12,456 research outputs found

    Interoperability, Trust Based Information Sharing Protocol and Security: Digital Government Key Issues

    Full text link
    Improved interoperability between public and private organizations is of key significance to make digital government newest triumphant. Digital Government interoperability, information sharing protocol and security are measured the key issue for achieving a refined stage of digital government. Flawless interoperability is essential to share the information between diverse and merely dispersed organisations in several network environments by using computer based tools. Digital government must ensure security for its information systems, including computers and networks for providing better service to the citizens. Governments around the world are increasingly revolving to information sharing and integration for solving problems in programs and policy areas. Evils of global worry such as syndrome discovery and manage, terror campaign, immigration and border control, prohibited drug trafficking, and more demand information sharing, harmonization and cooperation amid government agencies within a country and across national borders. A number of daunting challenges survive to the progress of an efficient information sharing protocol. A secure and trusted information-sharing protocol is required to enable users to interact and share information easily and perfectly across many diverse networks and databases globally.Comment: 20 page

    A survey on cyber security for smart grid communications

    Get PDF
    A smart grid is a new form of electricity network with high fidelity power-flow control, self-healing, and energy reliability and energy security using digital communications and control technology. To upgrade an existing power grid into a smart grid, it requires significant dependence on intelligent and secure communication infrastructures. It requires security frameworks for distributed communications, pervasive computing and sensing technologies in smart grid. However, as many of the communication technologies currently recommended to use by a smart grid is vulnerable in cyber security, it could lead to unreliable system operations, causing unnecessary expenditure, even consequential disaster to both utilities and consumers. In this paper, we summarize the cyber security requirements and the possible vulnerabilities in smart grid communications and survey the current solutions on cyber security for smart grid communications. © 2012 IEEE

    Mitigating Security Threats for Digital Twin Platform: A Systematic Review with Future Scope and Research Challenges

    Get PDF
    In Industry 4.0, the digital twin (DT) enables users to simulate future states and configurations for prediction, optimization, and estimation. Although the potential of digital twin technology has been demonstrated by its proliferation in traditional industrial sectors, including construction, manufacturing, transportation, supply chain, healthcare, and agriculture, the risks involved with their integration have frequently been overlooked. Moreover, as a digital approach, it is intuitive to believe it is susceptible to adversarial attacks. This issue necessitates research into the multitude of attacks that the digital twin may face. This study enumerates various probable operation-specific attacks against digital twin platforms. Also, a comprehensive review of different existing techniques has been carried out to combat these attacks. A comparison of these strategies is provided to shed light on their efficacy against various attacks. Finally, future directions and research issues are highlighted that will help researchers expand the digital twin platform

    Digital Twin Technology: A Review of Its Applications and Prominent Challenges

    Get PDF
    Digital twin is a virtual representation of physical product that is used as benchmark to evaluate, diagnose, optimize and supervise operational performance of products before venturing into mass full production in accordance with global standard. Digital twin merges virtual and physical objects together via sensors and IoT to transmit data and keep traces of objects interactivity within present environments. In virtual model environment, digital twin permits product troubleshooting and testing to minimize rate of failure and product defects during product manufacturing to enhance effectiveness and customers’ satisfaction. Digital twin is utilized throughout product life-cycle to simulate, optimize and predict product quality before final production is financed. Digital twin is beneficial to modern digital society because attitude of modern factory workers can be boosted to improve motivation to work. Digital twin has come to stay, future product suppliers may be required to put forward digital twin of their products beforehand for virtual lab testing before making order while suppliers that fail to comply may be left over. With emergence of digital twin, virtual testing can be conducted on proposed products before finding their ways into physical marketplaces. Business sector remains most beneficiaries of digital twin to predict present and future state of physical product via digital peer analysis. Today, digital twin application can support enterprises by improving product performances, decision making and customers’ satisfactions on logistic and operational workflow. However, in this survey of digital twin research, efforts have been made to review in detail about digital twin, its impact and benefits to modern society, its architecture; security challenges and how solutions are proffered. It is believed that ICT experts, manufacturers and industries will leverage on this research to improve QoS (Quality of Service) for new and future products to take full advantage of profits on investment returns via digital twin

