Secure Opportunistic Data Exchange Using Smart Devices in 5G/LTE-A Networks

Author(s):  
Sumit Kumar Tetarave ◽  
Somanath Tripathy
Keyword(s):  
Sensors ◽  
2020 ◽  
Vol 20 (14) ◽  
pp. 3928 ◽  
Author(s):  
Rateb Jabbar ◽  
Mohamed Kharbeche ◽  
Khalifa Al-Khalifa ◽  
Moez Krichen ◽  
Kamel Barkaoui

The concept of smart cities has become prominent in modern metropolises due to the emergence of embedded and connected smart devices, systems, and technologies. They have enabled the connection of every “thing” to the Internet. Therefore, in the upcoming era of the Internet of Things, the Internet of Vehicles (IoV) will play a crucial role in newly developed smart cities. The IoV has the potential to solve various traffic and road safety problems effectively in order to prevent fatal crashes. However, a particular challenge in the IoV, especially in Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) communications, is to ensure fast, secure transmission and accurate recording of the data. In order to overcome these challenges, this work is adapting Blockchain technology for real time application (RTA) to solve Vehicle-to-Everything (V2X) communications problems. Therefore, the main novelty of this paper is to develop a Blockchain-based IoT system in order to establish secure communication and create an entirely decentralized cloud computing platform. Moreover, the authors qualitatively tested the performance and resilience of the proposed system against common security attacks. Computational tests showed that the proposed solution solved the main challenges of Vehicle-to-X (V2X) communications such as security, centralization, and lack of privacy. In addition, it guaranteed an easy data exchange between different actors of intelligent transportation systems.


Loquens ◽  
2017 ◽  
Vol 4 (1) ◽  
pp. 037 ◽  
Author(s):  
Unai Martinez de Lizarduy ◽  
Pilar Calvo Salomón ◽  
Pedro Gómez Vilda ◽  
Mirian Ecay Torres ◽  
Karmele López de Ipiña

Internet of things and smart cities are becoming a reality. Nowadays, more and more devices are interconnected and in order to deal with this new situation, data processing speeds are increasing to keep the pace. Smart devices like tablets and smartphones are accessible to a wide part of society in developed countries, and Internet connections for data exchange make it possible to handle large volumes of information in less time. This new reality has opened up the possibility of developing client-server architectures focused on clinical diagnosis in real time and at a very low cost. This paper illustrates the design and implementation of the ALZUMERIC system that is oriented to the diagnosis of Alzheimer’s disease (AD). It is a platform where the medical specialist can gather voice samples through non-invasive methods from patients with and without mild cognitive impairment (MCI), and the system automatically parameterizes the input signal to make a diagnose proposal. Although this type of impairment produces a cognitive loss, it is not severe enough to interfere with daily life. The present approach is based on the description of speech pathologies with regard to the following profiles: phonation, articulation, speech quality, analysis of the emotional response, language perception, and complex dynamics of the system. Privacy, confidentiality and information security have also been taken into consideration, as well as possible threats that the system could suffer, so this first prototype of services offered by ALZUMERIC has been targeted to a predetermined number of medical specialists.


Author(s):  
Hamid Jahankhani ◽  
Stefan Kendzierskyj ◽  
Ionuț Octavian Popescu

Over recent years, technology has rapidly advanced and is accelerating the emergence to Industry 4.0, particularly due to the connectivity abundance, volume increase of smart devices, and a growing interconnectivity between humans and technology. Within the last two years, 90% of the data in the world today was generated and in the next few years the volume of IoT interactions is said to reach approximately 4800 per day, which equates to a human interaction every 18 seconds. This correlates well with research undertaken regarding how consumers are exchanging information through smart devices and behavioural changes due to the technology adoption. The Generation Y and Z demand for smart devices, consumer behaviour online, and almost immediate data experiences is seeing fast consumption and data exchange without any preconceived concerns of trust, privacy, security, data profiling, or how data is used without their knowledge by third parties. This chapter will also analyse technology innovations to better protect identity data and processing of data through blockchain technology.


