scholarly journals A Blockchain-Based Hybrid Incentive Model for Crowdsensing

Electronics ◽  
2020 ◽  
Vol 9 (2) ◽  
pp. 215
Author(s):  
Lijun Wei ◽  
Jing Wu ◽  
Chengnian Long

Crowdsensing is an emerging paradigm of data aggregation, which has a pivotal role in data-driven applications. By leveraging the recruitment, a crowdsensing system collects a large amount of data from mobile devices at a low cost. The critical issues in the development of crowdsensing are platform security, privacy protection, and incentive. However, the existing centralized, platform-based approaches suffer from the single point of failure which may result in data leakage. Besides, few previous studies have addressed the considerations of both the economic incentive and data quality. In this paper, we propose a decentralized crowdsensing architecture based on blockchain technology which will help improve the attack resistance. Furthermore, we present a hybrid incentive mechanism, which integrates the data quality, reputation, and monetary factors to encourage participants to contribute their sensing data while discouraging malicious behaviors. The effectiveness our of proposed incentive model is verified through a combination of the theory of mechanism design. The performance analysis and simulation results illustrate that the proposed hybrid incentive model is a reliable and efficient mean to promote data security and incentivizing positive conduct on the crowdsensing application.

2017 ◽  
Vol 11 (1) ◽  
pp. 35-51 ◽  
Author(s):  
Mukesh Kumar ◽  
Kamlesh Dutta

Wireless networks are used by everyone for their convenience for transferring packets from one node to another without having a static infrastructure. In WSN, there are some nodes which are light weight, small in size, having low computation overhead, and low cost known as sensor nodes. In literature, there exists many secure data aggregation protocols available but they are not sufficient to detect the malicious node. The authors require a better security mechanism or a technique to secure the network. Data aggregation is an essential paradigm in WSN. The idea is to combine data coming from different source nodes in order to achieve energy efficiency. In this paper, the authors proposed a protocol for worm hole attack detection during data aggregation in WSN. Main focus is on wormhole attack detection and its countermeasures.


2019 ◽  
Vol 8 (6) ◽  
pp. 285 ◽  
Author(s):  
Balletti ◽  
Ballarin

In recent decades, 3D acquisition by laser scanning or digital photogrammetry has become one of the standard methods of documenting cultural heritage, because it permits one to analyze the shape, geometry, and location of any artefact without necessarily coming into contact with it. The recording of three-dimensional metrical data of an asset allows one to preserve and monitor, but also to understand and explain the history and cultural heritage shared. In essence, it constitutes a digital archive of the state of an artefact, which can be used for various purposes, be remodeled, or kept safely stored. With the introduction of 3D printing, digital data can once again take on material form and become physical objects from the corresponding mathematical models in a relatively short time and often at low cost. This possibility has led to a different consideration of the concept of virtual data, no longer necessarily linked to simple visual fruition. The importance of creating high-resolution physical copies has been reassessed in light of different types of events that increasingly threaten the protection of cultural heritage. The aim of this research is to analyze the critical issues in the production process of the replicas, focusing on potential problems in data acquisition and processing and on the accuracy of the resulting 3D printing. The metric precision of the printed model with 3D technology are fundamental for everything concerning geomatics and must be related to the same characteristics of the digital model obtained through the survey analysis.


2021 ◽  
Vol 7 ◽  
pp. e455
Author(s):  
Mohammed Amine Bouras ◽  
Boming Xia ◽  
Adnan Omer Abuassba ◽  
Huansheng Ning ◽  
Qinghua Lu

Access control is a critical aspect for improving the privacy and security of IoT systems. A consortium is a public or private association or a group of two or more institutes, businesses, and companies that collaborate to achieve common goals or form a resource pool to enable the sharing economy aspect. However, most access control methods are based on centralized solutions, which may lead to problems like data leakage and single-point failure. Blockchain technology has its intrinsic feature of distribution, which can be used to tackle the centralized problem of traditional access control schemes. Nevertheless, blockchain itself comes with certain limitations like the lack of scalability and poor performance. To bridge the gap of these problems, here we present a decentralized capability-based access control architecture designed for IoT consortium networks named IoT-CCAC. A blockchain-based database is utilized in our solution for better performance since it exhibits favorable features of both blockchain and conventional databases. The performance of IoT-CCAC is evaluated to demonstrate the superiority of our proposed architecture. IoT-CCAC is a secure, salable, effective solution that meets the enterprise and business’s needs and adaptable for different IoT interoperability scenarios.


2021 ◽  
Author(s):  
Nasser Al-Saif ◽  
Raja Wasim Ahmad ◽  
Khaled Salah ◽  
Ibrar Yaqoob ◽  
Raja Jayaraman ◽  
...  

Today's technologies, techniques, and systems leveraged for managing energy trading operations in electric vehicles fall short in providing operational transparency, immutability, fault tolerance, traceability, and trusted data provenance features. They are centralized and vulnerable to the single point of failure problem, and less trustworthy as they are prone to the data modifications and deletion by adversaries. In this paper, we present the potential advantages of blockchain technology to manage energy trading operations between electric vehicles as it can offer data traceability, immutability, transparency, audit, security, and confidentiality in a fully decentralized manner. We identify and discuss the essential requirements for the successful implementation of blockchain technology to secure energy trading operations among electric vehicles. We present a detailed discussion on the potential opportunities offered by blockchain technology to secure the energy trading operations of electric vehicles. We discuss several blockchain-based research projects and case studies to highlight the practicability of blockchain technology in electric vehicles energy trading. Finally, we identify and discuss open challenges in fulfilling the requirements of electric vehicles energy trading applications.


Author(s):  
G. Forlani ◽  
F. Diotri ◽  
U. Morra di Cella ◽  
R. Roncella

Abstract. Unmanned Aerial Vehicles (UAV) are established platforms for photogrammetric surveys in remote areas. They are lightweight, easy to operate and can allow access to remote sites otherwise difficult (or impossible) to be surveyed with other techniques. Very good accuracy can be obtained also with low-cost UAV platforms as far as a reliable ground control is provided. However, placing ground control points (GCP) in these contexts is time consuming and requires accessibility that, in some cases, can be troublesome. RTK-capable UAV platforms are now available at reasonable costs and can overcome most of these problems, requiring just few (or none at all) GCP and still obtaining accurate results. The paper will present a set of experiments performed in cooperation with ARPA VdA (the Environmental Protection Agency of Valle d’Aosta region, Italy) on a test site in the Italian Alps using a Dji Phantom 4 RTK platform. Its goals are: a) compare accuracies obtainable with different calibration procedures (pre- or on-the-job/self-calibration); b) evaluate the accuracy improvements using different number of GCP when the site allows for it; and c) compare alternative positioning modes for camera projection centres determination, (Network RTK, RTK, Post Processing Kinematic and Single Point Positioning).


Author(s):  
Bollipelly PruthviRaj Goud ◽  
A. Prasanth Rao ◽  
Sravan kumar S. ◽  
Sathiyamoorthi V.

IoT comprises billions of devices that can sense, communicate, compute, and potentially actuate. The data generated by the IoTs are valuable and have the potential to drive innovative and novel applications. IoT allows people and things to be connected anytime, anyplace and to anyone with the internet using tiny sensor. One of the best advantages of the IoT is the increasing number of low-cost sensors available along with its functionalities. A few standard sensors include linear accelerator, compass, light sensors, camera, and microphone, moisture, location, heart rate, and heart rate variability. The trend is multi-sensor platforms that incorporate several sensing elements. In such environment, discovering, identifying, connecting, and configuring sensor hardware are critical issues. The cloud-based IoT platforms can retrieve data from sensors IoT is an inter-disciplinary technology, encompassing multiple areas such as RTS, embedded systems. This chapter detailed investigation and presents highly innovative and revolutionary ideas in healthcare application are available.


2019 ◽  
Vol 2019 ◽  
pp. 1-17
Author(s):  
Kaikai Liu ◽  
Nagthej Manangi Ravindrarao ◽  
Abhishek Gurudutt ◽  
Tejeshwar Kamaal ◽  
Chinmayi Divakara ◽  
...  

Edge application’s distributed nature presents significant challenges for developers in orchestrating and managing the multitenant applications. In this paper, we propose a practical edge cloud software framework for deploying multitenant distributed smart applications. Here we exploit commodity, a low cost embedded board to form distributed edge clusters. The cluster of geo-distributed and wireless edge nodes not only power multitenant IoT applications that are closer to the data source and the user, but also enable developers to remotely deploy and orchestrate application containers over the cloud. Specifically, we propose building a software platform to manage the distributed edge nodes along with support services to deploy and launch isolated and multitenant user applications through a lightweight container. In particular, we propose an architectural solution to improve the resilience of edge cloud services through peer collaborated service migration when the failures happen or when resources are overburdened. We focus on giving the developers a single point control of the infrastructure over the intermittent and lossy wide area networks (WANs) and enabling the remote deployment of multitenant applications.


Sensors ◽  
2019 ◽  
Vol 19 (14) ◽  
pp. 3085 ◽  
Author(s):  
Sandra Costanzo

Non-contact wireless sensing approaches have emerged in recent years, in order to enable novel enhanced developments in the framework of healthcare and biomedical scenarios. One of these technologically advanced solutions is given by software-defined radar platforms, a low-cost radar implementation, where all operations are implemented and easily changed via software. In the present paper, a software-defined radar implementation with Doppler elaboration features is presented, to be applied for the non-contact monitoring of human respiration signals. A quadrature receiver I/Q (In-phase/Quadrature) architecture is adopted in order to overcome the critical issues related to the occurrences of null detection points, while the phase-locked loop components included in the software defined radio transceiver are successfully exploited to guarantee the phase correlation between I/Q signal components. The proposed approach leads to a compact, low-cost, and flexible radar solution, whose application abilities may be simply changed via software, with no need for hardware modifications. Experimental results on a human target are discussed so as to demonstrate the feasibility of the proposed approach for vital signs detection.


Author(s):  
David Dutwin ◽  
Trent D Buskirk

Abstract Telephone surveys have become much maligned in the past few years, considering recent failures to correctly predict elections worldwide, response rates declining into the single digits, and the rise of low-cost, nonprobabilistic alternatives. Yet there is no study assessing the degree to which data attained via modern-day telephone interviewing has or has not significantly declined in terms of data quality. Utilizing an elemental approach, we evaluate the bias of various cross-tabulations of core demographics from a collection of surveys collected over the past two decades. Results indicate that (1) there has been a modest increase in bias over the past two decades but a downward trend in the past five years; (2) the share of cell phone interviews in samples has a significant impact on the bias; (3) traditional weighting largely mitigates the linear trend in bias; and (4), once weighted, telephone samples are nearly on par in data quality to higher response rate unweighted in-person data. Implications for the “fit for purpose” of telephone data and its general role in the future of survey research are discussed given our findings.


2017 ◽  
Vol 27 (5) ◽  
pp. 1643-1654 ◽  
Author(s):  
João Lagarto ◽  
Jonathan D. Hares ◽  
Christopher Dunsby ◽  
Paul M. W. French

Sign in / Sign up

Export Citation Format

Share Document