Your browser doesn't support javascript.
loading
Show: 20 | 50 | 100
Results 1 - 9 de 9
Filter
Add more filters










Database
Language
Publication year range
1.
Sensors (Basel) ; 23(14)2023 Jul 24.
Article in English | MEDLINE | ID: mdl-37514938

ABSTRACT

The emergence of Industry 5.0 has highlighted the significance of information usage, processing, and data analysis when maintaining physical assets. This has enabled the creation of the Digital Twin (DT). Information about an asset is generated and consumed during its entire life cycle. The main goal of DT is to connect and represent physical assets as close to reality as possible virtually. Unfortunately, the lack of security and trust among DT participants remains a problem as a result of data sharing. This issue cannot be resolved with a central authority when dealing with large organisations. Blockchain technology has been proposed as a solution for DT information sharing and security challenges. This paper proposes a Blockchain-based solution for digital twin using Ethereum blockchain with performance and cost analysis. This solution employs a smart contract for information management and access control for stakeholders of the digital twin, which is secure and tamper-proof. This implementation is based on Ethereum and IPFS. We use IPFS storage servers to store stakeholders' details and manage information. A real-world use-case of a production line of a smartphone, where a conveyor belt is used to carry different parts, is presented to demonstrate the proposed system. The performance evaluation of our proposed system shows that it is secure and achieves performance improvement when compared with other methods. The comparison of results with state-of-the-art methods showed that the proposed system consumed fewer resources in a transaction cost, with an 8% decrease. The execution cost increased by 10%, but the cost of ether was 93% less than the existing methods.

2.
Sensors (Basel) ; 22(22)2022 Nov 19.
Article in English | MEDLINE | ID: mdl-36433564

ABSTRACT

Advancement in the Internet of Things (IoT) and cloud computing has escalated the number of connected edge devices in a smart city environment. Having billions more devices has contributed to security concerns, and an attack-proof authentication mechanism is the need of the hour to sustain the IoT environment. Securing all devices could be a huge task and require lots of computational power, and can be a bottleneck for devices with fewer computational resources. To improve the authentication mechanism, many researchers have proposed decentralized applications such as blockchain technology for securing fog and IoT environments. Ethereum is considered a popular blockchain platform and is used by researchers to implement the authentication mechanism due to its programable smart contract. In this research, we proposed a secure authentication mechanism with improved performance. Neo blockchain is a platform that has properties that can provide improved security and faster execution. The research utilizes the intrinsic properties of Neo blockchain to develop a secure authentication mechanism. The proposed authentication mechanism is compared with the existing algorithms and shows that the proposed mechanism is 20 to 90 per cent faster in execution time and has over 30 to 70 per cent decrease in registration and authentication when compared to existing methods.


Subject(s)
Blockchain , Internet of Things , Computer Security , Cloud Computing , Algorithms
3.
Sensors (Basel) ; 22(10)2022 May 23.
Article in English | MEDLINE | ID: mdl-35632364

ABSTRACT

The use of low-cost sensors in IoT over high-cost devices has been considered less expensive. However, these low-cost sensors have their own limitations such as the accuracy, quality, and reliability of the data collected. Fog computing offers solutions to those limitations; nevertheless, owning to its intrinsic distributed architecture, it faces challenges in the form of security of fog devices, secure authentication and privacy. Blockchain technology has been utilised to offer solutions for the authentication and security challenges in fog systems. This paper proposes an authentication system that utilises the characteristics and advantages of blockchain and smart contracts to authenticate users securely. The implemented system uses the email address, username, Ethereum address, password and data from a biometric reader to register and authenticate users. Experiments showed that the proposed method is secure and achieved performance improvement when compared to existing methods. The comparison of results with state-of-the-art showed that the proposed authentication system consumed up to 30% fewer resources in transaction and execution cost; however, there was an increase of up to 30% in miner fees.


