180 research outputs found

    An Architecture for Blockchain over Edge-enabled IoT for Smart Circular Cities

    Get PDF
    Circular Economy is a novel economic model, where every ‘asset’ is not wasted but reused and upscaled. The Internet of Things-IoT paradigm can underpin the transition to a Circular Economy by enabling fine-grained and continuous asset tracking. However, there are issues related to security and privacy of IoT devices that generate and handle sensitive and personal data. The use of Blockchain technology provides an answer to this issue, however, its application raises issues related to the highly-constrained nature of these networks. In this paper, Edge Computing is presented as a solution to this issue, providing a way in which Blockchain and Edge Computing can be used together to address the constrained nature of IoT. Furthermore, we present the challenges that this combination poses and the opportunities that it brings. We propose an architecture that decreases the IoT devices requirements for memory capacity and increases the overall performance. We also discuss the architecture design and the challenges that it has, comparing it to the traditional Blockchain architecture as well as an Edge Computing architecture for Mobile Blockchain. The paper closes with a discussion and future extensions of our work are presented, as well

    Edge AI for Internet of Energy: Challenges and Perspectives

    Full text link
    The digital landscape of the Internet of Energy (IoE) is on the brink of a revolutionary transformation with the integration of edge Artificial Intelligence (AI). This comprehensive review elucidates the promise and potential that edge AI holds for reshaping the IoE ecosystem. Commencing with a meticulously curated research methodology, the article delves into the myriad of edge AI techniques specifically tailored for IoE. The myriad benefits, spanning from reduced latency and real-time analytics to the pivotal aspects of information security, scalability, and cost-efficiency, underscore the indispensability of edge AI in modern IoE frameworks. As the narrative progresses, readers are acquainted with pragmatic applications and techniques, highlighting on-device computation, secure private inference methods, and the avant-garde paradigms of AI training on the edge. A critical analysis follows, offering a deep dive into the present challenges including security concerns, computational hurdles, and standardization issues. However, as the horizon of technology ever expands, the review culminates in a forward-looking perspective, envisaging the future symbiosis of 5G networks, federated edge AI, deep reinforcement learning, and more, painting a vibrant panorama of what the future beholds. For anyone vested in the domains of IoE and AI, this review offers both a foundation and a visionary lens, bridging the present realities with future possibilities

    Failure Analysis in Next-Generation Critical Cellular Communication Infrastructures

    Full text link
    The advent of communication technologies marks a transformative phase in critical infrastructure construction, where the meticulous analysis of failures becomes paramount in achieving the fundamental objectives of continuity, security, and availability. This survey enriches the discourse on failures, failure analysis, and countermeasures in the context of the next-generation critical communication infrastructures. Through an exhaustive examination of existing literature, we discern and categorize prominent research orientations with focuses on, namely resource depletion, security vulnerabilities, and system availability concerns. We also analyze constructive countermeasures tailored to address identified failure scenarios and their prevention. Furthermore, the survey emphasizes the imperative for standardization in addressing failures related to Artificial Intelligence (AI) within the ambit of the sixth-generation (6G) networks, accounting for the forward-looking perspective for the envisioned intelligence of 6G network architecture. By identifying new challenges and delineating future research directions, this survey can help guide stakeholders toward unexplored territories, fostering innovation and resilience in critical communication infrastructure development and failure prevention

    Satellite Networks: Architectures, Applications, and Technologies

    Get PDF
    Since global satellite networks are moving to the forefront in enhancing the national and global information infrastructures due to communication satellites' unique networking characteristics, a workshop was organized to assess the progress made to date and chart the future. This workshop provided the forum to assess the current state-of-the-art, identify key issues, and highlight the emerging trends in the next-generation architectures, data protocol development, communication interoperability, and applications. Presentations on overview, state-of-the-art in research, development, deployment and applications and future trends on satellite networks are assembled

    Infrastructure Plan for ASC Petascale Environments

    Full text link

    Advancing the Cyberinfrastructure for Smart Water Metering and Water Demand Modeling

    Get PDF
    With rapid growth of urban populations and limited water resources, achieving an appropriate balance between water supply capacity and residential water demand poses a significant challenge to water supplying agencies. With the recent emergence of smart metering technology, where water use can be monitored and recorded at high resolution (e.g., observations of water use every 5 seconds), most existing research has been aimed at providing water managers with detailed information about the water use behavior of their consumers and the performance of water using fixtures. However, replacing existing meters with smart meters is expensive, and effectively using data produced by smart meters can be a roadblock for water utilities that lack sophisticated information technology expertise. The research in this dissertation presents low cost, open source cyberinfrastructure aimed at addressing these challenges. Components developed include an open source algorithm for identifying and classifying water end use events from smart meter data, a low cost datalogging and computational device that enables existing water meters to collect high resolution data and compute end use information, and a detailed water demand model that uses end use event information to simulate residential water use at a municipality level. Using this cyberinfrastructure, we conducted a case study application in the cities of Logan and Providence, Utah. We tested the applicability of the disaggregation algorithm in quantifying water end uses for different meter sizes and types. We tested the datalogging computational device at a residential household and demonstrated collection, disaggregation, and transfer of high resolution flow data and classified events into a secure server. Finally, we demonstrated a water demand model that simulates the detailed water end uses of Logan’s residents using a combination of a set of representative water end use events and monthly billing data. Using the data we collected and the outputs from the model, we demonstrated opportunities for conserving water through improving the efficiency of water using fixtures and promoting behavior changes

    Towards secure private and trustworthy human-centric embedded machine learning: An emotion-aware facial recognition case study

    Get PDF
    The use of artificial intelligence (AI) at the edge is transforming every aspect of the lives of human beings from scheduling daily activities to personalized shopping recommendations. Since the success of AI is to be measured ultimately in terms of how it benefits human beings, and that the data driving the deep learning-based edge AI algorithms are intricately and intimately tied to humans, it is important to look at these AI technologies through a human-centric lens. However, despite the significant impact of AI design on human interests, the security and trustworthiness of edge AI applications are not foolproof and ethicalneither foolproof nor ethical; Moreover, social norms are often ignored duringin the design, implementation, and deployment of edge AI systems. In this paper, we make the following two contributions: Firstly, we analyze the application of edge AI through a human-centric perspective. More specifically, we present a pipeline to develop human-centric embedded machine learning (HC-EML) applications leveraging a generic human-centric AI (HCAI) framework. Alongside, we also analyzediscuss the privacy, trustworthiness, robustness, and security aspects of HC-EML applications with an insider look at their challenges and possible solutions along the way. Secondly, to illustrate the gravity of these issues, we present a case study on the task of human facial emotion recognition (FER) based on AffectNet dataset, where we analyze the effects of widely used input quantization on the security, robustness, fairness, and trustworthiness of an EML model. We find that input quantization partially degrades the efficacy of adversarial and backdoor attacks at the cost of a slight decrease in accuracy over clean inputs. By analyzing the explanations generated by SHAP, we identify that the decision of a FER model is largely influenced by features such as eyes, alar crease, lips, and jaws. Additionally, we note that input quantization is notably biased against the dark skin faces, and hypothesize that low-contrast features of dark skin faces may be responsible for the observed trends. We conclude with precautionary remarks and guidelines for future researchers. 2022 The Author(s)This publication was made possible by NPRP grant # [13S-0206-200273] from the Qatar National Research Fund (a member of Qatar Foundation). Open Access funding provided by the Qatar National Library The statements made herein are solely the responsibility of the authors.Scopu
    • …
    corecore