46,752 research outputs found
Improving Resilience Against Node Capture Attacks in Wireless Sensor Networks Using ICmetrics
Wireless Sensor Networks (WSNs) have the potential of being employed in a variety of applications ranging from battlefield surveillance to everyday applications such as smart homes and patient monitoring. Security is a major challenge that all applications based on WSNs are facing nowadays. Firstly, due to the wireless nature of WSNs, and secondly due to their ability to operate in unattended environments makes them even more vulnerable to various sorts of attacks. Among these attacks is node capture attack in WSNs, whose threat severity can range from a single node being compromised in the network to the whole network being compromised as a result of that single node compromise. In this paper, we propose the use of ICMetric technology to provide resilience against node compromise in WSN. ICmetrics generates the security attributes of the sensor node based on measurable hardware and software characteristics of the integrated circuit. These properties of ICmetrics can help safeguard WSNs from various node capture attacks
A Framework for M-Commerce Implementation in Nigeria
The Internet has brought about the concept of grobalilation, which has
revolutionized the way business is transacted all over the world. The E-comnterce
is of particular interest, though widely used but still has some security challenges
in terms of transparency and confidentiality of transactiorts. This papei focuses
on M-contnrcrce as an extensiott to E-commerce hnplementatiott with the Bankiltg
industry proposed as core implementation consideration in ortler to guarantee
high level security. We have reviewed some cqses of onlilrc frauds and eliscussed
tlte emerging critical issues afficting software development of M-cornmerce
applicatiotts. Afranrcworkfor M-commerce implementationis therefore,proposed
for countries such as Nigeria, Romania and Indonesia where cases of online
scam are alanning
Computational Contributions to the Automation of Agriculture
The purpose of this paper is to explore ways that computational advancements have enabled the complete automation of agriculture from start to finish. With a major need for agricultural advancements because of food and water shortages, some farmers have begun creating their own solutions to these problems. Primarily explored in this paper, however, are current research topics in the automation of agriculture. Digital agriculture is surveyed, focusing on ways that data collection can be beneficial. Additionally, self-driving technology is explored with emphasis on farming applications. Machine vision technology is also detailed, with specific application to weed management and harvesting of crops. Finally, the effects of automating agriculture are briefly considered, including labor, the environment, and direct effects on farmers
Protector Control PC-AODV-BH in The Ad Hoc Networks
In this paper we deal with the protector control that which we used to secure
AODV routing protocol in Ad Hoc networks. The considered system can be
vulnerable to several attacks because of mobility and absence of
infrastructure. While the disturbance is assumed to be of the black hole type,
we purpose a control named "PC-AODV-BH" in order to neutralize the effects of
malicious nodes. Such a protocol is obtained by coupling hash functions,
digital signatures and fidelity concept. An implementation under NS2 simulator
will be given to compare our proposed approach with SAODV protocol, basing on
three performance metrics and taking into account the number of black hole
malicious nodesComment: submit 15 pages, 19 figures, 1 table, Journal Indexing team, AIRCC
201
Over-the-Air Computation for Distributed Systems: Something Old and Something New
Facing the upcoming era of Internet-of-Things and connected intelligence,
efficient information processing, computation and communication design becomes
a key challenge in large-scale intelligent systems. Recently, Over-the-Air
(OtA) computation has been proposed for data aggregation and distributed
function computation over a large set of network nodes. Theoretical foundations
for this concept exist for a long time, but it was mainly investigated within
the context of wireless sensor networks. There are still many open questions
when applying OtA computation in different types of distributed systems where
modern wireless communication technology is applied. In this article, we
provide a comprehensive overview of the OtA computation principle and its
applications in distributed learning, control, and inference systems, for both
server-coordinated and fully decentralized architectures. Particularly, we
highlight the importance of the statistical heterogeneity of data and wireless
channels, the temporal evolution of model updates, and the choice of
performance metrics, for the communication design in OtA federated learning
(FL) systems. Several key challenges in privacy, security and robustness
aspects of OtA FL are also identified for further investigation.Comment: 7 pages, 3 figures, submitted for possible publicatio
Recommended from our members
Current state of e-services in Saudi Arabia: the case of intermediaries in facilitating government services in Madinah city
The government of Madinah has launched ‘Khdamatec’ electronic Offices (e-Offices) concept under their national electronic Government (e-Government) modernisation agenda to facilitate service delivery to citizens and seamless interaction to communicate their needs. By offering e-Offices around the government departments, Madinah government hopes to increase accessibility of e-Government services and make steps forward to electronic age, encourage Medina' citizens to participate and use e-Services and bridging digital divide. However, the empirical findings illustrate that the adoption and diffusion of the e-Office concept and e-Government in the wider context at a lethargic pace. This paper highlights some of the challenges faced by the Madinah city in implementing the e-Office concept and e-Government
- …