Siga este enlace para ver otros tipos de publicaciones sobre el tema: Military IoT.

Artículos de revistas sobre el tema "Military IoT"

Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros

Elija tipo de fuente:

Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Military IoT".

Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.

También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.

Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.

1

Sonare, Renuka Chandrakant y Dinesh V. Rojatkar. "Application OF IoT in Military Service". International Journal of Trend in Scientific Research and Development Volume-1, Issue-6 (31 de octubre de 2017): 794–97. http://dx.doi.org/10.31142/ijtsrd4629.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Toth, Andreas. "Internet of Things Vulnerabilities in Military Environments". Vojenské rozhledy 30, n.º 3 (8 de septiembre de 2021): 45–58. http://dx.doi.org/10.3849/2336-2995.30.2021.03.045-058.

Texto completo
Resumen
IoT devices (sensors, drones, cameras) are gaining more and more emphasis on military operations. The application of IoT elements in the military environment increases situational awareness and supports the acquisition and maintenance of information superiority. The information they provide about the enemy, the area of operations, and the location and status of our soldiers and assets can contribute to the successful execution of operations at the tactical, operational and strategic levels. However, they can also pose serious threats if their vulnerabilities allow the data they collected to leak or they provide access to the info-communication networks used for the enemy. In this article, the author examined the vulnerabilities of these IoT devices using keyword analysis. After drawing conclusions from the analysis of the relevant literature, he compared the results with the general-purpose IoT threats and attacks typical of today, like distributed denial of service attacks, security, software, security and privacy issues.
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Kattimani, Miss Jyoti G. "Military Health System using IOT". International Journal for Research in Applied Science and Engineering Technology 7, n.º 4 (30 de abril de 2019): 2889–94. http://dx.doi.org/10.22214/ijraset.2019.4486.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

L., Kirubakaran, Sangeetha G., Rathna Priya y Sudharsan S. "Military Surveillance System using IOT". International Journal of Computer Applications 176, n.º 15 (15 de abril de 2020): 27–31. http://dx.doi.org/10.5120/ijca2020920067.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Lu, Ye, Chao Xie y Li Shang. "Study on the Transformation of Military Logistical of Internet of Things Era". Applied Mechanics and Materials 596 (julio de 2014): 119–22. http://dx.doi.org/10.4028/www.scientific.net/amm.596.119.

Texto completo
Resumen
The paper discussed the basic conceptions of Internet of Things (IOT), its structure and key technology. It expounded the application principle, development and practice of military IOT technology from the aspects of military logistics, asset management, materiel support, mobilization and barracks management, combined with instances. Finally, the problems in application and current developing status of the military IOT technology were expatiated upon in terms of the military IOT technology standard and RFID technology safety.
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Cha, Sungyong, Seungsoo Baek, Sooyoung Kang y Seungjoo Kim. "Security Evaluation Framework for Military IoT Devices". Security and Communication Networks 2018 (3 de julio de 2018): 1–12. http://dx.doi.org/10.1155/2018/6135845.

Texto completo
Resumen
IoT is gaining importance in our lives and in the military too. With the application of IoT paradigm in the military and the weapon system’s connectivity to the network, this facilitates the commanders to make real-time decisions. However, cybersecurity threats to weapon systems intensify along with the growing of IoT’s benefits. Coping with these cybersecurity threats nowadays, we require the implementation of “security by design” concept during weapon system development throughout the system lifecycle, but not traditional security solutions. Since only developed countries are capable of developing systems on their own, they adopt “security by design” when developing new weapon systems; another approach to acquire weapon systems is through import if a country cannot develop the whole weapon system. However, few studies have been done on the security evaluation framework that could be used upon purchase and integration of the developed weapon system. In this paper, we proposed a novel security evaluation framework that could be used to integrate IoT devices and components into the weapon system and a method to address cybersecurity requirements using international standard security control.
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Kumar K S, Yashwanth y Dr Narasimha Murthy M S. "Design of Monitor Individuals Health using IOT A IOT Application for Military Area". International Journal of Innovative Science and Research Technology 5, n.º 6 (3 de julio de 2020): 693–98. http://dx.doi.org/10.38124/ijisrt20jun291.

Texto completo
Resumen
The universe of medical science is a developing zone that has quickened with new innovations and this is the point at which the vision of "The Internet of things (IoT)" has transformed into the real world. IoT can assume a critical job in observing indispensable organs of people in the field of National Guard. Remote wellbeing observing (utilizing IoT) is one of the potential answers for this interest. Remote wellbeing observing can be best used gave the device is wearable to encourage self checking. Right now a framework for observing of heartbeat rate, internal heat level (essential body parameters) of the individual with committed sensors and IoT. A framework is wearable and furthermore bolsters remote wellbeing observing. Remote wellbeing observing is performed by putting all the gathered information to cloud, this information can be recovered by the specialist for examination anywhere. Along with remote checking and wearability of framework, precision and cost can't be disregarded. An ideal exchange off among precision and cost of the framework is practiced by picking fitting temperature sensor and pulse rate sensor. The heart beat rate and temperature of an individual at various time moments are estimated by the sensors.
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Popescu, Florin. "From the IoT to the IoBT. The Path to Superior Situational Understanding". Land Forces Academy Review 24, n.º 4 (1 de diciembre de 2019): 276–82. http://dx.doi.org/10.2478/raft-2019-0034.

Texto completo
Resumen
Abstract In order to maintain and improve its competitive advantage, the ability of 21st-century armies to recognize, anticipate, adapt and manipulate IoT on the future battlefield is important. The explosive growth of innovation in the commercial sector which utilizes the integration of cloud computing, mobile communications, sensor data collection networks and artificial intelligence is a major challenge for the military. A new concept, still untapped, called the Battlefield Things Internet (IoBT) comes from here.
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Jung, Seung-hoon, Jae-choon An, Jin-young Park, Yong-tae Shin y Jong-bae Kim. "An Empirical Study of the Military IoT Security Priorities". International Journal of Security and Its Applications 10, n.º 8 (31 de agosto de 2016): 13–22. http://dx.doi.org/10.14257/ijsia.2016.10.8.02.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Iyer, Brijesh y Niket Patil. "IoT enabled tracking and monitoring sensor for military applications". International Journal of System Assurance Engineering and Management 9, n.º 6 (19 de julio de 2018): 1294–301. http://dx.doi.org/10.1007/s13198-018-0727-8.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
11

Jaya, Iksan, Edy Maryanto, Alexander Victor Bukit y Muhamad Zulkifli. "DESIGN AND DEVELOPMENT OF EARLY HEAT STROKE DETECTION SYSTEM IN MILITARY CROSS COUNTRY BASED ON IoT". JOURNAL ASRO 9, n.º 2 (22 de diciembre de 2018): 141. http://dx.doi.org/10.37875/asro.v9i2.241.

