Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (20)
- Engineering (13)
- Computer Engineering (11)
- Earth Sciences (10)
- Soil Science (10)
-
- Digital Communications and Networking (9)
- Environmental Sciences (9)
- Sustainability (9)
- Water Resource Management (9)
- Electrical and Computer Engineering (8)
- Other Environmental Sciences (7)
- Systems and Communications (7)
- Information Security (6)
- Signal Processing (3)
- Social and Behavioral Sciences (3)
- Artificial Intelligence and Robotics (2)
- Business (2)
- Gerontology (2)
- Health Information Technology (2)
- Medicine and Health Sciences (2)
- Numerical Analysis and Scientific Computing (2)
- Sociology (2)
- Asian Studies (1)
- Databases and Information Systems (1)
- Family, Life Course, and Society (1)
- International and Area Studies (1)
- Library and Information Science (1)
- Management Information Systems (1)
- Other Computer Sciences (1)
- Institution
-
- Purdue University (10)
- Singapore Management University (4)
- Zayed University (3)
- Air Force Institute of Technology (1)
- East Tennessee State University (1)
-
- Edith Cowan University (1)
- Jacksonville State University (1)
- James Madison University (1)
- Kennesaw State University (1)
- Syracuse University (1)
- TÜBİTAK (1)
- University of Kentucky (1)
- University of South Carolina (1)
- University of Texas Rio Grande Valley (1)
- Walden University (1)
- Western Michigan University (1)
- Publication
-
- Faculty Publications (10)
- Research Collection School Of Computing and Information Systems (4)
- All Works (3)
- Theses and Dissertations (2)
- Computer Science Faculty Publications and Presentations (1)
-
- Dissertations (1)
- Electronic Theses and Dissertations (1)
- English Language Institute (1)
- Information Science Faculty Publications (1)
- Master of Science in Computer Science Theses (1)
- Masters Theses, 2020-current (1)
- Research outputs 2014 to 2021 (1)
- Research, Publications & Creative Work (1)
- Turkish Journal of Electrical Engineering and Computer Sciences (1)
- Walden Dissertations and Doctoral Studies (1)
- Publication Type
Articles 1 - 30 of 30
Full-Text Articles in Physical Sciences and Mathematics
Improving A Wireless Localization System Via Machine Learning Techniques And Security Protocols, Zachary Yorio
Improving A Wireless Localization System Via Machine Learning Techniques And Security Protocols, Zachary Yorio
Masters Theses, 2020-current
The recent advancements made in Internet of Things (IoT) devices have brought forth new opportunities for technologies and systems to be integrated into our everyday life. In this work, we investigate how edge nodes can effectively utilize 802.11 wireless beacon frames being broadcast from pre-existing access points in a building to achieve room-level localization. We explain the needed hardware and software for this system and demonstrate a proof of concept with experimental data analysis. Improvements to localization accuracy are shown via machine learning by implementing the random forest algorithm. Using this algorithm, historical data can train the model and make …
A Federated Deep Autoencoder For Detecting Iot Cyber Attacks, Christopher M. Regan
A Federated Deep Autoencoder For Detecting Iot Cyber Attacks, Christopher M. Regan
Master of Science in Computer Science Theses
Internet of Things (IoT) devices are mass-produced and rapidly released to the public in a rough state. IoT devices are produced by various companies satisfying various goals, such as monitoring the environment, senor trigger cameras, on-demand electrical switches. These IoT devices are produced by companies to meet a market demand quickly, producing a rough software solution that customers or other enterprises willingly buy with the expectation they will have software updates after production. These IoT devices are often heterogeneous in nature, only to receive updates at infrequently intervals, and can remain out of sight on a home or office network …
A Survey On Subsurface Signal Propagation, Usman Raza, Abdul Salam
A Survey On Subsurface Signal Propagation, Usman Raza, Abdul Salam
Faculty Publications
Wireless Underground Communication (WUC) is an emerging field that is being developed continuously. It provides secure mechanism of deploying nodes underground which shields them from any outside temperament or harsh weather conditions. This paper works towards introducing WUC and give a detail overview of WUC. It discusses system architecture of WUC along with the anatomy of the underground sensor motes deployed in WUC systems. It also compares Over-the-Air and Underground and highlights the major differences between the both type of channels. Since, UG communication is an evolving field, this paper also presents the evolution of the field along with the …
