6,206 research outputs found

    UMSL Bulletin 2023-2024

    Get PDF
    The 2023-2024 Bulletin and Course Catalog for the University of Missouri St. Louis.https://irl.umsl.edu/bulletin/1088/thumbnail.jp

    Challenges in the Design and Implementation of IoT Testbeds in Smart-Cities : A Systematic Review

    Get PDF
    Advancements in wireless communication and the increased accessibility to low-cost sensing and data processing IoT technologies have increased the research and development of urban monitoring systems. Most smart city research projects rely on deploying proprietary IoT testbeds for indoor and outdoor data collection. Such testbeds typically rely on a three-tier architecture composed of the Endpoint, the Edge, and the Cloud. Managing the system's operation whilst considering the security and privacy challenges that emerge, such as data privacy controls, network security, and security updates on the devices, is challenging. This work presents a systematic study of the challenges of developing, deploying and managing urban monitoring testbeds, as experienced in a series of urban monitoring research projects, followed by an analysis of the relevant literature. By identifying the challenges in the various projects and organising them under the V-model development lifecycle levels, we provide a reference guide for future projects. Understanding the challenges early on will facilitate current and future smart-cities IoT research projects to reduce implementation time and deliver secure and resilient testbeds

    Secure Short-Packet Communications via UAV-Enabled Mobile Relaying: Joint Resource Optimization and 3D Trajectory Design

    Full text link
    Short-packet communication (SPC) and unmanned aerial vehicles (UAVs) are anticipated to play crucial roles in the development of 5G-and-beyond wireless networks and the Internet of Things (IoT). In this paper, we propose a secure SPC system, where a UAV serves as a mobile decode-and-forward (DF) relay, periodically receiving and relaying small data packets from a remote IoT device to its receiver in two hops with strict latency requirements, in the presence of an eavesdropper. This system requires careful optimization of important design parameters, such as the coding blocklengths of both hops, transmit powers, and UAV's trajectory. While the overall optimization problem is nonconvex, we tackle it by applying a block successive convex approximation (BSCA) approach to divide the original problem into three subproblems and solve them separately. Then, an overall iterative algorithm is proposed to obtain the final design with guaranteed convergence. Our proposed low-complexity algorithm incorporates 3D trajectory design and resource management to optimize the effective average secrecy throughput of the communication system over the course of UAV-relay's mission. Simulation results demonstrate significant performance improvements compared to various benchmark schemes and provide useful design insights on the coding blocklengths and transmit powers along the trajectory of the UAV

    Lost in the City? - A Scoping Review of 5G Enabled Location-Based Urban Scenarios

    Get PDF
    5G mobile network technologies and scenarios with the associated innovations receive growing interest among academics and practitioners. Current literature on 5G technologies discusses several scenarios and specific chances and challenges. However, 5G literature is fragmented and not systematically reviewed. We conducted a scoping review on 5G applications in urban scenarios. We reviewed 1,394 papers and identified 20 studies about urban logistics and emergency indoor localization. Our review accumulates current academic knowledge on these scenarios and identifies six further research directions in four research fields. It reveals several further research opportunities, e.g., regarding trust and privacy concerns. We review and discuss 5G literature for academics and practitioners, contribute towards more tailored 5G research and reflect on cost- efficient 5G applications in urban scenarios

    Weather or not? The role of international sanctions and climate on food prices in Iran

    Get PDF
    IntroductionThe scarcity of resources have affected food production, which has challenged the ability of Iran to provide adequate food for the population. Iterative and mounting sanctions on Iran by the international community have seriously eroded Iran's access to agricultural technology and resources to support a growing population. Limited moisture availability also affects Iran's agricultural production. The aim of this study was to analyze the influence of inflation, international sanctions, weather disturbances, and domestic crop production on the price of rice, wheat and lentils from 2010 to 2021 in Iran.MethodData were obtained from the statistical yearbooks of the Ministry of Agriculture in Iran, Statistical Center of Iran, and the Central Bank of Iran. We analyzed econometric measures of food prices, including CPI, food inflation, subsidy reform plan and sanctions to estimate economic relationships. After deflating the food prices through CPI and detrending the time series to resolve the non-linear issue, we used monthly Climate Hazards group Infrared Precipitation with Stations (CHIRPS) precipitation data to analyze the influence of weather disturbances on food prices.Results and discussionThe price of goods not only provides an important indicator of the balance between agricultural production and market demand, but also has strong impacts on food affordability and food security. This novel study used a combination of economic and climate factors to analyze the food prices in Iran. Our statistical modeling framework found that the monthly precipitation on domestic food prices, and ultimately food access, in the country is much less important than the international sanctions, lowering Iran's productive capability and negatively impacting its food security

