hkr.sePublications
Change search
Refine search result
1 - 13 of 13
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 1.
    Arvidsson, Åke
    et al.
    Kristianstad University, Faculty of Natural Science, Research environment of Computer science (RECS). Kristianstad University, Faculty of Natural Science, Avdelningen för datavetenskap.
    Grinnemo, Karl-Johan
    Karlstads universitet.
    Chen, Eric Zhi
    Kristianstad University, Faculty of Natural Science, Avdelningen för datavetenskap. Kristianstad University, Faculty of Natural Science, Research environment of Computer science (RECS).
    Wang, Qinghua
    Kristianstad University, Faculty of Natural Science, Research environment of Computer science (RECS). Kristianstad University, Faculty of Natural Science, Avdelningen för datavetenskap.
    Brunström, Anna
    Karlstads universitet.
    Web metrics for the next generation performance enhancing proxies2019In: 2019 27TH INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS (SOFTCOM) / [ed] Begusic, D Rozic, N Radic, J Saric, M, IEEE , 2019, p. 171-176Conference paper (Refereed)
    Abstract [en]

    The fast growth of Internet traffic, the growing importance of cellular accesses and the escalating competition between content providers and network operators result in a growing interest in improving network performance and user experience. In terms of network transport, different solutions ranging from tuning TCP to installing middleboxes are applied. It turns out, however, that the practical results sometimes are disappointing and we believe that poor testing is one of the reasons for this. Indeed, many cases in the literature limit testing to the simple and rare use case of a single file download, while common and complex use cases like web browsing often are ignored or modelled only by considering smaller files. To facilitate better testing, we present a broader view which includes domain counts, flow counts and different forms of concurrency to better characterise the complexity around web pages, and from which the potential for different optimisation techniques can be estimated. We also derive numerical values of these metrics for a small set of popular web pages and study similarities and differences between pages with the same kind of content (newspapers, e-commerce and video) and between pages designed for the same platform (computer and smartphone).

  • 2.
    Huang, Xin
    et al.
    Department of Computer Science, Institute for the Future of Computing/Oxford Martin School, University of Oxford.
    Chen, Bangdao
    Department of Computer Science, University of Oxford.
    Markham, Andrew
    Department of Computer Science, Institute for the Future of Computing/Oxford Martin School, University of Oxford.
    Wang, Qinghua
    Kristianstad University, School of Health and Society, Avdelningen för Design och datavetenskap. Department of Communications and Networking, Aalto University, Espoo.
    Zheng, Yan
    Department of Communications and Networking, Aalto University, Espoo.
    Roscoe, Andrew William
    Department of Computer Science, Institute for the Future of Computing/Oxford Martin School, University of Oxford.
    Human interactive secure key and ID exchange protocols in body sensor networks2013In: IET Information Security, ISSN 1751-8709, E-ISSN 1751-8717, Vol. 7, no 1, p. 30-38Article in journal (Refereed)
    Abstract [en]

    A body sensor network (BSN) is typically a wearable wireless sensor network. Security protection is critical to BSNs, since they collect sensitive personal information. Generally speaking, security protection of BSN relies on identity (ID) and key distribution protocols. Most existing protocols are designed to run in general wireless sensor networks, and are not suitable for BSNs. After carefully examining the characteristics of BSNs, the authors propose human interactive empirical channel-based security protocols, which include an elliptic curve Diffie–Hellman version of symmetric hash commitment before knowledge protocol and an elliptic curve Diffie–Hellman version of hash commitment before knowledge protocol. Using these protocols, dynamically distributing keys and IDs become possible. As opposite to present solutions, these protocols do not need any pre-deployment of keys or secrets. Therefore compromised and expired keys or IDs can be easily changed. These protocols exploit human users as temporary trusted third parties. The authors, thus, show that the human interactive channels can help them to design secure BSNs.

  • 3.
    Huang, Xin
    et al.
    Kina.
    Craig, Paul
    Kina.
    Wang, Qinghua
    Kristianstad University, School of Health and Society, Avdelningen för Design och datavetenskap.
    Identity-based association protocols for wireless personal area networks2015In: Proceedings of The 13th IEEE International Conference on Dependable, Autonomic, and Secure Computing, IEEE conference proceedings, 2015Conference paper (Refereed)
    Abstract [en]

    Identity based infrastructure allows the public keyof a user to be derived easily from a predefined aspect of theirknown identity such as a phone number, passport number orother universally unique identifier. Recently, H¨olbl and Welzerhave proposed an identity-based key establishment protocol.However, this protocol is found to be vulnerable to man-inthe-middle attacks and impersonation attacks. In this paper,we propose multi-channel identity based protocols for wirelesspersonal area networks which can eliminate these attacks.These protocols alleviate the certificate overhead by using apublic key infrastructure which is suitable for wireless personalarea networks.

