miun.sePublications
Change search
Refine search result
1 - 25 of 25
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 1.
    Ansari, Rafay Iqbal
    et al.
    Frederick University, Nicosia, Cyprus.
    Pervaiz, Haris
    Lancaster University, UK.
    Chrysostomou, Chrysostomos
    Frederick University, Nicosia, Cyprus.
    Hassan, Syed Ali
    National University of Sciences and Technology (NUST), Pakistan.
    Mahmood, Aamir
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Gidlund, Mikael
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Control-Data Separation Architecture for Dual-Band mmWave Networks: A New Dimension to Spectrum Management2019In: IEEE Access, E-ISSN 2169-3536, Vol. 7, p. 34925-34937Article in journal (Refereed)
    Abstract [en]

    The exponential growth in global mobile data traffic, especially with regards to the massive deployment of devices envisioned for the fifth generation (5G) mobile networks, has given impetus to exploring new spectrum opportunities to support the new traffic demands. The millimeter wave (mmWave) frequency band is considered as a potential candidate for alleviating the spectrum scarcity. Moreover, the concept of multi-tier networks has gained popularity, especially for dense network environments. In this article, we deviate from the conventional multi-tier networks and employ the concept of control-data separation architecture (CDSA), which comprises of a control base station (CBS) overlaying the data base station (DBS). We assume that the CBS operates on the sub-6 GHz single band, while the DBS possesses a dual-band mmWave capability, i.e., 26 GHz unlicensed band and 60 GHz licensed band. We formulate a multi-objective optimization (MOO) problem, which jointly optimizes conflicting objectives: the spectral efficiency (SE) and the energy efficiency (EE). The unique aspect of this work includes the analysis of a joint radio resource allocation algorithm based on Lagrangian Dual Decomposition (LDD) and we compare the proposed algorithm with the maximal-rate (maxRx), dynamic sub-carrier allocation (DSA) and joint power and rate adaptation (JPRA) algorithms to show the performance gains achieved by the proposed algorithm.

  • 2.
    Butun, Ismail
    et al.
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Gidlund, Mikael
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Location Privacy Assured Internet of Things2019In: Proceedings of the 5th International Conference on Information Systems Security and Privacy / [ed] Paolo Mori, Steven Furnell and Olivier Camp, Setúbal, Portugal: SciTePress, 2019, Vol. 1, p. 623-630Conference paper (Refereed)
    Abstract [en]

    Internet of Things (IoT) is in the booming age of its growth, therefore a vast amount of applications, projects, hardware/software solutions, and customized concepts are being developed. The proliferation of IoT will enable location-based services to be available everywhere for everyone, and this will raise a large number of privacy issues related to the collection, usage, retention, and disclosure of the user’s location information. In order to provide a solution to this unique problem of IoT, this paper proposes Location Privacy Assured Internet of Things (LPA-IoT) scheme, which uses the concepts of Mix-Zone, location-obfuscation along with context-awareness. To the authors’ best knowledge, the proposed LPA-IoT scheme is the first location-based privacy-preserving scheme for IoT that provides flexible privacy levels associated with the present context of the user.

  • 3.
    Butun, Ismail
    et al.
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Pereira, Nuno
    School of Engineering (DEI/ISEP), Polytechnic of Porto (IPP), 4200-072 Porto, Portugal.
    Gidlund, Mikael
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Security Risk Analysis of LoRaWAN and Future Directions2019In: Future Internet, ISSN 1999-5903, E-ISSN 1999-5903, Vol. 11, no 1, article id 3Article in journal (Refereed)
    Abstract [en]

    LoRa (along with its upper layers definition—LoRaWAN) is one of the most promising Low Power Wide Area Network (LPWAN) technologies for implementing Internet of Things (IoT)-based applications. Although being a popular technology, several works in the literature have revealed vulnerabilities and risks regarding the security of LoRaWAN v1.0 (the official 1st specification draft). The LoRa-Alliance has built upon these findings and introduced several improvements in the security and architecture of LoRa. The result of these efforts resulted in LoRaWAN v1.1, released on 11 October 2017. This work aims at reviewing and clarifying the security aspects of LoRaWAN v1.1. By following ETSI guidelines, we provide a comprehensive Security Risk Analysisof the protocol and discuss several remedies to the security risks described. A threat catalog is presented, along with discussions and analysis in view of the scale, impact, and likelihood of each threat. To the best of the authors’ knowledge, this work is one of the first of its kind, by providing a detailed security risk analysis related to the latest version of LoRaWAN. Our analysis highlights important practical threats, such as end-device physical capture, rogue gateway and self-replay, which require particular attention by developers and organizations implementing LoRa networks.

