Pascal Lorenz’s research while affiliated with University of Upper Alsace and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (39)


A Hyperelliptic Curve-Based Authenticated Key Agreement Scheme for Unmanned Aerial Vehicles in Cross-Domain Environments
  • Article
  • Full-text available

December 2025

·

78 Reads

Chinese Journal of Aeronautics

·

Haralambos Mouratidis

·

Pascal Lorenz

Unmanned Aerial Vehicles (UAVs) are increasingly recognized for their pivotal role in military and civilian applications, serving as essential technology for transmitting, evaluating, and gathering information. Unfortunately, this crucial process often occurs through unsecured wireless connections, exposing it to numerous cyber-physical attacks. Furthermore, UAVs' limited onboard computing resources make it challenging to perform complex cryptographic operations. The main aim of constructing a cryptographic scheme is to provide substantial security while reducing the computation and communication costs. This article introduces a very efficient and secure cross-domain Authenticated Key Agreement (AKA) scheme that uses Hyperelliptic Curve Cryptography (HECC). The HECC, a modified version of Elliptic Curve Cryptography (ECC) with smaller parameters and a maximum key size of 80 bits, is well-suited for use in UAVs. In addition, the proposed scheme is employed in a cross-domain environment that integrates a Public Key Infrastructure (PKI) at the receiving end and a Certificateless Cryptosystem (CLC) at the sending end. Integrating CLC with PKI improves network security by restricting the exposure of encryption keys only to the message's sender and subsequent receiver. A security study employing ROM and ROR models, together with a comparative performance analysis, shows that the proposed scheme outperforms comparable existing schemes in terms of both efficiency and security.

Download

Cost-Effective Strategy for IIoT Security Based on Bi-Objective Optimization

May 2025

·

34 Reads

·

1 Citation

IEEE Internet of Things Journal

The Internet of Things (IoT) and its industrial counterpart, the Industrial Internet of Things (IIoT), have transformed sectors such as home automation, healthcare, and manufacturing by enhancing data management through advanced networking. However, the rapid growth of IIoT has introduced significant cybersecurity challenges, necessitating a comprehensive approach to securing data across the TCP/IP model. This paper presents a novel cybersecurity investment strategy formulated as a bi-objective optimization problem, validated through genetic and iterative algorithms. The strategy effectively balances security and cost, achieving nearly 50% efficiency in solution effectiveness. By utilizing these optimization techniques, the approach provides a practical and cost-effective solution to improve IIoT security within budget constraints, offering valuable insights for cybersecurity professionals seeking robust and economically viable solutions.




Our proposed work: overview of the complete system pipeline including training and real-time inference stages.
Our proposed work: overview of the complete system pipeline including training and real-time inference stages.
Hand-drawn spiral samples from individuals with and without PD.
Distribution of healthy and Parkinson’s spiral drawings in the training and testing sets.
Comparative performance of hybrid models in PD detection with and without data augmentation techniques.

+5

Architecture-Aware Augmentation: A Hybrid Deep Learning and Machine Learning Approach for Enhanced Parkinson’s Disease Detection

December 2024

·

132 Reads

·

1 Citation

·

·

·

[...]

·

Pascal Lorenz

Parkinson’s Disease (PD) is a progressive neurodegenerative disorder affecting millions worldwide. Early detection is crucial for improving patient outcomes. Spiral drawing analysis has emerged as a non-invasive tool to detect early motor impairments associated with PD. This study examines the performance of hybrid deep learning and machine learning models in detecting PD using spiral drawings, with a focus on the impact of data augmentation techniques. We compare the accuracy of Vision Transformer (ViT) with K-Nearest Neighbors (KNN), Convolutional Neural Networks (CNN) with Support Vector Machines (SVM), and Residual Neural Networks (ResNet-50) with Logistic Regression, evaluating their performance on both augmented and non-augmented data. Our findings reveal that ViT with KNN, initially achieving 96.77% accuracy on unaugmented data, experienced a notable decline across all augmentation techniques, suggesting it relies heavily on global patterns in spiral drawings. In contrast, ResNet-50 with Logistic Regression showed consistent improvement with data augmentation, reaching 93.55% accuracy when rotation and flipping techniques were applied. These results highlight that hybrid models respond differently to augmentation, and careful selection of augmentation strategies is necessary for optimizing model performance. Our study provides important insights into the development of reliable diagnostic tools for early PD detection, emphasizing the need for appropriate augmentation techniques in medical image analysis.


