51,207 research outputs found

    Named data networking for efficient IoT-based disaster management in a smart campus

    Get PDF
    Disasters are uncertain occasions that can impose a drastic impact on human life and building infrastructures. Information and Communication Technology (ICT) plays a vital role in coping with such situations by enabling and integrating multiple technological resources to develop Disaster Management Systems (DMSs). In this context, a majority of the existing DMSs use networking architectures based upon the Internet Protocol (IP) focusing on location-dependent communications. However, IP-based communications face the limitations of inefficient bandwidth utilization, high processing, data security, and excessive memory intake. To address these issues, Named Data Networking (NDN) has emerged as a promising communication paradigm, which is based on the Information-Centric Networking (ICN) architecture. An NDN is among the self-organizing communication networks that reduces the complexity of networking systems in addition to provide content security. Given this, many NDN-based DMSs have been proposed. The problem with the existing NDN-based DMS is that they use a PULL-based mechanism that ultimately results in higher delay and more energy consumption. In order to cater for time-critical scenarios, emergence-driven network engineering communication and computation models are required. In this paper, a novel DMS is proposed, i.e., Named Data Networking Disaster Management (NDN-DM), where a producer forwards a fire alert message to neighbouring consumers. This makes the nodes converge according to the disaster situation in a more efficient and secure way. Furthermore, we consider a fire scenario in a university campus and mobile nodes in the campus collaborate with each other to manage the fire situation. The proposed framework has been mathematically modeled and formally proved using timed automata-based transition systems and a real-time model checker, respectively. Additionally, the evaluation of the proposed NDM-DM has been performed using NS2. The results prove that the proposed scheme has reduced the end-to-end delay up from 2% to 10% and minimized up to 20% energy consumption, as energy improved from 3% to 20% compared with a state-of-the-art NDN-based DMS

    Synchronous Relaying Of Sensor Data

    Full text link
    In this paper we have put forth a novel methodology to relay data obtained by inbuilt sensors of smart phones in real time to remote database followed by fetching of this data . Smart phones are becoming very common and they are laced with a number of sensors that can not only be used in native applications but can also be sent to external nodes to be used by third parties for application and service development

    Internet of Things Cloud: Architecture and Implementation

    Full text link
    The Internet of Things (IoT), which enables common objects to be intelligent and interactive, is considered the next evolution of the Internet. Its pervasiveness and abilities to collect and analyze data which can be converted into information have motivated a plethora of IoT applications. For the successful deployment and management of these applications, cloud computing techniques are indispensable since they provide high computational capabilities as well as large storage capacity. This paper aims at providing insights about the architecture, implementation and performance of the IoT cloud. Several potential application scenarios of IoT cloud are studied, and an architecture is discussed regarding the functionality of each component. Moreover, the implementation details of the IoT cloud are presented along with the services that it offers. The main contributions of this paper lie in the combination of the Hypertext Transfer Protocol (HTTP) and Message Queuing Telemetry Transport (MQTT) servers to offer IoT services in the architecture of the IoT cloud with various techniques to guarantee high performance. Finally, experimental results are given in order to demonstrate the service capabilities of the IoT cloud under certain conditions.Comment: 19pages, 4figures, IEEE Communications Magazin

    Wearable flexible lightweight modular RFID tag with integrated energy harvester

    Get PDF
    A novel wearable radio frequency identification (RFID) tag with sensing, processing, and decision-taking capability is presented for operation in the 2.45-GHz RFID superhigh frequency (SHF) band. The tag is powered by an integrated light harvester, with a flexible battery serving as an energy buffer. The proposed active tag features excellent wearability, very high read range, enhanced functionality, flexible interfacing with diverse low-power sensors, and extended system autonomy through an innovative holistic microwave system design paradigm that takes antenna design into consideration from the very early stages. Specifically, a dedicated textile shorted circular patch antenna with monopolar radiation pattern is designed and optimized for highly efficient and stable operation within the frequency band of operation. In this process, the textile antenna's functionality is augmented by reusing its surface as an integration platform for light-energy-harvesting, sensing, processing, and transceiver hardware, without sacrificing antenna performance or the wearer's comfort. The RFID tag is validated by measuring its stand-alone and on-body characteristics in free-space conditions. Moreover, measurements in a real-world scenario demonstrate an indoor read range up to 23 m in nonline-of-sight indoor propagation conditions, enabling interrogation by a reader situated in another room. In addition, the RFID platform only consumes 168.3 mu W, when sensing and processing are performed every 60 s

    Password Based a Generalize Robust Security System Design Using Neural Network

    Get PDF
    Among the various means of available resource protection including biometrics, password based system is most simple, user friendly, cost effective and commonly used. But this method having high sensitivity with attacks. Most of the advanced methods for authentication based on password encrypt the contents of password before storing or transmitting in physical domain. But all conventional cryptographic based encryption methods are having its own limitations, generally either in terms of complexity or in terms of efficiency. Multi-application usability of password today forcing users to have a proper memory aids. Which itself degrades the level of security. In this paper a method to exploit the artificial neural network to develop the more secure means of authentication, which is more efficient in providing the authentication, at the same time simple in design, has given. Apart from protection, a step toward perfect security has taken by adding the feature of intruder detection along with the protection system. This is possible by analysis of several logical parameters associated with the user activities. A new method of designing the security system centrally based on neural network with intrusion detection capability to handles the challenges available with present solutions, for any kind of resource has presented
    • …
    corecore