3,301 research outputs found
End-to-End Design for Self-Reconfigurable Heterogeneous Robotic Swarms
More widespread adoption requires swarms of robots to be more flexible for
real-world applications. Multiple challenges remain in complex scenarios where
a large amount of data needs to be processed in real-time and high degrees of
situational awareness are required. The options in this direction are limited
in existing robotic swarms, mostly homogeneous robots with limited operational
and reconfiguration flexibility. We address this by bringing elastic computing
techniques and dynamic resource management from the edge-cloud computing domain
to the swarm robotics domain. This enables the dynamic provisioning of
collective capabilities in the swarm for different applications. Therefore, we
transform a swarm into a distributed sensing and computing platform capable of
complex data processing tasks, which can then be offered as a service. In
particular, we discuss how this can be applied to adaptive resource management
in a heterogeneous swarm of drones, and how we are implementing the dynamic
deployment of distributed data processing algorithms. With an elastic drone
swarm built on reconfigurable hardware and containerized services, it will be
possible to raise the self-awareness, degree of intelligence, and level of
autonomy of heterogeneous swarms of robots. We describe novel directions for
collaborative perception, and new ways of interacting with a robotic swarm
Blockchain for the Internet of Things: Present and Future
One of the key challenges to the IoT's success is how to secure and anonymize
billions of IoT transactions and devices per day, an issue that still lingers
despite significant research efforts over the last few years. On the other
hand, technologies based on blockchain algorithms are disrupting today's
cryptocurrency markets and showing tremendous potential, since they provide a
distributed transaction ledger that cannot be tampered with or controlled by a
single entity. Although the blockchain may present itself as a cure-all for the
IoT's security and privacy challenges, significant research efforts still need
to be put forth to adapt the computation-intensive blockchain algorithms to the
stringent energy and processing constraints of today's IoT devices. In this
paper, we provide an overview of existing literature on the topic of blockchain
for IoT, and present a roadmap of research challenges that will need to be
addressed to enable the usage of blockchain technologies in the IoT
Blockchain Based Intelligent Vehicle Data sharing Framework
The Intelligent vehicle (IV) is experiencing revolutionary growth in research
and industry, but it still suffers from many security vulnerabilities.
Traditional security methods are incapable to provide secure IV data sharing.
The major issues in IV data sharing are trust, data accuracy and reliability of
data sharing data in the communication channel. Blockchain technology works for
the crypto currency, Bit-coin, which is recently used to build trust and
reliability in peer-to-peer networks having similar topologies as IV Data
sharing. In this paper, we have proposed Intelligent Vehicle data sharing we
are proposing a trust environment based Intelligent Vehicle framework. In
proposed framework, we have use the blockchain technology as backbone of the IV
data-sharing environment. The blockchain technology is provide the trust
environment between the vehicles with the based on proof of driving.Comment: 4 pages, 5 figures. arXiv admin note: substantial text overlap with
arXiv:1707.0744
Blockchain and its Role in the Internet of Things (IoT)
Blockchain (BC) in the Internet of Things (IoT) is a novel technology that
acts with decentralized, distributed, public and real-time ledger to store
transactions among IoT nodes. A blockchain is a series of blocks, each block is
linked to its previous blocks. Every block has the cryptographic hash code,
previous block hash, and its data. The transactions in BC are the basic units
that are used to transfer data between IoT nodes. The IoT nodes are different
kind of physical but smart devices with embedded sensors, actuators, programs
and able to communicate with other IoT nodes. The role of BC in IoT is to
provide a procedure to process secured records of data through IoT nodes. BC is
a secured technology that can be used publicly and openly. IoT requires this
kind of technology to allow secure communication among IoT nodes in
heterogeneous environment. The transactions in BC could be traced and explored
through anyone who are authenticated to communicate within the IoT. The BC in
IoT may help to improve the communication security. In this paper, I explored
this approach, its opportunities and challenges.Comment: 7 Page
From Trend Analysis to Virtual World System Design Requirement Satisfaction Study
Virtual worlds have become global platforms connecting millions of people and
containing various technologies. The development of technology, shift of market
value, and change of user preference shape the features of virtual worlds. In
this paper, we first study the new features of virtual worlds and emergent
requirements of system development through trend analysis. Based on the trend
analysis, we constructed the new design requirement space. We then discuss the
requirement satisfaction of existing virtual world system architectures and
highlight their limitations through a literature survey. The comparison of
existing system architectures sheds some light on future virtual world system
development to match the changing trends of the user market. At the end of this
study, we briefly introduce our ongoing study, a new architecture, called
Virtual Net, and discuss its possibility in requirement satisfaction and new
research challenges.Comment: 30 pages, 8 figures, 2 table
Energy and Information Management of Electric Vehicular Network: A Survey
The connected vehicle paradigm empowers vehicles with the capability to
communicate with neighboring vehicles and infrastructure, shifting the role of
vehicles from a transportation tool to an intelligent service platform.
