hkr.sePublications
Change search
Refine search result
1 - 9 of 9
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 1.
    Huang, Xin
    et al.
    Department of Computer Science, Institute for the Future of Computing/Oxford Martin School, University of Oxford.
    Chen, Bangdao
    Department of Computer Science, University of Oxford.
    Markham, Andrew
    Department of Computer Science, Institute for the Future of Computing/Oxford Martin School, University of Oxford.
    Wang, Qinghua
    Kristianstad University, School of Health and Society, Avdelningen för Design och datavetenskap. Department of Communications and Networking, Aalto University, Espoo.
    Zheng, Yan
    Department of Communications and Networking, Aalto University, Espoo.
    Roscoe, Andrew William
    Department of Computer Science, Institute for the Future of Computing/Oxford Martin School, University of Oxford.
    Human interactive secure key and ID exchange protocols in body sensor networks2013In: IET Information Security, ISSN 1751-8709, E-ISSN 1751-8717, Vol. 7, no 1, p. 30-38Article in journal (Refereed)
    Abstract [en]

    A body sensor network (BSN) is typically a wearable wireless sensor network. Security protection is critical to BSNs, since they collect sensitive personal information. Generally speaking, security protection of BSN relies on identity (ID) and key distribution protocols. Most existing protocols are designed to run in general wireless sensor networks, and are not suitable for BSNs. After carefully examining the characteristics of BSNs, the authors propose human interactive empirical channel-based security protocols, which include an elliptic curve Diffie–Hellman version of symmetric hash commitment before knowledge protocol and an elliptic curve Diffie–Hellman version of hash commitment before knowledge protocol. Using these protocols, dynamically distributing keys and IDs become possible. As opposite to present solutions, these protocols do not need any pre-deployment of keys or secrets. Therefore compromised and expired keys or IDs can be easily changed. These protocols exploit human users as temporary trusted third parties. The authors, thus, show that the human interactive channels can help them to design secure BSNs.

  • 2.
    Huang, Xin
    et al.
    Kina.
    Craig, Paul
    Kina.
    Wang, Qinghua
    Kristianstad University, School of Health and Society, Avdelningen för Design och datavetenskap.
    Identity-based association protocols for wireless personal area networks2015In: Proceedings of The 13th IEEE International Conference on Dependable, Autonomic, and Secure Computing, IEEE conference proceedings, 2015Conference paper (Refereed)
    Abstract [en]

    Identity based infrastructure allows the public keyof a user to be derived easily from a predefined aspect of theirknown identity such as a phone number, passport number orother universally unique identifier. Recently, H¨olbl and Welzerhave proposed an identity-based key establishment protocol.However, this protocol is found to be vulnerable to man-inthe-middle attacks and impersonation attacks. In this paper,we propose multi-channel identity based protocols for wirelesspersonal area networks which can eliminate these attacks.These protocols alleviate the certificate overhead by using apublic key infrastructure which is suitable for wireless personalarea networks.

  • 3.
    Wang, Qinghua
    Kristianstad University, School of Health and Society, Avdelningen för Design och datavetenskap.
    A practice of using research seminars in teaching advanced students2014Conference paper (Refereed)
    Abstract [en]

    Research seminar, as a teaching form, is excellent in helping students achieve active learning. This work presents the author's experience on the using of research seminars at Kristianstad University.

  • 4.
    Wang, Qinghua
    Kristianstad University, School of Health and Society, Avdelningen för Design och datavetenskap.
    Kvalitetssäkring i högre utbildning2016In: Lärarlärdom 2016: Högskolan Kristianstad / [ed] Claes Dahlqvist & Stefan Larsson, Högskolan Kristianstad: Kristianstad University Press , 2016Conference paper (Other academic)
    Abstract [sv]

    Kvalitetssäkring är ganska viktigt i högre utbildning. Som den sista kursen i ett utbildningsprogram, självständig examensarbete har en tung roll. I de flesta lärosäten, har ett examensarbete en handledare och en examinator. Examinatorn bestämmer vilket betyg ett arbete ska få eller om det ska bli underkänd. Jag har upptäckt två problem i systemet: 1. Bedömning från en individuell examinator är subjektiv och detta har flera konsekvenser, bl.a. icke-förtroendefulla relationer mellan lärare och elev, orättvisa för studenter, och även ojämna kvalité hos universiteten och högskolor; 2. Handledare och examinatorer får en schablon resurstilldelning för varje student och faktiskt blir straffad när en student blir underkänd.