  • 4. King'oku, Pascal
    et al.
    Sowe, Alieu
    Wang, Qinghua
    Kristianstad University, Faculty of Natural Sciences, Research environment of Computer science (RECS). Kristianstad University, Faculty of Natural Sciences, Avdelningen för datavetenskap.
    A demo implementation of interactive internet of things2020In: 16th Swedish National Computer Networking Workshop (SNCNW), Kristianstad (online), 2020, 2020, p. 15-18Conference paper (Other academic)
    Abstract [en]

    Internet of Things facilitates interaction betweenhuman users and physical environment through the use ofelectronic sensors, wireless communication and cloudtechnology. In this paper, we demonstrate a scalableimplementation of Internet of Things in a lab environment. Aversatile set of sensors including cameras, power outlets andordinary temperature sensors are embedded in the physicalenvironment and connected to the cloud via local gateways. Datais processed locally and accessible via the cloud. A web servicehosted in the cloud enables remote two-way interaction betweenthe human users and the monitored physical environments.

    Download full text (pdf)
    fulltext
  • 5.
    Wang, Qinghua
    Kristianstad University, School of Health and Society, Avdelningen för Design och datavetenskap.
    A practice of using research seminars in teaching advanced students2014Conference paper (Refereed)
    Abstract [en]

    Research seminar, as a teaching form, is excellent in helping students achieve active learning. This work presents the author's experience on the using of research seminars at Kristianstad University.

    Download (pdf)
    summary
  • 6.
    Wang, Qinghua
    Kristianstad University, Faculty of Natural Sciences, Avdelningen för datavetenskap. Kristianstad University, Faculty of Natural Sciences, Research environment of Computer science (RECS).
    Defending wireless communication against eavesdropping attacks using secret spreading codes and artificial interference2021In: Computers & security (Print), ISSN 0167-4048, E-ISSN 1872-6208, Vol. 103, p. 1-29, article id 102175Article in journal (Refereed)
    Abstract [en]

    The broadcast nature of wireless communication makes it intrinsically vulnerable to eavesdropping attacks. This article suggests the using of secret spreading codes (i.e. only a legitimate receiver knows the spreading sequence) and artificial interference (i.e. by intentionally adding noise to the broadcast channel) on countering eavesdropping attacks. We have made a theoretical analysis on the potential performance degradation at the eavesdropper and at the legitimate receiver for a point-to-point wireless communication system using direct-sequence spread spectrum (DSSS) with coherent phase-shift keying (PSK) modulation. We have also proposed a lightweight non-cryptographic secret code generation scheme which leads to low correlation between the spreading codes used at the transmitter and at the eavesdropper. Simulation results confirms the good anti-eavesdropping performance on using the proposed non-cryptographic secret code generation scheme. Simulation results also conform with the theoretical analysis and motivate the using of artificial interference on countering eavesdropping attacks.

    Download full text (pdf)
    fulltext
  • 7.
    Wang, Qinghua
    Kristianstad University, School of Health and Society, Avdelningen för Design och datavetenskap.
    Kvalitetssäkring i högre utbildning2016In: Lärarlärdom 2016: Högskolan Kristianstad / [ed] Claes Dahlqvist & Stefan Larsson, Högskolan Kristianstad: Kristianstad University Press , 2016Conference paper (Other academic)
    Abstract [sv]

    Kvalitetssäkring är ganska viktigt i högre utbildning. Som den sista kursen i ett utbildningsprogram, självständig examensarbete har en tung roll. I de flesta lärosäten, har ett examensarbete en handledare och en examinator. Examinatorn bestämmer vilket betyg ett arbete ska få eller om det ska bli underkänd. Jag har upptäckt två problem i systemet: 1. Bedömning från en individuell examinator är subjektiv och detta har flera konsekvenser, bl.a. icke-förtroendefulla relationer mellan lärare och elev, orättvisa för studenter, och även ojämna kvalité hos universiteten och högskolor; 2. Handledare och examinatorer får en schablon resurstilldelning för varje student och faktiskt blir straffad när en student blir underkänd.

    Medan det första problemet är en allmän fråga, det andra kan vara ett specialfall för oss. Båda problemen undergräver kvalitetssäkringssystemet. Diskussioner här gäller att hitta en lösning till problemen. Bland annat, peer-review, grupp examinering, och arbetsbelastning baserad resursfördelning ska diskuteras.

    Download full text (pdf)
    fulltext
  • 8.
    Wang, Qinghua
    Kristianstad University, Faculty of Natural Sciences, Avdelningen för datavetenskap. Kristianstad University, Faculty of Natural Sciences, Research environment of Computer science (RECS).
    Lightweight session-key establishment for the internet of things2018Conference paper (Other academic)
    Abstract [en]

    Internet of Things is evolving from the theory into reality. It is increasingly embedded into our daily lives to provide critical services such as pervasive healthcare and intelligent transportation systems, for which our privacy and security highly rely on the proper functioning of the products. This paper proposes a lightweight session-key establishment protocol that provides fundamental protection for the sensitive information flow in the Internet of Things. The new session-key establishment scheme utilizes the fact that time synchronization is a standard service in most of the Internet of Things products, and relies on loose time synchronization information to achieve secure and fast key agreement. Compared to traditional session-key establishment methods such as the one used by Wi-Fi, the new scheme is more lightweight and also allows a faster session establishment which can be critical for real-time services.

