To see the other types of publications on this topic, follow the link: Military IoT.

Journal articles on the topic 'Military IoT'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Military IoT.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Sonare, Renuka Chandrakant, and Dinesh V. Rojatkar. "Application OF IoT in Military Service." International Journal of Trend in Scientific Research and Development Volume-1, Issue-6 (October 31, 2017): 794–97. http://dx.doi.org/10.31142/ijtsrd4629.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Toth, Andreas. "Internet of Things Vulnerabilities in Military Environments." Vojenské rozhledy 30, no. 3 (September 8, 2021): 45–58. http://dx.doi.org/10.3849/2336-2995.30.2021.03.045-058.

Full text
Abstract:
IoT devices (sensors, drones, cameras) are gaining more and more emphasis on military operations. The application of IoT elements in the military environment increases situational awareness and supports the acquisition and maintenance of information superiority. The information they provide about the enemy, the area of operations, and the location and status of our soldiers and assets can contribute to the successful execution of operations at the tactical, operational and strategic levels. However, they can also pose serious threats if their vulnerabilities allow the data they collected to leak or they provide access to the info-communication networks used for the enemy. In this article, the author examined the vulnerabilities of these IoT devices using keyword analysis. After drawing conclusions from the analysis of the relevant literature, he compared the results with the general-purpose IoT threats and attacks typical of today, like distributed denial of service attacks, security, software, security and privacy issues.
APA, Harvard, Vancouver, ISO, and other styles
3

Kattimani, Miss Jyoti G. "Military Health System using IOT." International Journal for Research in Applied Science and Engineering Technology 7, no. 4 (April 30, 2019): 2889–94. http://dx.doi.org/10.22214/ijraset.2019.4486.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

L., Kirubakaran, Sangeetha G., Rathna Priya, and Sudharsan S. "Military Surveillance System using IOT." International Journal of Computer Applications 176, no. 15 (April 15, 2020): 27–31. http://dx.doi.org/10.5120/ijca2020920067.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Lu, Ye, Chao Xie, and Li Shang. "Study on the Transformation of Military Logistical of Internet of Things Era." Applied Mechanics and Materials 596 (July 2014): 119–22. http://dx.doi.org/10.4028/www.scientific.net/amm.596.119.

Full text
Abstract:
The paper discussed the basic conceptions of Internet of Things (IOT), its structure and key technology. It expounded the application principle, development and practice of military IOT technology from the aspects of military logistics, asset management, materiel support, mobilization and barracks management, combined with instances. Finally, the problems in application and current developing status of the military IOT technology were expatiated upon in terms of the military IOT technology standard and RFID technology safety.
APA, Harvard, Vancouver, ISO, and other styles
6

Cha, Sungyong, Seungsoo Baek, Sooyoung Kang, and Seungjoo Kim. "Security Evaluation Framework for Military IoT Devices." Security and Communication Networks 2018 (July 3, 2018): 1–12. http://dx.doi.org/10.1155/2018/6135845.

Full text
Abstract:
IoT is gaining importance in our lives and in the military too. With the application of IoT paradigm in the military and the weapon system’s connectivity to the network, this facilitates the commanders to make real-time decisions. However, cybersecurity threats to weapon systems intensify along with the growing of IoT’s benefits. Coping with these cybersecurity threats nowadays, we require the implementation of “security by design” concept during weapon system development throughout the system lifecycle, but not traditional security solutions. Since only developed countries are capable of developing systems on their own, they adopt “security by design” when developing new weapon systems; another approach to acquire weapon systems is through import if a country cannot develop the whole weapon system. However, few studies have been done on the security evaluation framework that could be used upon purchase and integration of the developed weapon system. In this paper, we proposed a novel security evaluation framework that could be used to integrate IoT devices and components into the weapon system and a method to address cybersecurity requirements using international standard security control.
APA, Harvard, Vancouver, ISO, and other styles
7

Kumar K S, Yashwanth, and Dr Narasimha Murthy M S. "Design of Monitor Individuals Health using IOT A IOT Application for Military Area." International Journal of Innovative Science and Research Technology 5, no. 6 (July 3, 2020): 693–98. http://dx.doi.org/10.38124/ijisrt20jun291.

Full text
Abstract:
The universe of medical science is a developing zone that has quickened with new innovations and this is the point at which the vision of "The Internet of things (IoT)" has transformed into the real world. IoT can assume a critical job in observing indispensable organs of people in the field of National Guard. Remote wellbeing observing (utilizing IoT) is one of the potential answers for this interest. Remote wellbeing observing can be best used gave the device is wearable to encourage self checking. Right now a framework for observing of heartbeat rate, internal heat level (essential body parameters) of the individual with committed sensors and IoT. A framework is wearable and furthermore bolsters remote wellbeing observing. Remote wellbeing observing is performed by putting all the gathered information to cloud, this information can be recovered by the specialist for examination anywhere. Along with remote checking and wearability of framework, precision and cost can't be disregarded. An ideal exchange off among precision and cost of the framework is practiced by picking fitting temperature sensor and pulse rate sensor. The heart beat rate and temperature of an individual at various time moments are estimated by the sensors.
APA, Harvard, Vancouver, ISO, and other styles
8

Popescu, Florin. "From the IoT to the IoBT. The Path to Superior Situational Understanding." Land Forces Academy Review 24, no. 4 (December 1, 2019): 276–82. http://dx.doi.org/10.2478/raft-2019-0034.

Full text
Abstract:
Abstract In order to maintain and improve its competitive advantage, the ability of 21st-century armies to recognize, anticipate, adapt and manipulate IoT on the future battlefield is important. The explosive growth of innovation in the commercial sector which utilizes the integration of cloud computing, mobile communications, sensor data collection networks and artificial intelligence is a major challenge for the military. A new concept, still untapped, called the Battlefield Things Internet (IoBT) comes from here.
APA, Harvard, Vancouver, ISO, and other styles
9

Jung, Seung-hoon, Jae-choon An, Jin-young Park, Yong-tae Shin, and Jong-bae Kim. "An Empirical Study of the Military IoT Security Priorities." International Journal of Security and Its Applications 10, no. 8 (August 31, 2016): 13–22. http://dx.doi.org/10.14257/ijsia.2016.10.8.02.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Iyer, Brijesh, and Niket Patil. "IoT enabled tracking and monitoring sensor for military applications." International Journal of System Assurance Engineering and Management 9, no. 6 (July 19, 2018): 1294–301. http://dx.doi.org/10.1007/s13198-018-0727-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Jaya, Iksan, Edy Maryanto, Alexander Victor Bukit, and Muhamad Zulkifli. "DESIGN AND DEVELOPMENT OF EARLY HEAT STROKE DETECTION SYSTEM IN MILITARY CROSS COUNTRY BASED ON IoT." JOURNAL ASRO 9, no. 2 (December 22, 2018): 141. http://dx.doi.org/10.37875/asro.v9i2.241.