  • 4.
    Butun, Ismail
    et al.
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Sari, Alparslan
    Department of Computer Engineering, University of Delaware, Newark, Delaware, USA.
    Österberg, Patrik
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Security Implications of Fog Computing on the Internet of Things2019In: International Conference on Consumer Electronics (ICCE), IEEE, 2019Conference paper (Refereed)
    Abstract [en]

    Recently, the use of IoT devices and sensors has been rapidly increased which also caused data generation (information and logs), bandwidth usage, and related phenomena to be increased. To our best knowledge, a standard definition for the integration of fog computing with IoT is emerging now. This integration will bring many opportunities for the researchers, especially while building cyber-security related solutions. In this study, we surveyed about the integration of fog computing with IoT and its implications. Our goal was to find out and emphasize problems, specifically security related problems that arise with the employment of fog computing by IoT. According to our findings, although this integration seems to be non-trivial and complicated, it has more benefits than the implications. Index Terms—IoT, IIoT, vulnerabilities, trust, end-device, confidentiality, integrity, availability.

  • 5.
    Davidsson, Viola
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Att välja e-arkiv2019Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Digitization has exploded over the past 30 years and unfortunately the archives have not been able to do so. Many municipalities have not yet taken the step out and introduced e-archives, from a survey conducted by the National Archives in 2010, it turned out that only one-fifth of Sweden's municipalities had introduced e-archives, which is very little considering how much progress digitalization has made.

    There are two purposes for this thesis; The first is to do a small survey to capture reasons why some municipalities have introduced e-archives and others not. The other is to show what requirements there are on e-archives regarding legal aspects, security, user-friendliness and what cost the introduction of e-archives entails. The thesis is aimed at municipalities with about 10,000-30,000 inhabitants, where there are no equal opportunities for finance and competence that a larger municipality has.

    The issues are:

    What are the requirements for e-archives regarding legal aspects, security, user-friendliness and can the municipalities bear the cost of e-archives?

    Why did some municipalities get started with e-archives and others not?

    Method for this is a combination of literature study and interview study. Interviews have been done with two suppliers of e-archives, who want to be anonymous in this paper and 4 municipalities, of which two have introduced e-archives and two do not have e-archives. These municipalities have chosen because they are municipalities with about 10 000-30 000 inhabitants (to whom the report is directed). They were also chosen because they are close to each other purely geographical and can thus give a fair picture of the result.

    All the questions were answered in the result section.

    Requirements for legal aspects are the Freedom of the Press Decree. 2, which states that all Swedish citizens have the right to access public documents. The Archives Act regulates what is required for archives, what the purpose is, what it is supposed to do, and that the authorities are to care for their archives.

    In terms of cost, there was the ambition to get an economic picture of what e-archives cost. One municipality submitted price information and the other municipality referred to SKL kommentus which has confidentiality on the price information. The suppliers also did not issue price information and because of this, a comparison could not be made. However, there are some tips on how to think about procurement instead.

    Regarding security, there are examples of what one can think of, such as authorization control in the e-archive to protect the archive from unauthorized persons.

    With regard to accessibility, this essay has chosen to mean how accessible the e-archive is to the public and also the disabled. Therefore, Ales e-archive has been reviewed and the single Post and Telecom Agency's - Guidance for web development has Ale municipality reached 44 %, so they have a bit left.

    In response to the second question, it emerged after the interview study that the biggest reason why the municipalities did not get started with e-archives is that they lack competence and thus a fiery person who drives the issue and resources.

  • 6.
    Eldefrawy, Mohamed
    et al.
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Butun, Ismail
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Pereira, Nuno
    Polytechnic of Porto (IPP), Porto, Portugal.
    Gidlund, Mikael
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Formal security analysis of LoRaWAN2019In: Computer Networks, ISSN 1389-1286, E-ISSN 1872-7069, Vol. 148, p. 328-339Article in journal (Refereed)
    Abstract [en]

    Recent Low Power Wide Area Networks (LPWAN) protocols are receiving increased attention from industry and academia to offer accessibility for Internet of Things (IoT) connected remote sensors and actuators. In this work, we present a formal study of LoRaWAN security, an increasingly popular technology, which defines the structure and operation of LPWAN networks based on the LoRa physical layer. There are previously known security vulnerabilities in LoRaWAN that lead to the proposal of several improvements, some already incorporated into the latest protocol specification. Our analysis of LoRaWAN security uses Scyther, a formal security analysis tool and focuses on the key exchange portion of versions 1.0 (released in 2015) and 1.1 (the latest, released in 2017). For version 1.0, which is still the most widely deployed version of LoRaWAN, we show that our formal model allowed to uncover weaknesses that can be related to previously reported vulnerabilities. Our model did not find weaknesses in the latest version of the protocol (v1.1), and we discuss what this means in practice for the security of LoRaWAN as well as important aspects of our model and tools employed that should be considered. The Scyther model developed provides realistic models for LoRaWAN v1.0 and v1.1 that can be used and extended to formally analyze, inspect, and explore the security features of the protocols. This, in turn, can clarify the methodology for achieving secrecy, integrity, and authentication for designers and developers interested in these LPWAN standards. We believe that our model and discussion of the protocols security properties are beneficial for both researchers and practitioners. To the best of our knowledge, this is the first work that presents a formal security analysis of LoRaWAN.

