65 research outputs found

    TCitySmartF: A comprehensive systematic framework for transforming cities into smart cities

    Get PDF
    A shared agreed-upon definition of "smart city" (SC) is not available and there is no "best formula" to follow in transforming each and every city into SC. In a broader inclusive definition, it can be described as an opportunistic concept that enhances harmony between the lives and the environment around those lives perpetually in a city by harnessing the smart technology enabling a comfortable and convenient living ecosystem paving the way towards smarter countries and the smarter planet. SCs are being implemented to combine governors, organisations, institutions, citizens, environment, and emerging technologies in a highly synergistic synchronised ecosystem in order to increase the quality of life (QoL) and enable a more sustainable future for urban life with increasing natural resource constraints. In this study, we analyse how to develop citizen- and resource-centric smarter cities based on the recent SC development initiatives with the successful use cases, future SC development plans, and many other particular SC development solutions. The main features of SC are presented in a framework fuelled by recent technological advancement, particular city requirements and dynamics. This framework - TCitySmartF 1) aims to aspire a platform that seamlessly forges engineering and technology solutions with social dynamics in a new philosophical city automation concept - socio-technical transitions, 2) incorporates many smart evolving components, best practices, and contemporary solutions into a coherent synergistic SC topology, 3) unfolds current and future opportunities in order to adopt smarter, safer and more sustainable urban environments, and 4) demonstrates a variety of insights and orchestrational directions for local governors and private sector about how to transform cities into smarter cities from the technological, social, economic and environmental point of view, particularly by both putting residents and urban dynamics at the forefront of the development with participatory planning and interaction for the robust community- and citizen-tailored services. The framework developed in this paper is aimed to be incorporated into the real-world SC development projects in Lancashire, UK

    Optimized Monitoring and Detection of Internet of Things resources-constraints Cyber Attacks

    Get PDF
    This research takes place in the context of the optimized monitoring and detec- tion of Internet of Things (IoT) resource-constraints attacks. Meanwhile, the In- ternet of Everything (IoE) concept is presented as a wider extension of IoT. How- ever, the IoE realization meets critical challenges, including the limited network coverage and the limited resources of existing network technologies and smart devices. The IoT represents a network of embedded devices that are uniquely identifiable and have embedded software required to communicate between the transient states. The IoT enables a connection between billions of sensors, actu- ators, and even human beings to the Internet, creating a wide range of services, some of which are mission-critical. However, IoT networks are faulty; things are resource-constrained in terms of energy and computational capabilities. For IoT systems performing a critical mission, it is crucial to ensure connectivity, availability, and device reliability, which requires proactive device state moni- toring. This dissertation presents an approach to optimize the monitoring and detection of resource-constraints attacks in IoT and IoE smart devices. First, it has been shown that smart devices suffer from resource-constraints problems; therefore, using lightweight algorithms to detect and mitigate the resource-constraints at- tack is essential. Practical analysis and monitoring of smart device resources’ are included and discussed to understand the behaviour of the devices before and after attacking real smart devices. These analyses are straightforwardly extended for building lightweight detection and mitigation techniques against energy and memory attacks. Detection of energy consumption attacks based on monitoring the package reception rate of smart devices is proposed to de- tect energy attacks in smart devices effectively. The proposed lightweight algo- rithm efficiently detects energy attacks for different protocols, e.g., TCP, UDP, and MQTT. Moreover, analyzing memory usage attacks is also considered in this thesis. Therefore, another lightweight algorithm is also built to detect the memory-usage attack once it appears and stops. This algorithm considers mon- itoring the memory usage of the smart devices when the smart devices are Idle, Active, and Under attack. Based on the presented methods and monitoring analysis, the problem of resource-constraint attacks in IoT systems is systemat- ically eliminated by parameterizing the lightweight algorithms to adapt to the resource-constraint problems of the smart devices

    Ambient Assisted Living: Scoping Review of Artificial Intelligence Models, Domains, Technology, and Concerns

    Get PDF
    Background: Ambient assisted living (AAL) is a common name for various artificial intelligence (AI)—infused applications and platforms that support their users in need in multiple activities, from health to daily living. These systems use different approaches to learn about their users and make automated decisions, known as AI models, for personalizing their services and increasing outcomes. Given the numerous systems developed and deployed for people with different needs, health conditions, and dispositions toward the technology, it is critical to obtain clear and comprehensive insights concerning AI models used, along with their domains, technology, and concerns, to identify promising directions for future work. Objective: This study aimed to provide a scoping review of the literature on AI models in AAL. In particular, we analyzed specific AI models used in AАL systems, the target domains of the models, the technology using the models, and the major concerns from the end-user perspective. Our goal was to consolidate research on this topic and inform end users, health care professionals and providers, researchers, and practitioners in developing, deploying, and evaluating future intelligent AAL systems. Methods: This study was conducted as a scoping review to identify, analyze, and extract the relevant literature. It used a natural language processing toolkit to retrieve the article corpus for an efficient and comprehensive automated literature search. Relevant articles were then extracted from the corpus and analyzed manually. This review included 5 digital libraries: IEEE, PubMed, Springer, Elsevier, and MDPI. Results: We included a total of 108 articles. The annual distribution of relevant articles showed a growing trend for all categories from January 2010 to July 2022. The AI models mainly used unsupervised and semisupervised approaches. The leading models are deep learning, natural language processing, instance-based learning, and clustering. Activity assistance and recognition were the most common target domains of the models. Ambient sensing, mobile technology, and robotic devices mainly implemented the models. Older adults were the primary beneficiaries, followed by patients and frail persons of various ages. Availability was a top beneficiary concern. Conclusions: This study presents the analytical evidence of AI models in AAL and their domains, technologies, beneficiaries, and concerns. Future research on intelligent AAL should involve health care professionals and caregivers as designers and users, comply with health-related regulations, improve transparency and privacy, integrate with health care technological infrastructure, explain their decisions to the users, and establish evaluation metrics and design guidelines. Trial Registration: PROSPERO (International Prospective Register of Systematic Reviews) CRD42022347590; https://www.crd.york.ac.uk/prospero/display_record.php?ID=CRD42022347590This work was part of and supported by GoodBrother, COST Action 19121—Network on Privacy-Aware Audio- and Video-Based Applications for Active and Assisted Living

    Security Technologies and Methods for Advanced Cyber Threat Intelligence, Detection and Mitigation

    Get PDF
    The rapid growth of the Internet interconnectivity and complexity of communication systems has led us to a significant growth of cyberattacks globally often with severe and disastrous consequences. The swift development of more innovative and effective (cyber)security solutions and approaches are vital which can detect, mitigate and prevent from these serious consequences. Cybersecurity is gaining momentum and is scaling up in very many areas. This book builds on the experience of the Cyber-Trust EU project’s methods, use cases, technology development, testing and validation and extends into a broader science, lead IT industry market and applied research with practical cases. It offers new perspectives on advanced (cyber) security innovation (eco) systems covering key different perspectives. The book provides insights on new security technologies and methods for advanced cyber threat intelligence, detection and mitigation. We cover topics such as cyber-security and AI, cyber-threat intelligence, digital forensics, moving target defense, intrusion detection systems, post-quantum security, privacy and data protection, security visualization, smart contracts security, software security, blockchain, security architectures, system and data integrity, trust management systems, distributed systems security, dynamic risk management, privacy and ethics

    Sustainable modular IoT solution for smart cities applications supported by machine learning algorithms

    Get PDF
    The Internet of Things (IoT) and Smart Cities are nowadays a big trend, but with the proliferation of these systems several challenges start to appear and put in jeopardy the acceptance by the population, mainly in terms of sustainability and environmental issues. This Thesis introduces a new system composed by a modular IoT smart node that is self-configurable and sustainable with the support of machine learning techniques, as well as the research and development to achieve a innovative solution considering data analysis, wireless communications and hardware and software development. For all these, concepts are introduced, research methodologies, tests and results are presented and discussed as well as the development and implementation. The developed research and methodology shows that Random Forest was the best choice for the data analysis in the self-configuration of the hardware and communication systems and that Edge Computing has an advantage in terms of energy efficiency and latency. The autonomous communication system was able to create a 65% more sustainable node, in terms of energy consumption, with only a 13% decrease in quality of service. The modular approach for the smart node presented advantages in the integration, scalability and implementation of smart cities projects when facing traditional implementations, reducing up to 45% the energy consumption of the overall system and 60% of messages exchanged, without compromising the system performance. The deployment of this new system will help Smart Cities, in a worldwide fashion, to decrease their environmental issues and comply with rules and regulations to reduce CO2 emission.A Internet das Coisas (IoT) e as Cidades Inteligentes são hoje uma grande tendência, mas com a rápida evolução destes sistemas são vários os desafios que põem em causa a sua aceitação por parte das populações, maioritariamente devido a problemas ambientais e de sustentabilidade. Esta Tese introduz um novo sistema composto por nós de IoT inteligentes que são auto-configuáveis e sustentáveis suportados por de aprendizagem automática, e o trabalho de investigação e desenvolvimento para se obter uma solução inovadora que considera a análise de dados, comunicações sem fios e o desenvolvimento do hardware e software. Para todos estes, os conceitos chave são introduzidos, as metodologias de investigação, testes e resultados são apresentados e discutidos, bem como todo o desenvolvimento e implementação. Através do trabalho desenvolvido mostra-se que as Árvores Aleatórias são a melhor escolha para análise de dados em termos da autoconfiguração do hardware e sistema de comunicações e que a computação nos nós tem uma vantagem em termos de eficiência energética e latência. O sistema de configuração autónoma de comunicações foi capaz de criar um nós 65% mais sustentável, em termos en- ergéticos, comprometendo apenas em 13% a qualidade do servi ̧co. A solução modular do nó inteligente apresentou vantagens na integração, escalabilidade e implementação de projectos para Cidades Inteligentes quando comparado com soluções tradicionais, reduzindo em 45% o consumo energético e 60% a troca de mensagens, sem comprometer a qualidade do sistema. A implementação deste novo sistema irá ajudar as cidades inteligentes, em todo o mundo, a diminuir os seus problemas ambientais e a cumprir com as normas e regulamentos para reduzir as emissões de CO2

    Security Technologies and Methods for Advanced Cyber Threat Intelligence, Detection and Mitigation

    Get PDF
    The rapid growth of the Internet interconnectivity and complexity of communication systems has led us to a significant growth of cyberattacks globally often with severe and disastrous consequences. The swift development of more innovative and effective (cyber)security solutions and approaches are vital which can detect, mitigate and prevent from these serious consequences. Cybersecurity is gaining momentum and is scaling up in very many areas. This book builds on the experience of the Cyber-Trust EU project’s methods, use cases, technology development, testing and validation and extends into a broader science, lead IT industry market and applied research with practical cases. It offers new perspectives on advanced (cyber) security innovation (eco) systems covering key different perspectives. The book provides insights on new security technologies and methods for advanced cyber threat intelligence, detection and mitigation. We cover topics such as cyber-security and AI, cyber-threat intelligence, digital forensics, moving target defense, intrusion detection systems, post-quantum security, privacy and data protection, security visualization, smart contracts security, software security, blockchain, security architectures, system and data integrity, trust management systems, distributed systems security, dynamic risk management, privacy and ethics

    SUTMS - Unified Threat Management Framework for Home Networks

    Get PDF
    Home networks were initially designed for web browsing and non-business critical applications. As infrastructure improved, internet broadband costs decreased, and home internet usage transferred to e-commerce and business-critical applications. Today’s home computers host personnel identifiable information and financial data and act as a bridge to corporate networks via remote access technologies like VPN. The expansion of remote work and the transition to cloud computing have broadened the attack surface for potential threats. Home networks have become the extension of critical networks and services, hackers can get access to corporate data by compromising devices attacked to broad- band routers. All these challenges depict the importance of home-based Unified Threat Management (UTM) systems. There is a need of unified threat management framework that is developed specifically for home and small networks to address emerging security challenges. In this research, the proposed Smart Unified Threat Management (SUTMS) framework serves as a comprehensive solution for implementing home network security, incorporating firewall, anti-bot, intrusion detection, and anomaly detection engines into a unified system. SUTMS is able to provide 99.99% accuracy with 56.83% memory improvements. IPS stands out as the most resource-intensive UTM service, SUTMS successfully reduces the performance overhead of IDS by integrating it with the flow detection mod- ule. The artifact employs flow analysis to identify network anomalies and categorizes encrypted traffic according to its abnormalities. SUTMS can be scaled by introducing optional functions, i.e., routing and smart logging (utilizing Apriori algorithms). The research also tackles one of the limitations identified by SUTMS through the introduction of a second artifact called Secure Centralized Management System (SCMS). SCMS is a lightweight asset management platform with built-in security intelligence that can seamlessly integrate with a cloud for real-time updates
    corecore