Texto completo
Resumen
Cross-country military sports are sports that are contested in the military environment asan effort to foster the physical abilities of the Navy's soldiers. The doctrine in the Indonesian Navyforcefully demands every soldier to never give up in every task that is carried out so that in militarysporting events the soldier will spend all of his abilities. In the process of cross-country competitionwith heavy physical activity causing many soldiers who experience heat exhaust (pre heat strokeconditions) continue to force themselves to compete and will continue to become a heat stroke.This is compounded by the distance traveled so that the medical team had difficulty reaching thesoldiers who experienced the incident. Internet of things (IoT) is the idea that all objects in the realworld can communicate with each other as part of an integrated system using the internet networkas a link.By using the IoT platform it is possible to monitor an object continuously and provideanalysis directly without being limited by distance and time. Based on the description above, it isnecessary to design and build an early detection system for the heat stroke of TNI AL soldiers incross-country military sport activities based on IoT (Internet of Thing). This system can help detectpositions and soldiers who will experience heat stroke so that medical treatment can be given earlyto prevent heat stroke.Keywords: Monitoring, Heat Stroke, Cross Country, IoT.
Los estilos APA, Harvard, Vancouver, ISO, etc.
12

Preda, Marius. "Digital Forensics of Internet of Things Smart Heating System Investigation". Journal of Military Technology 3, n.º 1 (26 de junio de 2020): 23–28. http://dx.doi.org/10.32754/jmt.2020.1.04.

Texto completo
Resumen
The Internet of Things (IoT) integrates the Internet and electronic devices with applicability to a large spectrum of domains, from smart home automation, industrial processes, military applications, to health and environmental monitoring. Despite the clear advantages, from a forensically sound perspective, IoT can improve the accuracy and integrity of forensic investigations, but still requires extensive scientific validation in practice. In this paper, we review selected stateof-the-art challenges corresponding to digital forensics of IoT environments, and we present an empirical method on how to investigate a security incident reported for an IoT specific case - Smart Heating system.
Los estilos APA, Harvard, Vancouver, ISO, etc.
13

Kim, Bruce y Sang-Bock Cho. "3D TSV-based Inductor Design for a Secure Internet of Things". International Symposium on Microelectronics 2016, n.º 1 (1 de octubre de 2016): 000364–67. http://dx.doi.org/10.4071/isom-2016-wp53.

Texto completo
Resumen
Abstract This paper describes the design and modeling of through-silicon via (TSV)-based high-density 3D inductors for Internet of Things (IoT) applications and presents some possible challenges for TSV-based inductors in IoT applications. For cybersecurity infrastructure, we designed IoT with hardware security in mind. We provide a secure design for Internet of Things based on secure 3D inductors and then show case studies of high-density RF packages with TSV-based inductors that require hardware security, such as military applications. We use ferromagnetic materials to achieve high inductance with good quality factor.
Los estilos APA, Harvard, Vancouver, ISO, etc.
14

E. Abel, Edje, Abd Latiff Muhammad Shafie y Weng Howe Chan. "Deployment of internet of things-based cloudlet-cloud for surveillance operations". IAES International Journal of Artificial Intelligence (IJ-AI) 10, n.º 1 (1 de marzo de 2021): 24. http://dx.doi.org/10.11591/ijai.v10.i1.pp24-34.

Texto completo
Resumen
This research proposes the design of internet of things (IoT) camera/toxic gas sensors for the surveillance of a nation’s borders. Also, a wearable radio frequency identification (RFID) tag with built-in body-temperature/heartbeat sensors, for monitoring the health status and locations of military personnel while on border patrol duty or in battlefield combats. Mobile micro-controllers are deployed to gather sensed data retrieved from the sensors/RFID tags and transmitted to a cloudlet situated at the command control center, located 200 meters away from the sensor devices. Consequently, sensed data are dispatch to the cloud data center when there is a need for offline data mining or analysis. The distinguishing feature of our proposed system from previous researches is that the health status and locations of troops (soldiers) are monitored while they are in border patrol duty or in battlefield combats. Also, the introduction of cloudlet services closer to the IoT sensor devices for collection of sensed data. This way, the sensed data or information gathered at the cloudlet will aid timely information retrieval that will speed up intelligence gathering for strategic military operations, especially in critical situations. This is an innovative attempt to apply IoT-enabled cloudlet-based cloud computing to support military operations.
Los estilos APA, Harvard, Vancouver, ISO, etc.
15

Al-Duwairi, Basheer, Wafaa Al-Kahla, Mhd Ammar AlRefai, Yazid Abedalqader, Abdullah Rawash y Rana Fahmawi. "SIEM-based detection and mitigation of IoT-botnet DDoS attacks". International Journal of Electrical and Computer Engineering (IJECE) 10, n.º 2 (1 de abril de 2020): 2182. http://dx.doi.org/10.11591/ijece.v10i2.pp2182-2191.

Texto completo
Resumen
The Internet of Things (IoT) is becoming an integral part of our daily life including health, environment, homes, military, etc. The enormous growth of IoT in recent years has attracted hackers to take advantage of their computation and communication capabilities to perform different types of attacks. The major concern is that IoT devices have several vulnerabilities that can be easily exploited to form IoT botnets consisting of millions of IoT devices and posing significant threats to Internet security. In this context, DDoS attacks originating from IoT botnets is a major problem in today’s Internet that requires immediate attention. In this paper, we propose a Security Information and Event Management-based IoT botnet DDoS attack detection and mitigation system. This system detects and blocks DDoS attack traffic from compromised IoT devices by monitoring specific packet types including TCP SYN, ICMP and DNS packets originating from these devices. We discuss a prototype implementation of the proposed system and we demonstrate that SIEM based solutions can be configured to accurately identify and block malicious traffic originating from compromised IoT devices.
Los estilos APA, Harvard, Vancouver, ISO, etc.
16

Shree Gowri Santhosh .V, Vishal .E, Vishak .R y Dr. K. Rahimunnisa. "LoRa-IoT Focused System of Defense for Equipped Troops [LIFE]". Journal of Ubiquitous Computing and Communication Technologies 2, n.º 3 (18 de septiembre de 2020): 153–77. http://dx.doi.org/10.36548/jucct.2020.3.005.

Texto completo
Resumen
National security is the capacity of a nation to mobilize military forces to guarantee its borders and successfully defend against physical threats including military aggression and attacks by enemy troops. Every country lives peacefully as soldiers perform their duties. Furthermore, soldiers safeguard’s the honor of their country. Military communication plays an important role in nation’s warfare. Military communication concerns with transmission of every information from reconnaissance as well as other groups in contact with opposition. There are several issues with respect to soldiers’ safety. Whenever any soldier crosses the enemy lines, it is really essential for base station to identify the position and health condition of all the soldiers. This paper presents an idea of monitoring the soldier and also testing every soldier's health condition which helps army personnel to schedule the responsive operations. This paper includes an opportunity to map the positions and record the safety of the soldiers who get lost and wounded on the front line in real time. The data from sensors and GPS module will be transmitted wirelessly utilizing the soldiers’ LoRa kit. The data gathered will be uploaded to the cloud for further statistical analysis. Upon receiving the health status of soldiers, the army officials can keep track of every soldier. Our proposed system allows army personnel at bivouac to track the current GPS position of every battalion and also checks the vitals such as body temperature, blood pressure, ECG, SpO2 of soldiers. It also consists an extra feature with the help of that soldier can ask for help manually by pressing an alert switch to inform the army personnel at bivouac if he is in need or may have sensed the enemy intrusion.
Los estilos APA, Harvard, Vancouver, ISO, etc.
17

Lakshmi Narayanan, K., G. P. Ramesh y V. Divya. "Robust and brittle secured video for IOT". International Journal of Engineering & Technology 7, n.º 2.20 (18 de abril de 2018): 93. http://dx.doi.org/10.14419/ijet.v7i2.20.11762.

