Habtamu Abie

ORCID: 0000-0003-0866-5050
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • IoT and Edge/Fog Computing
  • Information and Cyber Security
  • Network Security and Intrusion Detection
  • Smart Grid Security and Resilience
  • Advanced Malware Detection Techniques
  • Digital Rights Management and Security
  • Advanced Software Engineering Methodologies
  • Distributed systems and fault tolerance
  • Digital and Cyber Forensics
  • Blockchain Technology Applications and Security
  • Opportunistic and Delay-Tolerant Networks
  • Privacy, Security, and Data Protection
  • Copyright and Intellectual Property
  • Service-Oriented Architecture and Web Services
  • Software Reliability and Analysis Research
  • Digital Transformation in Industry
  • Access Control and Trust
  • Security and Verification in Computing
  • Wireless Body Area Networks
  • Anomaly Detection Techniques and Applications
  • Advanced Steganography and Watermarking Techniques
  • Distributed and Parallel Computing Systems
  • Digital and Traditional Archives Management
  • Privacy-Preserving Technologies in Data
  • Peer-to-Peer Network Technologies

Norwegian Computing Center
2014-2024

Debre Tabor University
2022

657 Oslo
2021

European Organization for Nuclear Research
1994

Emerging Internet of Things (IoTs) technologies provide many benefits to the improvement eHealth. The successful deployment IoTs depends on ensuring security and privacy that need adapt their processing capabilities resource use. are vulnerable attacks since communications ar

10.4108/icst.bodynets.2012.250235 article EN 2012-01-01

Emerging Internet of Things (IoTs) technologies provide many benefits to the improvement eHealth. The successful deployment IoTs depends on ensuring security and privacy that need adapt their processing capabilities resource use. are vulnerable attacks since communications mostly wireless, unattended things usually physical attacks, most IoT components constrained by energy, communications, computation necessary for implementation complex security-supporting schemes. This paper describes a...

10.5555/2442691.2442752 article EN International Conference on Body Area Networks 2012-02-24

The Internet of Things (IoT) is enabling the deployment distributed applications based on ubiquitous computing and convergent networks. Due to its heterogeneous structure, it introduces new security challenges requirements. Particularly, mechanisms implemented in IoT should adapt dynamic context. This paper proposes a game-based model for adaptive IoT, with an emphasis eHealth applications. We use trade-off between security-effectiveness energy-efficiency evaluate strategies. also present...

10.1109/icc.2014.6883437 preprint EN 2014-06-01

Cyber Physical Systems (CPS)-Internet of Things (IoT) enabled healthcare services and infrastructures improve human life, but are vulnerable to a variety emerging cyber-attacks. Cybersecurity specialists finding it hard keep pace the increasingly sophisticated attack methods. There is critical need for innovative cognitive cybersecurity CPS-IoT ecosystem. This paper presents framework simulating behaviour anticipate respond new privacy threats infrastructure systems. It includes...

10.1109/ismict.2019.8743670 article EN 2019-05-01

Health care is one of the primary beneficiaries technological revolution created by Internet Things (IoT). In implementation health with IoT, wireless body area network (WBAN) a suitable communication tool. That being case security has been major concerns to efficiently utilize services WBAN. The diverse nature technologies involved in WBAN, broadcast networks, and existence resource constrained devices are main challenges implement heavy protocols for this paper we develop risk-based...

10.1145/3129790.3129801 article EN 2017-09-08

In recent years, the cybersecurity attacks on internet of things (IoT)-based healthcare systems became major concern for researchers and health organizations. With time, sophistication these is increasing. Therefore, service providers must implement efficient security mechanisms carefully while taking advantages connected devices without compromising patient safety disturbing real-time services. A digital twin (DT) a virtual representation counterpart physical world. DT offers significant to...

10.1109/vtc2022-spring54318.2022.9860581 article EN 2022 IEEE 95th Vehicular Technology Conference: (VTC2022-Spring) 2022-06-01

E-health applications utilizing IoT (Internet of Things) technologies hold a significant promise: biomedical sensor networks and the appropriate interpretation data originating from them enable better self-care chronic diseases, thus are potential to imply remarkable savings in nationa

10.4108/icst.bodynets.2012.250241 article EN 2012-01-01

Wireless Body Area Sensor Networks (WBASNs) are networks of low-power sensing objects that collect and send vital signs a patient using low-rate communication media. They have been originally created to improve the efficiency e-health applications they constitute now an important part Internet Things (IoT) by bringing humans into IoTs. The ASSET (Adaptive Security for Smart in eHealth) project [1] develops risk-based adaptive security methods mechanisms IoT eHealth. requires real-life...

