Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 15 of 15

Full-Text Articles in Entire DC Network

Prediction Of Nocturia In Live Alone Elderly Using Unobtrusive In-Home Sensors, Barry Nuqoba, Hwee-Pink Tan Dec 2020

Prediction Of Nocturia In Live Alone Elderly Using Unobtrusive In-Home Sensors, Barry Nuqoba, Hwee-Pink Tan

Research Collection School Of Computing and Information Systems

Nocturia, or the need to void (or urinate) one or more times in the middle of night time sleeping, represents a significant economic burden for individuals and healthcare systems. Although it can be diagnosed in the hospital, most people tend to regard nocturia as a usual event, resulting in underreported diagnosis and treatment. Data from self-reporting via a voiding diary may be irregular and subjective especially among the elderly due to memory problems. This study aims to detect the presence of nocturia through passive in-home monitoring to inform intervention (e.g., seeking diagnosis and treatment) to improve the physical and mental …


Security, Privacy And Trust For Smart Mobile- Internet Of Things (M-Iot): A Survey, Vishal Sharma, Ilsun You, Karl Andersson, Francesco Palmieri, Mubashir Husain Rehmani, Jaedeock Lim Sep 2020

Security, Privacy And Trust For Smart Mobile- Internet Of Things (M-Iot): A Survey, Vishal Sharma, Ilsun You, Karl Andersson, Francesco Palmieri, Mubashir Husain Rehmani, Jaedeock Lim

Publications

With an enormous range of applications, the Internet of Things (IoT) has magnetized industries and academicians from everywhere. IoT facilitates operations through ubiquitous connectivity by providing Internet access to all the devices with computing capabilities. With the evolution of wireless infrastructure, the focus from simple IoT has been shifted to smart, connected and mobile IoT (M-IoT) devices and platforms, which can enable low-complexity, low-cost and efficient computing through sensors, machines, and even crowdsourcing. All these devices can be grouped under a common term of M-IoT. Even though the positive impact on applications has been tremendous, security, privacy and trust are …


Big Data Energy Management, Analytics And Visualization For Residential Areas, Ragini Gupta, A. R. Al-Ali, Imran A. Zualkernan, Sajal K. Das Aug 2020

Big Data Energy Management, Analytics And Visualization For Residential Areas, Ragini Gupta, A. R. Al-Ali, Imran A. Zualkernan, Sajal K. Das

Computer Science Faculty Research & Creative Works

With the rapid development of IoT based home appliances, it has become a possibility that home owners share with Utilities in the management of home appliances energy consumption. Thus, the proposed work empowers home owners to manage their home appliances energy consumption and allow them to compare their consumption with respect to their local community total consumption. This serves as a nudge in consumer's behavior to schedule their home appliances operation according to their local community consumption profile and trend. Utilizing the same common communication infrastructure, it also allows the utilities on different consumption levels (community, state, country) to monitor …


Routing Optimization In Heterogeneous Wireless Networks For Space And Mission-Driven Internet Of Things (Iot) Environments, Sara El Alaoui Aug 2020

Routing Optimization In Heterogeneous Wireless Networks For Space And Mission-Driven Internet Of Things (Iot) Environments, Sara El Alaoui

Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research

As technological advances have made it possible to build cheap devices with more processing power and storage, and that are capable of continuously generating large amounts of data, the network has to undergo significant changes as well. The rising number of vendors and variety in platforms and wireless communication technologies have introduced heterogeneity to networks compromising the efficiency of existing routing algorithms. Furthermore, most of the existing solutions assume and require connection to the backbone network and involve changes to the infrastructures, which are not always possible -- a 2018 report by the Federal Communications Commission shows that over 31% …


Iot-Enabled Eldercare Technology, Watchanan Chantapakul Aug 2020

Iot-Enabled Eldercare Technology, Watchanan Chantapakul

English Language Institute

The world’s population is changing as people are growing older. Leveraging technology for eldercare is important in this century. It can enable many eldercare applications effectively.


An Energy Efficient Routing Approach For Iot Enabled Underwater Wsns In Smart Cities, Nighat Usman, Omar Alfandi, Saeeda Usman, Asad Masood Khattak, Muhammad Awais, Bashir Hayat, Ahthasham Sajid Aug 2020

An Energy Efficient Routing Approach For Iot Enabled Underwater Wsns In Smart Cities, Nighat Usman, Omar Alfandi, Saeeda Usman, Asad Masood Khattak, Muhammad Awais, Bashir Hayat, Ahthasham Sajid

All Works

© 2020 by the authors. Licensee MDPI, Basel, Switzerland. Nowadays, there is a growing trend in smart cities. Therefore, Terrestrial and Internet of Things (IoT) enabled Underwater Wireless Sensor Networks (TWSNs and IoT-UWSNs) are mostly used for observing and communicating via smart technologies. For the sake of collecting the desired information from the underwater environment, multiple acoustic sensors are deployed with limited resources, such as memory, battery, processing power, transmission range, etc. The replacement of resources for a particular node is not feasible due to the harsh underwater environment. Thus, the resources held by the node needs to be used …


Lightweight And Privacy-Aware Fine-Grained Access Control For Iot-Oriented Smart Health, Jianfei Sun, Hu Xiong, Ximeng Liu, Yinghui Zhang, Xuyun Nie, Robert H. Deng Jul 2020

Lightweight And Privacy-Aware Fine-Grained Access Control For Iot-Oriented Smart Health, Jianfei Sun, Hu Xiong, Ximeng Liu, Yinghui Zhang, Xuyun Nie, Robert H. Deng

Research Collection School Of Computing and Information Systems

With the booming of Internet of Things (IoT), smart health (s-health) is becoming an emerging and attractive paradigm. It can provide an accurate prediction of various diseases and improve the quality of healthcare. Nevertheless, data security and user privacy concerns still remain issues to be addressed. As a high potential and prospective solution to secure IoT-oriented s-health applications, ciphertext policy attribute-based encryption (CP-ABE) schemes raise challenges, such as heavy overhead and attribute privacy of the end users. To resolve these drawbacks, an optimized vector transformation approach is first proposed to efficiently transform the access policy and user attribute set into …


Denial Of Service Attack Detection Through Machine Learning For The Iot, Naeem Firdous Syed, Zubair Baig, Ahmed Ibrahim, Craig Valli Jun 2020

Denial Of Service Attack Detection Through Machine Learning For The Iot, Naeem Firdous Syed, Zubair Baig, Ahmed Ibrahim, Craig Valli

Research outputs 2014 to 2021

Sustained Internet of Things (IoT) deployment and functioning are heavily reliant on the use of effective data communication protocols. In the IoT landscape, the publish/subscribe-based Message Queuing Telemetry Transport (MQTT) protocol is popular. Cyber security threats against the MQTT protocol are anticipated to increase at par with its increasing use by IoT manufacturers. In particular, IoT is vulnerable to protocol-based Application layer Denial of Service (DoS) attacks, which have been known to cause widespread service disruption in legacy systems. In this paper, we propose an Application layer DoS attack detection framework for the MQTT protocol and test the scheme on …


Editing-Enabled Signatures: A New Tool For Editing Authenticated Data, Binanda Sengupta, Yingjiu Li, Yangguang Tian, Robert H. Deng Jun 2020

Editing-Enabled Signatures: A New Tool For Editing Authenticated Data, Binanda Sengupta, Yingjiu Li, Yangguang Tian, Robert H. Deng

Research Collection School Of Computing and Information Systems

Data authentication primarily serves as a tool to achieve data integrity and source authentication. However, traditional data authentication does not fit well where an intermediate entity (editor) is required to modify the authenticated data provided by the source/data owner before sending the data to other recipients. To ask the data owner for authenticating each modified data can lead to higher communication overhead. In this article, we introduce the notion of editing-enabled signatures where the data owner can choose any set of modification operations applicable on the data and still can restrict any possibly untrusted editor to authenticate the data modified …


How Secure Having Iot Devices In Our Homes?, Debora Estrada, Lo'ai A. Tawalbeh, Robert Vinaja Mar 2020

How Secure Having Iot Devices In Our Homes?, Debora Estrada, Lo'ai A. Tawalbeh, Robert Vinaja

Computer Science Faculty Publications

Nowadays, technology has evolved to be in our daily lives to assist in making our lives easier. We now have technology helping us in our lives at home. Devices used to create our “smart home” have done a great deal in making our lives at home less burdensome, but sadly, these devices have secured our personal lives to be more accessible to outsiders. In this paper, the security of home smart devices and their communication will be researched by using other academic articles to support facts found. The operation of the devices will be discussed along with security risks and …


Edge-Cloud Computing For Iot Data Analytics: Embedding Intelligence In The Edge With Deep Learning, Ananda Mohon M. Ghosh, Katarina Grolinger Jan 2020

Edge-Cloud Computing For Iot Data Analytics: Embedding Intelligence In The Edge With Deep Learning, Ananda Mohon M. Ghosh, Katarina Grolinger

Electrical and Computer Engineering Publications

Rapid growth in numbers of connected devices including sensors, mobile, wearable, and other Internet of Things (IoT) devices, is creating an explosion of data that are moving across the network. To carry out machine learning (ML), IoT data are typically transferred to the cloud or another centralized system for storage and processing; however, this causes latencies and increases network traffic. Edge computing has the potential to remedy those issues by moving computation closer to the network edge and data sources. On the other hand, edge computing is limited in terms of computational power and thus is not well suited for …


A Tutorial And Future Research For Building A Blockchain-Based Secure Communication Scheme For Internet Of Intelligent Things, Mohammad Wazid, Ashok Kumar Das, Sachin Shetty, Minho Jo Jan 2020

A Tutorial And Future Research For Building A Blockchain-Based Secure Communication Scheme For Internet Of Intelligent Things, Mohammad Wazid, Ashok Kumar Das, Sachin Shetty, Minho Jo

Computational Modeling & Simulation Engineering Faculty Publications

The Internet of Intelligent Things (IoIT) communication environment can be utilized in various types of applications (for example, intelligent battlefields, smart healthcare systems, the industrial internet, home automation, and many more). Communications that happen in such environments can have different types of security and privacy issues, which can be resolved through the utilization of blockchain. In this paper, we propose a tutorial that aims in desiging a generalized blockchain-based secure authentication key management scheme for the IoIT environment. Moreover, some issues with using blockchain for a communication environment are discussed as future research directions. The details of different types of …


Smart Communities: From Sensors To Internet Of Things And To A Marketplace Of Services, Stephan Olariu, Nirwan Ansari (Editor), Andreas Ahrens (Editor), Cesar Benavente-Preces (Editor) Jan 2020

Smart Communities: From Sensors To Internet Of Things And To A Marketplace Of Services, Stephan Olariu, Nirwan Ansari (Editor), Andreas Ahrens (Editor), Cesar Benavente-Preces (Editor)

Computer Science Faculty Publications

Our paper was inspired by the recent Society 5.0 initiative of the Japanese Government that seeks to create a sustainable human-centric society by putting to work recent advances in technology: sensor networks, edge computing, IoT ecosystems, AI, Big Data, robotics, to name just a few. The main contribution of this work is a vision of how these technological advances can contribute, directly or indirectly, to making Society 5.0 reality. For this purpose we build on a recently-proposed concept of Marketplace of Services that, in our view, will turn out to be one of the cornerstones of Society 5.0. Instead of …


Blockchain Based End-To-End Tracking System For Distributed Iot Intelligence Application Security Enhancement, Lei Xu, Zhimin Gao, Xinxin Fan, Lin Chen, Hanyee Kim, Taeweon Suh, Weidong Shi Jan 2020

Blockchain Based End-To-End Tracking System For Distributed Iot Intelligence Application Security Enhancement, Lei Xu, Zhimin Gao, Xinxin Fan, Lin Chen, Hanyee Kim, Taeweon Suh, Weidong Shi

Computer Science Faculty Publications and Presentations

IoT devices provide a rich data source that is not available in the past, which is valuable for a wide range of intelligence applications, especially deep neural network (DNN) applications that are data-thirsty. An established DNN model in turn provides useful analysis results that can improve the operation of IoT systems. The progress in distributed/federated DNN training further unleashes the potential of integration of IoT and intelligence applications. When a large number of IoT devices deployed in different physical locations, distributed training allows training modules to be deployed to multiple edge data centers that are close to the IoT devices …


Quantifying The Need For Supervised Machine Learning In Conducting Live Forensic Analysis Of Emergent Configurations (Eco) In Iot Environments, Victor R. Kebande, Richard A. Ikuesan, Nickson M. Karie, Sadi Alawadi, Kim-Kwang Raymond Choo, Arafat Al-Dhaqm Jan 2020

Quantifying The Need For Supervised Machine Learning In Conducting Live Forensic Analysis Of Emergent Configurations (Eco) In Iot Environments, Victor R. Kebande, Richard A. Ikuesan, Nickson M. Karie, Sadi Alawadi, Kim-Kwang Raymond Choo, Arafat Al-Dhaqm

Research outputs 2014 to 2021

© 2020 The Author(s) Machine learning has been shown as a promising approach to mine larger datasets, such as those that comprise data from a broad range of Internet of Things devices, across complex environment(s) to solve different problems. This paper surveys existing literature on the potential of using supervised classical machine learning techniques, such as K-Nearest Neigbour, Support Vector Machines, Naive Bayes and Random Forest algorithms, in performing live digital forensics for different IoT configurations. There are also a number of challenges associated with the use of machine learning techniques, as discussed in this paper.