524,840 research outputs found

    Design Models for Trusted Communications in Vehicle-to-Everything (V2X) Networks

    Get PDF
    Intelligent transportation system is one of the main systems which has been developed to achieve safe traffic and efficient transportation. It enables the road entities to establish connections with other road entities and infrastructure units using Vehicle-to-Everything (V2X) communications. To improve the driving experience, various applications are implemented to allow for road entities to share the information among each other. Then, based on the received information, the road entity can make its own decision regarding road safety and guide the driver. However, when these packets are dropped for any reason, it could lead to inaccurate decisions due to lack of enough information. Therefore, the packets should be sent through a trusted communication. The trusted communication includes a trusted link and trusted road entity. Before sending packets, the road entity should assess the link quality and choose the trusted link to ensure the packet delivery. Also, evaluating the neighboring node behavior is essential to obtain trusted communications because some misbehavior nodes may drop the received packets. As a consequence, two main models are designed to achieve trusted V2X communications. First, a multi-metric Quality of Service (QoS)-balancing relay selection algorithm is proposed to elect the trusted link. Analytic Hierarchy Process (AHP) is applied to evaluate the link based on three metrics, which are channel capacity, link stability and end-to-end delay. Second, a recommendation-based trust model is designed for V2X communication to exclude misbehavior nodes. Based on a comparison between trust-based methods, weighted-sum is chosen in the proposed model. The proposed methods ensure trusted communications by reducing the Packet Dropping Rate (PDR) and increasing the end-to-end delivery packet ratio. In addition, the proposed trust model achieves a very low False Negative Rate (FNR) in comparison with an existing model

    High Quality P2P Service Provisioning via Decentralized Trust Management

    Get PDF
    Trust management is essential to fostering cooperation and high quality service provisioning in several peer-to-peer (P2P) applications. Among those applications are customer-to-customer (C2C) trading sites and markets of services implemented on top of centralized infrastructures, P2P systems, or online social networks. Under these application contexts, existing work does not adequately address the heterogeneity of the problem settings in practice. This heterogeneity includes the different approaches employed by the participants to evaluate trustworthiness of their partners, the diversity in contextual factors that influence service provisioning quality, as well as the variety of possible behavioral patterns of the participants. This thesis presents the design and usage of appropriate computational trust models to enforce cooperation and ensure high quality P2P service provisioning, considering the above heterogeneity issues. In this thesis, first I will propose a graphical probabilistic framework for peers to model and evaluate trustworthiness of the others in a highly heterogeneous setting. The framework targets many important issues in trust research literature: the multi-dimensionality of trust, the reliability of different rating sources, and the personalized modeling and computation of trust in a participant based on the quality of services it provides. Next, an analysis on the effective usage of computational trust models in environments where participants exhibit various behaviors, e.g., honest, rational, and malicious, will be presented. I provide theoretical results showing the conditions under which cooperation emerges when using trust learning models with a given detecting accuracy and how cooperation can still be sustained while reducing the cost and accuracy of those models. As another contribution, I also design and implement a general prototyping and simulation framework for reputation-based trust systems. The developed simulator can be used for many purposes, such as to discover new trust-related phenomena or to evaluate performance of a trust learning algorithm in complex settings. Two potential applications of computational trust models are then discussed: (1) the selection and ranking of (Web) services based on quality ratings from reputable users, and (2) the use of a trust model to choose reliable delegates in a key recovery scenario in a distributed online social network. Finally, I will identify a number of various issues in building next-generation, open reputation-based trust management systems as well as propose several future research directions starting from the work in this thesis

    Blockchain Technologies in Healthcare System for Real Time Applications Using IoT and Deep Learning Techniques

    Get PDF
    Data transparency, flexible access, immutability, privacy, audit, traceability, data provenance, trust, and security are fundamental issues for modern healthcare data management systems. As a promising new technology, blockchain has the potential to enhance healthcare data management functions by boosting data efficiency and guaranteeing trust. The present research looked into the benefits of blockchain technology in healthcare and the challenges that have prevented its widespread implementation so far. Healthcare organisations around the world are using a variety of methods to modernise into more effective, coordinated and user-cantered structures. There is an increase in both human effort and security risks when dealing with massive amounts of data, such as reports and images for each individual. Internet of Things (IoT) solutions in healthcare aim to address these problems by enhancing patient care while reducing costs through more effective use of healthcare resources. However, many different types of intrusion can pose serious risks to IoT devices. In some cases, doctors will insist that their patients use only certain labs or pharmacies, regardless of the quality of the services they provide, simply to increase the doctor's bottom line. Because of this, protecting data is essential when discussing the Internet of Things. To solve these problems, Blockchain technology has emerged as the most reliable method for protecting the privacy of control systems in real time. In this paper, we will introduce a CNN-based healthcare data security framework using the blockchain technique by generating the hash of each data point, which will alert all users of the blockchain network to any unauthorised changes to data or breaches in the supply of medicines

