- IoT and Edge/Fog Computing
- Information and Cyber Security
- Network Security and Intrusion Detection
- Smart Grid Security and Resilience
- Advanced Malware Detection Techniques
- Digital Rights Management and Security
- Advanced Software Engineering Methodologies
- Distributed systems and fault tolerance
- Digital and Cyber Forensics
- Blockchain Technology Applications and Security
- Opportunistic and Delay-Tolerant Networks
- Privacy, Security, and Data Protection
- Copyright and Intellectual Property
- Service-Oriented Architecture and Web Services
- Software Reliability and Analysis Research
- Digital Transformation in Industry
- Access Control and Trust
- Security and Verification in Computing
- Wireless Body Area Networks
- Anomaly Detection Techniques and Applications
- Advanced Steganography and Watermarking Techniques
- Distributed and Parallel Computing Systems
- Digital and Traditional Archives Management
- Privacy-Preserving Technologies in Data
- Peer-to-Peer Network Technologies
Norwegian Computing Center
2014-2024
Debre Tabor University
2022
657 Oslo
2021
European Organization for Nuclear Research
1994
Emerging Internet of Things (IoTs) technologies provide many benefits to the improvement eHealth. The successful deployment IoTs depends on ensuring security and privacy that need adapt their processing capabilities resource use. are vulnerable attacks since communications ar
Emerging Internet of Things (IoTs) technologies provide many benefits to the improvement eHealth. The successful deployment IoTs depends on ensuring security and privacy that need adapt their processing capabilities resource use. are vulnerable attacks since communications mostly wireless, unattended things usually physical attacks, most IoT components constrained by energy, communications, computation necessary for implementation complex security-supporting schemes. This paper describes a...
The Internet of Things (IoT) is enabling the deployment distributed applications based on ubiquitous computing and convergent networks. Due to its heterogeneous structure, it introduces new security challenges requirements. Particularly, mechanisms implemented in IoT should adapt dynamic context. This paper proposes a game-based model for adaptive IoT, with an emphasis eHealth applications. We use trade-off between security-effectiveness energy-efficiency evaluate strategies. also present...
Cyber Physical Systems (CPS)-Internet of Things (IoT) enabled healthcare services and infrastructures improve human life, but are vulnerable to a variety emerging cyber-attacks. Cybersecurity specialists finding it hard keep pace the increasingly sophisticated attack methods. There is critical need for innovative cognitive cybersecurity CPS-IoT ecosystem. This paper presents framework simulating behaviour anticipate respond new privacy threats infrastructure systems. It includes...
Health care is one of the primary beneficiaries technological revolution created by Internet Things (IoT). In implementation health with IoT, wireless body area network (WBAN) a suitable communication tool. That being case security has been major concerns to efficiently utilize services WBAN. The diverse nature technologies involved in WBAN, broadcast networks, and existence resource constrained devices are main challenges implement heavy protocols for this paper we develop risk-based...
In recent years, the cybersecurity attacks on internet of things (IoT)-based healthcare systems became major concern for researchers and health organizations. With time, sophistication these is increasing. Therefore, service providers must implement efficient security mechanisms carefully while taking advantages connected devices without compromising patient safety disturbing real-time services. A digital twin (DT) a virtual representation counterpart physical world. DT offers significant to...
E-health applications utilizing IoT (Internet of Things) technologies hold a significant promise: biomedical sensor networks and the appropriate interpretation data originating from them enable better self-care chronic diseases, thus are potential to imply remarkable savings in nationa
Wireless Body Area Sensor Networks (WBASNs) are networks of low-power sensing objects that collect and send vital signs a patient using low-rate communication media. They have been originally created to improve the efficiency e-health applications they constitute now an important part Internet Things (IoT) by bringing humans into IoTs. The ASSET (Adaptive Security for Smart in eHealth) project [1] develops risk-based adaptive security methods mechanisms IoT eHealth. requires real-life...
