Thien Duc Nguyen

ORCID: 0000-0002-8889-0903
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Malware Detection Techniques
  • User Authentication and Security Systems
  • Privacy-Preserving Technologies in Data
  • Energy Harvesting in Wireless Networks
  • Network Security and Intrusion Detection
  • Adversarial Robustness in Machine Learning
  • Energy Efficient Wireless Sensor Networks
  • Internet Traffic Analysis and Secure E-voting
  • Wireless Body Area Networks
  • Cryptography and Data Security
  • Advanced Authentication Protocols Security
  • Bluetooth and Wireless Communication Technologies
  • IoT Networks and Protocols
  • Security and Verification in Computing
  • Wireless Power Transfer Systems
  • Mobile Ad Hoc Networks
  • Biometric Identification and Security
  • COVID-19 Digital Contact Tracing
  • Advanced MIMO Systems Optimization
  • Privacy, Security, and Data Protection
  • Innovative Energy Harvesting Technologies
  • Wireless Networks and Protocols
  • RFID technology advancements
  • Anomaly Detection Techniques and Applications
  • Cooperative Communication and Network Coding

Technical University of Darmstadt
2014-2024

KU Leuven
2020-2022

IMEC
2020-2022

University of Newcastle Australia
2015-2018

Ho Chi Minh City University of Technology
2010

IoT devices are increasingly deployed in daily life. Many of these are, however, vulnerable due to insecure design, implementation, and configuration. As a result, many networks already have that easy compromise. This has led new category malware specifically targeting devices. However, existing intrusion detection techniques not effective detecting compromised given the massive scale problem terms number different types manufacturers involved. In this paper, we present DÏoT, an autonomous...

10.1109/icdcs.2019.00080 article EN 2019-07-01

IoT devices are being widely deployed. But the huge variance among them in level of security and requirements for network resources makes it unfeasible to manage networks using a common generic policy. One solution this challenge is define policies classes based on device type. In paper, we present AuDI, system quickly effectively identifying type an by analyzing their communications. AuDI models periodic communication traffic unsupervised learning method perform identification. contrast...

10.1109/jsac.2019.2904364 article EN IEEE Journal on Selected Areas in Communications 2019-03-11

Federated Learning (FL) is an appealing method for applying machine learning to large scale systems due the privacy and efficiency advantages that its training mechanism provides.One important field FL deployment emerging IoT applications.In particular, has been recently used intrusion detection where clients, e.g., a home security gateway, monitors traffic data generated by devices in network, trains local model, send this model central entity, aggregator, who then computes global (using...

10.14722/diss.2020.23003 article EN 2020-01-01

Federated learning (FL) is an emerging distributed machine paradigm which addresses critical data privacy issues in by enabling clients, using aggregation server (aggregator), to jointly train a global model without revealing their training data. Thereby, it improves not only but also efficient as uses the computation power and of potentially millions clients for parallel. However, FL vulnerable so-called inference attacks malicious aggregators can infer information about clients' from...

10.1109/spw53761.2021.00017 article EN 2021-05-01

Federated Learning (FL) allows multiple clients to collaboratively train a Neural Network (NN) model on their private data without revealing the data. Recently, several targeted poisoning attacks against FL have been introduced. These inject backdoor into resulting that adversary-controlled inputs be misclassified. Existing countermeasures are inefficient and often merely aim exclude deviating models from aggregation. However, this approach also removes benign of with distributions, causing...

10.14722/ndss.2022.23156 preprint EN 2022-01-01

Solutions for pairing devices without prior security associations typically require users to actively take part in the process of devices. Scenarios involving new types like Internet-of-Things (IoT) appliances and wearable make it, however, desirable be able pair users' personal user involvement. In this paper, we present a approach secure zero-interaction suitable IoT

10.1145/2660267.2660334 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2014-11-03

Energy harvesting (EH) is considered the key enabling technology for mass deployment of Internet-of-Things (IoT) devices. Efficient EH techniques eliminate needs frequent energy source replacement, thus offering a near perpetual network operating environment. Advances in have shifted design paradigm routing protocols energy-harvesting wireless sensor based IoT applications from "energy-aware" to "energy-harvesting-aware". This paper aims an energy-harvesting-aware protocol heterogeneous...

10.1109/tgcn.2018.2839593 article EN IEEE Transactions on Green Communications and Networking 2018-05-22

Google and Apple have jointly provided an API for exposure notification in order to implement decentralized contract tracing apps using Bluetooth Low Energy, the so-called "Google/Apple Proposal", which we abbreviate by "GAP". We demonstrate that real-world scenarios current GAP design is vulnerable (i) profiling possibly de-anonymizing infected persons, (ii) relay-based wormhole attacks basically can generate fake contacts with potential of affecting accuracy app-based contact system. For...

10.1109/trustcom50675.2020.00069 article EN 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) 2020-12-01

With the increasing demand of IoT (Internet Things) applications, for energy efficiency (EE) and quality-of-service (QoS) in networks is on rise. In networks, EE QoS requirements are contradictory where maintaining higher difficult when high required. This paper aims to propose an adaptive MAC protocol which maintains IEEE 802.15.4 standard-based network. To this end, we introduce a new algorithm, referred as RF-AASP, that dynamically adjust sleeping period order sensor nodes harvest RF from...