Texto completo
Resumen
In this paper the system is mainly designed for the military purpose security since now-a-days securing our military has become a difficult task .our live is mainly dependent on other objects mainly we are computer based living and digital image processing plays a vital role in it. This process has much advantage as well as some disadvantage. A VLSI circuit is built with many millions of IC chip, so it is considered to be indivisible for the construction purpose. The internet-of things (Iot) is a electronic device which is connected to the vehicle and the building item which is used to generate many secured techniques which is connected with the software, electrical, electronics and mechectronics devices and human recourses also. Better Portable Graphics Algorithm with a Context-Adaptive Binary Arithmetic Coding (CABAC) encoding algorithm is used in the existing system this process is affected by the Gaussian noise, low compression ratio and time delay to overcome above issues and enhanced with Secure Better Portable Graphics (SBPG) compression algorithm with HEVC is present .The proposed architecture is suitable for high performance imaging in the Iot and for the high quality compression files and secured transformation of image and video captured in the digital camera. Encryption and watermarking are the two technique used in the process. The watermarking technique is more secure than the previous system. This process produces high quality JPEG, and high PSNR ratio. The scrambling algorithm is used in the encryption process. It is used for providing secured image.
Los estilos APA, Harvard, Vancouver, ISO, etc.
18

Charan Patel, Bhagwati, Ram Shankar Tripathi y Naveen Goel. "IoT an Overview: Advantage, Disadvantage and Applications". International Journal of Computer Applications Technology and Research 10, n.º 05 (6 de mayo de 2021): 119–22. http://dx.doi.org/10.7753/ijcatr1005.1003.

Texto completo
Resumen
Internet of Things (IoT) is a well-known term that has gained massive encouragement over a few years. The future of the human race will be significantly influenced by the application of IoT over the coming years. The Internet is everywhere and touched almost every corner of the globe affecting our lives in previously unimagined ways. As a living entity, the Internet is constantly evolving, and now, an era of widespread connectivity through various smart devices (i.e., things) that connect with the Internet has begun. IoT looks more like an umbrella covering many protocols, technologies, and concepts that depend on specific industries. It will lead to the development of efficient mechanisms with high scalability and interoperability features among the things or objects. IoT is a reality that is progressing day by day, connecting billions of people and things to form a vast global network. IoT has applications in various domains like agriculture, industry, military, and personal spaces. There are potential research challenges and issues in IoT that act as a hurdle in the complete exploration of IoT in real-time implementation.
Los estilos APA, Harvard, Vancouver, ISO, etc.
19

Shahid, Huniya, Munam Ali Shah, Ahmad Almogren, Hasan Ali Khattak, Ikram Ud Din, Neeraj Kumar y Carsten Maple. "Machine Learning-based Mist Computing Enabled Internet of Battlefield Things". ACM Transactions on Internet Technology 21, n.º 4 (30 de noviembre de 2021): 1–26. http://dx.doi.org/10.1145/3418204.

Texto completo
Resumen
The rapid advancement in information and communication technology has revolutionized military departments and their operations. This advancement also gave birth to the idea of the Internet of Battlefield Things (IoBT). The IoBT refers to the fusion of the Internet of Things (IoT) with military operations on the battlefield. Various IoBT-based frameworks have been developed for the military. Nonetheless, many of these frameworks fail to maintain a high Quality of Service (QoS) due to the demanding and critical nature of IoBT. This study makes the use of mist computing while leveraging machine learning. Mist computing places computational capabilities on the edge itself (mist nodes), e.g., on end devices, wearables, sensors, and micro-controllers. This way, mist computing not only decreases latency but also saves power consumption and bandwidth as well by eliminating the need to communicate all data acquired, produced, or sensed. A mist-based version of the IoTNetWar framework is also proposed in this study. The mist-based IoTNetWar framework is a four-layer structure that aims at decreasing latency while maintaining QoS. Additionally, to further minimize delays, mist nodes utilize machine learning. Specifically, they use the delay-based K nearest neighbour algorithm for device-to-device communication purposes. The primary research objective of this work is to develop a system that is not only energy, time, and bandwidth-efficient, but it also helps military organizations with time-critical and resources-critical scenarios to monitor troops. By doing so, the system improves the overall decision-making process in a military campaign or battle. The proposed work is evaluated with the help of simulations in the EdgeCloudSim. The obtained results indicate that the proposed framework can achieve decreased network latency of 0.01 s and failure rate of 0.25% on average while maintaining high QoS in comparison to existing solutions.
Los estilos APA, Harvard, Vancouver, ISO, etc.
20

Ahmed, Hassan I., Abdurrahman A. Nasr, Salah M. Abdel-Mageid y Heba K. Aslan. "DADEM". International Journal of Ambient Computing and Intelligence 12, n.º 1 (enero de 2021): 114–39. http://dx.doi.org/10.4018/ijaci.2021010105.

Texto completo
Resumen
Nowadays, Internet of Things (IoT) is considered as part our lives and it includes different aspects - from wearable devices to smart devices used in military applications. IoT connects a variety of devices and as such, the generated data is considered as ‘Big Data'. There has however been an increase in attacks in this era of IoT since IoT carries crucial information regarding banking, environmental, geographical, medical, and other aspects of the daily lives of humans. In this paper, a Distributed Attack Detection Model (DADEM) that combines two techniques - Deep Learning and Big Data analytics - is proposed. Sequential Deep Learning model is chosen as a classification engine for the distributed processing model after testing its classification accuracy against other classification algorithms like logistic regression, KNN, ID3 decision tree, CART, and SVM. Results showed that Sequential Deep Learning model outperforms the aforementioned ones. The classification accuracy of DADEM approaches 99.64% and 99.98% for the UNSW-NB15 and BoT-IoT datasets, respectively. Moreover, a plan is proposed for optimizing the proposed model to reduce the overhead of the overall system operation in a constrained environment like IoT.
Los estilos APA, Harvard, Vancouver, ISO, etc.
21

González-Landero, Franks, Iván García-Magariño, Raquel Lacuesta y Jaime Lloret. "ABS-DDoS: An Agent-Based Simulator about Strategies of Both DDoS Attacks and Their Defenses, to Achieve Efficient Data Forwarding in Sensor Networks and IoT Devices". Wireless Communications and Mobile Computing 2018 (24 de junio de 2018): 1–11. http://dx.doi.org/10.1155/2018/7264269.

Texto completo
Resumen
Sensor networks and Internet of Things (IoT) are useful for many purposes such as military defense, sensing in smart homes, precision agriculture, underwater monitoring in aquaculture, and ambient-assisted living for healthcare. Efficient and secure data forwarding is essential to maintain seamless communications and to provide fast services. However, IoT devices and sensors usually have low processing capabilities and vulnerabilities. For example, attacks such as the Distributed Denial of Service (DDoS) can easily hinder sensor networks and IoT devices. In this context, the current approach presents an agent-based simulation solution for exploring strategies for defending from different DDoS attacks. The current work focuses on obtaining low-consuming defense strategies in terms of processing capabilities, so that these can be applied in sensor networks and IoT devices. The experimental results show that the simulator was useful for (a) defining defense and attack strategies, (b) assessing the effectiveness of defense strategies against attack ones, and (c) defining efficient defense strategies with low response times.
Los estilos APA, Harvard, Vancouver, ISO, etc.
22

Guan, Qing-yang y Wu Shuang. "Signal Detection in Satellite-Ground IoT Link Based on Blind Neural Network". Wireless Communications and Mobile Computing 2021 (6 de mayo de 2021): 1–10. http://dx.doi.org/10.1155/2021/5547989.

