7 research outputs found

    Análisis Urbano y Comunidades Inteligentes: Una Aproximación al Empleo de la Tecnología en la Movilidad Cotidiana

    Get PDF
    Concentration of population in urban centers is a global problem for which different strategies in order to organize different processes in cities and improve the quality of life are required. The creation of smart communities is shown as a sustainable solution since they deal with various key aspects, such as traffic management and mobility, through the use of information technologies (ITs). This work presents a review of recent studies using information technologies for urban analysis and mobility in cities. A descriptive analysis of automated methods for collecting and analyzing citizens’ mobility patterns is performed; it is centered in smart card use, geolocation and geotagging. It is concluded that a robust communication infrastructure, supported by an efficient computational platform allowing big data management and ubiquitous computing, is a crucial aspect for urban management in a smart communityLa concentración de la población en los centros urbanos es una problemática mundial que requiere de estrategias que permitan organizar sus procesos y mejorar la calidad de vida. La creación de comunidades inteligentes se muestra como una solución sostenible, debido a que éstas trabajan aspectos claves para el desarrollo urbano, como la gestión de tráfico y la movilidad, apoyada en las tecnologías de la información (TICs). Este trabajo presenta una revisión del estado del arte en cuanto a la aplicación de las TICs al análisis urbano y movilidad ciudadana. Se analizan descriptivamente diversos métodos automáticos para la recolección y el análisis del patrón de movilidad de los ciudadanos, enfocándose en el uso de tarjetas inteligentes, geolocalización y geoetiquetado. Se encuentra que una infraestructura de comunicaciones robusta, apoyada en una plataforma computacional ágil con manejo de grandes datos y computación ubicua, es primordial para la gestión urbana en una comunidad inteligente

    Análisis urbano y comunidades inteligentes: “una aproximación al empleo de la tecnología en la movilidad cotidiana”

    Get PDF
    Concentration of population in urban centers is a global problem for which different strategies in order to organize different processes in cities and improve the quality of life are required. The creation of smart communities is shown as a sustainable solution since they deal with various key aspects, such as traffc management and mobility, through the use of information technologies (ITs). This work presents a review of recent studies using information technologies for urban analysis and mobility in cities. A descriptive analysis of automated methods for collecting and analyzing citizens’ mobility patterns is performed; it is centered in smart card use, geolocation and geotagging. It is concluded that a robust communication infrastructure, supported by an effcient computational platform allowing big data management and ubiquitous computing, is a crucial aspect for urban management in a smart community.La concentración de la población en los centros urbanos es una problemática mundial que requiere de estrategias que permitan organizar sus procesos y mejorar la calidad de vida. La creación de comunidades inteligentes se muestra como una solución sostenible, debido a que éstas trabajan aspectos claves para el desarrollo urbano, como la gestión de tráfco y la movilidad, apoyada en las tecnologías de la información (TICs). Este trabajo presenta una revisión del estado del arte en cuanto a la aplicación de las TICs al análisis urbano y movilidad ciudadana. Se analizan descriptivamente diversos métodos automáticos para la recolección y el análisis del patrón de movilidad de los ciudadanos, enfocándose en el uso de tarjetas inteligentes, geolocalización y geoetiquetado. Se encuentra que una infraestructura de comunicaciones robusta, apoyada en una plataforma computacional ágil con manejo de grandes datos y computación ubicua, es primordial para la gestión urbana en una comunidad inteligente

    Continuous patient monitoring with a patient centric agent : A block architecture

    Get PDF
    The Internet of Things (IoT) has facilitated services without human intervention for a wide range of applications, including continuous remote patient monitoring (RPM). However, the complexity of RPM architectures, the size of data sets generated and limited power capacity of devices make RPM challenging. In this paper, we propose a tier-based End to End architecture for continuous patient monitoring that has a patient centric agent (PCA) as its center piece. The PCA manages a blockchain component to preserve privacy when data streaming from body area sensors needs to be stored securely. The PCA based architecture includes a lightweight communication protocol to enforce security of data through different segments of a continuous, real time patient monitoring architecture. The architecture includes the insertion of data into a personal blockchain to facilitate data sharing amongst healthcare professionals and integration into electronic health records while ensuring privacy is maintained. The blockchain is customized for RPM with modifications that include having the PCA select a Miner to reduce computational effort, enabling the PCA to manage multiple blockchains for the same patient, and the modification of each block with a prefix tree to minimize energy consumption and incorporate secure transaction payments. Simulation results demonstrate that security and privacy can be enhanced in RPM with the PCA based End to End architecture

    Security and Privacy Preservation in Mobile Social Networks

    Get PDF
    Social networking extending the social circle of people has already become an important integral part of our daily lives. As reported by ComScore, social networking sites such as Facebook and Twitter have reached 82 percent of the world's online population, representing 1.2 billion users around the world. In the meantime, fueled by the dramatic advancements of smartphones and the ubiquitous connections of Bluetooth/WiFi/3G/LTE networks, social networking further becomes available for mobile users and keeps them posted on the up-to-date worldwide news and messages from their friends and families anytime anywhere. The convergence of social networking, advanced smartphones, and stable network infrastructures brings us a pervasive and omnipotent communication platform, named mobile social network (MSN), helping us stay connected better than ever. In the MSN, multiple communication techniques help users to launch a variety of applications in multiple communication domains including single-user domain, two-user domain, user-chain domain, and user-star domain. Within different communication domains, promising mobile applications are fostered. For example, nearby friend search application can be launched in the two-user or user-chain domains to help a user find other physically-close peers who have similar interests and preferences; local service providers disseminate advertising information to nearby users in the user-star domain; and health monitoring enables users to check the physiological signals in the single-user domain. Despite the tremendous benefits brought by the MSN, it still faces many technique challenges among of which security and privacy protections are the most important ones as smartphones are vulnerable to security attacks, users easily neglect their privacy preservation, and mutual trust relationships are difficult to be established in the MSN. In this thesis, we explore the unique characteristics and study typical research issues of the MSN. We conduct our research with a focus on security and privacy preservation while considering human factors. Specifically, we consider the profile matching application in the two-user domain, the cooperative data forwarding in the user-chain domain, the trustworthy service evaluation application in the user-star domain, and the healthcare monitoring application in the single-user domain. The main contributions are, i) considering the human comparison behavior and privacy requirements, we first propose a novel family of comparison-based privacy-preserving profile matching (PPM) protocols. The proposed protocols enable two users to obtain comparison results of attribute values in their profiles, while the attribute values are not disclosed. Taking user anonymity requirement as an evaluation metric, we analyze the anonymity protection of the proposed protocols. From the analysis, we found that the more comparison results are disclosed, the less anonymity protection is achieved by the protocol. Further, we explore the pseudonym strategy and an anonymity enhancing technique where users could be self-aware of the anonymity risk level and take appropriate actions when needed; ii) considering the inherent MSN nature --- opportunistic networking, we propose a cooperative privacy-preserving data forwarding (PDF) protocol to help users forward data to other users. We indicate that privacy and effective data forwarding are two conflicting goals: the cooperative data forwarding could be severely interrupted or even disabled when the privacy preservation of users is applied, because without sharing personal information users become unrecognizable to each other and the social interactions are no longer traceable. We explore the morality model of users from classic social theory, and use game-theoretic approach to obtain the optimal data forwarding strategy. Through simulation results, we show that the proposed cooperative data strategy can achieve both the privacy preservation and the forwarding efficiency; iii) to establish the trust relationship in a distributed MSN is a challenging task. We propose a trustworthy service evaluation (TSE) system, to help users exchange their service reviews toward local vendors. However, vendors and users could be the potential attackers aiming to disrupt the TSE system. We then consider the review attacks, i.e., vendors rejecting and modifying the authentic reviews of users, and the Sybil attacks, i.e., users abusing their pseudonyms to generate fake reviews. To prevent these attacks, we explore the token technique, the aggregate signature, and the secret sharing techniques. Simulation results show the security and the effectiveness of the TSE system can be guaranteed; iv) to improve the efficiency and reliability of communications in the single-user domain, we propose a prediction-based secure and reliable routing framework (PSR). It can be integrated with any specific routing protocol to improve the latter's reliability and prevent data injection attacks during data communication. We show that the regularity of body gesture can be learned and applied by body sensors such that the route with the highest predicted link quality can always be chose for data forwarding. The security analysis and simulation results show that the PSR significantly increases routing efficiency and reliability with or without the data injection attacks
    corecore