The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Wireless Sensor Networks present several advantages when compared to wired ones, among them, the low consumption and simplicity of installation. In some cases, energy consumption may be so low as to allow the use of energy harvesting techniques, as in the case of EnOcean protocol. In other networks, it is necessary to meet specific requirements, such as in industrial ones, where communication must...
In this paper, we review the main middleware re-quirements applied to Internet of Things and High-Performance Computing combined, here called IoT/HPC. The goal was to describe a unique set of requirements that middleware systems should attempt to guarantee the development of integrated applications. Among many core complex services, the IoT/HPC challenges are related to the support of sensing, actuating,...
A major limitation of mobile Crowd Sourcing (CS) applications is the generation of false (or spam) contributions due to selfish and malicious behaviors of users, or wrong perception of an event. Such false contributions induce loss of revenue through disbursement of undue incentives and also negatively affects the application's operational reliability. In this work, we propose a reputation model,...
For a long time, the sensitivity and criticality of data storage, processing, and transmission have hindered the wide utilization of IT and networks in the health care systems. Recently, the high availability, reachability, reliability, efficiency, usability and automation provided by the different cloud computing models paved the way to integrate the e-health systems with these cloud services to...
Cameras and other sensors are increasingly deployed for private space monitoring applications such as home monitoring, assisted/enhanced living and child monitoring. Since these cameras capture highly sensitive information and transfer it over public communication infrastructures, security and privacy is a major concern. This work presents a secure camera device along with a secure data delivery and...
We show that it is possible to achieve information theoretic location privacy for secondary users (SUs) in database-driven cognitive radio networks (CRNs) with an end-to-end delay less than a second, which is significantly better than that of the existing alternatives offering only a computational privacy. This is achieved based on a keen observation that, by the requirement of Federal Communications...
The use of Bluetooth Low Energy (BLE) recently became famous in crowd localization services. In this article we show that such service induces significant threats and we propose a scheme that achieves privacy preserving crowd localization. Crowd localization applications leverage all their users to perform periodic BLE scan and detect the nearby tracked devices. The users run a smartphone application...
eHealth is a technology that is growing in importance over time, varying from remote access to Medical Records, such as Electronic Health Records (EHR), or Electronic Medical Records (EMR), to real-time data exchange from different on-body sensors coming from different patients. With this huge amount of critical data being exchanged, problems and challenges arise. Privacy and confidentiality of this...
Distributed detection without fusion center (FC) allows each sensor node to exchange measurements with its neighbors and to reach agreement on the existence of the target using the consensus algorithm. Comparing with the centralized system, the decentralized system has better performance, in terms of robustness, scalability and invulnerability. Due to the decentralized and open properties, the security...
This paper presents a high-resolution near-field magnetic sensing system for nondestructive inspection applications of safety and security. The system includes a probe chip based on a 0.18-μm 5-metal-layer CMOS process technology and a micro-position calibration mechanism. The probe chip includes a magnetic pick-up coil followed by a 3-stage low-noise amplifier to amplify the induced voltage on the...
The recent proliferation of drones has contributed to the emergence of new threats in security applications. Because of their great agility and small size, UAS can be used for numerous missions and are very challenging to detect. Radar technology with its all-weather capability can play an important role in detecting UAS-based threats and in protecting critical assets. However, to be successful, radars...
During the development and expansion of Internet of Things (IoT), main challenges needing to be addressed are the heterogeneity, interoperability, scalability, flexibility and security of IoT applications. In this paper, we view IoT as a large-scale distributed cyber-physical-social complex network. From that perspective, the above challenges are analyzed. Then, we propose a distributed multi-agent...
The use of big data for cyber-physical systems (CPS) is gaining more importance due to the ever-increasing amount of collectable data. Due to the decreasing cost of sensors and the growth of embedded systems, which are increasingly used in the industries as well as in the private sectors, new methods are needed to evaluate and process the collected data. Therefore, in this paper we proposed a framework...
As the number of devices (things) connected to the Internet (Internet of things: IoT) is growing, achieving robust security and privacy (S&P) is becoming increasingly challenging. With the heavy use of medical things (MT), the S&P in the medical domain poses a serious issue that continues to grow. Due to the criticality and sensitivity of the data in the healthcare domain, ensuring...
In recent years, dramatic evolution of network has been introduced in the home environment that enables digital technologies to be used as the appliances in the home. These devices can be remotely accessed and controlled using existing network infrastructure, thus allowing a direct integration of computing systems with the physical world. A part of this network evolution is Internet-of-Things (IoT),...
The Smart domestic protection monitoring gadget has been designed developed, examined and validated. It makes use of the RF (radio frequency) generation to monitor the reputation and security of the electrical device. The gadget has been used to store energy. The clever home is a complex era, on the equal time it is growing, the era that used in this research are Global System for virtual cellular...
Cognitive radio network (CRN) is regarded as an emerging technology for better spectrum efficiency where unlicensed secondary users (SUs) sense RF spectrum to find idle channels and access them opportunistically without causing any harmful interference to licensed primary users (PUs). However, RF spectrum sensing and sharing along with reconfigurable capabilities of SUs bring severe security vulnerabilities...
The article presents the results of studies of the physical security system in the infrastructure facility of a region. The following results have been obtained: structural and functional decomposition of the physical security system for the regional infrastructure has been performed; engineering solutions for the implementation of the standard functions for the subsystems of the research object have...
Wireless Sensors Networks (WSNs) have been gaining significant attention in both the industries and the academia in recent years. However, WSN are vulnerable to growing security threats and attacks which are inept for the current traditional security mechanisms to cope with or mitigate such security challenges. As a solution, Software Defined Network (SDN) has emerged and been merged with WSN to form...
In the next future, IoT systems will be “ubiquitous” and “pervasive”, bringing several benefits to mankind and also many issues about interoperability, security and privacy. The intrinsic vulnerabilities of IoT devices, with limited resources and heterogeneous technologies, together with the lack of specifically designed IoT standards, represent a fertile ground for the expansion of specific cyber...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.