231,595 research outputs found

    Lightweight Cryptography based Communication Model for Device Identification, Mutual Authentication, and Encryption in a Smart City Environment

    Get PDF
    Providing security to smart city networks is one of the challenging and demanding tasks in the present days, due to its increased utilization in smart intelligent transportation systems. For this purpose, there are various security protocols and mechanisms that have been developed in the existing works, which targets to establish the reliable and secured communication in smart city networks. However, it limits the major issues of increased computational cost, communication cost, storage overhead, and reduced efficiency. In order to solve these problems, the proposed work intends to design an intelligent security framework by using the Light-weight Cryptography based Communication Model (LCCM). Proposed framework includes the modules of setup initialization, vehicle registration, authentication, key generation, encryption, and decryption. Here, the Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) communications are performed with reduced cost complexity. For guaranteeing the security of networks, the random value-based key generation, data encryption, and decryption processes are performed. During the performance analysis, various evaluation measures have been used to assess the results of both convention and proposed security protocols. This paper presented a new methodology named as, LCCM for enhancing the security of smart city transportation networks

    Named data networking for efficient IoT-based disaster management in a smart campus

    Get PDF
    Disasters are uncertain occasions that can impose a drastic impact on human life and building infrastructures. Information and Communication Technology (ICT) plays a vital role in coping with such situations by enabling and integrating multiple technological resources to develop Disaster Management Systems (DMSs). In this context, a majority of the existing DMSs use networking architectures based upon the Internet Protocol (IP) focusing on location-dependent communications. However, IP-based communications face the limitations of inefficient bandwidth utilization, high processing, data security, and excessive memory intake. To address these issues, Named Data Networking (NDN) has emerged as a promising communication paradigm, which is based on the Information-Centric Networking (ICN) architecture. An NDN is among the self-organizing communication networks that reduces the complexity of networking systems in addition to provide content security. Given this, many NDN-based DMSs have been proposed. The problem with the existing NDN-based DMS is that they use a PULL-based mechanism that ultimately results in higher delay and more energy consumption. In order to cater for time-critical scenarios, emergence-driven network engineering communication and computation models are required. In this paper, a novel DMS is proposed, i.e., Named Data Networking Disaster Management (NDN-DM), where a producer forwards a fire alert message to neighbouring consumers. This makes the nodes converge according to the disaster situation in a more efficient and secure way. Furthermore, we consider a fire scenario in a university campus and mobile nodes in the campus collaborate with each other to manage the fire situation. The proposed framework has been mathematically modeled and formally proved using timed automata-based transition systems and a real-time model checker, respectively. Additionally, the evaluation of the proposed NDM-DM has been performed using NS2. The results prove that the proposed scheme has reduced the end-to-end delay up from 2% to 10% and minimized up to 20% energy consumption, as energy improved from 3% to 20% compared with a state-of-the-art NDN-based DMS

    Self organizing maps as a novel tool for data analysis in education

    Get PDF
    Young people currently live and are connected to the virtual world in a natural and simple way. Nevertheless, in spite of the great advantages of the use of Information and Communication Technology, and particularly social networks, there are several drawbacks, principally security and privacy of net users. However, human behaviour is strongly non-linear, so usual statistical analysis does not yield accurate results. Now, machine learning algorithms are very common in solving real life non-linear problems, such as economics, medicine and engineering. So it would be worthy to apply this methodology on education data sets. In this work, a non-linear, visual algorithm named Self Organizing Map (SOM) has been applied in order to extract some conclusions about related aspects mainly, to security and privacy perception of teenagers when using Virtual Social Networks. SOMs are a particular tool based on Artificial Neural Networks, and provide both a non linear approach and a visualization tool of data. The present work proposes a study to determine and analyze the different aspects. A methodology based on a survey consisting of 27 questions has been carried out on a 170 teenagers, aged between 12 and 16 years. SOMs have been applied on variables related to Facebook privacy and security issues. Data on every variable have been mapped into a 7x12 neurons network. The results have revealed a lack of knowledge of privacy, protection mechanisms and even their own image, that Virtual Social Network implements. A lack of awareness and sensibility about the problems that a thoughtless use of these social networks can cause has been detected. In other way, this work also has proved that SOM is a valuable, interesting tool to infer knowledge from non-linear data and a different proposal from the classical linear statistical methods

    Internames: a name-to-name principle for the future Internet

    Full text link
    We propose Internames, an architectural framework in which names are used to identify all entities involved in communication: contents, users, devices, logical as well as physical points involved in the communication, and services. By not having a static binding between the name of a communication entity and its current location, we allow entities to be mobile, enable them to be reached by any of a number of basic communication primitives, enable communication to span networks with different technologies and allow for disconnected operation. Furthermore, with the ability to communicate between names, the communication path can be dynamically bound to any of a number of end-points, and the end-points themselves could change as needed. A key benefit of our architecture is its ability to accommodate gradual migration from the current IP infrastructure to a future that may be a ubiquitous Information Centric Network. Basic building blocks of Internames are: i) a name-based Application Programming Interface; ii) a separation of identifiers (names) and locators; iii) a powerful Name Resolution Service (NRS) that dynamically maps names to locators, as a function of time/location/context/service; iv) a built-in capacity of evolution, allowing a transparent migration from current networks and the ability to include as particular cases current specific architectures. To achieve this vision, shared by many other researchers, we exploit and expand on Information Centric Networking principles, extending ICN functionality beyond content retrieval, easing send-to-name and push services, and allowing to use names also to route data in the return path. A key role in this architecture is played by the NRS, which allows for the co-existence of multiple network "realms", including current IP and non-IP networks, glued together by a name-to-name overarching communication primitive.Comment: 6 page

    The Road Ahead for Networking: A Survey on ICN-IP Coexistence Solutions

    Full text link
    In recent years, the current Internet has experienced an unexpected paradigm shift in the usage model, which has pushed researchers towards the design of the Information-Centric Networking (ICN) paradigm as a possible replacement of the existing architecture. Even though both Academia and Industry have investigated the feasibility and effectiveness of ICN, achieving the complete replacement of the Internet Protocol (IP) is a challenging task. Some research groups have already addressed the coexistence by designing their own architectures, but none of those is the final solution to move towards the future Internet considering the unaltered state of the networking. To design such architecture, the research community needs now a comprehensive overview of the existing solutions that have so far addressed the coexistence. The purpose of this paper is to reach this goal by providing the first comprehensive survey and classification of the coexistence architectures according to their features (i.e., deployment approach, deployment scenarios, addressed coexistence requirements and architecture or technology used) and evaluation parameters (i.e., challenges emerging during the deployment and the runtime behaviour of an architecture). We believe that this paper will finally fill the gap required for moving towards the design of the final coexistence architecture.Comment: 23 pages, 16 figures, 3 table
    • …
    corecore