10.1145/2523501.2523506 article EN 2013-09-08

The amount of government information is huge and relies mostly on traditional systems, inaccessible to citizens often departments. In today's digital era, most this content can be more intelligently processed integrated within e-government. the world future, where ambient intelligence e-governments are a reality, will interact with available services in all areas their lives; situation that presents new challenges area Digital Rights Management (DRM). Taking into account nature needs...

10.1504/eg.2004.004134 article EN Electronic Government an International Journal 2004-01-01

E-health applications utilizing IoT (Internet of Things) technologies hold a significant promise: biomedical sensor networks and the appropriate interpretation data originating from them enable better self-care chronic diseases, thus are potential to imply remarkable savings in national healthcare budgets. However, security is major concern these due varying use context, changing threats high privacy confidentiality requirements data. Novel adaptive management solutions, based on...

10.5555/2442691.2442753 article EN International Conference on Body Area Networks 2012-02-24

Emerging E-health applications utilizing IoT (Internet of Things) solutions should be sufficiently secure and robust. Adaptive security management techniques enable maintenance sufficient level during changing context, threats usage scenarios. Systematic adaptive is based on metrics. We analyze objective decomposition strategies for an application. These development meaningful need metrics to able adapt the relevant parameters according contextual threat changes, which are typical...

10.1145/2523501.2523507 article EN 2013-09-08

This paper integrates run-time verification enablers in the feedback adaptation loop of ASSET adaptive security framework for Internet Things (IoT) eHealth settings and instantiates resulting with Colored Petri Nets. The make machine-readable formal models a system state context available at run-time. In addition, they requirements that define objectives as specifications enable dynamic monitoring adaptation. Run-time behavior deviates from normal mode operation represents major threat to...

10.1145/2642803.2642807 article EN 2014-08-21

With the increase in society's dependence on IT communication systems, need for dependable, trustable, robust and secure adaptive systems becomes ever more acute. Modern autonomic message-oriented middleware platforms have stringent requirements self-healing, adapting, evolving, fault-tolerance, security active vulnerability assessment, especially when internal working model of a system environmental influences are uncertain during run-time. In this paper we present an evolving (AES), trust...

10.1109/mobhoc.2009.5336915 article EN 2009-10-01

The lack of appropriate information security solutions in software intensive systems can have serious consequences for businesses and the stakeholders. Carefully designed metrics be used to offer evidence behavior system under development or operation. This study investigates holistic a distributed messaging based on threat analysis, requirements, decomposition use case information. Our approach is thus requirement centric. highlevel requirements are expressed terms lower level measurable...

10.1109/securware.2009.26 article EN 2009-01-01

Security and privacy for e-health Internet-of-Things applications is a challenge arising due to the novelty openness of solutions. We analyze security risks an envisioned application elderly persons' day-to-day support chronic disease self-care, from perspectives service provider end-user. In addition, we propose initial heuristics objective decomposition aimed at metrics definition. Systematically defined managed enable higher effectiveness controls, enabling informed risk-driven decision-making.

10.1109/issa.2015.7335061 article EN 2015-08-01

Connecting people, processes, devices and data, the Internet of Things brings new security challenges may significantly increase vulnerability healthcare services. This paper investigates advanced adaptive to anticipate respond dynamic attacks on critical infrastructures. We propose Adaptive Cybersecurity Framework that supports adaptation cyber threats. Further, we simulate evaluate framework using evolutionary game theory, outline further steps for our future work.

10.1109/ismict.2019.8743905 article EN 2019-05-01

Abstract: Recent trends in global networks are leading toward service‐oriented architectures and sensor networks. On one hand of the spectrum, this means deployment services from numerous providers to form new service composites, on other emergence Internet things. Both these kinds belong a plethora realms can be deployed many ways, which will pose serious problems cases abuse. Consequently, both increase need for approaches digital forensics that would furnish admissible evidence...

10.1111/j.1556-4029.2010.01528.x article EN Journal of Forensic Sciences 2010-08-23

The Internet of Things (IoT) was initially proposed to connect specific things via the using devices, such as RFID readers, realise intelligent identification and management. This vision has since expanded include a more diverse range services networks become an anything, anywhere, connected, anyhow. Security privacy management for IoT remains core challenge.

10.1145/2494091.2499770 article EN 2013-09-08

This paper presents a methodology for assessing security, privacy and dependability (SPD) of embedded systems.The methodology, developed through the European collaboration SHIELD, is applied smart grid network as deployed in South Norway.Three Smart Grid use cases are analysed detail, being billing, home control alarm.The SHIELD uses Multi-Metrics approach to evaluate system SPD level during running processes compares it with case goals S, P, D. The simplicity, applicability, scalability...

10.13052/jcsm2245-1439.342 article EN Journal of Cyber Security and Mobility 2015-01-01
Coming Soon ...