    Future Internet of Things: Connecting the Unconnected World and Things Based on 5/6G Networks and Embedded Technologies

    Get PDF
    Undeniably, the Internet of Things (IoT) ecosystem keeps on advancing at a fast speed, far above all predictions for growth and ubiquity. From sensor to cloud, this massive network continues to break technical limits in a variety of ways, and wireless sensor nodes are likely to become more prevalent as the number of Internet of Things devices increases into the trillions to connect the world and unconnected objects. However, their future in the IoT ecosystem remains uncertain, as various difficulties as with device connectivity, edge artificial intelligence (AI), security and privacy concerns, increased energy demands, the right technologies to use, and continue to attract opposite forces. This chapter provides a brief, forward-looking overview of recent trends, difficulties, and cutting-edge solutions for low-end IoT devices that use reconfigurable computing technologies like FPGA SoC and next-generation 5/6G networks. Tomorrow’s IoT devices will play a critical role. At the end of this chapter, an edge FPGA SoC computing-based IoT application is proposed, to be a novel edge computing for IoT solution with low power consumption and accelerated processing capability in data exchange

    Adaptation of the human nervous system for self-aware secure mobile and IoT systems

    Get PDF
    IT systems have been deployed across several domains, such as hospitals and industries, for the management of information and operations. These systems will soon be ubiquitous in every field due to the transition towards the Internet of Things (IoT). The IoT brings devices with sensory functions into IT systems through the process of internetworking. The sensory functions of IoT enable them to generate and process information automatically, either without human contribution or having the least human interaction possible aside from the information and operations management tasks. Security is crucial as it prevents system exploitation. Security has been employed after system implementation, and has rarely been considered as a part of the system. In this dissertation, a novel solution based on a biological approach is presented to embed security as an inalienable part of the system. The proposed solution, in the form of a prototype of the system, is based on the functions of the human nervous system (HNS) in protecting its host from the impacts caused by external or internal changes. The contributions of this work are the derivation of a new system architecture from HNS functionalities and experiments that prove the implementation feasibility and efficiency of the proposed HNS-based architecture through prototype development and evaluation. The first contribution of this work is the adaptation of human nervous system functions to propose a new architecture for IT systems security. The major organs and functions of the HNS are investigated and critical areas are identified for the adaptation process. Several individual system components with similar functions to the HNS are created and grouped to form individual subsystems. The relationship between these components is established in a similar way as in the HNS, resulting in a new system architecture that includes security as a core component. The adapted HNS-based system architecture is employed in two the experiments prove its implementation capability, enhancement of security, and overall system operations. The second contribution is the implementation of the proposed HNS-based security solution in the IoT test-bed. A temperature-monitoring application with an intrusion detection system (IDS) based on the proposed HNS architecture is implemented as part of the test-bed experiment. Contiki OS is used for implementation, and the 6LoWPAN stack is modified during the development process. The application, together with the IDS, has a brain subsystem (BrSS), a spinal cord subsystem (SCSS), and other functions similar to the HNS whose names are changed. The HNS functions are shared between an edge router and resource-constrained devices (RCDs) during implementation. The experiment is evaluated in both test-bed and simulation environments. Zolertia Z1 nodes are used to form a 6LoWPAN network, and an edge router is created by combining Pandaboard and Z1 node for a test-bed setup. Two networks with different numbers of sensor nodes are used as simulation environments in the Cooja simulator. The third contribution of this dissertation is the implementation of the proposed HNS-based architecture in the mobile platform. In this phase, the Android operating system (OS) is selected for experimentation, and the proposed HNS-based architecture is specifically tailored for Android. A context-based