240 research outputs found

    Wireless Sensor Networks::Toward Smarter Railway Stations

    Get PDF
    Railway industry plays a critical role in transportation and transit systems attributed to the ever-growing demand for catering to both freight and passengers. However, owing to many challenges faced by railway stations such as harsh environments, traffic flow, safety and security risks, new and adaptive systems employing new technology are recommended. In this review, several wireless sensor networks (WSNs) applications are proposed for use in railway station systems, including advanced WSNs, which will enhance security, safety, and decision-making processes to achieve more cost-effective management in railway stations, as well as the development of integrated systems. The size, efficiency, and cost of WSNs are influential factors that attract the railway industry to adopt these devices. This paper presents a review of WSNs that have been designed for uses in monitoring and securing railway stations. This article will first briefly focus on the presence of different WSN applications in diverse applications. In addition, it is important to note that exploitation of the state-of-the-art tools and techniques such as WSNs to gain an enormous amount of data from a railway station is a new and novel concept requiring the development of artificial intelligence methods, such machine learning, which will be vital for the future of the railway industry

    Security and Privacy Issues in Wireless Mesh Networks: A Survey

    Full text link
    This book chapter identifies various security threats in wireless mesh network (WMN). Keeping in mind the critical requirement of security and user privacy in WMNs, this chapter provides a comprehensive overview of various possible attacks on different layers of the communication protocol stack for WMNs and their corresponding defense mechanisms. First, it identifies the security vulnerabilities in the physical, link, network, transport, application layers. Furthermore, various possible attacks on the key management protocols, user authentication and access control protocols, and user privacy preservation protocols are presented. After enumerating various possible attacks, the chapter provides a detailed discussion on various existing security mechanisms and protocols to defend against and wherever possible prevent the possible attacks. Comparative analyses are also presented on the security schemes with regards to the cryptographic schemes used, key management strategies deployed, use of any trusted third party, computation and communication overhead involved etc. The chapter then presents a brief discussion on various trust management approaches for WMNs since trust and reputation-based schemes are increasingly becoming popular for enforcing security in wireless networks. A number of open problems in security and privacy issues for WMNs are subsequently discussed before the chapter is finally concluded.Comment: 62 pages, 12 figures, 6 tables. This chapter is an extension of the author's previous submission in arXiv submission: arXiv:1102.1226. There are some text overlaps with the previous submissio

    Internet of Things Strategic Research Roadmap

    Get PDF
    Internet of Things (IoT) is an integrated part of Future Internet including existing and evolving Internet and network developments and could be conceptually defined as a dynamic global network infrastructure with self configuring capabilities based on standard and interoperable communication protocols where physical and virtual “things” have identities, physical attributes, and virtual personalities, use intelligent interfaces, and are seamlessly integrated into the information network

    On-demand service architecture for wireless vehicular networks

    Get PDF
    Vehicular Networks (VN) or VANETS has become a cutting-edge topic in the development of innovative solutions for the automotive industry and of special interest to transit management authorities. Well known examples of the potential benefits of enabling communications in vehicles is fostering a better driving by reducing the risk of accidents on the road. Besides the transmission of safety messages among vehicles in the vicinity, the development of non-safety applications will allow the delivery of information services to potential users willing to request them in on-demand basis. To provide such type of services, major challenges need to be tackled to offer secure and reliable communication in anonymous and sometimes hostile communication environments on the roads. These challenges cover security, billing and accounting issues to provide a secure access to services. The objective of this thesis work is to propose a service architecture for on-demand services in vehicular environments. A key point to keep a robust information service supply, stands in the capacity to provide and manage security mechanisms which comprise authentication and authorization of subscribers following a temporary subscription model. These features, along with privacy mechanisms, will offer to the communicating peers a secure way to mutually access and exchange information even if no previous knowledge of each other is available. Policies of service providers can regulate the supply of information services according to the subscribers' profiles. Providers can also define the implementation of accountability models in the form of metering and billing schemes appropriate for VANETS. This will result in the implementation of incentive and collaborative mechanisms to foster service delivery among vehicles

    #Blockchain4EU: Blockchain for Industrial Transformations

    Get PDF
    The project #Blockchain4EU is a forward looking exploration of existing, emerging and potential applications based on Blockchain and other DLTs for industrial / non-financial sectors. It combined Science and Technology Studies with a transdisciplinary policy lab toolbox filled with frameworks from Foresight and Horizon Scanning, Behavioural Insights, or Participatory, Critical and Speculative Design. Amid unfolding and uncertain developments of the Blockchain space, our research signals a number of crucial opportunities and challenges around a technology that could record, secure and transfer any digitised transaction or process, and thus potentially affect large parts of current industrial landscapes. This report offers key insights for its implementation and uptake by industry, businesses and SMEs, together with science for policy strategic recommendations.JRC.I.2-Foresight, Behavioural Insights and Design for Polic

    System support for client-server based interactive applications in ad hoc networks

    Get PDF
    With the emergence of wireless communications and mobile computing. new ways for people to interact with each other and their surrounding environment are emerging. Mobile devices, such as Personal Digital Assistants (PDAs) with wireless communication interfaces are able to communicate directly with each other if they are "close enough". If such devices are also able to act as message relays (routers), then a very powerful facility in the form of a mobile ad hoc network can be made available to applications. Although present day PDAs have sufficient networking and processing capabilities to support interesting interactive applications, as yet, there is hardly any software available for constructing and maintaining ad hoc networks and not many practical interactive applications have been built and tested. Rather, much of the research work is still at simulation and modelling stage. Thus it is difficult at this stage to decide what system support (middleware) for interactive applications a PDA should contain. This work is a step in the direction of remedying the situation by considering a class of applications where interactions between users can be supported by one of the nodes in the ad hoc network acting as a server. The thesis presents the design, implementation and evaluation of three such applications on PDAs, and based on that experience, describes what system support (middleware) for such applications is required. These applications are: Auction, Bingo game and Chatting that work over ad hoc networks. The work presented here can be used as a basis for deciding how the current generation of PDA operating systems can be extended for supporting ad hoc networking and what additional services are required for interactive applications.EThOS - Electronic Theses Online ServiceGBUnited Kingdo

    The Pull Paradigm : foundations of user-centric advanced driver assistant systems based on bidirectional car2X communication

    Get PDF
    This thesis develops applications for vehicular ad-hoc networks that go far beyond the currently established areas of driving safety and traffic efficiency. The ad-hoc network is regarded as a dynamic information resource which is available to any vehicle at any time. In contrast to current state-of-the-art research, the proposed Pull Paradigm starts at the user\u27s vehicle rather than at an information source somewhere in the network, e.g. a braking car. To access information from highly dynamic ad-hoc networks, bidirectional communication and information discovery and retrieval play a vital role. Therefore, in the course of the work, the applicability of the Pull Paradigm to established vehicular ad-hoc networks is thoroughly examined and missing aspects are identified. It turns out that a number of enhancements to almost all layers of the network stack are necessary in order to apply the Pull Paradigm using existing technology. The central elements here are two novel algorithms for managing information flow and dissemination in ad-hoc networks, which are at first formulated from the abstract perspective of graph theory. Using the knowledge gained leads to the development of PADE, a platform that supports development of vehicular ad-hoc network applications. The designed algorithms are then implemented as a routing scheme, integrated and evaluated in large, simulated city scenarios. Furthermore, PADE combines real\u27\u27 and simulated communication technologies and abstracts from them, so that applications can be transferred from the lab into a test vehicle with minimal effort. In order to achieve this ambitious goal, PADE builds on a number of existing simulation and communication technologies. The practical applicability of the Pull approach is shown in two demonstrators that are integrated into a BMW 5 series test vehicle. The presentation module of the PADE platform was tested in the currently largest field operational test for vehicular ad-hoc communication. Over 400 drivers in 120 vehicles experienced the system on a daily basis.In dieser Doktorarbeit werden Anwendungen für Fahrzeug Ad-hoc Netzwerke erarbeitet, die weit über die derzeit etablierten Bereiche der Fahrsicherheit und Verkehrseffizienz hinausgehen. Das Ad-hoc Netzwerk wird dabei als dynamische Informationsressource angesehen, die jedem Fahrzeug zu jedem Zeitpunkt zur Verfügung steht. Im Gegensatz zum derzeitigen Stand der Forschung geht das vorgestellte Pull Paradigma vom Fahrzeug des Benutzers und nicht von der Informationsquelle aus, z.B. einem bremsenden Fahrzeug. Für den Zugriff auf Informationen aus hochdynamischen Ad-hoc Netzen, spielen bidirektionale Kommunikation, Informationssuche und -rücktransport eine entscheidende Rolle. Im Verlauf der Arbeit wird deshalb die Anwendbarkeit des Pull Paradigmas auf etablierte Fahrzeug Ad-hoc Netze untersucht und fehlende Aspekte identifiziert. Es zeigt sich, dass eine Reihe an Erweiterungen auf fast allen Ebenen des Netzwerkstapels nötig sind damit die bestehende Technologie um das Pull Paradigma erweitert werden kann. Zentraler Punkt hierbei sind zwei neuartige Algorithmen zur Informationsverwaltung und -verbreitung in Ad-hoc Netzwerken die zunächst abstrakt aus Sicht der Graphentheorie formuliert werden. Mit Hilfe der gewonnenen Erkenntnisse wird PADE, eine Plattform zur Entwicklung von Anwendungen für Fahrzeug Ad-hoc Netze, entwickelt. Die entworfenen Algorithmen werden dann als Routingverfahren im Netzwerkstapel realisiert, in diesen integriert und auf großflächigen Stadtszenarien im Simulator evaluiert. Des Weiteren vereint PADE echte\u27\u27 und simulierte Kommunikationstechnologien und abstrahiert von diesen, sodass Anwendungen mit minimalem Aufwand vom Labor in ein Testfahrzeug überführt werden können. Um dieses ambitionierte Ziel zu erreichen, wird auf einer Reihe bereits bestehender Simulations- und Kommunikationstechnologien aufgebaut. Die praktische Anwendbarkeit des Pull Paradigmas wird anschließend in zwei Demonstratoren implementiert und in ein BMW 5er Testfahrzeug integriert. Das Präsentationsmodul der PADE Plattform wurde im derzeit weltgrößten Feldversuch für Fahrzeug Ad-hoc Kommunikation von über 400 Fahrern in 120 Fahrzeugen im Alltag getestet

    Radio Communications

    Get PDF
    In the last decades the restless evolution of information and communication technologies (ICT) brought to a deep transformation of our habits. The growth of the Internet and the advances in hardware and software implementations modified our way to communicate and to share information. In this book, an overview of the major issues faced today by researchers in the field of radio communications is given through 35 high quality chapters written by specialists working in universities and research centers all over the world. Various aspects will be deeply discussed: channel modeling, beamforming, multiple antennas, cooperative networks, opportunistic scheduling, advanced admission control, handover management, systems performance assessment, routing issues in mobility conditions, localization, web security. Advanced techniques for the radio resource management will be discussed both in single and multiple radio technologies; either in infrastructure, mesh or ad hoc networks

    Mobile Ad Hoc Networks

    Get PDF
    Guiding readers through the basics of these rapidly emerging networks to more advanced concepts and future expectations, Mobile Ad hoc Networks: Current Status and Future Trends identifies and examines the most pressing research issues in Mobile Ad hoc Networks (MANETs). Containing the contributions of leading researchers, industry professionals, and academics, this forward-looking reference provides an authoritative perspective of the state of the art in MANETs. The book includes surveys of recent publications that investigate key areas of interest such as limited resources and the mobility of mobile nodes. It considers routing, multicast, energy, security, channel assignment, and ensuring quality of service. Also suitable as a text for graduate students, the book is organized into three sections: Fundamentals of MANET Modeling and Simulation—Describes how MANETs operate and perform through simulations and models Communication Protocols of MANETs—Presents cutting-edge research on key issues, including MAC layer issues and routing in high mobility Future Networks Inspired By MANETs—Tackles open research issues and emerging trends Illustrating the role MANETs are likely to play in future networks, this book supplies the foundation and insight you will need to make your own contributions to the field. It includes coverage of routing protocols, modeling and simulations tools, intelligent optimization techniques to multicriteria routing, security issues in FHAMIPv6, connecting moving smart objects to the Internet, underwater sensor networks, wireless mesh network architecture and protocols, adaptive routing provision using Bayesian inference, and adaptive flow control in transport layer using genetic algorithms
    corecore