19,761 research outputs found

    A study of research trends and issues in wireless ad hoc networks

    Full text link
    Ad hoc network enables network creation on the fly without support of any predefined infrastructure. The spontaneous erection of networks in anytime and anywhere fashion enables development of various novel applications based on ad hoc networks. However, at the same ad hoc network presents several new challenges. Different research proposals have came forward to resolve these challenges. This chapter provides a survey of current issues, solutions and research trends in wireless ad hoc network. Even though various surveys are already available on the topic, rapid developments in recent years call for an updated account on this topic. The chapter has been organized as follows. In the first part of the chapter, various ad hoc network's issues arising at different layers of TCP/IP protocol stack are presented. An overview of research proposals to address each of these issues is also provided. The second part of the chapter investigates various emerging models of ad hoc networks, discusses their distinctive properties and highlights various research issues arising due to these properties. We specifically provide discussion on ad hoc grids, ad hoc clouds, wireless mesh networks and cognitive radio ad hoc networks. The chapter ends with presenting summary of the current research on ad hoc network, ignored research areas and directions for further research

    Game Theoretic Approaches in Vehicular Networks: A Survey

    Full text link
    In the era of the Internet of Things (IoT), vehicles and other intelligent components in Intelligent Transportation System (ITS) are connected, forming the Vehicular Networks (VNs) that provide efficient and secure traffic, ubiquitous access to information, and various applications. However, as the number of connected nodes keeps increasing, it is challenging to satisfy various and large amounts of service requests with different Quality of Service (QoS ) and security requirements in the highly dynamic VNs. Intelligent nodes in VNs can compete or cooperate for limited network resources so that either an individual or group objectives can be achieved. Game theory, a theoretical framework designed for strategic interactions among rational decision-makers who faced with scarce resources, can be used to model and analyze individual or group behaviors of communication entities in VNs. This paper primarily surveys the recent advantages of GT used in solving various challenges in VNs. As VNs and GT have been extensively investigate34d, this survey starts with a brief introduction of the basic concept and classification of GT used in VNs. Then, a comprehensive review of applications of GT in VNs is presented, which primarily covers the aspects of QoS and security. Moreover, with the development of fifth-generation (5G) wireless communication, recent contributions of GT to diverse emerging technologies of 5G integrated into VNs are surveyed in this paper. Finally, several key research challenges and possible solutions for applying GT in VNs are outlined

    Overview on Security Approaches in Intelligent Transportation Systems

    Full text link
    Major standardization bodies developed and designed systems that should be used in vehicular ad-hoc networks. The Institute of Electrical and Electronics Engineers (IEEE) in America designed the wireless access in vehicular environments (WAVE) system. The European Telecommunications Standards Institute (ETSI) did come up with the "ITS-G5" system. Those Vehicular Ad-hoc Networks (VANETs) are the basis for Intelligent Transportation Systems (ITSs). They aim to efficiently communicate and provide benefits to people, ranging from improved safety to convenience. But different design and architectural choices lead to different network properties, especially security properties that are fundamentally depending on the networks architecture. To be able to compare different security architectures, different proposed approaches need to be discussed. One problem in current research is the missing focus on different approaches for trust establishment in VANETs. Therefore, this paper surveys different security issues and solutions in VANETs and we furthermore categorize these solutions into three basic trust defining architectures: centralized, decentralized and hybrid. These categories represent how trust is build in a system, i.e., in a centralized, decentralized way or even by combining both opposing approaches to a hybrid solution, which aims to inherit the benefits of both worlds. This survey defines those categories and finds that hybrid approaches are underrepresented in current research efforts.Comment: The Ninth International Conference on Emerging Security Information, Systems and Technologies - SECURWARE 2015, Venice, Italy, 201

    All One Needs to Know about Fog Computing and Related Edge Computing Paradigms: A Complete Survey