Reliable Federated Learning With GAN Model for Robust and Resilient Future Healthcare System

October 2024

·

25 Reads

·

11 Citations

IEEE Transactions on Network and Service Management

Federated Learning (FL) enabled the reliability and robustness of 5G communication networks for wireless edge computing to provide collaborative Deep Learning (DL) of complex models while protecting privacy for healthcare systems. Wireless end devices are more susceptible to corruption due to the vulnerability offered by open network settings, however, this creates security issues and lessens the effectiveness of DL-based security models for healthcare systems. Furthermore, disaster reliability in communication networks has garnered unprecedented attention from governments and companies, particularly during the current COVID-19 pandemic scenario. In this work, a novel reliable personalized Federated Learning-based Customized Inequality-Aware Federated Learning (CusIAFL) technique is proposed for securing color images while communicating with a wireless network. The proposed technique adjusts each data sampling to the local target during optimization using knowledge of client-label availability. The work that is being presented uses a hybrid technique to maintain consistency in the time-series data. and a novel Pix2Pix Generative Adversarial Network (GAN) technique is used to generate realistic images. This novel work is tested on different non-medical and medical images. The experimental results have been evaluated using performance metrics, namely accuracy, entropy, PSNR, HD95, SSIM, and MSE. Furthermore, the accuracy varies from 89 to 93 percent with different datasets outperforming well with existing SOTA techniques. The outcomes demonstrate that the proposed CusIAFL-based scheme is more effective than the State-Of-The-Art (SOTA) models.


Fig. 3: Gathered data from different MQ sensors. The urban green areas are characterised by having greater values in averaged, minimum and maximum measured data. It should be highlighted that some of the recorded values of MQ2 in urban areas are very similar to those from rural areas, even lower. This might indicate that even in areas strongly affected by human impact, such as traffic, there are moments in which the composition of the atmosphere is similar to that in rural areas. The data from urban areas seems to be divided into two groups, one characterised by values similar to the urban green areas and the other with values similar to the rural area. A totally different trend is observed concerning the MQ3, which data can be seen in Figure 5. In this case, there is an extremely low dispersion of generated data. This fact indicates that this sensor might not be suitable for identifying spatiotemporal changes in the air quality data [31]. In fact, the standard deviation is 0 in almost all the data that was analysed. The urban area has the highest values for all the extracted features. For the MQ3 sensor, data from rural areas have no variability and are similar to some records conducted in green urban areas.
Fig. 4: Extracted features from MQ2.
Fig. 5 Extracted features from MQ3. Finally, the data of MQ135 is characterised by dispersion greater than that for MQ2 but lower than that for MQ7; see Figure 7. The dispersion of the two groups of urban areas is visible in these metrics. Nevertheless, the data from urban green areas and one of the groups of data from urban areas have similar values in most of the metrics. Records of rural areas are the ones with lower values in all the metrics.
Fig. 6 Extracted features from MQ7.
Fig. 7 Extracted features from MQ135. Moreover, in this figure, it is possible to see the different results when different values of N are applied for the buffer of time. The results indicate that the accuracy is 100% for the three last options regardless of the buffer selected. Regarding the data of individual sensors, the outputs pointed out that the highest accuracy is achieved with MQ2, having 100% accuracy with almost all the time buffers. The classification with the data from MQ3 achieves an average of 95% accuracy. The average accuracy for the other two sensors for the different values is close to 90%. The results for the test dataset, as seen in Figure 9, are significantly better than those for the validation dataset. With both results in mind, the most suitable option for wearable gas sensors is the MQ2. Once the MQ2 has been chosen, we compare the training time metrics for each time buffer for the three different CART models. It can be seen in Figure 10 that Coarse CART is the one with a lower training time. Using Coarse CART suppose a reduction of almost 85% of the required time compared with Fine CART. Considering the minimal differences in the achieved accuracies and the great efficiency of Coarse CART in terms of training time and computing energy consumed in the smartphone, it has been selected.
Wearable Low-Cost and Low-Energy Consumption Gas Sensor With Machine Learning to Recognize Outdoor Areas

October 2024

·

27 Reads

IEEE Sensors Journal

Urban air quality, impacted by human-made pollution, impacts health and requires continuous monitoring. MQ sensors are the preferred air quality sensors despite their high energy consumption due to their cost, requiring the use machine learning to classify different types of air. The aim of this paper is to evaluate a monitoring solution with low-cost and low-energy consumption to classify urban and rural air. A single MQ sensor will be used with a network with edge and fog computing to balance the energy consumption. Edge computing was included in the node for feature extraction, and fog computing was applied in the smartphone to classify the data using machine learning. Different sensors and time buffers are compared in order to find the adequate sensor for data generation and time buffer for feature extraction. The results indicate that it has been possible to achieve accuracies of 100% using a single sensor, the MQ2, with time buffers of 45 to 60 measures. With this proposal, it is possible to reduce the energy consumed by data gathering to 25% of the original consumption due to the use of a single sensor, thanks to the reduction in the sensors used in the previous prototype. Moreover, it has been possible to reduce the energy linked to data forwarding by almost 97 % due to using a time buffer.