  • 7.
    Eldefrawy, Mohamed
    et al.
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Pereira, Nuno
    The Polytechnic of Porto (IPP), Portugal.
    Gidlund, Mikael
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Key Distribution Protocol for Industrial Internet of Things without Implicit Certificates2019In: IEEE Internet of Things Journal, ISSN 2327-4662, Vol. 6, no 1, p. 906-917Article in journal (Refereed)
    Abstract [en]

    The deployment of the Internet of Things (IoT) in industry, called the Industrial IoT (IIoT), is supporting the introduction of very desirable improvements such as increasing production flexibility, self-organization and real-time and quick response to events. However, security and privacy challenges are still to be well addressed. The IIoT requires different properties to achieve secure and reliable systems and these requirements create extra challenges considering the limited processing and communication power available to IIoT field devices. In this research article, we present a key distribution protocol for IIoT that is computationally and communicationally lightweight (requires a single message exchange) and handles node addition and revocation, as well as fast re-keying. The scheme can also resist the consequences of node capture attacks (we assume that captured nodes can be detected by the Gateway and previous works have shown this assumption to be acceptable in practice), server impersonation attacks and provides forward/backward secrecy. We show formally the correctness of our protocol and evaluate its energy consumption under realistic scenarios using a real embedded platform compared to previous state-of-the-art key-exchange protocols, to show our protocol reliability for IIoT.

  • 8.
    Engvall, Tove
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Situating trust challenges of online trade2019In: Records Management Journal, ISSN 0956-5698, E-ISSN 1758-7689, Vol. 29, no 1-2, p. 272-286Article in journal (Refereed)
    Abstract [en]

    Purpose: This paper aims to offer an improved understanding of trust challenges in online trade, providing examples of issues that should be addressed for a trustworthy online environment. It also aims to illustrate how records and recordkeeping can contribute in terms of enabling trust and accountability. Design/methodology/approach: The paper is based on results from a self-ethnographic study of online trade (Engvall, 2017); the results are analyzed further. Kelton, Fleischmann and Wallace’s (2008) model for trust is used to gain a better understanding of the characteristics of the challenges and where they should be addressed. Findings: This paper recognizes that there are different types of trust challenges at different levels – individual, between clients and businesses and at a societal level – that should be addressed at these levels in different ways. Originality/value: This paper provides an understanding of trust challenges in the online environment. 

  • 9.
    Farag, Hossam
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Enabling Time- and Mission-Critical Applications in Industrial Wireless Sensor Networks2019Licentiate thesis, comprehensive summary (Other academic)
    Abstract [en]

    Nowadays, Wireless Sensor Networks (WSNs) have gained importance as aflexible, easier deployment/maintenance and cost-effective alternative to wired networks,e.g., Fieldbus and Wired-HART, in a wide-range of applications. Initially,WSNs were mostly designed for military and environmental monitoringapplications where energy efficiency is the main design goal. The nodes in the network were expected to have a long lifetime with minimum maintenance while providing best-effort data delivery which is acceptable in such scenarios. With recent advances in the industrial domain, WSNs have been subsequently extended to support industrial automation applications such as process automation and control scenarios. However, these emerging applications are characterized by stringent requirements regarding reliability and real-time communications that impose challenges in the design of Industrial Wireless Sensor Networks (IWSNs) to effectively support time- and mission-critical applications.

    Typically, time- and mission-critical applications support different traffic categories ranging from relaxed requirements, such as monitoring traffic to firm requirements, such as critical safety and emergency traffic. The critical traffic is mostly acyclic in nature and occasionally occurs at unpredictable time instants. Once it is generated, it must be delivered within strict deadlines. Exceeding the delay bound could lead to system instability, economic loss, or even endanger human life in the working area. The situation becomes even more challenging when an emergency event triggers multiple sensor nodes to transmit critical traffic to the controller simultaneously. The unpredictability of the arrival of such a type of traffic introduces difficulties with regard to making a suitable scheduling that guarantees data delivery within deadline bounds. Existing industrial standards and related research work have thus far not presented a satisfactory solution to the issue. Therefore, providing deterministic and timely delivery for critical traffic and its prioritization over regular traffic is a vital research topic.

