11 research outputs found

    Social Anchor: Privacy-Friendly Attribute Aggregation From Social Networks

    Get PDF
    In the last decade or so, we have experienced a tremendous proliferation and popularity of different Social Networks (SNs), resulting more and more user attributes being stored in such SNs. These attributes represent a valuable asset and many innovative online services are offered in exchange of such attributes. This particular phenomenon has allured these social networks to act as Identity Providers (IdPs). However, the current setting unnecessarily imposes a restriction: a user can only release attributes from one single IdP in a single session, thereby, limiting the user to aggregate attributes from multiple IdPs within the same session. In addition, our analysis suggests that the manner by which attributes are released from these SNs is extremely privacy-invasive and a user has very limited control to exercise her privacy during this process. In this article, we present Social Anchor, a system for attribute aggregation from social networks in a privacy-friendly fashion. Our proposed Social Anchor system effectively addresses both of these serious issues. Apart from the proposal, we have implemented Social Anchor following a set of security and privacy requirements. We have also examined the associated trust issues using a formal trust analysis model. Besides, we have presented a formal analysis of its protocols using a state-of-the-art formal analysis tool called AVISPA to ensure the security of Social Anchor. Finally, we have provided a performance analysis of Social Anchor

    Evaluation of IoT-Based Smart Home Assistance for Elderly People Using Robot

    No full text
    In the development of Internet-of-things (IoT)-based technology, there is a pre-programmed robot called Cyborg which is used for assisting elderly people. It moves around the home and observes the surrounding conditions. The Cyborg is developed and used in the smart home system. The features of a smart home system with IoT technology include temperature control, lighting control, surveillance, security, smart electricity, and water sensors. Nowadays, elderly people may not be able to maintain their homes appropriately and may feel uncomfortable performing day-to-day activities. Therefore, Cyborg can be used to carry out the activities of elderly people. Such activities include switching off unnecessary lights, watering plants, gas control, monitoring intruders or unknown persons, alerting elderly people in emergency situations, etc. These activities are controlled by web-based platforms as well as smartphone applications. The issues with the existing algorithms include that they are inefficient, require a long time for implementation, and have high storage space requirements. This paper proposes the k-nearest neighbors (KNN) with an artificial bee colony (ABC) algorithm (KNN-ABC). In this proposed work, KNN-ABC is used with wireless sensor devices for perceiving the surroundings of the smart home. This work implements the automatic control of electronic appliances, alert signal processors, intruder detection, and performs day-to-day activities automatically in an efficient way. GNB for intruder detection in the smart home environment system using the Cyborg human intervention robot achieved an accuracy rate of 88.12%, the Artificial Bee Colony algorithm (ABC) achieved 90.12% accuracy on the task of power saving in smart home electronic appliances, the KNN technique achieved 91.45% accuracy on the task of providing a safer pace to the elderly in the smart home environment system, and our proposed KNN-ABC system achieved 93.72%

    Internet of Things (IoT)-Based Wastewater Management in Smart Cities

    No full text
    Wastewater management is a mechanism that is used to extract and refine pollutants from wastewater or drainage that can be recycled to the water supply with minimal environmental effects. New methods and techniques are required to ensure safe and smart wastewater management systems in smart cities because of the present deteriorating environmental state. Wireless sensor networks and the Internet of Things (IoT) represent promising wastewater treatment technologies. The elaborated literature survey formulates a conceptual framework with an Internet of Things (IoT)-based wastewater management system in smart cities (IoT-WMS) using blockchain technology. Blockchain technology is now being used to store information to develop an incentive model for encouraging the reuse of wastewater. Concerning the quality and quantity of recycled wastewater, tokens are issued to households/industries in smart cities. Nevertheless, this often encourages tampering with the information from which these tokens are awarded to include certain rewards. Anomaly detector algorithms are used to identify the possible IoT sensor data which has been tampered with by intruders. The model employs IoT sensors together with quality metrics to measure the amount of wastewater produced and reused. The simulation analysis shows that the proposed method achieves a high wastewater recycling rate of 96.3%, an efficiency ratio of 88.7%, a low moisture content ratio of 32.4%, an increased wastewater reuse of 90.8%, and a prediction ratio of 92.5%