10.1109/glocom.2016.7841577 article EN 2015 IEEE Global Communications Conference (GLOBECOM) 2016-12-01

Energy harvesting (EH) is considered to be the key enabling technology for mass deployment of wireless sensor networks (WSNs) Internet Things (IoT) applications. Efficient EH techniques could remove needs frequent energy source replacement, thus offering a near perpetual network operating environment. Advances in have shifted design routing protocols EH-WSN from `energy-aware' `energy-harvesting-aware'. This paper aims energy-harvesting-aware heterogeneous WSN-based IoT applications presence...

10.1109/icc.2017.7996888 article EN 2017-05-01

The emergence of IoT poses new challenges towards solutions for authenticating numerous very heterogeneous devices to their respective trust domains. Using passwords or pre-defined keys have drawbacks that limit use in scenarios. Recent works propose contextual information about ambient physical properties devices' surroundings as a shared secret mutually authenticate are co-located, e.g., the same room. In this paper, we analyze these context-based authentication with regard security and...

10.1145/3195970.3196106 article EN 2018-06-19

In the recent years, new services and businesses leveraging location-based (LBS) are rapidly emerging. On other hand this has raised incentive of users to cheat about their locations service providers for personal benefits. Context-based proofs-of-presence (PoPs) have been proposed as a means enable verification users' location claims. However, we show in paper, they vulnerable context guessing attacks. To make PoPs resilient malicious provers propose two complementary approaches making...

10.1145/2714576.2714634 article EN 2015-04-03

This paper addresses two of the most critical challenges in today's wireless sensor network (WSN)-based Internet Things (IoT) applications: self-sustainable operability and matching between harvested energy data transmission demands from nodes. To this end, we propose a radio frequency (RF) harvesting algorithm that optimizes period order for nodes to harvest downlink physical channels LTE eNodeB (i.e., PBCH PDCCH). The proposed adapts accordance stochastic characteristics traffic load IoT...

10.1109/glocom.2017.8253962 article EN GLOBECOM 2022 - 2022 IEEE Global Communications Conference 2017-12-01

Low-power wide-area networks enable large-scale deployments of low-power wireless devices. LoRaWAN is a long-range technology that has emerged as and low data rate solution to support Internet Things applications. Although provides cost-efficient networking solution, recent literature shows it performs poorly in terms reliability security dense due the uncoordinated (ALOHA-based) nature MAC (medium access control) protocol. Furthermore, not robust against selective jamming attacks. This...

10.1145/3557048 article EN ACM Transactions on Internet of Things 2022-09-16

With the increasing deployment of wireless sensor networks (WSNs), demand for energy efficiency (EE) and Quality Service (QoS) guarantee such is on rise. In a distributed WSN, EE could be directly related to operational expenditure (OPEX) due frequent replacement batteries. An helps prolong network lifetime. Energy in WSN can improved by optimising PHY MAC layer algorithms. this paper, we introduce an adaptive algorithm, known as ABSD that changes parameters IEEE 802.15.4 nodes response...

10.1109/pimrc.2015.7343491 article EN 2015-08-01

This paper develops power allocation schemes to manage the signal interference in a multiuser multicell network, where full-duplex transceivers are implemented at all base stations (BSs) and user equipment units (UEs). Beside acute intracell intercell interferences, significant residual self-interference receivers is limiting factor for any network performance enhancement. To help control such severe we propose associate each bidirectional link with net utility function, which consists of...

10.1109/icc.2015.7248605 article EN 2015-06-01

The emergence of IoT poses new challenges towards solutions for authenticating numerous very heterogeneous devices to their respective trust domains. Using passwords or pre-defined keys have drawbacks that limit use in scenarios. Recent works propose contextual information about ambient physical properties devices' surroundings as a shared secret mutually authenticate are co-located, e.g., the same room. In this paper, we analyze these context-based authentication with regard security and...

10.1109/dac.2018.8465788 article EN 2018 55th ACM/ESDA/IEEE Design Automation Conference (DAC) 2018-06-01

IoT devices are increasingly deployed in daily life. Many of these are, however, vulnerable due to insecure design, implementation, and configuration. As a result, many networks already have that easy compromise. This has led new category malware specifically targeting devices. However, existing intrusion detection techniques not effective detecting compromised given the massive scale problem terms number different types manufacturers involved. In this paper, we present D\"IoT, an autonomous...

10.48550/arxiv.1804.07474 preprint EN other-oa arXiv (Cornell University) 2018-01-01

Copresence verification based on context can improve usability and strengthen security of many authentication access control systems. By sensing comparing their surroundings, two or more devices tell whether they are copresent use this information to make decisions. To the best our knowledge, all context-based copresence mechanisms date susceptible context-manipulation attacks. In such attacks, a distributed adversary replicates same at (different) locations victim devices, induces them...

10.1109/percom.2019.8767404 article EN 2019-03-01
Coming Soon ...