71 research outputs found

    An accurate RSS/AoA-based localization method for internet of underwater things

    Get PDF
    Localization is an important issue for Internet of Underwater Things (IoUT) since the performance of a large number of underwater applications highly relies on the position information of underwater sensors. In this paper, we propose a hybrid localization approach based on angle-of-arrival (AoA) and received signal strength (RSS) for IoUT. We consider a smart fishing scenario in which using the proposed approach fishers can find fishes’ locations effectively. The proposed method collects the RSS observation and estimates the AoA based on error variance. To have a more realistic deployment, we assume that the perfect noise information is not available. Thus, a minimax approach is provided in order to optimize the worst-case performance and enhance the estimation accuracy under the unknown parameters. Furthermore, we analyze the mismatch of the proposed estimator using mean-square error (MSE). We then develop semidefinite programming (SDP) based method which relaxes the non-convex constraints into the convex constraints to solve the localization problem in an efficient way. Finally, the Cramer–Rao lower bounds (CRLBs) are derived to bound the performance of the RSS-based estimator. In comparison with other localization schemes, the proposed method increases localization accuracy by more than 13%. Our method can localize 96% of sensor nodes with less than 5% positioning error when there exist 25% anchors

    Intrusion Detection in Critical SD-IoT Ecosystem

    Get PDF
    The Internet of Things (IoT) connects physical objects with intelligent decision-making support to exchange information and enable various critical applications. The IoT enables billions of devices to connect to the Internet, thereby collecting and exchanging real-time data for intelligent services. The complexity of IoT management makes it difficult to deploy and manage services dynamically. Thus, in recent times, Software Defined Network (SDN) has been widely adopted in IoT service management to provide dynamic and adaptive capabilities to the traditional IoT ecosystem. This has resulted in the evolution of a new paradigm known as Software-defined IoT (SD-IoT). Although there are several benefits of SD-IoT, it also opens new frontiers for attackers to introduce attacks and intrusions. Specifically, it becomes challenging working in a critical IoT environment where any delay or disruption caused by an intruder can be life-threatening or can cause significant destruction. However, given the flexibility of SDN, it is easier to deploy different intrusion detection systems that can detect attacks or anomalies promptly. Thus, in this paper, we have deployed a hybrid architecture that allows monitoring, analysis, and detection of attacks and anomalies in the SD-IoT ecosystem. In this work, we have considered three scenarios, a) denial of services, b) distributed denial of service, and c) packet fragmentation. The work is validated using simulated experiments performed using SNORT deployed on the Mininet platform for three scenarios

    Adaptive Recovery Mechanism for SDN Controllers in Edge-Cloud supported FinTech Applications

    Get PDF
    Financial Technology have revolutionized the delivery and usage of the autonomous operations and processes to improve the financial services. However, the massive amount of data (often called as big data) generated seamlessly across different geographic locations can end end up as a bottleneck for the underlying network infrastructure. To mitigate this challenge, software-defined network (SDN) has been leveraged in the proposed approach to provide scalability and resilience in multi-controller environment. However, in case if one of these controllers fail or cannot work as per desired requirements, then either the network load of that controller has to be migrated to another suitable controller or it has to be divided or balanced among other available controllers. For this purpose, the proposed approach provides an adaptive recovery mechanism in a multi-controller SDN setup using support vector machine-based classification approach. The proposed work defines a recovery pool based on the three vital parameters, reliability, energy, and latency. A utility matrix is then computed based on these parameters, on the basis of which the recovery controllers are selected. The results obtained prove that it is able to perform well in terms of considered evaluation parameters

    A Heuristic-Based Appliance Scheduling Scheme for Smart Homes

    Get PDF
    The ever-growing demand for electricity in the residential sector results in creating a severe burden on electric grids. However, with the emergence of smart homes (SHs) and smart grids (SGs), this burden can be reduced to some extent. To address this issue, we propose an energy management system in this paper which manages the power requirements of SHs automatically according to the utility constraints and user priorities. The proposed system is based on a heuristic technique which considers the users priority and power available from the grid as well as distributed energy resources (DERs) for scheduling of appliances. It works by dividing the appliance scheduling problem in an SH into sub-problems for different time-slots. Results show that the proposed scheme efficiently manages the load demand of the SH with respect to power available from the utility, battery energy storage system, and user preferences

    Sustainable Edge Node Computing Deployments in Distributed Manufacturing Systems

    Get PDF
    The advancement of mobile internet technology has created opportunities for integrating the Industrial Internet of Things (IIoT) and edge computing in smart manufacturing. These sustainable technologies enable intelligent devices to achieve high-performance computing with minimal latency. This paper introduces a novel approach to deploy edge computing nodes in smart manufacturing environments at a low cost. However, the intricate interactions among network sensors, equipment, service levels, and network topologies in smart manufacturing systems pose challenges to node deployment. To address this, the proposed sustainable game theory method identifies the optimal edge computing node for deployment to attain the desired outcome. Additionally, the standard design of Software Defined Network (SDN) in conjunction with edge computing serves as forwarding switches to enhance overall computing services. Simulations demonstrate the effectiveness of this approach in reducing network delay and deployment costs associated with computing resources. Given the significance of sustainability, cost efficiency plays a critical role in establishing resilient edge networks. Our numerical and simulation results validate that the proposed scheme surpasses existing techniques like shortest estimated latency first (SELF), shortest estimated buffer first (SEBF), and random deployment (RD) in minimizing the total cost of deploying edge nodes, network delay, packet loss, and energy consumption

    Technologies for the diagnosis of angle closure glaucoma (ACE): protocol of a prospective, multicentre, cross-sectional diagnostic study

    Get PDF
    INTRODUCTION: Angle-closure is responsible for half of all glaucoma blindness globally. Patients with suspected glaucoma require assessment of the drainage angle by an experienced clinician. The goal of this study is to evaluate the diagnostic performance and cost-effectiveness of two non-contact tests, anterior segment OCT (Optical Coherence Tomography) (AS-OCT) and limbal anterior chamber depth for patients referred to hospital with suspected angle closure compared with gonioscopy by ophthalmologist. METHODS AND ANALYSIS: Study design: prospective, multicentre, cross-sectional diagnostic accuracy study. INCLUSION CRITERIA: adults referred from community optometry to hospital with suspected angle closure. PRIMARY OUTCOME: Sensitivity and specificity. SECONDARY OUTCOMES: Positive/negative likelihood ratios, concordance, cost-effectiveness, proportion of patients requiring subsequent clinical assessment by ophthalmologist. SAMPLE SIZE: 600 individuals who have been referred with suspected angle closure from primary care (community optometry). We will have a 95% probability of detecting the true sensitivity of either test to within ±3.5% based on a sensitivity of 90%. The study would also have a 95% probability of detecting the true specificity of either test to within ±5%, assuming a specificity of 75%. ETHICS AND DISSEMINATION: Ethical Review Board approval was obtained. REC reference: 22/LO/0885. Our findings will be disseminated to those involved in eye care services. We will have a knowledge exchange event at the end of the study, published via the Health Technology Assessment web page and in specialist journals. The results will be presented at professional conferences and directly to patients via patient group meetings and the Glaucoma UK charity. TRIAL REGISTRATION NUMBER: ISRCTN15115867

    Demand Response Applications in Smart Grid Using Data Analytics - Various Facets

    No full text
    The focus of this article is on the demand response application aspect of the smart grid by leveraging the data analytics techniques. This would throw light on how these techniques can help in solving the various long-term problems in the smart grid and how the information gained can help the utilities to cut their costs. Smart grid comprises of many entities which are connected to the Internet for transferring the energy-related information, thereby forming a large network of Internet-of-energy. This network can be benefited from various cutting-edge technologies like data analytics to process a large amount of gathered data. The need and impact of performing data analytics on such a network is also described along with the various challenges and constraints that restrict the use of data analytics in the present scenario

    A Decoupled Blockchain Approach for Edge-envisioned IoT-based Healthcare Monitoring

    Get PDF
    The in-house health monitoring sensors form a large network of Internet of things (IoT) that continuously monitors and sends the data to the nearby devices or server. However, the connectivity of these IoT-based sensors with different entities leads to security loopholes wherein the adversary can exploit the vulnerabilities due to the openness of the data. This is a major concern especially in the healthcare sector where the change in data values from sensors can change the course of diagnosis which can cause severe health issues. Therefore, in order to prevent the data tempering and preserve the privacy of patients, we present a decoupled blockchain-based approach in the edge-envisioned ecosystem. This approach leverages the nearby edge devices to create the decoupled blocks in blockchain so as to securely transmit the healthcare data from sensors to the edge nodes. The edge nodes then transmit and store the data at the cloud using the incremental tensor-based scheme. This helps to reduce the data duplication of the huge amount of data transmitted in the large IoT healthcare network. The results show the effectiveness of the proposed approach in terms of the block preparation time, header generation time, tensor reduction ratio, and approximation error
    • …
    corecore