1,141 research outputs found
P2PEdge : A Decentralised, Scalable P2P Architecture for Energy Trading in Real-Time
Author Contributions: Conceptualization, J.K., D.H.-S., R.N.A., B.S. and K.M.; Formal analysis, J.K., D.H.-S. and B.S.; Investigation, J.K.; Methodology, J.K.; Project administration, K.M.; Supervision, K.M. and D.H.-S.; Validation, J.K. and D.H.-S.; Visualization, J.K.; Writing—original draft, J.K.; Writing—review & editing, J.K., K.M., D.H.-S., R.N.A. and B.S. All authors have read and agreed to the published version of the manuscript. Funding: This research received no external funding.Peer reviewedPublisher PD
Digital Twins for Lithium-Ion Battery Health Monitoring with Linked Clustering Model using VGG 16 for Enhanced Security Levels
Digital Twin (DT) has only been widely used since the early 2000s. The concept of DT refers to the act of creating a computerized replica of a physical item or physical process. There is the physical world, the cyber world, a bridge between them, and a portal from the cyber world to the physical world. The goal of DT is to create an accurate digital replica of a previously existent physical object by combining AI, IoT, deep learning, and data analytics. Using the virtual copy in real time, DTs attempt to describe the actions of the physical object. Battery based DT's viability as a solution to the industry's growing problems of degradation evaluation, usage optimization, manufacturing irregularities, and possible second-life applications, among others, are of fundamental importance. Through the integration of real-time checking and DT elaboration, data can be collected that could be used to determine which sensors/data used in a batteries to analyze their performance. This research proposes a Linked Clustering Model using VGG 16 for Lithium-ion batteries health condition monitoring (LCM-VGG-Li-ion-BHM). This work explored the use of deep learning to extract battery information by selecting the most important features gathered from the sensors. Data from a digital twin analyzed using deep learning allowed us to anticipate both typical and abnormal conditions, as well as those that required closer attention. The proposed model when contrasted with the existing models performs better in health condition monitoring
Cyber Security of Critical Infrastructures
Critical infrastructures are vital assets for public safety, economic welfare, and the national security of countries. The vulnerabilities of critical infrastructures have increased with the widespread use of information technologies. As Critical National Infrastructures are becoming more vulnerable to cyber-attacks, their protection becomes a significant issue for organizations as well as nations. The risks to continued operations, from failing to upgrade aging infrastructure or not meeting mandated regulatory regimes, are considered highly significant, given the demonstrable impact of such circumstances. Due to the rapid increase of sophisticated cyber threats targeting critical infrastructures with significant destructive effects, the cybersecurity of critical infrastructures has become an agenda item for academics, practitioners, and policy makers. A holistic view which covers technical, policy, human, and behavioural aspects is essential to handle cyber security of critical infrastructures effectively. Moreover, the ability to attribute crimes to criminals is a vital element of avoiding impunity in cyberspace. In this book, both research and practical aspects of cyber security considerations in critical infrastructures are presented. Aligned with the interdisciplinary nature of cyber security, authors from academia, government, and industry have contributed 13 chapters. The issues that are discussed and analysed include cybersecurity training, maturity assessment frameworks, malware analysis techniques, ransomware attacks, security solutions for industrial control systems, and privacy preservation methods
An AI-Driven Secure and Intelligent Robotic Delivery System
Last-mile delivery has gained much popularity in recent years, it accounts for about half of the whole logistics cost. Unlike container transportation, companies must hire significant number of employees to deliver packages to the customers. Therefore, many companies are studying automated methods such as robotic delivery to complete the delivery work to reduce the cost. It is undeniable that the security issue is a huge challenge in such a system. In this article, we propose an AI-driven robotic delivery system, which consists of two modules. A multilevel cooperative user authentication module for delivering parcel using both PIN code and biometrics verification, i.e., voiceprint and face verification. Another noncooperative user identification module using face verification which detects and verifies the identification of the customer. In this way, the robot can find the correct customer and complete the delivery task automatically. Finally, we implement the proposed system on a Turtlebot3 robot and analyze the performance of the proposed schema. Experimental results show that our proposed system has a high accuracy and can complete the delivery task securely
Will SDN be part of 5G?