    Security, cybercrime and digital forensics for IoT

    No full text
    The Internet of Things (IoT) connects almost all the environment objects whether physical or virtual over the Internet to produce new digitized services that improve people’s lifestyle. Currently, several IoT applications have a direct impact on our daily life activities including smart agriculture, wearables, connected healthcare, connected vehicles, and others. Despite the countless benefits provided by the IoT system, it introduces several security challenges. Resolving these challenges should be one of the highest priorities for IoT manufacturers to continue the successful deployment of IoT applications. The owners of IoT devices should guarantee that effective security measures are built in their devices. With the developments of the Internet, the number of security attacks and cybercrimes has increased significantly. In addition, with poor security measures implemented in IoT devices, the IoT system creates more opportunities for cybercrimes to attack various application and services of the IoT system resulting in a direct impact on users. One of the approaches that tackle the increasing number of cybercrimes is digital forensics. Cybercrimes with the power of the IoT technology can cross the virtual space to threaten human life, therefore, IoT forensics is required to investigate and mitigate against such attacks. This chapter presents a review of IoT security and forensics. It started with reviewing the IoT system by discussing building blocks of an IoT device, essential characteristic, communication technologies and challenges of the IoT. Then, IoT security by highlighting threats and solutions regarding IoT architecture layers are discussed. Digital forensics is also discussed by presenting the main steps of the investigation process. In the end, IoT forensics is discussed by reviewing related IoT forensics frameworks, discussing the need for adopting real-time approaches and showing various IoT forensics.N/

    Developing Trusted IoT Healthcare Information-Based AI and Blockchain

    No full text
    The Internet of Things (IoT) has grown more pervasive in recent years. It makes it possible to describe the physical world in detail and interact with it in several different ways. Consequently, IoT has the potential to be involved in many different applications, including healthcare, supply chain, logistics, and the automotive sector. IoT-based smart healthcare systems have significantly increased the value of organizations that rely heavily on IoT infrastructures and solutions. In fact, with the recent COVID-19 pandemic, IoT played an important role in combating diseases. However, IoT devices are tiny, with limited capabilities. Therefore, IoT systems lack encryption, insufficient privacy protection, and subject to many attacks. Accordingly, IoT healthcare systems are extremely vulnerable to several security flaws that might result in more accurate, quick, and precise diagnoses. On the other hand, blockchain technology has been proven to be effective in many critical applications. Blockchain technology combined with IoT can greatly improve the healthcare industry’s efficiency, security, and transparency while opening new commercial choices. This paper is an extension of the current effort in the IoT smart healthcare systems. It has three main contributions, as follows: (1) it proposes a smart unsupervised medical clinic without medical staff interventions. It tries to provide safe and fast services confronting the pandemic without exposing medical staff to danger. (2) It proposes a deep learning algorithm for COVID-19 detection-based X-ray images; it utilizes the transfer learning (ResNet152) model. (3) The paper also presents a novel blockchain-based pharmaceutical system. The proposed algorithms and systems have proven to be effective and secure enough to be used in the healthcare environment

    Secure medical image transmission using deep neural network in e‐health applications

    Get PDF
    Abstract Recently, medical technologies have developed, and the diagnosis of diseases through medical images has become very important. Medical images often pass through the branches of the network from one end to the other. Hence, high‐level security is required. Problems arise due to unauthorized use of data in the image. One of the methods used to secure data in the image is encryption, which is one of the most effective techniques in this field. Confusion and diffusion are the two main steps addressed here. The contribution here is the adaptation of the deep neural network by the weight that has the highest impact on the output, whether it is an intermediate output or a semi‐final output in additional to a chaotic system that is not detectable using deep neural network algorithm. The colour and grayscale images were used in the proposed method by dividing the images according to the Region of Interest by the deep neural network algorithm. The algorithm was then used to generate random numbers to randomly create a chaotic system based on the replacement of columns and rows, and randomly distribute the pixels on the designated area. The proposed algorithm evaluated in several ways, and compared with the existing methods to prove the worth of the proposed method

    A Blockchain-Enabled IoT Logistics System for Efficient Tracking and Management of High-Price Shipments: A Resilient, Scalable and Sustainable Approach to Smart Cities

    No full text
    The concept of a smart city is aimed at enhancing the quality of life for urban residents, and logistic services are a crucial component of this effort. Despite this, the logistics industry has encountered issues due to the exponential growth of logistics volumes, as well as the complexity of processes and lack of transparency. Consequently, it is necessary to develop an efficient management system that offers traceability and condition monitoring capabilities to ensure the safe and high-quality delivery of goods. Moreover, it is crucial to guarantee the accuracy and dependability of distribution data. In this context, this paper proposes a blockchain-enabled IoT logistics system for the efficient tracking and management of high-price shipments. A smart contract based on blockchain technology has been designed for automatic approval and payment, with the aim of distributing shipping information exclusively among legitimate logistics parties. To ensure authentication, a zero-knowledge proof is used to conceal the blockchain address. Moreover, an intelligent parcel (iParcel) containing piezoresistive sensors is developed to pack delivered goods during the shipping process for violation detection such as severe falls or theft. The iParcels are automatically tracked and traced, and if a violation occurs, the contract is cancelled, and payment is refunded. The transaction fee per party is reasonable, particularly for high-price products that guarantee successful shipment

    Delivering Digital Healthcare for Elderly: A Holistic Framework for the Adoption of Ambient Assisted Living

    No full text
    Adoption of Ambient Assisted Living (AAL) technologies for geriatric healthcare is suboptimal. This study aims to present the AAL Adoption Diamond Framework, encompassing a set of key enablers/barriers as factors, and describe our approach to developing this framework. A systematic literature review was conducted following the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) guidelines. SCOPUS, IEEE Xplore, PubMed, ProQuest, Science Direct, ACM Digital Library, SpringerLink, Wiley Online Library and grey literature were searched. Thematic analysis was performed to identify factors reported or perceived to be important for adopting AAL technologies. Of 3717 studies initially retrieved, 109 were thoroughly screened and 52 met our inclusion criteria. Nineteen unique technology adoption factors were identified. The most common factor was privacy (50%) whereas data accuracy and affordability were the least common factors (4%). The highest number of factors found per a given study was eleven whereas the average number of factors across all studies included in our sample was four (mean = 3.9). We formed an AAL technology adoption framework based on the retrieved information and named it the AAL Adoption Diamond Framework. This holistic framework was formed by organising the identified technology adoption factors into four key dimensions: Human, Technology, Business, and Organisation. To conclude, the AAL Adoption Diamond Framework is holistic in term of recognizing key factors for the adoption of AAL technologies, and novel and unmatched in term of structuring them into four overarching themes or dimensions, bringing together the individual and the systemic factors evolving around the adoption of AAL technology. This framework is useful for stakeholders (e.g., decision-makers, healthcare providers, and caregivers) to adopt and implement AAL technologies

    Studying Dynamical Characteristics of Oxygen Saturation Variability Signals Using Haar Wavelet

    No full text
    An aim of the analysis of biomedical signals such as heart rate variability signals, brain signals, oxygen saturation variability (OSV) signals, etc., is for the design and development of tools to extract information about the underlying complexity of physiological systems, to detect physiological states, monitor health conditions over time, or predict pathological conditions. Entropy-based complexity measures are commonly used to quantify the complexity of biomedical signals; however novel complexity measures need to be explored in the context of biomedical signal classification. In this work, we present a novel technique that used Haar wavelets to analyze the complexity of OSV signals of subjects during COVID-19 infection and after recovery. The data used to evaluate the performance of the proposed algorithms comprised recordings of OSV signals from 44 COVID-19 patients during illness and after recovery. The performance of the proposed technique was compared with four, scale-based entropy measures: multiscale entropy (MSE); multiscale permutation entropy (MPE); multiscale fuzzy entropy (MFE); multiscale amplitude-aware permutation entropy (MAMPE). Preliminary results of the pilot study revealed that the proposed algorithm outperformed MSE, MPE, MFE, and MMAPE in terms of better accuracy and time efficiency for separating during and after recovery the OSV signals of COVID-19 subjects. Further studies are needed to evaluate the potential of the proposed algorithm for large datasets and in the context of other biomedical signal classifications
    corecore