2,552 research outputs found

    Secure and Privacy-Preserving Data Aggregation Protocols for Wireless Sensor Networks

    Get PDF
    This chapter discusses the need of security and privacy protection mechanisms in aggregation protocols used in wireless sensor networks (WSN). It presents a comprehensive state of the art discussion on the various privacy protection mechanisms used in WSNs and particularly focuses on the CPDA protocols proposed by He et al. (INFOCOM 2007). It identifies a security vulnerability in the CPDA protocol and proposes a mechanism to plug that vulnerability. To demonstrate the need of security in aggregation process, the chapter further presents various threats in WSN aggregation mechanisms. A large number of existing protocols for secure aggregation in WSN are discussed briefly and a protocol is proposed for secure aggregation which can detect false data injected by malicious nodes in a WSN. The performance of the protocol is also presented. The chapter concludes while highlighting some future directions of research in secure data aggregation in WSNs.Comment: 32 pages, 7 figures, 3 table

    A role-based software architecture to support mobile service computing in IoT scenarios

    Get PDF
    The interaction among components of an IoT-based system usually requires using low latency or real time for message delivery, depending on the application needs and the quality of the communication links among the components. Moreover, in some cases, this interaction should consider the use of communication links with poor or uncertain Quality of Service (QoS). Research efforts in communication support for IoT scenarios have overlooked the challenge of providing real-time interaction support in unstable links, making these systems use dedicated networks that are expensive and usually limited in terms of physical coverage and robustness. This paper presents an alternative to address such a communication challenge, through the use of a model that allows soft real-time interaction among components of an IoT-based system. The behavior of the proposed model was validated using state machine theory, opening an opportunity to explore a whole new branch of smart distributed solutions and to extend the state-of-the-art and the-state-of-the-practice in this particular IoT study scenario.Peer ReviewedPostprint (published version

    Social Media for Cities, Counties and Communities

    Get PDF
    Social media (i.e., Twitter, Facebook, Flickr, YouTube) and other tools and services with user- generated content have made a staggering amount of information (and misinformation) available. Some government officials seek to leverage these resources to improve services and communication with citizens, especially during crises and emergencies. Yet, the sheer volume of social data streams generates substantial noise that must be filtered. Potential exists to rapidly identify issues of concern for emergency management by detecting meaningful patterns or trends in the stream of messages and information flow. Similarly, monitoring these patterns and themes over time could provide officials with insights into the perceptions and mood of the community that cannot be collected through traditional methods (e.g., phone or mail surveys) due to their substantive costs, especially in light of reduced and shrinking budgets of governments at all levels. We conducted a pilot study in 2010 with government officials in Arlington, Virginia (and to a lesser extent representatives of groups from Alexandria and Fairfax, Virginia) with a view to contributing to a general understanding of the use of social media by government officials as well as community organizations, businesses and the public. We were especially interested in gaining greater insight into social media use in crisis situations (whether severe or fairly routine crises, such as traffic or weather disruptions)

    A Mini Review of Peer-to-Peer (P2P) for Vehicular Communication

    Get PDF
    In recent times, peer-to-peer (P2P) has evolved, where it leverages the capability to scale compared to server-based networks. Consequently, P2P has appeared to be the future distributed systems in emerging several applications. P2P is actually a disruptive technology for setting up applications that scale to numerous concurrent individuals. Thus, in a P2P distributed system, individuals become themselves as peers through contributing, sharing, and managing the resources in a network. In this paper, P2P for vehicular communication is explored. A comprehensive of the functioning concept of both P2P along with vehicular communication is examined. In addition, the advantages are furthermore conversed for a far better understanding on the implementation

    Energy Efficient Bandwidth Management in Wireless Sensor Network

    Get PDF

    Principles for Designing Context-Aware Applications for Physical Activity Promotion

