Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 22 of 22

Full-Text Articles in Physical Sciences and Mathematics

Longitudinal Attacks Against Iterative Data Collection With Local Differential Privacy, Mehmet Emre Gürsoy Feb 2024

Longitudinal Attacks Against Iterative Data Collection With Local Differential Privacy, Mehmet Emre Gürsoy

Turkish Journal of Electrical Engineering and Computer Sciences

Local differential privacy (LDP) has recently emerged as an accepted standard for privacy-preserving collection of users’ data from smartphones and IoT devices. In many practical scenarios, users’ data needs to be collected repeatedly across multiple iterations. In such cases, although each collection satisfies LDP individually by itself, a longitudinal collection of multiple responses from the same user degrades that user’s privacy. To demonstrate this claim, in this paper, we propose longitudinal attacks against iterative data collection with LDP. We formulate a general Bayesian adversary model, and then individually show the application of this adversary model on six popular LDP protocols: …


Designing High-Performance Identity-Based Quantum Signature Protocol With Strong Security, Sunil Prajapat, Pankaj Kumar, Sandeep Kumar, Ashok Kumar Das, Sachin Shetty, M. Shamim Hossain Jan 2024

Designing High-Performance Identity-Based Quantum Signature Protocol With Strong Security, Sunil Prajapat, Pankaj Kumar, Sandeep Kumar, Ashok Kumar Das, Sachin Shetty, M. Shamim Hossain

VMASC Publications

Due to the rapid advancement of quantum computers, there has been a furious race for quantum technologies in academia and industry. Quantum cryptography is an important tool for achieving security services during quantum communication. Designated verifier signature, a variant of quantum cryptography, is very useful in applications like the Internet of Things (IoT) and auctions. An identity-based quantum-designated verifier signature (QDVS) scheme is suggested in this work. Our protocol features security attributes like eavesdropping, non-repudiation, designated verification, and hiding sources attacks. Additionally, it is protected from attacks on forgery, inter-resending, and impersonation. The proposed scheme benefits from the traditional designated …


Using Feature Selection Enhancement To Evaluate Attack Detection In The Internet Of Things Environment, Khawlah Harahsheh, Rami Al-Naimat, Chung-Hao Chen Jan 2024

Using Feature Selection Enhancement To Evaluate Attack Detection In The Internet Of Things Environment, Khawlah Harahsheh, Rami Al-Naimat, Chung-Hao Chen

Electrical & Computer Engineering Faculty Publications

The rapid evolution of technology has given rise to a connected world where billions of devices interact seamlessly, forming what is known as the Internet of Things (IoT). While the IoT offers incredible convenience and efficiency, it presents a significant challenge to cybersecurity and is characterized by various power, capacity, and computational process limitations. Machine learning techniques, particularly those encompassing supervised classification techniques, offer a systematic approach to training models using labeled datasets. These techniques enable intrusion detection systems (IDSs) to discern patterns indicative of potential attacks amidst the vast amounts of IoT data. Our investigation delves into various aspects …


Teaching Data Acquisition Through The Arduino-Driven Home Weather Station Project, Sheryl Dutton, Kurt Galderisi, Murat Kuzlu, Otilia Popescu, Vukica Jovanovic Jan 2023

Teaching Data Acquisition Through The Arduino-Driven Home Weather Station Project, Sheryl Dutton, Kurt Galderisi, Murat Kuzlu, Otilia Popescu, Vukica Jovanovic

Engineering Technology Faculty Publications

The main objective of this paper is to present one possible way to engage undergraduate students in designing a system that uses the Internet of Things (IoT) strategy for data acquisition and management. The MATLAB home weather station project presented here was developed by a team of students for the senior design course in the Electrical Engineering Technology undergraduate program at Old Dominion University (ODU). The main purpose of this project was for undergraduate students to learn how to create a localized, compact, and precise weather station. Utilizing various sensors, both homemade and sourced online, this weather station is capable …


A Survey Of Using Machine Learning In Iot Security And The Challenges Faced By Researchers, Khawlah M. Harahsheh, Chung-Hao Chen Jan 2023

A Survey Of Using Machine Learning In Iot Security And The Challenges Faced By Researchers, Khawlah M. Harahsheh, Chung-Hao Chen

Electrical & Computer Engineering Faculty Publications

The Internet of Things (IoT) has become more popular in the last 15 years as it has significantly improved and gained control in multiple fields. We are nowadays surrounded by billions of IoT devices that directly integrate with our lives, some of them are at the center of our homes, and others control sensitive data such as military fields, healthcare, and datacenters, among others. This popularity makes factories and companies compete to produce and develop many types of those devices without caring about how secure they are. On the other hand, IoT is considered a good insecure environment for cyber …


A Review Of Iot Security And Privacy Using Decentralized Blockchain Techniques, Vinay Gugueoth, Sunitha Safavat, Sachin Shetty, Danda Rawat Jan 2023

