17 research outputs found

    Secure Communication in Disaster Scenarios

    Get PDF
    Während Naturkatastrophen oder terroristischer Anschläge ist die bestehende Kommunikationsinfrastruktur häufig überlastet oder fällt komplett aus. In diesen Situationen können mobile Geräte mithilfe von drahtloser ad-hoc- und unterbrechungstoleranter Vernetzung miteinander verbunden werden, um ein Notfall-Kommunikationssystem für Zivilisten und Rettungsdienste einzurichten. Falls verfügbar, kann eine Verbindung zu Cloud-Diensten im Internet eine wertvolle Hilfe im Krisen- und Katastrophenmanagement sein. Solche Kommunikationssysteme bergen jedoch ernsthafte Sicherheitsrisiken, da Angreifer versuchen könnten, vertrauliche Daten zu stehlen, gefälschte Benachrichtigungen von Notfalldiensten einzuspeisen oder Denial-of-Service (DoS) Angriffe durchzuführen. Diese Dissertation schlägt neue Ansätze zur Kommunikation in Notfallnetzen von mobilen Geräten vor, die von der Kommunikation zwischen Mobilfunkgeräten bis zu Cloud-Diensten auf Servern im Internet reichen. Durch die Nutzung dieser Ansätze werden die Sicherheit der Geräte-zu-Geräte-Kommunikation, die Sicherheit von Notfall-Apps auf mobilen Geräten und die Sicherheit von Server-Systemen für Cloud-Dienste verbessert

    A Low-Cost Search-and-Rescue Drone Platform

    Get PDF
    In this work, an unmanned aerial system is implemented to search an outdoor area for an injured or missing person (subject) without requiring a connection to a ground operator or control station. The system detects subjects using exclusively on-board hardware as it traverses a predefined search path, with each implementation envisioned as a single element of a larger swarm of identical search drones. To increase the affordability of such a swarm, the system cost per drone serves as a primary constraint. Imagery is streamed from a camera to an Odroid single-board computer, which prepares the data for inference by a Neural Compute Stick vision accelerator. A single-class TinyYolo network, trained on the Okutama-Action dataset and an original Albatross dataset, is utilized to detect subjects in the prepared frames. The final network achieves 7.6 FPS in the field (8.64 FPS on the bench) with an 800x480 input resolution. The detection apparatus is mounted on a drone and field tests validate the system feasibility and efficacy

    Embracing the future Internet of Things

    Get PDF
    All of the objects in the real world are envisioned to be connected and/or represented, through an infrastructure layer, in the virtual world of the Internet, becoming Things with status information. Services are then using the available data from this Internet-of-Things (IoT) for various social and economical benefits which explain its extreme broad usage in very heterogeneous fields. Domain administrations of diverse areas of application developed and deployed their own IoT systems and services following disparate standards and architecture approaches that created a fragmentation of things, infrastructures and services in vertical IoT silos. Coordination and cooperation among IoT systems are the keys to build “smarter” IoT services boosting the benefits magnitude. This article analyses the technical trends of the future IoT world based on the current limitations of the IoT systems and the capability requirements. We propose a hyper-connected IoT framework in which “things” are connected to multiple interdependent services and describe how this framework enables the development of future applications. Moreover, we discuss the major limitations in today’s IoT and highlight the required capabilities in the future. We illustrate this global vision with the help of two concrete instances of the hyper-connected IoT in smart cities and autonomous driving scenarios. Finally, we analyse the trends in the number of connected “things” and point out open issues and future challenges. The proposed hyper-connected IoT framework is meant to scale the benefits of IoT from local to global

    Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone

    Get PDF
    With the rapid miniaturization in sensor technology, ruddervator, arduino, and multi-rotor system, drone technology has fascinated researchers in the field of network security. It is of critical significance given the advancement in modern strategic narratives. This has special relevance to drone-related operations. This technology can be controlled remotely by an invisible yet credible operator sitting to a powerful intelligence computer system (PICS) or an airborne control and command platform (AC2P). The two types of drones (reconnaissance and attacking) can communicate with each other and with the PICS or AC2P through wireless network channels referred to as Flying Ad Hoc Network or Unmanned Aerial Vehicular Network (FANET or UAVN). This mode of communication is not without some inconvenience. For instance, when the line of sight is broken, communication is mainly carried out through satellite using GPS (Global Positioning System) signals. Both GPS and UAVN/FANET use open network channels for data broadcasting, which are exposed to several threats, thus making security risky and challenging. This risk is specifically eminent in monitoring data transmission traffic, espionage, troop movement, border surveillance, searching, and warfare battlefield phenomenon, etc. This issue of security risk can be minimized conspicuously by developing a robust authentication scheme for IoD deployment military drones. Therefore, this research illustrates the designing of two separate protocols based on the aggregate signature, identity, pairing cryptography, and Computational Diffie-Hellman Problem (CDHP) to guarantee data integrity, authorization, and confidentiality among drones and AC2P/PICS. More importantly, the outdated data transmission flaw has also been tackled, which is of obvious concern to the past designed protocols. The security of the proposed designs is formally verified using a random oracle model (ROM), a real-or-random (ROR) model, and by informally using pragmatic illustration and mathematical lemmas. Nonetheless, the performance analysis section will be executed using the algorithmic big-O notation. The results show that these protocols are verifiably protected in the ROM and ROR model using the CDHP

