use cases
Recently Published Documents


TOTAL DOCUMENTS

2650
(FIVE YEARS 1259)

H-INDEX

37
(FIVE YEARS 16)

2022 ◽  
Vol 13 (2) ◽  
pp. 1-22
Author(s):  
Tomasz Miksa ◽  
Simon Oblasser ◽  
Andreas Rauber

Many research funders mandate researchers to create and maintain data management plans (DMPs) for research projects that describe how research data is managed to ensure its reusability. A DMP, being a static textual document, is difficult to act upon and can quickly become obsolete and impractical to maintain. A new generation of machine-actionable DMPs (maDMPs) was therefore proposed by the Research Data Alliance to enable automated integration of information and updates. maDMPs open up a variety of use cases enabling interoperability of research systems and automation of data management tasks. In this article, we describe a system for machine-actionable data management planning in an institutional context. We identify common use cases within research that can be automated to benefit from machine-actionability of DMPs. We propose a reference architecture of an maDMP support system that can be embedded into an institutional research data management infrastructure. The system semi-automates creation and maintenance of DMPs, and thus eases the burden for the stakeholders responsible for various DMP elements. We evaluate the proposed system in a case study conducted at the largest technical university in Austria and quantify to what extent the DMP templates provided by the European Commission and a national funding body can be pre-filled. The proof-of-concept implementation shows that maDMP workflows can be semi-automated, thus workload on involved parties can be reduced and quality of information increased. The results are especially relevant to decision makers and infrastructure operators who want to design information systems in a systematic way that can utilize the full potential of maDMPs.


2022 ◽  
Vol 54 (9) ◽  
pp. 1-37
Author(s):  
Pasika Ranaweera ◽  
Anca Jurcut ◽  
Madhusanka Liyanage

The future of mobile and internet technologies are manifesting advancements beyond the existing scope of science. The concepts of automated driving, augmented-reality, and machine-type-communication are quite sophisticated and require an elevation of the current mobile infrastructure for launching. The fifth-generation (5G) mobile technology serves as the solution, though it lacks a proximate networking infrastructure to satisfy the service guarantees. Multi-access Edge Computing (MEC) envisages such an edge computing platform. In this survey, we are revealing security vulnerabilities of key 5G-based use cases deployed in the MEC context. Probable security flows of each case are specified, while countermeasures are proposed for mitigating them.


2022 ◽  
Vol 54 (8) ◽  
pp. 1-41
Author(s):  
Rafael Belchior ◽  
André Vasconcelos ◽  
Sérgio Guerreiro ◽  
Miguel Correia

Blockchain interoperability is emerging as one of the crucial features of blockchain technology, but the knowledge necessary for achieving it is fragmented. This fact makes it challenging for academics and the industry to achieve interoperability among blockchains seamlessly. Given this new domain’s novelty and potential, we conduct a literature review on blockchain interoperability by collecting 284 papers and 120 grey literature documents, constituting a corpus of 404 documents. From those 404 documents, we systematically analyzed and discussed 102 documents, including peer-reviewed papers and grey literature. Our review classifies studies in three categories: Public Connectors, Blockchain of Blockchains, and Hybrid Connectors. Each category is further divided into sub-categories based on defined criteria. We classify 67 existing solutions in one sub-category using the Blockchain Interoperability Framework, providing a holistic overview of blockchain interoperability. Our findings show that blockchain interoperability has a much broader spectrum than cryptocurrencies and cross-chain asset transfers. Finally, this article discusses supporting technologies, standards, use cases, open challenges, and future research directions, paving the way for research in the area.


2022 ◽  
Vol 134 ◽  
pp. 104054
Author(s):  
Barbara Schiavi ◽  
Vincent Havard ◽  
Karim Beddiar ◽  
David Baudry
Keyword(s):  

2022 ◽  
Vol 20 (2) ◽  
pp. 198-207
Author(s):  
Bruno Luiz Casarotto ◽  
Gustavo Cesar Lopes Geraldino ◽  
Victor Francisco Araya Santander ◽  
Ivonei Freitas da Silva ◽  
Marco Antonio Toranzo Cespedes
Keyword(s):  

2022 ◽  
Vol 10 (1) ◽  
pp. 112
Author(s):  
Konrad Wolsing ◽  
Linus Roepert ◽  
Jan Bauer ◽  
Klaus Wehrle

The automatic identification system (AIS) was introduced in the maritime domain to increase the safety of sea traffic. AIS messages are transmitted as broadcasts to nearby ships and contain, among others, information about the identification, position, speed, and course of the sending vessels. AIS can thus serve as a tool to avoid collisions and increase onboard situational awareness. In recent years, AIS has been utilized in more and more applications since it enables worldwide surveillance of virtually any larger vessel and has the potential to greatly support vessel traffic services and collision risk assessment. Anomalies in AIS tracks can indicate events that are relevant in terms of safety and also security. With a plethora of accessible AIS data nowadays, there is a growing need for the automatic detection of anomalous AIS data. In this paper, we survey 44 research articles on anomaly detection of maritime AIS tracks. We identify the tackled AIS anomaly types, assess their potential use cases, and closely examine the landscape of recent AIS anomaly research as well as their limitations.