    Motivated by the aforementioned challenges, this work aims to enable real-timecommunication for time- and mission-critical applications in IWSNs. In this context, improved Medium Access Control (MAC) protocols are proposed to enablea priority-based channel access that provides a timely delivery for acyclic critical traffic. The proposed framework starts with a stochastic modelling of the network delay performance under a priority-oriented transmission scheme, followed by two MAC approaches. The first approach proposes a random Clear Channel Assessment (CCA) mechanism to improve the transmission efficiency of acyclic control traffic that is generated occasionally as a result of observations of an established tendency, such as closed-loop supervisory traffic. A Discrete-Time Markov Chain (DTMC) model is provided to evaluate the performance of the proposed protocol analytically in terms of the expected delay and throughput. Numerical results show that the proposed random CCA mechanism improves the shared slots approach in WirelessHART in terms of delay and throughput along with better transmission reliability.

    The second approach introduces a slot-stealing MAC protocol based on a dynamic deadline-aware scheduling to provide deterministic channel access in emergency and event-based situations, where multiple sensor nodes are triggered simultaneously to transmit time-critical data to the controller. The proposed protocol is evaluated mathematically to provide the worst-case delay bound for the time-critical traffic and the numerical results show that the proposed approach outperforms TDMA-based WSNs in terms of delay and channel utilization.

  • 10.
    Farag, Hossam
    et al.
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Sisinni, Emiliano
    Brescia University, Brescia, Italy.
    Gidlund, Mikael
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Österberg, Patrik
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Priority-Aware Wireless Fieldbus Protocol for Mixed-Criticality Industrial Wireless Sensor Networks2019In: IEEE Sensors Journal, ISSN 1530-437X, E-ISSN 1558-1748, Vol. 19, no 7, p. 2767-2780Article in journal (Refereed)
    Abstract [en]

    Industrial wireless sensor networks are becoming popular for critical monitoring and control applications in industrial automation systems. For such type of applications, providing reliable real-time performance regarding data delivery is considered as a fundamental challenge. The problem becomes more prominent with mixed-criticality systems, where different data flow with different levels of criticality (importance) coexist and characterized by different requirements regarding delay and reliability. In this paper, we propose a wireless fieldbus protocol to enable real-time communication and service differentiation for cluster-based mixed-criticality networks. A process monitoring scenario of plastic extrusion is used to define the protocol requirements and elaborate the working principle of the proposed work. In our proposed protocol, each data flow is scheduled for channel access based on its criticality level using a distributed prioritized medium access mechanism that ensures a guaranteed channel access for the most critical traffic over other traffic types. The performance of the proposed protocol is analyzed analytically using a discrete-time Markov chain model to evaluate the performance in terms of delay and throughput. Moreover, the extensive simulations are conducted to prove the analytical claims and different performance assessments are provided, which also demonstrate the effectiveness of the proposed approach compared with the related existing work.

  • 11.
    Gebremichael, Teklay
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Lightweight Cryptographic Group Key Management Protocols for the Internet of Things2019Licentiate thesis, comprehensive summary (Other academic)
    Abstract [en]

    The Internet of Things (IoT) is increasingly becoming an integral component of many applications in consumer, industrial and other areas. Notions such as smart industry, smart transport, and smart world are, in large part, enabled by IoT. At its core, the IoT is underpinned by a group of devices, such as sensors and actuators, working collaboratively to provide a required service. One of the important requirements most IoT applications are expected to satisfy is ensuring the security and privacy of users. Security is an umbrella term that encompasses notions such as confidentiality, integrity and privacy, that are typically achieved using cryptographic encryption techniques.

    A special form of communication common in many IoT applications is group communication, where there are two or more recipients of a given message. In or-der to encrypt a message broadcast to a group, it is required that the participating parties agree on a group key a priori. Establishing and managing a group key in IoT environments, where devices are resources-constrained and groups are dynamic, is a non-trivial problem. The problem presents unique challenges with regard to con-structing protocols from lightweight and secure primitives commensurate with the resource-constrained nature of devices and maintaining security as devices dynamically leave or join a group.

    This thesis presents lightweight group key management protocols proposed to address the aforementioned problem, in a widely adopted model of a generic IoT network consisting of a gateway with reasonable computational power and a set of resource-constrained nodes. The aim of the group key management protocols is to enable the gateway and the set of resource-constrained devices to establish and manage a group key, which is then used to encrypt group messages. The main problems the protocols attempt to solve are establishing a group key among participating IoT devices in a secure and computationally feasible manner; enabling additionor removal of a device to the group in a security preserving manner; and enabling generation of a group session key in an efficient manner without re-running the protocol from scratch. The main challenge in designing such protocols is ensuring that the computations that a given IoT device performs as part of participating in the protocol are computationally feasible during initial group establishment, group keyupdate, and adding or removing a node from the group.