A User Study Of A Wearable System To Enhance Bystanders’ Facial Privacy, Alfredo J. Perez, Sherali Zeadally, Scott Griffith, Luis Y. Matos Garcia, Jaouad A. Mouloud
A User Study Of A Wearable System To Enhance Bystanders’ Facial Privacy, Alfredo J. Perez, Sherali Zeadally, Scott Griffith, Luis Y. Matos Garcia, Jaouad A. Mouloud
Information Science Faculty Publications
The privacy of users and information are becoming increasingly important with the growth and pervasive use of mobile devices such as wearables, mobile phones, drones, and Internet of Things (IoT) devices. Today many of these mobile devices are equipped with cameras which enable users to take pictures and record videos anytime they need to do so. In many such cases, bystanders’ privacy is not a concern, and as a result, audio and video of bystanders are often captured without their consent. We present results from a user study in which 21 participants were asked to use a wearable system called …
A Comprehensive Survey Of The Tactile Internet: State-Of-The-Art And Research Directions, Nattakorn Promwongsa, Amin Ebrahimzadeh, Diala Naboulsi, Somayeh Kianpisheh, Fatna Belqasmi, Roch Glitho, Noel Crespi, Omar Alfandi
A Comprehensive Survey Of The Tactile Internet: State-Of-The-Art And Research Directions, Nattakorn Promwongsa, Amin Ebrahimzadeh, Diala Naboulsi, Somayeh Kianpisheh, Fatna Belqasmi, Roch Glitho, Noel Crespi, Omar Alfandi
All Works
The Internet has made several giant leaps over the years, from a fixed to a mobile Internet, then to the Internet of Things, and now to a Tactile Internet. The Tactile Internet goes far beyond data, audio and video delivery over fixed and mobile networks, and even beyond allowing communication and collaboration among things. It is expected to enable haptic communications and allow skill set delivery over networks. Some examples of potential applications are tele-surgery, vehicle fleets, augmented reality and industrial process automation. Several papers already cover many of the Tactile Internet-related concepts and technologies, such as haptic codecs, applications, …
Toward A Sustainable Cybersecurity Ecosystem, Shahrin Sadik, Mohiuddin Ahmed, Leslie F. Sikos, A.K.M. Najmul Islam
Toward A Sustainable Cybersecurity Ecosystem, Shahrin Sadik, Mohiuddin Ahmed, Leslie F. Sikos, A.K.M. Najmul Islam
Research outputs 2014 to 2021
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. Cybersecurity issues constitute a key concern of today’s technology-based economies. Cybersecurity has become a core need for providing a sustainable and safe society to online users in cyberspace. Considering the rapid increase of technological implementations, it has turned into a global necessity in the attempt to adapt security countermeasures, whether direct or indirect, and prevent systems from cyberthreats. Identifying, characterizing, and classifying such threats and their sources is required for a sustainable cyber-ecosystem. This paper focuses on the cybersecurity of smart grids and the emerging trends such as using blockchain in …
Decision Agriculture, Abdul Salam, Usman Raza
Decision Agriculture, Abdul Salam, Usman Raza
Faculty Publications
In this chapter, the latest developments in the field of decision agriculture are discussed. The practice of management zones in digital agriculture is described for efficient and smart faming. Accordingly, the methodology for delineating management zones is presented. Modeling of decision support systems is explained along with discussion of the issues and challenges in this area. Moreover, the precision agriculture technology is also considered. Moreover, the chapter surveys the state of the decision agriculture technologies in the countries such as Bulgaria, Denmark, France, Israel, Malaysia, Pakistan, United Kingdom, Ukraine, and Sweden. Finally, different field factors such as GPS accuracy and …
Electromagnetic Characteristics Of The Soil, Abdul Salam, Usman Raza
Electromagnetic Characteristics Of The Soil, Abdul Salam, Usman Raza
Faculty Publications
The electromagnetic characteristics of the soil are discussed in this chapter. The characteristics of porous bedrock, soil medium, and impacts of rain attenuations are also presented. The models of dielectric soil properties are studied with a rigorous focus on the constitutive parameters of subsurface soil medium. Moreover, the permittivity and wavenumber in soil are explained. In addition, the frequency-dependent dielectric properties such as dispersion in soil, absorption characteristic, and penetration depth versus frequency are reviewed. Furthermore, the effective permittivity of soil–water mixture for through-the soil-propagation mechanism is analyzed thoroughly.