Texto completo
Resumen
At present, there are many problems in satellite-ground IoT link signal detection. Due to the complex characteristics of the satellite-ground IoT link, including Doppler and multipath effect, especially in scenarios related to military fields, it is difficult to use traditional method and traditional cooperative communication methods for link signal detection. Therefore, this paper proposes an efficient detection of satellite-ground IoT link based on the blind neural network (BNN). The BNN includes two network structures, the data feature network and the error update network. Through multiple iterations of the error update network, the weight of BNN for blind detection is optimized and the optimal elimination solution is obtained. Through establishing a satellite-to-ground link model simulation of the low-orbit satellite, the proposed BNN algorithm can obtain better bit error rate characteristics.
Los estilos APA, Harvard, Vancouver, ISO, etc.
23

Lagkas, Thomas, Vasileios Argyriou, Stamatia Bibi y Panagiotis Sarigiannidis. "UAV IoT Framework Views and Challenges: Towards Protecting Drones as “Things”". Sensors 18, n.º 11 (17 de noviembre de 2018): 4015. http://dx.doi.org/10.3390/s18114015.

Texto completo
Resumen
Unmanned aerial vehicles (UAVs) have enormous potential in enabling new applications in various areas, ranging from military, security, medicine, and surveillance to traffic-monitoring applications. Lately, there has been heavy investment in the development of UAVs and multi-UAVs systems that can collaborate and complete missions more efficiently and economically. Emerging technologies such as 4G/5G networks have significant potential on UAVs equipped with cameras, sensors, and GPS receivers in delivering Internet of Things (IoT) services from great heights, creating an airborne domain of the IoT. However, there are many issues to be resolved before the effective use of UAVs can be made, including security, privacy, and management. As such, in this paper we review new UAV application areas enabled by the IoT and 5G technologies, analyze the sensor requirements, and overview solutions for fleet management over aerial-networking, privacy, and security challenges. Finally, we propose a framework that supports and enables these technologies on UAVs. The introduced framework provisions a holistic IoT architecture that enables the protection of UAVs as “flying” things in a collaborative networked environment.
Los estilos APA, Harvard, Vancouver, ISO, etc.
24

Inomoto, Hikaru, Sachio Saiki, Masahide Nakamura y Shinsuke Matsumoto. "Design and evaluation of mission-oriented sensing platform with military analogy". International Journal of Pervasive Computing and Communications 13, n.º 1 (3 de abril de 2017): 76–91. http://dx.doi.org/10.1108/ijpcc-01-2017-0007.

Texto completo
Resumen
Purpose The purpose of this paper is to perform large-scale environmental sensing with a lot of Internet of Things (IoT) devices, as typically seen in a Smart City, efficiently and for multiple applications. In this paper, we propose a novel sensing method, called mission-oriented sensing, which accepts multiple and dynamic sensing purposes on a single infrastructure. Design/methodology/approach The proposed method achieves the purpose by dealing sensing configuration (application’s purpose) as a mission. It realizes sharing single infrastructure by accepting multiple missions in parallel, and it accepts missions’ update anytime. In addition, the sensing platform based on military analogy can command and control a lot of IoT devices in good order, and this realizes mission-oriented sensing above. Findings Introducing mission-oriented sensing, multiple purpose large-scale sensing can be conducted efficiently. The experimental evaluation with a prototype platform shows the practical feasibility. In addition, the result shows that it is effective to update sensing configuration dynamically. Research limitations/implications The proposed method focuses aggregating environmental sensor value from a lot of devices, and, thus, it can treat stream data, such as video or audio or control a specific device directly. Originality/value In proposed method, a single-sensing infrastructure can be used by multiple applications, and it admits heterogeneous devices in a single infrastructure. In addition, the proposed method has less technical restriction and developers can implement actual platform with technologies for context.
Los estilos APA, Harvard, Vancouver, ISO, etc.
25

Kh., Teeba Ismail y Ibrahim I. Hamarash. "Model-Based Quality Assessment of Internet of Things Software Applications: A Systematic Mapping Study". International Journal of Interactive Mobile Technologies (iJIM) 14, n.º 09 (17 de junio de 2020): 128. http://dx.doi.org/10.3991/ijim.v14i09.13431.

Texto completo
Resumen
The Internet of things (IoT) is growing at a fast pace owing to its vast applications in varied fields such as medicine, society, economy, and even the military. This growth cannot continue without establishing high quality. Over the past decade, interest in research for the quality assurance of IoT has gradually grown. However, the discipline is still evolving, and further research is required to investigate the various quality-related aspects. Although assessing the entire system is impractical, to assure the quality of IoT applications, various assessment levels are required. A well-known and established approach to mitigate this difficulty is to model the entire system or a few parts of it for the sake of assessment, which is known as model-based testing. To determine what has been achieved thus far and what is lacking in this direction, this paper presents an extensive study on the use of the model-based approach to assure the quality of IoT applications. The study systematically reviews papers published from 2009 (early publications on IoT) to 2019 that reported the explicit use of models to assess the quality aspects of IoT applications. As a result of an extensive search process, the paper presents the results of scanning and reviewing 390 published papers. Thus far, out of these, 54 studies used the model-based approach to assess at least one quality aspect of an IoT application. In addition to the several relevant research questions that have been addressed in this study, this paper also presents several new insights and approaches for future research.
Los estilos APA, Harvard, Vancouver, ISO, etc.
26

Kumar Dwivedi, Anshu, Awadhesh Kumar Sharma y Pawan Singh Mehra. "Energy Efficient Sensor Node Deployment Scheme for Two Stage Routing Protocol of Wireless Sensor Networks assisted IoT". ECTI Transactions on Electrical Engineering, Electronics, and Communications 18, n.º 2 (31 de agosto de 2020): 158–69. http://dx.doi.org/10.37936/ecti-eec.2020182.240541.

Texto completo
Resumen
Now a day wireless sensor networks (WSNs) is an essential unit of the internet of things (IoT). IoT theater a vital role in real-time applications which is more useful in real life. Due to its small price and potential use, WSNs have shown importance in different applications over the past year. Health concerns, environmental observation, human protection, military operations, surveillance systems, etc. WSNs have a small device called a sensor node (SN) that has a limited battery. IoT based WSNs consume more energy in sensor node communication. Therefore a Novel energy-efficient sensor node deployment scheme for two-stage routing protocol (EE- DSTRP) has been proposed to reduce the energy consumption of sensor nodes and extend the lifetime of the network. Sensor node deployment is a novel approach based on the golden ratio. All traditional protocols divide network zones for communication. No existing protocols tell about the sensor node deployment ratio in each zone. The deployment method is an important factor in reducing the energy usage of a network. To validate its efficiency, in this article, simulation results prove that the proposed IoT based EE-DSTRP protocol is superior to other existing protocols.
Los estilos APA, Harvard, Vancouver, ISO, etc.
27

Karthik, M. y M. Krishnan. "Securing an Internet of Things from Distributed Denial of Service and Mirai Botnet Attacks Using a Novel Hybrid Detection and Mitigation Mechanism". International Journal of Intelligent Engineering and Systems 14, n.º 1 (28 de febrero de 2021): 113–23. http://dx.doi.org/10.22266/ijies2021.0228.12.

