2,505 research outputs found

    Trust and reputation management for securing collaboration in 5G access networks: the road ahead

    Get PDF
    Trust represents the belief or perception of an entity, such as a mobile device or a node, in the extent to which future actions and reactions are appropriate in a collaborative relationship. Reputation represents the network-wide belief or perception of the trustworthiness of an entity. Each entity computes and assigns a trust or reputation value, which increases and decreases with the appropriateness of actions and reactions, to another entity in order to ensure a healthy collaborative relationship. Trust and reputation management (TRM) has been investigated to improve the security of traditional networks, particularly the access networks. In 5G, the access networks are multi-hop networks formed by entities which may not be trustable, and so such networks are prone to attacks, such as Sybil and crude attacks. TRM addresses such attacks to enhance the overall network performance, including reliability, scalability, and stability. Nevertheless, the investigation of TRM in 5G, which is the next-generation wireless networks, is still at its infancy. TRM must cater for the characteristics of 5G. Firstly, ultra-densification due to the exponential growth of mobile users and data traffic. Secondly, high heterogeneity due to the different characteristics of mobile users, such as different transmission characteristics (e.g., different transmission power) and different user equipment (e.g., laptops and smartphones). Thirdly, high variability due to the dynamicity of the entities’ behaviors and operating environment. TRM must also cater for the core features of 5G (e.g., millimeter wave transmission, and device-to-device communication) and the core technologies of 5G (e.g., massive MIMO and beamforming, and network virtualization). In this paper, a review of TRM schemes in 5G and traditional networks, which can be leveraged to 5G, is presented. We also provide an insight on some of the important open issues and vulnerabilities in 5G networks that can be resolved using a TRM framework

    Application of Fuzzy Comprehensive Evaluation in Cognitive Networks for Optimal Network Selection

    Full text link

    Trustworthy Edge Machine Learning: A Survey

    Full text link
    The convergence of Edge Computing (EC) and Machine Learning (ML), known as Edge Machine Learning (EML), has become a highly regarded research area by utilizing distributed network resources to perform joint training and inference in a cooperative manner. However, EML faces various challenges due to resource constraints, heterogeneous network environments, and diverse service requirements of different applications, which together affect the trustworthiness of EML in the eyes of its stakeholders. This survey provides a comprehensive summary of definitions, attributes, frameworks, techniques, and solutions for trustworthy EML. Specifically, we first emphasize the importance of trustworthy EML within the context of Sixth-Generation (6G) networks. We then discuss the necessity of trustworthiness from the perspective of challenges encountered during deployment and real-world application scenarios. Subsequently, we provide a preliminary definition of trustworthy EML and explore its key attributes. Following this, we introduce fundamental frameworks and enabling technologies for trustworthy EML systems, and provide an in-depth literature review of the latest solutions to enhance trustworthiness of EML. Finally, we discuss corresponding research challenges and open issues.Comment: 27 pages, 7 figures, 10 table

    Challenges and opportunities of introducing Internet of Things and Artificial Intelligence applications into Supply Chain Management

    Get PDF
    The study examines the challenges and opportunities of introducing Artificial Intelligence (AI) and the Internet of Things (IoT) into the Supply Chain Management (SCM). This research focuses on the Logistic Management. The central research question is “What are the key challenges and opportunities of introducing AI and IoT applications into the Supply Chain Management?” The goal of this research is to collect the most appropriate literature to help create a conceptual framework, which involves the integration of the IoT and AI applications into contemporary supply chain management with the emphasis on the logistics management. Additionally, the role of 5G Network is closely studied in order to indicate its capabilities and the processing capacity that it can provide to the AI and IoT operations. In addition, the semi-structured online interview with the top managers from several companies was conducted in order to identify the degree of readiness of the companies for the AI and IoT applications in SCM. From the retrieved results, the major challenges of integrating the IoT into SCM are the security and privacy issues, the sensitivity of the data and high costs of the implementation at an initial stage. Moreover, the research results have shown that the IoT applications can positively affect the SCM activities, in particular, the high visibility across the SC, an effective traceability and an automated data collection. Furthermore, the predictive analysis of AI programs can help the SCM to eliminate the potential errors and failures in the processes.fi=Opinnäytetyö kokotekstinä PDF-muodossa.|en=Thesis fulltext in PDF format.|sv=Lärdomsprov tillgängligt som fulltext i PDF-format

    Application of Geographic Information Systems

    Get PDF
    The importance of Geographic Information Systems (GIS) can hardly be overemphasized in today’s academic and professional arena. More professionals and academics have been using GIS than ever – urban & regional planners, civil engineers, geographers, spatial economists, sociologists, environmental scientists, criminal justice professionals, political scientists, and alike. As such, it is extremely important to understand the theories and applications of GIS in our teaching, professional work, and research. “The Application of Geographic Information Systems” presents research findings that explain GIS’s applications in different subfields of social sciences. With several case studies conducted in different parts of the world, the book blends together the theories of GIS and their practical implementations in different conditions. It deals with GIS’s application in the broad spectrum of geospatial analysis and modeling, water resources analysis, land use analysis, infrastructure network analysis like transportation and water distribution network, and such. The book is expected to be a useful source of knowledge to the users of GIS who envision its applications in their teaching and research. This easy-to-understand book is surely not the end in itself but a little contribution to toward our understanding of the rich and wonderful subject of GIS

