scholarly journals An Innovative Method for Preserving Privacy in Internet of Things

Sensors ◽  
2019 ◽  
Vol 19 (15) ◽  
pp. 3355 ◽  
Author(s):  
Mohammad Yamin ◽  
Yazed Alsaawy ◽  
Ahmad B. Alkhodre ◽  
Adnan Ahmed Abi Sen

Preservation of privacy of users’ personal data has always been a critical issue to deal with. This issue in the Internet of Things (IoT), which facilitates millions of applications, has become even more challenging. Currently, several approaches and methods are available to safeguard privacy but each of them suffers from one or more anomalies. In particular, Trusted Third-Party approach relies on the trust of a third-party server, Cooperation needs the trust of other peers, Obfuscation is known to return inaccurate results, and Dummy generates too much overhead. Moreover, these and most of the other well-known approaches deal only with specific types of applications linked to the location-based services. In this paper, we present two new methods, namely: Blind Third Party (BTP) and Blind Peers ( B L P ), and combine them to form a new one to be known as the Blind Approach ( B L A ). With the help of simulation results we shall demonstrate the effectiveness and superiority of B L A over the other available methods. The simulation results also exhibit that B L A is free from all the existing problems of the other approaches. However, B L A causes a slight increase in the average (response) time, which we consider to be a minor issue. We shall also discuss the capability and superiority of the Blind Approach in the cases of E-health, Smart Transportation, and Smart Home systems.

2018 ◽  
Vol 2018 ◽  
pp. 1-11 ◽  
Author(s):  
Adnan A. Abi Sen ◽  
Fathy B. Eassa ◽  
Mohammad Yamin ◽  
Kamal Jambi

Several methods use cache for decreasing the number of connections to protect privacy of user data and improve performance in Location Based Services (LBS). Many of these methods require users to trust other users or third parties, which could be servers. An intruder could be disguised as a user or a third party. In this article, we propose a new method, known as “Double Cache Approach”, which uses a pair of caches to reduce the vulnerability of trust between users or third party and offers a vast improvement in privacy and security of user data in healthcare and other applications that use LBS. This approach divides the area into many cells and manages the cooperation among users within two caches at the access point with wireless communication. To demonstrate the superiority, we also provide simulation results of user queries, comparing the proposed method with those using only one cache. We believe that our approach would solve the trust problem optimally, achieve a comprehensive protection for users’ data, and enhance the privacy and security levels.


Author(s):  
Ahmed Y. Awad ◽  
Seshadri Mohan

Today, school buses transport millions of students to and from schools. Therefore, safety of school students is still a hot topic and the most imperative issue. The evolution of wireless location-based services has created consumer requests for availability of global positioning systems (GPS) in urban and indoor environments. Nowadays, there is a requirement to deliver a system for the school bus, that monitors its location and speed. This work investigates two different ways to track the vehicle through ordinary GPS, Assisted-GPS (AGPS). A-GPS improves startup performance (time-to-first-fix (TTFF)), of a GPS satellite-based positioning system in the downtown of big cities depending on 4G/LTE cellular networks. The proposed system is basically built using Raspberry Pi (3) with 4G model shield and important telematics technologies like Representational state transfer (RESTful API) which is the vital key for the Internet of Things (IoT) field.


Author(s):  
Supriya Raheja

Background: The extension of CPU schedulers with fuzzy has been ascertained better because of its unique capability of handling imprecise information. Though, other generalized forms of fuzzy can be used which can further extend the performance of the scheduler. Objectives: This paper introduces a novel approach to design an intuitionistic fuzzy inference system for CPU scheduler. Methods: The proposed inference system is implemented with a priority scheduler. The proposed scheduler has the ability to dynamically handle the impreciseness of both priority and estimated execution time. It also makes the system adaptive based on the continuous feedback. The proposed scheduler is also capable enough to schedule the tasks according to dynamically generated priority. To demonstrate the performance of proposed scheduler, a simulation environment has been implemented and the performance of proposed scheduler is compared with the other three baseline schedulers (conventional priority scheduler, fuzzy based priority scheduler and vague based priority scheduler). Results: Proposed scheduler is also compared with the shortest job first CPU scheduler as it is known to be an optimized solution for the schedulers. Conclusion: Simulation results prove the effectiveness and efficiency of intuitionistic fuzzy based priority scheduler. Moreover, it provides optimised results as its results are comparable to the results of shortest job first.


