Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Engineering (9)
- Computer Engineering (5)
- Electrical and Computer Engineering (4)
- Databases and Information Systems (3)
- Digital Communications and Networking (3)
-
- Information Security (3)
- Operations Research, Systems Engineering and Industrial Engineering (3)
- Artificial Intelligence and Robotics (1)
- Business (1)
- Computer Law (1)
- Education (1)
- Electrical and Electronics (1)
- Emergency and Disaster Management (1)
- Industrial Engineering (1)
- Industrial Technology (1)
- Law (1)
- Manufacturing (1)
- Mechanical Engineering (1)
- Other Computer Sciences (1)
- Public Affairs, Public Policy and Public Administration (1)
- Social and Behavioral Sciences (1)
- Software Engineering (1)
- Systems Engineering (1)
- Technology and Innovation (1)
- VLSI and Circuits, Embedded and Hardware Systems (1)
- Institution
- Publication
-
- Theses and Dissertations (2)
- Turkish Journal of Electrical Engineering and Computer Sciences (2)
- All Works (1)
- Articles (1)
- Computer Science Faculty Publications (1)
-
- Dartmouth College Undergraduate Theses (1)
- Electronic Theses and Dissertations (1)
- Engineering Management & Systems Engineering Faculty Publications (1)
- Honors Theses (1)
- Information Technology & Decision Sciences Faculty Publications (1)
- Journal of Digital Forensics, Security and Law (1)
- Research Collection School Of Computing and Information Systems (1)
- Walden Dissertations and Doctoral Studies (1)
- Publication Type
Articles 1 - 15 of 15
Full-Text Articles in Physical Sciences and Mathematics
Recent Advances In Wearable Sensing Technologies, Alfredo J. Perez, Sherali Zeadally
Recent Advances In Wearable Sensing Technologies, Alfredo J. Perez, Sherali Zeadally
Computer Science Faculty Publications
Wearable sensing technologies are having a worldwide impact on the creation of novel business opportunities and application services that are benefiting the common citizen. By using these technologies, people have transformed the way they live, interact with each other and their surroundings, their daily routines, and how they monitor their health conditions. We review recent advances in the area of wearable sensing technologies, focusing on aspects such as sensor technologies, communication infrastructures, service infrastructures, security, and privacy. We also review the use of consumer wearables during the coronavirus disease 19 (COVID-19) pandemic caused by the severe acute respiratory syndrome coronavirus …
Internet Of Things Software And Hardware Architectures And Their Impacts On Forensic Investigations: Current Approaches And Challenges, Abel Alex Boozer, Arun John, Tathagata Mukherjee
Internet Of Things Software And Hardware Architectures And Their Impacts On Forensic Investigations: Current Approaches And Challenges, Abel Alex Boozer, Arun John, Tathagata Mukherjee
Journal of Digital Forensics, Security and Law
The never-before-seen proliferation of interconnected low-power computing devices, patently dubbed the Internet of Things (IoT), is revolutionizing how people, organizations, and malicious actors interact with one another and the Internet. Many of these devices collect data in different forms, be it audio, location data, or user commands. In civil or criminal nature investigations, the data collected can act as evidence for the prosecution or the defense. This data can also be used as a component of cybersecurity efforts. When data is extracted from these devices, investigators are expected to do so using proven methods. Still, unfortunately, given the heterogeneity in …
Lightweight Mutual Authentication And Privacy Preservation Schemes For Iot Systems., Samah Mansour
Lightweight Mutual Authentication And Privacy Preservation Schemes For Iot Systems., Samah Mansour
Electronic Theses and Dissertations
Internet of Things (IoT) presents a holistic and transformative approach for providing services in different domains. IoT creates an atmosphere of interaction between humans and the surrounding physical world through various technologies such as sensors, actuators, and the cloud. Theoretically, when everything is connected, everything is at risk. The rapid growth of IoT with the heterogeneous devices that are connected to the Internet generates new challenges in protecting and preserving user’s privacy and ensuring the security of our lives. IoT systems face considerable challenges in deploying robust authentication protocols because some of the IoT devices are resource-constrained with limited computation …
Flying Free: A Research Overview Of Deep Learning In Drone Navigation Autonomy, Thomas Lee, Susan Mckeever, Jane Courtney
Flying Free: A Research Overview Of Deep Learning In Drone Navigation Autonomy, Thomas Lee, Susan Mckeever, Jane Courtney
Articles
With the rise of Deep Learning approaches in computer vision applications, significant strides have been made towards vehicular autonomy. Research activity in autonomous drone navigation has increased rapidly in the past five years, and drones are moving fast towards the ultimate goal of near-complete autonomy. However, while much work in the area focuses on specific tasks in drone navigation, the contribution to the overall goal of autonomy is often not assessed, and a comprehensive overview is needed. In this work, a taxonomy of drone navigation autonomy is established by mapping the definitions of vehicular autonomy levels, as defined by the …
Iot Garden Frost Alarm, Andrew James
Iot Garden Frost Alarm, Andrew James
Honors Theses
Home gardeners are faced with yearly challenges due to spring frosts harming young plants. This is frequently mitigated by covering crops with frost blankets, but only on nights when a frost is predicted. In areas with less predictable climate, an unexpected frost can kill vulnerable plants, reducing the amount of food produced. A system is proposed and designed here to use internet of things (IoT) technology to enable a small weather station in the home garden to report current climate data and predict frosts, then alert the gardener in time for them to cover their plants.
The system as designed …
Efficient Attribute-Based Encryption With Repeated Attributes Optimization, Fawad Khan, Hui Li, Yinghui Zhang, Haider Abbas, Tahreem Yaqoob
Efficient Attribute-Based Encryption With Repeated Attributes Optimization, Fawad Khan, Hui Li, Yinghui Zhang, Haider Abbas, Tahreem Yaqoob
Research Collection School Of Computing and Information Systems
Internet of Things (IoT) is an integration of various technologies to provide technological enhancements. To enforce access control on low power operated battery constrained devices is a challenging issue in IoT scenarios. Attribute-based encryption (ABE) has emerged as an access control mechanism to allow users to encrypt and decrypt data based on an attributes policy. However, to accommodate the expressiveness of policy for practical application scenarios, attributes may be repeated in a policy. For certain policies, the attributes repetition cannot be avoided even after applying the boolean optimization techniques to attain an equivalent smaller length boolean formula. For such policies, …
An Inside Vs. Outside Classification System For Wi-Fi Iot Devices, Paul Gralla
An Inside Vs. Outside Classification System For Wi-Fi Iot Devices, Paul Gralla
Dartmouth College Undergraduate Theses
We are entering an era in which Smart Devices are increasingly integrated into our daily lives. Everyday objects are gaining computational power to interact with their environments and communicate with each other and the world via the Internet. While the integration of such devices offers many potential benefits to their users, it also gives rise to a unique set of challenges. One of those challenges is to detect whether a device belongs to one’s own ecosystem, or to a neighbor – or represents an unexpected adversary. An important part of determining whether a device is friend or adversary is to …
Long Distance Bluetooth Low Energy Exploitation On A Wireless Attack Platform, Stephanie L. Long
Long Distance Bluetooth Low Energy Exploitation On A Wireless Attack Platform, Stephanie L. Long
Theses and Dissertations
In the past decade, embedded technology, known as the Internet of Things, has expanded for many uses. The smart home infrastructure has drastically grown to include networked refrigerators, lighting systems, speakers, watches, and more. This increase in the use of wireless protocols provides a larger attack surface for cyber actors than ever before. Wireless loT traffic is susceptible for sniffing by an attacker. The attack platform skypie is upgraded to incorporate Bluetooth Low Energy (BLE) beacon collection for pattern-of-life data, as well as device characteristic enumeration and potential characteristic modification. This platform allows an attacker to mount the skypie to …
Lorawan Device Security And Energy Optimization, John A. Stranahan Jr.
Lorawan Device Security And Energy Optimization, John A. Stranahan Jr.
