35 research outputs found
Energy-Aware Forwarding Strategy for Metro Ethernet Networks
Energy optimization has become a crucial issue in the realm of ICT. This
paper addresses the problem of energy consumption in a Metro Ethernet network.
Ethernet technology deployments have been increasing tremendously because of
their simplicity and low cost. However, much research remains to be conducted
to address energy efficiency in Ethernet networks. In this paper, we propose a
novel Energy Aware Forwarding Strategy for Metro Ethernet networks based on a
modification of the Internet Energy Aware Routing (EAR) algorithm. Our
contribution identifies the set of links to turn off and maintain links with
minimum energy impact on the active state. Our proposed algorithm could be a
superior choice for use in networks with low saturation, as it involves a
tradeoff between maintaining good network performance and minimizing the active
links in the network. Performance evaluation shows that, at medium load
traffic, energy savings of 60% can be achieved. At high loads, energy savings
of 40% can be achieved without affecting the network performance
A Novel System for Confidential Medical Data Storage Using Chaskey Encryption and Blockchain Technology
يعد التخزين الآمن للمعلومات الطبية السرية أمرًا بالغ الأهمية لمنظمات الرعاية الصحية التي تسعى إلى حماية خصوصية المريض والامتثال للمتطلبات التنظيمية. في هذا البحث، نقدم نظامًا جديدًا للتخزين الآمن للبيانات الطبية باستخدام تقنية تشفير Chaskey و blockchain. يستخدم النظام تشفير Chaskey لضمان سرية وسلامة البيانات الطبية، وتكنولوجيا blockchain لتوفير حلول تخزين البيانات الطبية بحيث يكون قابل للتطوير ويتميز باللامركزية. يستخدم النظام أيضًا تقنيات Bflow للتجزئة ومنها التجزئة الرأسية لتعزيز قابلية التوسع وإدارة البيانات المخزنة. بالإضافة إلى ذلك، يستخدم النظام العقود الذكية لفرض سياسات التحكم في الوصول والتدابير الأمنية الأخرى. سنقدم وصف للنظام المقترح بالتفصيل ونقدم تحليلاً لخصائصه الأمنية والأداء. تظهر نتائجنا أن النظام يوفر حلاً آمنًا للغاية وقابل للتطوير لتخزين البيانات الطبية السرية، مع تطبيقات محتملة في مجموعة واسعة من إعدادات الرعاية الصحية.Secure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. The system uses Chaskey encryption to ensure integrity and confidentiality of medical data, blockchain technology to provide a scalable and decentralized storage solution. The system also uses Bflow segmentation and vertical segmentation technologies to enhance scalability and manage the stored data. In addition, the system uses smart contracts to enforce access control policies and other security measures. The description of the system detailing and provide an analysis of its security and performance characteristics. The resulting images were tested against a number of important metrics such as Peak Signal-to-Noise Ratio (PSNR), Mean Squared Error (MSE), bit error rate (BER), Signal-to-Noise Ratio (SNR), Normalization Correlation (NC) and Structural Similarity Index (SSIM). Our results showing that the system provides a highly secure and scalable solution for storing confidential medical data, with potential applications in a wide range of healthcare settings
A comparative study of loRaWAN, sigFox, and NB-IoT for smart water grid
Low Power Wide Area Networks (LPWAN) are
becoming the powerful communication technologies of the IoT of
tomorrow. LoRaWAN, SigFox, and NB-IoT are the three competing LPWAN technologies. On the other hand, Smart Water Grid
(SWG) is an emerging paradigm that promises to overcome issues
such as pipes leaks encountered by current water infrastructure
by deploying smart devices into the water infrastructure for
monitoring purposes. This paper firstly explores the physical
and communication features of the above LPWAN technologies
and provides a comprehensive comparison between them as well
as their suitability for the Smart Water Grid (SWG) use case.
The important aspect of SWG is to connect devices such as
smart water meters and other tiny devices like sensors installed
into the water pipelines for the system monitoring purpose. We
consider Advanced Metering Infrastructure (AMI) also called
Smart Water Metering when dealing with the water grid, which
is the main application of SWG and we study the scalability
of LoRaWAN, NB-IoT, and SigFox in such application. Under
NS3, the simulation results show that NB-IoT provides the best
scalability compared to LoRaWAN and SigFox and thus is able
to support a huge number of devices with a low packet error
rate.publishe
Energy Saving in Carrier-Grade Networks: A Survey
International audienceEnergy consumption of large-scale networks has become a primary concern in a society increasingly dependent on information technology. Novel solutions that contribute to achieving energy savings in wired networks have been proposed to mitigate ongoing and alarming climate change and global warming. A detailed survey of relevant power-saving approaches in wired networks is presented here. We give a special focus on carrier-grade networks. At first we perform a comprehensive study of communication infrastructures regarding energy saving. Then, we highlight key issues to enable green networks, ranging from network design to network operation. After that, we present the major contributors to power consumption in wireline networks. Afterwards, we survey, classify, and compare the main energy-aware methods and mechanisms that are the most appropriate for improving the energy efficiency of carrier-grade networks
A Survey on Trust Management for WBAN: Investigations and Future Directions
The rapid uptake of the Wireless Body Area Networks (WBAN) and their services poses unprecedented security requirements. WBAN are evolving to support these requirements. Fulfilling these tasks is challenging as their mobile context is increasingly complex, heterogeneous, and evolving. One potential solution to meet the WBAN security requirements is trust management that helps to reach a more secure and adaptable WBAN environment. Accordingly, this article aims to serve as a brief survey of trust management approaches within intra-WBAN and inter-WBAN. For that, we first summarize trust management concepts, discuss WBAN challenges and classify the attacks on WBAN trust management models. Subsequently, we detail and compare the existing trust based approaches in a WBAN context. We pinpoint their limitations and provide a new classification of these different approaches. We also propose a set of best practices that may help the reader to build a robust and an efficient trust management framework. We complete this survey by highlighting the open future directions and perspectives for research
Dynamic Intrusion Detection Framework for UAVCAN Protocol Using AI
International audienceIndustry 4.0 is going through a transitional period via the radically automotive transformations. In particular, unmanned aerial vehicles have significantly contributed to the development of intelligent and connected transportation systems. Thus, the continuous development using diverse technologies to achieve a variety of high-performance services raised the security concerns regarding communicating entities. Thus, being managed by networked controllers, UAVs uses controller area networks (CAN) protocol to broadcast information in a bus. However, this protocol is used as a de facto standard which does not have sufficient security features that raise the security risks. This issue caught the attention of the automotive industry researchers and several studies have attempted to improve the security of the CAN protocol attack detection. However, the proposed studies established general perspective solution and did not pay attention to UAVCAN attack detection. To alleviate these concerns, this paper proposed a dynamic intrusion detection frameworks (DIDF) for UAVCAN. The proposed UAVCAN DIDF scheme adopts an artificial intelligence (AI) based model to achieve high detection performance. We performed experiments using public UAVCAN dataset to evaluate our detection system. The experimental results demonstrate that UAVCAN DIDF has significantly reached a high detection rate with a high true positive and a low false negative rate. The simulation results are encouraging and demonstrate the effectiveness of UAVCAN DIDF