Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 21 of 21

Full-Text Articles in Physical Sciences and Mathematics

A Provable Secure And Efficient Authentication Framework For Smart Manufacturing Industry, Muhammad Hammad, Akhtar Badshah, Ghulam Abbas, Hisham Alasmary, Muhammad Waqas, Wasim A. Khan Jan 2023

A Provable Secure And Efficient Authentication Framework For Smart Manufacturing Industry, Muhammad Hammad, Akhtar Badshah, Ghulam Abbas, Hisham Alasmary, Muhammad Waqas, Wasim A. Khan

Research outputs 2022 to 2026

Smart manufacturing is transforming the manufacturing industry by enhancing productivity and quality, driving growth in the global economy. The Internet of Things (IoT) has played a crucial role in realizing Industry 4.0, where machines can communicate and interact in real-time. Despite these advancements, security remains a major challenge in developing and deploying smart manufacturing. As cyber-attacks become more prevalent, researchers are making security a top priority. Although IoT and Industrial IoT (IIoT) are used to establish smart industries, these systems remain vulnerable to various types of attacks. To address these security issues, numerous authentication methods have been proposed. However, many …


Assessing Security Risks With The Internet Of Things, Faith Mosemann Apr 2022

Assessing Security Risks With The Internet Of Things, Faith Mosemann

Senior Honors Theses

For my honors thesis I have decided to study the security risks associated with the Internet of Things (IoT) and possible ways to secure them. I will focus on how corporate, and individuals use IoT devices and the security risks that come with their implementation. In my research, I found out that IoT gadgets tend to go unnoticed as a checkpoint for vulnerability. For example, often personal IoT devices tend to have the default username and password issued from the factory that a hacker could easily find through Google. IoT devices need security just as much as computers or servers …


Dynamic Distributed Trust Management Scheme For The Internet Of Things, Syed Wasif Abbas Hamdani, Abdul Waheed Khan, Naima Iltaf, Javed Iqbal Bangash, Yawar Abbas Bangash, Asfandyar Khan Jan 2021

Dynamic Distributed Trust Management Scheme For The Internet Of Things, Syed Wasif Abbas Hamdani, Abdul Waheed Khan, Naima Iltaf, Javed Iqbal Bangash, Yawar Abbas Bangash, Asfandyar Khan

Turkish Journal of Electrical Engineering and Computer Sciences

The Internet of Things (IoT) comprises of a diverse network of homogeneous and heterogeneous nodesthat can be accessed through network ubiquitously. In unattended environments, the IoT devices are prone to variousattacks including ballot-stu?ing, bad-mouthing, self-promotion, on-off, opportunistic behavior attacks, etc. The on-offattack is di?icult to detect as nodes switch their behavior from normal to malicious alternatively. A trust managementmodel is a tool to defend the IoT system against malicious activities and provide reliable data exchange. The majorityof existing IoT trust management techniques are based on static reward and punishment values in pursuit of trustcomputation thereby allowing the misbehaving nodes to …


A Survey On Subsurface Signal Propagation, Usman Raza, Abdul Salam Dec 2020

A Survey On Subsurface Signal Propagation, Usman Raza, Abdul Salam

Faculty Publications

Wireless Underground Communication (WUC) is an emerging field that is being developed continuously. It provides secure mechanism of deploying nodes underground which shields them from any outside temperament or harsh weather conditions. This paper works towards introducing WUC and give a detail overview of WUC. It discusses system architecture of WUC along with the anatomy of the underground sensor motes deployed in WUC systems. It also compares Over-the-Air and Underground and highlights the major differences between the both type of channels. Since, UG communication is an evolving field, this paper also presents the evolution of the field along with the …


Electromagnetic Characteristics Of The Soil, Abdul Salam, Usman Raza Aug 2020

Electromagnetic Characteristics Of The Soil, Abdul Salam, Usman Raza

Faculty Publications

The electromagnetic characteristics of the soil are discussed in this chapter. The characteristics of porous bedrock, soil medium, and impacts of rain attenuations are also presented. The models of dielectric soil properties are studied with a rigorous focus on the constitutive parameters of subsurface soil medium. Moreover, the permittivity and wavenumber in soil are explained. In addition, the frequency-dependent dielectric properties such as dispersion in soil, absorption characteristic, and penetration depth versus frequency are reviewed. Furthermore, the effective permittivity of soil–water mixture for through-the soil-propagation mechanism is analyzed thoroughly.