Texto completo
Resumen
Internet of Things (IoT) has become more familiar in all applications and industrial fields such as medical, military, transportation, etc. It has some limitations because of the attack model in the transmission or communication channel. Moreover, one of the deadliest attacks is known as a Distributed Denial of Service Attack (DDoS). The Presence of DDoS in network layer cause huge damage in data transmission channel that ends in data loss or collapse. To address this issue the current research focused on an innovative detection and mitigation of Mirai and DDoS attack in IoT environment. Initially, number of IoT devices is arranged with the help of a novel Hybrid Strawberry and African Buffalo Optimization (HSBABO). Consequently, the types of DDoS attacks are launched in the developed IoT network. Moreover, the presence of strawberry and African Buffalo fitness is utilized to detect and specify the attack types. Subsequently a novel MCELIECE encryption with Cloud Shield scheme is developed to prevent the low and high rate DDoS attack in the Internet of Things. Finally, the proposed model attained 94% of attack detection accuracy, 3% of false negative rate and 5.5% of false positive rate.
Los estilos APA, Harvard, Vancouver, ISO, etc.
28

Aftab, Muhammad Umar, Ariyo Oluwasanmi, Abdullah Alharbi, Osama Sohaib, Xuyun Nie, Zhiguang Qin y Son Tung Ngo. "Secure and dynamic access control for the Internet of Things (IoT) based traffic system". PeerJ Computer Science 7 (10 de mayo de 2021): e471. http://dx.doi.org/10.7717/peerj-cs.471.

Texto completo
Resumen
Today, the trend of the Internet of Things (IoT) is increasing through the use of smart devices, vehicular networks, and household devices with internet-based networks. Specifically, the IoT smart devices and gadgets used in government and military are crucial to operational success. Communication and data sharing between these devices have increased in several ways. Similarly, the threats of information breaches between communication channels have also surged significantly, making data security a challenging task. In this context, access control is an approach that can secure data by restricting unauthorized users. Various access control models exist that can effectively implement access control yet, and there is no single state-of-the-art model that can provide dynamicity, security, ease of administration, and rapid execution all at once. In combating this loophole, we propose a novel secure and dynamic access control (SDAC) model for the IoT networks (smart traffic control and roadside parking management). Our proposed model allows IoT devices to communicate and share information through a secure means by using wired and wireless networks (Cellular Networks or Wi-Fi). The effectiveness and efficiency of the proposed model are demonstrated using mathematical models and discussed with many example implementations.
Los estilos APA, Harvard, Vancouver, ISO, etc.
29

Saleh, Mohammed. "WSNs and IoT Their Challenges and applications for Healthcare and Agriculture: A Survey". 3D SCEEER Conference sceeer, n.º 3d (1 de julio de 2020): 37–43. http://dx.doi.org/10.37917/ijeee.sceeer.3rd.6.

Texto completo
Resumen
Nowadays, the Wireless Sensor Network (WSN) has materialized its working areas, including environmental engineering, agriculture sector, industrial, business applications, military, intelligent buildings, etc. Sensor networks emerge as an attractive technology with great promise for the future. Indeed, issues remain to be resolved in the areas of coverage and deployment, scalability, service quality, size, energy consumption and security. The purpose of this paper is to present the integration of WSNs for IoT networks with the intention of exchanging information, applying security and configuration. These aspects are the challenges of network construction in which authentication, confidentiality, availability, integrity, network development. This review sheds some light on the potential integration challenges imposed by the integration of WSNs for IoT, which are reflected in the difference in traffic features.
Los estilos APA, Harvard, Vancouver, ISO, etc.
30

Kang, James Jin, Wencheng Yang, Gordana Dermody, Mohammadreza Ghasemian, Sasan Adibi y Paul Haskell-Dowland. "No Soldiers Left Behind: An IoT-Based Low-Power Military Mobile Health System Design". IEEE Access 8 (2020): 201498–515. http://dx.doi.org/10.1109/access.2020.3035812.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
31

Madhiarasan, M. "Design and development of IoT based solar powered versatile moving robot for military application". International Journal of System Assurance Engineering and Management 12, n.º 3 (16 de abril de 2021): 437–50. http://dx.doi.org/10.1007/s13198-021-01089-9.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
32

S, Swathi y Yogish H K. "Secure data aggregation in IoT using Efficient-CSDA". International Journal of Electrical and Computer Engineering (IJECE) 9, n.º 6 (1 de diciembre de 2019): 4889. http://dx.doi.org/10.11591/ijece.v9i6.pp4889-4897.

Texto completo
Resumen
<p><span>In recent days, IoT has been widely accepted and WSN (Wireless Sensor network) is being used for variety of the applications such as transportation, medical, environmental, military, it moreover the main aim to deploy the WSN is to collect the data about the given set of phenomena. The common task of WSN is to sense the data and send over the network. Moreover, due to the various purpose such as statistical analysis, the data aggregation is required. <span> </span>However, the when the dynamic network topology is considered, it is considered to be the very difficult task to provide the secure and efficient data aggregation. The main issue here is to ensure the security and accuracy of the data aggregation. Hence, in this research we have proposed an algorithm named as E-SDA (Efficient Secure Data Aggregation) in order to provide the secure data. In this, the algorithm provides the flexibility to detect the dishonest honest through neighbor monitoring. Later, extensive simulation has been done in order to prove the convergence of our algorithm.</span></p>
Los estilos APA, Harvard, Vancouver, ISO, etc.
33

Kumar, Dinesh y Dr. S. Smys. "An Efficient Packet Delivery Scheme Using Trust Routing in G.9959 Protocol in a Wireless Sensor Network". Journal of Ubiquitous Computing and Communication Technologies 2, n.º 3 (21 de julio de 2020): 118–25. http://dx.doi.org/10.36548/jucct.2020.3.001.

Texto completo
Resumen
Wireless Sensor Network (WSN) has drawn high attention in the recent years both in the industrial and the research frontier. It integrates multiple application-based services in areas like disaster management, military usage, smart city, habitat monitoring, healthcare etc. It uses the term Internet of Things (IoT) when providing different services and applications. Similarly, when this network associates with industrial revolution, it is commonly addressed as the Industrial Internet of Things (IIoT). Using IPv6, it gives high scalability using the strength of Internet users. Hence it is crucial to ensure efficiency of the protocols and working modules. This will determine the battery lifetime when it is deployed, connected to the battery’s draining short-term. Based on this consideration, many protocols are tested using IIoT in WSN. For this paper we have chosen G.9959 as the protocol and a comparison is drawn with the IPv6 packet delivery rate. Experimental results indicate that the proposed work performs more efficiently when compared to other previous schemes.
Los estilos APA, Harvard, Vancouver, ISO, etc.
34

G V, Abhishek. "Autonomous Intelligent POD for Military Purpose". International Journal for Research in Applied Science and Engineering Technology 9, n.º VI (14 de junio de 2021): 839–48. http://dx.doi.org/10.22214/ijraset.2021.35068.