    Design and Analysis of Lightweight Authentication Protocol for Securing IoD

    Get PDF
    The Internet-of-drones (IoD) environment is a layered network control architecture designed to maintain, coordinate, access, and control drones (or Unmanned Aerial vehicles UAVs) and facilitate drones' navigation services. The main entities in IoD are drones, ground station, and external user. Before operationalizing a drone in IoD, a control infrastructure is mandatory for securing its open network channel (Flying Ad Hoc Networks FANETs). An attacker can easily capture data from the available network channel and use it for their own purpose. Its protection is challenging, as it guarantees message integrity, non-repudiation, authenticity, and authorization amongst all the participants. Incredibly, without a robust authentication protocol, the task is sensitive and challenging one to solve. This research focus on the security of the communication path between drone and ground station and solving the noted vulnerabilities like stolen-verifier, privileged-insider attacks, and outdated-data-transmission/design flaws often reported in the current authentication protocols for IoD. We proposed a hash message authentication code/secure hash algorithmic (HMACSHA1) based robust, improved and lightweight authentication protocol for securing IoD. Its security has been verified formally using Random Oracle Model (ROM), ProVerif2.02 and informally using assumptions and pragmatic illustration. The performance evaluation proved that the proposed protocol is lightweight compared to prior protocols and recommended for implementation in the real-world IoD environment.Qatar University [IRCC-2021-010]

    Society 5.0

    Get PDF
    This open access book introduces readers to the vision on future cities and urban lives in connection with “Society 5.0”, which was proposed in the 5th Basic Science and Technology Plan by Japan’s national government for a technology-based, human-centered society, emerging from the fourth industrial revolution. The respective chapters summarize the findings and suggestions of joint research projects conducted by H-UTokyo Lab. Through the research collaboration and discussion, this book explores the future urban lives under the concept of “Society 5.0”, characterized by the key phrases of data-driven society, knowledge-intensive society, and non-monetary society, and suggests the directionality to which the concept should aim as Japan’s technology-led national vision. Written by Hitachi’s researchers as well as academics from a wide range of fields, including engineering, economics, psychology and philosophy at The University of Tokyo, the book is a must read for members of the general public interested in urban planning, students, professionals and researchers in engineering and economics

    C.O.M.U.N.I.: Keeping communication alive, trustworthy, and open

    Get PDF
    With the increasing ubiquity of smartphones, their potential as emergency communication tools has become pivotal. Conventional communication tools often fall short in crises, leading to information gaps and coordination challenges among affected individuals, emergency responders, and decision-makers. This raises the need for a more robust and reliable communication system during emergencies. Despite the widespread availability of smartphones, there is a significant limitation to leveraging them as effective communication tools during emergencies. Current messaging applications have not effectively maximized their reach and utility, especially for information sharing and assistance coordination. Further, they frequently lack moderation tools and channels for official messages. The thesis aims to address this gap by proposing a smartphone application designed for emergencies. The objectives of the thesis include providing an overview of the state-of-the-art in mobile ad-hoc networks, defining specific use cases and experimentation scenarios, and ultimately designing and implementing a network architecture and a prototype application. The prototype aspires to facilitate efficient information sharing, coordinate assistance, and ensure timely access to accurate information for all stakeholders while ensuring a high quality of messages and safe access for anyone. To achieve this, the application combines technologies of peer-to-peer communication with more traditional communication via cellular networks. The proposed system incorporates features such as real-time communication, user authentication, message verification, and community moderation. A requirements-based evaluation is conducted to assess the effectiveness of the application in fulfilling user needs and enhancing communication channels during emergencies. The evaluation demonstrates that the proposed application effectively fulfills user requirements and showcases its potential to augment communication during crises. The system is further compared against existing messaging applications, highlighting its significant advantages and enhancements over the current state-of-the-art solutions

    Energy-Aware Decentralised Medium Access Control for Wireless Sensor Networks

    Get PDF
    The success of future Internet-of-Things (IoT) based application deployments depends on the ability of wireless sensor platforms to sustain uninterrupted operation based on: (i) environmental energy harvesting and optimised coupling with the platform’s energy consumption when processing and transmitting/receiving data; (ii) spontaneous adaptation to changes in the local network topology without requiring central coordination. To address the first aspect, starting from practical deployments of a multi-transducer platform for photovoltaic and piezoelectric energy harvesting and the associated modelling and analysis, data-driven probability models are derived to facilitate the optimal coupling of energy production and consumption when processing and transmitting data. To address the second aspect (adaptability), the new concept of decentralised time-synchronised channel swapping (DT-SCS) is proposed – a novel protocol for the medium access control (MAC) layer of IEEE 802.15.4-based wireless sensor networks (WSNs). Simulation results reveal that DT-SCS comprises an excellent candidate for completely decentralised MAC layer coordination in WSNs by providing quick convergence to steady state, high bandwidth utilisation, high connectivity, robustness to interference and low energy consumption. Moreover, performance results via a Contiki-OS based deployment on TelosB motes reveal that DT-SCS comprises an excellent candidate for a decentralised multichannel MAC layer

    Routing protocol for V2X communications for Urban VANETs

    Get PDF
    Intelligent Transportation Systems (ITSs) have been attracting tremendous attention in both academia and industry due to emerging applications that pave the way towards safer enjoyable journeys and inclusive digital partnerships. Undoubtedly, these ITS applications will demand robust routing protocols that not only focus on Inter-Vehicle Communications but also on providing fast, reliable, and secure access to the infrastructure. This thesis aims mainly to introduce the challenges of data packets routing through urban environment using the help of infrastructure. Broadcasting transmission is an essential operational technique that serves a broad range of applications which demand different restrictive QoS provisioning levels. Although broadcast communication has been investigated widely in highway vehicular networks, it is undoubtedly still a challenge in the urban environment due to the obstacles, such as high buildings. In this thesis, the Road-Topology based Broadcast Protocol (RTBP) is proposed, a distance and contention-based forwarding scheme suitable for both urban and highway vehicular environments. RTBP aims at assigning the highest forwarding priority to a vehicle, called a mobile repeater, having the greatest capability to send the packet in multiple directions. In this way, RTBP effectively reduces the number of competing vehicles and minimises the number of hops required to retransmit the broadcast packets around the intersections to cover the targeted area. By investigating the RTBP under realistic urban scenarios against well-known broadcast protocols, eMDR and TAF, that are dedicated to retransmitting the packets around intersections, the results showed the superiority of the RTBP in delivering the most critical warning information for 90% of vehicles with significantly lower delay of 58% and 70% compared to eMDR and TAF. The validation of this performance was clear when the increase in the number of vehicles. Secondly, a Fast and Reliable Hybrid routing (FRHR) protocol is introduced for efficient infrastructure access which is capable of handling efficient vehicle to vehicle communications. Interface to infrastructure is provided by carefully placed RoadSide Units (RSUs) which broadcast beacons in a multi-hop fashion in constrained areas. This enables vehicles proactively to maintain fresh minimum-delay routes to other RSUs while reactively discovering routes to nearby vehicles. The proposed protocol utilizes RSUs connected to the wired backbone network to relay packets toward remote vehicles. A vehicle selects an RSU to register with according to the expected mean delay instead of the device’s remoteness. The FRHR performance is evaluated against established infrastructure routing protocols, Trafroute, IGSR and RBVT-R that are dedicated to for urban environment, the results showed an improvement of 20% to 33% in terms of packet delivery ratio and lower latency particularly in sparse networks due to its rapid response to changes in network connectivity. Thirdly, focusing on increasing FRHR’s capability to provide more stable and durable routes to support the QoS requirements of expected wide-range ITS applications on the urban environment, a new route selection mechanism is introduced, aiming at selecting highly connected crossroads. The new protocol is called, Stable Infrastructure Routing Protocol (SIRP). Intensive simulation results showed that SIRP offers low end-to-end delay and high delivery ratio with varying traffic density, while resolving the problem of frequent link failures

    State-of-the-Art Sensors Technology in Spain 2015: Volume 1

    Get PDF
    This book provides a comprehensive overview of state-of-the-art sensors technology in specific leading areas. Industrial researchers, engineers and professionals can find information on the most advanced technologies and developments, together with data processing. Further research covers specific devices and technologies that capture and distribute data to be processed by applying dedicated techniques or procedures, which is where sensors play the most important role. The book provides insights and solutions for different problems covering a broad spectrum of possibilities, thanks to a set of applications and solutions based on sensory technologies. Topics include: • Signal analysis for spectral power • 3D precise measurements • Electromagnetic propagation • Drugs detection • e-health environments based on social sensor networks • Robots in wireless environments, navigation, teleoperation, object grasping, demining • Wireless sensor networks • Industrial IoT • Insights in smart cities • Voice recognition • FPGA interfaces • Flight mill device for measurements on insects • Optical systems: UV, LEDs, lasers, fiber optics • Machine vision • Power dissipation • Liquid level in fuel tanks • Parabolic solar tracker • Force sensors • Control for a twin roto
    corecore