Recent Trends and Open Issues in Cyber Security for Online Platforms

September 2024

·

20 Reads

·

1 Citation

In recent years, the rise in cyber threats targeting online platforms has led to significant advancements in cyber-security research. This paper offers a comprehensive overview of current trends and persistent challenges in the cybersecurity landscape. The study evaluates the effectiveness of various cyber-security measures, including attack detection and simulation, incident response, and blockchain-based security frameworks. Despite progress, many cybersecurity solutions are still limited by factors such as insufficient datasets, computational inefficiency, and susceptibility to adversarial attacks. By analyzing recent literature and highlighting these ongoing gaps, this paper aims to direct future research toward developing more robust and adaptive cybersecurity solutions, enhancing protection for online platforms and IT systems against evolving cyber threats.


Provably Secure and Lightweight Authentication and Key Agreement Protocol for Fog-Based Vehicular Ad-Hoc Networks

September 2024

·

63 Reads

·

2 Citations

IEEE Transactions on Intelligent Transportation Systems

The increase in popularity of vehicles encourages the development of smart cities. With this advancement, vehicular ad-hoc networks, or VANETs, are now frequently utilized for inter-vehicular communication to gather data regarding traffic congestion, vehicle location, speed, and road conditions. Such a public network is open to various security risks. Overall, protecting personal information on VANET is a vital responsibility. The integration of fog computing and VANETs has gained significant importance in recent years, driven by advancements in cloud computing, Internet of Things (IoT) technologies, and intelligent transportation systems. However, ensuring secure communication in fog-based VANETs remains a major challenge. To overcome this challenge, we introduce a novel authenticated key agreement protocol that achieves mutual authentication, generates a secure session key for secret communication, and provides privacy protection without the use of bilinear pairing. We rigorously prove the security of our proposed protocol, which is designed specifically for fog-based VANETs, and has been shown to meet their stringent security requirements. Moreover, we performed formal and informal analysis that shows our proposed protocol is highly efficient,our protocol's computational and communication overhead are lower than those of other relevant protocols by 45.570% and 29.432%, respectively. Finally we use NS-3 simulation to prove that our proposed algorithm is a practical and scalable solution for secure communication in fog-based VANETs.


Skin Cancer Diagnosis Using VGG16 and Transfer Learning: Analyzing the Effects of Data Quality over Quantity on Model Efficiency

August 2024

·

79 Reads

·

3 Citations

The recent increase in the prevalence of skin cancer, along with its significant impact on individuals’ lives, has garnered the attention of many researchers in the field of deep learning models, especially following the promising results observed using these models in the medical field. This study aimed to develop a system that can accurately diagnose one of three types of skin cancer: basal cell carcinoma (BCC), melanoma (MEL), and nevi (NV). Additionally, it emphasizes the importance of image quality, as many studies focus on the quantity of images used in deep learning. In this study, transfer learning was employed using the pre-trained VGG-16 model alongside a dataset sourced from Kaggle. Three models were trained while maintaining the same hyperparameters and script to ensure a fair comparison. However, the quantity of data used to train each model was varied to observe specific effects and to hypothesize about the importance of image quality in deep learning models within the medical field. The model with the highest validation score was selected for further testing using a separate test dataset, which the model had not seen before, to evaluate the model’s performance accurately. This work contributes to the existing body of research by demonstrating the critical role of image quality in enhancing diagnostic accuracy, providing a comprehensive evaluation of the VGG-16 model’s performance in skin cancer detection and offering insights that can guide future improvements in the field.


Citations (26)


... Home automation is used to increase the comfort level of living conditions within a home. In 2025 [2], A IoT-based sensing and monitoring platform was presented for smart home automation. EmonCMS platform is used for collecting and visualizing. ...

