To see the other types of publications on this topic, follow the link: Conventional security on future things.

Journal articles on the topic 'Conventional security on future things'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Conventional security on future things.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

U. Harita, Ms, and K. V.DayaSagar. "A survey on secured internet of things architecture." International Journal of Engineering & Technology 7, no. 2.7 (March 18, 2018): 274. http://dx.doi.org/10.14419/ijet.v7i2.7.10596.

Full text
Abstract:
The Internet of Things (IoT) introduces an inventive and perceptive of a future Internet where users, computing systems, and everyday items owning sensing and actuating abilities cooperate with unique comfort and financial advantages. Many heterogeneous devices get connected and contribute to the IoT and are known as things.Internet of Things (IoT) enables these things to correspond, compute and make decisions on the network. In such a heterogeneous environment, every user of IoT will have a unique purpose to be served in the form of communication and computation. There is a threat that a malicious user can demolish the security and privacy of the network. Hence any application in the environment of IoT is prone to various attacks and threats. At this point, security becomes a high priority in IoT. To ensure security, care must be taken to guarantee confidentiality, authenticity, data integrity and non-repudiation. In this paperaddress various conventional techniques for providing security of IoT devices and present analysis of existing solutions for IoT. Firstly, as security will be a fundamental allowing thing of most IoT applications, mechanisms must also be designed to defend communications enabled by such technologies. Later, we identify some suitable security algorithms.
APA, Harvard, Vancouver, ISO, and other styles
2

Alshehri, Mohammed. "Blockchain-assisted cyber security in medical things using artificial intelligence." Electronic Research Archive 31, no. 2 (2022): 708–28. http://dx.doi.org/10.3934/era.2023035.

Full text
Abstract:
<abstract><p>The Internet of Medical Things (IoMT) significantly impacts our healthcare system because it allows us to track and verify patient medical data before storing it in the cloud for future use. A rapidly expanding platform like IoMT requires high security to keep all data safe. The patient's prescription history and other sensitive information must be encrypted and managed with great care. Nevertheless, it is challenging to determine what data uses are acceptable while protecting patient privacy and security. Understanding the limits of current technologies and envisioning future research paths is crucial for establishing a safe and reliable data environment. An untrustworthy person can communicate with a trustworthy person via blockchain, a decentralized digital ledger that allows for end-to-end communication. Therefore, this research suggests that the healthcare industry with blockchain-integrated cyber-security based on artificial intelligence (BICS-AI) in medical care to preserve medical-related things. Blockchain applications have the potential to consistently identify the most severe, potentially life-threatening mistakes in the medical field. The use of blockchain for decentralized data protection helps to protect patient health records from compromise. With the help of an access control provider (ACP), here came up with a lightweight solution that addresses this issue by allowing the delegating of security operations. Medical data from IoMT and integrated devices can be collected and stored securely and distributed using a conventional in-depth approach combined with blockchain, making it suitable for healthcare professionals such as nursing homes, hospitals, and the healthcare industry where data exchange is required. The research findings indicate that the suggested system is viable and has a 94.84$ \% $ security rate, a security performance of 96.4$ \% $, a success rate of 89.9$ \% $, and a 5.1$ \% $ latency rate compared to traditional methods.</p></abstract>
APA, Harvard, Vancouver, ISO, and other styles
3

Patil, Shamshekhar S., and Arun Biradar. "Novel authentication framework for securing communication in internet-of-things." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 1 (February 1, 2020): 1092. http://dx.doi.org/10.11591/ijece.v10i1.pp1092-1100.

Full text
Abstract:
Internet-of-Things (IoT) offers a big boon towards a massive network of connected devices and is considered to offer coverage to an exponential number of the smart appliance in the very near future. Owing to the nascent stage of evolution of IoT, it is shrouded by security loopholes because of various reasons. Review of existing research-based solution highlights the usage of conventional cryptographic-based solution over the traditional mechanism of data forwarding process between IoT nodes and gateway. The proposed system presents a novel solution to this problem by a model that is capable of performing a highly secured and cost-effective authentication process. The proposed system introduces Authentication Using Signature (AUS) as well as Security with Complexity Reduction (SCR) for the purpose to resist participation of any form of unknown threats. The outcome of the model shows better security strength with faster response time and energy saving of the IoT nodes.
APA, Harvard, Vancouver, ISO, and other styles
4

Qiu, Xiaoying, Jinwei Yu, Wenying Zhuang, Guangda Li, and Xuan Sun. "Channel Prediction-Based Security Authentication for Artificial Intelligence of Things." Sensors 23, no. 15 (July 27, 2023): 6711. http://dx.doi.org/10.3390/s23156711.

Full text
Abstract:
The emerging physical-layer unclonable attribute-aided authentication (PLUA) schemes are capable of outperforming traditional isolated approaches, with the advantage of having reliable fingerprints. However, conventional PLUA methods face new challenges in artificial intelligence of things (AIoT) applications owing to their limited flexibility. These challenges arise from the distributed nature of AIoT devices and the involved information, as well as the requirement for short end-to-end latency. To address these challenges, we propose a security authentication scheme that utilizes intelligent prediction mechanisms to detect spoofing attack. Our approach is based on a dynamic authentication method using long short term memory (LSTM), where the edge computing node observes and predicts the time-varying channel information of access devices to detect clone nodes. Additionally, we introduce a Savitzky–Golay filter-assisted high order cumulant feature extraction model (SGF-HOCM) for preprocessing channel information. By utilizing future channel attributes instead of relying solely on previous channel information, our proposed approach enables authentication decisions. We have conducted extensive experiments in actual industrial environments to validate our prediction-based security strategy, which has achieved an accuracy of 97%.
APA, Harvard, Vancouver, ISO, and other styles
5

Qasim, Hiba Adnan, and Rana Saad Mohammed. "Lightweight Steganography Technique in The Internet of Things: A survey." Al-Salam Journal for Engineering and Technology 3, no. 1 (November 18, 2023): 97–108. http://dx.doi.org/10.55145/ajest.2024.03.01.008.

Full text
Abstract:
In the context of the Internet of Things (IoT), lightweight steganography provides a revolutionary combination of technology and security, where data concealment meets the efficiency requirements of IoT devices. Lightweight steganography, as opposed to conventional steganographic methods, focuses on concealing information inside digital content while using the least amount of computer resources and energy. Secure data transfer is essential in the IoT world because linked devices may communicate with one another without interruption. IoT devices may communicate private data discreetly while conserving system resources, thanks to the elegant approach offered by lightweight steganography. This novel method makes use of complex algorithms that gently change data packets, turning them into bearers of hidden information without raising any red flags. The secrecy of IoT ecosystems is strengthened by lightweight steganography's easy integration of covert communication channels. In addition to improving data security, this technology also optimizes bandwidth usage and increases device battery life. A future when linked devices may transmit information safely, effectively, and surreptitiously is predicted as the IoT environment develops. This would usher in a period of unmatched data security and resource optimization.
APA, Harvard, Vancouver, ISO, and other styles
6

Du, Qinghe, Ying Xu, Wanyu Li, and Houbing Song. "Security Enhancement for Multicast over Internet of Things by Dynamically Constructed Fountain Codes." Wireless Communications and Mobile Computing 2018 (2018): 1–11. http://dx.doi.org/10.1155/2018/8404219.

Full text
Abstract:
The Internet of Things (IoT) is expected to accommodate every object which exists in this world or likely to exist in the near future. The enormous scale of the objects is challenged by big security concerns, especially for common information dissemination via multicast services, where the reliability assurance for multiple multicast users at the cost of increasing redundancy and/or retransmissions also benefits eavesdroppers in successfully decoding the overheard signals. The objective of this work is to address the security challenge present in IoT multicast applications. Specifically, with the presence of the eavesdropper, an adaptive fountain code design is proposed in this paper to enhance the security for multicast in IoT. The main novel features of the proposed scheme include two folds: (i) dynamical encoding scheme which can effectively decrease intercept probability at the eavesdropper; (ii) increasing the transmission efficiency compared with the conventional nondynamical design. The analysis and simulation results show that the proposed scheme can effectively enhance information security while achieving higher transmission efficiency with a little accredited complexity, thus facilitating the secured wireless multicast transmissions over IoT.
APA, Harvard, Vancouver, ISO, and other styles
7

S.P. Revathy, N. MadhiVathani, NaafiahFathima, and A. MohammedIlyas. "Prediction and Prevention of Theft in Jewellery Shop." IRO Journal on Sustainable Wireless Systems 5, no. 3 (September 2023): 194–206. http://dx.doi.org/10.36548/jsws.2023.3.002.

Full text
Abstract:
The internet of Things (IoT)-based total security is the most broadly used protection framework introduced by the technological developments. Sensors and cameras play a vital role in detecting movement and alerting the humans in lots of security applications. As these security gadgets are always accompanied with alarm systems, it is more popularly used for preventing the theft in public places like shopping malls and shops. In such areas, conventional CCTV cameras are usually used as it helps in non-stop human tracking, and detections of crimes. The proposed system is also on such intelligent security system capable of identifying mis-happenings in the public places. With real-time image feedback, the proposed device provides the owner with assurance even when they are not around. These studies examine the possibility of implementing automation technologies in the near future to provide complete protective control. The research suggests a fully automated security system that uses alarm messages and the internet of things (IoT) to predict and prevent unwanted activities in the jewellery shop.
APA, Harvard, Vancouver, ISO, and other styles
8

Arora, Priyanka, and Ritu Makani. "Blockchain Integration with AIoT Data Security and Privacy for Sustainability." Journal of Artificial Intelligence and Systems 6, no. 1 (2024): 112–23. http://dx.doi.org/10.33969/ais.2024060108.

Full text
Abstract:
As a primary goal, AIoT (Artificial Intelligence of Things) is the fusion of AI (artificial intelligence) methods with IoT (Internet of Things) infrastructure, which is deployed there to enhance the overall system performance of AIoT. Artificial Intelligence of Things can be used to make Internet of Things operations more efficient, which will enhance data analysis and human-machine interactions. The system's general usefulness is further increased by applying artificial intelligence techniques to convert Internet of Things data into relevant information for improved decision-making processes. The Artificial Intelligence of Things frameworks have a wide range of applications, including eCommerce, logistics operations and control, smart homes, smart farms, intelligent transportation systems, industrial automation and control, eCommerce, secure as well as safe healthcare monitoring, and many more. AIoT frameworks, however, are susceptible to a variety of information security-related assaults, which could result in problems with data security and privacy. Serious repercussions, such as unapproved data updates and leaks, are also brought on by these problems. One particular kind of database is the blockchain. It's a digital record of all the transactions that's distributed throughout the whole network of systems. Data is stored in the blocks that are linked in a chained manner. Compared to conventional security methods, blockchain technology offers greater security and is impervious to tampering. Therefore, to increase security, blockchain can be used in a variety of AIoT applications. A safe authentication architecture for AIoT has been suggested, modelled after a generalised blockchain. The adversarial model, which handles most potential security threats in this kind of communication environment, is also highlighted. This framework is part of the blockchain-envisioned safe authentication framework for the Internet of Things. The suggested framework's numerous applications are also covered. Additionally, certain problems and difficulties with the suggested framework are emphasised. Finally, we also offer some suggestions for future research that are related to the framework that has been suggested.
APA, Harvard, Vancouver, ISO, and other styles
9

B Kolhapuri, Sammed, Sanket V Shenvi, Sheetal R Kulkarni, and Ambika Naik Y. "Survey Paper on “IoT-Driven Aquaponics for Sustainable Agriculture”." IRO Journal on Sustainable Wireless Systems 6, no. 1 (March 2024): 28–47. http://dx.doi.org/10.36548/jsws.2024.1.003.

