scholarly journals Blockchain-Based Community Safety Security System with IoT Secure Devices

2021 ◽  
Vol 13 (24) ◽  
pp. 13994
Author(s):  
Chin-Ling Chen ◽  
Zi-Yi Lim ◽  
Hsien-Chou Liao

Humans frequently need to construct a huge number of buildings for occupants in large cities to work or live in a highly developed civilization; people who live in the same building or same area are defined as a community. A thief stealing items, a burglary, fire hazards, flood hazards, earthquakes, emergency aid, abnormal gas leakage, strange behavior, falling in a building, fainting in a building, and other incidents all threaten the community’s safety. Therefore, we proposed a blockchain-based community safety security system that is combined with IoT devices. In the proposed scheme, we designed multiple phases to process the alarm triggered by IoT devices. IoT devices can be set up in two types areas: private and public areas. Both types of IoT devices’ alarms have different process flow for the response and records checking phase. All records are saved in the Blockchain Center to assure the data can be verified and cannot be forged. During the communication between sender and receiver, we implemented some security methods to prevent message repudiation, prevent transmission intercept, prevent replay attacks, and ensure data integrity. We also implemented a clarifying mechanism to ensure that all system participants can have confidence in the system’s processing methods. The proposed scheme can be used in communities to improve community safety and prevent unnecessary conflicts.

Sensors ◽  
2021 ◽  
Vol 21 (8) ◽  
pp. 2681
Author(s):  
Kedir Mamo Besher ◽  
Juan Ivan Nieto-Hipolito ◽  
Raymundo Buenrostro-Mariscal ◽  
Mohammed Zamshed Ali

With constantly increasing demand in connected society Internet of Things (IoT) network is frequently becoming congested. IoT sensor devices lose more power while transmitting data through congested IoT networks. Currently, in most scenarios, the distributed IoT devices in use have no effective spectrum based power management, and have no guarantee of a long term battery life while transmitting data through congested IoT networks. This puts user information at risk, which could lead to loss of important information in communication. In this paper, we studied the extra power consumed due to retransmission of IoT data packet and bad communication channel management in a congested IoT network. We propose a spectrum based power management solution that scans channel conditions when needed and utilizes the lowest congested channel for IoT packet routing. It also effectively measured power consumed in idle, connected, paging and synchronization status of a standard IoT device in a congested IoT network. In our proposed solution, a Freescale Freedom Development Board (FREDEVPLA) is used for managing channel related parameters. While supervising the congestion level and coordinating channel allocation at the FREDEVPLA level, our system configures MAC and Physical layer of IoT devices such that it provides the outstanding power utilization based on the operating network in connected mode compared to the basic IoT standard. A model has been set up and tested using freescale launchpads. Test data show that battery life of IoT devices using proposed spectrum based power management increases by at least 30% more than non-spectrum based power management methods embedded within IoT devices itself. Finally, we compared our results with the basic IoT standard, IEEE802.15.4. Furthermore, the proposed system saves lot of memory for IoT devices, improves overall IoT network performance, and above all, decrease the risk of losing data packets in communication. The detail analysis in this paper also opens up multiple avenues for further research in future use of channel scanning by FREDEVPLA board.


Author(s):  
Domenico Garlisi ◽  
Alessio Martino ◽  
Jad Zouwayhed ◽  
Reza Pourrahim ◽  
Francesca Cuomo

AbstractThe interest in the Internet of Things (IoT) is increasing both as for research and market perspectives. Worldwide, we are witnessing the deployment of several IoT networks for different applications, spanning from home automation to smart cities. The majority of these IoT deployments were quickly set up with the aim of providing connectivity without deeply engineering the infrastructure to optimize the network efficiency and scalability. The interest is now moving towards the analysis of the behavior of such systems in order to characterize and improve their functionality. In these IoT systems, many data related to device and human interactions are stored in databases, as well as IoT information related to the network level (wireless or wired) is gathered by the network operators. In this paper, we provide a systematic approach to process network data gathered from a wide area IoT wireless platform based on LoRaWAN (Long Range Wide Area Network). Our study can be used for profiling IoT devices, in order to group them according to their characteristics, as well as detecting network anomalies. Specifically, we use the k-means algorithm to group LoRaWAN packets according to their radio and network behavior. We tested our approach on a real LoRaWAN network where the entire captured traffic is stored in a proprietary database. Quite important is the fact that LoRaWAN captures, via the wireless interface, packets of multiple operators. Indeed our analysis was performed on 997, 183 packets with 2169 devices involved and only a subset of them were known by the considered operator, meaning that an operator cannot control the whole behavior of the system but on the contrary has to observe it. We were able to analyze clusters’ contents, revealing results both in line with the current network behavior and alerts on malfunctioning devices, remarking the reliability of the proposed approach.


