Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 6 of 6
Full-Text Articles in Engineering
Monitoring Of Renewable Energy Systems By Iot-Aided Scada System, Ohirul Qays, Musse M. Ahmed, M. A. Parvez Mahmud, Ahmed Abu-Siada, S. M. Muyeen, Liton Hossain, Farhana Yasmin, Momtazur Rahman
Monitoring Of Renewable Energy Systems By Iot-Aided Scada System, Ohirul Qays, Musse M. Ahmed, M. A. Parvez Mahmud, Ahmed Abu-Siada, S. M. Muyeen, Liton Hossain, Farhana Yasmin, Momtazur Rahman
Research outputs 2022 to 2026
With the rapid increase of renewable energy generation worldwide, real-time information has become essential to manage such assets, especially for systems installed offshore and in remote areas. To date, there is no cost-effective condition monitoring technique that can assess the state of renewable energy sources in real-time and provide suitable asset management decisions to optimize the utilization of such valuable assets and avoid any full or partial blackout due to unexpected faults. Based on the Internet of Things scheme, this paper represents a new application for the Supervisory Control and Data Acquisition (SCADA) system to monitor a hybrid system comprising …
Graph-Based Heuristic Solution For Placing Distributed Video Processing Applications On Moving Vehicle Clusters, Kanika Sharma, Bernard Butler, Brendan Jennings
Graph-Based Heuristic Solution For Placing Distributed Video Processing Applications On Moving Vehicle Clusters, Kanika Sharma, Bernard Butler, Brendan Jennings
Articles
Vehicular fog computing (VFC) is envisioned as an extension of cloud and mobile edge computing to utilize the rich sensing and processing resources available in vehicles. We focus on slow-moving cars that spend a significant time in urban traffic congestion as a potential pool of onboard sensors, video cameras, and processing capacity. For leveraging the dynamic network and processing resources, we utilize a stochastic mobility model to select nodes with similar mobility patterns. We then design two distributed applications that are scaled in real-time and placed as multiple instances on selected vehicular fog nodes. We handle the unstable vehicular environment …
Assessing Security Risks With The Internet Of Things, Faith Mosemann
Assessing Security Risks With The Internet Of Things, Faith Mosemann
Senior Honors Theses
For my honors thesis I have decided to study the security risks associated with the Internet of Things (IoT) and possible ways to secure them. I will focus on how corporate, and individuals use IoT devices and the security risks that come with their implementation. In my research, I found out that IoT gadgets tend to go unnoticed as a checkpoint for vulnerability. For example, often personal IoT devices tend to have the default username and password issued from the factory that a hacker could easily find through Google. IoT devices need security just as much as computers or servers …
An Intelligent Distributed Ledger Construction Algorithm For Iot, Charles Rawlins, Jagannathan Sarangapani
An Intelligent Distributed Ledger Construction Algorithm For Iot, Charles Rawlins, Jagannathan Sarangapani
Electrical and Computer Engineering Faculty Research & Creative Works
Blockchain is the next generation of secure data management that creates near-immutable decentralized storage. Secure cryptography created a niche for blockchain to provide alternatives to well-known security compromises. However, design bottlenecks with traditional blockchain data structures scale poorly with increased network usage and are extremely computation-intensive. This made the technology difficult to combine with limited devices, like those in Internet of Things networks. In protocols like IOTA, replacement of blockchain's linked-list queue processing with a lightweight dynamic ledger showed remarkable throughput performance increase. However, current stochastic algorithms for ledger construction suffer distinct trade-offs between efficiency and security. This work proposed …
Reflecting On Recurring Failures In Iot Development, Dharun Anandayuvaraj, James C. Davis
Reflecting On Recurring Failures In Iot Development, Dharun Anandayuvaraj, James C. Davis
Department of Electrical and Computer Engineering Faculty Publications
As IoT systems are given more responsibility and autonomy, they offer greater benefits, but also carry greater risks. We believe this trend invigorates an old challenge of software engineering: how to develop high-risk software-intensive systems safely and securely under market pressures? As a first step, we conducted a systematic analysis of recent IoT failures to identify engineering challenges. We collected and analyzed 22 news reports and studied the sources, impacts, and repair strategies of failures in IoT systems. We observed failure trends both within and across application domains. We also observed that failure themes have persisted over time. To alleviate …
An Analysis On Network Flow-Based Iot Botnet Detection Using Weka, Cian Porteous
An Analysis On Network Flow-Based Iot Botnet Detection Using Weka, Cian Porteous
Dissertations
Botnets pose a significant and growing risk to modern networks. Detection of botnets remains an important area of open research in order to prevent the proliferation of botnets and to mitigate the damage that can be caused by botnets that have already been established. Botnet detection can be broadly categorised into two main categories: signature-based detection and anomaly-based detection. This paper sets out to measure the accuracy, false-positive rate, and false-negative rate of four algorithms that are available in Weka for anomaly-based detection of a dataset of HTTP and IRC botnet data. The algorithms that were selected to detect botnets …