122 research outputs found

    Trust Management Approach for Detection of Malicious Devices in SIoT

    Get PDF
    Internet of Things (IoT) is an innovative era of interrelated devices to provide services to other devices or users. In Social Internet of Thing (SIoT), social networking aspect is used for building relationships between devices. For providing or utilizing services, devices need to trust each other in complex and heterogeneous environments. Separating benign and malicious devices in SIoT is a prime security objective. In literature, several works proposed trust computation models based on trust features. But these models fail to identify malicious devices. This paper focuses on detection of malicious devices. In this paper, basic fundamentals, properties, models and attacks of trust in SIoT are discussed. Up-to-date research distributions on trust management and trust attacks are reviewed and idea of Trust Management using Machine Learning Algorithm (TM-MLA) is proposed for identification of malicious devices

    Task Allocation among Connected Devices: Requirements, Approaches and Challenges

    Get PDF
    Task allocation (TA) is essential when deploying application tasks to systems of connected devices with dissimilar and time-varying characteristics. The challenge of an efficient TA is to assign the tasks to the best devices, according to the context and task requirements. The main purpose of this paper is to study the different connotations of the concept of TA efficiency, and the key factors that most impact on it, so that relevant design guidelines can be defined. The paper first analyzes the domains of connected devices where TA has an important role, which brings to this classification: Internet of Things (IoT), Sensor and Actuator Networks (SAN), Multi-Robot Systems (MRS), Mobile Crowdsensing (MCS), and Unmanned Aerial Vehicles (UAV). The paper then demonstrates that the impact of the key factors on the domains actually affects the design choices of the state-of-the-art TA solutions. It results that resource management has most significantly driven the design of TA algorithms in all domains, especially IoT and SAN. The fulfillment of coverage requirements is important for the definition of TA solutions in MCS and UAV. Quality of Information requirements are mostly included in MCS TA strategies, similar to the design of appropriate incentives. The paper also discusses the issues that need to be addressed by future research activities, i.e.: allowing interoperability of platforms in the implementation of TA functionalities; introducing appropriate trust evaluation algorithms; extending the list of tasks performed by objects; designing TA strategies where network service providers have a role in TA functionalities’ provisioning

    A Systematic Review of LPWAN and Short-Range Network using AI to Enhance Internet of Things

    Get PDF
    Artificial intelligence (AI) has recently been used frequently, especially concerning the Internet of Things (IoT). However, IoT devices cannot work alone, assisted by Low Power Wide Area Network (LPWAN) for long-distance communication and Short-Range Network for a short distance. However, few reviews about AI can help LPWAN and Short-Range Network. Therefore, the author took the opportunity to do this review. This study aims to review LPWAN and Short-Range Networks AI papers in systematically enhancing IoT performance. Reviews are also used to systematically maximize LPWAN systems and Short-Range networks to enhance IoT quality and discuss results that can be applied to a specific scope. The author utilizes selected reporting items for systematic review and meta-analysis (PRISMA). The authors conducted a systematic review of all study results in support of the authors' objectives. Also, the authors identify development and related study opportunities. The author found 79 suitable papers in this systematic review, so a discussion of the presented papers was carried out. Several technologies are widely used, such as LPWAN in general, with several papers originating from China. Many reports from conferences last year and papers related to this matter were from 2020-2021. The study is expected to inspire experimental studies in finding relevant scientific papers and become another review

    A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements, and Future Directions

    Get PDF
    Security has become the primary concern in many telecommunications industries today as risks can have high consequences. Especially, as the core and enable technologies will be associated with 5G network, the confidential information will move at all layers in future wireless systems. Several incidents revealed that the hazard encountered by an infected wireless network, not only affects the security and privacy concerns, but also impedes the complex dynamics of the communications ecosystem. Consequently, the complexity and strength of security attacks have increased in the recent past making the detection or prevention of sabotage a global challenge. From the security and privacy perspectives, this paper presents a comprehensive detail on the core and enabling technologies, which are used to build the 5G security model; network softwarization security, PHY (Physical) layer security and 5G privacy concerns, among others. Additionally, the paper includes discussion on security monitoring and management of 5G networks. This paper also evaluates the related security measures and standards of core 5G technologies by resorting to different standardization bodies and provide a brief overview of 5G standardization security forces. Furthermore, the key projects of international significance, in line with the security concerns of 5G and beyond are also presented. Finally, a future directions and open challenges section has included to encourage future research.European CommissionNational Research Tomsk Polytechnic UniversityUpdate citation details during checkdate report - A

    Mobile networks and internet of things infrastructures to characterize smart human mobility

    Get PDF
    The evolution of Mobile Networks and Internet of Things (IoT) architectures allows one to rethink the way smart cities infrastructures are designed and managed, and solve a number of problems in terms of human mobility. The territories that adopt the sensoring era can take advantage of this disruptive technology to improve the quality of mobility of their citizens and the rationalization of their resources. However, with this rapid development of smart terminals and infrastructures, as well as the proliferation of diversified applications, even current networks may not be able to completely meet quickly rising human mobility demands. Thus, they are facing many challenges and to cope with these challenges, different standards and projects have been proposed so far. Accordingly, Artificial Intelligence (AI) has been utilized as a new paradigm for the design and optimization of mobile networks with a high level of intelligence. The objective of this work is to identify and discuss the challenges of mobile networks, alongside IoT and AI, to characterize smart human mobility and to discuss some workable solutions to these challenges. Finally, based on this discussion, we propose paths for future smart human mobility researches.This work has been supported by FCT–Fundação para a Ciência e Tecnologia within the R&D Units Project Scope: UIDB/00319/2020. This work has also been supported by national funds through FCT–Fundação para a Ciência e Tecnologia through project UIDB/04728/202

    Recent Advances in Cellular D2D Communications

    Get PDF
    Device-to-device (D2D) communications have attracted a great deal of attention from researchers in recent years. It is a promising technique for offloading local traffic from cellular base stations by allowing local devices, in physical proximity, to communicate directly with each other. Furthermore, through relaying, D2D is also a promising approach to enhancing service coverage at cell edges or in black spots. However, there are many challenges to realizing the full benefits of D2D. For one, minimizing the interference between legacy cellular and D2D users operating in underlay mode is still an active research issue. With the 5th generation (5G) communication systems expected to be the main data carrier for the Internet-of-Things (IoT) paradigm, the potential role of D2D and its scalability to support massive IoT devices and their machine-centric (as opposed to human-centric) communications need to be investigated. New challenges have also arisen from new enabling technologies for D2D communications, such as non-orthogonal multiple access (NOMA) and blockchain technologies, which call for new solutions to be proposed. This edited book presents a collection of ten chapters, including one review and nine original research works on addressing many of the aforementioned challenges and beyond
    corecore