A Review Of Iot Security And Privacy Using Decentralized Blockchain Techniques, Vinay Gugueoth, Sunitha Safavat, Sachin Shetty, Danda Rawat

Electrical & Computer Engineering Faculty Publications

IoT security is one of the prominent issues that has gained significant attention among the researchers in recent times. The recent advancements in IoT introduces various critical security issues and increases the risk of privacy leakage of IoT data. Implementation of Blockchain can be a potential solution for the security issues in IoT. This review deeply investigates the security threats and issues in IoT which deteriorates the effectiveness of IoT systems. This paper presents a perceptible description of the security threats, Blockchain based solutions, security characteristics and challenges introduced during the integration of Blockchain with IoT. An analysis of different …


Presenting A Method To Detect Intrusion In Iot Through Private Blockchain, Rezvan Mahmoudie, Saeed Parsa, Amir Masoud Rahmani Sep 2022

Presenting A Method To Detect Intrusion In Iot Through Private Blockchain, Rezvan Mahmoudie, Saeed Parsa, Amir Masoud Rahmani

Turkish Journal of Electrical Engineering and Computer Sciences

Blockchain (BC) has been used as a new solution to overcome security and privacy challenges in the Internet of Things (IoT). However, recent studies have indicated that the BC has a limited scalability and is computationally costly. Also, it has significant overhead and delay in the network, which is not suitable to the nature of IoT. This article aims at implementing BC in the IoT context for smart home management, as the integration of these two technologies ensures the IoT's security and privacy. Therefore, we proposed an overlay network in private BC to optimize its compatibility with IoT by increasing …


Performance Analysis Of Lightweight Internet Of Things Devices On Blockchainnetworks, Cem Kösemen, Gökhan Dalkiliç, Şafak Öksüzer Feb 2022

Performance Analysis Of Lightweight Internet Of Things Devices On Blockchainnetworks, Cem Kösemen, Gökhan Dalkiliç, Şafak Öksüzer

Turkish Journal of Electrical Engineering and Computer Sciences

Potential integration or cooperation of the Internet of things (IoT) systems and the blockchain technology is nowadays attracting remarkable interest from the researchers. These inter-operating systems often have to rely on lowcost, low-power, and robust IoT devices that can communicate with the blockchain network through smart contracts. In this work, we designed and ran a benchmark study for ESP32-based lightweight IoT devices interacting within the Quorum blockchain. A software library was built for ESP32 devices to enable elliptic-curve digital signing, Keccak-256 hashing, decoding, encoding, and secure private key generation capabilities, which all are the basic functional requirements for running a …


Fft Enabled Ecc For Wsn Nodes Without Hardware Multiplier Support, Utku Gülen, Selçuk Baktir Jan 2022

Fft Enabled Ecc For Wsn Nodes Without Hardware Multiplier Support, Utku Gülen, Selçuk Baktir

Turkish Journal of Electrical Engineering and Computer Sciences

ECC is a popular cryptographic algorithm for key distribution in wireless sensor networks where power efficiency is desirable. A power efficient implementation of ECC without using hardware multiplier support was proposed earlier for wireless sensor nodes. The proposed implementation utilized the number theoretic transform to carry operands to the frequency domain, and conducted Montgomery multiplication, in addition to other finite field operations, in that domain. With this work, we perform in the frequency domain only polynomial multiplication and use the fast Fourier transform to carry operands between the time and frequency domains. Our ECC implementation over $GF((2^{13}-1)^{13})$ on the MSP430 …


Flying Free: A Research Overview Of Deep Learning In Drone Navigation Autonomy, Thomas Lee, Susan Mckeever, Jane Courtney Jun 2021

Flying Free: A Research Overview Of Deep Learning In Drone Navigation Autonomy, Thomas Lee, Susan Mckeever, Jane Courtney

Articles

With the rise of Deep Learning approaches in computer vision applications, significant strides have been made towards vehicular autonomy. Research activity in autonomous drone navigation has increased rapidly in the past five years, and drones are moving fast towards the ultimate goal of near-complete autonomy. However, while much work in the area focuses on specific tasks in drone navigation, the contribution to the overall goal of autonomy is often not assessed, and a comprehensive overview is needed. In this work, a taxonomy of drone navigation autonomy is established by mapping the definitions of vehicular autonomy levels, as defined by the …


Iot Garden Frost Alarm, Andrew James Jun 2021

Iot Garden Frost Alarm, Andrew James

Honors Theses

Home gardeners are faced with yearly challenges due to spring frosts harming young plants. This is frequently mitigated by covering crops with frost blankets, but only on nights when a frost is predicted. In areas with less predictable climate, an unexpected frost can kill vulnerable plants, reducing the amount of food produced. A system is proposed and designed here to use internet of things (IoT) technology to enable a small weather station in the home garden to report current climate data and predict frosts, then alert the gardener in time for them to cover their plants.

The system as designed …


Internet Of Things Data Compression Based On Successive Data Grouping, Samer Sawalha, Ghazi Al-Naymat Jan 2021

Internet Of Things Data Compression Based On Successive Data Grouping, Samer Sawalha, Ghazi Al-Naymat

Turkish Journal of Electrical Engineering and Computer Sciences

Internet of things (IoT) is a useful technology in different aspects, and it is widely used in many applications; however, this technology faces some major challenges which need to be solved, such as data management and energy saving. Sensors generate a huge amount of data that need to be transferred to other IoT layers in an efficient way to save the energy of the sensor because most of the energy is consumed in the data transmission process. Sensors usually use batteries to operate; thus, saving energy is very important because of the difficulty of replacing batteries of widely distributed sensors. …


New Normal: Cooperative Paradigm For Covid-19 Timely Detection Andcontainment Using Internet Of Things And Deep Learning, Farooque Hassan Kumbhar, Ali Hassan Syed, Soo Young Shin Jan 2021

New Normal: Cooperative Paradigm For Covid-19 Timely Detection Andcontainment Using Internet Of Things And Deep Learning, Farooque Hassan Kumbhar, Ali Hassan Syed, Soo Young Shin

Turkish Journal of Electrical Engineering and Computer Sciences

The spread of the novel coronavirus (COVID-19) has caused trillions of dollars of damages to the governments and health authorities by affecting the global economies. It is essential to identify, track and trace COVID-19 spread at its earliest detection. Timely action can not only reduce further spread but also help in providing an efficient medical response. Existing schemes rely on volunteer participation, and/or mobile traceability, which leads to delays in containing the spread. There is a need for an autonomous, connected, and centralized paradigm that can identify, trace and inform connected personals. We propose a novel connected Internet of Things …


Low Power And Low Phase Noise Vco With Dual Current Shaping For Iotapplications, Sajad Nejadhasan, Narges Moazenian, Ebrahim Abiri, Mohammah Reza Salehi Jan 2020

Low Power And Low Phase Noise Vco With Dual Current Shaping For Iotapplications, Sajad Nejadhasan, Narges Moazenian, Ebrahim Abiri, Mohammah Reza Salehi

Turkish Journal of Electrical Engineering and Computer Sciences

In this paper, two low phase noise and power consumption VCO circuits, which are suitable for Internet of things (IoT) applications, are proposed. In the first structure, in order to have more control of the current consumption, the current shaping technique is used in the PMOS and NMOS biasing circuit. In the second structure, for increasing the oscillation amplitude and reducing the phase noise, independent biasing for the NMOS section is used. In both structures, to increase the frequency tuning range (FTR), without using a capacitor bank, the varactor is used in the biasing structure. In the first structure the …


An Energy-Efficient Lightweight Security Protocol For Optimal Resource Provenance In Wireless Sensor Networks, Sujesh Lal, Joe Prathap P M Jan 2020

An Energy-Efficient Lightweight Security Protocol For Optimal Resource Provenance In Wireless Sensor Networks, Sujesh Lal, Joe Prathap P M

Turkish Journal of Electrical Engineering and Computer Sciences

Security of resource sharing and provenance is a major concern in wireless sensor networks(WSNs),wherethe intruders can easily inject malicious intermediate nodes for various personal gains. This selective forwarding attack may reduce the flow of resource sharing and throughput in the network. Most of the existing techniques are complex and do not provide sufficient security to sensor nodes with low energy. This paper proposes an energy-efficient and lightweight security protocol for optimal resource provenance in multihop WSNs and the Internet of things (IoT) network. The sharing of the resources between the sensor nodes indicates the strength of the mutual cooperation between …


Software-Defined Infrastructure For Iot-Based Energy Systems, Stephen Lee Oct 2019

Software-Defined Infrastructure For Iot-Based Energy Systems, Stephen Lee

Doctoral Dissertations

Internet of Things (IoT) devices are becoming an essential part of our everyday lives. These physical devices are connected to the internet and can measure or control the environment around us. Further, IoT devices are increasingly being used to monitor buildings, farms, health, and transportation. As these connected devices become more pervasive, these devices will generate vast amounts of data that can be used to gain insights and build intelligence into the system. At the same time, large-scale deployment of these devices will raise new challenges in efficiently managing and controlling them. In this thesis, I argue that the IoT …


Workload Allocation In Mobile Edge Computing Empowered Internet Of Things, Qiang Fan May 2019

Workload Allocation In Mobile Edge Computing Empowered Internet Of Things, Qiang Fan