Underground Phased Arrays And Beamforming Applications, Abdul Salam, Usman Raza Aug 2020

Underground Phased Arrays And Beamforming Applications, Abdul Salam, Usman Raza

Faculty Publications

This chapter presents a framework for adaptive beamforming in underground communication. The wireless propagation is thoroughly analyzed to develop a model using the soil moisture as an input parameter to provide feedback mechanism while enhancing the system performance. The working of array element in the soil is analyzed. Moreover, the effect of soil texture and soil moisture on the resonant frequency and return loss is studied in detail. The wave refraction from the soil–air interface highly degrades the performance of the system. Furthermore, to beam steering is done to achieve high gain for lateral component improving the UG communication. The …


Signals In The Soil: Underground Antennas, Abdul Salam, Usman Raza Aug 2020

Signals In The Soil: Underground Antennas, Abdul Salam, Usman Raza

Faculty Publications

Antenna is a major design component of Internet of Underground Things (IOUT) communication system. The use of antenna, in IOUT, differs from traditional communication in that it is buried in the soil. Therefore, one of the main challenges, in IOUT applications, is to establish a reliable communication. To that end, there is a need of designing an underground-specific antenna. Three major factors that can impact the performance of a buried antenna are: (1) effect of high soil permittivity changes the wavelength of EM waves, (2) variations in soil moisture with time affecting the permittivity of the soil, and (3) difference …


Soil Moisture And Permittivity Estimation, Abdul Salam, Usman Raza Aug 2020

Soil Moisture And Permittivity Estimation, Abdul Salam, Usman Raza

Faculty Publications

The soil moisture and permittivity estimation is vital for the success of the variable rate approaches in the field of the decision agriculture. In this chapter, the development of a novel permittivity estimation and soil moisture sensing approach is presented. The empirical setup and experimental methodology for the power delay measurements used in model are introduced. Moreover, the performance analysis is explained that includes the model validation and error analysis. The transfer functions are reported as well for soil moisture and permittivity estimation. Furthermore, the potential applications of the developed approach in different disciplines are also examined.


Current Advances In Internet Of Underground Things, Abdul Salam, Usman Raza Aug 2020

Current Advances In Internet Of Underground Things, Abdul Salam, Usman Raza

Faculty Publications

The latest developments in Internet of Underground Things are covered in this chapter. First, the IOUT Architecture is discussed followed by the explanation of the challenges being faced in this paradigm. Moreover, a comprehensive coverage of the different IOUT components is presented that includes communications, sensing, and system integration with the cloud. An in-depth coverage of the applications of the IOUT in various disciplines is also surveyed. These applications include areas such as decision agriculture, pipeline monitoring, border control, and oil wells.


Autonomous Irrigation Management In Decision Agriculture, Abdul Salam, Usman Raza Aug 2020

Autonomous Irrigation Management In Decision Agriculture, Abdul Salam, Usman Raza

Faculty Publications

In this chapter, the important application of autonomous irrigation management in the field decision agriculture is discussed. The different types of sensor-guided irrigation systems are presented that includes center pivot systems and drip irrigation systems. Their sensing and actuator components are with detailed focus on real-time decision-making and integration to the cloud. This chapter also presents irrigation control systems which takes, as an input, soil moisture and temperature from IOUT and weather data from Internet and communicate with center pivot based irrigation systems. Moreover, the system architecture is explored where development of the nodes including sensing and actuators is presented. …


Mlcocoa: A Machine Learning-Based Congestion Control For Coap, Alper Kami̇l Demi̇r, Fati̇h Abut Jan 2020

Mlcocoa: A Machine Learning-Based Congestion Control For Coap, Alper Kami̇l Demi̇r, Fati̇h Abut

Turkish Journal of Electrical Engineering and Computer Sciences

Internet of Things (IoT) is a technological invention that has the potential to impact on how we live and how we work by connecting any device to the Internet. Consequently, a vast amount of novel applications will enhance our lives. Internet Engineering Task Force (IETF) standardized the Constrained Application Protocol (CoAP) to accommodate the application layer and network congestion needs of such IoT networks. CoAP is designed to be very simple where it employs a genuine congestion control (CC) mechanism, named as default CoAP CC leveraging basic binary exponential backoff. Yet efficient, default CoAP CC does not always utilize the …


Fog Computing Enabling Industrial Internet Of Things: State-Of-The-Art And Research Challenges, Rabeea Basir, Saad Qaisar, Mudassar Ali, Monther Aldwairi, Muhammad Ikram Ashraf, Aamir Mahmood, Mikael Gidlund Nov 2019

Fog Computing Enabling Industrial Internet Of Things: State-Of-The-Art And Research Challenges, Rabeea Basir, Saad Qaisar, Mudassar Ali, Monther Aldwairi, Muhammad Ikram Ashraf, Aamir Mahmood, Mikael Gidlund

All Works

© 2019 by the authors. Licensee MDPI, Basel, Switzerland. Industry is going through a transformation phase, enabling automation and data exchange in manufacturing technologies and processes, and this transformation is called Industry 4.0. Industrial Internet-of-Things (IIoT) applications require real-time processing, near-by storage, ultra-low latency, reliability and high data rate, all of which can be satisfied by fog computing architecture. With smart devices expected to grow exponentially, the need for an optimized fog computing architecture and protocols is crucial. Therein, efficient, intelligent and decentralized solutions are required to ensure real-time connectivity, reliability and green communication. In this paper, we provide a …


Iot Ignorance Is Digital Forensics Research Bliss: A Survey To Understand Iot Forensics Definitions, Challenges And Future Research Directions, Tina Wu, Frank Breitinger, Ibrahim Baggili Aug 2019

Iot Ignorance Is Digital Forensics Research Bliss: A Survey To Understand Iot Forensics Definitions, Challenges And Future Research Directions, Tina Wu, Frank Breitinger, Ibrahim Baggili

Electrical & Computer Engineering and Computer Science Faculty Publications

Interactions with IoT devices generates vast amounts of personal data that can be used as a source of evidence in digital investigations. Currently, there are many challenges in IoT forensics such as the difficulty in acquiring and analysing IoT data/devices and the lack IoT forensic tools. Besides technical challenges, there are many concepts in IoT forensics that have yet to be explored such as definitions, experience and capability in the analysis of IoT data/devices and current/future challenges. A deeper understanding of these various concepts will help progress the field. To achieve this goal, we conducted a survey which received 70 …


Increasing Bluetooth Low Energy Communication Efficiency By Presetting Protocol Parameters, Dusan Hatvani, Dominik Macko Jan 2019

Increasing Bluetooth Low Energy Communication Efficiency By Presetting Protocol Parameters, Dusan Hatvani, Dominik Macko

Turkish Journal of Electrical Engineering and Computer Sciences

Standard protocols are important regarding the compatibility of devices provided by different vendors. However, specific applications have various requirements and do not always need all features offered by standard protocols, making them inefficient. This paper focuses on standard Bluetooth Low Energy modifications, reducing control overhead for the intended healthcare application. Specifically, the connection establishment, device pairing, and connection parameter negotiations have been targeted. The simulation-based experiments showed over 20 times reduction of control-overhead time preceding a data transmission. It does not just directly increase the energy efficiency of communication; it also prolongs the time for sensor-based end devices to spend …


Enabling Space Time Division Multiple Access In Ietf 6tisch Protocol, Sedat Görmüş, Sercan Külcü Jan 2019

Enabling Space Time Division Multiple Access In Ietf 6tisch Protocol, Sedat Görmüş, Sercan Külcü

Turkish Journal of Electrical Engineering and Computer Sciences

IETF 6TiSCH standard aims to create reliable, deterministic, and low-power networks by scheduling bandwidth resources in time and frequency domains. The main emphasis of 6TiSCH protocol is that it creates Internet of things (IoT) networks with a deterministic and controllable delay. However, many of its benefits are tied to the ability of the 6TiSCH scheduler to optimally distribute radio resources among wireless nodes which may not be possible when the number of frequency resources are limited and several other wireless technologies share the same frequency band (e.g., WiFi, Bluetooth and IEEE 802.15.4). Here the integration of a low-complexity directional antenna …


Hybrid Black-Box Solar Analytics And Their Privacy Implications, Dong Chen Oct 2018

Hybrid Black-Box Solar Analytics And Their Privacy Implications, Dong Chen

Doctoral Dissertations

The aggregate solar capacity in the U.S. is rising rapidly due to continuing decreases in the cost of solar modules. For example, the installed cost per Watt (W) for residential photovoltaics (PVs) decreased by 6X from 2009 to 2018 (from $8/W to $1.2/W), resulting in the installed aggregate solar capacity increasing 128X from 2009 to 2018 (from 435 megawatts to 55.9 gigawatts). This increasing solar capacity is imposing operational challenges on utilities in balancing electricity's real-time supply and demand, as solar generation is more stochastic and less predictable than aggregate demand. To address this problem, both academia and utilities have …


