2020 ◽  
Author(s):  
Tanweer Alam ◽  
Mohamed Benaida

Building the innovative blockchain-based architecture across the Internet of Things (IoT) platform for the education system could be an enticing mechanism to boost communication efficiency within the 5 G network. Wireless networking would have been the main research area allowing people to communicate without using the wires. It was established at the start of the Internet by retrieving the web pages to connect from one computer to another computer Moreover, high-speed, intelligent, powerful networks with numerous contemporary technologies, such as low power consumption, and so on, appear to be available in today's world to connect among each other. The extension of fog features on physical things under IoT is allowed in this situation. One of the complex tasks throughout the area of mobile communications would be to design a new virtualization framework based on blockchain across the Internet of Things architecture. The goal of this research is to connect a new study for an educational system that contains Blockchain to the internet of things or keeping things cryptographically secure on the internet. This research combines with its improved blockchain and IoT to create an efficient interaction system between students, teachers, employers, developers, facilitators and accreditors on the Internet. This specified framework is detailed research's great estimation.


Author(s):  
Sree Naga Raja Sekhar Mallela

Abstract: The most common buzzwords in the world is “The Internet of things” (IoT) and IOT describes the network of physical objects, so known as, "things" those are rooted with sensors in the devices, application software, technologies that is used for the resolution of connecting one end to another end and exchanging information with other devices and systems over the Internet. The IoT 5G technologies can also be used in journalism and the primary focus is to increase M2M interaction of mass communication devices. One way it is “ubiquitous computing” can occur using any device, in any location, and in any format. The Internet of Things (IoT) is all about small cost sensors grabbing data to communicate with one device to another device using cloud solutions. Coming to the 5th generation mobile network. We have already started using 4G networks and as we know that, start with 1G, 2G, 3G, and 4G networks. The 5th generation network is going to enable an upcoming new network that will associate virtually every person globally connected and everything organized including IoT devices, objects and machines. Central communication and Journalism is the activity of gathering right information, evaluating, generating, and presenting broadcast information. It is high time to start using IOT Technology using 5th generation high-speed network connectivity devices to communicate or data transfer in the area of journalism. Keywords: IOT – Internet Of Things, 5G- Fifth Generation in data network, JMC – Journalism and Mass Communications, M2M – Machine to Machine, Cloud , Artificial intelligence and Machine Learning.


Sensors ◽  
2020 ◽  
Vol 20 (9) ◽  
pp. 2612 ◽  
Author(s):  
Jacopo Iannacci ◽  
Giuseppe Resta ◽  
Alvise Bagolini ◽  
Flavio Giacomozzi ◽  
Elena Bochkova ◽  
...  

RF-MEMS, i.e., Micro-Electro-Mechanical Systems (MEMS) for Radio Frequency (RF) passive components, exhibit interesting characteristics for the upcoming 5G and Internet of Things (IoT) scenarios, in which reconfigurable broadband and frequency-agile devices, like high-order switching units, tunable filters, multi-state attenuators, and phase shifters will be necessary to enable mm-Wave services, small cells, and advanced beamforming. In particular, satellite communication systems providing high-speed Internet connectivity utilize the K and Ka bands, which offer larger bandwidth compared to lower frequencies. This paper focuses on two design concepts of multi-state phase shifter designed and manufactured in RF-MEMS technology. The networks feature 4 switchable stages (16 states) and are developed for the K and Ka bands. The proposed phase shifters are realized in a surface micromachining RF-MEMS technology and the experimentally measured parameters are compared with Finite Element Method (FEM) multi-physical electromechanical and RF simulations. The simulated phase shifts at both the operating bands fit well the measured value, despite the measured losses (S21) are larger than 5–7 dB if compared to simulations. However, such a non-ideality has a technological motivation that is explained in the paper and that will be fixed in the manufacturing of future devices.


Sensors ◽  
2020 ◽  
Vol 20 (14) ◽  
pp. 3945
Author(s):  
Muhammad Sohail ◽  
Rashid Ali ◽  
Muhammad Kashif ◽  
Sher Ali ◽  
Sumet Mehta ◽  
...  

The Internet of Things (IoT) is a world of connected networks and modern technology devices, among them vehicular networks considered more challenging due to high speed and network dynamics. Future trends in IoT allow these inter networks to share information. Also, the previous security solutions to vehicular IoT (VIoT) much emphasize on privacy protection and security related issues using public keys infrastructure. However, the primary concern about efficient trust assessment, authorized users malfunctioning, and secure information dissemination in vehicular wireless networks have not been explored. To cope with these challenges, we propose a trust enhanced on-demand routing (TER) scheme, which adopts TrustWalker (TW) algorithm for efficient trust assessment and route search technique in VIoT. TER comprised of novel three-valued subjective logic (3VSL), TW algorithm, and ad hoc on-demand distance vector (AODV) routing protocol. The simulated results validate the accuracy of the proposed scheme in term of throughput, packet drop ratio (PDR), and end to end (E2E) delay. In the simulation, the execution time of the TW algorithm is analyzed and compared with another route search algorithm, i.e., Assess-Trust (AT), by considering real-world online datasets such as Pretty Good Privacy and Advogato. The accuracy and efficiency of the TW algorithm, even with a large number of vehicle users, are also demonstrated through simulations.


Symmetry ◽  
2018 ◽  
Vol 10 (8) ◽  
pp. 353 ◽  
Author(s):  
Tran Phuc ◽  
Changhoon Lee

BM123-64 block cipher, which was proposed by Minh, N.H. and Bac, D.T. in 2014, was designed for high speed communication applications factors. It was constructed in hybrid controlled substitution–permutation network (CSPN) models with two types of basic controlled elements (CE) in distinctive designs. This cipher is based on switchable data-dependent operations (SDDO) and covers dependent-operations suitable for efficient primitive approaches for cipher constructions that can generate key schedule in a simple way. The BM123-64 cipher has advantages including high applicability, flexibility, and portability with different algorithm selection for various application targets with internet of things (IoT) as well as secure protection against common types of attacks, for instance, differential attacks and linear attacks. However, in this paper, we propose methods to possibly exploit the BM123-64 structure using related-key attacks. We have constructed a high probability related-key differential characteristics (DCs) on a full eight rounds of BM123-64 cipher. The related-key amplified boomerang attack is then proposed on all three different cases of operation-specific designs with effective results in complexity of data and time consumptions. This study can be considered as the first cryptographic results on BM123-64 cipher.


2019 ◽  
Vol 26 (4) ◽  
pp. 2403-2412 ◽  
Author(s):  
Vigneswaran Dhasarathan ◽  
Mehtab Singh ◽  
Jyoteesh Malhotra

2014 ◽  
Vol 687-691 ◽  
pp. 2280-2283
Author(s):  
Yi Fei Zhang ◽  
Yu Huan Ji

The development of internet of things in recent years is firstly introduced in this paper, it points out that the internet of things has been used extensively in multi-domain not only because height attention in many countries, but also because of the high-speed development of technology. After that, the emphasis of this paper is to expound and analyze the actual applications of internet of things in several specific areas of social production and life nowadays. Finally, this paper points out the strengths of internet of things development in china, and looks forward to the development trend of internet of things and the life vision in the future.


2018 ◽  
Vol 7 (2.24) ◽  
pp. 47
Author(s):  
Anish Pillai ◽  
M S. Vasanthi ◽  
Ruturaj Kadikar ◽  
B Amutha

The arrival of affordable high speed internet and superior computing processors has given the ability to access a novel environment of opportunities and challenges at an individuals fingertips. Sectors of education, administration, business, medical and corporate have been revolutionised by this latest onset of technology. With the arrival of IoT (Internet of Things), the number of devices that are connected to the internet will be higher than ever before. Along with this increase, the diversity of threats propagating on the internet will see a comparable increase. These threats are designed in a way to alter the integrity of the data, embed itself into other programs for further propagation and also to gain monetary compensation. In recent times, the popular malware which has made headlines worldwide is ransomware. This type of malware infection uses complex encryption of user specific files and demands a ransom for retrieval of these files. Modern ransomware behaviour indicates propagation of the malware from the host victim to other computers and shared drives within its network. This paper contains in- detailed analysis of ransomware and the currents trends of this malware. The time taken for CryptoWall ransomware encryption using AES- CBC is observed for various data sizes and a SDN approach for ransomware threat mitigation is discussed. 


Sensors ◽  
2021 ◽  
Vol 21 (21) ◽  
pp. 7276
Author(s):  
Pedro Juan Roig ◽  
Salvador Alcaraz ◽  
Katja Gilly ◽  
Cristina Bernad ◽  
Carlos Juiz

Edge computing applications leverage advances in edge computing along with the latest trends of convolutional neural networks in order to achieve ultra-low latency, high-speed processing, low-power consumptions scenarios, which are necessary for deploying real-time Internet of Things deployments efficiently. As the importance of such scenarios is growing by the day, we propose to undertake two different kind of models, such as an algebraic models, with a process algebra called ACP and a coding model with a modeling language called Promela. Both approaches have been used to build models considering an edge infrastructure with a cloud backup, which has been further extended with the addition of extra fog nodes, and after having applied the proper verification techniques, they have all been duly verified. Specifically, a generic edge computing design has been specified in an algebraic manner with ACP, being followed by its corresponding algebraic verification, whereas it has also been specified by means of Promela code, which has been verified by means of the model checker Spin.


Sign in / Sign up

Export Citation Format

Share Document