Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 23 of 23

Full-Text Articles in Physical Sciences and Mathematics

Longitudinal Attacks Against Iterative Data Collection With Local Differential Privacy, Mehmet Emre Gürsoy Feb 2024

Longitudinal Attacks Against Iterative Data Collection With Local Differential Privacy, Mehmet Emre Gürsoy

Turkish Journal of Electrical Engineering and Computer Sciences

Local differential privacy (LDP) has recently emerged as an accepted standard for privacy-preserving collection of users’ data from smartphones and IoT devices. In many practical scenarios, users’ data needs to be collected repeatedly across multiple iterations. In such cases, although each collection satisfies LDP individually by itself, a longitudinal collection of multiple responses from the same user degrades that user’s privacy. To demonstrate this claim, in this paper, we propose longitudinal attacks against iterative data collection with LDP. We formulate a general Bayesian adversary model, and then individually show the application of this adversary model on six popular LDP protocols: …


An Optimized And Scalable Blockchain-Based Distributed Learning Platform For Consumer Iot, Zhaocheng Wang, Xueying Liu, Xinming Shao, Abdullah Alghamdi, Md. Shirajum Munir, Sujit Biswas Jan 2023

An Optimized And Scalable Blockchain-Based Distributed Learning Platform For Consumer Iot, Zhaocheng Wang, Xueying Liu, Xinming Shao, Abdullah Alghamdi, Md. Shirajum Munir, Sujit Biswas

School of Cybersecurity Faculty Publications

Consumer Internet of Things (CIoT) manufacturers seek customer feedback to enhance their products and services, creating a smart ecosystem, like a smart home. Due to security and privacy concerns, blockchain-based federated learning (BCFL) ecosystems can let CIoT manufacturers update their machine learning (ML) models using end-user data. Federated learning (FL) uses privacy-preserving ML techniques to forecast customers' needs and consumption habits, and blockchain replaces the centralized aggregator to safeguard the ecosystem. However, blockchain technology (BCT) struggles with scalability and quick ledger expansion. In BCFL, local model generation and secure aggregation are other issues. This research introduces a novel architecture, emphasizing …


Presenting A Method To Detect Intrusion In Iot Through Private Blockchain, Rezvan Mahmoudie, Saeed Parsa, Amir Masoud Rahmani Sep 2022

Presenting A Method To Detect Intrusion In Iot Through Private Blockchain, Rezvan Mahmoudie, Saeed Parsa, Amir Masoud Rahmani

Turkish Journal of Electrical Engineering and Computer Sciences

Blockchain (BC) has been used as a new solution to overcome security and privacy challenges in the Internet of Things (IoT). However, recent studies have indicated that the BC has a limited scalability and is computationally costly. Also, it has significant overhead and delay in the network, which is not suitable to the nature of IoT. This article aims at implementing BC in the IoT context for smart home management, as the integration of these two technologies ensures the IoT's security and privacy. Therefore, we proposed an overlay network in private BC to optimize its compatibility with IoT by increasing …


Performance Analysis Of Lightweight Internet Of Things Devices On Blockchainnetworks, Cem Kösemen, Gökhan Dalkiliç, Şafak Öksüzer Feb 2022

Performance Analysis Of Lightweight Internet Of Things Devices On Blockchainnetworks, Cem Kösemen, Gökhan Dalkiliç, Şafak Öksüzer

Turkish Journal of Electrical Engineering and Computer Sciences

Potential integration or cooperation of the Internet of things (IoT) systems and the blockchain technology is nowadays attracting remarkable interest from the researchers. These inter-operating systems often have to rely on lowcost, low-power, and robust IoT devices that can communicate with the blockchain network through smart contracts. In this work, we designed and ran a benchmark study for ESP32-based lightweight IoT devices interacting within the Quorum blockchain. A software library was built for ESP32 devices to enable elliptic-curve digital signing, Keccak-256 hashing, decoding, encoding, and secure private key generation capabilities, which all are the basic functional requirements for running a …


Fft Enabled Ecc For Wsn Nodes Without Hardware Multiplier Support, Utku Gülen, Selçuk Baktir Jan 2022

