4,507 research outputs found

    Federated Sensor Network architectural design for the Internet of Things (IoT)

    Get PDF
    An information technology that can combine the physical world and virtual world is desired. The Internet of Things (IoT) is a concept system that uses Radio Frequency Identification (RFID), WSN and barcode scanners to sense and to detect physical objects and events. This information is shared with people on the Internet. With the announcement of the Smarter Planet concept by IBM, the problem of how to share this data was raised. However, the original design of WSN aims to provide environment monitoring and control within a small scale local network. It cannot meet the demands of the IoT because there is a lack of multi-connection functionality with other WSNs and upper level applications. As various standards of WSNs provide information for different purposes, a hybrid system that gives a complete answer by combining all of them could be promising for future IoT applications. This thesis is on the subject of `Federated Sensor Network' design and architectural development for the Internet of Things. A Federated Sensor Network (FSN) is a system that integrates WSNs and the Internet. Currently, methods of integrating WSNs and the Internet can follow one of three main directions: a Front-End Proxy solution, a Gateway solution or a TCP/IP Overlay solution. Architectures based on the ideas from all three directions are presented in this thesis; this forms a comprehensive body of research on possible Federated Sensor Network architecture designs. In addition, a fully compatible technology for the sensor network application, namely the Sensor Model Language (SensorML), has been reviewed and embedded into our FSN systems. The IoT as a new concept is also comprehensively described and the major technical issues discussed. Finally, a case study of the IoT in logistic management for emergency response is given. Proposed FSN architectures based on the Gateway solution are demonstrated through hardware implementation and lab tests. A demonstration of the 6LoWPAN enabled federated sensor network based on the TCP/IP Overlay solution presents a good result for the iNET localization and tracking project. All the tests of the designs have verified feasibility and achieve the target of the IoT concept

    An Approach to the Application of the Internet of Things in Logistics

    Get PDF
    The Internet of Things (IoT) is a technology of the future that is being widely applied in business environment. Companies around the world are starting to apply IoT technologies to ensure the most efficient business possible. The importance of the application of this technology has been particularly evident in improving logistics processes. This paper describes IoT applications in processes such as supply chain management, i.e. control of transport and storage of goods and materials. Examples of smart solutions offered by IoT technology are presented. Various technologies and standards are used in the implementation of the IoT. The scientific community is increasingly researching new technologies such as NB-IoT and 5G, which provide an even greater potential for IoT development. Therefore, this paper shows a comparison of these technologies and explains how IoT devices work with them

    Mitigating Insider Threat Risks in Cyber-physical Manufacturing Systems

    Get PDF
    Cyber-Physical Manufacturing System (CPMS)—a next generation manufacturing system—seamlessly integrates digital and physical domains via the internet or computer networks. It will enable drastic improvements in production flexibility, capacity, and cost-efficiency. However, enlarged connectivity and accessibility from the integration can yield unintended security concerns. The major concern arises from cyber-physical attacks, which can cause damages to the physical domain while attacks originate in the digital domain. Especially, such attacks can be performed by insiders easily but in a more critical manner: Insider Threats. Insiders can be defined as anyone who is or has been affiliated with a system. Insiders have knowledge and access authentications of the system\u27s properties, therefore, can perform more serious attacks than outsiders. Furthermore, it is hard to detect or prevent insider threats in CPMS in a timely manner, since they can easily bypass or incapacitate general defensive mechanisms of the system by exploiting their physical access, security clearance, and knowledge of the system vulnerabilities. This thesis seeks to address the above issues by developing an insider threat tolerant CPMS, enhanced by a service-oriented blockchain augmentation and conducting experiments & analysis. The aim of the research is to identify insider threat vulnerabilities and improve the security of CPMS. Blockchain\u27s unique distributed system approach is adopted to mitigate the insider threat risks in CPMS. However, the blockchain limits the system performance due to the arbitrary block generation time and block occurrence frequency. The service-oriented blockchain augmentation is providing physical and digital entities with the blockchain communication protocol through a service layer. In this way, multiple entities are integrated by the service layer, which enables the services with less arbitrary delays while retaining their strong security from the blockchain. Also, multiple independent service applications in the service layer can ensure the flexibility and productivity of the CPMS. To study the effectiveness of the blockchain augmentation against insider threats, two example models of the proposed system have been developed: Layer Image Auditing System (LIAS) and Secure Programmable Logic Controller (SPLC). Also, four case studies are designed and presented based on the two models and evaluated by an Insider Attack Scenario Assessment Framework. The framework investigates the system\u27s security vulnerabilities and practically evaluates the insider attack scenarios. The research contributes to the understanding of insider threats and blockchain implementations in CPMS by addressing key issues that have been identified in the literature. The issues are addressed by EBIS (Establish, Build, Identify, Simulation) validation process with numerical experiments and the results, which are in turn used towards mitigating insider threat risks in CPMS

    Decision Support and Systems Interoperability in Global Business Management

    Get PDF
    Globalization of business and volatility of financial markets has catapulted ‘cycle-time’ as a key indicator of operational efficiency in business processes. Systems automation holds the promise to augment the ability of business and healthcare networks to rapidly adapt to changes or respond, with minimal human intervention, under ideal conditions. Currently, system of systems (SOS) or organization of networks contribute minimally in making decisions because collaboration remains elusive due the challenges of complexity. Convergence and maturity of research offers the potential for a paradigm shift in interoperability. This paper explores some of these trends and related technologies. Irrespective of the characteristics of information systems, the development of various industry-contributed ontologies for knowledge and decision layers, may spur self-organizing SOS to increase the ability to sense and respond. Profitability from pervasive use of ontological frameworks and agent-based modeling may depend on the ability to use them through better enterprise and extraprise exchange

    Analysis of Decision Support Systems of Industrial Relevance: Application Potential of Fuzzy and Grey Set Theories

    Get PDF
    The present work articulates few case empirical studies on decision making in industrial context. Development of variety of Decision Support System (DSS) under uncertainty and vague information is attempted herein. The study emphases on five important decision making domains where effective decision making may surely enhance overall performance of the organization. The focused territories of this work are i) robot selection, ii) g-resilient supplier selection, iii) third party logistics (3PL) service provider selection, iv) assessment of supply chain’s g-resilient index and v) risk assessment in e-commerce exercises. Firstly, decision support systems in relation to robot selection are conceptualized through adaptation to fuzzy set theory in integration with TODIM and PROMETHEE approach, Grey set theory is also found useful in this regard; and is combined with TODIM approach to identify the best robot alternative. In this work, an attempt is also made to tackle subjective (qualitative) and objective (quantitative) evaluation information simultaneously, towards effective decision making. Supplier selection is a key strategic concern for the large-scale organizations. In view of this, a novel decision support framework is proposed to address g-resilient (green and resilient) supplier selection issues. Green capability of suppliers’ ensures the pollution free operation; while, resiliency deals with unexpected system disruptions. A comparative analysis of the results is also carried out by applying well-known decision making approaches like Fuzzy- TOPSIS and Fuzzy-VIKOR. In relation to 3PL service provider selection, this dissertation proposes a novel ‘Dominance- Based’ model in combination with grey set theory to deal with 3PL provider selection, considering linguistic preferences of the Decision-Makers (DMs). An empirical case study is articulated to demonstrate application potential of the proposed model. The results, obtained thereof, have been compared to that of grey-TOPSIS approach. Another part of this dissertation is to provide an integrated framework in order to assess gresilient (ecosilient) performance of the supply chain of a case automotive company. The overall g-resilient supply chain performance is determined by computing a unique ecosilient (g-resilient) index. The concepts of Fuzzy Performance Importance Index (FPII) along with Degree of Similarity (DOS) (obtained from fuzzy set theory) are applied to rank different gresilient criteria in accordance to their current status of performance. The study is further extended to analyze, and thereby, to mitigate various risk factors (risk sources) involved in e-commerce exercises. A total forty eight major e-commerce risks are recognized and evaluated in a decision making perspective by utilizing the knowledge acquired from the fuzzy set theory. Risk is evaluated as a product of two risk quantifying parameters viz. (i) Likelihood of occurrence and, (ii) Impact. Aforesaid two risk quantifying parameters are assessed in a subjective manner (linguistic human judgment), rather than exploring probabilistic approach of risk analysis. The ‘crisp risk extent’ corresponding to various risk factors are figured out through the proposed fuzzy risk analysis approach. The risk factor possessing high ‘crisp risk extent’ score is said be more critical for the current problem context (toward e-commerce success). Risks are now categorized into different levels of severity (adverse consequences) (i.e. negligible, minor, marginal, critical and catastrophic). Amongst forty eight risk sources, top five risk sources which are supposed to adversely affect the company’s e-commerce performance are recognized through such categorization. The overall risk extent is determined by aggregating individual risks (under ‘critical’ level of severity) using Fuzzy Inference System (FIS). Interpretive Structural Modeling (ISM) is then used to obtain structural relationship amongst aforementioned five risk sources. An appropriate action requirement plan is also suggested, to control and minimize risks associated with e-commerce exercises

    Air Force Institute of Technology Research Report 2006

    Get PDF
    This report summarizes the research activities of the Air Force Institute of Technology’s Graduate School of Engineering and Management. It describes research interests and faculty expertise; lists student theses/dissertations; identifies research sponsors and contributions; and outlines the procedures for contacting the school. Included in the report are: faculty publications, conference presentations, consultations, and funded research projects. Research was conducted in the areas of Aeronautical and Astronautical Engineering, Electrical Engineering and Electro-Optics, Computer Engineering and Computer Science, Systems and Engineering Management, Operational Sciences, Mathematics, Statistics and Engineering Physics

    Teknologi dan Teknik Sistem Terdistribusi Pervasif dalam Bidang Logistik: Studi Literatur Sistematis

    Get PDF
    . Distributed pervasive system is part of distributed system that can be accessed anytime, anywhere, anybody, and anyone. In the part of logistics, supply chain has problems such as real time visibility, materials and products track and trace, and response time for huge data stream processed to automating control smart package. Increasingly advanced technology needed technology to monitor the transport chain with smart thing and some techniques needed to be used to increase performance of the technology. In this paper will study technologies are using in pervasive system domain of logistics, especially technologies to monitor transport chain. Besides, presented several techniques used to improve performance of the technologies. In this paper found some technologies such as RFID, Wireless Sensor Networks (WSN), and hybrid technology used in pervasive system domain of logistics. Also found some techniques to improve performance like smoothing method, multi threshold algorithm, and kalman filter technique. Based on literature can be conclude that some techniques can improve performance of technologies
    corecore