810 Hits in 4.4 sec

Data Gathering Techniques in WSN: A Cross-Layer View

Omer Gurewitz, Mark Shifrin, Efi Dvir
2022 Sensors  
Wireless sensor networks (WSNs) have taken a giant leap in scale, expanding their applicability to a large variety of technological domains and applications, ranging from the Internet of things (IoT) for  ...  This expansion is rapidly growing every passing day in terms of the variety, heterogeneity and the number of devices which such applications support.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/s22072650 pmid:35408263 pmcid:PMC9002776 fatcat:x3mwuhes7nayhfp6z7geve5yfq

Securing Public Safety Communications on Commercial and Tactical 5G Networks: A Survey and Future Research Directions

Jani Suomalainen, Jukka Julku, Mikko Vehkapera, Harri Posti
2021 IEEE Open Journal of the Communications Society  
Two solutions are trialed and described in more detail: remote attestation enhanced access control for constrained devices, and securing of satellite backhauls.  ...  We explore and survey security architecture and enablers for prioritized public safety communication in 5G networks.  ...  ACKNOWLEDGMENT The authors would like to thank the members of the cybersecurity working group of the PRIORITY project. The authors thank also Kalle Lähetkangas and Topias Uotila for helpful comments.  ... 
doi:10.1109/ojcoms.2021.3093529 fatcat:5d66gh3b2vcinddaml44oznpqe

On the Design and Implementation of Structured P2P VPNs [article]

David Isaac Wolinsky, Linton Abraham, Kyungyong Lee, Yonggang Liu, Jiangyan Xu, P. Oscar Boykin, Renato Figueiredo
2010 arXiv   pre-print
Our model also provides the first design and implementation of a P2P VPN with full tunneling support, whereby all non-P2P based Internet traffic routes through a trusted third party and does so in a way  ...  In recent years, there has been a paradigm shift towards the use of P2P in VPNs to alleviate pressure placed upon the central server by allowing participants to communicate directly with each other, relegating  ...  they come from a specific domain.  ... 
arXiv:1001.2575v1 fatcat:kgqmyd7idvfqdg3ovf32q5lwqa

Organisational Security Dependent on Individual Privacy

Vitalian Danciu
2020 SN Computer Science  
To illustrate it we develop a model of actors and data flows and discuss three scenarios in which the confidentiality achievable by an organisation is limited by the privacy of its members.  ...  Sufficient data on those members can be leveraged in a so-called abduction attack aiming to extract confidential information from the organisation.  ...  This article is part of the topical collection "Future Data and Security Engineering 2019" guest edited by Tran Khanh Dang. Acknowledgments Open Access funding provided by Projekt DEAL.  ... 
doi:10.1007/s42979-020-00206-y fatcat:yb5ig7eegvgrxcxugsdm7psgry


Dr. Anbu Karuppusamy S
2021 Zenodo  
SOME INVESTIGATIONS ON IMPROVING PERFORMANCE OF FADING CANNELS IN MANETS: D.Sc Thesis.  ...  Accordingly fading channels which are self-reliant are employed to transmit two signals initiates gain in to the system, which is attained by self-reliant interleaving I and Q channels.  ...  In QPSK based Grover searching algorithm all coordinates are interleaved self-reliant and diversity order is raised by a factor of two.  ... 
doi:10.5281/zenodo.5148816 fatcat:3p7mvkqddfa6naoaz55fnelolq

Cyber-physical systems: Milestones and research challenges

Kyung-Joon Park, Rong Zheng, Xue Liu
2012 Computer Communications  
(2010-0022076), and in part by the DGIST R&D Program of the Ministry of Education, Science and Technology of Korea (12-BD-0404).  ...  Acknowledgements This work was supported in part by the Basic Science Research Program through the National Research Foundation (NRF) of Korea funded by the Ministry of Education, Science and Technology  ...  Distributed control in a certain self-reliant power-service area is a critical means to modernize the power system to be the so-called smart grid.  ... 
doi:10.1016/j.comcom.2012.09.006 fatcat:iow2gcdzdfcy3j4fogi67dd3ni

Lessons for New Zealand lifelines organisations from the 17 January 1995 Great Hanshin earthquake

D.R. Brunsdon, N.R. Britton, R. J. Carter, R. F. Crimp, E. F. Gates, M. A. Gordon, G. J. Hughson, A. J. W. Lamb, P.D. Leslie, G. Wabnitz, A. C. Watson
1996 Bulletin of the New Zealand Society for Earthquake Engineering  
This report outlines the observations and findings with regard to lifelines and other infrastructural items from each of the various New Zealand post-earthquake visits to Kobe subsequent to the NZNSEE  ...  The preliminary assessments on lifelines aspects made in the NZNSEE reconnaissance team report are developed further. Lessons and recommendations for New Zealand are presented.  ...  The unavailability of key road and rail routes has been the single biggest hindrance to the recovery process in Kobe. • The importance of people being self-reliant for at least three days (in both home  ... 
doi:10.5459/bnzsee.29.1.1-55 fatcat:p5x44n4ncbbjdbv6ehgfxwfgf4