For many, this is no longer a valid question and the case is considered
settled with SDN/NFV (Software Defined Networking/Network Function
Virtualization) providing the inevitable innovation enablers solving many
outstanding management issues regarding 5G. However, given the monumental task
of softwarization of radio access network (RAN) while 5G is just around the
corner and some companies have started unveiling their 5G equipment already,
the concern is very realistic that we may only see some point solutions
involving SDN technology instead of a fully SDN-enabled RAN. This survey paper
identifies all important obstacles in the way and looks at the state of the art
of the relevant solutions. This survey is different from the previous surveys
on SDN-based RAN as it focuses on the salient problems and discusses solutions
proposed within and outside SDN literature. Our main focus is on fronthaul,
backward compatibility, supposedly disruptive nature of SDN deployment,
business cases and monetization of SDN related upgrades, latency of general
purpose processors (GPP), and additional security vulnerabilities,
softwarization brings along to the RAN. We have also provided a summary of the
architectural developments in SDN-based RAN landscape as not all work can be
covered under the focused issues. This paper provides a comprehensive survey on
the state of the art of SDN-based RAN and clearly points out the gaps in the
technology.Comment: 33 pages, 10 figure
Digital Twins and the Future of their Use Enabling Shift Left and Shift Right Cybersecurity Operations
Digital Twins (DTs), optimize operations and monitor performance in Smart
Critical Systems (SCS) domains like smart grids and manufacturing. DT-based
cybersecurity solutions are in their infancy, lacking a unified strategy to
overcome challenges spanning next three to five decades. These challenges
include reliable data accessibility from Cyber-Physical Systems (CPS),
operating in unpredictable environments. Reliable data sources are pivotal for
intelligent cybersecurity operations aided with underlying modeling
capabilities across the SCS lifecycle, necessitating a DT. To address these
challenges, we propose Security Digital Twins (SDTs) collecting realtime data
from CPS, requiring the Shift Left and Shift Right (SLSR) design paradigm for
SDT to implement both design time and runtime cybersecurity operations.
Incorporating virtual CPS components (VC) in Cloud/Edge, data fusion to SDT
models is enabled with high reliability, providing threat insights and
enhancing cyber resilience. VC-enabled SDT ensures accurate data feeds for
security monitoring for both design and runtime. This design paradigm shift
propagates innovative SDT modeling and analytics for securing future critical
systems. This vision paper outlines intelligent SDT design through innovative
techniques, exploring hybrid intelligence with data-driven and rule-based
semantic SDT models. Various operational use cases are discussed for securing
smart critical systems through underlying modeling and analytics capabilities.Comment: IEEE Submitted Paper: Trust, Privacy and Security in Intelligent
Systems, and Application
HMT: A Hardware-Centric Hybrid Bonsai Merkle Tree Algorithm for High-Performance Authentication
Bonsai Merkle tree (BMT) is a widely used data structure for authenticating
data/metadata in a secure computing system. However, the predominantly
recursive andsequential nature of traditional BMT algorithms make them
challenging to implement with Field-Programmable Gate Array (FPGA) in modern
heterogeneous computing platforms. In this work, we introduce HMT, a
hardware-friendly implementation methodology for BMT that enables the
verification and update processes to function independently, as well as saves
additional write-backs by making the update conditions more flexible compared
to previous algorithms. The methodology of HMT contributes both novel algorithm
revisions and innovative hardware techniques to implementing BMT. Our empirical
performance measurements have demonstrated that HMT can achieve up to 7x
improvement in bandwidth and 4.5x reduction in latency over the baseline
Optimising a defence-aware threat modelling diagram incorporating a defence-in-depth approach for the internet-of-things
Modern technology has proliferated into just about every aspect of life while improving the quality of life. For instance, IoT technology has significantly improved over traditional systems, providing easy life, time-saving, financial saving, and security aspects. However, security weaknesses associated with IoT technology can pose a significant threat to the human factor. For instance, smart doorbells can make household life easier, save time, save money, and provide surveillance security. Nevertheless, the security weaknesses in smart doorbells could be exposed to a criminal and pose a danger to the life and money of the household. In addition, IoT technology is constantly advancing and expanding and rapidly becoming ubiquitous in modern society. In that case, increased usage and technological advancement create security weaknesses that attract cybercriminals looking to satisfy their agendas.