dynamically reconfigurable access control system (CoDRA) is developed based on the principles of the refined HNS architecture. CoDRA is implemented through customization of Android OS and evaluated under real-time usage conditions in test-bed environments. During the evaluation, the implemented prototype mimicked the nature of the HNS in securing the application under threat with negligible resource requirements and solved the problems in existing approaches by embedding security within the system. Furthermore, the results of the experiments highlighted the retention of HNS functions after refinement for different IT application areas, especially the IoT, due to its resource-constrained nature, and the implementable capability of our proposed HNS architecture.--- IT-järjestelmiä hyödynnetään tiedon ja toimintojen hallinnassa useilla aloilla, kuten sairaaloissa ja teollisuudessa. Siirtyminen kohti esineiden Internetiä (Internet of Things, IoT) tuo tällaiset laitteet yhä kiinteämmäksi osaksi jokapäiväistä elämää. IT-järjestelmiin liitettyjen IoT-laitteiden sensoritoiminnot mahdollistavat tiedon automaattisen havainnoinnin ja käsittelyn osana suurempaa järjestelmää jopa täysin ilman ihmisen myötävaikutusta, poislukien mahdolliset ylläpito- ja hallintatoimenpiteet. Turvallisuus on ratkaisevan tärkeää IT-järjestelmien luvattoman käytön estämiseksi. Valitettavan usein järjestelmäsuunnittelussa turvallisuus ei ole osana ydinsuunnitteluprosessia, vaan otetaan huomioon vasta käyttöönoton jälkeen. Tässä väitöskirjassa esitellään uudenlainen biologiseen lähestymistapaan perustuva ratkaisu, jolla turvallisuus voidaan sisällyttää erottamattomaksi osaksi järjestelmää. Ehdotettu prototyyppiratkaisu perustuu ihmisen hermoston toimintaan tilanteessa, jossa se suojelee isäntäänsä ulkoisten tai sisäisten muutosten vaikutuksilta. Tämän työn keskeiset tulokset ovat uuden järjestelmäarkkitehtuurin johtaminen ihmisen hermoston toimintaperiaatteesta sekä tällaisen järjestelmän toteutettavuuden ja tehokkuuden arviointi kokeellisen prototyypin kehittämisen ja toiminnan arvioinnin avulla. Tämän väitöskirjan ensimmäinen kontribuutio on ihmisen hermoston toimintoihin perustuva IT-järjestelmäarkkitehtuuri. Tutkimuksessa arvioidaan ihmisen hermoston toimintaa ja tunnistetaan keskeiset toiminnot ja toiminnallisuudet, jotka mall-innetaan osaksi kehitettävää järjestelmää luomalla näitä vastaavat järjestelmäkomponentit. Nä-istä kootaan toiminnallisuudeltaan hermostoa vastaavat osajärjestelmät, joiden keskinäinen toiminta mallintaa ihmisen hermoston toimintaa. Näin luodaan arkkitehtuuri, jonka keskeisenä komponenttina on turvallisuus. Tämän pohjalta toteutetaan kaksi prototyyppijärjestelmää, joiden avulla arvioidaan arkkitehtuurin toteutuskelpoisuutta, turvallisuutta sekä toimintakykyä. Toinen kontribuutio on esitetyn hermostopohjaisen turvallisuusratkaisun toteuttaminen IoT-testialustalla. Kehitettyyn arkkitehtuuriin perustuva ja tunkeutumisen estojärjestelmän (intrusion detection system, IDS) sisältävä lämpötilan seurantasovellus toteutetaan käyttäen Contiki OS -käytöjärjestelmää. 6LoWPAN protokollapinoa muokataan tarpeen mukaan kehitysprosessin aikana. IDS:n lisäksi sovellukseen kuuluu aivo-osajärjestelmä (Brain subsystem, BrSS), selkäydinosajärjestelmä (Spinal cord subsystem, SCSS), sekä muita hermoston kaltaisia toimintoja. Nämä toiminnot jaetaan reunareitittimen ja resurssirajoitteisten laitteiden kesken. Tuloksia arvioidaan sekä simulaatioiden että testialustan tulosten perusteella. Testialustaa varten 6LoWPAN verkon toteutukseen valittiin Zolertia Z1 ja reunareititin on toteutettu Pandaboardin ja Z1:n yhdistelmällä. Cooja-simulaattorissa käytettiin mallinnukseen ymp-äristönä kahta erillistä ja erikokoisuta sensoriverkkoa. Kolmas tämän väitöskirjan kontribuutio on kehitetyn hermostopohjaisen arkkitehtuurin toteuttaminen mobiilialustassa. Toteutuksen alustaksi valitaan Android-käyttöjärjestelmä, ja kehitetty arkkitehtuuri räätälöidään Androidille. Tuloksena on kontekstipohjainen dynaamisesti uudelleen konfiguroitava pääsynvalvontajärjestelmä (context-based dynamically reconfigurable access control system, CoDRA). CoDRA toteutetaan mukauttamalla Androidin käyttöjärjestelmää ja toteutuksen toimivuutta arvioidaan reaaliaikaisissa käyttöolosuhteissa testialustaympäristöissä. Toteutusta arvioitaessa havaittiin, että kehitetty prototyyppi jäljitteli ihmishermoston toimintaa kohdesovelluksen suojaamisessa, suoriutui tehtävästään vähäisillä resurssivaatimuksilla ja onnistui sisällyttämään turvallisuuden järjestelmän ydintoimintoihin. Tulokset osoittivat, että tämän tyyppinen järjestelmä on toteutettavissa sekä sen, että järjestelmän hermostonkaltainen toiminnallisuus säilyy siirryttäessä sovellusalueelta toiselle, erityisesti resursseiltaan rajoittuneissa IoT-järjestelmissä