Theses and Dissertations
Resource-constrained devices are commonly connected to a network and become "things" that make up the Internet of Things (IoT). Many industries are interested in cost-effective, reliable, and cyber secure sensor networks due to the ever-increasing connectivity and benefits of IoT devices. The full advantages of IoT devices are seen in a long-range and remote context. However, current IoT platforms show many obstacles to achieve a balance between power efficiency and cybersecurity. Battery-powered sensor nodes can reliably send data over long distances with minimal power draw by adopting Long-Range (LoRa) wireless radio frequency technology. With LoRa, these devices can stay active …
Characterizing Visual Programming Approaches For End-User Developers: A Systematic Review, Mohammad Amin Kuhail, Shahbano Farooq, Rawad Hammad, Mohammed Bahja
Characterizing Visual Programming Approaches For End-User Developers: A Systematic Review, Mohammad Amin Kuhail, Shahbano Farooq, Rawad Hammad, Mohammed Bahja
All Works
Recently many researches have explored the potential of visual programming in robotics, the Internet of Things (IoT), and education. However, there is a lack of studies that analyze the recent evidence-based visual programming approaches that are applied in several domains. This study presents a systematic review to understand, compare, and reflect on recent visual programming approaches using twelve dimensions: visual programming classification, interaction style, target users, domain, platform, empirical evaluation type, test participants' type, number of test participants, test participants' programming skills, evaluation methods, evaluation measures, and accessibility of visual programming tools. The results show that most of the selected …
Strategies For Implementing Internet Of Things Devices In Manufacturing Environments, Todd Efrain Hernandez
Strategies For Implementing Internet Of Things Devices In Manufacturing Environments, Todd Efrain Hernandez
Walden Dissertations and Doctoral Studies
The Internet of Things (IoT) has been exploited as a threat vector for cyberattacks in manufacturing environments. Manufacturing industry leaders are concerned with cyberattacks because of the associated costs of damages and lost production for their organizations. Grounded in the general systems theory, the purpose of this multiple case study was to explore strategies electrical controls engineers use to implement secure IoT devices in manufacturing environments. The study participants were eight electrical controls engineers working in three separate manufacturing facilities located in the Midwest region of the United States. The data were collected by semistructured interviews and 15 organizational documents. …
Generic Design Methodology For Smart Manufacturing Systems From A Practical Perspective, Part I—Digital Triad Concept And Its Application As A System Reference Model, Zhuming Bi, Wen-Jun Zhang, Chong Wu, Chaomin Luo, Lida Xu
Generic Design Methodology For Smart Manufacturing Systems From A Practical Perspective, Part I—Digital Triad Concept And Its Application As A System Reference Model, Zhuming Bi, Wen-Jun Zhang, Chong Wu, Chaomin Luo, Lida Xu
Information Technology & Decision Sciences Faculty Publications
Rapidly developed information technologies (IT) have continuously empowered manufacturing systems and accelerated the evolution of manufacturing system paradigms, and smart manufacturing (SM) has become one of the most promising paradigms. The study of SM has attracted a great deal of attention for researchers in academia and practitioners in industry. However, an obvious fact is that people with different backgrounds have different expectations for SM, and this has led to high diversity, ambiguity, and inconsistency in terms of definitions, reference models, performance matrices, and system design methodologies. It has been found that the state of the art SM research is limited …
Internet Of Things Data Compression Based On Successive Data Grouping, Samer Sawalha, Ghazi Al-Naymat
Internet Of Things Data Compression Based On Successive Data Grouping, Samer Sawalha, Ghazi Al-Naymat
Turkish Journal of Electrical Engineering and Computer Sciences
Internet of things (IoT) is a useful technology in different aspects, and it is widely used in many applications; however, this technology faces some major challenges which need to be solved, such as data management and energy saving. Sensors generate a huge amount of data that need to be transferred to other IoT layers in an efficient way to save the energy of the sensor because most of the energy is consumed in the data transmission process. Sensors usually use batteries to operate; thus, saving energy is very important because of the difficulty of replacing batteries of widely distributed sensors. …
A Blockchain-Enabled Model To Enhance Disaster Aids Network Resilience, Farinaz Sabz Ali Pour, Paul Niculescu-Mizil Gheorghe
A Blockchain-Enabled Model To Enhance Disaster Aids Network Resilience, Farinaz Sabz Ali Pour, Paul Niculescu-Mizil Gheorghe
Engineering Management & Systems Engineering Faculty Publications
The disaster area is a true dynamic environment. Lack of accurate information from the affected area create several challenges in distributing the supplies. The success of a disaster response network is based on collaboration, coordination, sovereignty, and equality in relief distribution. Therefore, a trust-based dynamic communication system is required to facilitate the interactions, enhance the knowledge for the relief operation, prioritize, and coordinate the goods distribution. One of the promising innovative technologies is blockchain technology which enables transparent, secure, and real-time information exchange and automation through smart contracts in a distributed technological ecosystem. This study aims to analyze the application …
New Normal: Cooperative Paradigm For Covid-19 Timely Detection Andcontainment Using Internet Of Things And Deep Learning, Farooque Hassan Kumbhar, Ali Hassan Syed, Soo Young Shin
New Normal: Cooperative Paradigm For Covid-19 Timely Detection Andcontainment Using Internet Of Things And Deep Learning, Farooque Hassan Kumbhar, Ali Hassan Syed, Soo Young Shin
Turkish Journal of Electrical Engineering and Computer Sciences
The spread of the novel coronavirus (COVID-19) has caused trillions of dollars of damages to the governments and health authorities by affecting the global economies. It is essential to identify, track and trace COVID-19 spread at its earliest detection. Timely action can not only reduce further spread but also help in providing an efficient medical response. Existing schemes rely on volunteer participation, and/or mobile traceability, which leads to delays in containing the spread. There is a need for an autonomous, connected, and centralized paradigm that can identify, trace and inform connected personals. We propose a novel connected Internet of Things …