2019 ◽  
Vol 24 (5) ◽  
pp. 655-668 ◽  
Author(s):  
Adib Mehrabi ◽  
Antonella Mazzoni ◽  
Daniel Jones ◽  
Anthony Steed

AbstractUsers of smart devices frequently need to exchange data with people nearby to them. Yet despite the availability of various communication methods, data exchange between co-located devices is often complicated by technical and user experience barriers. A potential solution to these issues is the emerging technology of device-to-device acoustic data transmission. In this work, we investigate the medium-specific properties of sound as a data exchange mechanism, and question how these contribute to the user experience of sharing data. We present a user study comparing three wireless communication technologies (acoustic data transmission, QR codes and Bluetooth), when used for a common and familiar scenario: peer-to-peer sharing of contact information. Overall, the results show that acoustic data transmission provides a rapid means of transferring data (mean transaction time of 2.4 s), in contrast to Bluetooth (8.3 s) and QR (6.3 s), whilst requiring minimal physical effort and user coordination. All QR code transactions were successful on the first attempt; however, some acoustic (5.6%) and Bluetooth (16.7%) transactions required multiple attempts to successfully share a contact. Participants also provided feedback on their user experience via surveys and semi-structured interviews. Perceived transaction time, physical effort, and connectivity issues. Specifically, users expressed frustration with Bluetooth due to device selection issues, and with QR for the physical coordination required to scan codes. The findings indicate that acoustic data transmission has unique advantages in facilitating information sharing and interaction between co-located users.


Sensors ◽  
2019 ◽  
Vol 19 (21) ◽  
pp. 4807 ◽  
Author(s):  
Rabeea Basir ◽  
Saad Qaisar ◽  
Mudassar Ali ◽  
Monther Aldwairi ◽  
Muhammad Ikram Ashraf ◽  
...  

Industry is going through a transformation phase, enabling automation and data exchange in manufacturing technologies and processes, and this transformation is called Industry 4.0. Industrial Internet-of-Things (IIoT) applications require real-time processing, near-by storage, ultra-low latency, reliability and high data rate, all of which can be satisfied by fog computing architecture. With smart devices expected to grow exponentially, the need for an optimized fog computing architecture and protocols is crucial. Therein, efficient, intelligent and decentralized solutions are required to ensure real-time connectivity, reliability and green communication. In this paper, we provide a comprehensive review of methods and techniques in fog computing. Our focus is on fog infrastructure and protocols in the context of IIoT applications. This article has two main research areas: In the first half, we discuss the history of industrial revolution, application areas of IIoT followed by key enabling technologies that act as building blocks for industrial transformation. In the second half, we focus on fog computing, providing solutions to critical challenges and as an enabler for IIoT application domains. Finally, open research challenges are discussed to enlighten fog computing aspects in different fields and technologies.


2021 ◽  
Vol 5 (2) ◽  
pp. 13-19
Author(s):  
Khalid F. Jasim ◽  
Reem J. Ismail ◽  
Abdullah A. Nahi Al-Rabeeah ◽  
Soma Solaimanzadeh

In the past years, the Internet of Things (IoT) used in different applications and very wide range of fields (e.g. cloud services, smart environments, logistics, social and personal domains, and healthcare services). The IoT included a variety of components and devices such as RFID devices, wireless sensors, actuators, and wireless networks. Also, the IoT with smart devices adopted in various companies, organizations and public services systems. For instance, some devices like Notebooks and smartphones have been used to perform different management activities and duties. These smart devices relied on data exchange and data storage resources in clouds computing services. In this context, the saved data and exchanged data required protection against hacking operations, transferred with more secure communications channels, and safe storage environment in the clouds and local storage systems. In this paper, we proposed some encryption algorithms to tackle the issue of data confidentiality in the IoT applications. This research provided analysis and investigation of these encryption algorithms in light of components of the designs, versions of these algorithms, encryption keys, block size, round functions and the techniques used in the designs.


