Open Access. Powered by Scholars. Published by Universities.®

Digital Communications and Networking Commons

Open Access. Powered by Scholars. Published by Universities.®

Conference

Discipline
Institution
Keyword
Publication Year
Publication
File Type

Articles 1 - 30 of 163

Full-Text Articles in Digital Communications and Networking

A Design Science Approach To Investigating Decentralized Identity Technology, Janelle Krupicka Apr 2024

A Design Science Approach To Investigating Decentralized Identity Technology, Janelle Krupicka

Cybersecurity Undergraduate Research Showcase

The internet needs secure forms of identity authentication to function properly, but identity authentication is not a core part of the internet’s architecture. Instead, approaches to identity verification vary, often using centralized stores of identity information that are targets of cyber attacks. Decentralized identity is a secure way to manage identity online that puts users’ identities in their own hands and that has the potential to become a core part of cybersecurity. However, decentralized identity technology is new and continually evolving, which makes implementing this technology in an organizational setting challenging. This paper suggests that, in the future, decentralized identity …


Securing Edge Computing: A Hierarchical Iot Service Framework, Sajan Poudel, Nishar Miya, Rasib Khan Jan 2024

Securing Edge Computing: A Hierarchical Iot Service Framework, Sajan Poudel, Nishar Miya, Rasib Khan

Posters-at-the-Capitol

Title: Securing Edge Computing: A Hierarchical IoT Service Framework

Authors: Nishar Miya, Sajan Poudel, Faculty Advisor: Rasib Khan, Ph.D.

Department: School of Computing and Analytics, College of Informatics, Northern Kentucky University

Abstract:

Edge computing, a paradigm shift in data processing, faces a critical challenge: ensuring security in a landscape marked by decentralization, distributed nodes, and a myriad of devices. These factors make traditional security measures inadequate, as they cannot effectively address the unique vulnerabilities of edge environments. Our research introduces a hierarchical framework that excels in securing IoT-based edge services against these inherent risks.

Our secure by design approach prioritizes …


Motivations Driving Video Research Podcasts: Impact On Value And Creation Of Research Video Presentations, My Doan, Anh Tran, Na Le Jan 2024

Motivations Driving Video Research Podcasts: Impact On Value And Creation Of Research Video Presentations, My Doan, Anh Tran, Na Le

Posters-at-the-Capitol

Abstract

Purpose: The purpose of the study is to better understand the role and impact of video research podcasts in bridging the gap between academia and the general public, especially concerning the challenges of accessibility and comprehension of scholarly research.

Methods: A 10-question survey was administered to evaluate the effectiveness, utility, and acceptance of video recordings in research presentations. The survey also aimed to gather insights into the motivations, challenges, and benefits of using video podcasts for research dissemination. Results were then analyzed using the Unified Theory of Acceptance and Use of Technology (UTAUT) model.

Results: There were 102 respondents …


Data For Ai In Network Systems Workshop Report, Kuang-Ching Wang, Ron Hutchins, Anita Nikolich Oct 2023

Data For Ai In Network Systems Workshop Report, Kuang-Ching Wang, Ron Hutchins, Anita Nikolich

Workshop on Data for AI in Network Systems

No abstract provided.


Workshop On Data For Ai In Network Systems - Event Summary, Kuang-Ching Wang, Ron Hutchins, Anita Nikolich Oct 2023

Workshop On Data For Ai In Network Systems - Event Summary, Kuang-Ching Wang, Ron Hutchins, Anita Nikolich

Workshop on Data for AI in Network Systems

No abstract provided.


Encrypted Malicious Network Traffic Detection Using Machine Learning, Niklas Knipschild Apr 2023

Encrypted Malicious Network Traffic Detection Using Machine Learning, Niklas Knipschild

Symposium of Student Scholars

The research project aims to find ways to detect malicious packets inside encrypted network traffic. In addition to this goal maintaining user privacy is a priority. As encryption has become less expensive to implement more and more network traffic is encrypted. Currently, 90% of all network traffic is encrypted, and this trend is expected to increase. The creators of malware areemploying various methods to ensure delivery of their malware, including encryption. One proposed method to combat this suggests implementing machine learning with various algorithms to analyze packet attributes to determine if they contain malware, without actually knowing what's inside …


Ransomware: What Is Ransomware, And How To Prevent It, Brandon Chambers Apr 2023

Ransomware: What Is Ransomware, And How To Prevent It, Brandon Chambers

Cybersecurity Undergraduate Research Showcase

This research paper answers the question, “What is Ransomware, and How to prevent it?”. This paper will discuss what ransomware is, its history about ransomware, how ransomware attacks Windows systems, how to prevent ransomware, how to handle ransomware once it is already on the network, ideas for training professionals to avoid ransomware, and how anti-virus helps defend against ransomware. Many different articles, case studies, and professional blogs will be used to complete the research on this topic.


