60 research outputs found

    A critical analysis of mobility management related issues of wireless sensor networks in cyber physical systems

    Get PDF
    Mobility management has been a long-standing issue in mobile wireless sensor networks and especially in the context of cyber physical systems its implications are immense. This paper presents a critical analysis of the current approaches to mobility management by evaluating them against a set of criteria which are essentially inherent characteristics of such systems on which these approaches are expected to provide acceptable performance. We summarize these characteristics by using a quadruple set of metrics. Additionally, using this set we classify the various approaches to mobility management that are discussed in this paper. Finally, the paper concludes by reviewing the main findings and providing suggestions that will be helpful to guide future research efforts in the area. **Please note that there are multiple authors for this article therefore only the name of the first 5 including Federation University Australia affiliate “Muhammad Imran” is provided in this record*

    Bio-inspired network security for 5G-enabled IoT applications

    Get PDF
    Every IPv6-enabled device connected and communicating over the Internet forms the Internet of things (IoT) that is prevalent in society and is used in daily life. This IoT platform will quickly grow to be populated with billions or more objects by making every electrical appliance, car, and even items of furniture smart and connected. The 5th generation (5G) and beyond networks will further boost these IoT systems. The massive utilization of these systems over gigabits per second generates numerous issues. Owing to the huge complexity in large-scale deployment of IoT, data privacy and security are the most prominent challenges, especially for critical applications such as Industry 4.0, e-healthcare, and military. Threat agents persistently strive to find new vulnerabilities and exploit them. Therefore, including promising security measures to support the running systems, not to harm or collapse them, is essential. Nature-inspired algorithms have the capability to provide autonomous and sustainable defense and healing mechanisms. This paper first surveys the 5G network layer security for IoT applications and lists the network layer security vulnerabilities and requirements in wireless sensor networks, IoT, and 5G-enabled IoT. Second, a detailed literature review is conducted with the current network layer security methods and the bio-inspired techniques for IoT applications exchanging data packets over 5G. Finally, the bio-inspired algorithms are analyzed in the context of providing a secure network layer for IoT applications connected over 5G and beyond networks

    Blockchain for global vaccinations efforts: State of the art, challenges, and future directions

    Get PDF
    The emergence of the coronavirus disease 2019 (COVID-19) global crisis negatively affected all aspects of human life. One of the most important methods used worldwide to survive this global crisis is the vaccination process to circumvent the proliferation of this pandemic. Many restrictions were alleviated in many countries such as access to public facilities and events. There is a huge amount of data about vaccination campaigns that are collected and maintained worldwide. Although the vaccination data can be analyzed to find out how the alleviation of restrictions can be applied if the data management process requires preserving key aspects like trust, transparency, and availability for easy and reliable access to such data. In this regard, blockchain technology is an excellent choice for meeting the requirements and providing a secure trusted framework for global verification. In this article, the related literature on blockchain technology is surveyed and summarized for all systems that embody solutions. The pros and cons of each solution are presented and provide a comparative summary. Furthermore, a detailed analysis is given to present the current problems and provide a promising mechanism to verify the vaccinated persons anywhere in the world, in a secure manner while retaining individual privacy

    A critical analysis of mobility management related issues of wireless sensor networks in cyber physical systems

    Get PDF
    Mobility management has been a long-standing issue in mobile wireless sensor networks and especially in the context of cyber physical systems; its implications are immense. This paper presents a critical analysis of the current approaches to mobility management by evaluating them against a set of criteria which are essentially inherent characteristics of such systems on which these approaches are expected to provide acceptable performance. We summarize these characteristics by using a quadruple set of metrics. Additionally, using this set we classify the various approaches to mobility management that are discussed in this paper. Finally, the paper concludes by reviewing the main findings and providing suggestions that will be helpful to guide future research efforts in the area

    An Intelligent Authentication Infrastructure for Ubiquitous Computing Environments

    Get PDF
    Ubiquitous computing is poised to have a profound effect on how humans interact with machines, physical spaces, services, everyday devices, and other humans. Ubiquitous computing envisions a world that features an abundance of embedded processors, wearable computers, smart consumer devices, sensors, and digital communication, which are all tightly coupled to form an "Active Space." Active spaces enhance education, distance learning, remote collaboration, resource sharing, group activities, and scientific studies. The shift to the ubiquitous computing paradigm brings forth new challenges to security and privacy, which cannot be addressed by mere adaptation of existing security and privacy mechanisms. Instead, novel security mechanisms must be devised. In this work, I identify the challenges and requirements of security in ubiquitous computing environments. I present the design, implementation, and evaluation of a comprehensive framework that enriches Active Spaces with novel security mechanisms and enable cornerstone security services, including identification, authentication, authorization and privacy. The presented framework is a novel solution that provides fundamentally new possibilities in providing secure and privacy-preserving ubiquitous computing environments, without impairing the value-added services and customizability that make ubiquitous computing environments unique and powerful

    An Efficient Overlay Infrastructure for Privacy-preserving Communication on the Internet

    Get PDF
    Abstract. This paper presents Mist2 (Mist 2nd generation), an overlay infrastructure for privacy-preserving communication. Nodes are arranged in concentric rings, which reduce average overlay hop latencies. Mist2 builds on the strengths of previous work on Mist, and significantly improves on the communication overhead, resilience to router failures, and the distributed nature of the algorithm. Mist2 provides sender, receiver, and sender-receiver anonymity for communicating end users. Compared to previous approaches, Mist2 significantly improves the communication efficiency in latency without sacrificing the level of anonymity. This paper proposes an enhancement to the original Mist, and improves this solution using rings resulting in Mist2. The simulation results clearly demonstrate the improved performance of anonymous communication in Mist2 compared to relevant systems, while maintaining anonymity. Since the proposed ring-based approach optimizes path latencies, it performs better than the other proposed solutions where the overlay hops can potentially traverse large distances

    Active Interaction: Live Remote Interaction through Video Feeds

    Get PDF
    Ubiquitous computing environments and the plethora of mobile devices that populate them have led to a global trend for remote collaboration and interaction. This trend demands seamless in-terfaces for remote interaction with these ubiqui-tous environments and their inhabitants. Existing applications for remote interactions are limited and typically require the user to mentally translate vir-tual avatars, tags, or names into real objects. Loca-tion information from accurate location sensing technologies, such as Ubisense, and other location sensing devices, facilitate enhanced interactions. Fusing the location information with live video feeds from multiple standard pan-tilt cameras, we provide a seamless, easily reconfigurable, real-time interface for remote interactions within distributed ubiquitous environments. Users interact with ob-jects directly through the video feed itself. In ef-fect, our framework dynamically discovers all re-sources and programmable objects in the vicinity and allows remote users to interact with the envi-ronment and all of its resources and objects as if they were physically present in the environment

    MAGIC broker:a middleware toolkit for interactive public displays

    Get PDF
    Large screen displays are being increasingly deployed in public areas for advertising, entertainment, and information display. Recently we have witnessed increasing interest in supporting interaction with such displays using personal mobile devices. To enable the rapid development of public large screen interactive applications, we have designed and developed the MAGIC Broker. The MAGIC Broker provides a set of abstractions and a simple RESTful web services protocol to easily program interactive public large screen display applications with a focus on mobile device interactions. We have carried out a preliminary evaluation of the MAGIC Broker via the development of a number of prototypes and believe our toolkit is a valid first step in developing a generic support infrastructure to empower developers of interactive large screen display applications
    • …
    corecore