Full text
Abstract:
Cross-country military sports are sports that are contested in the military environment asan effort to foster the physical abilities of the Navy's soldiers. The doctrine in the Indonesian Navyforcefully demands every soldier to never give up in every task that is carried out so that in militarysporting events the soldier will spend all of his abilities. In the process of cross-country competitionwith heavy physical activity causing many soldiers who experience heat exhaust (pre heat strokeconditions) continue to force themselves to compete and will continue to become a heat stroke.This is compounded by the distance traveled so that the medical team had difficulty reaching thesoldiers who experienced the incident. Internet of things (IoT) is the idea that all objects in the realworld can communicate with each other as part of an integrated system using the internet networkas a link.By using the IoT platform it is possible to monitor an object continuously and provideanalysis directly without being limited by distance and time. Based on the description above, it isnecessary to design and build an early detection system for the heat stroke of TNI AL soldiers incross-country military sport activities based on IoT (Internet of Thing). This system can help detectpositions and soldiers who will experience heat stroke so that medical treatment can be given earlyto prevent heat stroke.Keywords: Monitoring, Heat Stroke, Cross Country, IoT.
APA, Harvard, Vancouver, ISO, and other styles
12

Preda, Marius. "Digital Forensics of Internet of Things Smart Heating System Investigation." Journal of Military Technology 3, no. 1 (June 26, 2020): 23–28. http://dx.doi.org/10.32754/jmt.2020.1.04.

Full text
Abstract:
The Internet of Things (IoT) integrates the Internet and electronic devices with applicability to a large spectrum of domains, from smart home automation, industrial processes, military applications, to health and environmental monitoring. Despite the clear advantages, from a forensically sound perspective, IoT can improve the accuracy and integrity of forensic investigations, but still requires extensive scientific validation in practice. In this paper, we review selected stateof-the-art challenges corresponding to digital forensics of IoT environments, and we present an empirical method on how to investigate a security incident reported for an IoT specific case - Smart Heating system.
APA, Harvard, Vancouver, ISO, and other styles
13

Kim, Bruce, and Sang-Bock Cho. "3D TSV-based Inductor Design for a Secure Internet of Things." International Symposium on Microelectronics 2016, no. 1 (October 1, 2016): 000364–67. http://dx.doi.org/10.4071/isom-2016-wp53.

Full text
Abstract:
Abstract This paper describes the design and modeling of through-silicon via (TSV)-based high-density 3D inductors for Internet of Things (IoT) applications and presents some possible challenges for TSV-based inductors in IoT applications. For cybersecurity infrastructure, we designed IoT with hardware security in mind. We provide a secure design for Internet of Things based on secure 3D inductors and then show case studies of high-density RF packages with TSV-based inductors that require hardware security, such as military applications. We use ferromagnetic materials to achieve high inductance with good quality factor.
APA, Harvard, Vancouver, ISO, and other styles
14

E. Abel, Edje, Abd Latiff Muhammad Shafie, and Weng Howe Chan. "Deployment of internet of things-based cloudlet-cloud for surveillance operations." IAES International Journal of Artificial Intelligence (IJ-AI) 10, no. 1 (March 1, 2021): 24. http://dx.doi.org/10.11591/ijai.v10.i1.pp24-34.

Full text
Abstract:
This research proposes the design of internet of things (IoT) camera/toxic gas sensors for the surveillance of a nation’s borders. Also, a wearable radio frequency identification (RFID) tag with built-in body-temperature/heartbeat sensors, for monitoring the health status and locations of military personnel while on border patrol duty or in battlefield combats. Mobile micro-controllers are deployed to gather sensed data retrieved from the sensors/RFID tags and transmitted to a cloudlet situated at the command control center, located 200 meters away from the sensor devices. Consequently, sensed data are dispatch to the cloud data center when there is a need for offline data mining or analysis. The distinguishing feature of our proposed system from previous researches is that the health status and locations of troops (soldiers) are monitored while they are in border patrol duty or in battlefield combats. Also, the introduction of cloudlet services closer to the IoT sensor devices for collection of sensed data. This way, the sensed data or information gathered at the cloudlet will aid timely information retrieval that will speed up intelligence gathering for strategic military operations, especially in critical situations. This is an innovative attempt to apply IoT-enabled cloudlet-based cloud computing to support military operations.
APA, Harvard, Vancouver, ISO, and other styles
15

Al-Duwairi, Basheer, Wafaa Al-Kahla, Mhd Ammar AlRefai, Yazid Abedalqader, Abdullah Rawash, and Rana Fahmawi. "SIEM-based detection and mitigation of IoT-botnet DDoS attacks." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 2 (April 1, 2020): 2182. http://dx.doi.org/10.11591/ijece.v10i2.pp2182-2191.

Full text
Abstract:
The Internet of Things (IoT) is becoming an integral part of our daily life including health, environment, homes, military, etc. The enormous growth of IoT in recent years has attracted hackers to take advantage of their computation and communication capabilities to perform different types of attacks. The major concern is that IoT devices have several vulnerabilities that can be easily exploited to form IoT botnets consisting of millions of IoT devices and posing significant threats to Internet security. In this context, DDoS attacks originating from IoT botnets is a major problem in today’s Internet that requires immediate attention. In this paper, we propose a Security Information and Event Management-based IoT botnet DDoS attack detection and mitigation system. This system detects and blocks DDoS attack traffic from compromised IoT devices by monitoring specific packet types including TCP SYN, ICMP and DNS packets originating from these devices. We discuss a prototype implementation of the proposed system and we demonstrate that SIEM based solutions can be configured to accurately identify and block malicious traffic originating from compromised IoT devices.
APA, Harvard, Vancouver, ISO, and other styles
16

Shree Gowri Santhosh .V, Vishal .E, Vishak .R, and Dr. K. Rahimunnisa. "LoRa-IoT Focused System of Defense for Equipped Troops [LIFE]." Journal of Ubiquitous Computing and Communication Technologies 2, no. 3 (September 18, 2020): 153–77. http://dx.doi.org/10.36548/jucct.2020.3.005.

Full text
Abstract:
National security is the capacity of a nation to mobilize military forces to guarantee its borders and successfully defend against physical threats including military aggression and attacks by enemy troops. Every country lives peacefully as soldiers perform their duties. Furthermore, soldiers safeguard’s the honor of their country. Military communication plays an important role in nation’s warfare. Military communication concerns with transmission of every information from reconnaissance as well as other groups in contact with opposition. There are several issues with respect to soldiers’ safety. Whenever any soldier crosses the enemy lines, it is really essential for base station to identify the position and health condition of all the soldiers. This paper presents an idea of monitoring the soldier and also testing every soldier's health condition which helps army personnel to schedule the responsive operations. This paper includes an opportunity to map the positions and record the safety of the soldiers who get lost and wounded on the front line in real time. The data from sensors and GPS module will be transmitted wirelessly utilizing the soldiers’ LoRa kit. The data gathered will be uploaded to the cloud for further statistical analysis. Upon receiving the health status of soldiers, the army officials can keep track of every soldier. Our proposed system allows army personnel at bivouac to track the current GPS position of every battalion and also checks the vitals such as body temperature, blood pressure, ECG, SpO2 of soldiers. It also consists an extra feature with the help of that soldier can ask for help manually by pressing an alert switch to inform the army personnel at bivouac if he is in need or may have sensed the enemy intrusion.
APA, Harvard, Vancouver, ISO, and other styles
17

Lakshmi Narayanan, K., G. P. Ramesh, and V. Divya. "Robust and brittle secured video for IOT." International Journal of Engineering & Technology 7, no. 2.20 (April 18, 2018): 93. http://dx.doi.org/10.14419/ijet.v7i2.20.11762.

Full text
Abstract:
In this paper the system is mainly designed for the military purpose security since now-a-days securing our military has become a difficult task .our live is mainly dependent on other objects mainly we are computer based living and digital image processing plays a vital role in it. This process has much advantage as well as some disadvantage. A VLSI circuit is built with many millions of IC chip, so it is considered to be indivisible for the construction purpose. The internet-of things (Iot) is a electronic device which is connected to the vehicle and the building item which is used to generate many secured techniques which is connected with the software, electrical, electronics and mechectronics devices and human recourses also. Better Portable Graphics Algorithm with a Context-Adaptive Binary Arithmetic Coding (CABAC) encoding algorithm is used in the existing system this process is affected by the Gaussian noise, low compression ratio and time delay to overcome above issues and enhanced with Secure Better Portable Graphics (SBPG) compression algorithm with HEVC is present .The proposed architecture is suitable for high performance imaging in the Iot and for the high quality compression files and secured transformation of image and video captured in the digital camera. Encryption and watermarking are the two technique used in the process. The watermarking technique is more secure than the previous system. This process produces high quality JPEG, and high PSNR ratio. The scrambling algorithm is used in the encryption process. It is used for providing secured image.
APA, Harvard, Vancouver, ISO, and other styles
18

Charan Patel, Bhagwati, Ram Shankar Tripathi, and Naveen Goel. "IoT an Overview: Advantage, Disadvantage and Applications." International Journal of Computer Applications Technology and Research 10, no. 05 (May 6, 2021): 119–22. http://dx.doi.org/10.7753/ijcatr1005.1003.

Full text
Abstract:
Internet of Things (IoT) is a well-known term that has gained massive encouragement over a few years. The future of the human race will be significantly influenced by the application of IoT over the coming years. The Internet is everywhere and touched almost every corner of the globe affecting our lives in previously unimagined ways. As a living entity, the Internet is constantly evolving, and now, an era of widespread connectivity through various smart devices (i.e., things) that connect with the Internet has begun. IoT looks more like an umbrella covering many protocols, technologies, and concepts that depend on specific industries. It will lead to the development of efficient mechanisms with high scalability and interoperability features among the things or objects. IoT is a reality that is progressing day by day, connecting billions of people and things to form a vast global network. IoT has applications in various domains like agriculture, industry, military, and personal spaces. There are potential research challenges and issues in IoT that act as a hurdle in the complete exploration of IoT in real-time implementation.
APA, Harvard, Vancouver, ISO, and other styles
19

Shahid, Huniya, Munam Ali Shah, Ahmad Almogren, Hasan Ali Khattak, Ikram Ud Din, Neeraj Kumar, and Carsten Maple. "Machine Learning-based Mist Computing Enabled Internet of Battlefield Things." ACM Transactions on Internet Technology 21, no. 4 (November 30, 2021): 1–26. http://dx.doi.org/10.1145/3418204.

Full text
Abstract:
The rapid advancement in information and communication technology has revolutionized military departments and their operations. This advancement also gave birth to the idea of the Internet of Battlefield Things (IoBT). The IoBT refers to the fusion of the Internet of Things (IoT) with military operations on the battlefield. Various IoBT-based frameworks have been developed for the military. Nonetheless, many of these frameworks fail to maintain a high Quality of Service (QoS) due to the demanding and critical nature of IoBT. This study makes the use of mist computing while leveraging machine learning. Mist computing places computational capabilities on the edge itself (mist nodes), e.g., on end devices, wearables, sensors, and micro-controllers. This way, mist computing not only decreases latency but also saves power consumption and bandwidth as well by eliminating the need to communicate all data acquired, produced, or sensed. A mist-based version of the IoTNetWar framework is also proposed in this study. The mist-based IoTNetWar framework is a four-layer structure that aims at decreasing latency while maintaining QoS. Additionally, to further minimize delays, mist nodes utilize machine learning. Specifically, they use the delay-based K nearest neighbour algorithm for device-to-device communication purposes. The primary research objective of this work is to develop a system that is not only energy, time, and bandwidth-efficient, but it also helps military organizations with time-critical and resources-critical scenarios to monitor troops. By doing so, the system improves the overall decision-making process in a military campaign or battle. The proposed work is evaluated with the help of simulations in the EdgeCloudSim. The obtained results indicate that the proposed framework can achieve decreased network latency of 0.01 s and failure rate of 0.25% on average while maintaining high QoS in comparison to existing solutions.
APA, Harvard, Vancouver, ISO, and other styles
20

Ahmed, Hassan I., Abdurrahman A. Nasr, Salah M. Abdel-Mageid, and Heba K. Aslan. "DADEM." International Journal of Ambient Computing and Intelligence 12, no. 1 (January 2021): 114–39. http://dx.doi.org/10.4018/ijaci.2021010105.

Full text
Abstract:
Nowadays, Internet of Things (IoT) is considered as part our lives and it includes different aspects - from wearable devices to smart devices used in military applications. IoT connects a variety of devices and as such, the generated data is considered as ‘Big Data'. There has however been an increase in attacks in this era of IoT since IoT carries crucial information regarding banking, environmental, geographical, medical, and other aspects of the daily lives of humans. In this paper, a Distributed Attack Detection Model (DADEM) that combines two techniques - Deep Learning and Big Data analytics - is proposed. Sequential Deep Learning model is chosen as a classification engine for the distributed processing model after testing its classification accuracy against other classification algorithms like logistic regression, KNN, ID3 decision tree, CART, and SVM. Results showed that Sequential Deep Learning model outperforms the aforementioned ones. The classification accuracy of DADEM approaches 99.64% and 99.98% for the UNSW-NB15 and BoT-IoT datasets, respectively. Moreover, a plan is proposed for optimizing the proposed model to reduce the overhead of the overall system operation in a constrained environment like IoT.
APA, Harvard, Vancouver, ISO, and other styles
21

González-Landero, Franks, Iván García-Magariño, Raquel Lacuesta, and Jaime Lloret. "ABS-DDoS: An Agent-Based Simulator about Strategies of Both DDoS Attacks and Their Defenses, to Achieve Efficient Data Forwarding in Sensor Networks and IoT Devices." Wireless Communications and Mobile Computing 2018 (June 24, 2018): 1–11. http://dx.doi.org/10.1155/2018/7264269.

Full text
Abstract:
Sensor networks and Internet of Things (IoT) are useful for many purposes such as military defense, sensing in smart homes, precision agriculture, underwater monitoring in aquaculture, and ambient-assisted living for healthcare. Efficient and secure data forwarding is essential to maintain seamless communications and to provide fast services. However, IoT devices and sensors usually have low processing capabilities and vulnerabilities. For example, attacks such as the Distributed Denial of Service (DDoS) can easily hinder sensor networks and IoT devices. In this context, the current approach presents an agent-based simulation solution for exploring strategies for defending from different DDoS attacks. The current work focuses on obtaining low-consuming defense strategies in terms of processing capabilities, so that these can be applied in sensor networks and IoT devices. The experimental results show that the simulator was useful for (a) defining defense and attack strategies, (b) assessing the effectiveness of defense strategies against attack ones, and (c) defining efficient defense strategies with low response times.
APA, Harvard, Vancouver, ISO, and other styles
22

Guan, Qing-yang, and Wu Shuang. "Signal Detection in Satellite-Ground IoT Link Based on Blind Neural Network." Wireless Communications and Mobile Computing 2021 (May 6, 2021): 1–10. http://dx.doi.org/10.1155/2021/5547989.