2020 ◽  
Vol 14 ◽  
Author(s):  
Intyaz Alam ◽  
Sushil Kumar ◽  
Pankaj Kumar Kashyap

Background: Recently, Internet of Things (IoT) has brought various changes in the existing research field by including new areas such as smart transportation, smart home facilities, smart healthcare, etc. In smart transportation systems, vehicles contain different components to access information related to passengers, drivers, vehicle speed, and many more. This information can be accessed by connecting vehicles with Internet of Things leading to new fields of research known as Internet of Vehicles. The setup of Internet of Vehicle (IoV) consists of many sensors to establish a connection with several other sensors belonging to different environments by exploiting different technologies. The communication of the sensors faces a lot of challenging issues. Some of the critical challenges are to maintain security in information exchanges among the vehicles, inequality in sensors, quality of internet connection, and storage capacity. Objective: To overcome the challenging issues, we have designed a new framework consisting of seven-layered architecture, including the security layered, which provides seamless integration by communicating the devices present in the IoV environment. Further, a network model consisting of four components such as Cloud, Fog, Connection, and Clients has been designed. Finally, the protocol stack which describes the protocol used in each layer of the proposed seven-layered IoV architecture has been shown. Methods: In this proposed architecture, the representation and the functionalities of each layer and types of security have been defined. Case studies of this seven-layer IoV architecture have also been performed to illustrate the operation of each layer in real-time. The details of the network model including all the elements inside each component, have also been shown. Results: We have discussed some of the existing communication architecture and listed a few challenges and issues occurring in present scenarios. Considering these issues, which is presently occurring in the existing communication architecture. We have developed the seven-layered IoV architecture and the network model with four essential components known as the cloud, fog, connection, and clients. Conclusion: This proposed architecture provides a secure IoV environment and provides life safety. Hence, safety and security will help to reduce the cybercrimes occurring in the network and provides good coordination and communication of the vehicles in the network.


IEEE Access ◽  
2021 ◽  
Vol 9 ◽  
pp. 4141-4157
Author(s):  
Debajyoti Pal ◽  
Suree Funilkul ◽  
Xiangmin Zhang

Author(s):  
Lihua Song ◽  
Xinran Ju ◽  
Zongke Zhu ◽  
Mengchen Li

AbstractInformation security has become a hot topic in Internet of Things (IoT), and traditional centralized access control models are faced with threats such as single point failure, internal attack, and central leak. In this paper, we propose a model to improve the access control security of the IoT, which is based on zero-knowledge proof and smart contract technology in the blockchain. Firstly, we deploy attribute information of access control in the blockchain, which relieves the pressure and credibility problem brought by the third-party information concentration. Secondly, encrypted access control token is used to gain the access permission of the resources, which makes the user's identity invisible and effectively avoids attribute ownership exposure problem. Besides, the use of smart contracts solves the problem of low computing efficiency of IoT devices and the waste of blockchain computing power resources. Finally, a prototype of IoT access control system based on blockchain and zero-knowledge proof technology is implemented. The test analysis results show that the model achieves effective attribute privacy protection, compared with the Attribute-Based Access Control model of the same security level, the access efficiency increases linearly with the increase of access scale.


Entropy ◽  
2021 ◽  
Vol 23 (8) ◽  
pp. 1007
Author(s):  
Michał Ramsza

The present paper reports simulation results for a simple model of reference group influence on market choices, e.g., brand selection. The model was simulated on three types of random graphs, Erdos–Renyi, Barabasi–Albert, and Watts–Strogatz. The estimates of equilibria based on the simulation results were compared to the equilibria of the theoretical model. It was verified that the simulations exhibited the same qualitative behavior as the theoretical model, and for graphs with high connectivity and low clustering, the quantitative predictions offered a viable approximation. These results allowed extending the results from the simple theoretical model to networks. Thus, by increasing the positive response towards the reference group, the third party may create a bistable situation with two equilibria at which respective brands dominate the market. This task is easier for large reference groups.


Network ◽  
2021 ◽  
Vol 1 (1) ◽  
pp. 28-49
Author(s):  
Ehsan Ahvar ◽  
Shohreh Ahvar ◽  
Syed Mohsan Raza ◽  
Jose Manuel Sanchez Vilchez ◽  
Gyu Myoung Lee

In recent years, the number of objects connected to the internet have significantly increased. Increasing the number of connected devices to the internet is transforming today’s Internet of Things (IoT) into massive IoT of the future. It is predicted that, in a few years, a high communication and computation capacity will be required to meet the demands of massive IoT devices and applications requiring data sharing and processing. 5G and beyond mobile networks are expected to fulfill a part of these requirements by providing a data rate of up to terabits per second. It will be a key enabler to support massive IoT and emerging mission critical applications with strict delay constraints. On the other hand, the next generation of software-defined networking (SDN) with emerging cloudrelated technologies (e.g., fog and edge computing) can play an important role in supporting and implementing the above-mentioned applications. This paper sets out the potential opportunities and important challenges that must be addressed in considering options for using SDN in hybrid cloud-fog systems to support 5G and beyond-enabled applications.


2019 ◽  
Vol 62 (6) ◽  
pp. 32-34 ◽  
Author(s):  
Thomas Pasquier ◽  
David Eyers ◽  
Jean Bacon

Sign in / Sign up

Export Citation Format

Share Document