    Medan det första problemet är en allmän fråga, det andra kan vara ett specialfall för oss. Båda problemen undergräver kvalitetssäkringssystemet. Diskussioner här gäller att hitta en lösning till problemen. Bland annat, peer-review, grupp examinering, och arbetsbelastning baserad resursfördelning ska diskuteras.

  • 5.
    Wang, Qinghua
    Kristianstad University, Faculty of Natural Science, Avdelningen för datavetenskap.
    Lightweight session: key establishment for the internet of things2018Conference paper (Refereed)
  • 6.
    Wang, Qinghua
    Kristianstad University, School of Health and Society, Avdelningen för Design och datavetenskap.
    Using secret spreading codes to enhance physical layer security in wireless communication2017In: ICC 2017: 3rd International Workshop on Advanced PHY and MAC Technology for Super Dense Wireless Networks, 2017Conference paper (Refereed)
    Abstract [en]

    The broadcast nature of wireless communication make it intrinsically vulnerable to jamming and eavesdropping attacks. Spread-spectrum techniques spread narrowband signals over a wide bandwidth, and provide good resistance to noise and jamming attacks. However, spread-spectrum signals can still be intercepted if their used spreading codes are known. To tackle this issue, this paper proposes a lightweight design on generating secret spreading codes. A secret spreading code has all the desired properties of an ordinary spreading code, plus its unpredictability. Our method on generating secret spreading codes is shown to be resistant to cryptanalysis, and has little requirement on memory and computing resources.

  • 7.
    Wang, Qinghua
    et al.
    Kristianstad University, Faculty of Natural Science, Avdelningen för datavetenskap.
    Huang, Xin
    England.
    Mengistu, Dawit
    Kristianstad University, Faculty of Natural Science, Avdelningen för datavetenskap. dawit.mengistu@hkr.se .
    Session key agreement for end-to-end security in time-synchronized networks2018Conference paper (Other academic)
  • 8.
    Wang, Qinghua
    et al.
    Kristianstad University, School of Health and Society, Avdelningen för Design och datavetenskap.
    Yigitler, Huseyin
    Finland.
    Huang, Xin
    Kina.
    Jäntti, Riku
    Finland.
    Localizing multiple objects using radio tomographic imaging technology2016In: IEEE Transactions on Vehicular Technology, ISSN 0018-9545, E-ISSN 1939-9359, Vol. 65, no 5, p. 3641-3656Article in journal (Refereed)
    Abstract [en]

    Low data rate wireless networks can be deployed for physical intrusion detection and localization purposes. The intrusion of a physical object (or human) will disrupt the radio frequency magnetic field, and can be detected by observing the change of radio attenuation. This gives the basis for the radio tomographic imaging technology which has been recently developed for passively monitoring and tracking objects. Due to noise and the lack of knowledge about the number and the sizes of intruding objects, multi-object intrusion detection and localization is a challenging issue. This article proposes an extended VB-GMM (i.e. variational Bayesian Gaussian mixture model) algorithm in treating this problem. The extended VBGMM algorithm applies a Gaussian mixture model to model the changed radio attenuation in a monitored field due to the intrusion of an unknown number of objects, and uses a modified version of the variational Bayesian approach for model estimation. Real world data from both outdoor and indoor experiments (using the radio tomographic imaging technology) have been used to verify the high accuracy and the robustness of the proposed multi-object localization algorithm.

  • 9.
    Wang, Qinghua
    et al.
    Kristianstad University, School of Health and Society, Avdelningen för Design och datavetenskap. Aalto University, Finland.
    Yigitler, Huseyin
    Aalto University, Finland.
    Jäntti, Riku
    Aalto University, Finland.
    System monitoring and fault diagnosis in wireless sensor systems2012In: Aalto University Workshop on Wireless Sensor Systems, WoWSS 2012, 2012Conference paper (Refereed)
    Abstract [en]

    In this paper, we discuss fault diagnosis for wireless sensor systems. Fault diagnosis is only possible if comprehensive system monitoring is in place. We thus also present architecture for in-depth system monitoring.

1 - 9 of 9
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf