exchange data
Recently Published Documents


TOTAL DOCUMENTS

509
(FIVE YEARS 167)

H-INDEX

25
(FIVE YEARS 5)

2022 ◽  
pp. 132-148
Author(s):  
Kiran M. B. ◽  
Martin George Wynn

The Internet of Things (IoT) is formed by a set of physical objects with embedded sensors, connected using a network so that they can collect and exchange data. Though the concept looks simple, its deployment in industry has enormous potential to bring major business benefits and radical change. This chapter examines IoT technology and how it is being used in the corporate environment. Based on a review of existing literature and case examples, the various definitions and elements of IoT are discussed, followed by an assessment of how IoT is being used and what benefits are being delivered. Some key emergent themes are then examined – security aspects, the significance of 5G networks, and the need for an IoT strategy and project implementation guidelines. The chapter concludes by outlining possible areas for future research and suggests a step-change in the mega-infrastructure connecting IoT devices is imminent.


Author(s):  
Dr. Sunita Chaudhary

This paper will explain the concept and need for the serverless architecture. In this concept the need for separate infrastructure to install application is not there. In order to exchange data, client and servers are needed where client will raise query to the server and the centralised server which has the information will respond with the results to the client. Here, the server is a centralised storage unit in which all the details are stored and that can be accessed remotely. In a server less architecture this server can be implemented without having the need for infrastructure which is known as serverless architecture. The paper will explain the process of implementation of the serverless architecture, its advantages, disadvantages, challenges and characteristics.


2022 ◽  
Vol 1216 (1) ◽  
pp. 012003
Author(s):  
M E Mehmed-Hamza ◽  
A B Filipov ◽  
M D Ivanova

Abstract With the development of modern technologies, opportunities for an exchange of the increasing amount of information at ever higher speeds are created. The use of smart systems in electric power engineering creates conditions for improving the systems for monitoring, archiving, analysis and management. It is necessary to collect the basic information about the emergency modes automatically for analysis of the operation of the equipment and the parameters of the regimes in the power grids. The main questions to be decided are: what type of information is needed, how to use this information and at what are the different access levels, what should be the systems - local or global, how to exchange data. Smart systems for power grids and switchgears have been developed on a modular basis by almost all global manufacturers, as well as by many companies on individual assignments. The publication discusses the existing types of smart systems and the data they process. Suggestions have been made for the volume and structure of data that are needed for the analysis process.


2022 ◽  
Vol 64 ◽  
pp. 102774
Author(s):  
Jason I. Pallant ◽  
Jessica L. Pallant ◽  
Sean J. Sands ◽  
Carla R. Ferraro ◽  
Eslam Afifi
Keyword(s):  

2021 ◽  
Author(s):  
M Sabbir Salek ◽  
Sakib Mahmud Khan ◽  
Mizanur rahman ◽  
Hsien-wen Deng ◽  
Mhafuzul islam ◽  
...  

In an internet-of-things (IoT) environment, cloud computing is emerging as a technologically feasible and economically viable solution for supporting real-time and non-real-time connected vehicle (CV) applications due to its unlimited storage, enormous computing capabilities, and cost advantage, i.e., cloud computing costs less than owning such systems. However, maintaining cybersecurity is a major challenge in cloud-supported CV applications as it requires CVs and various transportation or non-transportation services to exchange data with the cloud via multiple wired and wireless communication networks, such as long-term evolution (LTE) and Wi-Fi. In this paper, we review the cybersecurity requirements of cloud-supported CV applications, such as confidentiality, integrity, availability, authentication, accountability, and privacy. Our review also identifies the associated cybersecurity challenges that might impact cloud-supported CV applications and corresponding solutions to these challenges. In addition, we present future research opportunities to prevent and mitigate cybersecurity issues in cloud computing for CV-related applications.


2021 ◽  
Author(s):  
M Sabbir Salek ◽  
Sakib Mahmud Khan ◽  
Mizanur rahman ◽  
Hsien-wen Deng ◽  
Mhafuzul islam ◽  
...  

In an internet-of-things (IoT) environment, cloud computing is emerging as a technologically feasible and economically viable solution for supporting real-time and non-real-time connected vehicle (CV) applications due to its unlimited storage, enormous computing capabilities, and cost advantage, i.e., cloud computing costs less than owning such systems. However, maintaining cybersecurity is a major challenge in cloud-supported CV applications as it requires CVs and various transportation or non-transportation services to exchange data with the cloud via multiple wired and wireless communication networks, such as long-term evolution (LTE) and Wi-Fi. In this paper, we review the cybersecurity requirements of cloud-supported CV applications, such as confidentiality, integrity, availability, authentication, accountability, and privacy. Our review also identifies the associated cybersecurity challenges that might impact cloud-supported CV applications and corresponding solutions to these challenges. In addition, we present future research opportunities to prevent and mitigate cybersecurity issues in cloud computing for CV-related applications.


Standards ◽  
2021 ◽  
Vol 2 (1) ◽  
pp. 1-13
Author(s):  
Yoshiaki Fukami

The concept of the Internet of Things (IoT), which is an architecture in which devices supplied by various firms and services operated by distributed organizations exchange data, has been adopted in an increasing number of situations. While there are cases in which a small number of limited organizations collaborate on certain ecosystems based on proprietary specifications, the development of open standards is increasingly important for building scalable ecosystems because of the introduction of the concepts of Industry 4.0 and Society 5.0. Under these circumstances, there are two types of barriers to standardization. One barrier is the lack of shared frames for architectural design. The other barrier is the lack of awareness of the need for scalability. In this paper, we analyze the factors underlying these two barriers and discuss the path towards breakthroughs.


PLoS ONE ◽  
2021 ◽  
Vol 16 (12) ◽  
pp. e0260634
Author(s):  
Ahmed Salim ◽  
Ahmed Ismail ◽  
Walid Osamy ◽  
Ahmed M. Khedr

Compressive Sensing (CS) based data collection schemes are found to be effective in enhancing the data collection performance and lifetime of IoT based WSNs. However, they face major challenges related to key distribution and adversary attacks in hostile and complex network deployments. As a result, such schemes cannot effectively ensure the security of data. Towards the goal of providing high security and efficiency in data collection performance of IoT based WSNs, we propose a new security scheme that amalgamates the advantages of CS and Elliptic Curve Cryptography (ECC). We present an efficient algorithms to enhance the security and efficiency of CS based data collection in IoT-based WSNs. The proposed scheme operates in five main phases, namely Key Generation, CS-Key Exchange, Data Compression with CS Encryption, Data Aggregation and Encryption with ECC algorithm, and CS Key Re-generation. It considers the benefits of ECC as public key algorithm and CS as encryption and compression method to provide security as well as energy efficiency for cluster based WSNs. Also, it solves the CS- Encryption key distribution problem by introducing a new key sharing method that enables secure exchange of pseudo-random key between the BS and the nodes in a simple way. In addition, a new method is introduced to safeguard the CS scheme from potential security attacks. The efficiency of our proposed technique in terms of security, energy consumption and network lifetime is proved through simulation analysis.


2021 ◽  
Author(s):  
Akula Vamsi Krishna Rao ◽  
V.N. Aditya Datta Chivukula ◽  
Sri Keshava Reddy Adupala ◽  
Abhiram Reddy Cholleti

In recent years, security has become a big issue for many applications to defend attacks from intruders. Exchanging credentials in plaintext might expose it to stealers. Many techniques are required to protect the data of the consumers from attackers. Cryptography has come up with a solution to provide security for the users to exchange data securely by the means of the process called as Encryption/ Decryption. In this field, there are basically two techniques of cryptography i.e Symmetric and asymmetric, developed to achieve a secure connection between the sender and receiver. These techniques provide specific goals in maintaining privacy by converting original message to non-readable form and sends it over a communication channel. The unauthorized members try to break the non-readable form but the difficulty depends upon the techniques that were used to encrypt the data. In this paper, we proposed a quadruple encryption algorithm consists of novel phase-shift algorithm, AES (Advanced Encryption Standard), TwoFish and RC4 and making it hard to attack by common methods.


Sign in / Sign up

Export Citation Format

Share Document