scholarly journals DC-LTM: A Data Collection Strategy Based on Layered Trust Mechanism for IoT

2021 ◽  
Vol 2021 ◽  
pp. 1-20
Author(s):  
An He ◽  
Guangwei Wu ◽  
Jinhuan Zhang

A large number of Internet of Things (IoT) devices such as sensor nodes are deployed in various urban infrastructures to monitor surrounding information. However, it is still a challenging issue to collect data in a low-cost, high-quality, and reliable manner through IoT technique. Although the recruitment of mobile vehicles (MVs) to collect urban data has proved to be an effective method, most existing data collection systems lack a trust detection mechanism for malicious terminal nodes and malicious vehicles, which should lead to security vulnerabilities in practice. This paper proposes a novel data collection strategy based on a layered trust mechanism (DC-LTM). The strategy recruits MVs as data collectors of the sensor nodes based on the data value in the city, evaluates the trustworthiness of the data reported by the nodes, and records the results to the cloud data center. Furthermore, in order to make the data collection system more efficient and trust mechanism more reliable, we introduce unmanned aerial vehicles (UAVs) dispatched by data centers to actively verify the core sensor node data and use the core sensor data as baseline data to evaluate the credibility of the vehicles and the trust value of the whole network sensor nodes. Different from the previous strategies, UAVs adopts the DC-LTM method to obtain the node data while actively obtaining the trust value of MVs and nodes, which effectively improves the quality of data acquisition. Simulation results show that the mechanism effectively distinguishes malicious vehicles that provide false data in exchange for payment and reduces the total cost of system recruitment payments. At the same time, the proposed incentive mechanism encourages vehicle to complete the evaluation task and improves the accuracy of node trust evaluation. The recognition rates of false data attacks and flooding attacks as well as the recognition error rate of normal nodes are 100%, 98.9%, and 3.9%, respectively, which improves the quality of system data collection as a whole.

Author(s):  
Giovani Rimon Abuaitah ◽  
Bin Wang

Sensor network deployments have enabled automated data collection at a finer granularity compared to human-centric sparse deployments of traditional telemetric data loggers. However, this fine granularity cannot be achieved in the presence of failing nodes, frequent network failures, and/or potentially malicious network behaviors. Moreover, given a perfect and secure network with long-lived sensor nodes, the collected sensor data should be fault-free to guarantee quality of reasoning. Unlike traditional devices, wireless sensor motes are resource-constrained battery-powered devices equipped with few on-board sensors which are susceptible to failures, and batteries cannot always be reliably recharged. Over the years, sensor network deployments have materialized a large number of monitoring and event-detection applications. Researchers and decision makers have observed several anomalous patterns ranging from functional failures to pervasive sensing faults in most of these deployments. In this chapter, we discuss a few of these deployments to emphasize the need for an anomaly detection mechanism.


IUCrJ ◽  
2017 ◽  
Vol 4 (5) ◽  
pp. 529-539 ◽  
Author(s):  
Masaki Yamamoto ◽  
Kunio Hirata ◽  
Keitaro Yamashita ◽  
Kazuya Hasegawa ◽  
Go Ueno ◽  
...  

The progress in X-ray microbeam applications using synchrotron radiation is beneficial to structure determination from macromolecular microcrystals such as smallin mesocrystals. However, the high intensity of microbeams causes severe radiation damage, which worsens both the statistical quality of diffraction data and their resolution, and in the worst cases results in the failure of structure determination. Even in the event of successful structure determination, site-specific damage can lead to the misinterpretation of structural features. In order to overcome this issue, technological developments in sample handling and delivery, data-collection strategy and data processing have been made. For a few crystals with dimensions of the order of 10 µm, an elegant two-step scanning strategy works well. For smaller samples, the development of a novel method to analyze multiple isomorphous microcrystals was motivated by the success of serial femtosecond crystallography with X-ray free-electron lasers. This method overcame the radiation-dose limit in diffraction data collection by using a sufficient number of crystals. Here, important technologies and the future prospects for microcrystallography are discussed.


