5,019 research outputs found

    Introduction to the Special Section on Social Computing and Social Internet of Things

    Get PDF
    The papers in this special section focus on social computing and the social Internet of Things (SIoT). SIoT is a new and latest paradigm that extends Internet of Things. This provides an ideal platform for interconnected devices and objects to effectively interact across social platforms for the betterment of the community on a whole. Any Social Internet of things based system means that the data is distributed in nature and focuses on the interest of a larger group of people than a particular individual. Thus social Internet of things have a wide scope and can be used to develop a wide range of applications that involves a group of people or community working towards accomplishing a common objective such as joint ventures, office setup, co-ownerships and so on. Social Computing may be defined as the study of the collaborative behavior of a group of computer users working on some common objectives

    Resource Efficient Authentication and Session Key Establishment Procedure for Low-Resource IoT Devices

    Get PDF
    open access journalThe Internet of Things (IoT) can includes many resource-constrained devices, with most usually needing to securely communicate with their network managers, which are more resource-rich devices in the IoT network. We propose a resource-efficient security scheme that includes authentication of devices with their network managers, authentication between devices on different networks, and an attack-resilient key establishment procedure. Using automated validation with internet security protocols and applications tool-set, we analyse several attack scenarios to determine the security soundness of the proposed solution, and then we evaluate its performance analytically and experimentally. The performance analysis shows that the proposed solution occupies little memory and consumes low energy during the authentication and key generation processes respectively. Moreover, it protects the network from well-known attacks (man-in-the-middle attacks, replay attacks, impersonation attacks, key compromission attacks and denial of service attacks)

    Foldable all-textile cavity-backed slot antennas for personal UWB localization

    Get PDF
    An all-textile multimoded cavity-backed slot antenna has been designed and fabricated for body-worn impulse radio ultra-wideband (IR-UWB) operation in the 3,744-4,742.4 MHz frequency band, thereby covering Channels 2 and 3 of the IEEE 802.15.4a standard. Its light weight, mechanical flexibility, and small footprint of 35 mm x 56 mm facilitate integration into textile for radio communication equipment for first aid responders, personal locator beacons, and equipment for localization and medical monitoring of children or the elderly. The antenna features a stable radiation pattern and reflection coefficient in diverse operating conditions such as in free space, when subject to diverse bending radii and when deployed on the torso or upper right arm of a test person. The high isolation toward the wearer's body originates from the antenna's hemispherical radiation pattern with a -3 dB beamwidth of 120 degrees and a front-to-back ratio higher than 11 dB over the entire band. Moreover, the antenna exhibits a measured maximum gain higher than 6.3 dBi and a radiation efficiency over 75%. In addition, orientation-specific pulse distortion introduced by the antenna element is analyzed by means of the System Fidelity Factor (SFF). The SFF of the communication link between two instances of this antenna is higher than 94% for all directions within the antenna's -3 dB beamwidth. This easily wearable and deployable antenna is suitable to support IR-UWB localization with an accuracy in the order of 5 cm

    Developing applications in large scale, dynamic fog computing:A case study

    Get PDF
    In recent years, fog computing has emerged as a new distributed system model for a large class of applications that are data-intensive or delay-sensitive. By exploiting widely distributed computing infrastructure that is located closer to the network edge, communication cost and service response time can be significantly reduced. However, developing this class of applications is not straightforward and requires addressing three key challenges, ie, supporting the dynamic nature of the edge network, managing the context-dependent characteristics of application logic, and dealing with the large scale of the system. In this paper, we present a case study in building fog computing applications using our open source platform Distributed Node-RED (DNR). In particular, we show how applications can be decomposed and deployed to a geographically distributed infrastructure using DNR, and how existing software components can be adapted and reused to participate in fog applications. We present a lab-based implementation of a fog application built using DNR that addresses the first two of the issues highlighted earlier. To validate that our approach also deals with large scale, we augment our live trial with a large scale simulation of the application model, conducted in Omnet++, which shows the scalability of the model and how it supports the dynamic nature of fog applications. © 2019 John Wiley & Sons, Ltd
    • …
    corecore