2022 ◽  
Author(s):  
Demos Serghiou ◽  
Mohsen Khalily ◽  
Tim Brown ◽  
Rahim Tafazolli

The Terahertz (THz) band (0.1-3.0 THz) spans a great portion of the Radio Frequency (RF) spectrum that is mostly unoccupied and unregulated. It is a potential candidate for application in Sixth-Generation (6G) wireless networks as it has the capabilities of satisfying the high data rate and capacity requirements of future wireless communication systems. Profound knowledge of the propagation channel is crucial in communication systems design which nonetheless, is still at its infancy as channel modeling at THz frequencies has been mostly limited to characterizing fixed Point-to-Point (P2P) scenarios up to 300 GHz. Provided the technology matures enough and models adapt to the distinctive characteristics of the THz wave, future wireless communications systems will enable a plethora of new use cases and applications to be realized in addition to delivering higher spectral efficiencies that would ultimately enhance the Quality-of-Service (QoS) to the end user. In this paper, we provide an insight into THz channel propagation characteristics, measurement capabilities and modeling methods along with recommendations that will aid in the development of future models in the THz band. We survey the most recent and important measurement campaigns and modeling efforts found in literature based on the use cases and system requirements identified. Finally, we discuss the challenges and limitations of measurements and modeling at such high frequencies and contemplate the future research outlook toward realizing the 6G vision.


2022 ◽  
Author(s):  
Demos Serghiou ◽  
Mohsen Khalily ◽  
Tim Brown ◽  
Rahim Tafazolli

The Terahertz (THz) band (0.1-3.0 THz) spans a great portion of the Radio Frequency (RF) spectrum that is mostly unoccupied and unregulated. It is a potential candidate for application in Sixth-Generation (6G) wireless networks as it has the capabilities of satisfying the high data rate and capacity requirements of future wireless communication systems. Profound knowledge of the propagation channel is crucial in communication systems design which nonetheless, is still at its infancy as channel modeling at THz frequencies has been mostly limited to characterizing fixed Point-to-Point (P2P) scenarios up to 300 GHz. Provided the technology matures enough and models adapt to the distinctive characteristics of the THz wave, future wireless communications systems will enable a plethora of new use cases and applications to be realized in addition to delivering higher spectral efficiencies that would ultimately enhance the Quality-of-Service (QoS) to the end user. In this paper, we provide an insight into THz channel propagation characteristics, measurement capabilities and modeling methods along with recommendations that will aid in the development of future models in the THz band. We survey the most recent and important measurement campaigns and modeling efforts found in literature based on the use cases and system requirements identified. Finally, we discuss the challenges and limitations of measurements and modeling at such high frequencies and contemplate the future research outlook toward realizing the 6G vision.


Energies ◽  
2022 ◽  
Vol 15 (2) ◽  
pp. 452
Author(s):  
Nour Alhuda Sulieman ◽  
Lorenzo Ricciardi Celsi ◽  
Wei Li ◽  
Albert Zomaya ◽  
Massimo Villari

Edge computing is a distributed computing paradigm such that client data are processed at the periphery of the network, as close as possible to the originating source. Since the 21st century has come to be known as the century of data due to the rapid increase in the quantity of exchanged data worldwide (especially in smart city applications such as autonomous vehicles), collecting and processing such data from sensors and Internet of Things devices operating in real time from remote locations and inhospitable operating environments almost anywhere in the world is a relevant emerging need. Indeed, edge computing is reshaping information technology and business computing. In this respect, the paper is aimed at providing a comprehensive overview of what edge computing is as well as the most relevant edge use cases, tradeoffs, and implementation considerations. In particular, this review article is focused on highlighting (i) the most recent trends relative to edge computing emerging in the research field and (ii) the main businesses that are taking operations at the edge as well as the most used edge computing platforms (both proprietary and open source). First, the paper summarizes the concept of edge computing and compares it with cloud computing. After that, we discuss the challenges of optimal server placement, data security in edge networks, hybrid edge-cloud computing, simulation platforms for edge computing, and state-of-the-art improved edge networks. Finally, we explain the edge computing applications to 5G/6G networks and industrial internet of things. Several studies review a set of attractive edge features, system architectures, and edge application platforms that impact different industry sectors. The experimental results achieved in the cited works are reported in order to prove how edge computing improves the efficiency of Internet of Things networks. On the other hand, the work highlights possible vulnerabilities and open issues emerging in the context of edge computing architectures, thus proposing future directions to be investigated.


2022 ◽  
Vol 11 (1) ◽  
pp. 5
Author(s):  
Njabulo Sakhile Mtetwa ◽  
Paul Tarwireyi ◽  
Cecilia Nombuso Sibeko ◽  
Adnan Abu-Mahfouz ◽  
Matthew Adigun

The Internet of Things (IoT) is changing the way consumers, businesses, and governments interact with the physical and cyber worlds. More often than not, IoT devices are designed for specific functional requirements or use cases without paying too much attention to security. Consequently, attackers usually compromise IoT devices with lax security to retrieve sensitive information such as encryption keys, user passwords, and sensitive URLs. Moreover, expanding IoT use cases and the exponential growth in connected smart devices significantly widen the attack surface. Despite efforts to deal with security problems, the security of IoT devices and the privacy of the data they collect and process are still areas of concern in research. Whenever vulnerabilities are discovered, device manufacturers are expected to release patches or new firmware to fix the vulnerabilities. There is a need to prioritize firmware attacks, because they enable the most high-impact threats that go beyond what is possible with traditional attacks. In IoT, delivering and deploying new firmware securely to affected devices remains a challenge. This study aims to develop a security model that employs Blockchain and the InterPlanentary File System (IPFS) to secure firmware transmission over a low data rate, constrained Long-Range Wide Area Network (LoRaWAN). The proposed security model ensures integrity, confidentiality, availability, and authentication and focuses on resource-constrained low-powered devices. To demonstrate the utility and applicability of the proposed model, a proof of concept was implemented and evaluated using low-powered devices. The experimental results show that the proposed model is feasible for constrained and low-powered LoRaWAN devices.


Sign in / Sign up

Export Citation Format

Share Document