Subject(s)
Blockchain , Biometry , Computer Security , Privacy , Reproducibility of Results
4.
Sensors (Basel) ; 21(12)2021 Jun 17.
Article in English | MEDLINE | ID: mdl-34204434

ABSTRACT

The Internet of Things (IoT) and its benefits and challenges are the most emergent research topics among academics and practitioners. With supply chains (SCs) gaining rapid complexity, having high supply chain visibility (SCV) would help companies ease the processes and reduce complexity by improving inaccuracies. Extant literature has given attention to the organisation's capability to collect and evaluate information to balance between strategy and goals. The majority of studies focus on investigating IoT's impact on different areas such as sustainability, organisational structure, lean manufacturing, product development, and strategic management. However, research investigating the relationships and impact of IoT on SCV is minimal. This study closes this gap using a structured literature review to critically analyse existing literature to synthesise the use of IoT applications in SCs to gain visibility, and the SC. We found key IoT technologies that help SCs gain visibility, and seven benefits and three key challenges of these technologies. We also found the concept of Supply 4.0 that grasps the element of Industry 4.0 within the SC context. This paper contributes by combining IoT application synthesis, enablers, and challenges in SCV by highlighting key IoT technologies used in the SCs to gain visibility. Finally, the authors propose an empirical research agenda to address the identified gaps.


Subject(s)
Internet of Things , Confidentiality , Technology
5.
Comput Biol Med ; 100: 176-185, 2018 09 01.
Article in English | MEDLINE | ID: mdl-30016745

ABSTRACT

Health Monitoring apps for smartphones have the potential to improve quality of life and decrease the cost of health services. However, they have failed to live up to expectation in the context of respiratory disease. This is in part due to poor objective measurements of symptoms such as cough. Real-time cough detection using smartphones faces two main challenges namely, the necessity of dealing with noisy input signals, and the need of the algorithms to be computationally efficient, since a high battery consumption would prevent patients from using them. This paper proposes a robust and efficient smartphone-based cough detection system able to keep the phone battery consumption below 25% (16% if only the detector is considered) during 24 h use. The proposed system efficiently calculates local image moments over audio spectrograms to feed an optimized classifier for final cough detection. Our system achieves 88.94% sensitivity and 98.64% specificity in noisy environments with a 5500× speed-up and 4× battery saving compared to the baseline implementation. Power consumption is also reduced by a minimum factor of 6 compared to existing optimized systems in the literature.


Subject(s)
Algorithms , Cough , Mobile Applications , Smartphone , Adult , Aged , Cough/diagnosis , Cough/physiopathology , Female , Humans , Male , Middle Aged , Monitoring, Physiologic/instrumentation , Monitoring, Physiologic/methods
6.
PLoS One ; 12(7): e0179720, 2017.
Article in English | MEDLINE | ID: mdl-28692697

ABSTRACT

Public cloud storage services are becoming prevalent and myriad data sharing, archiving and collaborative services have emerged which harness the pay-as-you-go business model of public cloud. To ensure privacy and confidentiality often encrypted data is outsourced to such services, which further complicates the process of accessing relevant data by using search queries. Search over encrypted data schemes solve this problem by exploiting cryptographic primitives and secure indexing to identify outsourced data that satisfy the search criteria. Almost all of these schemes rely on exact matching between the encrypted data and search criteria. A few schemes which extend the notion of exact matching to similarity based search, lack realism as those schemes rely on trusted third parties or due to increase storage and computational complexity. In this paper we propose Oblivious Similarity based Search ([Formula: see text]) for encrypted data. It enables authorized users to model their own encrypted search queries which are resilient to typographical errors. Unlike conventional methodologies, [Formula: see text] ranks the search results by using similarity measure offering a better search experience than exact matching. It utilizes encrypted bloom filter and probabilistic homomorphic encryption to enable authorized users to access relevant data without revealing results of search query evaluation process to the untrusted cloud service provider. Encrypted bloom filter based search enables [Formula: see text] to reduce search space to potentially relevant encrypted data avoiding unnecessary computation on public cloud. The efficacy of [Formula: see text] is evaluated on Google App Engine for various bloom filter lengths on different cloud configurations.


Subject(s)
Computer Security , Information Dissemination , Search Engine , Algorithms , Cloud Computing
7.
PLoS One ; 11(8): e0161440, 2016.
Article in English | MEDLINE | ID: mdl-27571421

ABSTRACT

Privacy-aware search of outsourced data ensures relevant data access in the untrusted domain of a public cloud service provider. Subscriber of a public cloud storage service can determine the presence or absence of a particular keyword by submitting search query in the form of a trapdoor. However, these trapdoor-based search queries are limited in functionality and cannot be used to identify secure outsourced data which contains semantically equivalent information. In addition, trapdoor-based methodologies are confined to pre-defined trapdoors and prevent subscribers from searching outsourced data with arbitrarily defined search criteria. To solve the problem of relevant data access, we have proposed an index-based privacy-aware search methodology that ensures semantic retrieval of data from an untrusted domain. This method ensures oblivious execution of a search query and leverages authorized subscribers to model conjunctive search queries without relying on predefined trapdoors. A security analysis of our proposed methodology shows that, in a conspired attack, unauthorized subscribers and untrusted cloud service providers cannot deduce any information that can lead to the potential loss of data privacy. A computational time analysis on commodity hardware demonstrates that our proposed methodology requires moderate computational resources to model a privacy-aware search query and for its oblivious evaluation on a cloud service provider.


Subject(s)
Cloud Computing , Algorithms , Computer Security , Information Storage and Retrieval/methods , Internet , Privacy
8.
Sensors (Basel) ; 16(4)2016 Apr 13.
Article in English | MEDLINE | ID: mdl-27089338

ABSTRACT

Advancements in science and technology have highlighted the importance of robust healthcare services, lifestyle services and personalized recommendations. For this purpose patient daily life activity recognition, profile information, and patient personal experience are required. In this research work we focus on the improvement in general health and life status of the elderly through the use of an innovative services to align dietary intake with daily life and health activity information. Dynamic provisioning of personalized healthcare and life-care services are based on the patient daily life activities recognized using smart phone. To achieve this, an ontology-based approach is proposed, where all the daily life activities and patient profile information are modeled in ontology. Then the semantic context is exploited with an inference mechanism that enables fine-grained situation analysis for personalized service recommendations. A generic system architecture is proposed that facilitates context information storage and exchange, profile information, and the newly recognized activities. The system exploits the patient's situation using semantic inference and provides recommendations for appropriate nutrition and activity related services. The proposed system is extensively evaluated for the claims and for its dynamic nature. The experimental results are very encouraging and have shown better accuracy than the existing system. The proposed system has also performed better in terms of the system support for a dynamic knowledge-base and the personalized recommendations.


Subject(s)
Activities of Daily Living , Biosensing Techniques , Monitoring, Physiologic , Computer Systems , Delivery of Health Care/methods , Humans
9.
Sensors (Basel) ; 11(12): 11581-604, 2011.
Article in English | MEDLINE | ID: mdl-22247682

ABSTRACT

Ubiquitous Life Care (u-Life care) is receiving attention because it provides high quality and low cost care services. To provide spontaneous and robust healthcare services, knowledge of a patient's real-time daily life activities is required. Context information with real-time daily life activities can help to provide better services and to improve healthcare delivery. The performance and accuracy of existing life care systems is not reliable, even with a limited number of services. This paper presents a Human Activity Recognition Engine (HARE) that monitors human health as well as activities using heterogeneous sensor technology and processes these activities intelligently on a Cloud platform for providing improved care at low cost. We focus on activity recognition using video-based, wearable sensor-based, and location-based activity recognition engines and then use intelligent processing to analyze the context of the activities performed. The experimental results of all the components showed good accuracy against existing techniques. The system is deployed on Cloud for Alzheimer's disease patients (as a case study) with four activity recognition engines to identify low level activity from the raw data captured by sensors. These are then manipulated using ontology to infer higher level activities and make decisions about a patient's activity using patient profile information and customized rules.


Subject(s)
Residence Characteristics , Information Systems
SELECTION OF CITATIONS
SEARCH DETAIL
...