Underground Phased Arrays And Beamforming Applications, Abdul Salam, Usman Raza
Underground Phased Arrays And Beamforming Applications, Abdul Salam, Usman Raza
Faculty Publications
This chapter presents a framework for adaptive beamforming in underground communication. The wireless propagation is thoroughly analyzed to develop a model using the soil moisture as an input parameter to provide feedback mechanism while enhancing the system performance. The working of array element in the soil is analyzed. Moreover, the effect of soil texture and soil moisture on the resonant frequency and return loss is studied in detail. The wave refraction from the soil–air interface highly degrades the performance of the system. Furthermore, to beam steering is done to achieve high gain for lateral component improving the UG communication. The …
Signals In The Soil: Underground Antennas, Abdul Salam, Usman Raza
Signals In The Soil: Underground Antennas, Abdul Salam, Usman Raza
Faculty Publications
Antenna is a major design component of Internet of Underground Things (IOUT) communication system. The use of antenna, in IOUT, differs from traditional communication in that it is buried in the soil. Therefore, one of the main challenges, in IOUT applications, is to establish a reliable communication. To that end, there is a need of designing an underground-specific antenna. Three major factors that can impact the performance of a buried antenna are: (1) effect of high soil permittivity changes the wavelength of EM waves, (2) variations in soil moisture with time affecting the permittivity of the soil, and (3) difference …
Soil Moisture And Permittivity Estimation, Abdul Salam, Usman Raza
Soil Moisture And Permittivity Estimation, Abdul Salam, Usman Raza
Faculty Publications
The soil moisture and permittivity estimation is vital for the success of the variable rate approaches in the field of the decision agriculture. In this chapter, the development of a novel permittivity estimation and soil moisture sensing approach is presented. The empirical setup and experimental methodology for the power delay measurements used in model are introduced. Moreover, the performance analysis is explained that includes the model validation and error analysis. The transfer functions are reported as well for soil moisture and permittivity estimation. Furthermore, the potential applications of the developed approach in different disciplines are also examined.
Current Advances In Internet Of Underground Things, Abdul Salam, Usman Raza
Current Advances In Internet Of Underground Things, Abdul Salam, Usman Raza
Faculty Publications
The latest developments in Internet of Underground Things are covered in this chapter. First, the IOUT Architecture is discussed followed by the explanation of the challenges being faced in this paradigm. Moreover, a comprehensive coverage of the different IOUT components is presented that includes communications, sensing, and system integration with the cloud. An in-depth coverage of the applications of the IOUT in various disciplines is also surveyed. These applications include areas such as decision agriculture, pipeline monitoring, border control, and oil wells.
Signals In The Soil: Subsurface Sensing, Abdul Salam, Usman Raza
Signals In The Soil: Subsurface Sensing, Abdul Salam, Usman Raza
Faculty Publications
In this chapter, novel subsurface soil sensing approaches are presented for monitoring and real-time decision support system applications. The methods, materials, and operational feasibility aspects of soil sensors are explored. The soil sensing techniques covered in this chapter include aerial sensing, in-situ, proximal sensing, and remote sensing. The underlying mechanism used for sensing is also examined as well. The sensor selection and calibration techniques are described in detail. The chapter concludes with discussion of soil sensing challenges.
Autonomous Irrigation Management In Decision Agriculture, Abdul Salam, Usman Raza
Autonomous Irrigation Management In Decision Agriculture, Abdul Salam, Usman Raza
Faculty Publications
In this chapter, the important application of autonomous irrigation management in the field decision agriculture is discussed. The different types of sensor-guided irrigation systems are presented that includes center pivot systems and drip irrigation systems. Their sensing and actuator components are with detailed focus on real-time decision-making and integration to the cloud. This chapter also presents irrigation control systems which takes, as an input, soil moisture and temperature from IOUT and weather data from Internet and communicate with center pivot based irrigation systems. Moreover, the system architecture is explored where development of the nodes including sensing and actuators is presented. …
Variable Rate Applications In Decision Agriculture, Abdul Salam, Usman Raza
Variable Rate Applications In Decision Agriculture, Abdul Salam, Usman Raza
Faculty Publications
In this chapter, the variable rate applications (VRA) are presented for the field of decision agriculture. The characteristics of VRA control systems are described along with control hardware. Different types of VRA systems are discussed (e.g., liquid VRA systems and dry VRA systems). A case study is also explored in this regard. Moreover, recent advances and future trends are also outlined. Accordingly, a sustainable variable-rate irrigation scheduling is studied where different hardware and software component of the cyber-physical system are considered. Finally, chapter is concluded with a novel sensor deployment methodology.
