37,154 research outputs found

    Robust Image Hashing Based Efficient Authentication for Smart Industrial Environment

    Full text link
    [EN] Due to large volume and high variability of editing tools, protecting multimedia contents, and ensuring their privacy and authenticity has become an increasingly important issue in cyber-physical security of industrial environments, especially industrial surveillance. The approaches authenticating images using their principle content emerge as popular authentication techniques in industrial video surveillance applications. But maintaining a good tradeoff between perceptual robustness and discriminations is the key research challenge in image hashing approaches. In this paper, a robust image hashing method is proposed for efficient authentication of keyframes extracted from surveillance video data. A novel feature extraction strategy is employed in the proposed image hashing approach for authentication by extracting two important features: the positions of rich and nonzero low edge blocks and the dominant discrete cosine transform (DCT) coefficients of the corresponding rich edge blocks, keeping the computational cost at minimum. Extensive experiments conducted from different perspectives suggest that the proposed approach provides a trustworthy and secure way of multimedia data transmission over surveillance networks. Further, the results vindicate the suitability of our proposal for real-time authentication and embedded security in smart industrial applications compared to state-of-the-art methods.This work was supported in part by the National Natural Science Foundation of China under Grant 61976120, in part by the Natural Science Foundation of Jiangsu Province under Grant BK20191445, in part by the Six Talent Peaks Project of Jiangsu Province under Grant XYDXXJS-048, and sponsored by Qing Lan Project of Jiangsu Province, China.Sajjad, M.; Ul Haq, I.; Lloret, J.; Ding, W.; Muhammad, K. (2019). Robust Image Hashing Based Efficient Authentication for Smart Industrial Environment. IEEE Transactions on Industrial Informatics. 15(12):6541-6550. https://doi.org/10.1109/TII.2019.2921652S65416550151

    Deterministic scheduling for energy efficient and reliable communication in heterogeneous sensing environments in industrial wireless sensor networks

    Get PDF
    The present-day industries incorporate many applications, and complex processes, hence, a large number of sensors with dissimilar process deadlines and sensor update frequencies will be in place. This paper presents a scheduling algorithm, which takes into account the varying deadlines of the sensors connected to the cluster-head, and formulates a static schedule for Time Division Multiple Access (TDMA) based communication. The scheme uses IEEE802.15.4e superframe as a baseline and proposes a new superframe structure. For evaluation purposes the update frequencies of different industrial processes are considered. The scheduling algorithm is evaluated under varying network loads by increasing the number of nodes affiliated to a cluster-head. The static schedule generated by the scheduling algorithm offers reduced energy consumption, improved reliability, efficient network load management and improved information to control bits ratio

    Signal estimation in cognitive satellite networks for satellite-based industrial internet of things

    Get PDF
    Satellite industrial Internet of Things (IIoT) plays an important role in industrial manufactures without requiring the support of terrestrial infrastructures. However, due to the scarcity of spectrum resources, existing satellite frequency bands cannot satisfy the demand of IIoT, which have to explore other available spectrum resources. Cognitive satellite networks are promising technologies and have the potential to alleviate the shortage of spectrum resources and enhance spectrum efficiency by sharing both spectral and spatial degrees of freedom. For effective signal estimations, multiple features of wireless signals are needed at receivers, the transmissions of which may cause considerable overhead. To mitigate the overhead, part of parameters, such as modulation order, constellation type, and signal to noise ratio (SNR), could be obtained at receivers through signal estimation rather than transmissions from transmitters to receivers. In this article, a grid method is utilized to process the constellation map to obtain its equivalent probability density function. Then, binary feature matrix of the probability density function is employed to construct a cost function to estimate the modulation order and constellation type for multiple quadrature amplitude modulation (MQAM) signal. Finally, an improved M 2 M ∞ method is adopted to realize the SNR estimation of MQAM. Simulation results show that the proposed method is able to accurately estimate the modulation order, constellation type, and SNR of MQAM signal, and these features are extremely useful in satellite-based IIoT

    Resource Efficient Authentication and Session Key Establishment Procedure for Low-Resource IoT Devices

    Get PDF
    open access journalThe Internet of Things (IoT) can includes many resource-constrained devices, with most usually needing to securely communicate with their network managers, which are more resource-rich devices in the IoT network. We propose a resource-efficient security scheme that includes authentication of devices with their network managers, authentication between devices on different networks, and an attack-resilient key establishment procedure. Using automated validation with internet security protocols and applications tool-set, we analyse several attack scenarios to determine the security soundness of the proposed solution, and then we evaluate its performance analytically and experimentally. The performance analysis shows that the proposed solution occupies little memory and consumes low energy during the authentication and key generation processes respectively. Moreover, it protects the network from well-known attacks (man-in-the-middle attacks, replay attacks, impersonation attacks, key compromission attacks and denial of service attacks)
    corecore