Full text
Abstract:
At present, there are many problems in satellite-ground IoT link signal detection. Due to the complex characteristics of the satellite-ground IoT link, including Doppler and multipath effect, especially in scenarios related to military fields, it is difficult to use traditional method and traditional cooperative communication methods for link signal detection. Therefore, this paper proposes an efficient detection of satellite-ground IoT link based on the blind neural network (BNN). The BNN includes two network structures, the data feature network and the error update network. Through multiple iterations of the error update network, the weight of BNN for blind detection is optimized and the optimal elimination solution is obtained. Through establishing a satellite-to-ground link model simulation of the low-orbit satellite, the proposed BNN algorithm can obtain better bit error rate characteristics.
APA, Harvard, Vancouver, ISO, and other styles
23

Lagkas, Thomas, Vasileios Argyriou, Stamatia Bibi, and Panagiotis Sarigiannidis. "UAV IoT Framework Views and Challenges: Towards Protecting Drones as “Things”." Sensors 18, no. 11 (November 17, 2018): 4015. http://dx.doi.org/10.3390/s18114015.

Full text
Abstract:
Unmanned aerial vehicles (UAVs) have enormous potential in enabling new applications in various areas, ranging from military, security, medicine, and surveillance to traffic-monitoring applications. Lately, there has been heavy investment in the development of UAVs and multi-UAVs systems that can collaborate and complete missions more efficiently and economically. Emerging technologies such as 4G/5G networks have significant potential on UAVs equipped with cameras, sensors, and GPS receivers in delivering Internet of Things (IoT) services from great heights, creating an airborne domain of the IoT. However, there are many issues to be resolved before the effective use of UAVs can be made, including security, privacy, and management. As such, in this paper we review new UAV application areas enabled by the IoT and 5G technologies, analyze the sensor requirements, and overview solutions for fleet management over aerial-networking, privacy, and security challenges. Finally, we propose a framework that supports and enables these technologies on UAVs. The introduced framework provisions a holistic IoT architecture that enables the protection of UAVs as “flying” things in a collaborative networked environment.
APA, Harvard, Vancouver, ISO, and other styles
24

Inomoto, Hikaru, Sachio Saiki, Masahide Nakamura, and Shinsuke Matsumoto. "Design and evaluation of mission-oriented sensing platform with military analogy." International Journal of Pervasive Computing and Communications 13, no. 1 (April 3, 2017): 76–91. http://dx.doi.org/10.1108/ijpcc-01-2017-0007.

Full text
Abstract:
Purpose The purpose of this paper is to perform large-scale environmental sensing with a lot of Internet of Things (IoT) devices, as typically seen in a Smart City, efficiently and for multiple applications. In this paper, we propose a novel sensing method, called mission-oriented sensing, which accepts multiple and dynamic sensing purposes on a single infrastructure. Design/methodology/approach The proposed method achieves the purpose by dealing sensing configuration (application’s purpose) as a mission. It realizes sharing single infrastructure by accepting multiple missions in parallel, and it accepts missions’ update anytime. In addition, the sensing platform based on military analogy can command and control a lot of IoT devices in good order, and this realizes mission-oriented sensing above. Findings Introducing mission-oriented sensing, multiple purpose large-scale sensing can be conducted efficiently. The experimental evaluation with a prototype platform shows the practical feasibility. In addition, the result shows that it is effective to update sensing configuration dynamically. Research limitations/implications The proposed method focuses aggregating environmental sensor value from a lot of devices, and, thus, it can treat stream data, such as video or audio or control a specific device directly. Originality/value In proposed method, a single-sensing infrastructure can be used by multiple applications, and it admits heterogeneous devices in a single infrastructure. In addition, the proposed method has less technical restriction and developers can implement actual platform with technologies for context.
APA, Harvard, Vancouver, ISO, and other styles
25

Kh., Teeba Ismail, and Ibrahim I. Hamarash. "Model-Based Quality Assessment of Internet of Things Software Applications: A Systematic Mapping Study." International Journal of Interactive Mobile Technologies (iJIM) 14, no. 09 (June 17, 2020): 128. http://dx.doi.org/10.3991/ijim.v14i09.13431.

Full text
Abstract:
The Internet of things (IoT) is growing at a fast pace owing to its vast applications in varied fields such as medicine, society, economy, and even the military. This growth cannot continue without establishing high quality. Over the past decade, interest in research for the quality assurance of IoT has gradually grown. However, the discipline is still evolving, and further research is required to investigate the various quality-related aspects. Although assessing the entire system is impractical, to assure the quality of IoT applications, various assessment levels are required. A well-known and established approach to mitigate this difficulty is to model the entire system or a few parts of it for the sake of assessment, which is known as model-based testing. To determine what has been achieved thus far and what is lacking in this direction, this paper presents an extensive study on the use of the model-based approach to assure the quality of IoT applications. The study systematically reviews papers published from 2009 (early publications on IoT) to 2019 that reported the explicit use of models to assess the quality aspects of IoT applications. As a result of an extensive search process, the paper presents the results of scanning and reviewing 390 published papers. Thus far, out of these, 54 studies used the model-based approach to assess at least one quality aspect of an IoT application. In addition to the several relevant research questions that have been addressed in this study, this paper also presents several new insights and approaches for future research.
APA, Harvard, Vancouver, ISO, and other styles
26

Kumar Dwivedi, Anshu, Awadhesh Kumar Sharma, and Pawan Singh Mehra. "Energy Efficient Sensor Node Deployment Scheme for Two Stage Routing Protocol of Wireless Sensor Networks assisted IoT." ECTI Transactions on Electrical Engineering, Electronics, and Communications 18, no. 2 (August 31, 2020): 158–69. http://dx.doi.org/10.37936/ecti-eec.2020182.240541.

Full text
Abstract:
Now a day wireless sensor networks (WSNs) is an essential unit of the internet of things (IoT). IoT theater a vital role in real-time applications which is more useful in real life. Due to its small price and potential use, WSNs have shown importance in different applications over the past year. Health concerns, environmental observation, human protection, military operations, surveillance systems, etc. WSNs have a small device called a sensor node (SN) that has a limited battery. IoT based WSNs consume more energy in sensor node communication. Therefore a Novel energy-efficient sensor node deployment scheme for two-stage routing protocol (EE- DSTRP) has been proposed to reduce the energy consumption of sensor nodes and extend the lifetime of the network. Sensor node deployment is a novel approach based on the golden ratio. All traditional protocols divide network zones for communication. No existing protocols tell about the sensor node deployment ratio in each zone. The deployment method is an important factor in reducing the energy usage of a network. To validate its efficiency, in this article, simulation results prove that the proposed IoT based EE-DSTRP protocol is superior to other existing protocols.
APA, Harvard, Vancouver, ISO, and other styles
27

Karthik, M., and M. Krishnan. "Securing an Internet of Things from Distributed Denial of Service and Mirai Botnet Attacks Using a Novel Hybrid Detection and Mitigation Mechanism." International Journal of Intelligent Engineering and Systems 14, no. 1 (February 28, 2021): 113–23. http://dx.doi.org/10.22266/ijies2021.0228.12.

