6,892 research outputs found

    Privacy protection and energy optimization for 5G-aided industrial internet of things

    Get PDF
    The 5G is expected to revolutionize every sector of life by providing interconnectivity of everything everywhere at high speed. However, massively interconnected devices and fast data transmission will bring the challenge of privacy as well as energy deficiency. In today's fast-paced economy, almost every sector of the economy is dependent on energy resources. On the other hand, the energy sector is mainly dependent on fossil fuels and is constituting about 80% of energy globally. This massive extraction and combustion of fossil fuels lead to a lot of adverse impacts on health, environment, and economy. The newly emerging 5G technology has changed the existing phenomenon of life by connecting everything everywhere using IoT devices. 5G enabled IIoT devices has transformed everything from traditional to smart, e.g. smart city, smart healthcare, smart industry, smart manufacturing etc. However, massive I/O technologies for providing D2D connection has also created the issue of privacy that need to be addressed. Privacy is the fundamental right of every individual. 5G industries and organizations need to preserve it for their stability and competency. Therefore, privacy at all three levels (data, identity and location) need to be maintained. Further, energy optimization is a big challenge that needs to be addressed for leveraging the potential benefits of 5G and 5G aided IIoT. Billions of IIoT devices that are expected to communicate using the 5G network will consume a considerable amount of energy while energy resources are limited. Therefore, energy optimization is a future challenge faced by 5G industries that need to be addressed. To fill these gaps, we have provided a comprehensive framework that will help energy researchers and practitioners in better understanding of 5G aided industry 4.0 infrastructure and energy resource optimization by improving privacy. The proposed framework is evaluated using case studies and mathematical modelling. © 2020 Institute of Electrical and Electronics Engineers Inc.. All rights reserved

    Blockchain, consensus, and cryptography in electronic voting

    Get PDF
    Motivated by the recent trends to conduct electronic elections using blockchain technologies, we review the vast literature on cryptographic voting and assess the status of the field. We analyze the security requirements for voting systems and describe the major ideas behind the most influential cryptographic protocols for electronic voting. We focus on the great importance of consensus in the elimination of trusted third parties. Finally, we examine whether recent blockchain innovations can satisfy the strict requirements set for the security of electronic voting

    Online Dispute Resolution: Stinky, Repugnant, or Drab?

    Get PDF

    Technology Criticism in the Classroom (Chapter in The Nature of Technology)

    Full text link
    I first heard about a tragedy in Tucson, not from major television news networks, but from a direct message sent by a politically-active friend who was attending the political gathering where a mass shooting took place, including the shooting of an Arizona congresswoman, Gabrielle Giffords. While the television news sputtered around trying to offer details (initially wrongly claiming that she was dead, likely from pressure to be the first to report big news), I found myself reading Google News, piecing together Facebook posts, e-mailing friends and reading Twitter updates

    Developing our capability in cyber security: Academic Centres of Excellence in Cyber Security Research

    Get PDF

    User\u27s ability to detect fake news in online environments.

    Get PDF
    Technology has drastically changed the way people consume news. Due to the rise of online spaces built for users to share content, there has been a rise in the spread of false information. Social media platforms, Facebook specifically, provide their users with personalized content based on their interests. The ease of spreading information online coupled with the anonymity of the Internet, creates a breeding ground for potential misuse of information. This study sought to examine how users view themselves and others were influenced by fake news on social media if the post is denoted as fake, or if the post confirms preexisting beliefs
    • …
    corecore