    The work presented in this thesis shows that the challenge can be overcome by designing protocols from lightweight cryptographic primitives. Specifically, protocols that exploit the lightweight nature of crypto-systems based on elliptic curves and the perfect secrecy of the One Time Pad (OTP) are presented. The protocols are designed in such a way that a resource-constrained member node performs a constant number of computationally easy computations during all stages of the group key management process.

    To demonstrate that the protocols are practically feasible, implementation resultof one of the protocols is also presented, showing that the protocol outperforms similar state-of-the-art protocols with regard to energy consumption, execution time, memory usage and number of messages generated.

  • 12.
    Gebremichael, Teklay
    et al.
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Jennehag, Ulf
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Gidlund, Mikael
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Lightweight IoT Group Key Establishment Scheme from the One Time PadManuscript (preprint) (Other academic)
    Abstract [en]

    Secure group communication in the Internet ofThings (IoT) entails the establishment and management of oneor more group keys to provide group security services such asconfidentiality of group messages. The main challenges in estab-lishing a group key consist in designing a group key establishmentscheme that is feasible for nodes with limited computationalcapabilities. In this paper, we propose a lightweight group keyestablishment scheme based on fast symmetric-key encryption.We show a mechanism for designing a lightweight and secure IoTgroup key establishment and management scheme whose securityis underpinned by the perfect secrecy provided by the One-time-pad. We then argue that the scheme is convenient for IoT groupapplications where nodes are resource-constrained. We prove thatour scheme is secure under a threat model where the attackerhas sufficiently large computational power. We also prove thatthe scheme provides desired group security properties such asconfidentiality, key secrecy and independent group session keysgeneration.

  • 13.
    Grimaldi, Simone
    et al.
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Mahmood, Aamir
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Gidlund, Mikael
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Real-time Interference Identification via Supervised Learning: Embedding Coexistence Awareness in IoT Devices2019In: IEEE Access, E-ISSN 2169-3536, Vol. 7, p. 835-850Article in journal (Refereed)
    Abstract [en]

    Energy sampling-based interference detection and identification (IDI) methods collide with the limitations of commercial off-the-shelf (COTS) IoT hardware. Moreover, long sensing times, complexity and inability to track concurrent interference strongly inhibit their applicability in most IoT deployments. Motivated by the increasing need for on-device IDI for wireless coexistence, we develop a lightweight and efficient method targeting interference identification already at the level of single interference bursts. Our method exploits real-time extraction of envelope and model-aided spectral features, specifically designed considering the physical properties of signals captured with COTS hardware. We adopt manifold supervised-learning (SL) classifiers ensuring suitable performance and complexity trade-off for IoT platforms with different computational capabilities. The proposed IDI method is capable of real-time identification of IEEE 802.11b/g/n, 802.15.4, 802.15.1 and Bluetooth Low Energy wireless standards, enabling isolation and extraction of standard-specific traffic statistics even in the case of heavy concurrent interference. We perform an experimental study in real environments with heterogeneous interference scenarios, showing 90%–97% burst identification accuracy. Meanwhile, the lightweight SL methods, running online on wireless sensor networks-COTS hardware, ensure sub-ms identification time and limited performance gap from machine-learning approaches.

  • 14.
    Karlsson, Karl-Johan
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    New public management i arkivredovisning: Om Riksarkivets kommunikation kring verksamhetsbaserad arkivredovisning2018Independent thesis Advanced level (degree of Master (One Year)), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    Uppsatsen är en kritisk diskursanalys av Riksarkivets kommunikation kring verksamhetsbaserad arkivredovisning utifrån informationen på riksarkivets hemsida, och med ett särskilt fokus på förekomsten av spår av New Public Management. Huvudmaterialet består av Riksarkivets FAQ, och som sidomaterial används även Riksarkivets allmänna föreskrifter.

    Utifrån analytiska begrepp som transitivitet, modalitet, intertextualitet med flera analyseras materialet för att komma fram till slutsatsen att Riksarkivets kommunikation inte innehåller några problematiska mängder spår av New Public Management, och uppsatsen skriver in sig i arkiv- och informationsvetenskapen genom att anknyta till det första steget som tas vid införande av verksamhetsbaserad arkivredovisning.

  • 15.
    Kim, Young-bin
    et al.
    KDDI Research, Inc., Saitama, Japan.
    Kang, Myung Gil
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Choi, Wan
    Korea Advanced Institute of Science and Technology (KAIST), Daejeon, Korea.
    On-off Switched Interference Alignment for Diversity Multiplexing Tradeoff Improvement in the 2-User X-Network with Two Antennas2019In: IEEE Transactions on Wireless Communications, ISSN 1536-1276, E-ISSN 1558-2248, Vol. 18, no 1, p. 546-558Article in journal (Refereed)
    Abstract [en]

    To improve diversity gain in an interference channel and hence to maximize diversity multiplexing tradeoff (DMT), we propose on-off switched interference alignment (IA) where IA is intermittently utilized by switching IA on/off. For on-off switching, either IA with symbol extension or IA with Alamouti coding is adopted in this paper. Deriving and analyzing DMT of the proposed schemes, we reveal that the intermittent utilization of IA with simultaneous non-unique decoding can improve DMT in the 2-user X-channel with two antennas. Both the proposed schemes are shown to achieve diversity gain of 4 and DoF per user of 4/3 . In particular, the on-off switched IA with Alamouti coding, to the best of our knowledge, surpasses any other existing schemes for the 2-user X-channel with two antennas and nearly approaches the ideal DMT. 

  • 16.
    Klett, Elisabeth
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Theory, regulation and practice in Swedish digital records appraisal2019In: Records Management Journal, ISSN 0956-5698, E-ISSN 1758-7689, Vol. 29, no 1/2, p. 86-102Article in journal (Refereed)
    Abstract [en]

    Purpose

    Digital records appraisal and aspects of archival values in theory, regularization and practice are explored. This paper aims to reflect upon the appraisal process, responsibility and norms for value creation in a digitalized environment. The research question was how do appraisal theory, normative rules and appraisal practice meet the aims of values in digital archives?

    Design/methodology/approach

    The study triangulated appraisal theory, normative values and participants’ views about archival values in appraisal practice in a Swedish setting. Content analysis were used to explore normative documents and interviews. Appraisal theories of the Swedish Nils Nilsson and the Canadian Terry Cook were interpreted. The result was related to theories on public values, the nature of responsibility and relations between the state and citizens.

    Findings

    The results show influences between theory, norms and practice. Changes in norms and practice do not follow the development of digitalization. Responsibility is focused on tasks, which exposes risks of accountability control and knowledge of appraisal grounds. The paper concludes that access requirements and user needs may prompt change in appraisal processes. In the light of digitalization, “primary and secondary value” are merely a matter of use and usability in a time and space (continuum) perspective.

    Research limitations/implications

    This study is based in Sweden where extensive right of access to public records and default preservation are norm.

    Originality/value

    The result shows how allocated responsibilities impinge on a re-active digital appraisal process.

  • 17.
    Mahmood, Aamir
    et al.
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Hossain, M. M. Aftab
    KTH Royal Institute of Technology, Sweden.
    Cavdar, Cicek
    KTH Royal Institute of Technology, Sweden.
    Gidlund, Mikael
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Energy-Reliability Aware Link Optimization for Battery-Powered IoT Devices with Non-Ideal Power Amplifiers2019In: IEEE Internet of Things Journal, ISSN 2327-4662Article in journal (Refereed)
    Abstract [en]

    In this paper, we study cross-layer optimization of low-power wireless links for reliability-aware applications while considering both the constraints and the non-ideal characteristics of the hardware in Internet-of-things (IoT) devices. Specifically, we define an energy consumption (EC) model that captures the energy cost—of transceiver circuitry, power amplifier, packet error statistics, packet overhead, etc.—in delivering a useful data bit. We derive the EC models for an ideal and two realistic non-linear power amplifier models. To incorporate packet error statistics, we develop a simple, in the form of elementary functions, and accurate closed-form packet error rate (PER) approximation in Rayleigh block-fading. Using the EC models, we derive energy optimal yet reliability and hardware compliant conditions for limiting unconstrained optimal signal-to-noise ratio (SNR), and payload size. Together with these conditions, we develop a semi-analytic algorithm for resource-constrained IoT devices to jointly optimize parameters on physical (modulation size, SNR) and medium access control (payload size and the number of retransmissions) layers in relation to link distance. Our results show that despite reliability constraints, the common notion—higher-order M-ary modulations (MQAM) are energy optimal for short-range communication—prevails, and can provide up to 180% lifetime extension as compared to often used OQPSK modulation in IoT devices. However, the reliability constraints reduce both their range and the energy efficiency, while non-ideal traditional PA reduces the range further by 50% and diminishes the energy gains unless a better PA is used.

  • 18.
    Mahmood, Aamir
    et al.
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Sisinni, Emiliano
    University of Brescia, Italy.
    Guntupalli, Lakshmikanth
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Rondón, Raúl
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Hassan, Syed Ali
    National University of Science and Technology (NUST), Pakistan.
    Gidlund, Mikael
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Scalability Analysis of a LoRa Network under Imperfect Orthogonality2019In: IEEE Transactions on Industrial Informatics, ISSN 1551-3203, E-ISSN 1941-0050, Vol. 15, no 3, p. 1425-1436Article in journal (Refereed)
    Abstract [en]

    Low-power wide-area network (LPWAN) technologies are gaining momentum for internet-of-things (IoT) applications since they promise wide coverage to a massive number of battery-operated devices using grant-free medium access. LoRaWAN, with its physical (PHY) layer design and regulatory efforts, has emerged as the widely adopted LPWAN solution. By using chirp spread spectrum modulation with qausi-orthogonal spreading factors (SFs), LoRa PHY offers coverage to wide-area applications while supporting high-density of devices. However, thus far its scalability performance has been inadequately modeled and the effect of interference resulting from the imperfect orthogonality of the SFs has not been considered. In this paper, we present an analytical model of a single-cell LoRa system that accounts for the impact of interference among transmissions over the same SF (co-SF) as well as different SFs (inter-SF). By modeling the interference field as Poisson point process under duty-cycled ALOHA, we derive the signal-to-interference ratio (SIR) distributions for several interference conditions. Results show that, for a duty cycle as low as 0.33%, the network performance under co-SF interference alone is considerably optimistic as the inclusion of inter-SF interference unveils a further drop in the success probability and the coverage probability of approximately 10% and 15%, respectively for 1500 devices in a LoRa channel. Finally, we illustrate how our analysis can characterize the critical device density with respect to cell size for a given reliability target.

  • 19.
    Nikonowicz, Jakub
    et al.
    Poznań University of Technology, Poland.
    Mahmood, Aamir
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Sisinni, Emiliano
    University of Brescia, Italy.
    Gidlund, Mikael
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Noise Power Estimators in ISM Radio Environments: Performance Comparison and Enhancement Using a Novel Samples Separation Technique2019In: IEEE Transactions on Instrumentation and Measurement, ISSN 0018-9456, E-ISSN 1557-9662, Vol. 68, no 1, p. 105-115Article in journal (Refereed)
    Abstract [en]

    Noise power estimation is central to efficient radio resource allocation in modern wireless communication systems. In the literature, there exist many noise power estimation methods that can be classified based on underlying theoretical principle; the most common are spectral averaging, eigenvalues of sample covariance matrix, information theory, and statistical signal analysis. However, how these estimation methods compare against each other in terms of accuracy, stability, and complexity is not well studied, and the focus instead remains on the enhancement of individual methods. In this paper, we adopt a common simulation methodology to perform a detailed performance evaluation of the prominent estimation techniques. The basis of our comparison is the signal-to-noise ratio estimation in the simulated industrial, scientific and medical band transmission, while the reference noise signal is acquired from an industrial production plant using a software-defined radio platform, USRP-2932. In addition, we analyze the impact of different techniques for noise-samples' separation on the estimation process. As a response to defects in the existing techniques, we propose a novel noise-samples' separation algorithm based on the adaptation of rank-order filtering. Our analysis shows that the proposed solution, apart from its low complexity, has a very good root-mean-squared error of 0.5 dB and smaller than 0.1-dB resolution, thus  achieving a performance comparable with the methods exploiting information theory concepts.

  • 20.
    Nyman, Maja
    et al.
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Große, Christine
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Are You Ready When It Counts?: IT Consulting Firm’s Information Security Incident Management2019In: Proceedings of the 5th International Conference on Information Systems Security and Privacy (ICISSP), SciTePress, 2019, p. 26-37Conference paper (Refereed)
    Abstract [en]

    Information security incidents are increasing both in number and in scope. In consequence, the General Data Protection Regulation and the Directive on security of network and information systems force organisations to report such incidents to a supervision authority. Due to the growing of both the importance of managing incidents and the tendency to outsourcing, this study focuses on IT-consulting firms and highlights their vulnerable position as subcontractors. This study thereby addresses the lack of empirical research on incident management and contributes valuable insights in IT-consulting firms’ experiences with information security incident management. Evidence from interviews and a survey with experts at IT-consulting firms focuses on challenges in managing information security incidents. The analyses identify and clarify both new and known challenges, such as how the recent regulations affect the role of an IT-consulting firm and how the absence of major incidents influences stakeholder awareness. Improvements of IT-consulting firm’s incident management process need to address internal and external communication, the information security awareness of employees and customers and the adequacy of the cost focus.

  • 21.
    Pau, Giovanni
    et al.
    Kore University of Enna, Enna, Italy.
    Ferrero, Renato
    Politecnico di Torino, Italy.
    Jennehag, Ulf
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Zhang, Haijun
    University of Science and Technology Beijing, China.
    Emerging applications through low-power wireless technologies for Internet of Things2019In: International Journal of Distributed Sensor Networks, ISSN 1550-1329, E-ISSN 1550-1477, Vol. 15, no 3Article in journal (Refereed)
  • 22.
    Shehzad, Muhammad Karam
    et al.
    National University of Sciences and Technology (NUST), Pakistan.
    Hassan, Syed Ali
    National University of Sciences and Technology (NUST), Pakistan.
    Mahmood, Aamir
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Gidlund, Mikael
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    On the Association of Small Cell Base Stations with UAVs using Unsupervised Learning2019In: IEEE 89th Vehicular Technology Conference, VTC2019-Spring, 2019Conference paper (Refereed)
    Abstract [en]