    New Waves of IoT Technologies Research – Transcending Intelligence and Senses at the Edge to Create Multi Experience Environments

    Get PDF
    The next wave of Internet of Things (IoT) and Industrial Internet of Things (IIoT) brings new technological developments that incorporate radical advances in Artificial Intelligence (AI), edge computing processing, new sensing capabilities, more security protection and autonomous functions accelerating progress towards the ability for IoT systems to self-develop, self-maintain and self-optimise. The emergence of hyper autonomous IoT applications with enhanced sensing, distributed intelligence, edge processing and connectivity, combined with human augmentation, has the potential to power the transformation and optimisation of industrial sectors and to change the innovation landscape. This chapter is reviewing the most recent advances in the next wave of the IoT by looking not only at the technology enabling the IoT but also at the platforms and smart data aspects that will bring intelligence, sustainability, dependability, autonomy, and will support human-centric solutions.acceptedVersio

    Data Spaces

    Get PDF
    This open access book aims to educate data space designers to understand what is required to create a successful data space. It explores cutting-edge theory, technologies, methodologies, and best practices for data spaces for both industrial and personal data and provides the reader with a basis for understanding the design, deployment, and future directions of data spaces. The book captures the early lessons and experience in creating data spaces. It arranges these contributions into three parts covering design, deployment, and future directions respectively. The first part explores the design space of data spaces. The single chapters detail the organisational design for data spaces, data platforms, data governance federated learning, personal data sharing, data marketplaces, and hybrid artificial intelligence for data spaces. The second part describes the use of data spaces within real-world deployments. Its chapters are co-authored with industry experts and include case studies of data spaces in sectors including industry 4.0, food safety, FinTech, health care, and energy. The third and final part details future directions for data spaces, including challenges and opportunities for common European data spaces and privacy-preserving techniques for trustworthy data sharing. The book is of interest to two primary audiences: first, researchers interested in data management and data sharing, and second, practitioners and industry experts engaged in data-driven systems where the sharing and exchange of data within an ecosystem are critical

    Application of Trustworthy IoT Technology in Fast Communities: Smart Access Control

    Get PDF
    As a response to the current development status and existing problems in the ubiquitous and trustworthy aspect of the Internet of Things (IoT) in the construction of smart community systems in Bangladesh, this paper presents the trustworthy technology strategy of the ubiquitous and trustworthy IoT intelligent system. Additionally, it provides a list of the demonstration application practice of trustworthy IoT technology at the level of smart communities through three different application scenario project construction cases. These cases include smart access control, smart buildings' construction, and smart parks' construction.&nbsp

    Hybrid Turbo-Shaft Engine Digital Twinning for Autonomous Aircraft via AI and Synthetic Data Generation

    Get PDF
    Autonomous aircraft are the key enablers of future urban services, such as postal and transportation systems. Digital twins (DTs) are promising cutting-edge technologies that can transform the future transport ecosystem into an autonomous and resilient system. However, since DT is a data-driven solution based on AI, proper data management is essential in implementing DT as a service (DTaaS). One of the challenges in DT development is the availability of real-life data, particularly for training algorithms and verifying the functionality of DT. The current article focuses on data augmentation through synthetic data generation. This approach can facilitate the development of DT in case the developers do not have enough data to train the machine learning (ML) algorithm. The current twinning approach provides a prospective ideal state of the engine used for proactive monitoring of the engine’s health as an anomaly detection service. In line with the track of unmanned aircraft vehicles (UAVs) for urban air mobility in smart city applications, this paper focuses specifically on the common hybrid turbo-shaft in drones/helicopters. However, there is a significant gap in real-life similar synthetic data generation in the UAV domain literature. Therefore, rolling linear regression and Kalman filter algorithms were implemented on noise-added data, which simulate the data measured from the engine in a real-life operational life cycle. For both thermal and hybrid models, the corresponding DT model has shown high efficiency in noise filtration and a certain amount of predictions with a lower error rate on all engine parameters except the engine torque
    • …
    corecore