2017 ◽  
Vol 7 (1.1) ◽  
pp. 426
Author(s):  
V Jayaraj ◽  
S Alonshia

Although data collection has received much attention by effectively minimizing delay, computational complexity and increasing the total data transmitted, the transience of sensor nodes for multiple data collection of sensed node in wireless sensor network (WSN) renders quality of service a great challenge. To circumvent transience of sensor nodes for multiple data collection, Quality based Drip-Drag-Match Data Collection (QDDM-DC) scheme have been proposed. In Drip-Drag-Match data collection scheme, initially dripping of data is done on the sink by applying Equidistant-based Optimum Communication Path from the sensor nodes which reduces the data loss. Next the drag operation pulls out the required sensed data using Neighbourhood-based model from multiple locations to reduce the delay for storage. Finally, the matching operation, compares the sensed data received by the dragging operation to that of the corresponding sender sensor node (drip stage) and stores the sensed data accurately which in turn improves the throughput and quality of data collection. Simulation is carried for the QDDM-DC scheme with multiple scenarios (size of data, number of sinks, storage capacity) in WSN with both random and deterministic models. Simulation results show that QDDM-DC provides better performance than other data collection schemes, especially with high throughput, ensuring minimum delay and data loss for effective multiple data collection of sensed data in WSN.


2020 ◽  
Vol 13 (39) ◽  
pp. 4092-4108
Author(s):  
M Rajasekaran

Objectives: To propose a suitable algorithm for improving the network lifetime of Wireless Sensor Networks (WSNs). Methods/Findings: We proposed a suitable Location and Energy Aware Trusted Distance Source Routing (LEATDSR) algorithm. Here, the energy consumption, location and the data quality are equalized by the Quality of Service (QoS) based routing algorithms. In addition to this algorithm, an existing clustering algorithm is also incorporates for grouping the sensor nodes based on the trust, location, energy and distance. In this LEATDSR is capable of deciding the evaluation metrics which express the QoS. Moreover, a new trust mechanism is also introduced in this model that incorporates multi-attributes of various sensor nodes in terms of communication, data, energy, and recommendation. This new trust mechanism relies on an enhanced sliding window time by considering the occurrences of attack frequency for facilitating the discovery of anomalous behaviours of attackers. The enhanced energy utilization is established within the sensor nodes for performing the active data transmission. The performance of the proposed model is evaluated by conducting various experiments in a simulation environment which creates by using NS2. From the experiments conducted in this work, the average packet transfer rate is increased drastically when compared to existing models available in the literature.


2015 ◽  
Vol 12 (1) ◽  
pp. 63-89 ◽  
Author(s):  
Mirjana Maksimovic ◽  
Vladimir Vujovic ◽  
Branko Perisic ◽  
Vladimir Milosevic

The recent proliferation of global networking has an enormous impact on the cooperation of smart elements, of arbitrary kind and purpose that can be located anywhere and interact with each other according to the predefined protocol. Furthermore, these elements have to be intelligently orchestrated in order to support distributed sensing and/or monitoring/control of real world phenomena. That is why the Internet of Things (IoT) concept raises like a new, promising paradigm for Future Internet development. Considering that Wireless Sensor Networks (WSNs) are envisioned as integral part of arbitrary IoTs, and the potentially huge number of cooperating IoTs that are usually used in the real world phenomena monitoring and management, the reliability of individual sensor nodes and the overall network performance monitoring and improvement are definitely challenging issues. One of the most interesting real world phenomena that can be monitored by WSN is indoor or outdoor fire. The incorporation of soft computing technologies, like fuzzy logic, in sensor nodes has to be investigated in order to gain the manageable network performance monitoring/control and the maximal extension of components life cycle. Many aspects, such as routes, channel access, locating, energy efficiency, coverage, network capacity, data aggregation and Quality of Services (QoS) have been explored extensively. In this article two fuzzy logic approaches, with temporal characteristics, are proposed for monitoring and determining confidence of fire in order to optimize and reduce the number of rules that have to be checked to make the correct decisions. We assume that this reduction may lower sensor activities without relevant impact on quality of operation and extend battery life directly contributing the efficiency, robustness and cost effectiveness of sensing network. In order to get a real time verification of proposed approaches a prototype sensor web node, based on Representational State Transfer (RESTful) services, is created as an infrastructure that supports fast critical event signaling and remote access to sensor data via the Internet.


2019 ◽  
Vol 1 (6) ◽  
pp. 658-661
Author(s):  
Arun prakash S ◽  
Gokul Divya M ◽  
Bharath kumar N.R ◽  
Poomani K

In today’s world, Internet of Things (IoT) and Remote Sensing (RS) techniques are vastly implemented in various sectors of research for analysis and monitoring of data from remote locations. As a result of the tremendous increase in global industrialisation and its output, rural to urban drift and the extended usage of land and water resources, the quality of water reaching people has been greatly decreased. In addition to this, the extended fertilizer usage, especially chemical fertilizers in farms and also in other chemical sectors such as mining and construction have led to the overall deterioration of the quality of water all around the world. Humans need water for their survival and therefore a high level water quality system which quality checks the water that is supplied to towns and cities is essential it should also be able to work the water in the rivers, ponds etc. All the water sources should be enabled with this facility. Quality water availability plays a paramount role in preventing major disease out breaks and improves the overall quality of life.  In this paper we present a design and development of a low cost water management system for real time monitoring of the water quality using IOT(internet of things). Several sensors are implemented in this project for measuring various physical and chemical parameters of the water. The parameters such as temperature, PH, turbidity, flow of the water can be measured. The measured values from the sensors can be processed by the core controller. The Arduino model can be used as the core micro controller. Finally, the sensor data is received and stored in the cloud and in case of any changes in the quality of the water, the system will intimate the organization via GSM module.


Author(s):  
Nicolette Sopcak ◽  
Maria Mayan ◽  
Berna Skrypnek

Although conducting interviews is the most popular research strategy in qualitative research, we question whether it is the best strategy to use with young fathers and other populations who may be less willing to share personal experiences and thoughts with an unknown researcher. The reluctance of young fathers to engage in research leads to the omission of important perspectives and inadvertently results in young fathers' being understudied and unwittingly excluded from support programming and services. In this paper, we describe our experiences of using two different research strategies with young fathers: conventional in-depth interviews (i.e., interviews that rely on words only) and photo-interviewing (i.e., using photographs as props during an interview). We found that photo-interviewing contributed to young fathers' comfort during the research process, provided them a sense of agency, and possibly enriched the quality of the data. While we do not argue that one data collection strategy is necessarily better than the other, we would like to caution researchers against using conventional interviews as a default data collection strategy with marginalized, vulnerable, or less verbal populations for whom interviewing may not be the most suitable data collection strategy and to encourage researchers to explore alternative options.


2012 ◽  
Vol 2012 ◽  
pp. 1-11 ◽  
Author(s):  
Jin Nakazawa ◽  
Hideyuki Tokuda

In a sensor network, sensor data are usually forwarded from sensor nodes to a database. This tight coupling between the nodes and the database has been complicating user-centric applications that traverse multiple different sensor networks. To break this coupling, thus enabling user-centric applications, we propose a three-tier architecture for ubiquitous networked sensing. Its major feature is that it contains the “core” device, which is assumed to be a terminal held by users between sensor nodes and sensor databases. This architecture supports the sensor data directly transmitted to and consumed by the core device, in addition to the classic ones that are transmitted to the sensor database first, and downloaded to the core. The major contribution of this paper are the following three-fold. First, we clarify the architecture itself. Researchers can leverage the architecture as the baseline of their development. Second, we show two types of prototype implementations of the core device. Industry is allowed to develop a new product for practical use of ambient sensing. Finally, we show a range of applications that are enabled by the architecture and indicate issues that need to be addressed for further investigation.


Sign in / Sign up

Export Citation Format

Share Document