83,447 research outputs found

    Smart Grid Management using Blockchain: Future Scenarios and Challenges

    Full text link
    Decentralized management and coordination of energy systems are emerging trends facilitated by the uptake of the Internet of Things and Blockchain offering new opportunities for more secure, resilient, and efficient energy distribution. Even though the use of distributed ledger technology in the energy domain is promising, the development of decentralized smart grid management solutions is in the early stages. In this paper, we define a layered architecture of a blockchain-based smart grid management platform featuring energy data metering and tamper-proof registration, business enforcement via smart contracts, and Oracle-based integration of high computational services supporting the implementation of future grid management scenarios. Three such scenarios are discussed from the perspective of their implementation using the proposed blockchain platform and associated challenges: peer to peer energy trading, decentralized management, and aggregation of energy flexibility and operation of community oriented Virtual Power Plants.Comment: Accepted and presented at: 19th RoEduNet Conference: Networking in Education and Research, December 11-12, 202

    Hybrid Workload Enabled and Secure Healthcare Monitoring Sensing Framework in Distributed Fog-Cloud Network

    Get PDF
    The Internet of Medical Things (IoMT) workflow applications have been rapidly growing in practice. These internet-based applications can run on the distributed healthcare sensing system, which combines mobile computing, edge computing and cloud computing. Offloading and scheduling are the required methods in the distributed network. However, a security issue exists and it is hard to run different types of tasks (e.g., security, delay-sensitive, and delay-tolerant tasks) of IoMT applications on heterogeneous computing nodes. This work proposes a new healthcare architecture for workflow applications based on heterogeneous computing nodes layers: an application layer, management layer, and resource layer. The goal is to minimize the makespan of all applications. Based on these layers, the work proposes a secure offloading-efficient task scheduling (SEOS) algorithm framework, which includes the deadline division method, task sequencing rules, homomorphic security scheme, initial scheduling, and the variable neighbourhood searching method. The performance evaluation results show that the proposed plans outperform all existing baseline approaches for healthcare applications in terms of makespan

    CMI Computing: A Cloud, MANET, and Internet of Things Integration for Future Internet

    Get PDF
    The wireless communication is making it easier for smart devices to communicate with one another in terms of the network of the Internet of Things. Smart devices are automatically linked and built up a network on their own. But there are more obstacles to safe access within the network itself. Mobile devices such as smart home automation access point, smart washing machines, mobile boards, temperature sensors, color-changing smart lighting, smartphones, wearable devices, and smart appliances, etc. are widespread in our daily lives and is becoming valuable tools with wireless communication abilities that are using specific wireless standards that are commonly used with IEEE 802.11 access points. On the realism of the Internet, security has been perceived as a prominent inhibitor of embracing the cloud paradigm. It is resource storage and management that may lay in any since the cloud environment is a distributed architecture, which place of the world, many concerns have been raised over its vulnerabilities, security threats and challenges. The involvement of various parties has widened these concerns based on each party's perspective and objective. The Cloud point of view we mainly discuss the causes of obstacles and challenges related to security, reliability, privacy, and service availability. The wireless communication Security has been raised as one of the most critical issues of cloud computing where resolving such an issue would result in constant growth in the cloud’s use and popularity. Our purpose of this study is to create a framework of mobile ad hoc network mobility model using cloud computing for providing secure communication among smart devices network for the internet of things in 5G heterogeneous networks. Our main contribution links a new methodology for providing secure communication on the internet of smart devices in 5G. Our methodology uses the correct and efficient simulation of the desired study and can be implemented in a framework of the Internet of Things in 5G

    Hash-routing schemes for information centric networking.

    Get PDF
    It is our great pleasure to welcome you to The 3rd ACM SIGCOMM Workshop on Information-Centric Networking (ICN 2013). The fundamental concept in Information-Centric Networking (ICN) is to evolve the Internet from today's host based packet delivery towards directly retrieving information objects by names in a secure, reliable, scalable, and efficient way. These architectural design efforts aim to directly address the challenges that arise from the increasing demands for highly scalable content distribution, from accelerated growths of mobile devices, from wide deployment of the Internet-of-Things (IoT), and from the need to secure the global Internet. Rapid progress has been made over the last few years, initial designs are sketched, new research challenges exposed, and prototype implementations are deployed on testbeds of various scales. The research efforts have reached a new stage that allows one to experiment with proposed architectures and to apply a proposed architectural design to address real world problems. It also becomes important to compare different design approaches and develop methodologies for architecture evaluations. Some research areas, such as routing and caching, have drawn considerable attention; some other areas, such as trust management, effective and efficient application of cryptography, experience from prototyping, and lessons from experimentations, to name a few, have yet to be fully explored. This workshop presents original contributions on Information-Centric Networking architecture topics, specific algorithms and protocols, as well as results from implementations and bexperimentation, with an emphasis on applying the new approach to address real world problems and on experimental investigations. New for this year is that the workshop includes a poster/demo session. We received a large number of submissions and as the workshop is limited in time we were only able to accept 20% of them as full papers. To promote sharing of latest results among workshop attendees, we also accepted 17% of the submissions as posters or demos
    • …
    corecore