    Small cell networks (SCNs) offer a cost-effective coverage solution to wireless applications demanding high data rates. However in SCNs, a challenging problem is the proper management of backhaul links to small cell base stations(SCBSs). To make a good backhaul link, perfect line-of-sight (LoS) communication between the SCBSs and the core network plays a vital role. In this study, we use the idea of employing unmanned aerial vehicles (UAVs) to provide connectivity betweenSCBSs and the core network. We focus on the association of SCBSs with UAVs by considering multiple communication-related factors including data rate limit and available bandwidth resources of the backhaul. In particular, we address the optimum placement of UAVs to serve a maximum number of SCBSswhile considering available resources using the unsupervised k-means algorithm. Numerical results show that the proposed approach outperforms the conventional approach in terms of associatedSCBSs, bandwidth consumption, available link utilization, and sum-rate maximization.

  • 23.
    Stålnacke, Sebastian
    et al.
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Juhlin, Robert
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Kritiska framgångsfaktorer vid införande av GDPR inom bank och finans2018Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    On May 25, 2018, the Directive, 95/46/EC, is superseded by the General Data Protection Regulation (GDPR), (EU) 2016/679. Companies and organizations will have to revise routines, restructure organizations' processes and rebuild IT systems. The purpose of this study is to identify the critical success factors for implementing GDPR in the Swedish banking and finance sector. The study carried out a literature study as a foundation for the qualitative interviews with which empirical was gathered. Subjects for interviews was data protection officers (DPO) at four banks, as well as the Swedish Data Protection Authority and Forum för dataskydd, a national forum for DPO:s. The study's results showed a number of significant success factors for implementation processes. Based on these success factors, three were identified as critical to the implementation of GDPR from a computer science perspective: data governance, privacy-by-design, and documentation.

  • 24.
    Sundberg, Leif
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Value Positions and Relationships in the Swedish Digital Government2019In: Administrative Sciences, ISSN 2076-3387, E-ISSN 2076-3387, Vol. 9, no 1, article id 24Article in journal (Refereed)
    Abstract [en]

    Governments across the world spend vast resources on implementing digital technology. Electronic, or digital, government is the use and study of Internet-based information and communication technology in the public sector. A point of departure in this study is that investments in technology are not value-free; they require allocation of limited resources and trade-offs between values. The purpose of this paper was to investigate how values are prioritized in the Swedish digital government. This research was conducted by using quantitative data from a survey administered to Swedish municipalities and national agencies. In addition, qualitative data from a database was used to exemplify value operationalization. The research utilized a theoretical framework based on four value positions: professionalism, efficiency, service, and engagement. The findings reveal that service and quality, and productivity and legality have a high priority, while engagement values are less prioritized. Differences based on organization type and size are also discussed. Moreover, the study suggests that professionalism and efficiency are distinct value positions, while service and engagement are closely related through citizen centricity. The qualitative material suggests that citizen centricity can manifest itself as a form of service logic, but also in the form of educational digital inclusion activities for vulnerable groups. The paper concludes by suggesting that future research should further refine the concept of citizen centricity in relation to digital government values, since its current meaning is ambiguous.

  • 25.
    zadmirzaei, Majid
    et al.
    University of Guilan.
    Mohammadi Limaei, Solieman
    University of Guilan.
    Amirteimoori, Alireza
    Olsson, Leif
    Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
    Measuring the relative performance of forest management units: A chance-constrained DEA model in the presence of the non-discretionary factor2019In: Canadian Journal of Forest Research, ISSN 0045-5067, E-ISSN 1208-6037Article in journal (Refereed)
    Abstract [en]

    In this study, we develop a marginal chance-constrained data envelopment analysis model in the presence of non-discretionary inputs and hybrid outputs for the first time. We call it a stochastic non-discretionary DEA model (SND-DEA), and it is developed to measure and compare the relative efficiency of forest management units under different environmental management systems. Furthermore, we apply an output-oriented DEA technology to both deterministic and stochastic scenarios. The required data are collected from 24 forest management plans (as decision-making units and included four inputs and equal amount of outputs. The findings of this practical research show that the modified SND-DEA model in different probability levels give us apparently different results compared to the output from pure deterministic models. However, when we calculate the correlation measure, the probability levels give us a strong positive correlation between stochastic and deterministic models. Therefore, approximately 40% of the forest management plans based on the applied SND-DEA model should substantially increase their average efficiency score. As the major conclusion, our developed SND-DEA model is a suitable improvement over previous developed models to discriminate the efficiency and/or the inefficiency of decision-making units to hedge against risk and uncertainty in this type of forest management problems.

1 - 25 of 25
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf