scholarly journals Design and Implementation of an Integrated IoT Blockchain Platform for Sensing Data Integrity

Sensors ◽  
2019 ◽  
Vol 19 (10) ◽  
pp. 2228 ◽  
Author(s):  
Lei Hang ◽  
Do-Hyeun Kim

With the rapid development of communication technologies, the Internet of Things (IoT) is getting out of its infancy, into full maturity, and tends to be developed in an explosively rapid way, with more and more data transmitted and processed. As a result, the ability to manage devices deployed worldwide has been given more and advanced requirements in practical application performances. Most existing IoT platforms are highly centralized architectures, which suffer from various technical limitations, such as a cyber-attack and single point of failure. A new solution direction is essential to enhance data accessing, while regulating it with government mandates in privacy and security. In this paper, we propose an integrated IoT platform using blockchain technology to guarantee sensing data integrity. The aim of this platform is to afford the device owner a practical application that provides a comprehensive, immutable log and allows easy access to their devices deployed in different domains. It also provides characteristics of general IoT systems, allows for real-time monitoring, and control between the end user and device. The business logic of the application is defined by the smart contract, which contains rules and conditions. The proposed approach is backed by a proof of concept implementation in realistic IoT scenarios, utilizing Raspberry Pi devices and a permissioned network called Hyperledger Fabric. Lastly, a benchmark study using various performance metrics is made to highlight the significance of the proposed work. The analysis results indicate that the designed platform is suitable for the resource-constrained IoT architecture and is scalable to be extended in various IoT scenarios.

2021 ◽  
pp. 2759-2770
Author(s):  
Meryam Saad

In recent years, the rapid development in the field of wireless technologies leaded to appear a new topic known as the Internet of things (IoT). The IoT applications can be found in various fields of our life such as smart home, health care, smart building, and etc. In all these applications the data collected from the real world are transmitted through the Internet, therefore these data have become a target of many attacks and hackers. So, a secure communication must be provided to protect the transmitted data from unauthorized access. This paper focuses on designing a secure IoT system to protect the sensing data. In this system, the security is provided by the use of Lightweight AES encryption algorithm to encrypt the data received from physical environment. The hardware used in this proposal is the Raspberry Pi 3 model B and two types of sensors. The LAES algorithm was embedded inside the Raspberry in order to protect the sensing data that comes from sensors connected to the Raspberry Pi before sending it through network. The analysis results show that the proposed IoT security system consumes less time in encryption/decryption and has high throughput when compared with others from related work. Its throughput is higher in about 19.24% than one system from the related studies.


2021 ◽  
Author(s):  
Rui Li ◽  
Yanan Sun ◽  
Lihua Jin ◽  
Xiaohong Qiao ◽  
Cong Li ◽  
...  

With the rapid development of point-of-care (POC) technologies, the improvement of sensitive method featured with fast analysis and affordable devices has become an emerging requirement for the practical application. In...


Animals ◽  
2021 ◽  
Vol 11 (5) ◽  
pp. 1263
Author(s):  
Zhaojun Wang ◽  
Jiangning Wang ◽  
Congtian Lin ◽  
Yan Han ◽  
Zhaosheng Wang ◽  
...  

With the rapid development of digital technology, bird images have become an important part of ornithology research data. However, due to the rapid growth of bird image data, it has become a major challenge to effectively process such a large amount of data. In recent years, deep convolutional neural networks (DCNNs) have shown great potential and effectiveness in a variety of tasks regarding the automatic processing of bird images. However, no research has been conducted on the recognition of habitat elements in bird images, which is of great help when extracting habitat information from bird images. Here, we demonstrate the recognition of habitat elements using four DCNN models trained end-to-end directly based on images. To carry out this research, an image database called Habitat Elements of Bird Images (HEOBs-10) and composed of 10 categories of habitat elements was built, making future benchmarks and evaluations possible. Experiments showed that good results can be obtained by all the tested models. ResNet-152-based models yielded the best test accuracy rate (95.52%); the AlexNet-based model yielded the lowest test accuracy rate (89.48%). We conclude that DCNNs could be efficient and useful for automatically identifying habitat elements from bird images, and we believe that the practical application of this technology will be helpful for studying the relationships between birds and habitat elements.


1983 ◽  
Vol 17 (4) ◽  
pp. 307-318 ◽  
Author(s):  
H. G. Stampfer

This article suggests that the potential usefulness of event-related potentials in psychiatry has not been fully explored because of the limitations of various approaches to research adopted to date, and because the field is still undergoing rapid development. Newer approaches to data acquisition and methods of analysis, combined with closer co-operation between medical and physical scientists, will help to establish the practical application of these signals in psychiatric disorders and assist our understanding of psychophysiological information processing in the brain. Finally, it is suggested that psychiatrists should seek to understand these techniques and the data they generate, since they provide more direct access to measures of complex cerebral processes than current clinical methods.


2021 ◽  
Author(s):  
Zhangyue Shi ◽  
Chenang Liu ◽  
Chen Kan ◽  
Wenmeng Tian ◽  
Yang Chen

Abstract With the rapid development of the Internet of Things and information technologies, more and more manufacturing systems become cyber-enabled, which significantly improves the flexibility and productivity of manufacturing. Furthermore, a large variety of online sensors are also commonly incorporated in the manufacturing systems for online quality monitoring and control. However, the cyber-enabled environment may pose the collected online stream sensor data under high risks of cyber-physical attacks as well. Specifically, cyber-physical attacks could occur during the manufacturing process to maliciously tamper the sensor data, which could result in false alarms or failures of anomaly detection. In addition, the cyber-physical attacks may also illegally access the collected data without authorization and cause leakage of key information. Therefore, it becomes critical to develop an effective approach to protect online stream data from these attacks so that the cyber-physical security of the manufacturing systems could be assured. To achieve this goal, an integrative blockchain-enabled method, is proposed by leveraging both asymmetry encryption and camouflage techniques. A real-world case study that protects cyber-physical security of collected stream data in additive manufacturing is provided to demonstrate the effectiveness of the proposed method. The results demonstrate that malicious tampering could be detected in a relatively short time and the risk of unauthorized data access is significantly reduced as well.


2021 ◽  
Vol 12 (9) ◽  
pp. 443-449
Author(s):  
D. S. Khleborodov ◽  

Micro-segmentation of local networks is an important element of network security. The main goal of micro-segmentation of network is to reduce a risk of compromising hosts during a cyber-attack. In micro-segmented networks, if one of the hosts has been compromised, the malicious code or attacker will be limited in the "horizontal" actions by the micro-segment to which the compromised host belongs. Existing methods of micro-segmentation of networks have operational drawbacks that impede their effective practical application. This article presents a new method of micro-segmentation of local wired and wireless networks based on downloadable and wireless access control lists, which allows to achieve a high level of granularity of network access policies by minimizing the microsegment, along with high operational characteristics.


2013 ◽  
Vol 2013 ◽  
pp. 1-6 ◽  
Author(s):  
Xiwei Wang ◽  
Qi Dang ◽  
Jinglin Guo ◽  
Hongbin Ge

RFID technology research has resolved practical application issues of the power industry such as assets management, working environment control, and vehicle networking. Also it provides technical reserves for the convergence of ERP and CPS. With the development of RFID and location-based services technology, RFID is converging with a variety of sensing, communication, and information technologies. Indoor positioning applications are under rapid development. Micromanagement environment of the assets is a useful practice for the RFID and positioning. In this paper, the model for RFID applications has been analyzed in the microenvironment management of the data center and electric vehicle batteries, and the optimization scheme of enterprise asset management is also proposed.


Author(s):  
Jasmin Ilyani Ahmad ◽  
Roshidi Din ◽  
Mazida Ahmad

<span>Cryptography is a method used to establish secure data communication. The goal of cryptography is to send data to satisfy the criteria of confidentiality, data integrity, authentication and non-repudiation. In line with the goals, the performance metrics is the important evaluation criteria to be analyzed. This paper presents the review of performance metrics of Public Key Cryptography (PKC) that had been analyzed based on the PKC scheme from the previous researchers’ effort since the last four decades. It also displayed the research pattern in different performance metrics over the years. The aim of this paper is to identify the key performance metrics which addressed by the researchers in previous studies. Finally, the critical concern of this paper which shows the overall PKC performance metrics also presented in this paper.</span>


Webology ◽  
2021 ◽  
Vol 18 (Special Issue 04) ◽  
pp. 733-751
Author(s):  
D.M. Sheeba

Internet of Things enables many industries to connect to end customers and provide seamless products and services delivery. Due to easy access to network, availability of devices, penetration of IoT services exponentially Growing. Meanwhile, Ensuring the Data Security and Integrity of devices connected to network is paramount. In this work, we bring the efficient way of implementing Secure Algorithm for low powered devices and enhancing the encryption and decryption process. In addition to the data security, to enhance node integrity with less power, Authenticator and intermediate network manager introduced which will acts as a firewall and manager of data flow. To demonstrate the approach, same is implemented using low cost Arduino Uno, Raspberry Pi boards. Arduino Uno used to demonstrate low powered encryption process using EDIA Algorithm and raspberry pi used as nodal manager to manage the integrity of nodes in a low-powered environment. Data Security and Integrity is ensured by the way of enhanced Algorithm and Integrity through BlockChain and results are provided and discussed. Finally result and future enhancement are explained.


Sign in / Sign up

Export Citation Format

Share Document