Full text
Abstract:
Internet of Things (IoT) has become more familiar in all applications and industrial fields such as medical, military, transportation, etc. It has some limitations because of the attack model in the transmission or communication channel. Moreover, one of the deadliest attacks is known as a Distributed Denial of Service Attack (DDoS). The Presence of DDoS in network layer cause huge damage in data transmission channel that ends in data loss or collapse. To address this issue the current research focused on an innovative detection and mitigation of Mirai and DDoS attack in IoT environment. Initially, number of IoT devices is arranged with the help of a novel Hybrid Strawberry and African Buffalo Optimization (HSBABO). Consequently, the types of DDoS attacks are launched in the developed IoT network. Moreover, the presence of strawberry and African Buffalo fitness is utilized to detect and specify the attack types. Subsequently a novel MCELIECE encryption with Cloud Shield scheme is developed to prevent the low and high rate DDoS attack in the Internet of Things. Finally, the proposed model attained 94% of attack detection accuracy, 3% of false negative rate and 5.5% of false positive rate.
APA, Harvard, Vancouver, ISO, and other styles
28

Aftab, Muhammad Umar, Ariyo Oluwasanmi, Abdullah Alharbi, Osama Sohaib, Xuyun Nie, Zhiguang Qin, and Son Tung Ngo. "Secure and dynamic access control for the Internet of Things (IoT) based traffic system." PeerJ Computer Science 7 (May 10, 2021): e471. http://dx.doi.org/10.7717/peerj-cs.471.

Full text
Abstract:
Today, the trend of the Internet of Things (IoT) is increasing through the use of smart devices, vehicular networks, and household devices with internet-based networks. Specifically, the IoT smart devices and gadgets used in government and military are crucial to operational success. Communication and data sharing between these devices have increased in several ways. Similarly, the threats of information breaches between communication channels have also surged significantly, making data security a challenging task. In this context, access control is an approach that can secure data by restricting unauthorized users. Various access control models exist that can effectively implement access control yet, and there is no single state-of-the-art model that can provide dynamicity, security, ease of administration, and rapid execution all at once. In combating this loophole, we propose a novel secure and dynamic access control (SDAC) model for the IoT networks (smart traffic control and roadside parking management). Our proposed model allows IoT devices to communicate and share information through a secure means by using wired and wireless networks (Cellular Networks or Wi-Fi). The effectiveness and efficiency of the proposed model are demonstrated using mathematical models and discussed with many example implementations.
APA, Harvard, Vancouver, ISO, and other styles
29

Saleh, Mohammed. "WSNs and IoT Their Challenges and applications for Healthcare and Agriculture: A Survey." 3D SCEEER Conference sceeer, no. 3d (July 1, 2020): 37–43. http://dx.doi.org/10.37917/ijeee.sceeer.3rd.6.

Full text
Abstract:
Nowadays, the Wireless Sensor Network (WSN) has materialized its working areas, including environmental engineering, agriculture sector, industrial, business applications, military, intelligent buildings, etc. Sensor networks emerge as an attractive technology with great promise for the future. Indeed, issues remain to be resolved in the areas of coverage and deployment, scalability, service quality, size, energy consumption and security. The purpose of this paper is to present the integration of WSNs for IoT networks with the intention of exchanging information, applying security and configuration. These aspects are the challenges of network construction in which authentication, confidentiality, availability, integrity, network development. This review sheds some light on the potential integration challenges imposed by the integration of WSNs for IoT, which are reflected in the difference in traffic features.
APA, Harvard, Vancouver, ISO, and other styles
30

Kang, James Jin, Wencheng Yang, Gordana Dermody, Mohammadreza Ghasemian, Sasan Adibi, and Paul Haskell-Dowland. "No Soldiers Left Behind: An IoT-Based Low-Power Military Mobile Health System Design." IEEE Access 8 (2020): 201498–515. http://dx.doi.org/10.1109/access.2020.3035812.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Madhiarasan, M. "Design and development of IoT based solar powered versatile moving robot for military application." International Journal of System Assurance Engineering and Management 12, no. 3 (April 16, 2021): 437–50. http://dx.doi.org/10.1007/s13198-021-01089-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

S, Swathi, and Yogish H K. "Secure data aggregation in IoT using Efficient-CSDA." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 6 (December 1, 2019): 4889. http://dx.doi.org/10.11591/ijece.v9i6.pp4889-4897.

Full text
Abstract:
<p><span>In recent days, IoT has been widely accepted and WSN (Wireless Sensor network) is being used for variety of the applications such as transportation, medical, environmental, military, it moreover the main aim to deploy the WSN is to collect the data about the given set of phenomena. The common task of WSN is to sense the data and send over the network. Moreover, due to the various purpose such as statistical analysis, the data aggregation is required. <span> </span>However, the when the dynamic network topology is considered, it is considered to be the very difficult task to provide the secure and efficient data aggregation. The main issue here is to ensure the security and accuracy of the data aggregation. Hence, in this research we have proposed an algorithm named as E-SDA (Efficient Secure Data Aggregation) in order to provide the secure data. In this, the algorithm provides the flexibility to detect the dishonest honest through neighbor monitoring. Later, extensive simulation has been done in order to prove the convergence of our algorithm.</span></p>
APA, Harvard, Vancouver, ISO, and other styles
33

Kumar, Dinesh, and Dr. S. Smys. "An Efficient Packet Delivery Scheme Using Trust Routing in G.9959 Protocol in a Wireless Sensor Network." Journal of Ubiquitous Computing and Communication Technologies 2, no. 3 (July 21, 2020): 118–25. http://dx.doi.org/10.36548/jucct.2020.3.001.

Full text
Abstract:
Wireless Sensor Network (WSN) has drawn high attention in the recent years both in the industrial and the research frontier. It integrates multiple application-based services in areas like disaster management, military usage, smart city, habitat monitoring, healthcare etc. It uses the term Internet of Things (IoT) when providing different services and applications. Similarly, when this network associates with industrial revolution, it is commonly addressed as the Industrial Internet of Things (IIoT). Using IPv6, it gives high scalability using the strength of Internet users. Hence it is crucial to ensure efficiency of the protocols and working modules. This will determine the battery lifetime when it is deployed, connected to the battery’s draining short-term. Based on this consideration, many protocols are tested using IIoT in WSN. For this paper we have chosen G.9959 as the protocol and a comparison is drawn with the IPv6 packet delivery rate. Experimental results indicate that the proposed work performs more efficiently when compared to other previous schemes.
APA, Harvard, Vancouver, ISO, and other styles
34

G V, Abhishek. "Autonomous Intelligent POD for Military Purpose." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (June 14, 2021): 839–48. http://dx.doi.org/10.22214/ijraset.2021.35068.