Fft Enabled Ecc For Wsn Nodes Without Hardware Multiplier Support, Utku Gülen, Selçuk Baktir

Turkish Journal of Electrical Engineering and Computer Sciences

ECC is a popular cryptographic algorithm for key distribution in wireless sensor networks where power efficiency is desirable. A power efficient implementation of ECC without using hardware multiplier support was proposed earlier for wireless sensor nodes. The proposed implementation utilized the number theoretic transform to carry operands to the frequency domain, and conducted Montgomery multiplication, in addition to other finite field operations, in that domain. With this work, we perform in the frequency domain only polynomial multiplication and use the fast Fourier transform to carry operands between the time and frequency domains. Our ECC implementation over $GF((2^{13}-1)^{13})$ on the MSP430 …


Secure Authenticated Key Exchange For Enhancing The Security Of Routing Protocol For Low-Power And Lossy Networks, Sarah Mohammed Alzahrani Jan 2022

Secure Authenticated Key Exchange For Enhancing The Security Of Routing Protocol For Low-Power And Lossy Networks, Sarah Mohammed Alzahrani

Browse all Theses and Dissertations

The current Routing Protocol for Low Power and Lossy Networks (RPL) standard provides three security modes Unsecured Mode (UM), Preinstalled Secure Mode (PSM), and Authenticated Secure Mode (ASM). The PSM and ASM are designed to prevent external routing attacks and specific replay attacks through an optional replay protection mechanism. RPL's PSM mode does not support key replacement when a malicious party obtains the key via differential cryptanalysis since it considers the key to be provided to nodes during the configuration of the network. This thesis presents an approach to implementing a secure authenticated key exchange mechanism for RPL, which ensures …


Iot Garden Frost Alarm, Andrew James Jun 2021

Iot Garden Frost Alarm, Andrew James

Honors Theses

Home gardeners are faced with yearly challenges due to spring frosts harming young plants. This is frequently mitigated by covering crops with frost blankets, but only on nights when a frost is predicted. In areas with less predictable climate, an unexpected frost can kill vulnerable plants, reducing the amount of food produced. A system is proposed and designed here to use internet of things (IoT) technology to enable a small weather station in the home garden to report current climate data and predict frosts, then alert the gardener in time for them to cover their plants.

The system as designed …


An Inside Vs. Outside Classification System For Wi-Fi Iot Devices, Paul Gralla Apr 2021

An Inside Vs. Outside Classification System For Wi-Fi Iot Devices, Paul Gralla

Dartmouth College Undergraduate Theses

We are entering an era in which Smart Devices are increasingly integrated into our daily lives. Everyday objects are gaining computational power to interact with their environments and communicate with each other and the world via the Internet. While the integration of such devices offers many potential benefits to their users, it also gives rise to a unique set of challenges. One of those challenges is to detect whether a device belongs to one’s own ecosystem, or to a neighbor – or represents an unexpected adversary. An important part of determining whether a device is friend or adversary is to …


Long Distance Bluetooth Low Energy Exploitation On A Wireless Attack Platform, Stephanie L. Long Mar 2021

Long Distance Bluetooth Low Energy Exploitation On A Wireless Attack Platform, Stephanie L. Long

Theses and Dissertations

In the past decade, embedded technology, known as the Internet of Things, has expanded for many uses. The smart home infrastructure has drastically grown to include networked refrigerators, lighting systems, speakers, watches, and more. This increase in the use of wireless protocols provides a larger attack surface for cyber actors than ever before. Wireless loT traffic is susceptible for sniffing by an attacker. The attack platform skypie is upgraded to incorporate Bluetooth Low Energy (BLE) beacon collection for pattern-of-life data, as well as device characteristic enumeration and potential characteristic modification. This platform allows an attacker to mount the skypie to …


Internet Of Things Data Compression Based On Successive Data Grouping, Samer Sawalha, Ghazi Al-Naymat Jan 2021

Internet Of Things Data Compression Based On Successive Data Grouping, Samer Sawalha, Ghazi Al-Naymat