Perfect security solutions do not exist in the real world because modern systems are continuously improving, and intruders frequently attempt various techniques to discover security flaws and bypass existing security control in modern systems. In that case, threat modelling is a great starting point in understanding the threat landscape of the system and its weaknesses. Therefore, the threat modelling field in computer science was significantly improved by implementing various frameworks to identify threats and address them to mitigate them. However, most mature threat modelling frameworks are implemented for traditional IT systems that only consider software-related weaknesses and do not address the physical attributes. This approach may not be practical for IoT technology because it inherits software and physical security weaknesses. However, scholars employed mature threat modelling frameworks such as STRIDE on IoT technology because mature frameworks still include security concepts that are significant for modern technology. Therefore, mature frameworks cannot be ignored but are not efficient in addressing the threat associated with modern systems.
As a solution, this research study aims to extract the significant security concept of matured threat modelling frameworks and utilise them to implement robust IoT threat modelling frameworks. This study selected fifteen threat modelling frameworks from among researchers and the defence-in-depth security concept to extract threat modelling techniques. Subsequently, this research study conducted three independent reviews to discover valuable threat modelling concepts and their usefulness for IoT technology. The first study deduced that integration of threat modelling approach software-centric, asset-centric, attacker-centric and data-centric with defence-in-depth is valuable and delivers distinct benefits. As a result, PASTA and TRIKE demonstrated four threat modelling approaches based on a classification scheme. The second study deduced the features of a threat modelling framework that achieves a high satisfaction level toward defence-in-depth security architecture. Under evaluation criteria, the PASTA framework scored the highest satisfaction value. Finally, the third study deduced IoT systematic threat modelling techniques based on recent research studies. As a result, the STRIDE framework was identified as the most popular framework, and other frameworks demonstrated effective capabilities valuable to IoT technology.
Respectively, this study introduced Defence-aware Threat Modelling (DATM), an IoT threat modelling framework based on the findings of threat modelling and defence-in-depth security concepts. The steps involved with the DATM framework are further described with figures for better understatement. Subsequently, a smart doorbell case study is considered for threat modelling using the DATM framework for validation. Furthermore, the outcome of the case study was further assessed with the findings of three research studies and validated the DATM framework. Moreover, the outcome of this thesis is helpful for researchers who want to conduct threat modelling in IoT environments and design a novel threat modelling framework suitable for IoT technology
A Brief Review of Security in Emerging Programmable Computer Networking Technologies
Recent programmable networking paradigms, such as cloud computing, fog computing, software- defined networks, and network function virtualization gain significant traction in industry and academia. While these newly developed networking technologies open a pathway to new architectures and enable a faster innovation cycle, there exist many problems in this area. In this article, we provide a review of these programmable networking architectures for comparison. Second, we provide a survey of security attacks and defense mechanisms in these emerging programmable networking technologies
Security for a multi-agent cyber-physical conveyor system using machine learning
One main foundation of Industry 4.0 is the connectivity of devices and systems using Internet of Things (IoT) technologies, where Cyber-physical systems (CPS) act as the backbone infrastructure based on distributed and decentralized structures. This approach provides significant benefits, namely improved performance, responsiveness and reconfigurability, but also brings some problems in terms of security, as the devices and systems become vulnerable to cyberattacks. This paper describes the implementation of several mechanisms to increase the security in a self-organized cyber-physical conveyor system, based on multi-agent systems (MAS) and build up with different individual modular and intelligent conveyor modules. For this purpose, the JADE-S add-on is used to enforce more security controls, also an Intrusion Detection System (IDS) is created supported by Machine Learning (ML) techniques that analyses the communication between agents, enabling to monitor and analyse the events that occur in the system, extracting signs of intrusions, together they contribute to mitigate cyberattacks.info:eu-repo/semantics/publishedVersio
- …