121,788 research outputs found
Recommended from our members
MobileTrust: Secure Knowledge Integration in VANETs
Vehicular Ad hoc NETworks (VANET) are becoming popular due to the emergence of the Internet of Things and ambient intelligence applications. In such networks, secure resource sharing functionality is accomplished by incorporating trust schemes. Current solutions adopt peer-to-peer technologies that can cover the large operational area. However, these systems fail to capture some inherent properties of VANETs, such as fast and ephemeral interaction, making robust trust evaluation of crowdsourcing challenging. In this article, we propose MobileTrust—a hybrid trust-based system for secure resource sharing in VANETs. The proposal is a breakthrough in centralized trust computing that utilizes cloud and upcoming 5G technologies to provide robust trust establishment with global scalability. The ad hoc communication is energy-efficient and protects the system against threats that are not countered by the current settings. To evaluate its performance and effectiveness, MobileTrust is modelled in the SUMO simulator and tested on the traffic features of the small-size German city of Eichstatt. Similar schemes are implemented in the same platform to provide a fair comparison. Moreover, MobileTrust is deployed on a typical embedded system platform and applied on a real smart car installation for monitoring traffic and road-state parameters of an urban application. The proposed system is developed under the EU-founded THREAT-ARREST project, to provide security, privacy, and trust in an intelligent and energy-aware transportation scenario, bringing closer the vision of sustainable circular economy
COBRA: Context-aware Bernoulli Neural Networks for Reputation Assessment
Trust and reputation management (TRM) plays an increasingly important role in
large-scale online environments such as multi-agent systems (MAS) and the
Internet of Things (IoT). One main objective of TRM is to achieve accurate
trust assessment of entities such as agents or IoT service providers. However,
this encounters an accuracy-privacy dilemma as we identify in this paper, and
we propose a framework called Context-aware Bernoulli Neural Network based
Reputation Assessment (COBRA) to address this challenge. COBRA encapsulates
agent interactions or transactions, which are prone to privacy leak, in machine
learning models, and aggregates multiple such models using a Bernoulli neural
network to predict a trust score for an agent. COBRA preserves agent privacy
and retains interaction contexts via the machine learning models, and achieves
more accurate trust prediction than a fully-connected neural network
alternative. COBRA is also robust to security attacks by agents who inject fake
machine learning models; notably, it is resistant to the 51-percent attack. The
performance of COBRA is validated by our experiments using a real dataset, and
by our simulations, where we also show that COBRA outperforms other
state-of-the-art TRM systems.Comment: To be published in the Proceedings of AAAI, Feb 202
Holistic Blockchain Approach to Foster Trust, Privacy and Security in IoT Based Ambient Assisted Living Environment
The application of blockchains techniques in the Internet of Things (IoT) is gaining much attention with new solutions proposed in diverse areas of the IoT. Conventionally IoT systems are designed to follow the centralised paradigm where security and privacy control is vested on a 'trusted' third-party. This design leaves the user at the mercy of a sovereign broker and in addition, susceptible to several attacks. The implicit trust and the inferred reliability of centralised systems have been challenged recently following several privacy violations and personal data breaches. Consequently, there is a call for more secure decentralised systems that allows for finer control of user privacy while providing secure communication. Propitiously, the blockchain holds much promise and may provide the necessary framework for the design of a secure IoT system that guarantees fine-grained user privacy in a trustless manner. In this paper, we propose a holistic blockchain-based decentralised model for Ambient Assisted Living (AAL) environment. The nodes in our proposed model utilize smart contracts to define interaction rules while working collaboratively to contribute storage and computing resources. Based on the blockchain technique, our proposed model promotes trustless interaction and enhanced user's privacy through the blockchain-Interplanetary File System (IPFS) alliance. The proposed model also addresses the shortfall of storage constraints exhibited in many IoT systems
Mechatronics & the cloud
Conventionally, the engineering design process has assumed that the design team is able to exercise control over all elements of the design, either directly or indirectly in the case of sub-systems through their specifications. The introduction of Cyber-Physical Systems (CPS) and the Internet of Things (IoT) means that a design team’s ability to have control over all elements of a system is no longer the case, particularly as the actual system configuration may well be being dynamically reconfigured in real-time according to user (and vendor) context and need. Additionally, the integration of the Internet of Things with elements of Big Data means that information becomes a commodity to be autonomously traded by and between systems, again according to context and need, all of which has implications for the privacy of system users. The paper therefore considers the relationship between mechatronics and cloud-basedtechnologies in relation to issues such as the distribution of functionality and user privacy
User-centric Privacy Engineering for the Internet of Things
User privacy concerns are widely regarded as a key obstacle to the success of
modern smart cyber-physical systems. In this paper, we analyse, through an
example, some of the requirements that future data collection architectures of
these systems should implement to provide effective privacy protection for
users. Then, we give an example of how these requirements can be implemented in
a smart home scenario. Our example architecture allows the user to balance the
privacy risks with the potential benefits and take a practical decision
determining the extent of the sharing. Based on this example architecture, we
identify a number of challenges that must be addressed by future data
processing systems in order to achieve effective privacy management for smart
cyber-physical systems.Comment: 12 Page
Trust and Privacy Permissions for an Ambient World
Ambient intelligence (AmI) and ubiquitous computing allow us to consider a future where computation is embedded into our daily social lives. This vision raises its own important questions and augments the need to understand how people will trust such systems and at the same time achieve and maintain privacy. As a result, we have recently conducted a wide reaching study of people’s attitudes to potential AmI scenarios with a view to eliciting their privacy concerns. This chapter describes recent research related to privacy and trust with regard to ambient technology. The method used in the study is described and findings discussed
Federated Embedded Systems – a review of the literature in related fields
This report is concerned with the vision of smart interconnected objects, a vision that has attracted much attention lately. In this paper, embedded, interconnected, open, and heterogeneous control systems are in focus, formally referred to as Federated Embedded Systems. To place FES into a context, a review of some related research directions is presented. This review includes such concepts as systems of systems, cyber-physical systems, ubiquitous
computing, internet of things, and multi-agent systems. Interestingly, the reviewed fields seem to overlap with each other in an increasing number of ways
- …