvalitetssäkring i högre utbildning. In: Claes Dahlqvist & Stefan Larsson (Ed.), Lärarlärdom 2016: Högskolan Kristianstad. Paper presented at Lärarlärdom, Högskolan Kristianstad, 17 augusti, 2016. Högskolan Kristianstad: Kristianstad University Press
Open this publication in new window or tab >>Kvalitetssäkring i högre utbildning
2016 (Swedish)In: Lärarlärdom 2016: Högskolan Kristianstad / [ed] Claes Dahlqvist & Stefan Larsson, Högskolan Kristianstad: Kristianstad University Press , 2016Conference paper, Oral presentation with published abstract (Other academic)
Abstract [sv]

Kvalitetssäkring är ganska viktigt i högre utbildning. Som den sista kursen i ett utbildningsprogram, självständig examensarbete har en tung roll. I de flesta lärosäten, har ett examensarbete en handledare och en examinator. Examinatorn bestämmer vilket betyg ett arbete ska få eller om det ska bli underkänd. Jag har upptäckt två problem i systemet: 1. Bedömning från en individuell examinator är subjektiv och detta har flera konsekvenser, bl.a. icke-förtroendefulla relationer mellan lärare och elev, orättvisa för studenter, och även ojämna kvalité hos universiteten och högskolor; 2. Handledare och examinatorer får en schablon resurstilldelning för varje student och faktiskt blir straffad när en student blir underkänd.

Medan det första problemet är en allmän fråga, det andra kan vara ett specialfall för oss. Båda problemen undergräver kvalitetssäkringssystemet. Diskussioner här gäller att hitta en lösning till problemen. Bland annat, peer-review, grupp examinering, och arbetsbelastning baserad resursfördelning ska diskuteras.

Place, publisher, year, edition, pages
Högskolan Kristianstad: Kristianstad University Press, 2016
National Category
Pedagogy
Identifiers
urn:nbn:se:hkr:diva-16580 (URN)
Conference
Lärarlärdom, Högskolan Kristianstad, 17 augusti, 2016
Available from: 2017-03-07 Created: 2017-03-07 Last updated: 2017-03-07Bibliographically approved
Wang, Q., Yigitler, H., Huang, X. & Jäntti, R. (2016). Localizing multiple objects using radio tomographic imaging technology. IEEE Transactions on Vehicular Technology, 65(5), 3641-3656
Open this publication in new window or tab >>Localizing multiple objects using radio tomographic imaging technology
2016 (English)In: IEEE Transactions on Vehicular Technology, ISSN 0018-9545, E-ISSN 1939-9359, Vol. 65, no 5, p. 3641-3656Article in journal (Refereed) Published
Abstract [en]

Low data rate wireless networks can be deployed for physical intrusion detection and localization purposes. The intrusion of a physical object (or human) will disrupt the radio frequency magnetic field, and can be detected by observing the change of radio attenuation. This gives the basis for the radio tomographic imaging technology which has been recently developed for passively monitoring and tracking objects. Due to noise and the lack of knowledge about the number and the sizes of intruding objects, multi-object intrusion detection and localization is a challenging issue. This article proposes an extended VB-GMM (i.e. variational Bayesian Gaussian mixture model) algorithm in treating this problem. The extended VBGMM algorithm applies a Gaussian mixture model to model the changed radio attenuation in a monitored field due to the intrusion of an unknown number of objects, and uses a modified version of the variational Bayesian approach for model estimation. Real world data from both outdoor and indoor experiments (using the radio tomographic imaging technology) have been used to verify the high accuracy and the robustness of the proposed multi-object localization algorithm.

Keywords
Gaussian mixture model, multiple object localization, physical intrusion detection, radio tomographic imaging, variational Bayesian
National Category
Embedded Systems
Identifiers
urn:nbn:se:hkr:diva-14043 (URN)10.1109/TVT.2015.2432038 (DOI)000376094500060 ()
Available from: 2015-06-16 Created: 2015-06-16 Last updated: 2017-12-04Bibliographically approved
Huang, X., Craig, P. & Wang, Q. (2015). Identity-based association protocols for wireless personal area networks. In: Proceedings of The 13th IEEE International Conference on Dependable, Autonomic, and Secure Computing: . Paper presented at The 13th IEEE International Conference on Dependable, Autonomic, and Secure Computing (DASC'15), 26-28 October, United Kingdom. IEEE conference proceedings
Open this publication in new window or tab >>Identity-based association protocols for wireless personal area networks
2015 (English)In: Proceedings of The 13th IEEE International Conference on Dependable, Autonomic, and Secure Computing, IEEE conference proceedings, 2015Conference paper, Published paper (Refereed)
Abstract [en]

Identity based infrastructure allows the public keyof a user to be derived easily from a predefined aspect of theirknown identity such as a phone number, passport number orother universally unique identifier. Recently, H¨olbl and Welzerhave proposed an identity-based key establishment protocol.However, this protocol is found to be vulnerable to man-inthe-middle attacks and impersonation attacks. In this paper,we propose multi-channel identity based protocols for wirelesspersonal area networks which can eliminate these attacks.These protocols alleviate the certificate overhead by using apublic key infrastructure which is suitable for wireless personalarea networks.