Reference:

Intelipole: IoT and ML-Powered Smart Pole for Advanced Home Security
Cost-Effective Strategy for IIoT Security Based on Bi-Objective Optimization
  • Citing Article
  • May 2025

IEEE Internet of Things Journal

... Within APEX's Page Designer, item-level validations offer a range of declarative options under the "Validation" properties, including "Regular Expression," "Format Mask," "Minimum/Maximum Value," and "Item Contains Valid Characters" [4]. For instance, a "Phone Number" field might employ the regex ^\+? [1][2][3][4][5][6][7][8][9]\d{9,14}$ to permit international formats like +12025550123 or +447911123456, rejecting invalid entries such as "abc-123" or "1202" [7]. Date fields benefit from format masks like "DD-MON-YYYY HH24:MI," ensuring inputs like "15-APR-2025 14:30" pass while "32-JUN-2025" fails, with automatic server-side parsing to catch edge cases [2]. ...

Recent Trends and Open Issues in Cyber Security for Online Platforms
  • Citing Conference Paper
  • September 2024

... However, the cloud server is far from the elliptic curve cryptography (ECC), and a fuzzy extractor for authentication. Awais et al. [22] proposed a novel four-party AKA protocol for fog-based VANETs using only lightweight cryptographic techniques and ECC without utilizing bilinear pairing technology. These protocols [8,[17][18][19][20][21][22] proposed an authentication protocol for fog-based VANETs. ...

Provably Secure and Lightweight Authentication and Key Agreement Protocol for Fog-Based Vehicular Ad-Hoc Networks
  • Citing Article
  • September 2024

IEEE Transactions on Intelligent Transportation Systems

... Several studies have explored various deep learning models to address the complexities of melanoma detection. A recent study [10] leveraged transfer learning with the pretrained VGG-16 model on three datasets from Kaggle to diagnose three types of skin cancer. This approach achieved validation accuracies of 86%, 94%, and 93% across the three models, with the third model performing the best. ...

Skin Cancer Diagnosis Using VGG16 and Transfer Learning: Analyzing the Effects of Data Quality over Quantity on Model Efficiency

... These algorithms are anticipated to be adaptable, enabling effective performance across a range of various indoor and outdoor settings and topologies. Traditional localization algorithms [2][3][4][5][6][7][8][9][10] in Wireless Sensor Networks (WSNs) fall into two categories: range-based and range-free. Traditional localization methods often suffer from uncertainties and imprecisions, especially in dynamic and complex environments. ...

Node Localization Method in Wireless Sensor Networks Using Combined Crow Search and the Weighted Centroid Method

... Embedding the watermark in the frequency domain provides a high level of security for this approach. A unique strategy for protecting medical data in 5G communications networks is presented in Murmu et al. (2024) for wireless edge computing, aiming to create collaborative deep learning (DL) models using dependable federated learning (FL)-based CusIAFL with the Flower framework. Additionally, a new GAN-based Pix2Pix model is employed to categorize tumors into multiple classes and to identify and generate realistic image features. ...

Reliable Federated Learning With GAN Model for Robust and Resilient Future Healthcare System
  • Citing Article
  • October 2024

IEEE Transactions on Network and Service Management

... In addition, Machine learning (ML) demonstrates predictive capabilities for new data patterns, establishing its efficacy as a real-time water quality monitoring tool [42]. Parra et al. developed a low-cost RGB optical sensor combined with various machine learning algorithms-such as Gaussian Process Regression and k-Nearest Neighbors (KNN)-to perform both quantitative and classification analysis of water turbidity [43]. Similarly, Saavedra-Ruiz and Resto-Irizarry achieved high-precision water quality monitoring by integrating multiple optical sensors with machine learning techniques [42]. ...

Combination of Machine Learning and RGB Sensors to Quantify and Classify Water Turbidity

... This makes it difficult to capture the complete data of each individual that has been compromised. It is more secure than the cloud [8]. For data storage services, the network provider's storage space will receive a fee and the customer will pay minimal to no fees for this service depending on network stress. ...

Blockchain-Based Cloud Storage System with Enhanced Optimization and Integrity Preservation

... It is required to consider the dynamic approach for migration of VM placement. The dynamic and energy-efficient live VM migration reduces the power wastages of idle physical machines, resulting in reduced power consumption [33]. The proposed model consists of seven phases: resource monitoring analysis, agent for local migration, agent for allocating tasks, capacity distributor, optimizer analysis, energy manager, and orchestrator module for migration [34]. ...

Introduction to the Special Issue on DNA-centric Modeling and Practice for Next-generation Computing and Communication Systems

ACM Transactions on Multimedia Computing, Communications and Applications

... The researchers excluded research studies with vague methodologies or inconclusive results. 6 The researchers included only studies published between 1 January 2020 and 30 November 2024. ...

An Optimal Authentication Scheme through Dual Signature for the Internet of Medical Things