427 research outputs found
Energy-efficient blockchain implementation for Cognitive Wireless Communication Networks (CWCNs)
Abstract Considering the computation resources available with sensor devices and the value and validity of Cognitive Wireless Communication Network (CWCN), traditional blockchain is not feasible for CWCN. Further, considering the security and privacy for CWCN that can directly impact human life (as in the case of ambient assisted living applications), blockchain provides a good solution for such applications, however, with some simplicity in the computation of Proof of Work (PoW). Therefore, the fourth objective solution comes up with a simplified energy-efficient blockchain implementation for CWCN that consumes less energy in computation time. The energy-hungry blockchain has been implemented on resource-constrained CWCN for ambient assisted living applications specialized for elderly care. The process includes a collection of physical environmental parameters on a single board computer-based CWCN. The implementation includes possible simplification in the most energy-consuming process, i.e., the mining process, which makes it energy efficient in computation time as energy consumption is a computation time factor
Recommended from our members
D2.7 Online mapping of Chinese and European ICT industrial associations – Final report
This document is a deliverable of CHOICE project task 2.2 Bringing together European and Chinese Industrial Associations. This task will, at the end of the project, have delivered a final version of an online database of relevant Chinese and European ICT industrial associations. This document is a report on the information gathered for the development of the online database of relevant Chinese and European ICT industrial associations. It maps Chinese industrial associations to European industrial associations in ICT. It does this by providing details of the Chinese industrial associations and other relevant bodies that are a Chinese priority for collaboration with their EU counterparts related to EU-China collaborative ICT R&D&I. Other such Chinese bodies that are not a Chinese priority for such collaboration that map to European industrial associations in ICT are then summarised so that a complete mapping of Chinese industrial associations and related bodies to European industrial associations in ICT can be made. Mappings are made based on the best matches in terms of the subject matter covered by the associations, in each case the best match based on this criteria is identified and highlighted by being given in bold type. If a mapped Chinese association is not a priority for collaboration it is identified in italics. The Chinese selection of Chinese bodies that are a priority for collaboration with EU counterparts reflects the relevant policy guidance provided on behalf of the Chinese government on how the aims of the "Twelfth Five-Year" National Strategic Emerging Industry Development Plan are to be achieved. An overview of the policy guidance relevant to ICT R&D&I is given in section one of CHOICE deliverable D2.4: Handbook for China ICT Industrial Support Services. Based on this mapping opportunities to foster interaction between the associations in China and Europe are identified. A DVD of the modest database that exists on the basis of the mapping presented in this report accompanies the report
Systematic Review of Internet of Things Security
The Internet of Things has become a new paradigm of current communications technology that requires a deeper overview to map its application domains, advantages, and disadvantages. There have been a number of in-depth research efforts to study various aspects of IoT. However, to the best of our knowledge, there is no literature that have discussed specifically and deeply about the security and privacy aspects of IoT. To that end, this paper aims at providing a more comprehensive and systematic review of IoT security based on the survey result of the most recent literature over the past three years (2015 to 2017). We have classified IoT security research based on the research objectives, application domains, vulner-abilities/threats, countermeasures, platforms, proto-cols, and performance measurements. We have also provided some security challenges for further research
Recommended from our members
CHOICE_ WP2_D2.1_ Online mapping of Chinese and European ICT industrial associations
Funded by the 7th Framework Programme of the European Union. Grant Agreement: 61057
Recommended from our members
D2,1 Online mapping of Chinese and European ICT industrial as sociations – Progress report
This document is the first deliverable of CHOICE project task 2.2 Bringing together European and Chinese Industrial Associations. This task will, at the end of the second year of the project, have delivered a final version of an online database of relevant Chinese and European ICT industrial associations. This document is a report on the progress towards an online database of relevant Chinese and European ICT industrial associations. It maps Chinese industrial associations to European industrial associations in ICT. It does this by providing details of the Chinese industrial associations and other relevant bodies that are a Chinese priority for collaboration with their EU counterparts related to EU-China collaborative ICT R&D&I. Other such Chinese bodies that are not a Chinese priority for such collaboration that map to European industrial associations in ICT are then summarised so that a complete mapping of Chinese industrial associations and related bodies to European industrial associations in ICT can be made
STATE POLICY IN DOMESTIC COMPUTING TECHNOLOGY DEVELOPMENT AT THE XX-XXI CENTURIES
Purpose: The aim of the study is to investigate the state policy in domestic computing technology development at the turn of the XX-XXI centuries.
Methodology: The methodological basis of the study was the principles of historicism, objectivity and reliability.
Main Findings: In a number of industry organizations, with the direct participation and under the guidance of the department members, unique automated systems are developed. Hence, the country needs to restructure and modernize its industrial potential, the dialogue between authorities and leading scientists, the training of highly qualified specialists in the field of engineering, etc.
Applications: The research findings can be used by universities, cultural organizations, technology-media institutes and by graduate students in social sciences.
Novelty/Originality: This paper studied Russia’s participation in the international division of labor. Russia’s entry into the global information community required the consideration of international standards during the creation of systems, which needed academic science support
Stochastic Memory Devices for Security and Computing
With the widespread use of mobile computing and internet of things, secured communication and chip authentication have become extremely important. Hardware-based security concepts generally provide the best performance in terms of a good standard of security, low power consumption, and large-area density. In these concepts, the stochastic properties of nanoscale devices, such as the physical and geometrical variations of the process, are harnessed for true random number generators (TRNGs) and physical unclonable functions (PUFs). Emerging memory devices, such as resistive-switching memory (RRAM), phase-change memory (PCM), and spin-transfer torque magnetic memory (STT-MRAM), rely on a unique combination of physical mechanisms for transport and switching, thus appear to be an ideal source of entropy for TRNGs and PUFs. An overview of stochastic phenomena in memory devices and their use for developing security and computing primitives is provided. First, a broad classification of methods to generate true random numbers via the stochastic properties of nanoscale devices is presented. Then, practical implementations of stochastic TRNGs, such as hardware security and stochastic computing, are shown. Finally, future challenges to stochastic memory development are discussed
Implementation and Analysis of Communication Protocols in Internet of Things
Internet of Things (IoT) is the future of all the present-day devices around the globe. Giving them internet connectivity makes IoT the next frontier of technology. Possibilities are limitless as the devices communicate and interact with each other which make it even more interesting for the global markets. For example, Rolls-Royce announced that it would use the Microsoft Azure IoT suite and also the Intelligence suite of Cortana to keep track of the fuel usage, for performance analysis, to optimize the fly routes etc. which improves the airline efficiency. The devices must communicate with each other, the data from these devices must be collected by the servers, and the data is then analyzed or provided to the people. For all this to happen, there is a need for efficient protocols to ensure that the communication is secure and to avoid loss of data. This research is about the implementation and analysis of various protocols that can be used for the communication in IoT. Various protocols with various capabilities are required for different environments. The internet today supports hundreds of protocols from which choosing the best would be a great challenge. But each protocol is different in its own way when we have the specifics like security, reliability, range of communication etc. This research emphasizes on the best available protocols and the environments that suit them the most. It provides an implementation of some of the protocols and analyzes the protocols according to the results obtained. The data collected from the sensors/devices through a protocol is also subject to predictive analysis which improves the scope of the project to performing data analysis on the data collected through IoT
- …