Daniel Gerbi Duguma

ORCID: 0000-0002-7121-4204
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Authentication Protocols Security
  • User Authentication and Security Systems
  • Wireless Body Area Networks
  • ECG Monitoring and Analysis
  • Security in Wireless Sensor Networks
  • Blockchain Technology Applications and Security
  • IoT and Edge/Fog Computing
  • Advanced Malware Detection Techniques
  • Privacy, Security, and Data Protection
  • UAV Applications and Optimization
  • Advanced MIMO Systems Optimization
  • Wireless Networks and Protocols
  • FinTech, Crowdfunding, Digital Finance
  • Privacy-Preserving Technologies in Data
  • Smart Grid Energy Management
  • IPv6, Mobility, Handover, Networks, Security
  • Artificial Intelligence in Healthcare
  • Internet Traffic Analysis and Secure E-voting
  • Diabetes Management and Research
  • COVID-19 diagnosis using AI
  • RFID technology advancements
  • Vehicular Ad Hoc Networks (VANETs)
  • Advanced Wireless Communication Technologies
  • Software-Defined Networks and 5G
  • Cloud Data Security Solutions

Soonchunhyang University
2019-2022

Unmanned Aerial Vehicle (UAV) plays a paramount role in various fields, such as military, aerospace, reconnaissance, agriculture, and many more. The development implementation of these devices have become vital terms usability reachability. Unfortunately, they widespread their demand grows, are becoming more vulnerable to several security attacks, including, but not limited to, jamming, information leakage, spoofing. In order cope with attacks threats, proper design robust protocols is...

10.3390/s21062057 article EN cc-by Sensors 2021-03-15

The Internet of Medical Things (IoMT) has risen to prominence as a possible backbone in the health sector, with ability improve quality life by broadening user experience while enabling crucial solutions such near real-time remote diagnostics. However, privacy and security problems remain largely unresolved safety area. Various rule-based methods have been considered recognize aberrant behaviors IoMT demonstrated high accuracy misbehavior detection appropriate for lightweight IoT devices....

10.1109/jbhi.2022.3187037 article EN IEEE Journal of Biomedical and Health Informatics 2022-06-28

Advances of implantable medical devices (IMD) are transforming the traditional method providing treatment, especially those patients under most challenging condition. Accordingly, IMD-enabled artificial pancreas system (APS) has now reached global market. It helped many suffering from chronic disease, called diabetes mellitus, in monitoring and maintaining blood glucose level conveniently. However, this advancement is accompanied by various security threats that place life at risk. Hence,...

10.1109/jbhi.2021.3063173 article EN IEEE Journal of Biomedical and Health Informatics 2021-03-02

Cellular technology has evolved over the decades for mobile network operators to accommodate ever-growing demands of services connecting Vehicle-to-Everything (V2X). The 5G infrastructure facilitates V2X communications, where a small-cell base station operating at ultra-high radio frequency with limited coverage becomes pervasive. These stations in 5G-V2X must be strategically deployed near consumers realize several use cases. More recently, architectural split solutions Next Generation...

10.1109/access.2021.3107308 article EN cc-by IEEE Access 2021-01-01

5G-assisted device-to-device (D2D) communication plays an instrumental role in minimizing latency, maximizing resource utilization, improving speed, and boosting system capacity. However, the technology confronts several challenges to realize its enormous potential fully. Security privacy concerns are at top of list that can jeopardize regular operation D2D by executing various assaults such as free-riding impersonation. Although researchers suggested different solutions these concerns, most...

10.1080/09540091.2021.2002812 article EN cc-by Connection Science 2021-11-30

Abstract 5G has introduced various emerging demands for new services and technologies that raised the bar quality of service, latency, handovers, data rates. Such diverse perplexing network requirements bring numerous issues, among which security stands in first row. The backhaul, can be implemented as a wired or wireless solution, serves bridge between radio access core networks assuring connectivity to end users. recent trends backhaul usage rely on using point-to-point (PTP)...

10.1186/s13638-019-1592-0 article EN cc-by EURASIP Journal on Wireless Communications and Networking 2019-12-01

Most existing conventional security mechanisms are insufficient, mainly attributable to their requirements for heavy processing capacity, large protocol message size, and longer round trips, resource-intensive devices operating in an Internet of Things (IoT) context. These necessitate efficient communication protocols that cognizant the severe resource restrictions regarding energy, computation, communication, storage. To realize this, IETF (Internet Engineering Task Force) is currently...

10.1155/2021/7314508 article EN cc-by Mobile Information Systems 2021-09-13

The continuous improvements in network softwarization and cloudification have enabled the realization of many applications. One significant result from this is harmonized amalgamation NFV, SDN, Cloud Computing to bring telco clouds that efficiently operate a 5G network. Although these building blocks revolutionized telecom sector various ways, they are vulnerable multiple security issues. Moreover, absence generic architecture another challenge hinders effective adoption technology....

10.23919/wac50355.2021.9559450 article EN 2022 World Automation Congress (WAC) 2021-08-01

Implantable Medical Devices (IMDs) play a very critical role in both medical and non-medical fields. Hence, protecting the security privacy of these devices is among highest priorities, as failing to do so would jeopardize life patient. One way maintaining safety IMDs design an authentication protocol between external devices. With this regard, although several schemes exist, significant number protocols did not include formal verification prove their secrecy against known attacks. such...

10.1145/3440943.3444735 article EN 2020-12-12

Implantable Medical Devices (IMDs) have evolved over the years to stretch their application areas provide a range of services from health-care public safety. In order handle such information, high strength security and proper authentication are required. For this, Ellouze et al. proposed an protocol for IMDs in 2013. The IMD that they propose mention is reasonable, but some aspects expected be vulnerable attack. addition, not only schemes need secured, should also formally verified against...

10.1145/3440943.3444733 article EN 2020-12-12

Network operators are attempting many innovations and changes in 5G using self-organizing networks (SON). The SON operates on the measurement reports (MR), which obtained from user equipment (UE) secured against malware userspace programs. However, synchronization signal block that UE relies to measure wireless environment configured by a base station is not authenticated. As result, will likely gauge wrong false (FBS) transmit corresponding MR serving station, poisons data used for SONs....

10.32604/csse.2023.032044 article EN cc-by Computer Systems Science and Engineering 2022-11-03

The need for continuous monitoring of physiological information critical organs the human body, combined with ever-growing field electronics and sensor technologies vast opportunities brought by 5G connectivity, have made implantable medical devices (IMDs) most necessitated in health arena. IMDs are very sensitive since they implanted patients depend on them proper functioning their vital organs. Simultaneously, intrinsically vulnerable to several attacks mainly due resource limitations...

10.3390/s21248383 article EN cc-by Sensors 2021-12-15

This manuscript aims to formalize and conclude the discussions initiated during PriTEM workshop 22-23 March 2023. We present important ideas discussion topics in context of transactive energy systems. Moreover, conclusions from articulate potential aspects be explored future studies on management. Particularly, these cover research technology informatics, law, data market socio-psychology that are relevant seamless integration renewable resources systems-in smart microgrids-focusing...

10.48550/arxiv.2312.11564 preprint EN cc-by-nc-nd arXiv (Cornell University) 2023-01-01
Coming Soon ...