Full text
Abstract:
Aquaponics is a promising solution to address environmental issues and promote sustainable food production. The Internet of Things (IoT) has enabled substantial advancements in conventional aquaculture with hydroponics. This survey article looks at cutting-edge Internet of Things applications, with a particular focus on their impact on agricultural sustainability. The study evaluates how IoT improves resource utilization and system productivity by thoroughly examining sensor technologies, data analytics, and machine learning approaches. Data security, energy utilization, and system complexity are among the challenges discussed, as are future research initiatives that might improve IoT-driven aquaponics. The survey's purpose is to provide a comprehensive picture of current technologies and to inspire innovation in sustainable agriculture.
APA, Harvard, Vancouver, ISO, and other styles
10

Tok, Yen Xin, Norliza Katuk, and Ahmad Suki Che Mohamed Arif. "Smart Home Multi-Factor Authentication Using Face Recognition and One-Time Password on Smartphone." International Journal of Interactive Mobile Technologies (iJIM) 15, no. 24 (December 21, 2021): 32–48. http://dx.doi.org/10.3991/ijim.v15i24.25393.

Full text
Abstract:
Recently, the adoption of smart home technology has been on the rise and becoming a trend for home residents. The development of Internet-of-Things (IoT) technology drives the smart home authentication system with biometric systems such as facial recognition, fingerprint, and voice control techniques. In the context of homeowners, security is always the primary concern. However, conventional home security and the existing smart home security system have some limitations. These techniques use single-factor authentication, which provides limited protection for home security. Therefore, this project proposed a design for smart home multi-factor authentication using facial recognition and a one-time password sent to smartphones for a home security system. Rapid application development was the methodology for conducting this study. A usability evaluation suggested that the proposed smart home multi-factor authentication is acceptable, but some usability issues can be improved in the future.
APA, Harvard, Vancouver, ISO, and other styles
11

Prinsloo, Jaco, Saurabh Sinha, and Basie von Solms. "A Review of Industry 4.0 Manufacturing Process Security Risks." Applied Sciences 9, no. 23 (November 26, 2019): 5105. http://dx.doi.org/10.3390/app9235105.

Full text
Abstract:
The advent of three-dimensional (3D) printing has found a unique and prominent role in Industry 4.0 and is rapidly gaining popularity in the manufacturing industry. 3D printing offers many advantages over conventional manufacturing methods, making it an attractive alternative that is more cost-effective and efficient than conventional manufacturing methods. With the Internet of Things (IoT) at the heart of this new movement, control over manufacturing methods now enters the cyber domain, offering endless possibilities in manufacturing automation and optimization. However, as disruptive and innovative as this may seem, there is grave concern about the cyber-security risks involved. These security aspects are often overlooked, particularly by promising new start-ups and parties that are not too familiar with the risks involved in not having proper cyber-security measures in place. This paper explores some of the cyber-security risks involved in the bridge between industrial manufacturing and Industry 4.0, as well as the associated countermeasures already deployed or currently under development. These aspects are then contextualized in terms of Industry 4.0 in order to serve as a basis for and assist with future development in this field.
APA, Harvard, Vancouver, ISO, and other styles
12

Niveditha, V. R., D. Usha, P. S. Rajakumar, B. Dwarakanath, and Magesh S. "Emerging 5G IoT Smart System Based on Edge-to-Cloud Computing Platform." International Journal of e-Collaboration 17, no. 4 (October 2021): 122–31. http://dx.doi.org/10.4018/ijec.2021100109.

Full text
Abstract:
Security over internet communication has now become difficult as technology is increasingly more effective and faster, particularly in resource limited devices such as wireless sensors, embedded devices, internet of things (IoT), radio frequency identification (RFID) tags, etc. However, IoT is expected to connect billions of computers as a hopeful technology for the future. Hence, security, privacy, and authentication services must protect the communication in IoT. There are several recent considerations, such as restricted computing capacity, register width, RAM size, specific operating environment, ROM size, etc. that have compelled IoT to utilize conventional measures of security. These technologies require greater data speeds, high throughput, expanded power, lower bandwidth, and high efficiency. In addition, IoT has transformed the world in light of these new ideas by offering smooth communication between heterogeneous networks (HetNets).
APA, Harvard, Vancouver, ISO, and other styles
13

Malik, Ahmad Kamran, Naina Emmanuel, Sidra Zafar, Hasan Ali Khattak, Basit Raza, Sarmadullah Khan, Ali H. Al-Bayatti, Madini O. Alassafi, Ahmed S. Alfakeeh, and Mohammad A. Alqarni. "From Conventional to State-of-the-Art IoT Access Control Models." Electronics 9, no. 10 (October 15, 2020): 1693. http://dx.doi.org/10.3390/electronics9101693.

Full text
Abstract:
The advent in Online Social Networks (OSN) and Internet of Things (IoT) has created a new world of collaboration and communication between people and devices. The domain of internet of things uses billions of devices (ranging from tiny sensors to macro scale devices) that continuously produce and exchange huge amounts of data with people and applications. Similarly, more than a billion people are connected through social networking sites to collaborate and share their knowledge. The applications of IoT such as smart health, smart city, social networking, video surveillance and vehicular communication are quickly evolving people’s daily lives. These applications provide accurate, information-rich and personalized services to the users. However, providing personalized information comes at the cost of accessing private information of users such as their location, social relationship details, health information and daily activities. When the information is accessible online, there is always a chance that it can be used maliciously by unauthorized entities. Therefore, an effective access control mechanism must be employed to ensure the security and privacy of entities using OSN and IoT services. Access control refers to a process which can restrict user’s access to data and resources. It enforces access rules to grant authorized users an access to resources and prevent others. This survey examines the increasing literature on access control for traditional models in general, and for OSN and IoT in specific. Challenges and problems related to access control mechanisms are explored to facilitate the adoption of access control solutions in OSN and IoT scenarios. The survey provides a review of the requirements for access control enforcement, discusses several security issues in access control, and elaborates underlying principles and limitations of famous access control models. We evaluate the feasibility of current access control models for OSN and IoT and provide the future development direction of access control for the same.
APA, Harvard, Vancouver, ISO, and other styles
14

Alkatheiri, Mohammed Saeed, and Ahmed S. Alghamdi. "Blockchain-Assisted Cybersecurity for the Internet of Medical Things in the Healthcare Industry." Electronics 12, no. 8 (April 11, 2023): 1801. http://dx.doi.org/10.3390/electronics12081801.

Full text
Abstract:
The Internet of Medical Things (IoMT) plays an important role in strengthening sustainable healthcare systems. IoMT significantly influences our healthcare because it facilitates monitoring and checking patient medical information before transferring the data to a cloud network for future use. The IoMT is a big-data platform which is growing rapidly, so it is critical to maintain all data safely and securely. In this study, Blockchain-Assisted Cybersecurity (BCCS) for the IoMT in the healthcare industry is proposed. Blockchain is a decentralized digital ledger that allows end-to-end communication and provides interaction between untrustworthy persons. BCCS uses a conventional in-depth approach and blockchain to create a procedure for collecting medical information from the IoMT and integrated devices. The proposed system utilizes blockchain to record and extract the accumulated information in a secure and distributed manner within a closed environment suitable for healthcare professionals, such as nursing homes, hospitals, and the healthcare industry where data exchange is needed. The experimental outcomes show that the proposed system has a high security rate of 99.8% and the lowest latency rate of 4.3% compared to traditional approaches. In all, the reliability of the proposed system gives the highest rate of 99.4%.
APA, Harvard, Vancouver, ISO, and other styles
15

Jimmy, FNU. "Cyber security Vulnerabilities and Remediation Through Cloud Security Tools." Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023 3, no. 1 (April 12, 2024): 196–233. http://dx.doi.org/10.60087/jaigs.vol03.issue01.p233.

Full text
Abstract:
The proliferation of internet usage has surged dramatically, prompting individuals and businesses to conduct myriad transactions online rather than in physical spaces. The onset of the COVID-19 pandemic has further propelled this trend. Consequently, traditional forms of crime have migrated to the digital realm alongside the widespread adoption of digital technologies such as cloud computing, the Internet of Things (IoT), social media, wireless communication, and crypto currencies, amplifying security concerns in cyberspace. Notably, cybercriminals have begun offering cyber attacks as a service, automating attacks to magnify their impact. These attackers exploit vulnerabilities across hardware, software, and communication layers, perpetrating various forms of cyber attacks including distributed denial of service (DDoS), phishing, man-in-the-middle, password, remote, privilege escalation, and malware attacks. The sophistication of these attacks renders conventional protection systems, such as firewalls, intrusion detection systems, antivirus software, and access control lists, ineffective in detection. Consequently, there is an urgent imperative to devise innovative and pragmatic solutions to thwart cyber attacks. This paper elucidates the primary drivers behind cyber attacks, surveys recent attack instances, patterns, and detection methodologies, and explores contemporary technical and non-technical strategies for preemptively identifying and mitigating attacks. Leveraging cutting-edge technologies like machine learning, deep learning, cloud platforms, big data analytics, and blockchain holds promise in combating present and future cyber threats. These technological interventions can aid in malware detection, intrusion detection, spam filtering, DNS attack classification, fraud detection, identification of covert channels, and discernment of advanced persistent threats. Nonetheless, it's crucial to acknowledge that some promising solutions, notably machine learning and deep learning, are susceptible to evasion techniques, necessitating careful consideration when formulating defenses against sophisticated cyber attacks.
APA, Harvard, Vancouver, ISO, and other styles
16

Jimmy, Fnu. "Cyber security Vulnerabilities and Remediation Through Cloud Security Tools." Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023 3, no. 1 (April 12, 2024): 196–233. http://dx.doi.org/10.60087/jaigs.vol03.issue01.p234.

Full text
Abstract:
The proliferation of internet usage has surged dramatically, prompting individuals and businesses to conduct myriad transactions online rather than in physical spaces. The onset of the COVID-19 pandemic has further propelled this trend. Consequently, traditional forms of crime have migrated to the digital realm alongside the widespread adoption of digital technologies such as cloud computing, the Internet of Things (IoT), social media, wireless communication, and crypto currencies, amplifying security concerns in cyberspace. Notably, cybercriminals have begun offering cyber attacks as a service, automating attacks to magnify their impact. These attackers exploit vulnerabilities across hardware, software, and communication layers, perpetrating various forms of cyber attacks including distributed denial of service (DDoS), phishing, man-in-the-middle, password, remote, privilege escalation, and malware attacks. The sophistication of these attacks renders conventional protection systems, such as firewalls, intrusion detection systems, antivirus software, and access control lists, ineffective in detection. Consequently, there is an urgent imperative to devise innovative and pragmatic solutions to thwart cyber attacks. This paper elucidates the primary drivers behind cyber attacks, surveys recent attack instances, patterns, and detection methodologies, and explores contemporary technical and non-technical strategies for preemptively identifying and mitigating attacks. Leveraging cutting-edge technologies like machine learning, deep learning, cloud platforms, big data analytics, and blockchain holds promise in combating present and future cyber threats. These technological interventions can aid in malware detection, intrusion detection, spam filtering, DNS attack classification, fraud detection, identification of covert channels, and discernment of advanced persistent threats. Nonetheless, it's crucial to acknowledge that some promising solutions, notably machine learning and deep learning, are susceptible to evasion techniques, necessitating careful consideration when formulating defenses against sophisticated cyber attacks.
APA, Harvard, Vancouver, ISO, and other styles
17

Chetan, Rajani, and Ramesh Shahabadkar. "A Comprehensive Survey on Exiting Solution Approaches towards Security and Privacy Requirements of IoT." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 4 (August 1, 2018): 2319. http://dx.doi.org/10.11591/ijece.v8i4.pp2319-2326.

Full text
Abstract:
<em>‘Internet of Things (IoT)’</em>emerged as an intelligent collaborative computation and communication between a set of objects capable of providing on-demand services to other objects anytime anywhere. A large-scale deployment of data-driven cloud applications as well as automated physical things such as embed electronics, software, sensors and network connectivity enables a joint ubiquitous and pervasive internet-based computing systems well capable of interacting with each other in an IoT. IoT, a well-known term and a growing trend in IT arena certainly bring a highly connected global network structure providing a lot of beneficial aspects to a user regarding business productivity, lifestyle improvement, government efficiency, etc. It also generates enormous heterogeneous and homogeneous data needed to be analyzed properly to get insight into valuable information. However, adoption of this new reality (i.e., IoT) by integrating it with the internet invites a certain challenges from security and privacy perspective. At present, a much effort has been put towards strengthening the security system in IoT still not yet found optimal solutions towards current security flaws. Therefore, the prime aim of this study is to investigate the qualitative aspects of the conventional security solution approaches in IoT. It also extracts some open research problems that could affect the future research track of IoT arena.
APA, Harvard, Vancouver, ISO, and other styles
18

Singh, Satyanand, Joanna Rosak-Szyrocka, and László Tamàndl. "Development, Service-Oriented Architecture, and Security of Blockchain Technology for Industry 4.0 IoT Application." HighTech and Innovation Journal 4, no. 1 (March 1, 2023): 134–56. http://dx.doi.org/10.28991/hij-2023-04-01-010.

Full text
Abstract:
The Internet of Things (IoT) paradigm is laying the groundwork for a world in which many of our everyday devices will be connected and will interact with their surroundings to gather data and automate some operations. Among other things, such a concept necessitates seamless authentication, data privacy, security, attack resilience, simplicity of deployment, and self-maintenance. Blockchain, a technology created with the Bitcoin cryptocurrency, can provide such advantages. To create blockchain-based IoT (BIoT) applications, a full discussion of how to modify blockchain to meet the unique requirements of IoT is offered in this paper. The most important BIoT applications are detailed after a brief introduction to blockchain, with the goal of highlighting how blockchain can affect conventional cloud-based IoT applications. Then, several factors that have an impact on the design, development, and deployment of a BIoT application are covered, along with present obstacles and potential improvements. Lastly, a list of recommendations is provided to help future BIoT researchers and developers understand some of the problems that need to be solved before deploying the upcoming generation of BIoT applications. Doi: 10.28991/HIJ-2023-04-01-010 Full Text: PDF
APA, Harvard, Vancouver, ISO, and other styles
19

Kim, Jiyoon, Daniel Gerbi Duguma, Sangmin Lee, Bonam Kim, JaeDeok Lim, and Ilsun You. "Scrutinizing the Vulnerability of Ephemeral Diffie–Hellman over COSE (EDHOC) for IoT Environment Using Formal Approaches." Mobile Information Systems 2021 (September 13, 2021): 1–18. http://dx.doi.org/10.1155/2021/7314508.

Full text
Abstract:
Most existing conventional security mechanisms are insufficient, mainly attributable to their requirements for heavy processing capacity, large protocol message size, and longer round trips, for resource-intensive devices operating in an Internet of Things (IoT) context. These devices necessitate efficient communication and security protocols that are cognizant of the severe resource restrictions regarding energy, computation, communication, and storage. To realize this, the IETF (Internet Engineering Task Force) is currently working towards standardizing an ephemeral key-based lightweight and authenticated key exchange protocol called EDHOC (Ephemeral Diffie–Hellman over COSE). The protocol’s primary purpose is to build an OSCORE (Object Security for Constrained RESTful Environments) security environment by supplying crucial security properties such as secure key exchange, mutual authentication, perfect forward secrecy, and identity protection. EDHOC will most likely dominate IoT security once it becomes a standard. It is, therefore, imperative to inspect the protocol for any security flaw. In this regard, two previous studies have shown different security vulnerabilities of the protocol using formal security verification methods. Yet, both missed the vital security flaws we found in this paper: resource exhaustion and privacy attacks. In finding these vulnerabilities, we leveraged BAN-Logic and AVISPA to formally verify both EDHOC protocol variants. Consequently, we described these security flaws together with the results of the related studies and put forward recommended solutions as part of our future work.
APA, Harvard, Vancouver, ISO, and other styles
20

Chaudhary, Sachi, Riya Kakkar, Nilesh Kumar Jadav, Anuja Nair, Rajesh Gupta, Sudeep Tanwar, Smita Agrawal, et al. "A Taxonomy on Smart Healthcare Technologies: Security Framework, Case Study, and Future Directions." Journal of Sensors 2022 (July 5, 2022): 1–30. http://dx.doi.org/10.1155/2022/1863838.

Full text
Abstract:
There is a massive transformation in the traditional healthcare system from the specialist-centric approach to the patient-centric approach by adopting modern and intelligent healthcare solutions to build a smart healthcare system. It permits patients to directly share their medical data with the specialist for remote diagnosis without any human intervention. Furthermore, the remote monitoring of patients utilizing wearable sensors, Internet of Things (IoT) technologies, and artificial intelligence (AI) has made the treatment readily accessible and affordable. However, the advancement also brings several security and privacy concerns that poorly maneuvered the effective performance of the smart healthcare system. An attacker can exploit the IoT infrastructure, perform an adversarial attack on AI models, and proliferate resource starvation attacks in smart healthcare system. To overcome the aforementioned issues, in this survey, we extensively reviewed and created a comprehensive taxonomy of various smart healthcare technologies such as wearable devices, digital healthcare, and body area networks (BANs), along with their security aspects and solutions for the smart healthcare system. Moreover, we propose an AI-based architecture with the 6G network interface to secure the data exchange between patients and medical practitioners. We have examined our proposed architecture with the case study based on the COVID-19 pandemic by adopting unmanned aerial vehicles (UAVs) for data exchange. The performance of the proposed architecture is evaluated using various machine learning (ML) classification algorithms such as random forest (RF), naive Bayes (NB), logistic regression (LR), linear discriminant analysis (LDA), and perceptron. The RF classification algorithm outperforms the conventional algorithms in terms of accuracy, i.e., 98%. Finally, we present open issues and research challenges associated with smart healthcare technologies.
APA, Harvard, Vancouver, ISO, and other styles
21

Falayi, Ayodeji, Qianlong Wang, Weixian Liao, and Wei Yu. "Survey of Distributed and Decentralized IoT Securities: Approaches Using Deep Learning and Blockchain Technology." Future Internet 15, no. 5 (May 11, 2023): 178. http://dx.doi.org/10.3390/fi15050178.

Full text
Abstract:
The Internet of Things (IoT) continues to attract attention in the context of computational resource growth. Various disciplines and fields have begun to employ IoT integration technologies in order to enable smart applications. The main difficulty in supporting industrial development in this scenario involves potential risk or malicious activities occurring in the network. However, there are tensions that are difficult to overcome at this stage in the development of IoT technology. In this situation, the future of security architecture development will involve enabling automatic and smart protection systems. Due to the vulnerability of current IoT devices, it is insufficient to ensure system security by implementing only traditional security tools such as encryption and access control. Deep learning and blockchain technology has now become crucial, as it provides distinct and secure approaches to IoT network security. The aim of this survey paper is to elaborate on the application of deep learning and blockchain technology in the IoT to ensure secure utility. We first provide an introduction to the IoT, deep learning, and blockchain technology, as well as a discussion of their respective security features. We then outline the main obstacles and problems of trusted IoT and how blockchain and deep learning may be able to help. Next, we present the future challenges in integrating deep learning and blockchain technology into the IoT. Finally, as a demonstration of the value of blockchain in establishing trust, we provide a comparison between conventional trust management methods and those based on blockchain.
APA, Harvard, Vancouver, ISO, and other styles
22

Kazia, Esmeralda. "Machine learning for False Information Detection in Social Internet of Things." Fusion: Practice and Applications 10, no. 1 (2023): 38–77. http://dx.doi.org/10.54216/fpa.100103.

Full text
Abstract:
By capitalizing on object relationships and local navigability, the Social Internet of Things (SIoT) is one of the burgeoning paradigms that could solve the technical challenges of conventional IoT. Because of this paradigm's capacity to combine conventional IoT with social media, it is possible to create smart objects and services with greater utility than those created using conventional IoT infrastructures. In recent years, scholars have become interested in SIoT, leading to a plethora of works examining various mechanisms for providing services and technologies within this context. In this vein, we present a comprehensive review of recent research covering important aspects of SIoT. In this research, we give a detailed justification for the function of several machine learning paradigms and provide a practical application of hitherto unexamined concerns relating to erroneous data and other social IoT. First, we give a classification of false news detection approaches and an analysis of these techniques. Second, the potential uses for detecting fake news are examined at length, including how it might be applied to the areas of fake profile detection, traffic management, bullying detection, etc. We also suggested a detailed review of the possibilities of machine learning algorithms for detecting bogus news and intervening in social networks. In our paper, we introduce categories of fake news detection methods providing a comparison between these methods. After that, the promising applications for false news detection is extensively discussed in terms of fake account detection, bot detection, bullying detection, and security and privacy of SIoT. Also, the paper contains a discussion of the potential of machine learning approaches for fake news detection and interventions in SIoT networks along with the state-of-the-art challenges, opportunities, and future search prospects. This article seeks for aiding the readers and researchers in explaining the motive and role of the different machine learning paradigms to offer them a comprehensive realization for so far unexplored issues related to false information and other scenarios of SIoT networks.
APA, Harvard, Vancouver, ISO, and other styles
23

Satamraju, Krishna Prasad, and Malarkodi B. "Proof of Concept of Scalable Integration of Internet of Things and Blockchain in Healthcare." Sensors 20, no. 5 (March 3, 2020): 1389. http://dx.doi.org/10.3390/s20051389.

Full text
Abstract:
The advent of Internet of Things (IoT) brought innovation along with unprecedented benefits of convenience and efficacy in many operations that were otherwise very cumbersome. This innovation explosion has surfaced a new dimension of vulnerability and physical threat to the data integrity of IoT networks. Implementing conventional cryptographic algorithms on IoT devices is not future-proof as these devices are constrained in terms of computational power, performance, and memory. In this paper, we are proposing a novel framework, a unique model that integrates IoT networks with a blockchain to address potential privacy and security threats for data integrity. Smart contracts are instrumental in this integration process and they are used to handle device authentication, authorization and access-control, and data management. We further share a new design model for interfaces to integrate both platforms while highlighting its performance results over the existing models. With the incorporation of off-chain data storage into the framework, overall scalability of the system can be increased. Finally, our research concludes how the proposed framework can be fused virtually into any existing IoT applications with minimal modifications.
APA, Harvard, Vancouver, ISO, and other styles
24

., Pratibha. "Lora Based Advanced Multipurpose Security System." International Journal for Research in Applied Science and Engineering Technology 12, no. 3 (March 31, 2024): 207–14. http://dx.doi.org/10.22214/ijraset.2024.58604.

Full text
Abstract:
Abstract: As the Internet of Things (IoT) continues to evolve, the demand for advanced multipurpose security systems has become increasingly pronounced. This review paper explores the integration of Long Range (LoRa) technology into the realm of security, presenting a comprehensive analysis of its applications and benefits. LoRa's exceptional characteristics, including extended range, low power consumption, and scalability, position it as a promising solution to the limitations of traditional security systems. The paper begins with an introduction to the current challenges in security systems and the need for innovative approaches. It then delves into a detailed exploration of LoRa technology, elucidating its technical aspects and showcasing its advantages over conventional communication protocols. A critical component of the paper lies in dissecting the elements of an advanced multipurpose security system. The integration of LoRa into intrusion detection sensors, video analytics through surveillance cameras, access control systems, and seamless connectivity with smart home devices is thoroughly examined. This comprehensive approach aims to highlight the versatility and efficacy of LoRa in addressing diverse security requirements. The communication architecture section elucidates the role of LoRa as the primary communication protocol. Emphasis is placed on the implementation of mesh networking to enhance reliability and coverage, accompanied by robust data encryption protocols to secure sensitive information. Realworld implementations and case studies form a pivotal part of this review, providing tangible examples of successful LoRa-based security systems. Performance metrics and comparisons with traditional security setups serve to underscore the practical advantages of adopting LoRa in security applications. In conclusion, this paper synthesizes key findings, emphasizing the transformative impact of LoRa on advanced multipurpose security systems. The integration of LoRa technology offers a scalable, efficient, and secure solution to the evolving landscape of security challenges. The abstract serves as a precursor to a comprehensive exploration of LoRa's role in shaping the future of security systems.
APA, Harvard, Vancouver, ISO, and other styles
25

Ait Allal, Abdelmoula, Loubna El Amrani, Abdelfatteh Haidine, Khalifa Mansouri, and Mohamed Youssfi. "Implementation of 5G Communication Network for a Safe Operation of Autonomous and Conventional Ships." International Journal of Engineering Research in Africa 51 (November 2020): 229–48. http://dx.doi.org/10.4028/www.scientific.net/jera.51.229.

Full text
Abstract:
The enhanced automation of the shipping industry has increased the demand of real data exchange. The ship-owners are looking more and more to optimize the operational cost of ship, to monitor remotely the cargo and to ensure a satisfactory level of safety and security, in compliance with the international maritime organization requirements. As per international convention for the safety of life at sea requirements, a conventional ship must carry a global maritime distress safety system, depending on the sea areas where it is operating. We assume that assuring a reliable communication service in the shipping industry is a challenging issue, in an era of internet of things and the need for a ship to be continuously connected to its ecosystem. This connectivity should be with a high data rate transmission. However, the future implementation of autonomous ship beside the existing conventional ship as an alternative for a sustainable maritime industry, requires the implementation of a reliable and cost-effective communication carrier, capable to transfer operational data on live basis from ship-to-ship and from ship-to-shore without interruption with a very low latency. To achieve this goal, we propose in this work, the implementation of 5G network as a maritime communication carrier, using unmanned aerial vehicle base stations, which are placed at optimum positions. This placement results in a maximization of uplink and downlink communication data rate, low latency and efficient optimization of transmission power. These make of 5G a potential maritime communication service carrier, capable to support the safe operation of deep-sea conventional vessels and the future deployment of autonomous ships.
APA, Harvard, Vancouver, ISO, and other styles
26

Ahmed, Iqrar, Heikki Karvonen, Timo Kumpuniemi, and Marcos Katz. "Wireless Communications for the Hospital of the Future: Requirements, Challenges and Solutions." International Journal of Wireless Information Networks 27, no. 1 (October 28, 2019): 4–17. http://dx.doi.org/10.1007/s10776-019-00468-1.

Full text
Abstract:
Abstract In this conceptual paper, we discuss the concept of hospital of the future (HoF) and the requirements for its wireless connectivity. The HoF will be mostly wireless, connecting patients, healthcare professionals, sensors, computers and medical devices. Spaces of the HoF are first characterized in terms of communicational performance requirements. In order to fulfil the stringent requirements of future healthcare scenarios, such as enhanced performance, security, safety, privacy, and spectrum usage, we propose a flexible hybrid optical-radio wireless network to provide efficient, high-performance wireless connectivity for the HoF. We introduce the concept of connected HoF exploiting reconfigurable hybrid optical-radio networks. Such a network can be dynamically reconfigured to transmit and receive optical, radio or both signals, depending on the requirements of the application. We envisage that HoF will consist of numerous communication devices and hybrid optical-radio access points to transmit data using radio waves and visible light. Light-based communications exploit the idea of visible light communications (VLC), where solid-state luminaries, white light-emitting diodes (LEDs) provide both room illumination as well as optical wireless communications (OWC). The hybrid radio-optical communication system can be used in principle in every scenario of the HoF. In addition to the hybrid access, we also propose a reconfigurable optical-radio communications wireless body area network (WBAN), extending the conventional WBAN to more generic and highly flexible solution. As the radio spectrum is becoming more and more congested, hybrid wireless network approach is an attractive solution to use the spectrum more efficiently. The concept of HoF aims at enhancing healthcare while using hospital resources efficiently. The enormous surge in novel communication technologies such as internet of things (IoT) sensors and wireless medical communications devices could be undermined by spectral congestion, security, safety and privacy issues of radio networks. The considered solution, combining optical and radio transmission network could increase spectral efficiency, enhancing privacy while reducing patient exposure to radio frequency (RF). Parallel radio-optical communications can enhance reliability and security. We also discuss possible operation scenarios and applications that can be introduced in HoF as well as outline potential challenges.
APA, Harvard, Vancouver, ISO, and other styles
27

Bhujel, Sangam, and Yogachandran Rahulamathavan. "A Survey: Security, Transparency, and Scalability Issues of NFT’s and Its Marketplaces." Sensors 22, no. 22 (November 15, 2022): 8833. http://dx.doi.org/10.3390/s22228833.

Full text
Abstract:
Non-fungible Tokens (NFTs) are ownership records stored on a blockchain, and they are typically digital items such as photos and videos. In many ways, an NFT is like a conventional proof-of-purchase document, such as a paper invoice or an electronic receipt. NFTs are attractive among other things because of verifiability; each sale is recorded as a blockchain transaction, allowing ownership to be tracked. Also, NFTs can be used to transfer digital assets between two mutually distrusting parties, since both the crypto payment and the asset transfer take place in one transaction. With NFTs, all marketplaces can freely trade with the help of decentralized applications (DApps). It is currently estimated that there are over 245 NFT marketplaces (NFTM) listed with over 1000 blockchains as of August 2022 with 68 million blockchain wallet users. With the expansion of markets, they must face challenges and issues. The objective of this review is to study the market dynamics of NFT ecosystems. It also focuses on technical components that enable NFTs and their marketplace. The review provides a deeper understanding of its components, how they are related, and why they are important. The paper analyses the challenges faced by NFTs and marketplaces in terms of security, transparency, scalability, and the consequences leading to these issues and how they will address them, as well as future opportunities.
APA, Harvard, Vancouver, ISO, and other styles
28

Kabashkin, Igor, and Vladimir Perekrestov. "Ecosystem of Aviation Maintenance: Transition from Aircraft Health Monitoring to Health Management Based on IoT and AI Synergy." Applied Sciences 14, no. 11 (May 22, 2024): 4394. http://dx.doi.org/10.3390/app14114394.

Full text
Abstract:
This paper presents an in-depth exploration of the transformative impact of integrating the Internet of Things (IoT), cloud computing, and artificial intelligence (AI) within the domain of aviation maintenance. It articulates the transition from conventional health monitoring practices to a more advanced, comprehensive health management approach, leveraging these modern technologies. This paper emphasizes the pivotal shift from reactive maintenance strategies to proactive and predictive maintenance paradigms, facilitated by the real-time data collection capabilities of IoT devices and the analytical prowess of AI. This transition not only enhances the safety and reliability of flight operations but also optimizes maintenance procedures, thereby reducing operational costs and improving efficiency. This paper meticulously outlines the implementation challenges, including technological integration, regulatory compliance, and security concerns, while proposing a future research agenda to address these issues and further harness the potential of these technologies in revolutionizing aviation maintenance.
APA, Harvard, Vancouver, ISO, and other styles
29

Santoso, Lukman, and Tri Wahyu Surya Lestari. "Konparasi Syarat Keabsahan “Sebab Yang Halal” Dalam Perjanjian Konvensional Dan Perjanjian Syariah." Al-Istinbath : Jurnal Hukum Islam 2, no. 1 (July 31, 2017): 1. http://dx.doi.org/10.29240/jhi.v2i1.152.

Full text
Abstract:
As social beings, social relations are fundamental and inseparable. Social interaction that has many differences requires the existence of a specific guidance or law adopted by the community. The law is for the sake of realizing a sense of security and assured in establishing community relations, as well as to realize a good social relationship, harmonious and without having to harm others. A specific form of guidance in society is the agreement. Indonesia has three sub-systems of law that are broadly divided into namely western law, customary law, and Islamic law. The procurement of agreements in order to increase security and certainty is already inevitable in the modern era, which is rapidly growing as it is today. Therefore, before entering into an agreement, it is necessary to comply with all conditions of the validity of the agreement in order for the agreement to become valid as a law so that the purpose of the agreement can be reached. One of the terms of the validity of the treaty that is "lawful cause" is an important thing to be studied deeply by the parties who make the contract because of the difference of the legal system in its environment (Indonesia) is mainly the conventional agreement system which is used as the standard of legislation in Indonesia and the system Islamic agreement or sharia that is used as the guidance of the majority of Indonesian people who are Muslims, so that there are no things that do not want inflicted in the future
APA, Harvard, Vancouver, ISO, and other styles
30

Marinov, Val R. "Embedded Flexible Hybrid Electronics for the Internet of Things." International Symposium on Microelectronics 2015, no. 1 (October 1, 2015): 000006–13. http://dx.doi.org/10.4071/isom-2015-tp12.

Full text
Abstract:
The Internet of Things (IoT) “things” are often times described as active or smart devices and objects augmented with sensing, processing, and network capabilities. These smart objects are in the heart of the IoT concept but they alone cannot realize the full potential of IoT. The most ubiquitous objects in the IoT ecosystem, those that reside at the lowest system level and interact with the higher-level smart object, are based on the passive RFID technology. In the form of wireless passive sensors these objects are found in smart packaging, they form the backbone of the structural health monitoring systems, they provide non-invasive and continuous monitoring of physiological parameters, etc. RFID capability is already added to everyday items in the physical form of adhesive “smart” labels, enabling them to become “citizens” of the IoT ecosystem, but this “add-on“ approach increases the implementation cost and oftentimes impacts negatively the host item's form factor and appearance. It also does very little in terms of security and counterfeit prevention. On the other hand, the key economic factor that drives the deployment of the IoT is the cost at the end points. Therefore, the future of the IoT depends on developing an ultra-low-cost technology solution that can mass-produce low cost, RFID-enabled IoT objects on flexible substrates, ready for integration into everyday items. In some cases, such as in intelligent packaging, these objects will be non-obstructive and seamlessly integrated in their hosts. This integration will minimize the cost of implementation and will provide an insurmountable barrier to counterfeiters as they will need access to sophisticated and capital-intensive technologies in order to be able to alter or replicate the product's embedded configuration. Presented are two disruptive processes for packaging of ultrathin flexible hybrid electronic systems with ICs as thin as 15–20 μm and as small as 250 μm per side. The first generation technology is a modification of the conventional pick-and-place technique and has been already demonstrated on a commercial-grade roll-to-roll assembly line with packaging rates exceeding 10,000 cph. The second generation technology uses a laser beam to scan and transfer ultrathin, ultra-small ICs for high-precision assembly onto various flexible and rigid substrates. It provides packaging rates significantly exceeding those of the conventional pick-and-place equipment. Reported are also results from integrating the resulting ultrathin flexible hybrid electronic devices into thin materials such as paper and plastics.
APA, Harvard, Vancouver, ISO, and other styles
31

Farooqui, Yassir, and Swpanil M. Parikh. "Secure and Transparent Supply Chain Management using Blockchain and IoT." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 11s (October 7, 2023): 01–12. http://dx.doi.org/10.17762/ijritcc.v11i11s.8064.

Full text
Abstract:
Blockchain technology has emerged as a disruptive force across various industries, and its integration with the Internet of Things (IoT) has unlocked new avenues for supply chain management. The conventional supply chain systems often encounter challenges related to privacy, security, and data integrity. In contrast, blockchain's decentralized and tamper-proof nature ensures a secure, auditable, and transparent record of product movement within the supply chain. By leveraging the immutable properties of blockchain, the system enhances product traceability, authenticity, and accountability while significantly reducing operational costs. IoT devices are vulnerable to attack as due to low processing power, storage limitations etc. Blockchain integrated with IoT provides a solution faced by the several industries. Blockchains and smart contracts are technology that has gained massive attention. The integration of blockchain addresses these shortcomings by providing robust data security and integrity, minimizing the risk of unauthorized access or alteration. This paper presents a system that helps the industrialist to have an access to agricultural data and supply of crops data to farmer. As industries continue to embrace digitization and connectivity, the presented system offers a significant step towards a more streamlined and secure future for agricultural information sharing. This system will be effective for the supply chain management for the trusted delivery.
APA, Harvard, Vancouver, ISO, and other styles
32

Zheng, Ping, Tingting Jiang, and Fachang Wang. "Research on Auxiliary Devices for English Teaching under Intelligent Internet of Things." Mobile Information Systems 2022 (September 26, 2022): 1–11. http://dx.doi.org/10.1155/2022/8031846.

Full text
Abstract:
The advancement of Internet technology is promptly entering English classes, which fundamentally modifies the mode of English teaching. Internet of Things (IoT) is a better-linked and collaborative future for English education. The proliferation of smartphones and the Internet of Things (IoT) has made it easier for educational institutions to boost campus security, monitor vital resources, and broaden students' access to knowledge. Auxiliary devices and IoT devices give learners better access to everything from learning material to communication channels, and they give educators the capability to measure pupil learning process in real time. The response time is long in conventional English education, with low student satisfaction. Hence, in this study, the Internet of Things-assisted English Education Auxiliary Teaching Model (IoT-EEATM) has been proposed to increase teacher-student satisfaction. This study focuses on the education field, where the IoT can be utilized to create more important learning spaces using the Electronic Learning platform. This research suggests a system that allows learners to interact with surrounding physical objects virtually connected with a learning subject. An algorithm optimization technique is proposed, and data transformation technology is used to increase real-time teaching and management efficiency. The particle swarm optimization (PSO) algorithm further enhances the students' speculative abilities in English education. The authenticity and effectiveness of the particle swarm optimization method in the English teaching model are validated. The experimental results show that the proposed IoT-EEATM model improves student learning outcomes by 97.8%, satisfaction ratio by 96.4%, student-teacher interaction ratio by 98.8%, and participation ratio by 95.5%, reducing the execution time by 9.8% compared to other popular models.
APA, Harvard, Vancouver, ISO, and other styles
33

Abdulghani, Hezam Akram, Niels Alexander Nijdam, Anastasija Collen, and Dimitri Konstantas. "A Study on Security and Privacy Guidelines, Countermeasures, Threats: IoT Data at Rest Perspective." Symmetry 11, no. 6 (June 10, 2019): 774. http://dx.doi.org/10.3390/sym11060774.

Full text
Abstract:
The Internet of Things (IoT) makes our lives much easier, more valuable, and less stressful due to the development of many applications around us including smart cities, smart cars, and smart grids, offering endless services and solutions. Protecting IoT data of such applications at rest either on the objects or in the cloud is an indispensable requirement for achieving a symmetry in the handling and protection of the IoT, as we do with data created by persons and applications. This is because unauthorised access to such data may lead to harmful consequences such as linkage attacks, loss of privacy, and data manipulation. Such undesired implications may jeopardise the existence of IoT applications if protection measures are not taken, and they stem from two main factors. One is that IoT objects have limited capabilities in terms of memory capacity, battery life, and computational power that hamper the direct implementation of conventional Internet security solutions without some modifications (e.g., traditional symmetric algorithms). Another factor is the absence of widely accepted IoT security and privacy guidelines for IoT data at rest and their appropriate countermeasures, which would help IoT stakeholders (e.g., developers, manufacturers) to develop secure IoT systems and therefore enhance IoT security and privacy by design. Toward this end, we first briefly describe the main IoT security goals and identify IoT stakeholders. Moreover, we briefly discuss the most well-known data protection frameworks (e.g., General Data Protection Regulation (GDPR), Health Insurance Portability (HIPAA)). Second, we highlight potential attacks and threats against data at rest and show their violated security goals (e.g., confidentiality and integrity). Third, we review a list of protection measures by which our proposed guidelines can be accomplished. Fourth, we propose a framework of security and privacy guidelines for IoT data at rest that can be utilised to enhance IoT security and privacy by design and establish a symmetry with the protection of user-created data. Our framework also presents the link between the suggested guidelines, mitigation techniques, and attacks. Moreover, we state those IoT stakeholders (e.g., manufacturers, developers) who will benefit most from these guidelines. Finally, we suggest several open issues requiring further investigation in the future, and we also discuss the limitations of our suggested framework.
APA, Harvard, Vancouver, ISO, and other styles
34

Leng, Jiewu, Ziying Chen, Zhiqiang Huang, Xiaofeng Zhu, Hongye Su, Zisheng Lin, and Ding Zhang. "Secure Blockchain Middleware for Decentralized IIoT towards Industry 5.0: A Review of Architecture, Enablers, Challenges, and Directions." Machines 10, no. 10 (September 26, 2022): 858. http://dx.doi.org/10.3390/machines10100858.

Full text
Abstract:
Resilient manufacturing is a vision in the Industry 5.0 blueprint for satisfying sustainable development goals under pandemics or the rising individualized product needs. A resilient manufacturing strategy based on the Industrial Internet of Things (IIoT) networks plays an essential role in facilitating production and supply chain recovery. IIoT contains confidential data and private information, and many security issues arise through vulnerabilities in the infrastructure. The traditional centralized IIoT framework is not only of high cost for system configuration but also vulnerable to cyber-attacks and single-point failure, which is not suitable for achieving the resilient manufacturing vision in Industry 5.0. Recently, researchers are seeking a secure solution of middleware based on blockchain technology integration for decentralized IIoT, which can effectively protect the consistency, integrity, and availability of IIoT data by utilizing the auditing and tamper-proof features of the blockchain. This paper presented a review of secure blockchain middleware for decentralized IIoT towards Industry 5.0. Firstly, the security issues of conventional IIoT solutions and the advantages of blockchain middleware are analyzed. Secondly, an architecture of secure blockchain middleware for decentralized IIoT is proposed. Finally, enabling technologies, challenges, and future directions are reviewed. The innovation of this paper is to study and discuss the distributed blockchain middleware, investigating its ability to eliminate the risk of a single point of failure via a distributed feature in the context of resilient manufacturing in Industry 5.0 and to solve the security issues from traditional centralized IIoT. Also, the four-layer architecture of blockchain middleware presented based on the IIoT application framework is a novel aspect of this review. It is expected that the paper lays a solid foundation for making IIoT blockchain middleware a new venue for Industry 5.0 research.
APA, Harvard, Vancouver, ISO, and other styles
35

Asano, Mizuki, Takumi Miyoshi, and Taku Yamazaki. "Internet-of-Things Traffic Analysis and Device Identification Based on Two-Stage Clustering in Smart Home Environments." Future Internet 16, no. 1 (December 31, 2023): 17. http://dx.doi.org/10.3390/fi16010017.

Full text
Abstract:
Smart home environments, which consist of various Internet of Things (IoT) devices to support and improve our daily lives, are expected to be widely adopted in the near future. Owing to a lack of awareness regarding the risks associated with IoT devices and challenges in replacing or the updating their firmware, adequate security measures have not been implemented. Instead, IoT device identification methods based on traffic analysis have been proposed. Since conventional methods process and analyze traffic data simultaneously, bias in the occurrence rate of traffic patterns has a negative impact on the analysis results. Therefore, this paper proposes an IoT traffic analysis and device identification method based on two-stage clustering in smart home environments. In the first step, traffic patterns are extracted by clustering IoT traffic at a local gateway located in each smart home and subsequently sent to a cloud server. In the second step, the cloud server extracts common traffic units to represent IoT traffic by clustering the patterns obtained in the first step. Two-stage clustering can reduce the impact of data bias, because each cluster extracted in the first clustering is summarized as one value and used as a single data point in the second clustering, regardless of the occurrence rate of traffic patterns. Through the proposed two-stage clustering method, IoT traffic is transformed into time series vector data that consist of common unit patterns and can be identified based on time series representations. Experiments using public IoT traffic datasets indicated that the proposed method could identify 21 IoTs devices with an accuracy of 86.9%. Therefore, we can conclude that traffic analysis using two-stage clustering is effective for improving the clustering quality, device identification, and implementation in distributed environments.
APA, Harvard, Vancouver, ISO, and other styles
36

Lipps, Christoph, Annika Tjabben, Matthias Rüb, Jan Herbst, Sogo Pierre Sanon, Rekha Reddy, Yorman Munoz, and Hans D. Schotten. "Designing Security for the Sixth Generation: About Necessity, Concepts and Opportunities." European Conference on Cyber Warfare and Security 22, no. 1 (June 19, 2023): 267–75. http://dx.doi.org/10.34190/eccws.22.1.1207.

Full text
Abstract:
Intelligent, comprehensive and, above all, secure wireless interconnection is the driving force behind technological progress. To ensure this, the development towards Sixth Generation (6G) Wireless Systems has been launched and is scheduled to be operational by 2030. This data technology of the future turns 6G into the infrastructure of a new generation of mobile, intelligent, and context-sensitive services, available everywhere and featuring high trustworthiness and performance, relying on both, network-side and off-network context sources. In addition, the networks themselves ought to become intelligent and thus more efficient and resource-saving, which requires a high degree of automated utilization of Artificial Intelligence (AI). Building upon the principles of information and communication theory for both the physical (bit)-transmission layer (PHY) and media access, new communication concepts for 6G will be developed providing the foundations for research into new single and multi-user operation, access and core networks. The flip side of this coin of opportunities: Sophisticated technology inevitably leads to additional security vulnerabilities, open access systems and Open-Radio Access Network (O-RAN) approaches imply new attack vectors. The holistic interconnection of everything renders it ever more attractive to attackers to harm systems, and create damage. Furthermore, enhanced computational power along with quantum computers make conventional systems more vulnerable than ever, and the value of the transmitted data increases tremendously: It is not only machine and sensor data, but also very personal and healthcare data transmitted with 6G. Therefore, the aim is to build a resilient and secure 6G system capable of recognizing attacks and uncertainties, flexibly absorbing them, recovering in a timely and sustainable manner, and compensating for impaired functionality through transformation. This holistic resilience-by-design approach is based, among other things, on technology such as Quantum Key Distribution (QKD) and Post Quantum-Crypto to achieve end-to-end security, Reconfigurable Intelligent Surfaces (RISs) to rely, control and manipulate the wireless transmission channel, Wireless Optical Communication (WOC), Physical Layer Security (PhySec), but also Body Area Networks (BANs), the integration of the human body relying on biometrics and the Tactile Internet (TI). These concepts will be discussed and shed light on in the scope of this work.
APA, Harvard, Vancouver, ISO, and other styles
37

Rizwan, Ali, Dimitrios A. Karras, Jitendra Kumar, Manuel Sánchez-Chero, Marlon Martín Mogollón Taboada, and Gilder Cieza Altamirano. "An Internet of Things (IoT) Based Block Chain Technology to Enhance the Quality of Supply Chain Management (SCM)." Mathematical Problems in Engineering 2022 (July 21, 2022): 1–12. http://dx.doi.org/10.1155/2022/9679050.

Full text
Abstract:
Recent technological developments indicate possible advancements in supply chain management (SCM). These innovations have attracted a lot of interest from industries including logistics, manufacturing, packaging, and transportation. The conventional systems, however, use centralised servers to control all operations, including the exchange of raw materials, making orders, dealing with buyers and sellers, and updating orders. The network’s supply chain may thus be insecure as a result of every activity being routed via centralised servers. The danger is additionally increased by a number of difficulties, including scalability, data integrity, security, and availability. Block chain technology may be used in these circumstances to decentralise transaction processing and eliminate the need for a centralised controller. In this approach, the performance of the resource-constrained supply chain network is improved by the effective use of edge computing and priority data access. The Intelligent K-Means (IKM) clustering algorithm is suggested across the edge nodes in the current research to categorise the priority level of each piece of data. This classifier determines if the edge node has received data that is high priority or low priority. Low priority data is recorded in the log files for future data analysis. Then, to allow safe data flow in the open block chain while excluding outside parties, the High Priority Access based Smart Contract (HPASC) technique is deployed. The whole experiment was conducted in a Python environment, and variables including scalability, reaction time, throughput, and accuracy were studied. Current systems’ constrained block sizes and fork creation lengthen the time transactions must wait before being processed. The suggested methodology is quicker and uses less storage space than current block chain systems. The results show that the suggested approach works better than current blockchain technology to raise the standard of supply chain management.
APA, Harvard, Vancouver, ISO, and other styles
38

Nicol, Rozenn, and Jean-Yves Monfort. "Acoustic research for telecoms: bridging the heritage to the future." Acta Acustica 7 (2023): 64. http://dx.doi.org/10.1051/aacus/2023056.

Full text
Abstract:
In its early age, telecommunication was focused on voice communications, and acoustics was at the heart of the work related to speech coding and transmission, automatic speech recognition or speech synthesis, aiming at offering better quality (Quality of Experience or QoE) and enhanced services to users. As technology has evolved, the research themes have diversified, but acoustics remains essential. This paper gives an overview of the evolution of acoustic research for telecommunication. Communication was initially (and for a long time) only audio with a monophonic narrow-band sound (i.e. [300–3400 Hz]). After the bandwidth extension (from the wide-band [100–7000 Hz] to the full-band [20 Hz–20 kHz] range), a new break was the introduction of 3D sound, either to provide telepresence in audioconferencing or videoconferencing, or to enhance the QoE of contents such as radio, television, VOD, or video games. Loudspeaker or microphone arrays have been deployed to implement “Holophonic” or “Ambisonic” systems. The interaction between spatialized sounds and 3D images was also investigated. At the end of the 2000s, smartphones invaded our lives. Binaural sound was immediately acknowledged as the most suitable technology for reproducing 3D audio on smartphones. However, to achieve a satisfactory QoE, binaural filters need to be customized in relation with the listener’s morphology. This question is the main obstacle to a mass-market distribution of binaural sound, and its solving has prompted a large amount of work. In parallel with the development of technologies, their perceptual evaluation was an equally important area of research. In addition to conventional methods, innovative approaches have been explored for the assessment of sound spatialization, such as physiological measurement, neuroscience tools or Virtual Reality (VR). The latest development is the use of acoustics as a universal sensor for the Internet of Things (IoT) and connected environments. Microphones can be deployed, preferably with parcimony, in order to monitor surrounding sounds, with the goal of detecting information or events thanks to models of automatic sound recognition based on neural networks. Applications range from security and personal assistance to acoustic measurement of biodiversity. As for the control of environments or objects, voice commands have become widespread in recent years thanks to the tremendous progress made in speech recognition, but an even more intuitive mode based on direct control by the mind is proposed by Brain Computer Interfaces (BCIs), which rely on sensory stimulation using different modalities, among which the auditory one offers some advantages.
APA, Harvard, Vancouver, ISO, and other styles
39

Ahad, Abdul, Mohammad Tahir, Muhammad Aman Sheikh, Kazi Istiaque Ahmed, Amna Mughees, and Abdullah Numani. "Technologies Trend towards 5G Network for Smart Health-Care Using IoT: A Review." Sensors 20, no. 14 (July 21, 2020): 4047. http://dx.doi.org/10.3390/s20144047.

Full text
Abstract:
Smart health-care is undergoing rapid transformation from the conventional specialist and hospital-focused style to a distributed patient-focused manner. Several technological developments have encouraged this rapid revolution of health-care vertical. Currently, 4G and other communication standards are used in health-care for smart health-care services and applications. These technologies are crucial for the evolution of future smart health-care services. With the growth in the health-care industry, several applications are expected to produce a massive amount of data in different format and size. Such immense and diverse data needs special treatment concerning the end-to-end delay, bandwidth, latency and other attributes. It is difficult for current communication technologies to fulfil the requirements of highly dynamic and time-sensitive health care applications of the future. Therefore, the 5G networks are being designed and developed to tackle the diverse communication needs of health-care applications in Internet of Things (IoT). 5G assisted smart health-care networks are an amalgamation of IoT devices that require improved network performance and enhanced cellular coverage. Current connectivity solutions for IoT face challenges, such as the support for a massive number of devices, standardisation, energy-efficiency, device density, and security. In this paper, we present a comprehensive review of 5G assisted smart health-care solutions in IoT. We present a structure for smart health-care in 5G by categorizing and classifying existing literature. We also present key requirements for successful deployment of smart health-care systems for certain scenarios in 5G. Finally, we discuss several open issues and research challenges in 5G smart health-care solutions in IoT.
APA, Harvard, Vancouver, ISO, and other styles
40

Adebayo Olusegun Aderibigbe, Peter Efosa Ohenhen, Nwabueze Kelvin Nwaobia, Joachim Osheyor Gidiagba, and Emmanuel Chigozie Ani. "ADVANCED SENSING TECHNIQUES IN ELECTRO-MECHANICAL SYSTEMS: SURVEYING THE RISE OF SMART SENSORS AND THEIR IMPLICATIONS FOR SYSTEM ROBUSTNESS." Engineering Science & Technology Journal 4, no. 6 (December 3, 2023): 323–40. http://dx.doi.org/10.51594/estj.v4i6.628.

Full text
Abstract:
This study presents a comprehensive review of the advancements in sensing technologies within electro-mechanical systems, with a particular focus on the emergence and impact of smart sensors. The primary aim is to evaluate how these advanced sensing techniques contribute to system robustness and efficiency. The research design includes a systematic literature review, adhering to strict inclusion and exclusion criteria to ensure a focused and relevant analysis. The review encompasses a historical perspective of electro-mechanical systems, the transition from traditional to smart sensing techniques, and the implications of these advancements for various stakeholders. Key findings highlight the evolution from conventional sensing methods to sophisticated, intelligent systems enabled by technologies such as micro-electro-mechanical systems (MEMS), the Internet of Things (IoT), and artificial intelligence (AI). Smart sensors have been shown to significantly enhance the accuracy, efficiency, and reliability of electro-mechanical systems across diverse applications. The study also discusses the opportunities and challenges presented by these technologies, including the need for robust data security, integration complexities, and the development of regulatory frameworks. Strategic recommendations are provided for industry practitioners and policymakers, emphasizing the importance of adaptable and scalable sensor technologies, enhanced data analytics capabilities, and the establishment of comprehensive standards and guidelines. The study concludes with suggestions for future research directions, focusing on the long-term impacts of these technologies, their socio-economic implications, and the exploration of their interoperability with other emerging technologies. This review contributes to the understanding of the current landscape and future prospects of sensing technologies in electro-mechanical systems, offering valuable insights for researchers, industry practitioners, and policymakers in this rapidly evolving field. Keywords: Smart Sensors, Advanced Sensing Technologies, Electro-Mechanical Systems.
APA, Harvard, Vancouver, ISO, and other styles
41

Prasad, S. Rajendra, and M. Gopichand Naik. "A Review on Wind Power Forecasting Models for improved Renewable Energy Integration." International Conference on Information Science and Technology Innovation (ICoSTEC) 1, no. 1 (February 26, 2022): 35–40. http://dx.doi.org/10.35842/icostec.v1i1.20.

Full text
Abstract:
This paper gives an overview of the research that has been done on wind power forecasting models, which may be used to aid in the optimum integration of Renewable Energy (RE) into electric power networks. Aside from the economic advantages, the variable nature of wind energy production has a variety of negative consequences for the electric grid system, including stability, reliability, and the capacity to plan for future operations, among other things. As a result, precise forecasting of wind power output is critical for grid stability and security, as well as for the promotion of large-scale wind power. To ensure the accuracy of wind energy forecasts, a variety of conventional, artificial intelligence, and hybrid methodologies have been developed. The simplicity and robustness of time-series-based methods have made them popular for forecasting applications. Artificial Neural Networks (ANNs) and Fuzzy Logic have recently been supported by several researchers for forecasting because of their flexibility. This review covers the performance of many wind power forecasting models that are classified according to their categories. It is also offered a critical examination of contemporary studies, which includes statistical model and machine learning models that are based on historical data. Aspects of this study that are taken into consideration include the advantages and disadvantages of various forecasting models, including hybrid models, as well as performance matrices used in assessing the forecasting model. In addition, the possible advantages of model optimization are examined in detail as well.
APA, Harvard, Vancouver, ISO, and other styles
42

Trifunović, Darko, and Zoran Bjelica. "Cyber War - Trends and Technologies." National security and the future 21, no. 3 (March 1, 2021): 65–94. http://dx.doi.org/10.37458/nstf.21.3.2.

Full text
Abstract:
Cyberspace has become an indispensable part in which special operations such as cyber war or warfare take place. The role of special war as the use of so-called soft power was emphasized. The country's number of potential adversaries in cyber warfare is unlimited, making highly endangered aspects of cyber civilian infrastructure, which is essentially military readiness, including the mobilization of forces through the civilian sector, also a likely target. A special type of cyber war or warfare is hybrid warfare. This type of warfare is increasingly resorted to because it is extremely cheaper than the conventional method of warfare and at the same time brings exceptional results. The first thing that affects cyber security policy analysts comes with the issue of neutrality, as well as the huge variety of assessments about future attack and defense technologies. There is also a consideration that the new (problematic) cyber technology will be deployed in a short period of time, in time periods, in just a few days in terms of warnings. Second, is the trends in cyber-attack and defense technologies and who is following those processes. Third, decision making technology having in mind high-performance computers, technologies that are well known, although rapidly evolving, are increasingly seen as a basic means of managing cyber defense at the national military and security level, as well as a new weapon in the hands of opponents. Fourth, role of intelligence in planning future scenarios for defense against hybrid or any other cyber threat/s.
APA, Harvard, Vancouver, ISO, and other styles
43

Abdull Rashid, Nur Farahin, Asma' Abu-Samah, Aishah Mohd Noh, Noor Zaim Syafiq Azam, Nur Najihah Wahid, Chee Qin Chiang, Haider Alobaidy, Nor Fadzilah Abdullah, Sawal Abdul Hamid, and Rosdiadee Nordin. "DEVELOPMENT OF SMART CAMPUS APPLICATIONS BASED ON WIRELESS TECHNOLOGIES USING OPEN-SOURCE PLATFORMS." Jurnal Teknologi 84, no. 3 (March 31, 2022): 173–84. http://dx.doi.org/10.11113/jurnalteknologi.v84.16732.

Full text
Abstract:
Malaysian National Center for Education estimates that students' enrolments will increase to 17.2 million by 2028. The conventional way of managing things around campus work can be improved by applying the smart campus concept. This study showcases the potential smart campus applications with different wireless IoT technologies and their application; LoRa for Internet of Bicycle (IoB), Sigfox for water quality monitoring, IEEE 801.11p for campus active safety application, and NB-IoT for remote mangrove conservation. The prototypes consist of various sensors and online dashboards to demonstrate the open-source IoT ecosystem. For IoB, a 0.5 km radius centered at LoRa gateway’s location, proved reliable for real-time e-bicycles location monitoring. It offers locking system security to avoid bicycles steal. The SigFox-based water quality monitoring system received signal performance is adequate (RSSI -80 to -90 dBm) with a tower location approximately 3 km from the lake area. For active safety application based on IEEE 801.11p, communication of braking force, car speed, and position of cars ahead of an obstacle make this application feasible to improve road safety around campus, with the real implementation expected to be achieved in the next five to ten years. Lastly, the application of remote mangrove conservation monitoring using NB-IoT on LTE mobile network from Celcom as an independent wireless platform. It allows researchers and students from the university to use this application for their research on sustainable conservation at remote mangrove sites worldwide. The results have shown that all the wireless IoT is promising for future smart campus deployment.
APA, Harvard, Vancouver, ISO, and other styles
44

Abdull Rashid, Nur Farahin, Asma' Abu-Samah, Aishah Mohd Noh, Noor Zaim Syafiq Azam, Nur Najihah Wahid, Chee Qin Chiang, Haider Alobaidy, Nor Fadzilah Abdullah, Sawal Abdul Hamid, and Rosdiadee Nordin. "DEVELOPMENT OF SMART CAMPUS APPLICATIONS BASED ON WIRELESS TECHNOLOGIES USING OPEN-SOURCE PLATFORMS." Jurnal Teknologi 84, no. 3 (March 31, 2022): 173–84. http://dx.doi.org/10.11113/jurnalteknologi.v84.16732.

Full text
Abstract:
Malaysian National Center for Education estimates that students' enrolments will increase to 17.2 million by 2028. The conventional way of managing things around campus work can be improved by applying the smart campus concept. This study showcases the potential smart campus applications with different wireless IoT technologies and their application; LoRa for Internet of Bicycle (IoB), Sigfox for water quality monitoring, IEEE 801.11p for campus active safety application, and NB-IoT for remote mangrove conservation. The prototypes consist of various sensors and online dashboards to demonstrate the open-source IoT ecosystem. For IoB, a 0.5 km radius centered at LoRa gateway’s location, proved reliable for real-time e-bicycles location monitoring. It offers locking system security to avoid bicycles steal. The SigFox-based water quality monitoring system received signal performance is adequate (RSSI -80 to -90 dBm) with a tower location approximately 3 km from the lake area. For active safety application based on IEEE 801.11p, communication of braking force, car speed, and position of cars ahead of an obstacle make this application feasible to improve road safety around campus, with the real implementation expected to be achieved in the next five to ten years. Lastly, the application of remote mangrove conservation monitoring using NB-IoT on LTE mobile network from Celcom as an independent wireless platform. It allows researchers and students from the university to use this application for their research on sustainable conservation at remote mangrove sites worldwide. The results have shown that all the wireless IoT is promising for future smart campus deployment.
APA, Harvard, Vancouver, ISO, and other styles
45

Wang, Jiazheng, Xiuhua Fu, Rongqun Peng, and Michel Kadoch. "An Innovative Infrastructure Based on Shape-Adaptive RIS for Smart Industrial IoTs." Electronics 11, no. 3 (January 27, 2022): 391. http://dx.doi.org/10.3390/electronics11030391.

Full text
Abstract:
Industrial Internet of Things (IoTs) applications will have higher demands in terms of system capacity and wireless transmission performance in the future. Reconfigurable intelligent surfaces (RIS) for the wireless transmission environment reconstruction is currently a research hotspot in the field of wireless communication. In this paper, RIS is applied to industrial IoTs scenarios, and an innovative infrastructure based on shape-adaptive RIS suitable for smart industrial IoTs is proposed. Based on the many advantages of RIS, the proposed infrastructure can meet the significant demands of industrial IoTs in terms of network coverage, system capacity, transmission rate, and communication security. Further, in order to achieve flexible RIS phase adjustment in wider ranges, in this paper, a shape-adaptive RIS mechanism is proposed to regulate RIS-reflected waves in the shape domain, which can be achieved by scalable RIS unit sizes and macroscopically changeable physical shapes. This mechanism can reduce the requirements for RIS-controller and artificial-unit design and expand the spatial distribution of reflected beams, whereas this is difficult to achieve by conventional regulations in the spatial, time, and frequency domains. The simulation results show that, in terms of system-coverage probability, the system performance of RIS is better than that of general communication systems, and the performance of the deformable RIS-based system is the best. In terms of channel gain, the performance of the deformable RIS is related to its surface size. Moreover, the path loss caused by the long-distance transmission of wireless signals can be compensated for by increasing the RIS surface area.
APA, Harvard, Vancouver, ISO, and other styles
46

Yang, Qian, Jiaming Zhang, Junjie Zhang, Cailing Sun, Shanyi Xie, Shangdong Liu, and Yimu Ji. "Graph Transformer Network Incorporating Sparse Representation for Multivariate Time Series Anomaly Detection." Electronics 13, no. 11 (May 23, 2024): 2032. http://dx.doi.org/10.3390/electronics13112032.

Full text
Abstract:
Cyber–physical systems (CPSs) serve as the pivotal core of Internet of Things (IoT) infrastructures, such as smart grids and intelligent transportation, deploying interconnected sensing devices to monitor operating status. With increasing decentralization, the surge in sensor devices expands the potential vulnerability to cyber attacks. It is imperative to conduct anomaly detection research on the multivariate time series data that these sensors produce to bolster the security of distributed CPSs. However, the high dimensionality, absence of anomaly labels in real-world datasets, and intricate non-linear relationships among sensors present considerable challenges in formulating effective anomaly detection algorithms. Recent deep-learning methods have achieved progress in the field of anomaly detection. Yet, many methods either rely on statistical models that struggle to capture non-linear relationships or use conventional deep learning models like CNN and LSTM, which do not explicitly learn inter-variable correlations. In this study, we propose a novel unsupervised anomaly detection method that integrates Sparse Autoencoder with Graph Transformer network (SGTrans). SGTrans leverages Sparse Autoencoder for the dimensionality reduction and reconstruction of high-dimensional time series, thus extracting meaningful hidden representations. Then, the multivariate time series are mapped into a graph structure. We introduce a multi-head attention mechanism from Transformer into graph structure learning, constructing a Graph Transformer network forecasting module. This module performs attentive information propagation between long-distance sensor nodes and explicitly models the complex temporal dependencies among them to enhance the prediction of future behaviors. Extensive experiments and evaluations on three publicly available real-world datasets demonstrate the effectiveness of our approach.
APA, Harvard, Vancouver, ISO, and other styles
47

Banerjee, Indrajit, Jared Robinson, Abhishek Kashyap, Poornasha Mohabeer, and Brijesh Sathian. "COVID-19 and Artificial Intelligence: the pandemic pacifier." Nepal Journal of Epidemiology 10, no. 4 (December 31, 2020): 919–22. http://dx.doi.org/10.3126/nje.v10i4.33334.

Full text
Abstract:
COVID-19 remains a threat to the entire world. In an attempt to curb its spread and facilitate its treatment, the technological tool that is Artificial Intelligence (AI) is being researched as a potential alternative to conventional methods. Industrial Revolution 4.0 marks the dawn to the combination of digital, physical and biological systems, by application of digital skills such as Blockchain, Internet of things, Artificial Intelligence and Big data. AI tools in SARS-COV-2 pandemic are highly competitive to human performance, such as rapid screening and diagnosis of the disease, surveilling the efficacy of the treatment, keeping record and depicting active cases and mortality, inventions of medications and vaccines, relieving the workload of healthcare workers and extinguishing the spread of the disease. Contact tracing platforms like Aarogya Setu App, implemented by the Government of India, Australian Government's COVID Safe app, Trace Together- a Bluetooth-based contact tracing app developed in Singapore; based on syndromic mapping/surveillance technology. Artificial intelligence will become a mainstay in both the diagnosis and treatment of COVID-19 as well as similar pandemics in future. The application and system development will be challenging; the accuracy and rapidity of its use far outweigh this drawback. The current global technological leaders have proven that the retro modification of current data systems and applications have been indispensable in the war on COVID-19, thus permanently securing their development and application in future.
APA, Harvard, Vancouver, ISO, and other styles
48

Kaczmarczyk, Barbara, and Karolina Lis. "Perception of the Transition to a Zero-Emission Economy in the Opinion of Polish and Foreign Students: A Comparative Analysis." Energies 16, no. 18 (September 8, 2023): 6486. http://dx.doi.org/10.3390/en16186486.

Full text
Abstract:
Renewable energy sources serve as an alternative to conventional energy sources, with the main advantages being their inexhaustible nature and the absence of or significant reduction in greenhouse gas emissions. On the other hand, the development of energy production utilising renewable sources remains controversial, primarily because of the high initial costs of RES investment projects and the carbon footprint during the production phase of RES facilities. However, these appear to be gradually offset by the many benefits that outweigh the initial RES facility maintenance costs. Unsurprisingly, European Union (EU) countries are at the forefront of the transition to a low-emission economy. This is evidenced by such things as the 22% decrease in greenhouse gas emissions in the Member States, achieved despite a 58% increase in gross domestic product (GDP) between 1990 and 2017. Nonetheless, the use of renewable energy sources, such as solar, wind, water, etc., is much more expensive than burning fossil fuels. It must be stressed that the European Union’s success in this regard is influenced by the actions taken by all Member States to implement the European Green Deal and their individual targets. Furthermore, the transition to a zero-emission economy is also the result of the informed participation and involvement of all European Community residents. Therefore, there exists a need for education on renewable energy sources to facilitate the transition to a zero-emission economy in European Union countries. This education should primarily target young people, whose critical choices will shape this area in the future. It is the knowledge and awareness of young people that will largely determine whether it will be possible to limit greenhouse gas emissions by 2050. This article aimed to determine how Polish and foreign students view the transition to a zero-emission economy. The article places a special emphasis on renewable energy sources as a key factor in shaping national security in terms of sustainable ecology and friendly social development. The aim of the study was achieved through a research process using theoretical and empirical research methods. To that end, the subject literature and current legislation on renewable energy sources were analysed. Moreover, a survey was conducted among Polish and foreign students living in Poland. The analysis of the research results made it possible to formulate recommendations on how to shape national security in terms of sustainable ecology and friendly social development.
APA, Harvard, Vancouver, ISO, and other styles
49

Acquah-Andoh, Elijah, Augustine Ifelebuegu, and Stephen Theophilus. "Brexit and UK Energy Security: Perspectives from Unconventional Gas Investment and the Effects of Shale Gas on UK Energy Prices." Energies 12, no. 4 (February 14, 2019): 600. http://dx.doi.org/10.3390/en12040600.

Full text
Abstract:
Many aspects of the present and future effects on the UK economy, industry, and households, of Brexit have been researched. One thing which appears certain about Brexit is the shadow of uncertainty it casts on the future of business in the UK and its telling effects on the UK economy. It is believed that Brexit has negatively affected the level of investments in the UK, including investments in energy and crucially the upstream oil and gas, with the UK North Sea being starved of investments since 2014, leading already to increased energy bills. The UK is a net importer of natural gas—a major source of its energy, with some dependence on supplies from interconnectors from Europe. At the same time, UK energy companies participate in the common energy market which enables them to undertake arbitrage trading under the common market rules. However, both of these benefits could be lost under a Brexit scenario where the UK and EU come to a no-deal or hard border arrangement. Meanwhile, domestic production of energy in the UK has declined for nearly two decades now and import bills for natural gas are growing—they were £14.2 billion in 2017; £11.7 billion in 2016 and £13.4 billion in 2015—with Government projections indicating an upward trajectory for natural gas imports. It is however believed that the UK has great potential to exploit shale gas to her advantage in order to reduce her reliance on foreign energy which is: (1) less predictable in terms of supply and price affordability and (2) dependent on exchange rates—a primary means through which energy prices increased in 2016/17 post-Brexit referendum vote. The current study extends discussions on shale gas to cover a review of the potential of natural gas from shale formations to cushion UK households against further erratic gas prices due to Brexit and also assesses the potential effects Brexit may have had on the level of investments in shale gas, in order to suggest policy options for government consideration. Contrary to popular studies, we find evidence to suggest that shale gas has the potential to reduce energy prices for UK businesses and households at commercial extractions, under both hard and soft Brexit scenarios, but with more benefits under hard Brexit. Importantly, we find that from 2008 to 2017, average UK net export of natural gas was 5,191 GWh per year to the EU. We also find and argue that Brexit may have starved the nascent fracking industry of investments in a similar way it did to investments in conventional oil and gas and could have increased investor risk premium for shale gas development, the ultimate effect of which was a categorisation of fracking (company stock) as riskier asset for investors on the London Stock Exchange. We recommend that shale gas development be expedited to maximise its benefits to UK energy consumers post-Brexit or economic benefits from the resource could be diminished by rising operator costs due to delays and effects of the public’s perceived negative opinion of the method of extraction.
APA, Harvard, Vancouver, ISO, and other styles
50

Mizin, V. "Outlines of Strategic Stability in Global Multipolar Competition." International Trends / Mezhdunarodnye protsessy 18, no. 2 (2020): 141–68. http://dx.doi.org/10.17994/it.2020.18.2.61.8.

Full text
Abstract:
The article is devoted to the problems of ensuring strategic stability and the task of a comprehensive study of the current situation with strategic stability, developing new approaches to it, taking into account modern realities in the context of a crisis in the international situation, especially in relations between Russia and NATO, Russia and the United States. According to President Vladimir Putin, as a result, the system of strategic stability in the world continues to degrade. The main factors of this aggravation are analyzed. The task is to develop new foundations for strategic stability and assess its global parameters. The new concept of strategic stability can no longer be focused solely on the priority of preventing nuclear conflict between major nuclear powers, but must also take into account the totality of factors that determine the security situation in the realities of the modern world order. An analysis of the long-overdue systemic shift in world processes is arguably impossible without a fundamental re-evaluation of the entire perception of international security, and, above all, the concept of strategic stability, which is the theoretical basis of military policy and theoretical approaches to arms control. Academic community needs to develop a fundamentally innovative strategy for arms control in the new environment. Whether this will be a bilateral Russian-American format or a multilateral arrangement is a question that needs to be clarified in the course of diplomatic consultations. The required concept should obviously be both interdisciplinary (covering with various methodological tools a number of sciences such issues as strategic nuclear weapons, non-strategic nuclear systems, missile defense, "prompt global conventional strike", hypersonic, cyberwarfare, space, beam, drones and other "exotic" types of weapons), and multilateral (that is, it should take into account the nuclear forces and nuclear potential of "third" countries, and not just the two traditional rivals – Russia and the United States).Such a concept of strategic stability should thus be much more "holistic" and comprehensive, covering not only the military potential of the leading powers, but also taking into account their political relations and divergences, the imperative of providing restraint and preventing major conflicts in the modern world. As such, it involves a comprehensive study of the crisis realities in the international system, primarily in the Russia–NATO and Russia–US “dyads” interrelationship against the background of the emergence of new nuclear weapons stakeholders. Among other things, these factors in the global balance of power make it impossible to proceed to a nuclear-free world in the foreseeable future. In this regard, the author sets the task for the expert community to formulate certain concrete ways to implement new conceptual frameworks for assessing the global parameters of the world system's evolution, and to develop pragmatic initiatives that can be taken to improve overall stability and interaction between the United States, NATO, Russia, and other emerging global actors.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography