The demand of highway lighting system is ubiquitous but its operation contributes to extensive financial cost and concerning environmental implications. For this reason, recent researches have ...investigated possible solutions to boost the efficiency of the existing lighting system. However, the ultimate guide for green energy enabled smart highway lighting system is still lacking in terms of quality and comprehensiveness. The purpose of this paper is to discuss divergent proceedings in the literature to establish procedures of designing and developing energy efficient green highway lighting system, taking into account performance and environmental impact perspectives. A complete taxonomy is presented to identify and organize the literature into several categories, including fundamental design principles with their advantages, disadvantages and research challenges. This paper also intends to give a possible framework to the readers to bridge the gaps among the existing studies. These findings are anticipated to inform researchers and policymaker on perceiving the benefits of the ameliorated energy efficiency in the highway lighting set-up. Furthermore, open issues identified in this paper will pave the way on achieving future highway lighting systems that are not only facilitating safe and seamless driving experience, but also energy-efficient for environmental sustainability.
With the emerging concept of Wi-Fi radio as sensors, we are witnessing more device-free sensing applications. But we observe that most of the existing works of these applications are meant for simple ...indoor layout and are not adequate for complex cases, e.g., collapsed structures. In this article, we explore the feasibility of Wi-Fi Halow signals for the collapsed scenario as it can boost rescue efforts. To achieve this, we aim at two prime objectives of this article. First, we model debris constituent of common collapsed scenario materials, such as concrete, brick, glass, and lumber by conducting a field survey of an earthquake-affected area. After that, we consider signal propagation models for better coverage in this debris model by employing two methods. The first method is an integrated TOPSIS and Shannon entropy-based on a bijective soft set, which provides us an approximation tool to select the best Wi-Fi Halow signal coverage in debris. The second method composes two modified wireless signal propagation models, which are transmitter-receiver (TR) and Wi-Fi radar, respectively. We perform extensive simulations and figure out that low power transmission using Wi-Fi radar can yield better coverage, which is also verified by the Shannon entropy method.
A permissioned blockchain includes a user in the network after verifying the user’s identity, in contrast to Bitcoin, which is a public blockchain that allows network participation without ...third-party approval. The two types of permissioned blockchains are private blockchains, each consisting of one server and multiple users, and consortium blockchains, which consist of groups of private blockchains. However, a blockchain has privacy issues, such as user tracking and inference. Therefore, cryptography should be applied for user privacy in a blockchain. There is a lot of research on anonymous protocols for privacy in a blockchain. In this paper, we provide a scheme for user management, i.e., identification and authorization, in a permissioned blockchain. We also propose an anonymous protocol with user identification and transaction linking capabilities provided by the private server, strictly to solve privacy concerns.
This paper builds upon the foundation and clarifies specifications for a necessary security protocol in Wireless Sensor Networks (WSNs) with cooperative communications. It is designed to enhance ...performance and resiliency against cyber-attacks. Recent literature has shown that developing a WSN with Cooperative Communication greatly increases the performance of the network, but also exposes new vulnerabilities. The technique operates by transmitting packets of data to neighboring relay nodes in a cooperative fashion to reach the destination. In this paper, we consider security issues in WSNs with cooperative communication on each layer of the OSI model: physical layer, data link layer, network layer, service (topology) layer, and application layer. For each layer, we clarify the main task, enumerate the main attacks and threats, specify the primary security approaches and techniques (if any), and discuss possible new attacks and problems that may arise with the use of cooperative communications. Furthermore, we show for some attacks (e.g., jamming, packet dropping, and wormhole) that using cooperative communication improves the network resiliency and reliability. Finally, we propose a security protocol that addresses many of these shortcomings, while outlining the remaining issues that need further work and research.
Long-term electrocardiogram (ECG) monitoring, as a representative application of cyber-physical systems, facilitates the early detection of arrhythmia. A considerable number of previous studies has ...explored monitoring techniques and the automated analysis of sensing data. However, ensuring patient privacy or confidentiality has not been a primary concern in ECG monitoring. First, we propose an intelligent heart monitoring system, which involves a patient-worn ECG sensor (e.g., a smartphone) and a remote monitoring station, as well as a decision support server that interconnects these components. The decision support server analyzes the heart activity, using the Pan-Tompkins algorithm to detect heartbeats and a decision tree to classify them. Our system protects sensing data and user privacy, which is an essential attribute of dependability, by adopting signal scrambling and anonymous identity schemes. We also employ a public key cryptosystem to enable secure communication between the entities. Simulations using data from the MIT-BIH arrhythmia database demonstrate that our system achieves a 95.74% success rate in heartbeat detection and almost a 96.63% accuracy in heartbeat classification, while successfully preserving privacy and securing communications among the involved entities.
The mobile revolution is changing the way we interact with the people and things around us. Proximity awareness, the ability to actively/passively and continuously search for relevant value in one's ...physical/virtual proximity, is at the core of this phenomenon.
The session initiation protocol (SIP) is an IP-based telephony authentication mechanism for multimedia big data communications over the Internet. It is used to set up, and control voice and video ...calls, as well as for instant messaging. One of the concerns of this kind of open-text-based protocol is the security for user authentication. The HTTP digest-based challenge-response authentication process is used in the original SIP. However, this kind of authentication procedure is insecure and a pre-existing user configuration on the remote server is required. According to the literature, several authentication mechanisms for SIP are already devised, but none of these SIPs are robust against existing security attacks. Therefore, we design a three-factor SIP (TF-SIP) for multimedia big data communications, which is robust and flexible against existing known security issues. We show that our TF-SIP is provably secure in the random oracle model. We formally verify the mutual authentication and the freshness of the agreed session key between the user and the remote server using the BAN logic analysis. We found that the communication and computation costs are low, but the storage cost is slightly higher for our TF-SIP in comparison with other SIPs.
Summary
Illegal sharing of copyrighted materials in peer‐to‐peer (P2P) networks has become a serious threat to the content industries. Despite many copyright‐protected P2P systems that have been ...designed to prevent piracy, the user authentication–based approaches face the challenge of collusion attacks and the encryption‐based approaches may be vulnerable to poisoning attacks. Observing these, in this paper, we present a novel copyright‐protected content delivery scheme (CPP) for P2P file‐sharing networks based on piece‐level stochastic encryption. In CPP, peers must pay for decryption key sequences before accessing to the plaintext content. For each peer, the sequence of the decryption keys is different from others, so the unauthorized peers could not access the content even if some colluders share their keys. Modified piece with hash enable peers to check the correctness of each piece after downloading, preventing the propagation of poisoned pieces. There is neither massive state maintenance nor frequent user authentication during the download process. Peers purchase after downloading, protecting their benefits when quitting the system before paying. Analysis and experiments show that CPP is suitable for delivering large files, and it is resilience to collusion attacks and poisoning attacks.
The paper presents a novel piece‐level stochastic‐encryption–based digital rights management approach and increases the key space by exploring the random characteristic of peer‐to‐peer networks, which can defend against collusion attacks. It also proposes a copyright‐protected content delivery scheme that can keep the efficiency of peer‐to‐peer networks and protect users' interests from download failure.
Sensors in Cyber-Physical Systems (CPS) are typically used to collect various aspects of the region of interest and transmit the data towards upstream nodes for further processing. However, data ...collection in CPS is often unreliable due to severe resource constraints (e.g., bandwidth and energy), environmental impacts (e.g., equipment faults and noises), and security concerns. Besides, detecting an event through the aggregation in CPS can be intricate and untrustworthy if the sensor's data is not validated during data acquisition, before transmission, and before aggregation. This paper introduces In-network Generalized Trustworthy Data Collection (IGTDC) framework for event detection in CPS. This framework facilitates reliable data for aggregation at the edge of CPS. The main idea of IGTDC is to enable a sensor's module to examine locally whether the event's acquired data is trustworthy before transmitting towards the upstream nodes. It further validates whether the received data can be trusted or not before data aggregation at the sink node. Additionally, IGTDC helps to identify faulty sensors. For reliable event detection, we use collaborative IoT tactics, gate-level modeling with Verilog User Defined Primitive (UDP), and Programmable Logic Device (PLD) to ensure that the event's acquired data is reliable before transmitting towards the upstream nodes. We employ Gray code in gate-level modeling. It helps to ensure that the received data is reliable. Gray code also helps to distinguish a faulty sensor. Through simulation and extensive performance analysis, we demonstrate that the collected data in the IGTDC framework is reliable and can be used in the majority of CPS applications.
Power systems can be affected by unpredicted and unavoidable faults and failures, making security assessment an important challenge, which requires significant research works. An overview of this ...critical area, as presented here, shows that the security assessment has transformed from a deterministic to risk‐based methods, with two broad categories, risk assessment and risk identification. First, a detailed discussion of risk assessment is given to summarise different methods to solve the problems of equipment failure probability model, scenarios formation, and severity assessment. Further, comprehensive survey and prospect for risk identification are provided as a roadmap to determine the risk source directly. Risk identification techniques such as tracking method, sensitivity analysis, and risk source identification help operators to take effectively preventive action and restore system security.