45,317 research outputs found
A Survey of RFID Authentication Protocols Based on Hash-Chain Method
Security and privacy are the inherent problems in RFID communications. There
are several protocols have been proposed to overcome those problems. Hash chain
is commonly employed by the protocols to improve security and privacy for RFID
authentication. Although the protocols able to provide specific solution for
RFID security and privacy problems, they fail to provide integrated solution.
This article is a survey to closely observe those protocols in terms of its
focus and limitations.Comment: Third ICCIT 2008 International Conference on Convergence and Hybrid
Information Technolog
The E-Government Act: Promoting E-Quality or Exaggerating the Digital Divide?
In passing the E-Government Act of 2002, Congress has promised to improve the technological savvy of federal agencies and make more public forms and records available online. However, the question is whether doing so will alienate those Americans who do not have Internet access. Will the Act exaggerate the gap between the Internet haves and have-nots that is known as the digital divide? This iBrief identifies the e-quality issues arising from the E-Government Act and argues that implementation of the Act, however well intentioned, may exaggerate the digital divide
Block Chain Technology Assisted Privacy Preserving Resource Allocation Scheme for Internet of Things Based Cloud Computing
Resource scheduling in cloud environments is a complex task, as it involves allocating suitable resources based on Quality of Service (QoS) requirements. Existing resource allocation policies face challenges due to resource dispersion, heterogeneity, and uncertainty. In this research, the authors propose a novel approach called Quasi-Oppositional Artificial Jellyfish Optimization Algorithm (QO-AJFOA) for resource scheduling in cloud computing (CC) environments. The QO-AJFOA model aims to optimize the allocation of computing power and bandwidth resources in servers, with the goal of maximizing long-term utility. The technique combines quasi-oppositional based learning (QOBL) with traditional AJFOA. Additionally, a blockchain-assisted Smart Contract protocol is used to distribute resource allocation, ensuring agreement on wireless channel utilization. Experimental validation of the QO-AJFOA technique demonstrates its promising performance compared to recent models, as tested with varying numbers of tasks and iterations. The proposed approach addresses the challenges of resource scheduling in cloud environments and contributes to the existing literature on resource allocation policies
When Things Matter: A Data-Centric View of the Internet of Things
With the recent advances in radio-frequency identification (RFID), low-cost
wireless sensor devices, and Web technologies, the Internet of Things (IoT)
approach has gained momentum in connecting everyday objects to the Internet and
facilitating machine-to-human and machine-to-machine communication with the
physical world. While IoT offers the capability to connect and integrate both
digital and physical entities, enabling a whole new class of applications and
services, several significant challenges need to be addressed before these
applications and services can be fully realized. A fundamental challenge
centers around managing IoT data, typically produced in dynamic and volatile
environments, which is not only extremely large in scale and volume, but also
noisy, and continuous. This article surveys the main techniques and
state-of-the-art research efforts in IoT from data-centric perspectives,
including data stream processing, data storage models, complex event
processing, and searching in IoT. Open research issues for IoT data management
are also discussed
- …