    Ensuring consensus on trust issues in capability-limited node networks with Blockchain technology

    Get PDF
    Σε αυτή τη διπλωματική εργασία, εξετάζουμε πώς θα μπορούσε να εφαρμοστεί το πρωτόκολλο blockchain, ώστε να διασφαλιστεί η συναίνεση των κόμβων του δικτύου σε θέματα εμπιστοσύνης, λαμβάνοντας παράλληλα υπόψη τους περιορισμένους πόρους των κόμβων. Αρχικά, θα παρουσιάσουμε το σύστημα στο οποίο θα εργαστούμε, ένα Mobile Ad Hoc Network (MANET) το οποίο χρησιμοποιεί ένα σχήμα ομαδοποίησης, βασισμένο στην έννοια του κόστους ανάλυσης/επεξεργασίας, μαζί με έναν μηχανισμό εμπιστοσύνης που από κοινού έχουν ως αποτέλεσμα τη διαρκή και γρήγορη ανακάλυψη κακόβουλων κόμβων. Στη συνέχεια, θα παρουσιάσουμε το πρωτόκολλο blockchain και τις κύριες έννοιές του. Μια ανασκόπηση της σχετικής εργασίας θα διεξαχθεί για να αξιολογηθούν οι διάφορες προσεγγίσεις που χρησιμοποιούνται από άλλους για την ενσωμάτωση του πρωτοκόλλου blockchain στα αντίστοιχα συστήματά τους. Στη συνέχεια, θα παρουσιαστεί αναλυτικά το Hyperledger Fabric framework, το οποίο θα βοηθήσει στην εφαρμογή του προτεινόμενου συστήματος. Τέλος, θα παρουσιαστεί το προτεινόμενο σύστημα, το οποίο συγχωνεύει τη δεδομένη προσομοίωση MANET με την τεχνολογία blockchain μέσα από το Hyperledger Fabric και θα συζητηθούν τα αποτελέσματά του. Η ανάλυσή μας θα περιλαμβάνει, επίσης, αξιολόγηση της αποτελεσματικότητάς του στην διασφάλιση της συναίνεσης των κόμβων σε θέματα εμπιστοσύνης και πιθανές μελλοντικές βελτιώσεις.In this thesis, we review how the blockchain protocol could be applied so as to ensure the consensus of the network nodes on matters of trust, while taking into account the limited resources of the nodes. First, we will present the system we will be working on, a Mobile Ad Hoc Network (MANET) which uses a clustering scheme, based on the cost of analysis/processing concept, along with a trust mechanism that together result in cluster persistence and quick discovery of malicious nodes. Then, we will introduce the blockchain protocol and its main concepts. A review of related work will be conducted to assess the various approaches utilized by others in incorporating the blockchain protocol into their respective systems. Subsequently, the Hyperledger Fabric framework, which shall aid in the implementation of the proposed system, shall be presented in detail. Finally, the proposed system, which merges the given MANET simulation with the blockchain technology enabled by Hyperledger Fabric, will be presented, and its results discussed. Our analysis will also include an evaluation of its effectiveness in addressing consensus on trust issues, and possible avenues for future enhancements

    Exploring Cloud Adoption Possibilities for the Manufacturing Sector: A Role of Third-Party Service Providers

    Get PDF
    As the manufacturing sector strides towards digitalization under the influence of Industry 4.0, cloud services have emerged as the new norm, driving change and innovation in this rapidly transforming landscape. This study investigates the possibilities of cloud adoption in the manufacturing sector by developing a conceptual model to identify suitable cloud-based solutions and explores the role of third-party service providers in aiding manufacturers throughout their cloud adoption journey. The research methods consist of a comprehensive literature review of the manufacturing industry, digital transformation, cloud computing, etc., followed by qualitative analyses of industrial benchmarks case studies and an investigation into an application of the developed model to a hypothetical food manufacturing company as an example. This study indicates that cloud adoption can yield substantial benefits in the manufacturing sector, including operational efficiency, cost reduction, and innovation, etc. The study concludes that the developed conceptual model provides a practical framework to identify the most suitable cloud-based solutions during the cloud adoption process in the manufacturing context. In addition, third-party service providers like Capgemini are capable of not only filling the technical gaps but also consulting strategic directions and innovations for their client organizations, hence playing a vital role in driving the industrial digital transformation process. With an extensive mapping of their capabilities, a set of recommendations intended to assist Capgemini in enhancing capabilities and improving competitive performance in the market has been offered
    corecore