Place, publisher, year, edition, pages
IEEE conference proceedings, 2015
Keywords
Security, wireless sensor network, identity based protocol, out-of-band channel
National Category
Electrical Engineering, Electronic Engineering, Information Engineering
Identifiers
urn:nbn:se:hkr:diva-14612 (URN)000380514500276 ()978-1-5090-0154-5 (ISBN)
Conference
The 13th IEEE International Conference on Dependable, Autonomic, and Secure Computing (DASC'15), 26-28 October, United Kingdom
Available from: 2015-09-18 Created: 2015-09-18 Last updated: 2016-12-07Bibliographically approved
Wang, Q. (2014). A practice of using research seminars in teaching advanced students. In: : . Paper presented at Den årliga Högskolepedagogiska konferensen - LÄRARLÄRDOM 20 augusti 2014 på Blekinge Tekniska Högskola (pp. 1-3). Karlskrona
Open this publication in new window or tab >>A practice of using research seminars in teaching advanced students
2014 (English)Conference paper, Oral presentation with published abstract (Refereed)
Abstract [en]

Research seminar, as a teaching form, is excellent in helping students achieve active learning. This work presents the author's experience on the using of research seminars at Kristianstad University.

Place, publisher, year, edition, pages
Karlskrona: , 2014
Keywords
Research seminar, teaching
National Category
Pedagogy
Identifiers
urn:nbn:se:hkr:diva-14045 (URN)
Conference
Den årliga Högskolepedagogiska konferensen - LÄRARLÄRDOM 20 augusti 2014 på Blekinge Tekniska Högskola
Available from: 2015-06-16 Created: 2015-06-16 Last updated: 2015-06-29Bibliographically approved
Huang, X., Chen, B., Markham, A., Wang, Q., Zheng, Y. & Roscoe, A. W. (2013). Human interactive secure key and ID exchange protocols in body sensor networks. IET Information Security, 7(1), 30-38
Open this publication in new window or tab >>Human interactive secure key and ID exchange protocols in body sensor networks
Show others...
2013 (English)In: IET Information Security, ISSN 1751-8709, E-ISSN 1751-8717, Vol. 7, no 1, p. 30-38Article in journal (Refereed) Published
Abstract [en]

A body sensor network (BSN) is typically a wearable wireless sensor network. Security protection is critical to BSNs, since they collect sensitive personal information. Generally speaking, security protection of BSN relies on identity (ID) and key distribution protocols. Most existing protocols are designed to run in general wireless sensor networks, and are not suitable for BSNs. After carefully examining the characteristics of BSNs, the authors propose human interactive empirical channel-based security protocols, which include an elliptic curve Diffie–Hellman version of symmetric hash commitment before knowledge protocol and an elliptic curve Diffie–Hellman version of hash commitment before knowledge protocol. Using these protocols, dynamically distributing keys and IDs become possible. As opposite to present solutions, these protocols do not need any pre-deployment of keys or secrets. Therefore compromised and expired keys or IDs can be easily changed. These protocols exploit human users as temporary trusted third parties. The authors, thus, show that the human interactive channels can help them to design secure BSNs.

Keywords
Data security, ; Biomedical communication, Protocols, Cryptography, Wireless sensor networks
National Category
Communication Systems Embedded Systems Medical Laboratory and Measurements Technologies
Identifiers
urn:nbn:se:hkr:diva-11329 (URN)10.1049/iet-ifs.2012.0080 (DOI)
Available from: 2013-11-29 Created: 2013-11-29 Last updated: 2017-12-06Bibliographically approved
Wang, Q., Yigitler, H. & Jäntti, R. (2012). System monitoring and fault diagnosis in wireless sensor systems. In: Aalto University Workshop on Wireless Sensor Systems, WoWSS 2012: . Paper presented at Aalto University Workshop on Wireless Sensor Systems, WoWSS 2012.
Open this publication in new window or tab >>System monitoring and fault diagnosis in wireless sensor systems
2012 (English)In: Aalto University Workshop on Wireless Sensor Systems, WoWSS 2012, 2012Conference paper, Oral presentation with published abstract (Refereed)
Abstract [en]

In this paper, we discuss fault diagnosis for wireless sensor systems. Fault diagnosis is only possible if comprehensive system monitoring is in place. We thus also present architecture for in-depth system monitoring.

Keywords
Wireless sensor networks, fault diagnosis
National Category
Embedded Systems
Identifiers
urn:nbn:se:hkr:diva-11328 (URN)
Conference
Aalto University Workshop on Wireless Sensor Systems, WoWSS 2012
Available from: 2013-11-28 Created: 2013-11-28 Last updated: 2016-01-21Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0002-8032-6291

Search in DiVA

Show all publications