Compact Hardware Implementation Of A Sha-3 Core For Wireless Body Sensor Networks, Yi Yang, Debiao He, Neeraj Kumar, Sherali Zeadally Jul 2018

Compact Hardware Implementation Of A Sha-3 Core For Wireless Body Sensor Networks, Yi Yang, Debiao He, Neeraj Kumar, Sherali Zeadally

Information Science Faculty Publications

One of the most important Internet of Things applications is the wireless body sensor network (WBSN), which can provide universal health care, disease prevention, and control. Due to large deployments of small scale smart sensors in WBSNs, security, and privacy guarantees (e.g., security and safety-critical data, sensitive private information) are becoming a challenging issue because these sensor nodes communicate using an open channel, i.e., Internet. We implement data integrity (to resist against malicious tampering) using the secure hash algorithm 3 (SHA-3) when smart sensors in WBSNs communicate with each other using the Internet. Due to the limited resources (i.e., storage, …


Rss-Based Device-Free Passive Detection And Localization Using Home Automation Network Radio Frequencies, Tiffany M. Phan Mar 2018

Rss-Based Device-Free Passive Detection And Localization Using Home Automation Network Radio Frequencies, Tiffany M. Phan

Theses and Dissertations

This research provided a proof of concept for a device-free passive (DfP) system capable of detecting and localizing a target through exploitation of a home automation network’s radio frequency (RF) signals. The system was developed using Insteon devices with a 915 MHz center frequency. Without developer privileges, limitations of the Insteon technology like no intrinsic received signal strength (RSS) field and silent periods between messages were overcome by using software-defined radios to simulate Insteon devices capable of collecting and reporting RSS, and by creating a message generation script and implementing a calibrated filter threshold to reduce silent periods. Evaluation of …


Forensic State Acquisition From Internet Of Things (Fsaiot): A General Framework And Practical Approach For Iot Forensics Through Iot Device State Acquisition, Christopher S. Meffert, Devon R. Clark, Ibrahim Baggili, Frank Breitinger Aug 2017

Forensic State Acquisition From Internet Of Things (Fsaiot): A General Framework And Practical Approach For Iot Forensics Through Iot Device State Acquisition, Christopher S. Meffert, Devon R. Clark, Ibrahim Baggili, Frank Breitinger

Electrical & Computer Engineering and Computer Science Faculty Publications

IoT device forensics is a difficult problem given that manufactured IoT devices are not standardized, many store little to no historical data, and are always connected; making them extremely volatile. The goal of this paper was to address these challenges by presenting a primary account for a general framework and practical approach we term Forensic State Acquisition from Internet of Things (FSAIoT). We argue that by leveraging the acquisition of the state of IoT devices (e.g. if an IoT lock is open or locked), it becomes possible to paint a clear picture of events that have occurred. To this end, …


Musictrakr, Benjamin Lin Jun 2016

Musictrakr, Benjamin Lin

Computer Engineering

MusicTrackr is an IoT device that musicians attach to their instruments. The device has a start and stop button that allows users to record their playing sessions. Each recorded session is sent wirelessly to a cloud database. An accompanying website displays all of the recorded sessions, organized by date. After picking a specific date, the user can view graphs showing total practice time and average session length as well play back any recordings during that date. In addition, the user may add comments to any specific date or recording. Lastly, the user may tag a specific date with a color …


Synthesis Of Real-Time Cloud Applications For Internet Of Things, Slawomir Bak, Radoslaw Czarnecki, Stanislaw Deniziak Jan 2015

Synthesis Of Real-Time Cloud Applications For Internet Of Things, Slawomir Bak, Radoslaw Czarnecki, Stanislaw Deniziak

Turkish Journal of Electrical Engineering and Computer Sciences

This paper presents the methodology for the synthesis of real-time applications working in the ``Internet of Things'' environment. We propose the client-server architecture, where embedded systems act as smart clients and the Internet application is a server of the system. The architecture of the application conforms to the cloud computing model. Since centralized systems are prone to bottlenecks caused by accumulation of transmissions or computations, we propose the distributed architecture of the server and the methodology that constructs this architecture using Internet resources supported by a cloud provider. We assume that the function of the server is specified as a …