2020 ◽  
Author(s):  
Indrakshi Dey

In this chapter, the fundamentals of distributed inference problem in wireless sensor networks (WSN) is addressed and the statistical theoretical foundations to several applications is provided. The chapter adopts a statistical signal processing perspective and focusses on distributed version of the binary-hypothesis test for detecting an event as correctly as possible. The fusion center is assumed to be equipped with multiple antennas collecting and processing the information. The inference problem that is solved, primarily concerns the robust detection of a phenomenon of interest (for example, environmental hazard, oil/gas leakage, forest fire). The presence of multiple antennas at both transmit and receive sides resembles a multiple-input-multiple-output (MIMO) system and allows for utilization of array processing techniques providing spectral efficiency, fading mitigation and low energy sensor adoption. The problem is referred to as MIMO decision fusion. Subsequently, both design and evaluation (simulated and experimental) of these fusion approaches is presented for this futuristic WSN set-up.


Another Haul ◽  
2019 ◽  
pp. 29-56
Author(s):  
Charlie Groth

This chapter is the first of four chapters that set up a folk narrative typography: Big Stories; character anecdotes; microlegends; and everyday storying. It begins with a definition of “Big Stories” and its relationship to “myth” and “theme.” The chapter overviews the thematic content of the Big Stories at work on Lewis Island: tradition, environment, civility and community (including sharing the island), springtime, and the island as a sacred, spiritual place. It also covers how big stories are told in different situations during fishing, on the island, and at other times and places, including through the media. Some telling is not only performed, but also enacted: for example, through the sales method which redistributes fish equitably; in hosting visitors to watch fireworks on the river, and other ways which sharing the island rides the line between private and public property. Chapter 2 also discusses how these stories overlap and intertwine.


Author(s):  
Olof Magnusson ◽  
Rikard Teodorsson ◽  
Joakim Wennerberg ◽  
Stig Arne Knoph

LoRaWAN (long-range wide-area network) is an emerging technology for the connection of internet of things (IoT) devices to the internet and can as such be an important part of decision support systems. In this technology, IoT devices are connected to the internet through gateways by using long-range radio signals. However, because LoRaWAN is an open network, anyone has the ability to connect an end device or set up a gateway. Thus, it is important that gateways are designed in such a way that their ability to be used maliciously is limited. This chapter covers relevant attacks against gateways and potential countermeasures against them. A number of different attacks were found in literature, including radio jamming, eavesdropping, replay attacks, and attacks against the implementation of what is called beacons in LoRaWAN. Countermeasures against these attacks are discussed, and a suggestion to improve the security of LoRaWAN is also included.


2019 ◽  
Vol 2019 ◽  
pp. 1-13 ◽  
Author(s):  
Deris Stiawan ◽  
Mohd. Yazid Idris ◽  
Reza Firsandaya Malik ◽  
Siti Nurmaini ◽  
Nizar Alsharif ◽  
...  

Internet of Things (IoT) devices may transfer data to the gateway/application server through File Transfer Protocol (FTP) transaction. Unfortunately, in terms of security, the FTP server at a gateway or data sink very often is improperly set up. At the same time, password matching/theft holding is among the popular attacks as the intruders attack the IoT network. Thus, this paper attempts to provide an insight of this type of attack with the main aim of coming up with attack patterns that may help the IoT system administrator to analyze any similar attacks. This paper investigates brute force attack (BFA) on the FTP server of the IoT network by using a time-sensitive statistical relationship approach and visualizing the attack patterns that identify its configurations. The investigation focuses on attacks launched from the internal network, due to the assumption that the IoT network has already installed a firewall. An insider/internal attack launched from an internal network endangers more the entire IoT security system. The experiments use the IoT network testbed that mimic the internal attack scenario with three major goals: (i) to provide a topological description on how an insider attack occurs; (ii) to achieve attack pattern extraction from raw sniffed data; and (iii) to establish attack pattern identification as a parameter to visualize real-time attacks. Experimental results validate the investigation.


2020 ◽  
Vol 6 (Supplement_1) ◽  
pp. 58-58
Author(s):  
Lamech Sigu ◽  
Fredrick Chite ◽  
Emma Achieng ◽  
Andrew Koech

PURPOSE The Internet of Things (IoT) is a technology that involves all things connected to the Internet that share data over a network without requiring human-to-human interaction or human-to-computer interaction. Information collected from IoT devices can help physicians identify the best treatment process for patients and reach accurate and expected outcomes. METHODS The International Cancer Institute is partnering to set up remote oncology clinics in sub-Saharan Africa. Medical oncologists and expert teams from across the world connect with oncology clinics in other Kenyan counties—Kisumu, Meru, Makueni, Garissa, Kakamega, Bungoma, Siaya, and Vihiga counties. The furthest county is Garissa, approximately 651.1 km from Eldoret, and the nearest is Vihiga at 100.4 km from Eldoret. This study began July 2019, and as of November 30th, the team has hosted 21 sessions with an average of 11 participants attending a session led by a medical oncologist. RESULTS IoT devices have become a way by which a patient gets all the information he or she needs from a physician without going to the clinic. Patient monitoring can be done in real time, allowing access to real-time information with improved patient treatment outcomes and a decrease in cost. Through IoT-enabled devices, the International Cancer Institute has set up weekly virtual tumor boards during which cancer cases are presented and discussed by all participating counties. An online training module on cancer is also offered. Furthermore, remote monitoring of a patient’s health helps to reduce the length of hospital stay and prevents readmissions. CONCLUSION In our setting, which has a few oncologists, use of IoT and tumor boards has helped to improve patient decision support as well as training for general physicians.


2017 ◽  
Vol 12 (11) ◽  
pp. 249 ◽  
Author(s):  
Maged Adel Abdo Mukred ◽  
Zheng Jianguo

Big data inhibits the ability to significantly impact a wide range of fields in an economy, from the government sector to commercial sectors like retail and healthcare. Not only has it altered the way companies assess their product’s demand and supply patterns but has also phenomenally helped in making the environment healthier in recent years. It carries the ability to identify valuable data from a huge dataset with exceptional parallel processing. This study presents the general introduction of big data bringing forth its various features and advantages along with the challenges which organizations face while using with respect to environmental sustainability. Observations have also been made on the findings of various researches, and studies and surveys performed by some international organizations in the recent years on the urgent need of taking necessary measures and initiatives to prevent further depletion of natural resources thus making the environment sustainable. Making the issue the study aim, future studies must intend to explore how multinational corporations can enhance environmental sustainability through big data analytics. Lastly, recommendations have been made to organisations– private and public in hiring adequate expertise and set-up, thereby making big data analytics more efficient and reliable.


2007 ◽  
Vol 10-12 ◽  
pp. 89-93
Author(s):  
Li Zhi Gu

Briefly reviewed the origin and presence of ASP, elicited the basic requirements of the construction of ASP platform on all-purpose and special needs for enterprises manufacturing the products of engineering machinery. The hierarchy of overall structure for ASP was presented with five layers: client’s layer, representation layer, professional logic layer, integration layer, and resource layer for different functions. Emphasis was focused on the data centers with the representation layer closer to the client’s terminals, the original IT resources stored in the local areas, and important data stored in the secure stations and backup and with standby data centers; on the manufacturing system based on CAD/CAPP/VM and other related techniques; and on the security system with access manipulations, secret keys, ID discriminations and audit tracking. The initial ASP platform has been set up for the medium and small sized enterprises, and was actuated with Rational Rose, UML adopted for the web system, and JavaScript employed for the events, databases, and development of the user’s terminals. Quanhigh Machinery Company was taken as an example in application with four kinds of typical components of engineering machinery.


1995 ◽  
Vol 9 (2) ◽  
pp. 130-133 ◽  
Author(s):  
J.Y. Bian ◽  
B.X. Zhang ◽  
W.S. Rong

A massive campaign on "Love Teeth Day" (LTD) has been celebrated nationwide each year in China since 1989. As announced in an official document, nine government and non-government organizations have jointly issued a circular designating that the 20th of September of each year be kept for the Love Teeth Festival in this country. The main activities were planned and conducted by the National Committee for Oral Health, which was set up in 1988. It aims to motivate the people's awareness of dental self-care, participation, and to promote community involvement in oral health education programs. For feedback, two types of questionnaires were designed and sent to the public and the organizers, respectively, after each campaign, and then returned to the office for data processing. The findings from a four-year study indicated that: (1) The activities started from three municipalities, 29 capitals of provinces, and some large cities (1989), and spread to most cities in the urban area, and about 300 counties in the rural area (1992); (2) 14,000 dental professionals and health workers participated in 1989 as information providers, and increased to 40,000 in 1992; (3) oral health knowledge has increased to 76.2% (1992) from 37% (1989); and (4) the people's will in dental prevention was strengthened.


Sign in / Sign up

Export Citation Format

Share Document