    Full text link
    Mobile devices with embedded sensors have become commonplace, carried by billions of people worldwide. Their potential to influence positive health behaviors such as physical activity in people is just starting to be realized. Two critical ingredients, an accurate understanding of human behavior and use of that knowledge for building computational models, underpin all emerging behavior change applications. Early research prototypes suggest that such applications would facilitate people to make difficult decisions to manage their complex behaviors. However, the progress towards building real-world systems that support behavior change has been much slower than expected. The extreme diversity in real-world contextual conditions and user characteristics has prevented the conception of systems that scale and support end-users’ goals. We believe that solutions to the many challenges of designing context-aware systems for behavior change exist in three areas: building behavior models amenable to computational reasoning, designing better tools to improve our understanding of human behavior, and developing new applications that scale existing ways of achieving behavior change. With physical activity as its focus, this thesis addresses some crucial challenges that can move the field forward. Specifically, this thesis provides the notion of sweet spots, a phenomenological account of how people make and execute their physical activity plans. The key contribution of this concept is in its potential to improve the predictability of computational models supporting physical activity planning. To further improve our understanding of the dynamic nature of human behavior, we designed and built Heed, a low-cost, distributed and situated self-reporting device. Heed’s single-purpose and situated nature proved its use as the preferred device for self-reporting in many contexts. We finally present a crowdsourcing system that leverages expert knowledge to write personalized behavior change messages for large-scale context-aware applications.PHDInformationUniversity of Michigan, Horace H. Rackham School of Graduate Studieshttps://deepblue.lib.umich.edu/bitstream/2027.42/144089/1/gparuthi_1.pd

    A Secure Integrated Framework for Fog-Assisted Internet of Things Systems

    Get PDF
    Fog-Assisted Internet of Things (Fog-IoT) systems are deployed in remote and unprotected environments, making them vulnerable to security, privacy, and trust challenges. Existing studies propose security schemes and trust models for these systems. However, mitigation of insider attacks, namely blackhole, sinkhole, sybil, collusion, self-promotion, and privilege escalation, has always been a challenge and mostly carried out by the legitimate nodes. Compared to other studies, this paper proposes a framework featuring attribute-based access control and trust-based behavioural monitoring to address the challenges mentioned above. The proposed framework consists of two components, the security component (SC) and the trust management component (TMC). SC ensures data confidentiality, integrity, authentication, and authorization. TMC evaluates Fog-IoT entities’ performance using a trust model based on a set of QoS and network communication features. Subsequently, trust is embedded as an attribute within SC’s access control policies, ensuring that only trusted entities are granted access to fog resources. Several attacking scenarios, namely DoS, DDoS, probing, and data theft are designed to elaborate on how the change in trust triggers the change in access rights and, therefore, validates the proposed integrated framework’s design principles. The framework is evaluated on a Raspberry Pi 3 Model B to benchmark its performance in terms of time and memory complexity. Our results show that both SC and TMC are lightweight and suitable for resource-constrained devices

    #OceanOptimism: Balancing the Narrative About the Future of the Ocean

    Get PDF
    The ocean is facing multiple pressures from human activities, including the effects of climate change. Science has a prominent role in identifying problems and communicating these to society. However, scientists are also increasingly taking an active role in developing solutions, including strategies for adapting to and mitigating climate change, increasing food security, and reducing pollution. Transmitting these solutions to society changes our narrative about the ocean and motivates actions. The United Nations triple initiatives for this decade—the Sustainable Development Goals, the Decade on Ocean Science for Sustainable Development, and the Decade of Ecosystem Restoration—provide the momentum for this change in narrative and focus. Here, we reflect on the search for solutions and the need for better ways of communicating science in a positive way. We synthesize insights from a summer school held during the COVID-19 pandemic and present some examples of successes and failures and the lessons learned from these.#OceanOptimism: Balancing the Narrative About the Future of the OceanpublishedVersio

    Optimizing Digital Integrated Care via Microâ Randomized Trials

    Full text link
    Peer Reviewedhttps://deepblue.lib.umich.edu/bitstream/2027.42/144704/1/cpt1079.pdfhttps://deepblue.lib.umich.edu/bitstream/2027.42/144704/2/cpt1079_am.pd
    • …
    corecore