A Geo-Political Analysis

Chapter 5 examines issues currently being encountered in the Middle East that demonstrate a cross-over between electronic warfare and cyber-warfare activities, affecting not only typical targets over the internet but also ships, aircraft, and unmanned aerial vehicles during the second decade of the new millennium. This overview provides examples of how cyber-warfare techniques are now being used in the battle space domain to affect geo-political situations within regions. The evidence shows how the cyber domain can influence real-life situations, taking its capabilities progressively just that one step further to hacker and state-sponsored cyber-attacks already witnessed against ICS cyber-physical assets. The viewpoint here draws upon historical stimuli and escalating political tensions now being encountered by opposing nations that could have a wider reaching impact.

2020 ◽  
Vol 20 (13) ◽  
pp. 7460-7471 ◽  
Author(s):  
Mohammad Javad Sobouti ◽  
Zahra Rahimi ◽  
Amir Hossein Mohajerzadeh ◽  
Seyed Amin Hosseini Seno ◽  
Reza Ghanbari ◽  
...  

Sensors ◽  
2020 ◽  
Vol 20 (19) ◽  
pp. 5586
Author(s):  
Shreya Khisa ◽  
Sangman Moh

The Internet of Things (IoT), which consists of a large number of small low-cost devices, has become a leading solution for smart cities, smart agriculture, smart buildings, smart grids, e-healthcare, etc. Integrating unmanned aerial vehicles (UAVs) with IoT can result in an airborne UAV-based IoT (UIoT) system and facilitate various value-added services from sky to ground. In addition to wireless sensors, various kinds of IoT devices are connected in UIoT, making the network more heterogeneous. In a UIoT system, for achieving high throughput in an energy-efficient manner, it is crucial to design an efficient medium access control (MAC) protocol because the MAC layer is responsible for coordinating access among the IoT devices in the shared wireless medium. Thus, various MAC protocols with different objectives have been reported for UIoT. However, to the best of the authors’ knowledge, no survey had been performed so far that dedicatedly covers MAC protocols for UIoT. Hence, in this study, state-of-the-art MAC protocols for UIoT are investigated. First, the communication architecture and important design considerations of MAC protocols for UIoT are examined. Subsequently, different MAC protocols for UIoT are classified, reviewed, and discussed with regard to the main ideas, innovative features, advantages, limitations, application domains, and potential future improvements. The reviewed MAC protocols are qualitatively compared with regard to various operational characteristics and system parameters. Additionally, important open research issues and challenges with recommended solutions are summarized and discussed.


2019 ◽  
Vol 44 (1) ◽  
Author(s):  
Sibi Chakkaravarthy Sethuraman ◽  
Vaidehi Vijayakumar ◽  
Steven Walczak

2021 ◽  
Author(s):  
Ruba Alkadi ◽  
Abdulhadi Shoufan

Unmanned aerial vehicles (UAVs) are gaining immense attention due to their potential to revolutionize various businesses and industries. However, the adoption of UAV-assisted applications will strongly rely on the provision of reliable systems that allow managing UAV operations at high levels of safety and security. Recently, the concept of UAV traffic management (UTM) has been introduced to support safe, efficient, and fair access to low-altitude airspace for commercial UAVs. A UTM system identifies multiple cooperating parties with different roles and levels of authority to provide real-time services to airspace users. However, current UTM systems are centralized and lack a clear definition of protocols that govern a secure interaction between authorities, service providers, and end-users. The lack of such protocols renders the UTM system unscalable and prone to various cyber attacks. Another limitation of the currently proposed UTM architecture is the absence of an efficient mechanism to enforce airspace rules and regulations. To address this issue, we propose a decentralized UTM protocol that controls access to airspace while ensuring high levels of integrity, availability, and confidentiality of airspace operations. To achieve this, we exploit key features of the blockchain and smart contract technologies. In addition, we employ a mobile crowdsensing (MCS) mechanism to seamlessly enforce airspace rules and regulations that govern the UAV operations. The solution is implemented on top of the Etheruem platform and verified using four different smart contract verification tools. We also provided a security and cost analysis of our solution. For reproducibility, we made our implementation publicly available on Github


2021 ◽  
Vol 5 (2) ◽  
pp. 197-208
Author(s):  
Nurhattati Nurhattati ◽  
Rihlah Nuraulia ◽  
Faisal M. Jasin ◽  
Santi Anugrahsari

This study aims to analyze the empowerment of students through the Internet Of Think-based E-Farming, which was conducted at the Ittifaq eco-Islamic boarding school in Bandung. The methodology in this study uses qualitative methods. Through a qualitative approach, several things were found; first, ittifaq Islamic boarding school Bandung, is a role model for empowering e-Farming students based on the Internet Of Think (IoT); second, empowerment of students is carried out through the steps of the empowerment process, starting with collecting state data, analyzing state data, identifying problems, selecting problems to solve. Solved, and formulation the objectives of the Ittifaq eco-Islamic boarding school problem. The empowerment of E-Farming students based on the Internet Of Think is carried out through three stages of empowerment: training programs, collaboration, and groups. Third, the Internet Of Think-based santri E-farming empowerment model carried out by the Ittifaq Islamic boarding school including using the precision farming model, the use of unmanned aerial vehicles (UAV), and Smart GreenHouse.


Sign in / Sign up

Export Citation Format

Share Document