Security, Privacy, and Trust for Pervasive Computing Applications

Author(s):  
Sheikh I. Ahamed ◽  
Mohammad Zulkernine ◽  
Munirul M. Haque

Pervasive computing has progressed significantly during this decade due to the developments and advances in portable, low-cost, and light-weight devices along with the emergence of short range and low-power wireless communication networks. Pervasive computing focuses on combining computing and communications with the surrounding physical environment to make computing and communication transparent to the users in day-to-day activities. In pervasive computing, numerous, casually accessible, often invisible, frequently mobile or embedded devices form an ad-hoc network that occasionally connects to fixed networks structure too. These pervasive computing devices often collect information about the surrounding environment using various sensors. Pervasive computing has the inherent disadvantages of slow, expensive connections, frequent line disconnections, limited host bandwidth, location dependent data, and so forth. These challenges make pervasive computing applications more vulnerable to various security-related threats. However, traditional security measures do not fit well in pervasive computing applications. Since location and context are key attributes of pervasive computing applications, privacy issues need to be handled in a sophisticated manner. The devices in a pervasive computing network leave and join in an ad-hoc manner. This device behavior creates a need for new trust models for pervasive computing applications. In this chapter, we address the challenges and requirements of security, privacy, and trust for pervasive applications. We also discuss the state-of-the-art of pervasive security, privacy, and trust along with some open issues.

Author(s):  
Ji-Eun Joo ◽  
Haewon Hwang ◽  
Yujin Jeon ◽  
Jaewon Jung ◽  
Yu Hu ◽  
...  

: This paper presents a couple of meal monitoring systems for senile dementia patients by using electronic weight and temperature sensors. These monitoring systems enable to convey the information of the amount of meal taken by the patients in real-time via wireless communication networks onto the mobile phones of their families or nurses in charge. Thereby, the nurses can easily spot the most desperate patient to take care of while the families can have relief to see the crucial information for survival of their parents at least three times a day. Meanwhile, the senile dementia patients tend to suffer the burn of their tongues because they can hardly recognize the temperature of hot meals served and therefore avoid the burn of tongues. This phenomenon can be discarded by utilizing the meal temperature monitoring system which displays alarm to the patients when the meal temperature is above the reference. These meal monitoring systems can be easily implemented by utilizing low-cost sensor chips and Arduino UNO boards so that elder-care hospitals and nursing homes can afford to exploit them with no additional cost. Hence, we believe that the proposed monitoring systems would be a potential solution to provide a great help and relief not only for the professional nursing nurses working in elder-care hospitals and nursing homes, but also for the families of the dementia patients.


Author(s):  
Yu Hu ◽  
Ji-Eun Joo ◽  
Eunju Choi ◽  
Leeho Yoo ◽  
Dukyoo Jung ◽  
...  

This paper presents a few meal-monitoring systems for elder residents (especially patients) in LTCFs by using electronic weight and temperature sensors. These monitoring systems enable to convey the information of the amount of meal taken by the patients in real-time via wireless communication networks onto the mobile phones of their nurses in charge or families. Thereby, the nurses can easily spot the most patients who need immediate assistance, while the families can have relief in seeing the crucial information for the well-being of their parents at least three times a day. Meanwhile, the patients tend to suffer burns of their tongues because they can hardly recognize the temperature of hot meals served. This situation can be avoided by utilizing the meal temperature-monitoring system, which displays an alarm to the patients when the meal temperature is above the reference. These meal-monitoring systems can be easily implemented by utilizing low-cost sensor chips and Arduino NANO boards so that elder-care hospitals and nursing homes can afford to exploit them with no additional cost. Hence, we believe that the proposed monitoring systems would be a potential solution to provide a great help and relief for the professional nurses working in elder-care hospitals and nursing homes.


2021 ◽  
Author(s):  
Gayathri VM ◽  
Supraja p ◽  
Razia Sulthana A ◽  
Mukunthan P

Abstract Security plays a vital role in communication networks. Since the nodes are mobile in Mobile Ad-hoc Networks (MANET), they are vulnerable to different types of attacks. Because of its mobility nature any node can enter the network at any time based on the coverage of the network. No centralized mechanism is found to verify or authenticate the nodes that are arriving/leaving the network. An algorithm is proposed for secure communication between source and destination based on the QoS parameters is called Modified Device Key Generation Algorithm (MDKGA). This algorithm elects an agent node based on the QoS parameters. Agent node is responsible for secure key generation and distribution of keys among the nodes. The neighboring node selection is based on trust value which acts as a heuristic function to select the node using A* algorithm.Various performance metrics are also analyzed. Comparison study has been carried out between the protocols of MANET.


Sensors ◽  
2021 ◽  
Vol 21 (8) ◽  
pp. 2717
Author(s):  
Ricardo M. R. Adão ◽  
Eduardo Balvís ◽  
Alicia V. Carpentier ◽  
Humberto Michinel ◽  
Jana B. Nieder

The age of the Internet of Things (IoT) and smart cities calls for low-power wireless communication networks, for which the Long-Range (LoRa) is a rising star. Efficient network engineering requires the accurate prediction of the Received Signal Strength Indicator (RSSI) spatial distribution. However, the most commonly used models either lack the physical accurateness, resolution, or versatility for cityscape real-world building distribution-based RSSI predictions. For this purpose, we apply the 2D electric field wave-propagation Oscillator Finite-Difference Time-Domain (O-FDTD) method, using the complex dielectric permittivity to model reflection and absorption effects by concrete walls and the receiver sensitivity as the threshold to obtain a simulated coverage area in a 600 × 600 m2 square. Further, we report a simple and low-cost method to experimentally determine the signal coverage area based on mapping communication response-time delays. The simulations show a strong building influence on the RSSI, compared against the Free-Space Path (FSPL) model. We obtain a spatial overlap of 84% between the O-FDTD simulated and experimental signal coverage maps. Our proof-of-concept approach is thoroughly discussed compared to previous works, outlining error sources and possible future improvements. O-FDTD is demonstrated to be most promising for both indoors and outdoors applications and presents a powerful tool for IoT and smart city planners.


Sensors ◽  
2019 ◽  
Vol 19 (10) ◽  
pp. 2318 ◽  
Author(s):  
Luis Manuel Fernández-Ahumada ◽  
Jose Ramírez-Faz ◽  
Marcos Torres-Romero ◽  
Rafael López-Luque

In recent decades, considerable efforts have been devoted to process automation in agriculture. Regarding irrigation systems, this demand has found several difficulties, including the lack of communication networks and the large distances to electricity supply points. With the recent implementation of LPWAN wireless communication networks (SIGFOX, LoraWan, and NBIoT), and the expanding market of electronic controllers based on free software and hardware (i.e., Arduino, Raspberry, ESP, etc.) with low energy requirements, new perspectives have appeared for the automation of agricultural irrigation networks. This paper presents a low-cost solution for automatic cloud-based irrigation. In this paper, it is proposed the design of a node network based on microcontroller ESP32-Lora and Internet connection through SIGFOX network. The results obtained show the stability and robustness of the designed system.


Author(s):  
Özge Cepheli ◽  
Güneş Karabulut Kurt

Physical layer (PHY) security has become an emerging area of research recently. Wireless networks use unguided medium as communication channels, so gathering wireless data transmission is easier when compared to traditional cable systems. With the rise of new security challenges, many different solutions have been offered and are being developed. However, maintaining security in wireless networks still remains a challenge. Secure transmission techniques in these networks are discussed throughout this chapter. PHY security measures, the secrecy rate, the secrecy capacity, and the outage secrecy rate are introduced. Security needs of wireless networks are discussed and the related common attack types are described. Main countermeasures that are proposed to prevent these attacks are also presented with both practical and theoretical perspectives.


Author(s):  
Konstantinos B. Baltzis

A significant part of worldwide energy is consumed by the ICT infrastructure with wireless sector to be among the main contributors to this consumption. As a result, the rising energy costs and increasing carbon footprint of operating wireless communication networks have generated a keen interest in the design and development of “green” networks, that is, networks characterized by energy efficiency, reduced CO2 emissions, and low cost deployment. In this article, we discuss current issues and trends in green wireless networking. We explain the motivation behind it, discuss basic principles, review current trends in the field, and highlight upcoming challenges and future research directions. The aforementioned issues have been treated in detail in the scientific literature. However, the present study overviews current and future trends in green wireless networking with focus on providing an insight into the field that will be useful not only for experts but for non-specialists also.


2010 ◽  
Vol 2010 ◽  
pp. 1-7 ◽  
Author(s):  
Helal Chowdhury ◽  
Janne Lehtomäki ◽  
Juha-Pekka Mäkelä ◽  
Sastri Kota

Infostation, hotspot, and drive-thru internet are examples of sparse coverage-based wireless networks. These wireless communication networks provide low-cost, delay insensitive high data rate services intermittently with discontinuous coverage. Radio propagation parameters, velocity of the user, distance between the user, and access point are the key factors that affect the throughput and the amount of information downloaded from such sparse coverage-based wireless networks. To evaluate the performance of such wireless communication networks analytically the impact of above mentioned factors can be modeled with simplified relationship model such as received signal strength versus distance or signal to noise ratio versus throughput. In the paper, we exploit the relationship between throughput and distance and develop two throughput distance relationship models to evaluate the performance of multirate wireless networks. These two throughput distance relationship models are used in calculation of average throughput as well as downloaded file size. Numerical values are presented for the IEEE 802.11n standard. The numerical results verify that the new proposed technique can be used as an alternative to the simulations to evaluate the performance of sparse coverage-based wireless networks.


Sign in / Sign up

Export Citation Format

Share Document