We study the future internet with focus on three viewpoints: information security, interactive applications and embedded/distributed implementations. Communication systems are viewed as whole entities and the three viewpoints are all addressed in our research as we take on the challenges met in future networked multimedia and communication applications found in embedded systems. The cloud computing paradigm is bringing forth completely new challenges to the information security field both in terms of hand-held embedded communication systems and the distributed processing cloud. Currently our special interests are in self-aware approach for future communication and interdisciplinary applications including information security and dependability aspects.
Information security research in Communication Systems concentrates on researching information security technologies for networked systems and applications of the communication-intensive future from the engineering and human points of view. The strategic goal in our research is to apply research and technological development to building the secure information society. We consider the basic elements for human well-being as the most fundamental drivers for pursuing this strategic goal, in which the technology driven and human driven development directions meet. This is pursued with an interdisciplinary approach, where new innovations create active interaction between traditional scientific areas.
Further details on the TUCS web pages: Communication Systems (ComSys)
Self-aware access control system for android
Thanigaivelan N., Nigussie E., Virtanen S., Isoaho J.
Cryptographic key generation using ECG signal
Moosavi S., Nigussie E., Virtanen S., Isoaho J.
On Security and Privacy for Networked Information Society : Observations and Solutions for Security Engineering and Trust Building in Advanced Societal Processes
Chipless RFID Tag for Io T Applications
Habib A, Afzal MA, Sadia H, Amin Y, Tenhunen H
Dimensions of Internet Use and Threat Sensitivity: An Exploratory Study among Students of Higher Education
Ali Farooq, Lalitha Balakrishnan, Muneeroh Phadung, Seppo Virtanen, Johanna Isoaho, Dhan Prasad Poudel, Jouni Isoaho
Hierarchal Placement of Smart Mobile Access Points in Wireless Sensor Networks using Fog Computing
Majd A, Sahebi G, Daneshtalab M, Plosila J, Tenhunen H
Reliability-Aware Runtime Power Management for Many-Core Systems in the Dark Silicon Era
Amir M. Rahmani, Mohammad-Hashem Haghbayan, Antonio Miele, Pasi Liljeberg, Axel Jantsch, Hannu Tenhunen
Self-aware Early Warning Score System for IoT-Based Personalized Healthcare
Iman Azimi, Arman Anzanpour, Amir M. Rahmani, Pasi Liljeberg, Hannu Tenhunen
Internet of things for remote elderly monitoring: a study from user-centered perspective
Iman Azimi, Amir M. Rahmani, Pasi Liljeberg, Hannu Tenhunen
Towards adaptive cryptography and security with software defined platforms
Hakkala A., Isoaho J., Virtanen S.