    Risk Management in Environment, Production and Economy

    Get PDF
    The term "risk" is very often associated with negative meanings. However, in most cases, many opportunities can present themselves to deal with the events and to develop new solutions which can convert a possible danger to an unforeseen, positive event. This book is a structured collection of papers dealing with the subject and stressing the importance of a relevant issue such as risk management. The aim is to present the problem in various fields of application of risk management theories, highlighting the approaches which can be found in literature

    THE GLOBAL PUBLIC HEALTH CURRICULUM: Specific Global Health Competences

    Get PDF
    The 2nd edition of the Global Public Health Curriculum has been published in the South Eastern European Journal of Public Health, end of 2016 as a special volume (editors Ulrich Laaser & Florida Beluli) at: http://www.seejph.com/index.php/seejph/article/view/106/82. The curriculum targets the postgraduate education and training of public health professionals including their continued professional development (CPD). However, specific competences for the curricular modules remained to be identified in a more systematic approach. To that end from the international literature the following references have been used as a general orientation:A) Armed Forces Medical College (AFMC) Resource Group, GHEC Committee, India: Global health essential core competencies. At: https://lane.stanford.edu/portals/ihealth-pdfs/BasicCore_Competencies_Final2010.pdfB) Dias M. Et al.: Global Health Competencies for UK Health Professionals. TECHNICAL REPORT · SEPTEMBER 2015. At: http://www.researchgate.net/publication/283086441C) Association of Schools and Programs of Public Health (ASPPH): The Global Health Competency model. At: www.aspph.org/educate/models/masters-global-health/D) World Health Organisation (WHO): WHO GLOBAL COMPETENCY MODEL. At: www.who.int/employment/competencies/WHO_competencies_EN.pdfE) Jogerst K et al.: Identifying Interprofessional Global Health Competencies for 21st Century. At: https://www.cfhi.org/sites/files/files/pages/global_health_competencies_article.pd

    Impact Assessment of Hypothesized Cyberattacks on Interconnected Bulk Power Systems

    Full text link
    The first-ever Ukraine cyberattack on power grid has proven its devastation by hacking into their critical cyber assets. With administrative privileges accessing substation networks/local control centers, one intelligent way of coordinated cyberattacks is to execute a series of disruptive switching executions on multiple substations using compromised supervisory control and data acquisition (SCADA) systems. These actions can cause significant impacts to an interconnected power grid. Unlike the previous power blackouts, such high-impact initiating events can aggravate operating conditions, initiating instability that may lead to system-wide cascading failure. A systemic evaluation of "nightmare" scenarios is highly desirable for asset owners to manage and prioritize the maintenance and investment in protecting their cyberinfrastructure. This survey paper is a conceptual expansion of real-time monitoring, anomaly detection, impact analyses, and mitigation (RAIM) framework that emphasizes on the resulting impacts, both on steady-state and dynamic aspects of power system stability. Hypothetically, we associate the combinatorial analyses of steady state on substations/components outages and dynamics of the sequential switching orders as part of the permutation. The expanded framework includes (1) critical/noncritical combination verification, (2) cascade confirmation, and (3) combination re-evaluation. This paper ends with a discussion of the open issues for metrics and future design pertaining the impact quantification of cyber-related contingencies

    Neuro-fuzzy resource forecast in site suitability assessment for wind and solar energy: a mini review

    Get PDF
    Abstract:Site suitability problems in renewable energy studies have taken a new turn since the advent of geographical information system (GIS). GIS has been used for site suitability analysis for renewable energy due to its prowess in processing and analyzing attributes with geospatial components. Multi-criteria decision making (MCDM) tools are further used for criteria ranking in the order of influence on the study. Upon location of most appropriate sites, the need for intelligent resource forecast to aid in strategic and operational planning becomes necessary if viability of the investment will be enhanced and resource variability will be better understood. One of such intelligent models is the adaptive neuro-fuzzy inference system (ANFIS) and its variants. This study presents a mini-review of GIS-based MCDM facility location problems in wind and solar resource site suitability analysis and resource forecast using ANFIS-based models. We further present a framework for the integration of the two concepts in wind and solar energy studies. Various MCDM techniques for decision making with their strengths and weaknesses were presented. Country specific studies which apply GIS-based method in site suitability were presented with criteria considered. Similarly, country-specific studies in ANFIS-based resource forecasts for wind and solar energy were also presented. From our findings, there has been no technically valid range of values for spatial criteria and the analytical hierarchical process (AHP) has been commonly used for criteria ranking leaving other techniques less explored. Also, hybrid ANFIS models are more effective compared to standalone ANFIS models in resource forecast, and ANFIS optimized with population-based models has been mostly used. Finally, we present a roadmap for integrating GIS-MCDM site suitability studies with ANFIS-based modeling for improved strategic and operational planning
    • …
    corecore