The amount of government information is huge and relies mostly on traditional systems, inaccessible to citizens often departments. In today's digital era, most this content can be more intelligently processed integrated within e-government. the world future, where ambient intelligence e-governments are a reality, will interact with available services in all areas their lives; situation that presents new challenges area Digital Rights Management (DRM). Taking into account nature needs...
E-health applications utilizing IoT (Internet of Things) technologies hold a significant promise: biomedical sensor networks and the appropriate interpretation data originating from them enable better self-care chronic diseases, thus are potential to imply remarkable savings in national healthcare budgets. However, security is major concern these due varying use context, changing threats high privacy confidentiality requirements data. Novel adaptive management solutions, based on...
Emerging E-health applications utilizing IoT (Internet of Things) solutions should be sufficiently secure and robust. Adaptive security management techniques enable maintenance sufficient level during changing context, threats usage scenarios. Systematic adaptive is based on metrics. We analyze objective decomposition strategies for an application. These development meaningful need metrics to able adapt the relevant parameters according contextual threat changes, which are typical...
This paper integrates run-time verification enablers in the feedback adaptation loop of ASSET adaptive security framework for Internet Things (IoT) eHealth settings and instantiates resulting with Colored Petri Nets. The make machine-readable formal models a system state context available at run-time. In addition, they requirements that define objectives as specifications enable dynamic monitoring adaptation. Run-time behavior deviates from normal mode operation represents major threat to...
With the increase in society's dependence on IT communication systems, need for dependable, trustable, robust and secure adaptive systems becomes ever more acute. Modern autonomic message-oriented middleware platforms have stringent requirements self-healing, adapting, evolving, fault-tolerance, security active vulnerability assessment, especially when internal working model of a system environmental influences are uncertain during run-time. In this paper we present an evolving (AES), trust...
The lack of appropriate information security solutions in software intensive systems can have serious consequences for businesses and the stakeholders. Carefully designed metrics be used to offer evidence behavior system under development or operation. This study investigates holistic a distributed messaging based on threat analysis, requirements, decomposition use case information. Our approach is thus requirement centric. highlevel requirements are expressed terms lower level measurable...
Security and privacy for e-health Internet-of-Things applications is a challenge arising due to the novelty openness of solutions. We analyze security risks an envisioned application elderly persons' day-to-day support chronic disease self-care, from perspectives service provider end-user. In addition, we propose initial heuristics objective decomposition aimed at metrics definition. Systematically defined managed enable higher effectiveness controls, enabling informed risk-driven decision-making.
Connecting people, processes, devices and data, the Internet of Things brings new security challenges may significantly increase vulnerability healthcare services. This paper investigates advanced adaptive to anticipate respond dynamic attacks on critical infrastructures. We propose Adaptive Cybersecurity Framework that supports adaptation cyber threats. Further, we simulate evaluate framework using evolutionary game theory, outline further steps for our future work.
Abstract: Recent trends in global networks are leading toward service‐oriented architectures and sensor networks. On one hand of the spectrum, this means deployment services from numerous providers to form new service composites, on other emergence Internet things. Both these kinds belong a plethora realms can be deployed many ways, which will pose serious problems cases abuse. Consequently, both increase need for approaches digital forensics that would furnish admissible evidence...
The Internet of Things (IoT) was initially proposed to connect specific things via the using devices, such as RFID readers, realise intelligent identification and management. This vision has since expanded include a more diverse range services networks become an anything, anywhere, connected, anyhow. Security privacy management for IoT remains core challenge.
This paper presents a methodology for assessing security, privacy and dependability (SPD) of embedded systems.The methodology, developed through the European collaboration SHIELD, is applied smart grid network as deployed in South Norway.Three Smart Grid use cases are analysed detail, being billing, home control alarm.The SHIELD uses Multi-Metrics approach to evaluate system SPD level during running processes compares it with case goals S, P, D. The simplicity, applicability, scalability...