9 research outputs found

    A Comprehensive Survey of the Tactile Internet: State of the art and Research Directions

    Get PDF
    The Internet has made several giant leaps over the years, from a fixed to a mobile Internet, then to the Internet of Things, and now to a Tactile Internet. The Tactile Internet goes far beyond data, audio and video delivery over fixed and mobile networks, and even beyond allowing communication and collaboration among things. It is expected to enable haptic communication and allow skill set delivery over networks. Some examples of potential applications are tele-surgery, vehicle fleets, augmented reality and industrial process automation. Several papers already cover many of the Tactile Internet-related concepts and technologies, such as haptic codecs, applications, and supporting technologies. However, none of them offers a comprehensive survey of the Tactile Internet, including its architectures and algorithms. Furthermore, none of them provides a systematic and critical review of the existing solutions. To address these lacunae, we provide a comprehensive survey of the architectures and algorithms proposed to date for the Tactile Internet. In addition, we critically review them using a well-defined set of requirements and discuss some of the lessons learned as well as the most promising research directions

    A Secure Fog-based Platform for SCADA-based IoT Critical Infrastructure

    Get PDF
    The rapid proliferation of Internet of Things (IoT) devices, such as smart meters and water valves, into industrial critical infrastructures and control systems has put stringent performance and scalability requirements on modern Supervisory Control and Data Acquisition (SCADA) systems. While cloud computing has enabled modern SCADA systems to cope with the increasing amount of data generated by sensors, actuators and control devices, there has been a growing interest recently to deploy edge datacenters in fog architectures to secure low-latency and enhanced security for mission-critical data. However, fog security and privacy for SCADA-based IoT critical infrastructures remains an under-researched area. To address this challenge, this contribution proposes a novel security “toolbox” to reinforce the integrity, security, and privacy of SCADA-based IoTcritical infrastructure at the fog layer. The toolbox incorporates a key feature: a cryptographic-based access approach to the cloud services using identity-based cryptography and signature schemes at the fog layer. We present the implementation details of a prototype for our proposed Secure Fog-based Platform (SeFoP) and provide performance evaluation results to demonstrate the appropriateness of the proposed platform in a real-world scenario. These results can pave the way towards the development of more secured and trusted SCADA-based IoT critical infrastructure, which is essential to counter cyber threats against next-generation critical infrastructure and industrial control systems. The results from the experiments demonstrate a superior performance of SeFoP, which is around 2.8 seconds when adding 5 virtual machines (VMs), 3.2 seconds when adding 10 VMs, and 112 seconds when adding 1000 VMs compared to Multi-Level user Access Control (MLAC) platform

    A secure fog-based platform for SCADA-based IoT critical infrastructure

    Get PDF
    © 2019 John Wiley & Sons, Ltd. The rapid proliferation of Internet of things (IoT) devices, such as smart meters and water valves, into industrial critical infrastructures and control systems has put stringent performance and scalability requirements on modern Supervisory Control and Data Acquisition (SCADA) systems. While cloud computing has enabled modern SCADA systems to cope with the increasing amount of data generated by sensors, actuators, and control devices, there has been a growing interest recently to deploy edge data centers in fog architectures to secure low-latency and enhanced security for mission-critical data. However, fog security and privacy for SCADA-based IoT critical infrastructures remains an under-researched area. To address this challenge, this contribution proposes a novel security “toolbox” to reinforce the integrity, security, and privacy of SCADA-based IoT critical infrastructure at the fog layer. The toolbox incorporates a key feature: a cryptographic-based access approach to the cloud services using identity-based cryptography and signature schemes at the fog layer. We present the implementation details of a prototype for our proposed secure fog-based platform and provide performance evaluation results to demonstrate the appropriateness of the proposed platform in a real-world scenario. These results can pave the way toward the development of a more secure and trusted SCADA-based IoT critical infrastructure, which is essential to counter cyber threats against next-generation critical infrastructure and industrial control systems. The results from the experiments demonstrate a superior performance of the secure fog-based platform, which is around 2.8 seconds when adding five virtual machines (VMs), 3.2 seconds when adding 10 VMs, and 112 seconds when adding 1000 VMs, compared to the multilevel user access control platform

    Enabling High Performance Fog Computing through fog-2-fog Coordination Model

    No full text
    Fog computing is a promising network paradigm in the IoT area as it has a great potential to reduce processing time for time-sensitive IoT applications. However, fog can get congested very easily due to fog resources limitations in term of capacity and computational power. In this paper, we tackle the issue of fog congestion through a request offloading algorithm. The result shows that the performance of fogs nodes can be increased be sharing fog’s overload over several fog nodes. The proposed offloading algorithm could have the potential to achieve a sustainable network paradigm and highlights the significant benefits of fog offloading for the future networking paradigm. Index Terms—Internet of Things, Fog Computing, Resource management, High performance computing, Fog-to-Fo

    An energy efficient routing approach for IoT enabled underwater wsns in smart cities

    Get PDF
    Nowadays, there is a growing trend in smart cities. Therefore, Terrestrial and Internet of Things (IoT) enabled Underwater Wireless Sensor Networks (TWSNs and IoT-UWSNs) are mostly used for observing and communicating via smart technologies. For the sake of collecting the desired information from the underwater environment, multiple acoustic sensors are deployed with limited resources, such as memory, battery, processing power, transmission range, etc. The replacement of resources for a particular node is not feasible due to the harsh underwater environment. Thus, the resources held by the node needs to be used efficiently to improve the lifetime of a network. In this paper, to support smart city vision, a terrestrial based “Away Cluster Head with Adaptive Clustering Habit” (ACH)2 is examined in the specified three dimensional (3-D) region inside the water. Three different cases are considered, which are: single sink at the water surface, multiple sinks at water surface„ and sinks at both water surface and inside water. “Underwater (ACH)2 ” (U-(ACH)2) is evaluated in each case. We have used depth in our proposed U-(ACH)2 to examine the performance of (ACH)2 in the ocean environment. Moreover, a comparative analysis is performed with state of the art routing protocols, including: Depth-based Routing (DBR) and Energy Efficient Depth-based Routing (EEDBR) protocol. Among all of the scenarios followed by case 1 and case 3, the number of packets sent and received at sink node are maximum using DEEC-(ACH)2 protocol. The packets drop ratio using TEEN-(ACH)2 protocol is less when compared to other algorithms in all scenarios. Whereas, for dead nodes DEEC-(ACH)2, LEACH-(ACH)2, and SEP-(ACH)2 protocols’ performance is different for every considered scenario. The simulation results shows that the proposed protocols outperform the existing ones

    Vulnerability assessment of industrial systems using Shodan

    No full text

    MODELLING AND OPTIMIZING OPERATING CONDITIONS OF APPARATUS USED IN PREPARATORY AND SECONDARY PROCESSES OF DRESSING MINERAL RESOURCES

    Get PDF
    A universal Markovian model describing a series of apparatus, relating to a class of separation characteristics and permitting to consider a number of parameters of the operating conditions of the apparatus has been constructed; an algorithm used for optimizing the apparatus operating conditions has been devised on the basis of the model built. A program for calculating the parameters of the developed model has been worked out by using the experimental data, and methods of solving the problems of predicting and optimizing the operation of the production apparatus in commercial conditions have been developed. The methods and the program have succesfully been tested at solving a series of practical problems associated with the optimization of the operation of commercial apparatus, at selection of structural parameters of new separators, at issue of recommendations concerning the reconstruction of the filtration section and during the investigations of the problems of the dressability of ores of various types and their mixturesAvailable from VNTIC / VNTIC - Scientific & Technical Information Centre of RussiaSIGLERURussian Federatio
    corecore