Iot-Enabled Eldercare Technology, Watchanan Chantapakul
Iot-Enabled Eldercare Technology, Watchanan Chantapakul
English Language Institute
The world’s population is changing as people are growing older. Leveraging technology for eldercare is important in this century. It can enable many eldercare applications effectively.
Resource Optimization In Support Of Iot Applications, Ihab Ahmed Mohammed
Resource Optimization In Support Of Iot Applications, Ihab Ahmed Mohammed
Dissertations
With the rise of the Internet of Things (IoT) and smart communities, managing computation and communication resources required by billions of smart devices becomes a concern. To tackle this problem, we develop algorithms for resource management to ensure better Quality of Service (QoS), safety, and performance. We focus our efforts on three problems.
In the first problem, we studied the strict QoS requirements of applications and differentiated service requirements in different situations of vehicular networks. We propose a generic prioritization and resource management algorithm that can be used to prioritize the processing of received packets in vehicular networks. We formulate …
Lightweight And Privacy-Aware Fine-Grained Access Control For Iot-Oriented Smart Health, Jianfei Sun, Hu Xiong, Ximeng Liu, Yinghui Zhang, Xuyun Nie, Robert H. Deng
Lightweight And Privacy-Aware Fine-Grained Access Control For Iot-Oriented Smart Health, Jianfei Sun, Hu Xiong, Ximeng Liu, Yinghui Zhang, Xuyun Nie, Robert H. Deng
Research Collection School Of Computing and Information Systems
With the booming of Internet of Things (IoT), smart health (s-health) is becoming an emerging and attractive paradigm. It can provide an accurate prediction of various diseases and improve the quality of healthcare. Nevertheless, data security and user privacy concerns still remain issues to be addressed. As a high potential and prospective solution to secure IoT-oriented s-health applications, ciphertext policy attribute-based encryption (CP-ABE) schemes raise challenges, such as heavy overhead and attribute privacy of the end users. To resolve these drawbacks, an optimized vector transformation approach is first proposed to efficiently transform the access policy and user attribute set into …
Smart Sensing Enabled Secure And Usable Pairing And Authentication, Xiaopeng Li
Smart Sensing Enabled Secure And Usable Pairing And Authentication, Xiaopeng Li
Theses and Dissertations
Internet of Things (IoT) technologies have made our lives more convenient and better informed by sensing and monitoring our surroundings. Security applications, such as device pairing and user authentication, are the fundamentals for building a trustworthy smart environment. A secure and convenient pairing approach is critical to IoT enabled applications, as pairing is to establish a secure wireless communication channel for devices. Besides, a smart environment usually has multiple people (e.g., patients and doctors in a hospital), who have physical access to the deployed IoT devices and sensitive dumb objects (e.g., a cabinet storing medical records); but not all of …
Editing-Enabled Signatures: A New Tool For Editing Authenticated Data, Binanda Sengupta, Yingjiu Li, Yangguang Tian, Robert H. Deng
Editing-Enabled Signatures: A New Tool For Editing Authenticated Data, Binanda Sengupta, Yingjiu Li, Yangguang Tian, Robert H. Deng
Research Collection School Of Computing and Information Systems
Data authentication primarily serves as a tool to achieve data integrity and source authentication. However, traditional data authentication does not fit well where an intermediate entity (editor) is required to modify the authenticated data provided by the source/data owner before sending the data to other recipients. To ask the data owner for authenticating each modified data can lead to higher communication overhead. In this article, we introduce the notion of editing-enabled signatures where the data owner can choose any set of modification operations applicable on the data and still can restrict any possibly untrusted editor to authenticate the data modified …
Sensing, Computing, And Communications For Energy Harvesting Iots: A Survey, Dong Ma, Guohao Lan, Mahbub Hassan, Wen Hu, Sajal K. Das
Sensing, Computing, And Communications For Energy Harvesting Iots: A Survey, Dong Ma, Guohao Lan, Mahbub Hassan, Wen Hu, Sajal K. Das
Research Collection School Of Computing and Information Systems