Texto completo
Resumen
At present, the surveillance of International border areas is a challenging task. The border guarding forces are patrolling the border seriously, but it is no longer viable to watch the border at each and every moment. A critical requirement of this state of affairs is a robot that robotically detects trespasser in the border and reports close by board security control unit. Many of the army departments now make use of robots to elevate out risky jobs that can't be executed by means of the soldiers. In this present work, a Raspbian working system-based undercover agent robot platform with far off monitoring and manage algorithm through the Internet of Things (IoT)has been developed which will save human lives, reduces manual error and protect us from enemies. The spy robotic device comprises the Raspberry Pi (small single-board computer), pi camera and sensors. The information regarding the detection of living objects with the aid of the PIR sensor is dispatched to the users thru the net server and pi digicam capture the moving object which is posted inner the webpage simultaneously. The consumer in the manipulate room in a position to access the robot with wheel drive control buttons on the webpage. The movement of a robotic is also controlled robotically via obstacle detecting sensors to avoiding collisions. This surveillance system using a spy robot can be custom-made for more than a few fields like industries, banks and shopping malls.
Los estilos APA, Harvard, Vancouver, ISO, etc.
35

Kang, James Jin Won y Henry Larkin. "Inference of Personal Sensors in the Internet of Things". International Journal of Information, Communication Technology and Applications 2, n.º 1 (26 de enero de 2016): 1–23. http://dx.doi.org/10.17972/ijicta20162125.

Texto completo
Resumen
Smartphone technology has become more popular and innovative over the last few years, and technology companies are now introducing wearable devices into the market. By emerging and converging with technologies such as Cloud, Internet of Things (IoT) and Virtualization, requirements to personal sensor devices are immense and essential to support existing networks, e.g. mobile health (mHealth) as well as IoT users. Traditional physiological and biological medical sensors in mHealth provide health data either periodically or on-demand. Both of these situations can cause rapid battery consumption, consume significant bandwidth, and raise privacy issues, because these sensors do not consider or understand sensor status when converged together. The aim of this research is to provide a novel approach and solution to managing and controlling personal sensors that can be used in various areas such as the health, military, aged care, IoT and sport. This paper presents an inference system to transfer health data collected by personal sensors efficiently and effectively to other networks in a secure and effective manner without burdening workload on sensor devices.
Los estilos APA, Harvard, Vancouver, ISO, etc.
36

Feng, Yuan, Menglin Li, Chengyi Zeng y Hongfu Liu. "Robustness of Internet of Battlefield Things (IoBT): A Directed Network Perspective". Entropy 22, n.º 10 (16 de octubre de 2020): 1166. http://dx.doi.org/10.3390/e22101166.

Texto completo
Resumen
Through the combination of various intelligent devices and the Internet to form a large-scale network, the Internet of Things (IoT) realizes real-time information exchange and communication between devices. IoT technology is expected to play an essential role in improving the combat effectiveness and situation awareness ability of armies. The interconnection between combat equipment and other battlefield resources is referred to as the Internet of Battlefield Things (IoBT). Battlefield real-time data sharing and the cooperative decision-making among commanders are highly dependent on the connectivity between different combat units in the network. However, due to the wireless characteristics of communication, a large number of communication links are directly exposed in the complex battlefield environment, and various cyber or physical attacks threaten network connectivity. Therefore, the ability to maintain network connectivity under adversary attacks is a critical property for the IoBT. In this work, we propose a directed network model and connectivity measurement of the IoBT network. Then, we develop an optimal attack strategy optimization model to simulate the optimal attack behavior of the enemy. By comparing with the disintegration effect of some benchmark strategies, we verify the optimality of the model solution and find that the robustness of the IoBT network decreases rapidly with an increase of the unidirectional communication links in the network. The results show that the adversary will change the attack mode according to the parameter settings of attack resources and network communication link density. In order to enhance the network robustness, we need to adjust the defense strategy in time to deal with this change. Finally, we validated the model and theoretical analysis proposed in this paper through experiments on a real military network.
Los estilos APA, Harvard, Vancouver, ISO, etc.
37

Pradhan, Manas y Josef Noll. "Security, Privacy, and Dependability Evaluation in Verification and Validation Life Cycles for Military IoT Systems". IEEE Communications Magazine 58, n.º 8 (agosto de 2020): 14–20. http://dx.doi.org/10.1109/mcom.001.2000342.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
38

Darwesh, Aso M. y Ramyar Abdolrahman Teimoor. "Node Detection and Tracking in Smart Cities Based on Internet of Things and Machine Learning". UHD Journal of Science and Technology 3, n.º 1 (26 de mayo de 2019): 30. http://dx.doi.org/10.21928/uhdjst.v3n1y2019.pp30-38.

Texto completo
Resumen
It is essential to know that using technologies in a good manner will facilitate human live. Internet of Things (IoT) used widely due to developments in information and verbal exchange technologies. Some of the most famous fields of IoT applications are Identification, transmission, and healthcare which uses IoT technologies to collect information and recognizing the problem and propose the solution for it. In this paper, we try to find RFID nodes and their location. An Android Application used to provide help for those needed. Finding and detection the actual zone of our users are done by using KNN algorithm. We use 3NN because that model gets a better result in our dataset, for transmission depending on the users’ problem. We use a new equation to find weights that integrated with Dijkstra's algorithm, the equation is to calculate the weight between any two nodes using traffic information and image processing for finding a load of road by counting number of vehicles inside the image that collected from our readers. Dijkstra's algorithm is used to find the best path between source and destination using weights between nodes. The idea is used in healthcare, but can be used in many other fields like, security, Information and Communication Technology and Military.
Los estilos APA, Harvard, Vancouver, ISO, etc.
39

Popescu, Vasile Florin. "From Human Body Digitization to Internet of Bodies toward a New Dimension of Military Operations". Land Forces Academy Review 24, n.º 3 (1 de septiembre de 2019): 242–49. http://dx.doi.org/10.2478/raft-2019-0029.

Texto completo
Resumen
Abstract Digitization of the human body, philosophically said, - the “mating” with technology, represents the fusion of electronic technology with the human biology, which reduces the barriers of physical, digital and biological life. “The Internet of bodies”, that is the imminent development of the field of digitization of the human body on a large scale, is the inevitable future of technology at this moment. Instead of devices connected to the Internet as in Internet of Things (IoT), human bodies can be connected to a network, with the potential to be controlled and monitored remotely. The Internet of bodies is from the author’s point of view the future of technology, but this future is not so far away.
Los estilos APA, Harvard, Vancouver, ISO, etc.
40

R.M, Pranav. "Smart Logistics and Supply Chain with Machine Learning and IoT". International Journal for Research in Applied Science and Engineering Technology 9, n.º VI (25 de junio de 2021): 2180–84. http://dx.doi.org/10.22214/ijraset.2021.35216.

Texto completo
Resumen
Logistics is an important part of the Supply Chain. The management of logistics and supply chain is a complex process of planning and management of services, goods from the origin to the point of consumption. Logistics is defined as the process of managing movement of goods in and out of an organization. Supply Chain is defined as the process of managing movement and coordination of goods in between multiple organizations. Together Logistics and Supply Chain includes planning the transport, warehousing, inventory and sales an example of logistics could be the military stockpiling ammo whereas an example of Supply Chain management is making sure the right amount of goods reaches the destination, supplying more could lead to increased storage costs and supplying less could lead to inefficiencies. So, the main objective of Logistics is customer satisfaction and the main objective of Supply Chain is to have a competitive advantage by being more efficient. This project aims to have both customer satisfaction and efficiency and will achieved by implementing Internet of Things and Machine Learning to Logistics and Supply Chain. Large Corporations invest a lot of money to improve supply chains. This paper aims to help small businesses and rural businesses to improve their Supply Chain. This project aims at providing customer satisfaction and efficiency. Implementation using IoT and machine learning provides better efficiency. Keywords— Smart Logistics, Smart Supply Chain, Industry 4.0, Internet of Things, Machine Learning.
Los estilos APA, Harvard, Vancouver, ISO, etc.
41

Pirozmand, Poria, Mohsen Angoraj Ghafary, Safieh Siadat y Jiankang Ren. "Intrusion Detection into Cloud-Fog-Based IoT Networks Using Game Theory". Wireless Communications and Mobile Computing 2020 (14 de noviembre de 2020): 1–9. http://dx.doi.org/10.1155/2020/8819545.

Texto completo
Resumen
The Internet of Things is an emerging technology that integrates the Internet and physical smart objects. This technology currently is used in many areas of human life, including education, agriculture, medicine, military and industrial processes, and trade. Integrating real-world objects with the Internet can pose security threats to many of our day-to-day activities. Intrusion detection systems (IDS) can be used in this technology as one of the security methods. In intrusion detection systems, early and correct detection (with high accuracy) of intrusions is considered very important. In this research, game theory is used to develop the performance of intrusion detection systems. In the proposed method, the attacker infiltration mode and the behavior of the intrusion detection system as a two-player and nonparticipatory dynamic game are completely analyzed and Nash equilibrium solution is used to create specific subgames. During the simulation performed using MATLAB software, various parameters were examined using the definitions of game theory and Nash equilibrium to extract the parameters that had the most accurate detection results. The results obtained from the simulation of the proposed method showed that the use of intrusion detection systems in the Internet of Things based on cloud-fog can be very effective in identifying attacks with the least amount of errors in this network.
Los estilos APA, Harvard, Vancouver, ISO, etc.
42

Borza, Paul Nicolae, Mihai Machedon-Pisu y Felix Hamza-Lup. "Design of Wireless Sensors for IoT with Energy Storage and Communication Channel Heterogeneity". Sensors 19, n.º 15 (31 de julio de 2019): 3364. http://dx.doi.org/10.3390/s19153364.

Texto completo
Resumen
Autonomous Wireless Sensors (AWSs) are at the core of every Wireless Sensor Network (WSN). Current AWS technology allows the development of many IoT-based applications, ranging from military to bioengineering and from industry to education. The energy optimization of AWSs depends mainly on: Structural, functional, and application specifications. The holistic design methodology addresses all the factors mentioned above. In this sense, we propose an original solution based on a novel architecture that duplicates the transceivers and also the power source using a hybrid storage system. By identifying the consumption needs of the transceivers, an appropriate methodology for sizing and controlling the power flow for the power source is proposed. The paper emphasizes the fusion between information, communication, and energy consumption of the AWS in terms of spectrum information through a set of transceiver testing scenarios, identifying the main factors that influence the sensor node design and their inter-dependencies. Optimization of the system considers all these factors obtaining an energy efficient AWS, paving the way towards autonomous sensors by adding an energy harvesting element to them.
Los estilos APA, Harvard, Vancouver, ISO, etc.
43

Janiszewski, Marek, Anna Felkner, Piotr Lewandowski, Marcin Rytel y Hubert Romanowski. "Automatic Actionable Information Processing and Trust Management Towards Safer Internet of Things". Sensors 21, n.º 13 (25 de junio de 2021): 4359. http://dx.doi.org/10.3390/s21134359.

Texto completo
Resumen
The security of the Internet of Things (IoT) is a very important aspect of everyday life for people and industries, as well as hospitals, military, households and cities. Unfortunately, this topic is still too little researched and developed, which results in exposing users of Internet of Things to possible threats. One of the areas which should be addressed is the creation of a database of information about vulnerabilities and exploits in the Internet of Things; therefore, the goal of our activities under the VARIoT (Vulnerability and Attack Repository for IoT) project is to develop such a database and make it publicly available. The article presents the results of our research aimed at building this database, i.e., how the information about vulnerabilities is obtained, standardized, aggregated and correlated as well as the way of enhancing and selecting IoT related data. We have obtained and proved that existing databases provide various scopes of information and because of that a single and most comprehensive source of information does not exist. In addition, various sources present information about a vulnerability at different times—some of them are faster than others, and the differences in publication dates are significant. The results of our research show that aggregation of information from various sources can be very beneficial and has potential to enhance actionable value of information. We have also shown that introducing more sophisticated concepts, such as trust management and metainformation extraction based on artificial intelligence, could ensure a higher level of completeness of information as well as evaluate the usefulness and reliability of data.
Los estilos APA, Harvard, Vancouver, ISO, etc.
44

Panduri, Bharathi, Madhurika Vummenthala, Spoorthi Jonnalagadda, Garwandha Ashwini, Naruvadi Nagamani y Amanagati Akhila. "Dynamics and an efficient malware detection system using opcode sequence graph generation and ml algorithm". E3S Web of Conferences 184 (2020): 01009. http://dx.doi.org/10.1051/e3sconf/202018401009.

Texto completo
Resumen
IoT(Internet of things), for the most part, comprises of the various scope of Internet-associated gadgets and hubs. In the context of military and defence systems (called as IoBT) these gadgets could be personnel wearable battle outfits, tracking devices, cameras, clinical gadgets etc., The integrity and safety of these devices are critical in mission success and it is of utmost importance to keep them secure. One of the typical ways of the attack on these gadgets is through the use of malware, whose aim could be to compromise the device and or breach the communications. Generally, these IoBT gadgets and hubs are a much more significant target for cyber criminals due to the value they pose, more so than IoT devices. In this paper we attempt at creating a significant learning based procedure to distinguish, classify and tracksuch malware in IoBT(Internet of battlefield things) through operational codes progression. This is achieved by transforming the aforementioned OpCodes into a vector space, upon which a Deep Eigen space learning technique is applied to differentiate between harmful and safe applications. For robust classification, Support vector machine and n gram Sequencing algorithms are proposed in this paper. Moreover, we evaluate the quality of our proposed approach in malware recognition and also its maintainability against garbage code injection assault. These results are presented on a web page which has separate components and levels of accessibility for user and admin credentials. For the purpose of tracking the prevalence of various malwares on the network, counts and against garbage code injection assault. These results are presented on a web page which has separate components and levels of accessibility for user and admin credentials. For the purpose of tracking the prevalence of various malwares on the network, counts and trends of different malicious opcodes are displayed for both user and admin. Thereby our proposed approach will be beneficial for the users, especially for those who want to communicate confidential information within the network. It is also beneficial if a user wants to know whether a message is secure or not. This has also been made malware test accessible, which ideally will profit future research endeavors.
Los estilos APA, Harvard, Vancouver, ISO, etc.
45

Alromih, Arwa, Mznah Al-Rodhaan y Yuan Tian. "A Randomized Watermarking Technique for Detecting Malicious Data Injection Attacks in Heterogeneous Wireless Sensor Networks for Internet of Things Applications". Sensors 18, n.º 12 (9 de diciembre de 2018): 4346. http://dx.doi.org/10.3390/s18124346.

Texto completo
Resumen
Using Internet of Things (IoT) applications has been a growing trend in the last few years. They have been deployed in several areas of life, including secure and sensitive sectors, such as the military and health. In these sectors, sensory data is the main factor in any decision-making process. This introduces the need to ensure the integrity of data. Secure techniques are needed to detect any data injection attempt before catastrophic effects happen. Sensors have limited computational and power resources. This limitation creates a challenge to design a security mechanism that is both secure and energy-efficient. This work presents a Randomized Watermarking Filtering Scheme (RWFS) for IoT applications that provides en-route filtering to remove any injected data at an early stage of the communication. Filtering injected data is based on a watermark that is generated from the original data and embedded directly in random places throughout the packet’s payload. The scheme uses homomorphic encryption techniques to conceal the report’s measurement from any adversary. The advantage of homomorphic encryption is that it allows the data to be aggregated and, thus, decreases the packet’s size. The results of our proposed scheme prove that it improves the security and energy consumption of the system as it mitigates some of the limitations in the existing works.
Los estilos APA, Harvard, Vancouver, ISO, etc.
46

Furtak, Zieliński y Chudzikiewicz. "A Framework for Constructing a Secure Domain of Sensor Nodes". Sensors 19, n.º 12 (21 de junio de 2019): 2797. http://dx.doi.org/10.3390/s19122797.

Texto completo
Resumen
Application of the Internet of Things (IoT) in some critical areas (e.g., military) is limited mainly due to the lack of robust, secure, and trusted measures needed to ensure the availability, confidentiality, and integrity of information throughout its lifecycle. Considering the mostly limited resources of IoT devices connected by wireless networks and their dynamic placement in unsupervised or even hostile environments, security is a complex and considerable issue. In this paper, a framework which encompasses an approach to integrate some security measures to build a so-called “secure domain of sensors nodes” is proposed. The framework is based on the use of the Trusted Platform Modules (TPMs) in wireless sensor nodes. It encompasses an architecture of sensor nodes, their roles in the domain, and the data structures as well as the developed procedures which could be applied to generate the credentials for the sensor nodes, and subsequently, to build a local trust structure of each node as well as to build a trust relationship between a domain’s nodes. The proposed solution ensures the authentication of sensor nodes and their resistance against unauthorized impact with the hardware/software configuration allowing protection against malware that can infect the software. The usefulness of the presented framework was confirmed experimentally.
Los estilos APA, Harvard, Vancouver, ISO, etc.
47

Dei, Michele, Joan Aymerich, Massimo Piotto, Paolo Bruschi, Francisco del Campo y Francesc Serra-Graells. "CMOS Interfaces for Internet-of-Wearables Electrochemical Sensors: Trends and Challenges". Electronics 8, n.º 2 (31 de enero de 2019): 150. http://dx.doi.org/10.3390/electronics8020150.

Texto completo
Resumen
Smart wearables, among immediate future IoT devices, are creating a huge and fast growing market that will encompass all of the next decade by merging the user with the Cloud in a easy and natural way. Biological fluids, such as sweat, tears, saliva and urine offer the possibility to access molecular-level dynamics of the body in a non-invasive way and in real time, disclosing a wide range of applications: from sports tracking to military enhancement, from healthcare to safety at work, from body hacking to augmented social interactions. The term Internet of Wearables (IoW) is coined here to describe IoT devices composed by flexible smart transducers conformed around the human body and able to communicate wirelessly. In addition the biochemical transducer, an IoW-ready sensor must include a paired electronic interface, which should implement specific stimulation/acquisition cycles while being extremely compact and drain power in the microwatts range. Development of an effective readout interface is a key element for the success of an IoW device and application. This review focuses on the latest efforts in the field of Complementary Metal–Oxide–Semiconductor (CMOS) interfaces for electrochemical sensors, and analyses them under the light of the challenges of the IoW: cost, portability, integrability and connectivity.
Los estilos APA, Harvard, Vancouver, ISO, etc.
48

Hao, Shuai, Beiyi An, Hu Wen, Xu Ma y Keping Yu. "A Heterogeneous Image Fusion Method Based on DCT and Anisotropic Diffusion for UAVs in Future 5G IoT Scenarios". Wireless Communications and Mobile Computing 2020 (27 de junio de 2020): 1–11. http://dx.doi.org/10.1155/2020/8816818.

Texto completo
Resumen
Unmanned aerial vehicles, with their inherent fine attributes, such as flexibility, mobility, and autonomy, play an increasingly important role in the Internet of Things (IoT). Airborne infrared and visible image fusion, which constitutes an important data basis for the perception layer of IoT, has been widely used in various fields such as electric power inspection, military reconnaissance, emergency rescue, and traffic management. However, traditional infrared and visible image fusion methods suffer from weak detail resolution. In order to better preserve useful information from source images and produce a more informative image for human observation or unmanned aerial vehicle vision tasks, a novel fusion method based on discrete cosine transform (DCT) and anisotropic diffusion is proposed. First, the infrared and visible images are denoised by using DCT. Second, anisotropic diffusion is applied to the denoised infrared and visible images to obtain the detail and base layers. Third, the base layers are fused by using weighted averaging, and the detail layers are fused by using the Karhunen–Loeve transform, respectively. Finally, the fused image is reconstructed through the linear superposition of the base layer and detail layer. Compared with six other typical fusion methods, the proposed approach shows better fusion performance in both objective and subjective evaluations.
Los estilos APA, Harvard, Vancouver, ISO, etc.
49

Kharchenko, S. G. y N. K. Zhizhin. "Fifth Generation of Wireless Networks (5G): Problems and Risks". Ecology and Industry of Russia 24, n.º 12 (1 de diciembre de 2020): 58–65. http://dx.doi.org/10.18412/1816-0395-2020-12-58-65.

Texto completo
Resumen
The article is devoted to the analysis of electromagnetic radiation of fifth generation (5G) networks. The characteristic of the 5G electromagnetic radiation spectrum and its features is given. The main advantages of implementing 5G networks proceeding from the Concept of the Ministry of communications of Russia are analyzed, including the Internet of Things, artificial intelligence, augmented, extended reality, and virtual reality. Nine ways in which 5G and IoT will cause serious harm to people, wildlife, and our Earth are summarized. The conclusions of the Concept are being questioned. The article analyzes the results that the military personnel is expecting from the 5G network, including the introduction of hypersonic weapons, the creation of "smart military bases", "combat networks", the use of "portable combat items", drones, non-lethal, directed energy electronic weapons. It is justified: how does 5G differ qualitatively and quantitatively from 4G in its impact on human health. Based on the appeal of scientists and environmental organizations from 219 countries to the UN, the WTO, the EU, the Council of Europe and the governments of all States, the demand for the immediate termination of the deployment of a 5G wireless network on Earth and in space is justified.
Los estilos APA, Harvard, Vancouver, ISO, etc.
50

Tappari, Sunitha y K. Sridevi. "Review on lightweight hardware architectures for the crypt-analytics in FPGA". International Journal of Engineering & Technology 7, n.º 3 (22 de agosto de 2018): 1888. http://dx.doi.org/10.14419/ijet.v7i3.14138.

Texto completo
Resumen
Internet of Things (IoT) plays a vital role in the Wireless sensor networks (WSNs), which is used for many applications, such as military, health, and environmental. Security is the major concern and it is very difficult to achieve because of a different kind of attack in the network. In recent years, many authors have introduced different Hardware Architectures to solve these security problems. This paper has discussed about a review of various Hardware Architectures for the lightweight Crypt-analytics methods and the comparative learning of various Crypt-analytics and authentication systems carried out. The comparative study result showed that the lightweight algorithms have good per-formance compared to the conventional Crypt-analytics algorithm in terms of memory requirement, operations, and power consumption.
Los estilos APA, Harvard, Vancouver, ISO, etc.
Ofrecemos descuentos en todos los planes premium para autores cuyas obras están incluidas en selecciones literarias temáticas. ¡Contáctenos para obtener un código promocional único!

Pasar a la bibliografía