Table of Contents

2019 2019 2nd International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT)  
Privacy in Mobile Apps and Detecting Privacy Leaks 1253-1258 216. 505 Swati A Gavali, Vijay P.  ...  Integration of Renewable Energy sources for Self-reliant building 694-698 109. 172 Rajalakshmi Menon, Jeno Paul, Gomathy S, Rajalakshy S, Lakshmipriya K J A Modified High Gain Boost ConverterFor  ... 
doi:10.1109/icicict46008.2019.8993164 fatcat:2dqqs6g7u5bcxemzh6ivyyhavq

The Ethical Implications of Digital Contact Tracing for LGBTQIA+ Communities [article]

Izak van Zyl, Nyx McLean
2021 arXiv   pre-print
The onset of COVID-19 has led to the introduction of far-reaching digital interventions in the interest of public health.  ...  In this research paper, we explore some of the ethical implications of digital contact tracing for the LGBTQIA+ community.  ...  In what follows, we review the seminal literature in the domain of digital ethics and Big Tech in the context of the current pandemic.  ... 
arXiv:2108.10096v1 fatcat:kgnmwt6hmzblhlldem6t7slkvu

Deep Learning in Mobile and Wireless Networking: A Survey

Chaoyun Zhang, Paul Patras, Hamed Haddadi
2019 IEEE Communications Surveys and Tutorials  
Subsequently, we provide an encyclopedic review of mobile and wireless networking research based on deep learning, which we categorize by different domains.  ...  The recent success of deep learning underpins new and powerful tools that tackle problems in this space.  ...  In [508] , they design PassGAN, which learns the distribution of a set of leaked passwords.  ... 
doi:10.1109/comst.2019.2904897 fatcat:xmmrndjbsfdetpa5ef5e3v4xda

Machine learning and data analytics for the IoT [article]

Erwin Adi, Adnan Anwar, Zubair Baig, Sherali Zeadally
2020 arXiv   pre-print
The Internet of Things (IoT) applications have grown in exorbitant numbers, generating a large amount of data required for intelligent data processing.  ...  ., cloud, edge, fog) and the limitations of the IoT application layer protocols in transmitting/receiving messages become the barriers in creating intelligent IoT applications.  ...  Acknowledgements We thank the anonymous reviewers for their valuable comments which helped us improve the quality, organization and presentation of this paper.  ... 
arXiv:2007.04093v1 fatcat:no4spywa75esjel7dol3pi4etm

Deep Learning in Mobile and Wireless Networking: A Survey [article]

Chaoyun Zhang, Paul Patras, Hamed Haddadi
2019 arXiv   pre-print
Subsequently, we provide an encyclopedic review of mobile and wireless networking research based on deep learning, which we categorize by different domains.  ...  The recent success of deep learning underpins new and powerful tools that tackle problems in this space.  ...  In [505] , they design PassGAN, which learns the distribution of a set of leaked passwords.  ... 
arXiv:1803.04311v3 fatcat:awuvyviarvbr5kd5ilqndpfsde

Simulation of Laser Thermal Interaction with Titanium Dioxide /Polyvinyl Alcohol Nanocomposite Thin Films

A.M. Shehap, Dana.S. Akil
2015 International Journal of Science and Engineering Applications  
The major interest in designing this protocol is to make very few requirements of the client in terms of processing (Richardson, 2010).  ...  This research therefore incorporated a self-signed Secure Socket Layer (SSL) certificate in the android app to enable secure encrypted connections to be established between the android app and the remote  ...  CONCLUSIONS Based on the experimental result, it prooves that the website of this research can be used to give the information of routes, maps, varying types of bemo lines using any size of  ... 
doi:10.7753/ijsea0404.1001 fatcat:2fr7pbjz5ngsplez7cvthiht5e

Security Considerations for Internet of Things: A Survey

Anca Jurcut, Tiberiu Niculcea, Pasika Ranaweera, Nhien-An Le-Khac
2020 SN Computer Science  
After a review of the relevant, online literature on the topic and after looking at the market trends and developments, one can notice that there are still concerns with regard to security in IoT products  ...  However, the security of these connected Internet of things (IoT) plays a centric role with no margin for error.  ...  Further, modus operandi and detection of intrusion for network assaults like the Mirai IoT botnet, denial of service (DoS), and routing attacks were presented.  ... 
doi:10.1007/s42979-020-00201-3 fatcat:4gkafccu7vgq7olrqdxdpgm2eu

Resilient Cyberphysical Systems and their Application Drivers: A Technology Roadmap [article]

Somali Chaterji, Parinaz Naghizadeh, Muhammad Ashraful Alam, Saurabh Bagchi, Mung Chiang, David Corman, Brian Henz, Suman Jana, Na Li, Shaoshuai Mou, Meeko Oishi, Chunyi Peng (+5 others)
2019 arXiv   pre-print
Overall, the notion of resilience can be thought of in the light of three main sources of lack of resilience, as follows: exogenous factors, such as natural variations and attack scenarios; mismatch between  ...  In the paper, our focus is on design and deployment innovations that are broadly applicable across a range of CPS application areas.  ...  Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the National Science Foundation.  ... 
arXiv:2001.00090v1 fatcat:zaybw5wyfbayhcu34q2douctme
« Previous Showing results 1 — 15 out of 810 results