Fog Computing: An Overview of Big IoT Data Analytics Anawar, Muhammad Rizwan; Wang, Shangguang; Azam Zia, Muhammad ...
Wireless communications and mobile computing,
01/2018, Volume:
2018, Issue:
1
Journal Article
Peer reviewed
Open access
A huge amount of data, generated by Internet of Things (IoT), is growing up exponentially based on nonstop operational states. Those IoT devices are generating an avalanche of information that is ...disruptive for predictable data processing and analytics functionality, which is perfectly handled by the cloud before explosion growth of IoT. Fog computing structure confronts those disruptions, with powerful complement functionality of cloud framework, based on deployment of micro clouds (fog nodes) at proximity edge of data sources. Particularly big IoT data analytics by fog computing structure is on emerging phase and requires extensive research to produce more proficient knowledge and smart decisions. This survey summarizes the fog challenges and opportunities in the context of big IoT data analytics on fog networking. In addition, it emphasizes that the key characteristics in some proposed research works make the fog computing a suitable platform for new proliferating IoT devices, services, and applications. Most significant fog applications (e.g., health care monitoring, smart cities, connected vehicles, and smart grid) will be discussed here to create a well-organized green computing paradigm to support the next generation of IoT applications.
A new integration of wireless communication technologies into the automobile industry has instigated a momentous research interest in the field of Vehicular Ad Hoc Network (VANET) security. ...Intelligent Transportation Systems (ITS) are set up, aiming to offer promising applications for efficient and safe communication for future automotive technology. Vehicular networks are unique in terms of characteristics, challenges, architecture, and applications. Consequently, security requirements related to vehicular networks are more complex as compared to mobile networks and conventional wireless networks. This article presents a survey about developments in vehicular networks from the perspective of lightweight cryptographic protocols and privacy preserving algorithms. Unique characteristics of vehicular networks are presented which make the embedded security applications computationally hard as well as memory constrained. The current study also deals with the fundamental security requirements, essential for vehicular communication. Furthermore, awareness of security threats and their cryptographic solutions in terms of future automotive industry are discussed. In addition, asymmetric, symmetric, and lightweight cryptographic solutions are summarized. These strategies can be enhanced or incorporated all in all to meet the security perquisites of future cars security.
Modern cars are mostly computerized and equipped with passive keyless entry and start (PKES) system. PKES is based on Radio Frequency Identification (RFID) technology for authentication of the ...authorized drivers. RFID technology has replaced the conventional ways of identification and authorization in order to facilitate users while introducing new security challenges. In this article, we focused on verifying the presence of authorized key in the physical proximity of car by employing multiple antennas. Application of multiple antennas to the currently developed cryptographic algorithms opens a new approach for researchers to improve security of RFID based systems. We propose an advanced security system for PKES using multiple antennas wherein an authorized key passes through multiple vicinities to allow driver to access and start the car. Furthermore, we modified a light-weight cryptographic protocol named as HB (Hopper and Blum) protocol to integrate it with the proposed design based on multiple antennas. Simulation results show improvement in security functionality while keeping in view the efficiency constraints.
Automotive cyber physical systems (CPSs) are ever more utilizing wireless technology for V2X communication as a potential way out for challenges regarding collision detection, wire strap up troubles ...and collision avoidance. However, security is constrained as a result of the energy and performance limitations of modern wireless systems. Accordingly, the need for efficient secret key generation and management mechanism for secured communication among computationally weak wireless devices has motivated the introduction of new authentication protocols. Recently, there has been a great interest in physical layer based secret key generation schemes by utilizing channel reciprocity. Consequently, it is observed that the sequence generated by two communicating parties contain mismatched bits which need to be reconciled by exchanging information over a public channel. This can be an immense security threat as it may let an adversary attain and recover segments of the key in known channel conditions. We proposed Hopper-Blum based physical layer (HB-PL) authentication scheme in which an enhanced physical layer key generation method integrates the Hopper-Blum (HB) authentication protocol. The information collected from the shared channel is used as secret keys for the HB protocol and the mismatched bits are used as the induced noise for learning parity with noise (LPN) problem. The proposed scheme aims to provide a way out for bit reconciliation process without leakage of information over a public channel. Moreover, HB protocol is computationally efficient and simple which helps to reduce the number of exchange messages during the authentication process. We have performed several experiments which show that our proposed design can generate secret keys with improved security strength and high performance in comparison to the current authentication techniques. Our scheme requires less than 55 exchange messages to achieve more than 95% of correct authentication.
Full text
Available for:
EMUNI, FIS, FZAB, GEOZS, GIS, IJS, IMTLJ, KILJ, KISLJ, MFDPS, NLZOH, NUK, OBVAL, OILJ, PNG, SAZU, SBCE, SBJE, SBMB, SBNM, UKNU, UL, UM, UPUK, VKSCE, ZAGLJ
This work investigates an adaptive fault-tolerant cloud tracking control scheme for heterogeneous vehicular platoon systems (HVPSs) based on a dual learning mechanism (DLM). A ...human-vehicle-road-cloud traffic scenario is built, in which the cloud control platform operates HVPSs by sending the command signal to a non-autonomous leader vehicle, which generates the required trajectory. Moreover, a DLM consisting of an improved reinforcement learning mechanism and a composite learning mechanism is proposed to optimize the control performance of the entire vehicular platoon. Furthermore, unlike existing fault-tolerant control methods, the proposed DLM can effectively reduce the adverse effects caused by actuator fault. Via the DLM, and cloud control platform, an adaptive fault-tolerant optimized platoon technology is developed to guarantee the bistability. Finally, simulation results certify the effectiveness and superiority of the developed strategy. Note to Practitioners -This paper is inspired by the problem of vehicular platoon control, but the proposed approach is not only applicable to transportation systems, but also to a variety of scenarios such as smart grids, supply chain management, and fire rescue. The intelligent transportation system aims to realize V2P, V2V, and V2I. However, there still exist several problems, such as the lack of obstacle avoidance/collision mechanism, the occurrence of platoon actuator fault, and the excessive consumption of vehicle energy, making it difficult to apply in complex traffic. In this paper, the proposed method can effectively solve the above problems, and simulation experiments have shown that this method is feasible and superior. However, vehicular platoon path programming and external network attacks have not yet been considered. To approach the real traffic environment more closely also prompts us to conduct research in the future.
A power transmission system is the backbone of Energy Internet and its importance in maintaining reliability cannot be ignored. The transmission lines are prone to electrical faults hence an ...intelligent and accurate fault localization method is necessary. One of the major challenges in locating a fault is the uncertainty associated with transmission line parameters. Recently, stochastic correlation estimator method has been reported to tackle the parameter uncertainty in univariate model of transmission system. However, this method has never been applied to a multivariate problem yet. This paper proposes a stochastic correlation estimator based fault location method for lossy transmission lines with multiple uncertain parameters. Simulation was carried out on a single conductor overhead 50 km transmission line with height and ground resistivity as random parameters. The results show that the actual fault position is within an estimated confidence fault interval even for multivariate uncertainty problem.
Backup Backhaul for Femtocells Khan, Muhammad Asad; Supeng Leng; Jadoon, Ahmer Khan ...
2014 IEEE 17th International Conference on Computational Science and Engineering,
2014-Dec.
Conference Proceeding
In indoor scenarios where conventional macro BS coverage can be poor, femto cells present a promising solution for high quality wireless access. They are randomly deployed by the user and share the ...customer broadband connection for cellular core connectivity. Furthermore, this sharing can creates severe capacity and reliability issues. Traditional solutions like Line-of-Sight (LoS), microwave link and leased fibre lines are mostly technically challenging and economically unfeasible. This paper presents a new redundant architecture using overlapping clustering which groups together FAPs (Femto Access Point) in different clusters. However, we analyze our proposed algorithm for number of overlapping, isolated FAPs and the CHs in response of variations in total number of FAPs and range of Wi-Fi link. Simulation results shows the optimal density of the FAPs in unit area and suitable Wi-Fi range provide highly desirable figures.