220 research outputs found

    Blockchain based digital forensics investigation framework in the internet of things and social systems

    Get PDF
    The decentralised nature of blockchain technologies can well match the needs of integrity and provenances of evidences collecting in digital forensics across jurisdictional borders. In this work, a novel blockchain based digital forensics investigation framework in the Internet of Things (IoT) and social systems environment is proposed, which can provide proof of existence and privacy preservation for evidence items examination. To implement such features, we present a block enabled forensics framework for IoT, namely IoT forensic chain (IoTFC), which can offer forensic investigation with good authenticity, immutability, traceability, resilience, and distributed trust between evidential entitles as well as examiners. The IoTFC can deliver a gurantee of traceability and track provenance of evidence items. Details of evidence identification, preservation, analysis, and presentation will be recorded in chains of block. The IoTFC can increase trust of both evidence items and examiners by providing transparency of the audit train. The use case demonstrated the effectiveness of proposed method

    Performance analysis of a threshold-based dynamic TXOP scheme for intra-AC QoS in wireless LANs

    Get PDF
    PublishedJournal ArticleThis is the author accepted manuscript. The final version is available from Elsevier via the DOI in this record.The IEEE 802.11e Enhanced Distributed Channel Access (EDCA) protocol has been proposed for provisioning of differentiated Quality-of-Service (QoS) between various Access Categories (ACs), i.e., inter-AC QoS, in Wireless Local Area Networks (WLANs). However, the EDCA lacks the support of the intra-AC QoS provisioning, which is indispensable in practical WLANs since the network loads are always asymmetric between traffic flows of ACs with the same priority. To address the intra-AC QoS issue, this paper proposes a Threshold-Based Dynamic Transmission Opportunity (TBD-TXOP) scheme which sets the TXOP limits adaptive to the current status of the transmission queue based on the pre-setting threshold. An analytical model is further developed to evaluate the QoS performance of this scheme in terms of throughput, end-to-end delay, and frame loss probability. NS-2 simulation experiments validate the accuracy of the proposed analytical model. The performance results demonstrate the efficacy of TBD-TXOP for the intra-AC QoS differentiation. © 2013 Elsevier B.V. All rights reserved

    Launching an efficient participatory sensing campaign: A smart mobile device-based approach

    Get PDF
    PublishedJournal Article© 2015 ACM. Participatory sensing is a promising sensing paradigm that enables collection, processing, dissemination and analysis of the phenomena of interest by ordinary citizens through their handheld sensing devices. Participatory sensing has huge potential in many applications, such as smart transportation and air quality monitoring. However, participants may submit low-quality, misleading, inaccurate, or even malicious data if a participatory sensing campaign is not launched effectively. Therefore, it has become a significant issue to establish an efficient participatory sensing campaign for improving the data quality. This article proposes a novel five-tier framework of participatory sensing and addresses several technical challenges in this proposed framework including: (1) optimized deployment of data collection points (DC-points); and (2) efficient recruitment strategy of participants. Toward this end, the deployment of DC-points is formulated as an optimization problem with maximum utilization of sensor and then a Wise-Dynamic DC-points Deployment (WD3) algorithm is designed for high-quality sensing. Furthermore, to guarantee the reliable sensing data collection and communication, a trajectory-based strategy for participant recruitment is proposed to enable campaign organizers to identify well-suited participants for data sensing based on a joint consideration of temporal availability, trust, and energy. Extensive experiments and performance analysis of the proposed framework and associated algorithms are conducted. The results demonstrate that the proposed algorithm can achieve a good sensing coverage with a smaller number of DC-points, and the participants that are termed as social sensors are easily selected, to evaluate the feasibility and extensibility of the proposed recruitment strategies

    Highly-Efficient Bulk Data Transfer for Structured Dissemination in Wireless Embedded Network Systems

    Get PDF
    Recent years have witnessed the remarkable development of wireless embedded network systems (WENS) such as cyber-physical systems and sensor networks. Reliable bulk data dissemination is an important building module in WENS, supporting various applications, e.g., remote software update, video distribution. The existing studies often construct network structures to enable time-slotted multi hop pipelining for data dissemination. However, the adopted transmission mechanism was originally designed for structureless protocols, and thus posing significant challenges on efficient structured data dissemination. In this paper, we investigate the problem of structured bulk data dissemination. Specifically, we propose reliable out-of-order transmission and bursty encoding mechanisms to transmit packets as many as possible in each transmission slot. As a consequence, the resulting transmission protocol (ULTRA) can fully utilize each transmission slot and propagate data in the network as fast as possible. The performance results obtained from both testbed and simulation experiments demonstrate that, compared to the state-of-the-art protocols, ULTRA can greatly enhance the dissemination performance by reducing the dissemination delay by 34.8%

    A trajectory-based recruitment strategy of social sensors for participatory sensing

    Get PDF
    Participatory sensing, a promising sensing paradigm, enables people to collect and share sensor data on phenomena of interest using mobile devices across many applications, such as smart transportation and air quality monitoring. This article presents a framework of participatory sensing and then focuses on a key technical challenge: developing a trajectory-based recruitment strategy of social sensors in order to enable service providers to identify well suited participants for data sensing based on temporal availability, trust, and energy. To devise a basic recruitment strategy, the Dynamic Tensor Analysis algorithm is initially adopted to learn the time-series tensor of trajectory so that the users' trajectory can be predicted. To guarantee reliable sensing data collection and communication, the trust and energy factors are taken into account jointly in our multi-objective recruitment strategy. In particular, friend-like social sensors are also defined to deal with an emergency during participatory sensing. An illustrative example and experiment are conducted on a university campus to evaluate and demonstrate the feasibility and extensibility of the proposed recruitment strategy

    An intelligent information forwarder for healthcare big data systems with distributed wearable sensors

    Get PDF
    © 2016 IEEE. An increasing number of the elderly population wish to live an independent lifestyle, rather than rely on intrusive care programmes. A big data solution is presented using wearable sensors capable of carrying out continuous monitoring of the elderly, alerting the relevant caregivers when necessary and forwarding pertinent information to a big data system for analysis. A challenge for such a solution is the development of context-awareness through the multidimensional, dynamic and nonlinear sensor readings that have a weak correlation with observable human behaviours and health conditions. To address this challenge, a wearable sensor system with an intelligent data forwarder is discussed in this paper. The forwarder adopts a Hidden Markov Model for human behaviour recognition. Locality sensitive hashing is proposed as an efficient mechanism to learn sensor patterns. A prototype solution is implemented to monitor health conditions of dispersed users. It is shown that the intelligent forwarders can provide the remote sensors with context-awareness. They transmit only important information to the big data server for analytics when certain behaviours happen and avoid overwhelming communication and data storage. The system functions unobtrusively, whilst giving the users peace of mind in the knowledge that their safety is being monitored and analysed

    Performance Enhancement of Multipath TCP for Wireless Communications with Multiple Radio Interfaces

    Get PDF
    ArticleMultipath TCP (MPTCP) allows a TCP connection to operate across multiple paths simultaneously and becomes highly attractive to support the emerging mobile devices with various radio interfaces and to improve resource utilization as well as connection robustness. The existing multipath congestion control algorithms, however, are mainly loss-based and prefer the paths with lower drop rates, leading to severe performance degradation in wireless communication systems where random packet losses occur frequently. To address this challenge, this paper proposes a new mVeno algorithm, which makes full use of the congestion information of all the subflows belonging to a TCP connection in order to adaptively adjust the transmission rate of each subflow. Specifically, mVeno modifies the additive increase phase of Veno so as to effectively couple all subflows by dynamically varying the congestion window increment based on the receiving ACKs. The weighted parameter of each subflow for tuning the congestio

    MobiFuzzyTrust: An efficient fuzzy trust inference mechanism in mobile social networks

    Get PDF
    PublishedJournal Article© 2014 IEEE. Mobile social networks (MSNs) facilitate connections between mobile users and allow them to find other potential users who have similar interests through mobile devices, communicate with them, and benefit from their information. As MSNs are distributed public virtual social spaces, the available information may not be trustworthy to all. Therefore, mobile users are often at risk since they may not have any prior knowledge about others who are socially connected. To address this problem, trust inference plays a critical role for establishing social links between mobile users in MSNs. Taking into account the nonsemantical representation of trust between users of the existing trust models in social networks, this paper proposes a new fuzzy inference mechanism, namely MobiFuzzyTrust, for inferring trust semantically from one mobile user to another that may not be directly connected in the trust graph of MSNs. First, a mobile context including an intersection of prestige of users, location, time, and social context is constructed. Second, a mobile context aware trust model is devised to evaluate the trust value between two mobile users efficiently. Finally, the fuzzy linguistic technique is used to express the trust between two mobile users and enhance the human's understanding of trust. Real-world mobile dataset is adopted to evaluate the performance of the MobiFuzzyTrust inference mechanism. The experimental results demonstrate that MobiFuzzyTrust can efficiently infer trust with a high precision.This work was partly supported by the National Nature Science Foundation of China under grant 61201219 and the EU FP7 CLIMBER project under Grant Agreement No. PIRSES-GA-2012-318939
    corecore