Author(s):  
Skylar Knickerbocker ◽  
Varsha Ravichandra-Mouli ◽  
Archana Venkatachalapathy

Connected temporary traffic control devices (cTTCDs) that provide their location and status are a new tool that infrastructure owners and operators can begin to use to improve the accuracy of work zone data. By improving work zone data, better information can be provided to the public. Publishing these data through the WZDx (Work Zone Data Exchange) aims to improve safety by notifying drivers and vehicles of the location of verified work zones. Connected devices such as smart arrow boards and connected cones have continued to increase in number in the market, but little has been done to determine the best method of integrating these devices into a department of transportation’s (DOT’s) system. An approach is presented that integrates deployed smart arrow boards to indicate actual conditions as part of a planned work zone by leveraging a DOT’s linear referencing system. This method does not require any additional effort from field staff and improves the locational and temporal accuracy of work zone information as part of a WZDx. When fully deployed, this system showed that smart arrow boards could be automatically associated with a work zone in controlled test scenarios as well as in a limited sample under real-world conditions. In real-world conditions, contractors did not need to provide additional information to associate the smart arrow board with the 511 work zone event. This effort represents a starting point for how cTTCDs could be integrated into DOT systems to improve work zone data accuracy.


Sensors ◽  
2018 ◽  
Vol 18 (8) ◽  
pp. 2517
Author(s):  
Mariusz Kamola

Domain Name Service (DNS) and its certification related resource records are appealing alternative to the standard X.509 certification framework, in provision of identities for Internet of Things (IoT) smart devices. We propose to also use DNS to store device owner identification data in device certificates. A working demonstration software has been developed as proof of this concept, which uses an external identity provider run by national authorities. As a result, smart devices are equipped with certificates that safely identify both the device and its owner. Hardware requirements make such a framework applicable to constrained devices. It stimulates mutual trust in machine-to-machine and man-to-machine communication, and creation of a friendlier environment for sale, lease, and data exchange. Further extensions of the proposed architecture are also discussed.


Author(s):  
Kalaivani S ◽  
Shalini Dhiman ◽  
Rajagopal T.K.P.

Internet of Things (IoT) can be seen as a pervasive network of networks: numerous heterogeneous entities both physical and virtual interconnected with any other entity or entities through unique addressing schemes, interacting with each other to provide/request all kinds of services. Given the enormous number of connected devices that are potentially vulnerable, highly significant risks emerge around the issues of security, privacy, and governance; calling into question the whole future of IoT. During the data exchange, it is mandatory to secure the messages between sender and receiver to handle the malicious human based attacks. The main problem during Fingerprint based approaches is the computational overhead due to large real numbers required for Fingerprint and verification processes. This paper presents a light weight Shortened Complex Digital Fingerprint Algorithm (SCDSA) for providing secure communication between smart devices in human centered IoT. We have used less extensive operations to achieve Fingerprint and verification processes like human beings do Fingerprints on legal documents and verify later as per witness. It enhances the security strength to guard against traffic analysis attacks.


2021 ◽  
Author(s):  
◽  
Arnis Ancāns

Global development trends such as the increase in the number of cars, an increased number of smart devices with wireless network connections, and the rapid increase in the amount of transmitted information promote the demand for higher data exchange speed, mobility, and higher level of connectivity. Consequently, data transmission services are also required when users travel by vehicle. As the number of vehicles increases, the problems related to road safety and traffic flow management need to be addressed as well. These problems underline the need for modern, technically, and economically justified communication solutions for Intelligent Transport Systems (ITS). One of the wireless network technologies that can be used for ITS needs, in particular for providing car passengers with access to the data transmission network, is WLAN IEEE 802.11n/ac. The implementation of such WLAN-based automotive wireless access networks requires several issues to be addressed, mainly related to fast-moving objects. In practice, a two-rank wireless network is used, which can provide access to the Internet. Several testbeds of a two-rank road transport communication network using WLAN IEEE 802.11n and LTE technologies were created and studied in the developed Doctoral Thesis. The change in the traffic characteristics of a two-rank communication network was experimentally assessed using LTE hardware from various manufacturers. The performance of such hybrid communication channels was studied depending on the velocity of mobile customers, the number of customers, and the traffic scenarios used. New relationships characterising the performance of the integrated IEEE 802.11n and LTE road transport networks and describing the dependence of network throughput on the velocity of mobile client movement were obtained. A single-rank IEEE 802.11ac technology-based automotive communications testbed has also been developed and studied within the Doctoral Thesis. An improved handover algorithm based on the IEEE 802.11v protocol has been developed and implemented during the research. The relationships describing the performance of such single-rank automotive communication network were theoretically evaluated.


Sign in / Sign up

Export Citation Format

Share Document