Leveraging Artificial Intelligence And Machine Learning For Enhanced Cybersecurity: A Proposal To Defeat Malware, Emmanuel Boateng Apr 2023

Leveraging Artificial Intelligence And Machine Learning For Enhanced Cybersecurity: A Proposal To Defeat Malware, Emmanuel Boateng

Cybersecurity Undergraduate Research Showcase

Cybersecurity is very crucial in the digital age in order to safeguard the availability, confidentiality, and integrity of data and systems. Mitigation techniques used in the industry include Multi-factor Authentication (MFA), Incident Response Planning (IRP), Security Information and Event Management (SIEM), and Signature-based and Heuristic Detection.

MFA is employed as an additional layer of protection in several sectors to help prevent unauthorized access to sensitive data. IRP is a plan in place to address cybersecurity problems efficiently and expeditiously. SIEM offers real-time analysis and alerts the system of threats and vulnerabilities. Heuristic-based detection relies on detecting anomalies when it comes …


The Rise And Risks Of Internet Of Things, Diamond E. Hicks Mar 2023

The Rise And Risks Of Internet Of Things, Diamond E. Hicks

Cybersecurity Undergraduate Research Showcase

Internet of Things (IoT) has become a necessary part of our everyday lives. IoT is the network in which many different devices communicate, connect, and share data. Though how IoT got to where it is today, the issues it faced, and how it affects our lives today is not common knowledge. Despite the fact that IoT has advanced our technology to what it is today, people do not completely understand what it does.


Integrated Organizational Machine Learning For Aviation Flight Data, Michael J. Pritchard, Paul Thomas, Eric Webb, Jon Martin, Austin Walden Jan 2023

Integrated Organizational Machine Learning For Aviation Flight Data, Michael J. Pritchard, Paul Thomas, Eric Webb, Jon Martin, Austin Walden

National Training Aircraft Symposium (NTAS)

An increased availability of data and computing power has allowed organizations to apply machine learning techniques to various fleet monitoring activities. Additionally, our ability to acquire aircraft data has increased due to the miniaturization of small form factor computing machines. Aircraft data collection processes contain many data features in the form of multivariate time-series (continuous, discrete, categorical, etc.) which can be used to train machine learning models. Yet, three major challenges still face many flight organizations 1) integration and automation of data collection frameworks, 2) data cleanup and preparation, and 3) embedded machine learning framework. Data cleanup and preparation has …


Disaster Area Lora Mesh Communications, Joel Bulkley Jan 2023

Disaster Area Lora Mesh Communications, Joel Bulkley

Posters-at-the-Capitol

In the aftermath of the December 2021 tornado disaster that swept through Western Kentucky causing 57 fatalities, 500+ critical injuries, and millions of dollars’ worth in damages, one of the first things that became apparent was the lack of communications and underlying power infrastructure. The goal of this project is to create a highly resilient LoRa mesh communications network utilizing low power, low cost, and easy to deploy radios to enable first responders in a disaster area to communicate their location and send critical information in a situation where traditional communications infrastructure has been destroyed or is otherwise unavailable. Through …


Developing A Web-Based System For Remote Collection And Analysis Of Vehicle Electrical Systems Over Canbus Using Carloop, Joshua N. Valle, Alex Columna-Fuentes Jan 2023

Developing A Web-Based System For Remote Collection And Analysis Of Vehicle Electrical Systems Over Canbus Using Carloop, Joshua N. Valle, Alex Columna-Fuentes

Capstone Showcase

Our program collects vehicle data using an OBD-II device called Carloop that is plugged into the vehicle's diagnostic port. The device executes our code which then communicates with the vehicle's onboard computer to collect data such as engine RPM, vehicle speed, fuel level, and other diagnostic information. This data is then sent over WiFi to Particle’s Cloud, which is a platform for managing IoT devices.

Integrations set up on Particle take care of sending data to our InfluxDB Database, which is hosted on our own cloud-based machine. InfluxDB is a high-performance time-series database that is optimized for storing and querying …


A Brief Review Of Dns, Root Servers, Vulnerabilities And Decentralization, Mallory Runyan Dec 2022

A Brief Review Of Dns, Root Servers, Vulnerabilities And Decentralization, Mallory Runyan

Cybersecurity Undergraduate Research Showcase

Since the 1980’s and creation of the World Wide Web, Internet utilization is a common and arguably, necessary, part of daily life. The internet is young and still relatively new, but as of 2016, 3.4 billion people were online, and that number has since grown [1]. This is a significant number, but as such a common part of daily life, how elements of the internet or its infrastructure work is complex. The world would very likely be thrown into dark ages if DNS or any other significant aspect of the internet's infrastructure were to succumb to an attack. The Colonial …


Rural Broadband Usage: Analyzing Satisfaction And Internet Speed Within The Rural Digital Divide, Angela Hollman, Tim Obermier, Jesse Andrews Oct 2022

Rural Broadband Usage: Analyzing Satisfaction And Internet Speed Within The Rural Digital Divide, Angela Hollman, Tim Obermier, Jesse Andrews

Mountain Plains Business Conference

No abstract provided.


Introduction To Pub/Sub Systems Using Opcua, Mete Isiksalan Aug 2022

Introduction To Pub/Sub Systems Using Opcua, Mete Isiksalan

Undergraduate Student Research Internships Conference

The purpose of the project was to learn and implement the fundamental basics of OPCUA system architecture using pub/sub systems. The system allows the users to create multiple different publishers and subscribers while accessing data from a local server and a primary HTTP server. The system is designed to be a multi-client and multi-server system to simulate real-life scenarios while having two different sources of generated values to send via sockets in OPCUA protocols, multiple different APIs were used for the clients on how they retrieve data as well.


Analysis Of The Internal Delays Of Various Wireless Technologies For Autonomous Vehicle Applications, Luanne Seaman Apr 2022

Analysis Of The Internal Delays Of Various Wireless Technologies For Autonomous Vehicle Applications, Luanne Seaman

Symposium of Student Scholars

Analysis of the Internal Delays of Various Wireless Technologies for Autonomous Vehicle Applications

Poster Presentation Undergraduate Student: Luanne Seaman

Research Mentor: Dr. Billy Kihei

Autonomous vehicles use VANETs (vehicular ad-hoc networks) to communicate with the world around them. Despite the simple premise, VANETs rely on a variety of wireless technologies depending on range, internal delay, urgency of information, and other factors. Therefore, VANET algorithms will need to weigh these elements accordingly. Through this research, I hope to contribute reliable measurements of internal delay to reduce the algorithms’ complexity. To calculate internal delay, I connected two Arduinos to a STM32 Nucleo …


Preprocessing Of Astronomical Images From The Neowise Survey For Near-Earth Asteroid Detection, Rachel Meyer Apr 2022

Preprocessing Of Astronomical Images From The Neowise Survey For Near-Earth Asteroid Detection, Rachel Meyer

Scholar Week 2016 - present

Asteroid detection is a common field in astronomy for planetary defense which requires observations from survey telescopes to detect and classify different objects. The amount of data collected each night is increasing as better designed telescopes are created each year. This amount is quickly becoming unmanageable and many researchers are looking for ways to better process this data. The dominant solution is to implement computer algorithms to automatically detect these sources and to use Machine Learning in order to create a more efficient and accurate classifier. In the past there has been a focus on larger asteroids that create streaks …


Cova Cci Undergrad Cyber Research, Nana Jeffrey Apr 2022

Cova Cci Undergrad Cyber Research, Nana Jeffrey

Cybersecurity Undergraduate Research Showcase

Is your digital assistant your worst enemy? Modern technology has impacted our lives in a positive way making tasks that were once time consuming become more convenient. For example a few years ago writing down your grocery list with a paper and pen was a norm, now with technology we have access to IoT devices such as smart fridges that can inform us on what items are low in stock, send a message to our digital assistants such as iOS Siri and Amazon's Alexa to remind us to buy those groceries. Although these digital assistants have helped make our daily …


Ransombuster Iot: A Intrusion Detection And Dataset Creation Tool For Ransomware Attacks Within Iot Networks, Jackson M. Walker Jan 2022

Ransombuster Iot: A Intrusion Detection And Dataset Creation Tool For Ransomware Attacks Within Iot Networks, Jackson M. Walker

Cybersecurity Undergraduate Research Showcase

The proposed research follows the design-science guidelines(Hevner, 2004). This paper uses these design-science methods for developing the guidelines for the implementation of the proposed architecture, understanding previous research contributions, and evaluating of research. This paper proposes a network artifact for studying ransomware IoT intrusion detection techniques and offers a proposed network architecture to serve as a framework for creating a publicly available dataset for IoT research on ransomware.