    Public responses to precautionary information from the department of health (UK) about possible health risks from mobile phones

    Get PDF
    Understanding public perceptions of health information is of increasing importance in the light of the growing imperatives upon regulators to communicate information about risk and uncertainty. Communicating the possible health risks from mobile telecommunications is a domain that allows consideration of both public perceptions of uncertain public health information and public responses to precautionary advice. This research reports the results of a nationally representative survey in the UK (n = 1742) that explored public responses to a leaflet issued by the Department of Health (DoH) in 2000 providing information about the possible health risks of mobile phones. The aims of the study were twofold: a) to assess awareness of the leaflet and the extent to which participants could identify the precautionary advice that the leaflet contained as coming from the Government; and b) to examine publics’ responses to the current Government precautionary advice about mobile phone health risks; was this associated with increased concern or reassurance? The results indicate the importance of policy makers developing a clear understanding of the possible effects of communicating precautionary advice.Mobile Telecommunications and Health Research Programm

    Evaluating the ‘Focus on Normal Birth and Reducing Caesarean section Rates Rapid Improvement Programme’: A mixed method study in England

    Get PDF
    Background Caesarean section plays an important role in ensuring safety of mother and infant but rising rates are not accompanied by measurable improvements in maternal or neonatal mortality or morbidity. The ‘Focus on Normal Birth and Reducing Caesarean section Rates Rapid Improvement Programme’ was a facilitative initiative developed to promote opportunities for normal birth and reduce Caesarean section rates in England. Objective To evaluate the ‘Focus on Normal Birth and Reducing Caesarean section Rates’ programme, by assessment of: impact on Caesarean section rates, use of service improvements tools and participants’ perceptions of factors that sustain or hinder work within participating maternity units. Design A mixed methods approach included analysis of mode of birth data, web-based questionnaires and in-depth semi-structured telephone interviews. Participants Twenty Hospital Trusts in England (selected from 68 who applied) took part in the ‘Focus on Normal Birth and Reducing Caesarean section Rates Rapid Improvement Programme’ initiative. In each hospital Trust, the head of midwifery, an obstetrician, the relevant lead for organisational development, a supervisor of midwives, or a clinical midwife and a service user representative were invited to participate in the independent evaluation. Methods Collection and analysis of mode of birth data from twenty participating hospital Trusts, web-based questionnaires administered to key individuals in all twenty Trusts and in-depth semi-structured telephone interviews conducted with key individuals in a sample of six Trusts. Results There was a marginal decline of 0.5% (25.9% from 26.4%) in mean total Caesarean section rate in the period 1 January 2009 to 31 January 2010 compared to the baseline period (1 July to 31 December 2008). Reduced total Caesarean section rates were achieved in eight trusts, all with higher rates at the beginning of the initiative. Features associated with lower Caesarean section rates included a shared philosophy prioritising normal birth, clear communication across disciplines and strong leadership at a range of levels, including executive support and clinical leaders within each discipline. Conclusions It is important that the philosophy and organisational context of care are examined to identify potential barriers and facilitative factors

    A Secure and Fair Resource Sharing Model for Community Clouds

    Get PDF
    Cloud computing has gained a lot of importance and has been one of the most discussed segment of today\u27s IT industry. As enterprises explore the idea of using clouds, concerns have emerged related to cloud security and standardization. This thesis explores whether the Community Cloud Deployment Model can provide solutions to some of the concerns associated with cloud computing. A secure framework based on trust negotiations for resource sharing within the community is developed as a means to provide standardization and security while building trust during resource sharing within the community. Additionally, a model for fair sharing of resources is developed which makes the resource availability and usage transparent to the community so that members can make informed decisions about their own resource requirements based on the resource usage and availability within the community. Furthermore, the fair-share model discusses methods that can be employed to address situations when the demand for a resource is higher than the resource availability in the resource pool. Various methods that include reduction in the requested amount of resource, early release of the resources and taxing members have been studied, Based on comparisons of these methods along with the advantages and disadvantages of each model outlined, a hybrid method that only taxes members for unused resources is developed. All these methods have been studied through simulations

    Statutory guidance for children's trusts on the duty to cooperate

    Get PDF
    • …
    corecore