Meanwhile, the transportation electrification pushes forward the electric
vehicle (EV) commercialization to reduce the greenhouse gas emission by
petroleum combustion. The unstoppable trends of connected vehicle and EVs
transform the traditional vehicular system to an electric vehicular network
(EVN), a clean, mobile, and safe system. However, due to the mobility and
heterogeneity of the EVN, improper management of the network could result in
charging overload and data congestion. Thus, energy and information management
of the EVN should be carefully studied. In this paper, we provide a
comprehensive survey on the deployment and management of EVN considering all
three aspects of energy flow, data communication, and computation. We first
introduce the management framework of EVN. Then, research works on the EV
aggregator (AG) deployment are reviewed to provide energy and information
infrastructure for the EVN. Based on the deployed AGs, we present the research
work review on EV scheduling that includes both charging and vehicle-to-grid
(V2G) scheduling. Moreover, related works on information communication and
computing are surveyed under each scenario. Finally, we discuss open research
issues in the EVN
MOTIVE: Micropayments for trusted vehicular services
Increasingly, connected cars are becoming a decentralized data platform. With
greater autonomy, they have growing needs for computation and perceiving the
world around them through sensors. While todays generation of vehicles carry
all the necessary sensor data and computation on board, we envision a future
where vehicles can cooperate to increase their perception of the world beyond
their immediate view, resulting in greater safety, coordination and more
comfortable experience for their human occupants. In order for vehicles to
obtain data, compute and other services from other vehicles or road side
infrastructure, it is important to be able to make micro payments for those
services and for the services to run seamlessly despite the challenges posed by
mobility and ephemeral interactions with a dynamic set of neighboring devices.
We present MOTIVE, a trusted and decentralized framework that allows vehicles
to make peer to peer micropayments for data, compute and other services
obtained from other vehicles or road side infrastructure within radio range.
The framework utilizes distributed ledger technologies including smart
contracts to enable autonomous operation and trusted interactions between
vehicles and nearby entities
Dependability in Edge Computing
Edge computing is the practice of placing computing resources at the edges of
the Internet in close proximity to devices and information sources. This, much
like a cache on a CPU, increases bandwidth and reduces latency for applications
but at a potential cost of dependability and capacity. This is because these
edge devices are often not as well maintained, dependable, powerful, or robust
as centralized server-class cloud resources. This article explores
dependability and deployment challenges in the field of edge computing, what
aspects are solvable with today's technology, and what aspects call for new
solutions.
The first issue addressed is failures, both hard (crash, hang, etc.) and soft
(performance-related), and real-time constraint violation. In this domain, edge
computing bolsters real-time system capacity through reduced end-to-end
latency. However, much like cache misses, overloaded or malfunctioning edge
computers can drive latency beyond tolerable limits. Second, decentralized
management and device tampering can lead to chain of trust and security or
privacy violations. Authentication, access control, and distributed intrusion
detection techniques have to be extended from current cloud deployments and
need to be customized for the edge ecosystem. The third issue deals with
handling multi-tenancy in the typically resource-constrained edge devices and
the need for standardization to allow for interoperability across vendor
products.
We explore the key challenges in each of these three broad issues as they
relate to dependability of edge computing and then hypothesize about promising
avenues of work in this area
Blockchain access control Ecosystem for Big Data security
In recent years, the advancement in modern technologies has experienced an
explosion of huge data sets being captured and recorded in different fields,
but also given rise to concerns the security and protection of data storage,
transmission, processing, and access to data. The blockchain is a distributed
ledger that records transactions in a secure, flexible, verifiable and
permanent way. Transactions in a blockchain can be an exchange of an asset, the
execution of the terms of a smart contract, or an update to a record. In this
paper, we have developed a blockchain access control ecosystem that gives asset
owners the sovereign right to effectively manage access control of large data
sets and protect against data breaches. The Linux Foundation's Hyperledger
Fabric blockchain is used to run the business network while the Hyperledger
composer tool is used to implement the smart contracts or transaction
processing functions that run on the blockchain network
Differential Privacy Techniques for Cyber Physical Systems: A Survey
Modern cyber physical systems (CPSs) has widely being used in our daily lives
because of development of information and communication technologies (ICT).With
the provision of CPSs, the security and privacy threats associated to these
systems are also increasing. Passive attacks are being used by intruders to get
access to private information of CPSs. In order to make CPSs data more secure,
certain privacy preservation strategies such as encryption, and k-anonymity
have been presented in the past. However, with the advances in CPSs
architecture, these techniques also needs certain modifications. Meanwhile,
differential privacy emerged as an efficient technique to protect CPSs data
privacy. In this paper, we present a comprehensive survey of differential
privacy techniques for CPSs. In particular, we survey the application and
implementation of differential privacy in four major applications of CPSs named
as energy systems, transportation systems, healthcare and medical systems, and
industrial Internet of things (IIoT). Furthermore, we present open issues,
challenges, and future research direction for differential privacy techniques
for CPSs. This survey can serve as basis for the development of modern
differential privacy techniques to address various problems and data privacy
scenarios of CPSs.Comment: 46 pages, 12 figure
- …