Deepfakes: Ai Technology Of The Future, Hosanna Root Jan 2022

Deepfakes: Ai Technology Of The Future, Hosanna Root

Cybersecurity Undergraduate Research Showcase

Deepfakes technology’s danger stems from its ability to create realistic but fake synthesized media that people often identify as something that is real. With this powerful technology in the wrong hands, deepfakes can cause devastating havoc through information warfare, election campaign disruptions, and more, creating distrust in society. Disinformation is already rampant today, even without wide deployments of deepfakes, which is concerning given the fact that deepfakes’ nefarious full potentials are yet to be reached.


Corporate Cybersecurity In The Context Of M&A Transactions, Cameron Beck Jan 2022

Corporate Cybersecurity In The Context Of M&A Transactions, Cameron Beck

Cybersecurity Undergraduate Research Showcase

The rapid rise of digital devices has unlocked a new dimension of innovation and prosperity in the 21st century. Computers are now an integrated and ubiquitous part of our global culture. You would be hard-pressed to walk into any given room without several computer chips humming inaudibly inside the machines that facilitate our modern world. Even lightbulbs and doorbells are connected to the Internet, capturing information from the world around them and sending that information to the Cloud. The Internet expands access to communication, international marketplaces, entertainment, professional resources, and nearly every book in the world.


Modeling Iot Solutions: A Lack Of Iot Device Security, And User Education, Benjamin Newlin Jan 2022

Modeling Iot Solutions: A Lack Of Iot Device Security, And User Education, Benjamin Newlin

Cybersecurity Undergraduate Research Showcase

The Internet of Things, more commonly known as IoT devices, is an ever growing topic, both in the marketplace and in cyber security. While new devices are released into the public every year, a lack of standardized security concepts is also growing ever so clear. By having a model or standard for IoT devices and manufacturers to follow, the customer-base of these devices will have an easier time identifying trustworthy devices as well as how to secure their own devices.


Security Issues With Network Connected Scada Systems, Chad Holm Jan 2022

Security Issues With Network Connected Scada Systems, Chad Holm

Cybersecurity Undergraduate Research Showcase

The use of Supervisory Control and Data Acquisition (SCADA) systems has become common place and are being used in several different industries. These have evolved as the technology has progressed. The use of Internet of Things (IOT) devices makes for less human intervention to run daily operations in these industries. This can also allow hackers to gain access to these devices due to security holes that are overlooked. There have several different ways that have been exploited on SCADA networks and the goal is to recognize and secure them so hackers cannot gain access to them.


Comparative Analysis Of Rgb-Based Eye-Tracking For Large-Scale Human-Machine Applications, Brett Thaman, Trung Cao Dec 2021

Comparative Analysis Of Rgb-Based Eye-Tracking For Large-Scale Human-Machine Applications, Brett Thaman, Trung Cao

Posters-at-the-Capitol

Gaze tracking has become an established technology that enables using an individual’s gaze as an input signal to support a variety of applications in the context of Human-Computer Interaction. Gaze tracking primarily relies on sensing devices such as infrared (IR) cameras. Nevertheless, in the recent years, several attempts have been realized at detecting gaze by acquiring and processing images acquired from standard RGB cameras. Nowadays, there are only a few publicly available open-source libraries and they have not been tested extensively. In this paper, we present the result of a comparative analysis that studied a commercial eye-tracking device using IR …


Joint Latency-Energy Optimization Scheme For Offloading In Mobile Edge Computing Environment Based In Deep Reinforcement Learning, Jui Mhatre Nov 2021

Joint Latency-Energy Optimization Scheme For Offloading In Mobile Edge Computing Environment Based In Deep Reinforcement Learning, Jui Mhatre

Symposium of Student Scholars

With the increasing number of mobile devices (MD), IoT devices, and computation-intensive tasks deployed on these devices, there is a need to increase the efficiency and speed of the deliverable. Due to inadequate resources, it is infeasible to compute all the tasks locally. Similarly, due to time constraints, it is not possible to compute the entire task at a remote site. Edge computing (EC) and cloud computing (CC) play the role of providing the resources to these devices on the fly. But a major drawback is increased delay and energy consumption due to transmission and offloading of computation tasks to …


Protection Of Patient Privacy On Mobile Device Machine Learning, Matthew Nguyen Nov 2021

Protection Of Patient Privacy On Mobile Device Machine Learning, Matthew Nguyen

Cybersecurity Undergraduate Research Showcase

An existing StudentLife Study mobile dataset was evaluated and organized to be applied to different machine learning methods. Different variables like user activity, exercise, sleep, study space, social, and stress levels are optimized to train a model that could predict user stress level. The different machine learning methods would test if both patient data privacy and training efficiency can be ensured.


Effects Of Cloud Computing In The Workforce, Kevin Rossi Acosta Oct 2021

Effects Of Cloud Computing In The Workforce, Kevin Rossi Acosta

Cybersecurity Undergraduate Research Showcase

In recent years, the incorporation of cloud computing and cloud services has increased in many different types of organizations and companies. This paper will focus on the philosophical, economical, and political factors that cloud computing and cloud services have in the workforce and different organizations. Based on various scholarly articles and resources it was observed that organizations used cloud computing and cloud services to increase their overall productivity as well as decrease the overall cost of their operations, as well as the different policies that were created by lawmakers to control the realm of cloud computing. The results of this …


Rollover V2x Soft Antenna For Vehicular Safety, Jiwoo Park, Devansh Singh Aug 2021

Rollover V2x Soft Antenna For Vehicular Safety, Jiwoo Park, Devansh Singh

Symposium of Student Scholars

Vehicle-2-Everything (V2X) technology can make roads safer by allowing vehicles to communicate with each other. The goal of V2X is to reduce accidents where there is not a line-of-sight of the other vehicle, such as at intersections, in harsh driving conditions, and around curves. Considering that the antenna for V2X will be mounted on the roof, how then should a turned over vehicle communicate reliably with other vehicles if another antenna doesn't also exist on the bottom of the vehicle? We explore using soft-robotics for deploying a spare antenna from under the vehicle. Experiments show that when the antenna is …


Securing Global Positioning Systems In A Blockchain Using Vehicle-To-Everything Communications, Malik Purefoy Aug 2021

Securing Global Positioning Systems In A Blockchain Using Vehicle-To-Everything Communications, Malik Purefoy

Symposium of Student Scholars

Intelligent transportation systems (ITS) are being deployed globally to support vehicular safety innovation using wireless communication. The ITS paradigm of vehicle-to-everything communication (V2X) enables vehicles equipped with an on-board unit (OBU) to communicate with a roadside unit (RSU) infrastructure to provide safe intersection movements between similarly equipped vehicles, pedestrians, and animal life. However, the current paradigm relies heavily on the availability of a Global Positioning System (GPS) for ensuring road user safety. In a doomsday scenario where GPS becomes unavailable, collision avoidance services provided through V2X may be rendered unavailable. The proposed solution is to develop a secure and reliable …


Design And Test Of Novel Vehicle-To-Everything Packet For Sensor Arrays In Under Roadway Deployment, Marquis Brown Aug 2021

Design And Test Of Novel Vehicle-To-Everything Packet For Sensor Arrays In Under Roadway Deployment, Marquis Brown

Symposium of Student Scholars

Title: Design and Test of Novel Vehicle-to-Everything Packet for Sensor Arrays in Under Roadway Deployment

Poster Presentation Undergraduate Student(s): Hakeem Wilson, Marquis Brown Research Mentor(s): Dr. Billy Kihei

Vehicle-to-Everything (V2X) communications is a burgeoning technology that will enable safer, greener, and more productive usage of roadways. In the V2X paradigm, all equipped vehicles and infrastructure can communicate with each other in real-time. By utilizing V2X communications as an Internet-of-Things gateway, a sensor array installed under roadways, allows real-time monitoring of road conditions which increases overall road safety and road maintenance cost. In our research, we have utilized the WAVE Short …