Dissertations

In the past few years, a tremendous number of smart devices and objects, such as smart phones, wearable devices, industrial and utility components, are equipped with sensors to sense the real-time physical information from the environment. Hence, Internet of Things (IoT) is introduced, where various smart devices are connected with each other via the internet and empowered with data analytics. Owing to the high volume and fast velocity of data streams generated by IoT devices, the cloud that can provision flexible and efficient computing resources is employed as a smart "brain" to process and store the big data generated from …


Novel Node Deployment Scheme And Reliability Quantitative Analysis For An Iot-Based Monitoring System, Yinghua Tong, Liqin Tian, Jing Li Jan 2019

Novel Node Deployment Scheme And Reliability Quantitative Analysis For An Iot-Based Monitoring System, Yinghua Tong, Liqin Tian, Jing Li

Turkish Journal of Electrical Engineering and Computer Sciences

The Internet of things (IoT) is highly suitable for military, environmental, agricultural, and other remote real-time monitoring applications. A reliable topology ensures a stable and dependable monitoring system. Considering the research of an IoT-based air pollution monitoring system for industrial emissions as background, this study proposes a novel dual redundant node deployment scheme. Specifically, hexagonal clustering is proposed for the internal regions. In addition, relationship and quantification formulas for a monitoring area are presented, and the communication range, total number of layers of the topology, and number of cluster headers are determined. Interruptions in a monitoring system may reduce the …


Facepet: Enhancing Bystanders' Facial Privacy With Smart Wearables/Internet Of Things, Alfredo J. Perez, Sherali Zeadally, Luis Y. Matos Garcia, Jaouad A. Mouloud, Scott Griffith Dec 2018

Facepet: Enhancing Bystanders' Facial Privacy With Smart Wearables/Internet Of Things, Alfredo J. Perez, Sherali Zeadally, Luis Y. Matos Garcia, Jaouad A. Mouloud, Scott Griffith

Information Science Faculty Publications

Given the availability of cameras in mobile phones, drones and Internet-connected devices, facial privacy has become an area of major interest in the last few years, especially when photos are captured and can be used to identify bystanders’ faces who may have not given consent for these photos to be taken and be identified. Some solutions to protect facial privacy in photos currently exist. However, many of these solutions do not give a choice to bystanders because they rely on algorithms that de-identify photos or protocols to deactivate devices and systems not controlled by bystanders, thereby being dependent on the …


Reliable Data Gathering In The Internet Of Things Using Artificial Bee Colony, Samad Najjar-Ghabel, Shamim Yousefi, Leili Farzinvash Jan 2018

Reliable Data Gathering In The Internet Of Things Using Artificial Bee Colony, Samad Najjar-Ghabel, Shamim Yousefi, Leili Farzinvash

Turkish Journal of Electrical Engineering and Computer Sciences

The Internet of Things (IoT) technology enables physical devices to communicate with each other for preparing, gathering, and sharing hazard warnings or critical information without human intervention. With respect to emergency applications of IoT technology, an essential issue is to provide an efficient and robust scheme for data gathering. The proposed solution in the existing approaches is to construct a spanning tree over the IoT devices and collect data using the tree. The shortcoming of these algorithms is that they do not take into account the probability of device mobility or failure. In such cases, the spanning tree is split, …


Improvement Of Air Pollution Prediction In A Smart City And Its Correlation With Weather Conditions Using Metrological Big Data, Talat Zaree, Ali Reza Honarvar Jan 2018

Improvement Of Air Pollution Prediction In A Smart City And Its Correlation With Weather Conditions Using Metrological Big Data, Talat Zaree, Ali Reza Honarvar

Turkish Journal of Electrical Engineering and Computer Sciences

Smart cities are an important concept for urban development. This concept addresses many current critical urban problems including traffic and environmental pollution. As utilization of the Internet of things and technology in smart cities increases, large volumes of big data are generated and collected by sensors embedded at different places in the city, which present a real-time display of what is happening throughout the city at all times. Such data should be processed and analyzed as a response to ensure effectiveness and improvement in quality of provided services; correct use and analysis of such data is valuable. Big data mining …


Planar Array Of Right-Angled Isosceles Triangular Microstrip Antenna Using Koch And Meander Lines For The Internet Of Things, Manisha Gupta, Vinita Mathur Jan 2017

Planar Array Of Right-Angled Isosceles Triangular Microstrip Antenna Using Koch And Meander Lines For The Internet Of Things, Manisha Gupta, Vinita Mathur

Turkish Journal of Electrical Engineering and Computer Sciences

An ultrawideband antenna array using a right-angled isosceles triangular microstrip antenna as a basic element is presented using inset feed for applications in the Internet of things. A Koch fractal antenna array with defected ground plane is used to generate multiband applications. Further, meander lines are added to increase the equivalent inductance that reduces the size of the antenna and increases the bandwidth and gain. Antenna arrays have been constructed and experimentally studied. The measured results show good agreement with the numerical prediction and wideband operation.