  • 9.
    Wang, Qinghua
    Kristianstad University, School of Health and Society, Avdelningen för Design och datavetenskap.
    Using secret spreading codes to enhance physical layer security in wireless communication2017In: ICC 2017: 3rd International Workshop on Advanced PHY and MAC Technology for Super Dense Wireless Networks, 2017Conference paper (Refereed)
    Abstract [en]

    The broadcast nature of wireless communication make it intrinsically vulnerable to jamming and eavesdropping attacks. Spread-spectrum techniques spread narrowband signals over a wide bandwidth, and provide good resistance to noise and jamming attacks. However, spread-spectrum signals can still be intercepted if their used spreading codes are known. To tackle this issue, this paper proposes a lightweight design on generating secret spreading codes. A secret spreading code has all the desired properties of an ordinary spreading code, plus its unpredictability. Our method on generating secret spreading codes is shown to be resistant to cryptanalysis, and has little requirement on memory and computing resources.

  • 10.
    Wang, Qinghua
    et al.
    Kristianstad University, Faculty of Natural Science, Avdelningen för datavetenskap. Kristianstad University, Faculty of Natural Science, Research environment of Computer science (RECS).
    Huang, Xin
    England.
    Mengistu, Dawit
    Kristianstad University, Faculty of Natural Science, Avdelningen för datavetenskap. Kristianstad University, Faculty of Natural Science, Research environment of Computer science (RECS). dawit.mengistu@hkr.se .
    Session key agreement for end-to-end security in time-synchronized networks2018Conference paper (Other academic)
  • 11.
    Wang, Qinghua
    et al.
    Kristianstad University, Faculty of Natural Sciences, Avdelningen för datavetenskap. Kristianstad University, Faculty of Natural Sciences, Research environment of Computer science (RECS).
    Westlund, Viktor
    Johansson, Jonas
    Lindgren, Magnus
    Kristianstads Kommun.
    Smart Sewage Water Management and Data Forecast2021In: 33rd Workshop of the Swedish Artificial Intelligence Society, SAIS 2021, USA: Institute of Electrical and Electronics Engineers (IEEE), 2021, article id 9484017Conference paper (Other academic)
    Abstract [en]

    There is currently an ongoing digital transformation for sewage and wastewater management. By automating data collection and enabling remote monitoring, we will not only be able to save abundant human resources but also enabling predictive maintenance which is based on big data analytics. This paper presents a smart sewage water management system which is currently under development in southern Sweden. Real-time data can be collected from over 500 sensors which have already been partially deployed. Preliminary data analysis shows that we can build statistical data models for ground water, rainfall, and sewage water flows, and use those models for data forecast and anomaly detection.

  • 12.
    Wang, Qinghua
    et al.
    Kristianstad University, School of Health and Society, Avdelningen för Design och datavetenskap.
    Yigitler, Huseyin
    Finland.
    Huang, Xin
    Kina.
    Jäntti, Riku
    Finland.
    Localizing multiple objects using radio tomographic imaging technology2016In: IEEE Transactions on Vehicular Technology, ISSN 0018-9545, E-ISSN 1939-9359, Vol. 65, no 5, p. 3641-3656Article in journal (Refereed)
    Abstract [en]

    Low data rate wireless networks can be deployed for physical intrusion detection and localization purposes. The intrusion of a physical object (or human) will disrupt the radio frequency magnetic field, and can be detected by observing the change of radio attenuation. This gives the basis for the radio tomographic imaging technology which has been recently developed for passively monitoring and tracking objects. Due to noise and the lack of knowledge about the number and the sizes of intruding objects, multi-object intrusion detection and localization is a challenging issue. This article proposes an extended VB-GMM (i.e. variational Bayesian Gaussian mixture model) algorithm in treating this problem. The extended VBGMM algorithm applies a Gaussian mixture model to model the changed radio attenuation in a monitored field due to the intrusion of an unknown number of objects, and uses a modified version of the variational Bayesian approach for model estimation. Real world data from both outdoor and indoor experiments (using the radio tomographic imaging technology) have been used to verify the high accuracy and the robustness of the proposed multi-object localization algorithm.

  • 13.
    Wang, Qinghua
    et al.
    Kristianstad University, School of Health and Society, Avdelningen för Design och datavetenskap. Aalto University, Finland.
    Yigitler, Huseyin
    Aalto University, Finland.
    Jäntti, Riku
    Aalto University, Finland.
    System monitoring and fault diagnosis in wireless sensor systems2012In: Aalto University Workshop on Wireless Sensor Systems, WoWSS 2012, 2012Conference paper (Refereed)
    Abstract [en]

    In this paper, we discuss fault diagnosis for wireless sensor systems. Fault diagnosis is only possible if comprehensive system monitoring is in place. We thus also present architecture for in-depth system monitoring.

1 - 13 of 13
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf