InfoBeyond

InfoBeyond Technology is an innovative company specializing in AI, Computer Vision, Communications, and Cybersecurity within the Information Technology industry.

Contact Info

320 Whittington PKWY, STE 303
Louisville, KY, USA 40222-4917
[email protected]
(502) 919 7050

Learn More

Follow Us

Selected Book Chapters

B. He, T. Tran, and B. Xie, "Authentication and identity management for secure cloud business and services", Accepted for Book chapter in Cloud Computing, IGI Global, 2013.

Abstract

Today, cloud-based services and applications are ubiquitous in many systems. The cloud provides undeniable potential benefits to the users by offering lower costs and simpler deployment. The users significantly reduce their system management responsibilities by outsourcing services to the cloud service providers. However, the management shift has posed significant security challenges to the cloud service providers. Security concerns are the main reasons that delay organizations from moving to the cloud. The security and efficiency of user identity management and access control in the cloud needs to be well addressed to realize the power of the cloud. In this chapter, the authors identify the key challenges and provide solutions to the authentication and identity management for secure cloud business and services. The authors first identify and discuss the challenges and requirements of the authentication and identity management system in the cloud. Several prevailing industry standards and protocols for authentication and access control in cloud environments are provided and discussed. The authors then present and discuss the latest advances in authentication and identity management in cloud, especially for mobile cloud computing and identity as a service. They further discuss how proximity-based access control can be applied for an effective and fine-grained data access control in the cloud.

Read More

Bin Xie, et al. “Long-Term Evolution (LTE): IP-enabled Next Generation of Wireless Mobile Network,” in Advancements in Distributed Computing and Internet Technologies: Trends and Issues, Edit by Al-Sakib Khan Pathan, Mukaddim Pathan, and Hae Young Lee, Publisher: IGI Global, 2012.

Robert Kelley, Anup Kumar, and Bin Xie “Security, Privacy, and Authorization for Mobile Services,” in Applications and Services for Mobile Systems, Auerbach Publication, Taylor and Francis Group, ISBN-10: 1439801525, 2012.

Robert Kelley, Anup Kumar, and Bin Xie "Security, Privacy, and Authorization for Mobile Services", in Applications and Services for Mobile Systems, Auerbach Publication, Taylor and Francis Group, ISBN-10: 1439801525, 2012.

Yingbing Yu, and Bin Xie "Development and Implementation of Mobile Services in Mobile Platforms", in Applications and Services for Mobile Systems, Auerbach Publication, Taylor and Francis Group,ISBN-10: 1439801525, 2012.

Bing He, Bin Xie, Ranga Reddy, and David Zhao “Authentication and Access Control in Wireless Mesh Network,” in Security of Self-Organizing Networks: MANET, WSN, WMN, VANET, Auerbach Publication, Taylor and Francis Group, ISBN10: 143981919X, 2011.

Bing He, and Bin Xie “Mobility and Middleware: Enabling Ubiquitous Quality of Service for Mobile Services,” in Applications and Services for Mobile Systems, Auerbach Publication, Taylor and Francis Group, ISBN-10: 1439801525, 2010.

Weihuang Fu, Bin Xie, Dharma P. Agrawal “Channel Assignment in Wireless Mesh Networks,” in Handbook/Encyclopedia of Ad Hoc and Ubiquitous Computing, World Scientific, ISBN-10: 981283348X, 2009.

Lakshmi Santhanam, Bin Xie, and Dharma P. Agrawal “Selfishness and Security for Wireless Mesh Network,”in Handbook/Encyclopedia of Ad Hoc and Ubiquitous Computing, World Scientific, ISBN-10: 981283348X, 2009.

Abstract

Wireless Mesh Network (WMN) is a wired extension of multi-hop ad hoc network (MANET) which defines a new paradigm for broadband wireless Internet. A packet originating from a meshclient is relayed collaboratively in a multi-hop fashion by the intermediate mesh routers (MRs) towards the Internet Gateway (IGW). This is strictly true in a network managed by a single trusted authority. But, a WMN can be formed by a group of independent MRs operated by different service providers. It is a real challenge to establish a priori trust in a multi-operator WMN.

Unfortunately, the current thrust of research in WMNs, is primarily focused on developing multi-path routing protocols; and security is very much in its infancy. This book chapter provides a comprehensive coverage of various security issues pertinent to WMNs. We will systematically explore the vulnerabilities that can be exploited by attackers to conduct various attacks. We then provide a detailed description of some important security designs/proposals from industry and academia that will capture the current start-of-the-art solutions. We also cover key results from our research and other active researchers that have a great impact on the design of a secure WMN. Finally, we describe various open challenges which can catalyze new research efforts in this direction.

Read More

Jungfang Wang, Bin Xie, and Dharma P. Agrawal, “Journey from Mobile Ad Hoc Networks to Wireless Mesh Networks,” in Handbook of Wireless Ad Hoc and Sensor Networks, Springer-Verlag (London), ISBN: 978-1-84800-327-9, Edited by Sudip Misra, Isaac Woungang, and Subhas Chandra Misra, 2008.

Abstract

A wireless mesh network (WMN) is a particular type of mobile ad hoc network (MANET), which aims to provide ubiquitous high bandwidth access for a large number of users. A pure MANET is dynamically formed by mobile devices without the requirement of any existing infrastructure or prior network configuration. Similar to MANETs, a WMN also has the ability of self-organization, self-discovering, self-healing, and self-configuration. However, a WMN is typically a collection of stationary mesh routers (MRs) with each employing multiple radios. Some MRs have wired connections and act as the Internet gateways (IGWs) to provide Internet connectivity for other MRs. These new features of WMNs over MANETs enable them to be a promising alternative for high broadband Internet access. In this chapter, we elaborate on the evolution from MANETs to WMNs and provide a comprehensive understanding of WMNs from theoretical aspects to practical protocols, while comparing it with MANETs. In particular, we focus on the following critical issues with respect to WMN deployment: Network Capacity, Positioning Technique, Fairness Transmission and Multiradio Routing Protocols. We end this chapter with some open problems and future directions in WMNs.

Read More

Jyung H. Jun, Bin Xie, and Dharma P. Agrawal, “Mobile Sensor Networks: Protocols and Mobility Strategies,” in Handbook of Wireless Ad Hoc and Sensor Networks, Springer-Verlag (London), ISBN: 978-1-84800-327-9, Edited by Sudip Misra, Isaac Woungang, and Subhas Chandra Misra, 2008.

Haitong Wang, Bin Xie, and Dharma P. Agrawal, “QoS Service in Wireless Metropolitan Area Network,” in Wireless Quality of Service: Techniques, Standards and Applications, Auerbach Publications, ISBN-13: 978-1420051308, Edited by Maode Ma, Mieso K. Denko, and Yan Zhang, 2007.

Torsha Banerjee, Bin Xie, and Dharma P. Agrawal, “QoS Service in Heterogeneous Wireless Network,” in Wireless Quality of Service: Techniques, Standards and Applications, Auerbach Publications, ISBN-13: 978-1420051308, Edited by Maode Ma, Mieso K. Denko, and Yan Zhang, 2007.

Bin Xie, Anup Kumar, and Dharma P. Agrawal “Security Issues in Integrated Cellular Network, WLANs, and MANETs,” in Wireless Ad Hoc Networking: Personal-Area, Local-Area, and Sensory-Area Networks, Auerbach Publications, ISBN-13: 978-0849392542, Edited by Shih-Lin Wu and Yu-Chee Tseng, 2006.