    Full text link
    With the Internet of Things (IoT) becoming part of our daily life and our environment, we expect rapid growth in the number of connected devices. IoT is expected to connect billions of devices and humans to bring promising advantages for us. With this growth, fog computing, along with its related edge computing paradigms, such as multi-access edge computing (MEC) and cloudlet, are seen as promising solutions for handling the large volume of security-critical and time-sensitive data that is being produced by the IoT. In this paper, we first provide a tutorial on fog computing and its related computing paradigms, including their similarities and differences. Next, we provide a taxonomy of research topics in fog computing, and through a comprehensive survey, we summarize and categorize the efforts on fog computing and its related computing paradigms. Finally, we provide challenges and future directions for research in fog computing.Comment: 48 pages, 7 tables, 11 figures, 450 references. The data (categories and features/objectives of the papers) of this survey are now available publicly. Accepted by Elsevier Journal of Systems Architectur

    A Game-Theoretic Taxonomy and Survey of Defensive Deception for Cybersecurity and Privacy

    Full text link
    Cyberattacks on both databases and critical infrastructure have threatened public and private sectors. Ubiquitous tracking and wearable computing have infringed upon privacy. Advocates and engineers have recently proposed using defensive deception as a means to leverage the information asymmetry typically enjoyed by attackers as a tool for defenders. The term deception, however, has been employed broadly and with a variety of meanings. In this paper, we survey 24 articles from 2008-2018 that use game theory to model defensive deception for cybersecurity and privacy. Then we propose a taxonomy that defines six types of deception: perturbation, moving target defense, obfuscation, mixing, honey-x, and attacker engagement. These types are delineated by their information structures, agents, actions, and duration: precisely concepts captured by game theory. Our aims are to rigorously define types of defensive deception, to capture a snapshot of the state of the literature, to provide a menu of models which can be used for applied research, and to identify promising areas for future work. Our taxonomy provides a systematic foundation for understanding different types of defensive deception commonly encountered in cybersecurity and privacy.Comment: To Appear in ACM Cumputing Surveys (CSUR

    Honesty Based Democratic Scheme to Improve Community Cooperation for IoT Based Vehicular Delay Tolerant Networks

    Full text link
    Many Internet of things (IoT) applications have been developed and implemented on unreliable wireless networks like the Delay tolerant network (DTN), however, efficient data transfer in DTN is still an important issue for the IoT applications. One of the application areas of DTN is Vehicular Delay Tolerant Network (VDTN) where the network faces communication disruption due to lack of end-to-end relay route. It is challenging as some of the nodes show selfish behavior to preserve their resources like memory, and energy level and become non-cooperative. In this article, an Honesty based Democratic Scheme (HBDS) is introduced where vehicles with higher honesty level are elected as heads -- during the process. Vehicles involved in the process would maximize their rewards (reputation) through active participation in the network activities whereas nodes with non-cooperative selfish behavior are punished. The honesty level of the heads is analyzed using Vickrey, Clarke, and Groves (VCG) model. The mathematical model and algorithms developed in the proposed HBDS technique are simulated using the VDTNSim framework to evaluate their efficiency. The performance results show that the proposed scheme dominates current schemes in terms of packet delivery probability, packet delivery delay, number of packets drop, and overhead ratio.Comment: 19 Pages, 5 Figures, 6 Tables, 55 Reference

    Research Proposal Decentralized Virtual Activities and Technologies: A Socio- Technical Approach Walt Scacchi

    Get PDF
    31 August 2011 Our proposal is focused on the topic of decentralized virtual activity systems (DVAS) employing an empirical socio-technical research approach. We see growing, widespread interest in the development and use of decentralized systems and virtual world environments as possible new places for engaging in collaborative work activities. The Gartner Group recently declared that within five years 80 % of Internet users and Fortune 500 companies will have an online presence in a virtual world of some kind. Elsewhere, there is widespread interest in stimulating new technological innovations that enable people to come together through social networking, file/media sharing, and massively multi-player online game play. This new generation of networked computing environments seems headed towards increased socialization, interaction, communication, and collaboration that span multiple organizational boundaries as its primary purpose. But how do we get there from here? Is it sufficient to just let the market of entrepreneurial vendors and technological innovators simply decide who needs what? The history of computing reveals a legacy of many failed or problematic efforts to develop and deploy computing systems that arise from a lack of understanding or recognition of the ways how people’s work and social activities are situated in organizational and technological contexts. These contexts configure, constrain, or enable some types of activities to flourish while others are displaced, either unintentionally or intentionally