Turkish Journal of Electrical Engineering and Computer Sciences

Internet of things (IoT) is a useful technology in different aspects, and it is widely used in many applications; however, this technology faces some major challenges which need to be solved, such as data management and energy saving. Sensors generate a huge amount of data that need to be transferred to other IoT layers in an efficient way to save the energy of the sensor because most of the energy is consumed in the data transmission process. Sensors usually use batteries to operate; thus, saving energy is very important because of the difficulty of replacing batteries of widely distributed sensors. …


New Normal: Cooperative Paradigm For Covid-19 Timely Detection Andcontainment Using Internet Of Things And Deep Learning, Farooque Hassan Kumbhar, Ali Hassan Syed, Soo Young Shin Jan 2021

New Normal: Cooperative Paradigm For Covid-19 Timely Detection Andcontainment Using Internet Of Things And Deep Learning, Farooque Hassan Kumbhar, Ali Hassan Syed, Soo Young Shin

Turkish Journal of Electrical Engineering and Computer Sciences

The spread of the novel coronavirus (COVID-19) has caused trillions of dollars of damages to the governments and health authorities by affecting the global economies. It is essential to identify, track and trace COVID-19 spread at its earliest detection. Timely action can not only reduce further spread but also help in providing an efficient medical response. Existing schemes rely on volunteer participation, and/or mobile traceability, which leads to delays in containing the spread. There is a need for an autonomous, connected, and centralized paradigm that can identify, trace and inform connected personals. We propose a novel connected Internet of Things …


Approach To Process Smart Grid Time-Serial Big Data Based On Hbase, Wang Yuan, Tao Ye, Yuan Jun, He Wei Jul 2020

Approach To Process Smart Grid Time-Serial Big Data Based On Hbase, Wang Yuan, Tao Ye, Yuan Jun, He Wei

Journal of System Simulation

Abstract: With the development of critical theories and technologies in Internet of things (IOT), more and more attentions have been focused on the IOT applications. Smart Grid is one of the typical IOT applications on which a huge number of sensors have been deployed to gather and generate time-serial data to make sense of the running states of the key devices. How to apply these data to make smart grid running secure and stable is a hot research topic. By considering the fact that smart grid is characterized by a huge number of devices, a huge amount of data and …


Algorithms For Join Queries In Multiple Wireless Sensor Networks, Shangfeng Mo, Yongjian Fan, Xiaoliang Wang, Qingchun Yu, Yinglong Li Jul 2020

Algorithms For Join Queries In Multiple Wireless Sensor Networks, Shangfeng Mo, Yongjian Fan, Xiaoliang Wang, Qingchun Yu, Yinglong Li

Journal of System Simulation

Abstract: The perception layer of Internet of Things (IoTs) is mainly composed of Multiple Wireless Sensor Networks (MWSNs). Data query processing is a very important research area in MWSNs. Join queries can monitor similar network environments in different positions. In general join algorithm, each ordinary node sends its join attribute value to the database server. The database server finds out the result set which meets the join conditions. In distributed join algorithm, the ordinary nodes predict their filters of next round and the database server obtains the global, common filters. The nodes which meet the join conditions send their data …


An Energy-Efficient Lightweight Security Protocol For Optimal Resource Provenance In Wireless Sensor Networks, Sujesh Lal, Joe Prathap P M Jan 2020

An Energy-Efficient Lightweight Security Protocol For Optimal Resource Provenance In Wireless Sensor Networks, Sujesh Lal, Joe Prathap P M

Turkish Journal of Electrical Engineering and Computer Sciences

Security of resource sharing and provenance is a major concern in wireless sensor networks(WSNs),wherethe intruders can easily inject malicious intermediate nodes for various personal gains. This selective forwarding attack may reduce the flow of resource sharing and throughput in the network. Most of the existing techniques are complex and do not provide sufficient security to sensor nodes with low energy. This paper proposes an energy-efficient and lightweight security protocol for optimal resource provenance in multihop WSNs and the Internet of things (IoT) network. The sharing of the resources between the sensor nodes indicates the strength of the mutual cooperation between …


Low Power And Low Phase Noise Vco With Dual Current Shaping For Iotapplications, Sajad Nejadhasan, Narges Moazenian, Ebrahim Abiri, Mohammah Reza Salehi Jan 2020

Low Power And Low Phase Noise Vco With Dual Current Shaping For Iotapplications, Sajad Nejadhasan, Narges Moazenian, Ebrahim Abiri, Mohammah Reza Salehi

Turkish Journal of Electrical Engineering and Computer Sciences

In this paper, two low phase noise and power consumption VCO circuits, which are suitable for Internet of things (IoT) applications, are proposed. In the first structure, in order to have more control of the current consumption, the current shaping technique is used in the PMOS and NMOS biasing circuit. In the second structure, for increasing the oscillation amplitude and reducing the phase noise, independent biasing for the NMOS section is used. In both structures, to increase the frequency tuning range (FTR), without using a capacitor bank, the varactor is used in the biasing structure. In the first structure the …


Multi-Channel Transmission Optimization Of Campus Internet Of Things Based On Pheromone Genetic Algorithm, Zhiyong Chen, Liu Hao Dec 2019

Multi-Channel Transmission Optimization Of Campus Internet Of Things Based On Pheromone Genetic Algorithm, Zhiyong Chen, Liu Hao

Journal of System Simulation

Abstract: Aiming at the difficulty in selecting and optimizing the multi-path transmission of campus Internet of Things information, an optimization algorithm of network multi-path transmission based on intelligent optimization algorithm is proposed. Based on the standard genetic algorithm and the concept of pheromone concentration in ant colony algorithm, this algorithm improves the global optimization ability and convergence efficiency by controlling the evolution direction of individuals, and designs and constructs an evaluation index mathematical model which conforms to the characteristics of multi-channel information transmission optimization in the Internet of Things. The mathematical model of the evaluation index realizes the multi-channel comprehensive …


Research And Simulation Verification Of Integrated Access Technology For Electrical Equipment Based On Edge Computing, Zou Ping, Ruijie Shi, Xike Wu, Chuang Li, Yilin Zhang, Huang Jian, Li Lin Nov 2019

Research And Simulation Verification Of Integrated Access Technology For Electrical Equipment Based On Edge Computing, Zou Ping, Ruijie Shi, Xike Wu, Chuang Li, Yilin Zhang, Huang Jian, Li Lin

Journal of System Simulation

Abstract: In order to solve the problem of information islands existing in the production process of traditional electrical equipment, this paper proposes a technology for equipment integration into the industrial internet cloud platform. Based on the edge computing and WebService technologies, two models of device integration direct access and indirect access were established. The direct access model was verified by application simulation in a production workshop, which realized the high-speed and stable data transmission between the equipment and the industrial internet cloud platform. The results show that the technology is feasible and effective. The application of this device integration …


Novel Node Deployment Scheme And Reliability Quantitative Analysis For An Iot-Based Monitoring System, Yinghua Tong, Liqin Tian, Jing Li Jan 2019

Novel Node Deployment Scheme And Reliability Quantitative Analysis For An Iot-Based Monitoring System, Yinghua Tong, Liqin Tian, Jing Li

Turkish Journal of Electrical Engineering and Computer Sciences

The Internet of things (IoT) is highly suitable for military, environmental, agricultural, and other remote real-time monitoring applications. A reliable topology ensures a stable and dependable monitoring system. Considering the research of an IoT-based air pollution monitoring system for industrial emissions as background, this study proposes a novel dual redundant node deployment scheme. Specifically, hexagonal clustering is proposed for the internal regions. In addition, relationship and quantification formulas for a monitoring area are presented, and the communication range, total number of layers of the topology, and number of cluster headers are determined. Interruptions in a monitoring system may reduce the …


Facepet: Enhancing Bystanders' Facial Privacy With Smart Wearables/Internet Of Things, Alfredo J. Perez, Sherali Zeadally, Luis Y. Matos Garcia, Jaouad A. Mouloud, Scott Griffith Dec 2018

Facepet: Enhancing Bystanders' Facial Privacy With Smart Wearables/Internet Of Things, Alfredo J. Perez, Sherali Zeadally, Luis Y. Matos Garcia, Jaouad A. Mouloud, Scott Griffith

Information Science Faculty Publications

Given the availability of cameras in mobile phones, drones and Internet-connected devices, facial privacy has become an area of major interest in the last few years, especially when photos are captured and can be used to identify bystanders’ faces who may have not given consent for these photos to be taken and be identified. Some solutions to protect facial privacy in photos currently exist. However, many of these solutions do not give a choice to bystanders because they rely on algorithms that de-identify photos or protocols to deactivate devices and systems not controlled by bystanders, thereby being dependent on the …


Reliable Data Gathering In The Internet Of Things Using Artificial Bee Colony, Samad Najjar-Ghabel, Shamim Yousefi, Leili Farzinvash Jan 2018

Reliable Data Gathering In The Internet Of Things Using Artificial Bee Colony, Samad Najjar-Ghabel, Shamim Yousefi, Leili Farzinvash

Turkish Journal of Electrical Engineering and Computer Sciences

The Internet of Things (IoT) technology enables physical devices to communicate with each other for preparing, gathering, and sharing hazard warnings or critical information without human intervention. With respect to emergency applications of IoT technology, an essential issue is to provide an efficient and robust scheme for data gathering. The proposed solution in the existing approaches is to construct a spanning tree over the IoT devices and collect data using the tree. The shortcoming of these algorithms is that they do not take into account the probability of device mobility or failure. In such cases, the spanning tree is split, …


Improvement Of Air Pollution Prediction In A Smart City And Its Correlation With Weather Conditions Using Metrological Big Data, Talat Zaree, Ali Reza Honarvar Jan 2018

Improvement Of Air Pollution Prediction In A Smart City And Its Correlation With Weather Conditions Using Metrological Big Data, Talat Zaree, Ali Reza Honarvar

Turkish Journal of Electrical Engineering and Computer Sciences

Smart cities are an important concept for urban development. This concept addresses many current critical urban problems including traffic and environmental pollution. As utilization of the Internet of things and technology in smart cities increases, large volumes of big data are generated and collected by sensors embedded at different places in the city, which present a real-time display of what is happening throughout the city at all times. Such data should be processed and analyzed as a response to ensure effectiveness and improvement in quality of provided services; correct use and analysis of such data is valuable. Big data mining …


Application Of 3d Delaunay Triangulation In Fingerprint Authentication System, Wencheng Yang, Ahmed Ibrahim, Junaid Chaudhry, Song Wang, Jiankun Hu, Craig Valli Jan 2018

Application Of 3d Delaunay Triangulation In Fingerprint Authentication System, Wencheng Yang, Ahmed Ibrahim, Junaid Chaudhry, Song Wang, Jiankun Hu, Craig Valli

Research outputs 2014 to 2021

Biometric security has found many applications in Internet of Things (IoT) security. Many mobile devices including smart phones have supplied fingerprint authentication function. However, the authentication performance in such restricted environment has been downgraded significantly. A number of methods based on Delaunay triangulation have been proposed for minutiae-based fingerprint matching, due to some favorable properties of the Delaunay triangulation under image distortion. However, all existing methods are based on 2D pattern, of which each unit, a Delaunay triangle, can only provide limited discrimination ability and could cause low matching performance. In this paper, we propose a 3D Delaunay triangulation based …


Planar Array Of Right-Angled Isosceles Triangular Microstrip Antenna Using Koch And Meander Lines For The Internet Of Things, Manisha Gupta, Vinita Mathur Jan 2017

Planar Array Of Right-Angled Isosceles Triangular Microstrip Antenna Using Koch And Meander Lines For The Internet Of Things, Manisha Gupta, Vinita Mathur

Turkish Journal of Electrical Engineering and Computer Sciences

An ultrawideband antenna array using a right-angled isosceles triangular microstrip antenna as a basic element is presented using inset feed for applications in the Internet of things. A Koch fractal antenna array with defected ground plane is used to generate multiband applications. Further, meander lines are added to increase the equivalent inductance that reduces the size of the antenna and increases the bandwidth and gain. Antenna arrays have been constructed and experimentally studied. The measured results show good agreement with the numerical prediction and wideband operation.