With the growing number of deployments of Internet of Things (IoT) infrastructure for a wide variety of applications, the battery maintenance has become a major limitation for the sustainability of such infrastructure. To overcome this problem, energy harvesting offers a viable alternative to autonomously power IoT devices, resulting in a number of battery-less energy harvesting IoTs (or EH-IoTs) appearing in the market in recent years. Standards activities are also underway, which involve wireless protocol design suitable for EH-IoTs as well as testing procedures for various energy harvesting methods. Despite the early commercial and standards activities, IoT sensing, computing and communications …
Knot Flow Classification And Its Applications In Vehicular Ad-Hoc Networks (Vanet), David Schmidt
Knot Flow Classification And Its Applications In Vehicular Ad-Hoc Networks (Vanet), David Schmidt
Electronic Theses and Dissertations
Intrusion detection systems (IDSs) play a crucial role in the identification and mitigation for attacks on host systems. Of these systems, vehicular ad hoc networks (VANETs) are difficult to protect due to the dynamic nature of their clients and their necessity for constant interaction with their respective cyber-physical systems. Currently, there is a need for a VANET-specific IDS that meets this criterion. To this end, a spline-based intrusion detection system has been pioneered as a solution. By combining clustering with spline-based general linear model classification, this knot flow classification method (KFC) allows for robust intrusion detection to occur. Due its …
Early Detection Of Mild Cognitive Impairment With In-Home Sensors To Monitor Behavior Patterns In Community-Dwelling Senior Citizens In Singapore: Cross-Sectional Feasibility Study, Iris Rawtaer, Rathi Mahendran, Ee Heok Kua, Hwee-Pink Tan, Hwee Xian Tan, Tih-Shih Lee, Tze Pin Ng
Early Detection Of Mild Cognitive Impairment With In-Home Sensors To Monitor Behavior Patterns In Community-Dwelling Senior Citizens In Singapore: Cross-Sectional Feasibility Study, Iris Rawtaer, Rathi Mahendran, Ee Heok Kua, Hwee-Pink Tan, Hwee Xian Tan, Tih-Shih Lee, Tze Pin Ng
Research Collection School Of Computing and Information Systems
Background: Dementia is a global epidemic and incurs substantial burden on the affected families and the health care system. A window of opportunity for intervention is the predementia stage known as mild cognitive impairment (MCI). Individuals often present to services late in the course of their disease and more needs to be done for early detection; sensor technology is a potential method for detection.Objective: The aim of this cross-sectional study was to establish the feasibility and acceptability of utilizing sensors in the homes of senior citizens to detect changes in behaviors unobtrusively.Methods: We recruited 59 community-dwelling seniors (aged >65 years …
Development And Evaluation Of A Security Agent For Internet Of Things, Youngjun Park
Development And Evaluation Of A Security Agent For Internet Of Things, Youngjun Park
Theses and Dissertations
The proposed security agent, Internet of Things Active Management Unit (IoTAMU), provides confidentiality of IoT networks via the following capabilities: (1) authentication, (2) firewall, (3) encryption, and (4) spoofing. To test the spoofer's effect, an Identical Device Model Classifier (IDMC) is developed, which measures the similarities of the observed network signatures of each pair of devices, and recognize identical model devices. The IDMC performs well in baseline network settings without the spoofer, achieving 100% precision, recall, and specificity at high threshold (SS>0.9). When the spoofer is enabled, none of the identical pairs are identified at high threshold, and up …
Performance Evaluation Of Modbus Tcp In Normal Operation And Under A Distributed Denial Of Service Attack, Eric Gamess, Brody Smith, Guillermo Francia Iii
Performance Evaluation Of Modbus Tcp In Normal Operation And Under A Distributed Denial Of Service Attack, Eric Gamess, Brody Smith, Guillermo Francia Iii
Research, Publications & Creative Work
Modbus is the de facto standard communication protocol for the industrial world. It was initially designed to be used in serial communications (Modbus RTU/ASCII). However, not long ago, it was adapted to TCP due to the increasing popularity of the TCP/IP stack. Since it was originally designed for controlled serial lines, Modbus does not have any security features. In this paper, we wrote several benchmarks to evaluate the performance of networking devices that run Modbus TCP. Parameters reported by our benchmarks include: (1) response time for Modbus requests, (2) maximum number of requests successfully handled by Modbus devices in a …
The Role Of Internet Of Things In Hotels’ Profitability, Gershwin Narraidoo
The Role Of Internet Of Things In Hotels’ Profitability, Gershwin Narraidoo
Walden Dissertations and Doctoral Studies
As consumers increase the use of smart technologies, the lack of or improper implementation of Internet of Things (IoT) systems may affect the profitability of hotel businesses. For this qualitative single case study, Porter’s value chain model was the conceptual framework. The data collection process also included direct observations, participant observations, company performance documents, and reflective journaling. Data analysis from multiple sources of data was triangulated to hoteliers revealing that the implementation of IoT systems strategies may increase profit through the use of IoT system technology. Using Yin’s 5-step process, data were coded and analyzed and produced 3 themes: offer …
Mlcocoa: A Machine Learning-Based Congestion Control For Coap, Alper Kami̇l Demi̇r, Fati̇h Abut
Mlcocoa: A Machine Learning-Based Congestion Control For Coap, Alper Kami̇l Demi̇r, Fati̇h Abut
Turkish Journal of Electrical Engineering and Computer Sciences
Internet of Things (IoT) is a technological invention that has the potential to impact on how we live and how we work by connecting any device to the Internet. Consequently, a vast amount of novel applications will enhance our lives. Internet Engineering Task Force (IETF) standardized the Constrained Application Protocol (CoAP) to accommodate the application layer and network congestion needs of such IoT networks. CoAP is designed to be very simple where it employs a genuine congestion control (CC) mechanism, named as default CoAP CC leveraging basic binary exponential backoff. Yet efficient, default CoAP CC does not always utilize the …
Scalable And Secure Big Data Iot System Based On Multifactor Authentication And Lightweight Cryptography, Saleh Atiewi, Amer Al-Rahayfeh, Muder Almiani, Salman Yussof, Omar Alfandi, Ahed Abugabah, Yaser Jararweh
Scalable And Secure Big Data Iot System Based On Multifactor Authentication And Lightweight Cryptography, Saleh Atiewi, Amer Al-Rahayfeh, Muder Almiani, Salman Yussof, Omar Alfandi, Ahed Abugabah, Yaser Jararweh
All Works
© 2013 IEEE. Organizations share an evolving interest in adopting a cloud computing approach for Internet of Things (IoT) applications. Integrating IoT devices and cloud computing technology is considered as an effective approach to storing and managing the enormous amount of data generated by various devices. However, big data security of these organizations presents a challenge in the IoT-cloud architecture. To overcome security issues, we propose a cloud-enabled IoT environment supported by multifactor authentication and lightweight cryptography encryption schemes to protect big data system. The proposed hybrid cloud environment is aimed at protecting organizations' data in a highly secure manner. …
Iot-Enabled Flood Severity Prediction Via Ensemble Machine Learning Models, Mohammed Khalaf, Haya Alaskar, Abir Jaafar Hussain, Thar Baker, Zakaria Maamar, Rajkumar Buyya, Panos Liatsis, Wasiq Khan, Hissam Tawfik, Dhiya Al-Jumeily
Iot-Enabled Flood Severity Prediction Via Ensemble Machine Learning Models, Mohammed Khalaf, Haya Alaskar, Abir Jaafar Hussain, Thar Baker, Zakaria Maamar, Rajkumar Buyya, Panos Liatsis, Wasiq Khan, Hissam Tawfik, Dhiya Al-Jumeily
All Works
© 2013 IEEE. River flooding is a natural phenomenon that can have a devastating effect on human life and economic losses. There have been various approaches in studying river flooding; however, insufficient understanding and limited knowledge about flooding conditions hinder the development of prevention and control measures for this natural phenomenon. This paper entails a new approach for the prediction of water level in association with flood severity using the ensemble model. Our approach leverages the latest developments in the Internet of Things (IoT) and machine learning for the automated analysis of flood data that might be useful to prevent …
Diota: Decentralized Ledger Based Framework For Data Authenticity Protection In Iot Systems, Lei Xu, Lin Chen, Zhimin Gao, Xinxin Fan, Taeweon Suh, Weidong Shi
Diota: Decentralized Ledger Based Framework For Data Authenticity Protection In Iot Systems, Lei Xu, Lin Chen, Zhimin Gao, Xinxin Fan, Taeweon Suh, Weidong Shi
Computer Science Faculty Publications and Presentations
It is predicted that more than 20 billion IoT devices will be deployed worldwide by 2020. These devices form the critical infrastructure to support a variety of important applications such as smart city, smart grid, and industrial internet. To guarantee that these applications work properly, it is imperative to authenticate these devices and data generated from them. Although digital signatures can be applied for these purposes, the scale of the overall system and the limited computation capability of IoT devices pose two big challenges. In order to overcome these obstacles, we propose DIoTA, a novel decentralized ledger-based authentication framework for …