    A Game Theoretic Analysis for Cooperative Smart Farming

    Full text link
    The application of Internet of Things (IoT) and Machine Learning (ML) to the agricultural industry has enabled the development and creation of smart farms and precision agriculture. The growth in the number of smart farms and potential cooperation between these farms has given rise to the Cooperative Smart Farming (CSF) where different connected farms collaborate with each other and share data for their mutual benefit. This data sharing through CSF has various advantages where individual data from separate farms can be aggregated by ML models and be used to produce actionable outputs which then can be utilized by all the farms in CSFs. This enables farms to gain better insights for enhancing desired outputs, such as crop yield, managing water resources and irrigation schedules, as well as better seed applications. However, complications may arise in CSF when some of the farms do not transfer high-quality data and rather rely on other farms to feed ML models. Another possibility is the presence of rogue farms in CSFs that want to snoop on other farms without actually contributing any data. In this paper, we analyze the behavior of farms participating in CSFs using game theory approach, where each farm is motivated to maximize its profit. We first present the problem of defective farms in CSFs due to lack of better data, and then propose a ML framework that segregates farms and automatically assign them to an appropriate CSF cluster based on the quality of data they provide. Our proposed model rewards the farms supplying better data and penalize the ones that do not provide required data or are malicious in nature, thus, ensuring the model integrity and better performance all over while solving the defective farms problem

    Blockchain for Future Smart Grid: A Comprehensive Survey

    Full text link
    The concept of smart grid has been introduced as a new vision of the conventional power grid to figure out an efficient way of integrating green and renewable energy technologies. In this way, Internet-connected smart grid, also called energy Internet, is also emerging as an innovative approach to ensure the energy from anywhere at any time. The ultimate goal of these developments is to build a sustainable society. However, integrating and coordinating a large number of growing connections can be a challenging issue for the traditional centralized grid system. Consequently, the smart grid is undergoing a transformation to the decentralized topology from its centralized form. On the other hand, blockchain has some excellent features which make it a promising application for smart grid paradigm. In this paper, we aim to provide a comprehensive survey on application of blockchain in smart grid. As such, we identify the significant security challenges of smart grid scenarios that can be addressed by blockchain. Then, we present a number of blockchain-based recent research works presented in different literatures addressing security issues in the area of smart grid. We also summarize several related practical projects, trials, and products that have been emerged recently. Finally, we discuss essential research challenges and future directions of applying blockchain to smart grid security issues.Comment: 26 pages, 13 figures, 5 table

    An Incentive-Based Mechanism for Volunteer Computing using Blockchain

    Full text link
    The rise of fast communication media both at the core and at the edge has resulted in unprecedented numbers of sophisticated and intelligent wireless IoT devices. Tactile Internet has enabled the interaction between humans and machines within their environment to achieve revolutionized solutions both on the move and in real-time. Many applications such as intelligent autonomous self-driving, smart agriculture and industrial solutions, and self-learning multimedia content filtering and sharing have become attainable through cooperative, distributed and decentralized systems, namely, volunteer computing. This article introduces a blockchain-enabled resource sharing and service composition solution through volunteer computing. Device resource, computing, and intelligence capabilities are advertised in the environment to be made discoverable and available for sharing with the aid of blockchain technology. Incentives in the form of on-demand service availability are given to resource and service providers to ensure fair and balanced cooperative resource usage. Blockchains are formed whenever a service request is initiated with the aid of fog and mobile edge computing (MEC) devices to ensure secure communication and service delivery for the participants. Using both volunteer computing techniques and tactile internet architectures, we devise a fast and reliable service provisioning framework that relies on a reinforcement learning technique. Simulation results show that the proposed solution can achieve high reward distribution, increased number of blockchain formations, reduced delays, and balanced resource usage among participants, under the premise of high IoT device availability.Comment: 22 pages, 12 Figures, 1 Table. Accepted. ACM Transaction On Internet Technolog
    corecore