8,675 research outputs found
Securing NextG networks with physical-layer key generation: A survey
As the development of next-generation (NextG) communication networks continues, tremendous devices are accessing the network and the amount of information is exploding. However, with the increase of sensitive data that requires confidentiality to be transmitted and stored in the network, wireless network security risks are further amplified. Physical-layer key generation (PKG) has received extensive attention in security research due to its solid information-theoretic security proof, ease of implementation, and low cost. Nevertheless, the applications of PKG in the NextG networks are still in the preliminary exploration stage. Therefore, we survey existing research and discuss (1) the performance advantages of PKG compared to cryptography schemes, (2) the principles and processes of PKG, as well as research progresses in previous network environments, and (3) new application scenarios and development potential for PKG in NextG communication networks, particularly analyzing the effect and prospects of PKG in massive multiple-input multiple-output (MIMO), reconfigurable intelligent surfaces (RISs), artificial intelligence (AI) enabled networks, integrated space-air-ground network, and quantum communication. Moreover, we summarize open issues and provide new insights into the development trends of PKG in NextG networks
UMSL Bulletin 2023-2024
The 2023-2024 Bulletin and Course Catalog for the University of Missouri St. Louis.https://irl.umsl.edu/bulletin/1088/thumbnail.jp
IoT-Based Vehicle Monitoring and Driver Assistance System Framework for Safety and Smart Fleet Management
Curbing road accidents has always been one of the utmost priorities in every country. In Malaysia, Traffic Investigation and Enforcement Department reported that Malaysia’s total number of road accidents has increased from 373,071 to 533,875 in the last decade. One of the significant causes of road accidents is driver’s behaviours. However, drivers’ behaviour was challenging to regulate by the enforcement team or fleet operators, especially heavy vehicles. We proposed adopting the Internet of Things (IoT) and its’ emerging technologies to monitor and alert driver’s behavioural and driving patterns in reducing road accidents. In this work, we proposed a lane tracking and iris detection algorithm to monitor and alert the driver’s behaviour when the vehicle sways away from the lane and the driver feeling drowsy, respectively. We implemented electronic devices such as cameras, a global positioning system module, a global system communication module, and a microcontroller as an intelligent transportation system in the vehicle. We implemented face recognition for person identification using the same in-vehicle camera and recorded the working duration for authentication and operation health monitoring, respectively. With the GPS module, we monitored and alerted against permissible vehicle’s speed accordingly. We integrated IoT on the system for the fleet centre to monitor and alert the driver’s behavioural activities in real-time through the user access portal. We validated it successfully on Malaysian roads. The outcome of this pilot project benefits the safety of drivers, public road users, and passengers. The impact of this framework leads to a new regulation by the government agencies towards merit and demerit system, real-time fleet monitoring of intelligent transportation systems, and socio-economy such as cheaper health premiums. The big data can be used to predict the driver’s behavioural in the future
Challenges in the Design and Implementation of IoT Testbeds in Smart-Cities : A Systematic Review
Advancements in wireless communication and the increased accessibility to low-cost sensing and data processing IoT technologies have increased the research and development of urban monitoring systems. Most smart city research projects rely on deploying proprietary IoT testbeds for indoor and outdoor data collection. Such testbeds typically rely on a three-tier architecture composed of the Endpoint, the Edge, and the Cloud. Managing the system's operation whilst considering the security and privacy challenges that emerge, such as data privacy controls, network security, and security updates on the devices, is challenging. This work presents a systematic study of the challenges of developing, deploying and managing urban monitoring testbeds, as experienced in a series of urban monitoring research projects, followed by an analysis of the relevant literature. By identifying the challenges in the various projects and organising them under the V-model development lifecycle levels, we provide a reference guide for future projects. Understanding the challenges early on will facilitate current and future smart-cities IoT research projects to reduce implementation time and deliver secure and resilient testbeds
LATEST ADVANCES ON SECURITY ARCHITECTURE FOR 5G TECHNOLOGY AND SERVICES
The roll out of the deployment of the 5G technology has been ongoing globally. The
deployment of the technologies associated with 5G has seen mixed reaction as regards its
prospects to improve communication services in all spares of life amid its security concerns. The
security concerns of 5G network lies in its architecture and other technologies that optimize the
performance of its architecture. There are many fractions of 5G security architecture in the
literature, a holistic security architectural structure will go a long way in tackling the security
challenges. In this paper, the review of the security challenges of the 5G technology based on its
architecture is presented along with their proposed solutions. This review was carried out with
some keywords relating to 5G securities and architecture; this was used to retrieve appropriate
literature for fitness of purpose. The 5G security architectures are mojorly centered around the
seven network security layers; thereby making each of the layers a source of security concern on
the 5G network. Many of the 5G security challenges are related to authentication and authorization
such as denial-of-service attacks, man in the middle attack and eavesdropping. Different methods
both hardware (Unmanned Aerial Vehicles, field programmable logic arrays) and software (Artificial
intelligence, Machine learning, Blockchain, Statistical Process Control) has been proposed for
mitigating the threats. Other technologies applicable to 5G security concerns includes: Multi-radio
access technology, smart-grid network and light fidelity. The implementation of these solutions
should be reviewed on a timely basis because of the dynamic nature of threats which will greatly
reduce the occurrence of security attacks on the 5G network
Writing Facts: Interdisciplinary Discussions of a Key Concept in Modernity
"Fact" is one of the most crucial inventions of modern times. Susanne Knaller discusses the functions of this powerful notion in the arts and the sciences, its impact on aesthetic models and systems of knowledge. The practice of writing provides an effective procedure to realize and to understand facts. This concerns preparatory procedures, formal choices, models of argumentation, and narrative patterns. By considering "writing facts" and "writing facts", the volume shows why and how "facts" are a result of knowledge, rules, and norms as well as of description, argumentation, and narration. This approach allows new perspectives on »fact« and its impact on modernity
Southern Adventist University Undergraduate Catalog 2022-2023
Southern Adventist University\u27s undergraduate catalog for the academic year 2022-2023.https://knowledge.e.southern.edu/undergrad_catalog/1121/thumbnail.jp
SugarChain: Blockchain technology meets Agriculture -- The case study and analysis of the Indian sugarcane farming
Not only in our country and Asia, but the agriculture sector is also lagging
all over the world while using new technologies and innovations. Farmers are
not getting the accurate price and compensation of their products because of
several reasons. The intermediate persons or say middlemen are controlling the
prices and product delivery on their own. Due to lack of education,
technological advancement, market knowledge, post-harvesting processes, and
middleman involvement, farmers are always deprived of their actual pay and
efforts. The use of blockchain technology can help such farmers to automate the
process with high trust. We have presented our case study and analysis for the
Indian sugarcane farming with data collected from farmers. The system
implementation, testing, and result analysis has been shown based on the case
study. The overall purpose of our research is to emphasize and motivate the
agricultural products and benefit the farmers with the use of blockchain
technology.Comment: 17 page
- …