Full text
Abstract:
At present, the surveillance of International border areas is a challenging task. The border guarding forces are patrolling the border seriously, but it is no longer viable to watch the border at each and every moment. A critical requirement of this state of affairs is a robot that robotically detects trespasser in the border and reports close by board security control unit. Many of the army departments now make use of robots to elevate out risky jobs that can't be executed by means of the soldiers. In this present work, a Raspbian working system-based undercover agent robot platform with far off monitoring and manage algorithm through the Internet of Things (IoT)has been developed which will save human lives, reduces manual error and protect us from enemies. The spy robotic device comprises the Raspberry Pi (small single-board computer), pi camera and sensors. The information regarding the detection of living objects with the aid of the PIR sensor is dispatched to the users thru the net server and pi digicam capture the moving object which is posted inner the webpage simultaneously. The consumer in the manipulate room in a position to access the robot with wheel drive control buttons on the webpage. The movement of a robotic is also controlled robotically via obstacle detecting sensors to avoiding collisions. This surveillance system using a spy robot can be custom-made for more than a few fields like industries, banks and shopping malls.
APA, Harvard, Vancouver, ISO, and other styles
35

Kang, James Jin Won, and Henry Larkin. "Inference of Personal Sensors in the Internet of Things." International Journal of Information, Communication Technology and Applications 2, no. 1 (January 26, 2016): 1–23. http://dx.doi.org/10.17972/ijicta20162125.

Full text
Abstract:
Smartphone technology has become more popular and innovative over the last few years, and technology companies are now introducing wearable devices into the market. By emerging and converging with technologies such as Cloud, Internet of Things (IoT) and Virtualization, requirements to personal sensor devices are immense and essential to support existing networks, e.g. mobile health (mHealth) as well as IoT users. Traditional physiological and biological medical sensors in mHealth provide health data either periodically or on-demand. Both of these situations can cause rapid battery consumption, consume significant bandwidth, and raise privacy issues, because these sensors do not consider or understand sensor status when converged together. The aim of this research is to provide a novel approach and solution to managing and controlling personal sensors that can be used in various areas such as the health, military, aged care, IoT and sport. This paper presents an inference system to transfer health data collected by personal sensors efficiently and effectively to other networks in a secure and effective manner without burdening workload on sensor devices.
APA, Harvard, Vancouver, ISO, and other styles
36

Feng, Yuan, Menglin Li, Chengyi Zeng, and Hongfu Liu. "Robustness of Internet of Battlefield Things (IoBT): A Directed Network Perspective." Entropy 22, no. 10 (October 16, 2020): 1166. http://dx.doi.org/10.3390/e22101166.

Full text
Abstract:
Through the combination of various intelligent devices and the Internet to form a large-scale network, the Internet of Things (IoT) realizes real-time information exchange and communication between devices. IoT technology is expected to play an essential role in improving the combat effectiveness and situation awareness ability of armies. The interconnection between combat equipment and other battlefield resources is referred to as the Internet of Battlefield Things (IoBT). Battlefield real-time data sharing and the cooperative decision-making among commanders are highly dependent on the connectivity between different combat units in the network. However, due to the wireless characteristics of communication, a large number of communication links are directly exposed in the complex battlefield environment, and various cyber or physical attacks threaten network connectivity. Therefore, the ability to maintain network connectivity under adversary attacks is a critical property for the IoBT. In this work, we propose a directed network model and connectivity measurement of the IoBT network. Then, we develop an optimal attack strategy optimization model to simulate the optimal attack behavior of the enemy. By comparing with the disintegration effect of some benchmark strategies, we verify the optimality of the model solution and find that the robustness of the IoBT network decreases rapidly with an increase of the unidirectional communication links in the network. The results show that the adversary will change the attack mode according to the parameter settings of attack resources and network communication link density. In order to enhance the network robustness, we need to adjust the defense strategy in time to deal with this change. Finally, we validated the model and theoretical analysis proposed in this paper through experiments on a real military network.
APA, Harvard, Vancouver, ISO, and other styles
37

Pradhan, Manas, and Josef Noll. "Security, Privacy, and Dependability Evaluation in Verification and Validation Life Cycles for Military IoT Systems." IEEE Communications Magazine 58, no. 8 (August 2020): 14–20. http://dx.doi.org/10.1109/mcom.001.2000342.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Darwesh, Aso M., and Ramyar Abdolrahman Teimoor. "Node Detection and Tracking in Smart Cities Based on Internet of Things and Machine Learning." UHD Journal of Science and Technology 3, no. 1 (May 26, 2019): 30. http://dx.doi.org/10.21928/uhdjst.v3n1y2019.pp30-38.

Full text
Abstract:
It is essential to know that using technologies in a good manner will facilitate human live. Internet of Things (IoT) used widely due to developments in information and verbal exchange technologies. Some of the most famous fields of IoT applications are Identification, transmission, and healthcare which uses IoT technologies to collect information and recognizing the problem and propose the solution for it. In this paper, we try to find RFID nodes and their location. An Android Application used to provide help for those needed. Finding and detection the actual zone of our users are done by using KNN algorithm. We use 3NN because that model gets a better result in our dataset, for transmission depending on the users’ problem. We use a new equation to find weights that integrated with Dijkstra's algorithm, the equation is to calculate the weight between any two nodes using traffic information and image processing for finding a load of road by counting number of vehicles inside the image that collected from our readers. Dijkstra's algorithm is used to find the best path between source and destination using weights between nodes. The idea is used in healthcare, but can be used in many other fields like, security, Information and Communication Technology and Military.
APA, Harvard, Vancouver, ISO, and other styles
39

Popescu, Vasile Florin. "From Human Body Digitization to Internet of Bodies toward a New Dimension of Military Operations." Land Forces Academy Review 24, no. 3 (September 1, 2019): 242–49. http://dx.doi.org/10.2478/raft-2019-0029.

Full text
Abstract:
Abstract Digitization of the human body, philosophically said, - the “mating” with technology, represents the fusion of electronic technology with the human biology, which reduces the barriers of physical, digital and biological life. “The Internet of bodies”, that is the imminent development of the field of digitization of the human body on a large scale, is the inevitable future of technology at this moment. Instead of devices connected to the Internet as in Internet of Things (IoT), human bodies can be connected to a network, with the potential to be controlled and monitored remotely. The Internet of bodies is from the author’s point of view the future of technology, but this future is not so far away.
APA, Harvard, Vancouver, ISO, and other styles
40

R.M, Pranav. "Smart Logistics and Supply Chain with Machine Learning and IoT." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (June 25, 2021): 2180–84. http://dx.doi.org/10.22214/ijraset.2021.35216.

Full text
Abstract:
Logistics is an important part of the Supply Chain. The management of logistics and supply chain is a complex process of planning and management of services, goods from the origin to the point of consumption. Logistics is defined as the process of managing movement of goods in and out of an organization. Supply Chain is defined as the process of managing movement and coordination of goods in between multiple organizations. Together Logistics and Supply Chain includes planning the transport, warehousing, inventory and sales an example of logistics could be the military stockpiling ammo whereas an example of Supply Chain management is making sure the right amount of goods reaches the destination, supplying more could lead to increased storage costs and supplying less could lead to inefficiencies. So, the main objective of Logistics is customer satisfaction and the main objective of Supply Chain is to have a competitive advantage by being more efficient. This project aims to have both customer satisfaction and efficiency and will achieved by implementing Internet of Things and Machine Learning to Logistics and Supply Chain. Large Corporations invest a lot of money to improve supply chains. This paper aims to help small businesses and rural businesses to improve their Supply Chain. This project aims at providing customer satisfaction and efficiency. Implementation using IoT and machine learning provides better efficiency. Keywords— Smart Logistics, Smart Supply Chain, Industry 4.0, Internet of Things, Machine Learning.
APA, Harvard, Vancouver, ISO, and other styles
41

Pirozmand, Poria, Mohsen Angoraj Ghafary, Safieh Siadat, and Jiankang Ren. "Intrusion Detection into Cloud-Fog-Based IoT Networks Using Game Theory." Wireless Communications and Mobile Computing 2020 (November 14, 2020): 1–9. http://dx.doi.org/10.1155/2020/8819545.

Full text
Abstract:
The Internet of Things is an emerging technology that integrates the Internet and physical smart objects. This technology currently is used in many areas of human life, including education, agriculture, medicine, military and industrial processes, and trade. Integrating real-world objects with the Internet can pose security threats to many of our day-to-day activities. Intrusion detection systems (IDS) can be used in this technology as one of the security methods. In intrusion detection systems, early and correct detection (with high accuracy) of intrusions is considered very important. In this research, game theory is used to develop the performance of intrusion detection systems. In the proposed method, the attacker infiltration mode and the behavior of the intrusion detection system as a two-player and nonparticipatory dynamic game are completely analyzed and Nash equilibrium solution is used to create specific subgames. During the simulation performed using MATLAB software, various parameters were examined using the definitions of game theory and Nash equilibrium to extract the parameters that had the most accurate detection results. The results obtained from the simulation of the proposed method showed that the use of intrusion detection systems in the Internet of Things based on cloud-fog can be very effective in identifying attacks with the least amount of errors in this network.
APA, Harvard, Vancouver, ISO, and other styles
42

Borza, Paul Nicolae, Mihai Machedon-Pisu, and Felix Hamza-Lup. "Design of Wireless Sensors for IoT with Energy Storage and Communication Channel Heterogeneity." Sensors 19, no. 15 (July 31, 2019): 3364. http://dx.doi.org/10.3390/s19153364.

Full text
Abstract:
Autonomous Wireless Sensors (AWSs) are at the core of every Wireless Sensor Network (WSN). Current AWS technology allows the development of many IoT-based applications, ranging from military to bioengineering and from industry to education. The energy optimization of AWSs depends mainly on: Structural, functional, and application specifications. The holistic design methodology addresses all the factors mentioned above. In this sense, we propose an original solution based on a novel architecture that duplicates the transceivers and also the power source using a hybrid storage system. By identifying the consumption needs of the transceivers, an appropriate methodology for sizing and controlling the power flow for the power source is proposed. The paper emphasizes the fusion between information, communication, and energy consumption of the AWS in terms of spectrum information through a set of transceiver testing scenarios, identifying the main factors that influence the sensor node design and their inter-dependencies. Optimization of the system considers all these factors obtaining an energy efficient AWS, paving the way towards autonomous sensors by adding an energy harvesting element to them.
APA, Harvard, Vancouver, ISO, and other styles
43

Janiszewski, Marek, Anna Felkner, Piotr Lewandowski, Marcin Rytel, and Hubert Romanowski. "Automatic Actionable Information Processing and Trust Management Towards Safer Internet of Things." Sensors 21, no. 13 (June 25, 2021): 4359. http://dx.doi.org/10.3390/s21134359.

Full text
Abstract:
The security of the Internet of Things (IoT) is a very important aspect of everyday life for people and industries, as well as hospitals, military, households and cities. Unfortunately, this topic is still too little researched and developed, which results in exposing users of Internet of Things to possible threats. One of the areas which should be addressed is the creation of a database of information about vulnerabilities and exploits in the Internet of Things; therefore, the goal of our activities under the VARIoT (Vulnerability and Attack Repository for IoT) project is to develop such a database and make it publicly available. The article presents the results of our research aimed at building this database, i.e., how the information about vulnerabilities is obtained, standardized, aggregated and correlated as well as the way of enhancing and selecting IoT related data. We have obtained and proved that existing databases provide various scopes of information and because of that a single and most comprehensive source of information does not exist. In addition, various sources present information about a vulnerability at different times—some of them are faster than others, and the differences in publication dates are significant. The results of our research show that aggregation of information from various sources can be very beneficial and has potential to enhance actionable value of information. We have also shown that introducing more sophisticated concepts, such as trust management and metainformation extraction based on artificial intelligence, could ensure a higher level of completeness of information as well as evaluate the usefulness and reliability of data.
APA, Harvard, Vancouver, ISO, and other styles
44

Panduri, Bharathi, Madhurika Vummenthala, Spoorthi Jonnalagadda, Garwandha Ashwini, Naruvadi Nagamani, and Amanagati Akhila. "Dynamics and an efficient malware detection system using opcode sequence graph generation and ml algorithm." E3S Web of Conferences 184 (2020): 01009. http://dx.doi.org/10.1051/e3sconf/202018401009.

Full text
Abstract:
IoT(Internet of things), for the most part, comprises of the various scope of Internet-associated gadgets and hubs. In the context of military and defence systems (called as IoBT) these gadgets could be personnel wearable battle outfits, tracking devices, cameras, clinical gadgets etc., The integrity and safety of these devices are critical in mission success and it is of utmost importance to keep them secure. One of the typical ways of the attack on these gadgets is through the use of malware, whose aim could be to compromise the device and or breach the communications. Generally, these IoBT gadgets and hubs are a much more significant target for cyber criminals due to the value they pose, more so than IoT devices. In this paper we attempt at creating a significant learning based procedure to distinguish, classify and tracksuch malware in IoBT(Internet of battlefield things) through operational codes progression. This is achieved by transforming the aforementioned OpCodes into a vector space, upon which a Deep Eigen space learning technique is applied to differentiate between harmful and safe applications. For robust classification, Support vector machine and n gram Sequencing algorithms are proposed in this paper. Moreover, we evaluate the quality of our proposed approach in malware recognition and also its maintainability against garbage code injection assault. These results are presented on a web page which has separate components and levels of accessibility for user and admin credentials. For the purpose of tracking the prevalence of various malwares on the network, counts and against garbage code injection assault. These results are presented on a web page which has separate components and levels of accessibility for user and admin credentials. For the purpose of tracking the prevalence of various malwares on the network, counts and trends of different malicious opcodes are displayed for both user and admin. Thereby our proposed approach will be beneficial for the users, especially for those who want to communicate confidential information within the network. It is also beneficial if a user wants to know whether a message is secure or not. This has also been made malware test accessible, which ideally will profit future research endeavors.
APA, Harvard, Vancouver, ISO, and other styles
45

Alromih, Arwa, Mznah Al-Rodhaan, and Yuan Tian. "A Randomized Watermarking Technique for Detecting Malicious Data Injection Attacks in Heterogeneous Wireless Sensor Networks for Internet of Things Applications." Sensors 18, no. 12 (December 9, 2018): 4346. http://dx.doi.org/10.3390/s18124346.

Full text
Abstract:
Using Internet of Things (IoT) applications has been a growing trend in the last few years. They have been deployed in several areas of life, including secure and sensitive sectors, such as the military and health. In these sectors, sensory data is the main factor in any decision-making process. This introduces the need to ensure the integrity of data. Secure techniques are needed to detect any data injection attempt before catastrophic effects happen. Sensors have limited computational and power resources. This limitation creates a challenge to design a security mechanism that is both secure and energy-efficient. This work presents a Randomized Watermarking Filtering Scheme (RWFS) for IoT applications that provides en-route filtering to remove any injected data at an early stage of the communication. Filtering injected data is based on a watermark that is generated from the original data and embedded directly in random places throughout the packet’s payload. The scheme uses homomorphic encryption techniques to conceal the report’s measurement from any adversary. The advantage of homomorphic encryption is that it allows the data to be aggregated and, thus, decreases the packet’s size. The results of our proposed scheme prove that it improves the security and energy consumption of the system as it mitigates some of the limitations in the existing works.
APA, Harvard, Vancouver, ISO, and other styles
46

Furtak, Zieliński, and Chudzikiewicz. "A Framework for Constructing a Secure Domain of Sensor Nodes." Sensors 19, no. 12 (June 21, 2019): 2797. http://dx.doi.org/10.3390/s19122797.

Full text
Abstract:
Application of the Internet of Things (IoT) in some critical areas (e.g., military) is limited mainly due to the lack of robust, secure, and trusted measures needed to ensure the availability, confidentiality, and integrity of information throughout its lifecycle. Considering the mostly limited resources of IoT devices connected by wireless networks and their dynamic placement in unsupervised or even hostile environments, security is a complex and considerable issue. In this paper, a framework which encompasses an approach to integrate some security measures to build a so-called “secure domain of sensors nodes” is proposed. The framework is based on the use of the Trusted Platform Modules (TPMs) in wireless sensor nodes. It encompasses an architecture of sensor nodes, their roles in the domain, and the data structures as well as the developed procedures which could be applied to generate the credentials for the sensor nodes, and subsequently, to build a local trust structure of each node as well as to build a trust relationship between a domain’s nodes. The proposed solution ensures the authentication of sensor nodes and their resistance against unauthorized impact with the hardware/software configuration allowing protection against malware that can infect the software. The usefulness of the presented framework was confirmed experimentally.
APA, Harvard, Vancouver, ISO, and other styles
47

Dei, Michele, Joan Aymerich, Massimo Piotto, Paolo Bruschi, Francisco del Campo, and Francesc Serra-Graells. "CMOS Interfaces for Internet-of-Wearables Electrochemical Sensors: Trends and Challenges." Electronics 8, no. 2 (January 31, 2019): 150. http://dx.doi.org/10.3390/electronics8020150.

Full text
Abstract:
Smart wearables, among immediate future IoT devices, are creating a huge and fast growing market that will encompass all of the next decade by merging the user with the Cloud in a easy and natural way. Biological fluids, such as sweat, tears, saliva and urine offer the possibility to access molecular-level dynamics of the body in a non-invasive way and in real time, disclosing a wide range of applications: from sports tracking to military enhancement, from healthcare to safety at work, from body hacking to augmented social interactions. The term Internet of Wearables (IoW) is coined here to describe IoT devices composed by flexible smart transducers conformed around the human body and able to communicate wirelessly. In addition the biochemical transducer, an IoW-ready sensor must include a paired electronic interface, which should implement specific stimulation/acquisition cycles while being extremely compact and drain power in the microwatts range. Development of an effective readout interface is a key element for the success of an IoW device and application. This review focuses on the latest efforts in the field of Complementary Metal–Oxide–Semiconductor (CMOS) interfaces for electrochemical sensors, and analyses them under the light of the challenges of the IoW: cost, portability, integrability and connectivity.
APA, Harvard, Vancouver, ISO, and other styles
48

Hao, Shuai, Beiyi An, Hu Wen, Xu Ma, and Keping Yu. "A Heterogeneous Image Fusion Method Based on DCT and Anisotropic Diffusion for UAVs in Future 5G IoT Scenarios." Wireless Communications and Mobile Computing 2020 (June 27, 2020): 1–11. http://dx.doi.org/10.1155/2020/8816818.

Full text
Abstract:
Unmanned aerial vehicles, with their inherent fine attributes, such as flexibility, mobility, and autonomy, play an increasingly important role in the Internet of Things (IoT). Airborne infrared and visible image fusion, which constitutes an important data basis for the perception layer of IoT, has been widely used in various fields such as electric power inspection, military reconnaissance, emergency rescue, and traffic management. However, traditional infrared and visible image fusion methods suffer from weak detail resolution. In order to better preserve useful information from source images and produce a more informative image for human observation or unmanned aerial vehicle vision tasks, a novel fusion method based on discrete cosine transform (DCT) and anisotropic diffusion is proposed. First, the infrared and visible images are denoised by using DCT. Second, anisotropic diffusion is applied to the denoised infrared and visible images to obtain the detail and base layers. Third, the base layers are fused by using weighted averaging, and the detail layers are fused by using the Karhunen–Loeve transform, respectively. Finally, the fused image is reconstructed through the linear superposition of the base layer and detail layer. Compared with six other typical fusion methods, the proposed approach shows better fusion performance in both objective and subjective evaluations.
APA, Harvard, Vancouver, ISO, and other styles
49

Kharchenko, S. G., and N. K. Zhizhin. "Fifth Generation of Wireless Networks (5G): Problems and Risks." Ecology and Industry of Russia 24, no. 12 (December 1, 2020): 58–65. http://dx.doi.org/10.18412/1816-0395-2020-12-58-65.

Full text
Abstract:
The article is devoted to the analysis of electromagnetic radiation of fifth generation (5G) networks. The characteristic of the 5G electromagnetic radiation spectrum and its features is given. The main advantages of implementing 5G networks proceeding from the Concept of the Ministry of communications of Russia are analyzed, including the Internet of Things, artificial intelligence, augmented, extended reality, and virtual reality. Nine ways in which 5G and IoT will cause serious harm to people, wildlife, and our Earth are summarized. The conclusions of the Concept are being questioned. The article analyzes the results that the military personnel is expecting from the 5G network, including the introduction of hypersonic weapons, the creation of "smart military bases", "combat networks", the use of "portable combat items", drones, non-lethal, directed energy electronic weapons. It is justified: how does 5G differ qualitatively and quantitatively from 4G in its impact on human health. Based on the appeal of scientists and environmental organizations from 219 countries to the UN, the WTO, the EU, the Council of Europe and the governments of all States, the demand for the immediate termination of the deployment of a 5G wireless network on Earth and in space is justified.
APA, Harvard, Vancouver, ISO, and other styles
50

Tappari, Sunitha, and K. Sridevi. "Review on lightweight hardware architectures for the crypt-analytics in FPGA." International Journal of Engineering & Technology 7, no. 3 (August 22, 2018): 1888. http://dx.doi.org/10.14419/ijet.v7i3.14138.

Full text
Abstract:
Internet of Things (IoT) plays a vital role in the Wireless sensor networks (WSNs), which is used for many applications, such as military, health, and environmental. Security is the major concern and it is very difficult to achieve because of a different kind of attack in the network. In recent years, many authors have introduced different Hardware Architectures to solve these security problems. This paper has discussed about a review of various Hardware Architectures for the lightweight Crypt-analytics methods and the comparative learning of various Crypt-analytics and authentication systems carried out. The comparative study result showed that the lightweight algorithms have good per-formance compared to the conventional Crypt-analytics algorithm in terms of memory requirement, operations, and power consumption.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography