427 research outputs found

    Energy-efficient blockchain implementation for Cognitive Wireless Communication Networks (CWCNs)

    Get PDF
    Abstract Considering the computation resources available with sensor devices and the value and validity of Cognitive Wireless Communication Network (CWCN), traditional blockchain is not feasible for CWCN. Further, considering the security and privacy for CWCN that can directly impact human life (as in the case of ambient assisted living applications), blockchain provides a good solution for such applications, however, with some simplicity in the computation of Proof of Work (PoW). Therefore, the fourth objective solution comes up with a simplified energy-efficient blockchain implementation for CWCN that consumes less energy in computation time. The energy-hungry blockchain has been implemented on resource-constrained CWCN for ambient assisted living applications specialized for elderly care. The process includes a collection of physical environmental parameters on a single board computer-based CWCN. The implementation includes possible simplification in the most energy-consuming process, i.e., the mining process, which makes it energy efficient in computation time as energy consumption is a computation time factor

    Systematic Review of Internet of Things Security

    Get PDF
    The Internet of Things has become a new paradigm of current communications technology that requires a deeper overview to map its application domains, advantages, and disadvantages. There have been a number of in-depth research efforts to study various aspects of IoT. However, to the best of our knowledge, there is no literature that have discussed specifically and deeply about the security and privacy aspects of IoT. To that end, this paper aims at providing a more comprehensive and systematic review of IoT security based on the survey result of the most recent literature over the past three years (2015 to 2017). We have classified IoT security research based on the research objectives, application domains, vulner-abilities/threats, countermeasures, platforms, proto-cols, and performance measurements. We have also provided some security challenges for further research

    STATE POLICY IN DOMESTIC COMPUTING TECHNOLOGY DEVELOPMENT AT THE XX-XXI CENTURIES

    Get PDF
    Purpose: The aim of the study is to investigate the state policy in domestic computing technology development at the turn of the XX-XXI centuries. Methodology: The methodological basis of the study was the principles of historicism, objectivity and reliability. Main Findings: In a number of industry organizations, with the direct participation and under the guidance of the department members, unique automated systems are developed. Hence, the country needs to restructure and modernize its industrial potential, the dialogue between authorities and leading scientists, the training of highly qualified specialists in the field of engineering, etc. Applications: The research findings can be used by universities, cultural organizations, technology-media institutes and by graduate students in social sciences. Novelty/Originality: This paper studied Russia’s participation in the international division of labor. Russia’s entry into the global information community required the consideration of international standards during the creation of systems, which needed academic science support

    Stochastic Memory Devices for Security and Computing

    Get PDF
    With the widespread use of mobile computing and internet of things, secured communication and chip authentication have become extremely important. Hardware-based security concepts generally provide the best performance in terms of a good standard of security, low power consumption, and large-area density. In these concepts, the stochastic properties of nanoscale devices, such as the physical and geometrical variations of the process, are harnessed for true random number generators (TRNGs) and physical unclonable functions (PUFs). Emerging memory devices, such as resistive-switching memory (RRAM), phase-change memory (PCM), and spin-transfer torque magnetic memory (STT-MRAM), rely on a unique combination of physical mechanisms for transport and switching, thus appear to be an ideal source of entropy for TRNGs and PUFs. An overview of stochastic phenomena in memory devices and their use for developing security and computing primitives is provided. First, a broad classification of methods to generate true random numbers via the stochastic properties of nanoscale devices is presented. Then, practical implementations of stochastic TRNGs, such as hardware security and stochastic computing, are shown. Finally, future challenges to stochastic memory development are discussed

    Implementation and Analysis of Communication Protocols in Internet of Things

    Full text link
    Internet of Things (IoT) is the future of all the present-day devices around the globe. Giving them internet connectivity makes IoT the next frontier of technology. Possibilities are limitless as the devices communicate and interact with each other which make it even more interesting for the global markets. For example, Rolls-Royce announced that it would use the Microsoft Azure IoT suite and also the Intelligence suite of Cortana to keep track of the fuel usage, for performance analysis, to optimize the fly routes etc. which improves the airline efficiency. The devices must communicate with each other, the data from these devices must be collected by the servers, and the data is then analyzed or provided to the people. For all this to happen, there is a need for efficient protocols to ensure that the communication is secure and to avoid loss of data. This research is about the implementation and analysis of various protocols that can be used for the communication in IoT. Various protocols with various capabilities are required for different environments. The internet today supports hundreds of protocols from which choosing the best would be a great challenge. But each protocol is different in its own way when we have the specifics like security, reliability, range of communication etc. This research emphasizes on the best available protocols and the environments that suit them the most. It provides an implementation of some of the protocols and analyzes the protocols according to the results obtained. The data collected from the sensors/devices through a protocol is also subject to predictive analysis which improves the scope of the project to performing data analysis on the data collected through IoT
    • …
    corecore