Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 5 de 5
Filtrar
Mais filtros










Base de dados
Intervalo de ano de publicação
1.
Sensors (Basel) ; 23(18)2023 Sep 11.
Artigo em Inglês | MEDLINE | ID: mdl-37765857

RESUMO

The Internet of Things (IoT) is an advanced technology that comprises numerous devices with carrying sensors to collect, send, and receive data. Due to its vast popularity and efficiency, it is employed in collecting crucial data for the health sector. As the sensors generate huge amounts of data, it is better for the data to be aggregated before being transmitting the data further. These sensors generate redundant data frequently and transmit the same values again and again unless there is no variation in the data. The base scheme has no mechanism to comprehend duplicate data. This problem has a negative effect on the performance of heterogeneous networks.It increases energy consumption; and requires high control overhead, and additional transmission slots are required to send data. To address the above-mentioned challenges posed by duplicate data in the IoT-based health sector, this paper presents a fuzzy data aggregation system (FDAS) that aggregates data proficiently and reduces the same range of normal data sizes to increase network performance and decrease energy consumption. The appropriate parent node is selected by implementing fuzzy logic, considering important input parameters that are crucial from the parent node selection perspective and share Boolean digit 0 for the redundant values to store in a repository for future use. This increases the network lifespan by reducing the energy consumption of sensors in heterogeneous environments. Therefore, when the complexity of the environment surges, the efficiency of FDAS remains stable. The performance of the proposed scheme has been validated using the network simulator and compared with base schemes. According to the findings, the proposed technique (FDAS) dominates in terms of reducing energy consumption in both phases, achieves better aggregation, reduces control overhead, and requires the fewest transmission slots.

2.
Sensors (Basel) ; 20(5)2020 Feb 29.
Artigo em Inglês | MEDLINE | ID: mdl-32121470

RESUMO

Cyber-physical systems (CPS) are composed of software and hardware components. Many such systems (e.g., IoT based systems) are created by composing existing systems together. Some of these systems are of critical nature, e.g., emergency or disaster management systems. In general, component-based development (CBD) is a useful approach for constructing systems by composing pre-built and tested components. However, for critical systems, a development method must provide ways to verify the partial system at different stages of the construction process. In this paper, for system architectures, we propose two styles: rigid architecture and flexible architecture. A system architecture composed of independent components by coordinating exogenous connectors is in flexible architecture style category. For CBD of critical systems, we select EX-MAN from flexible architecture style category. Moreover, we define incremental composition mechanism for this model to construct critical systems from a set of system requirements. Incremental composition is defined to offer preservation of system behaviour and correctness of partial architecture at each incremental step. To evaluate our proposed approach, a case study of weather monitoring system (part of a disaster management) system was built using our EX-MAN tool.

3.
J Med Syst ; 43(11): 324, 2019 Oct 16.
Artigo em Inglês | MEDLINE | ID: mdl-31620895

RESUMO

Real-time and ubiquitous patient monitoring demands the use of wireless data acquisition through resource constrained medical sensors, mostly configured with No-input No-output (NiNo) capabilities. Bluetooth is one of the most popular and widely adopted means of communicating this sensed information to a mobile terminal. However, over simplified implementations of Bluetooth low energy (BLE) protocol in eHealth sector is susceptible to several wireless attacks, in particular the Man-in-the-Middle (MITM) attack. The issue arises due to a lack of mutual authentication and integrity protection between the communicating devices, which may lead to compromise of confidentiality, availability and even the integrity of this safety-critical information. This research paper presents a novel framework named MARC to detect, analyze, and mitigate Bluetooth security flaws while focusing upon MITM attack against NiNo devices. For this purpose, a comprehensive solution has been proposed, which can detect MITM signatures based upon four novel anomaly detection metrics: analyzing Malicious scan requests, Advertisement intervals, RSSI levels, and Cloned node addresses. The proposed solution has been evaluated through practical implementation and demonstration of different attack scenarios, which show promising results concerning accurate and efficient detection of MITM attacks.


Assuntos
Redes de Comunicação de Computadores/organização & administração , Segurança Computacional/normas , Telemedicina/organização & administração , Tecnologia sem Fio/organização & administração , Redes de Comunicação de Computadores/normas , Confidencialidade/normas , Humanos , Telemedicina/normas , Tecnologia sem Fio/normas
4.
Forensic Sci Int ; 299: 59-73, 2019 Jun.
Artigo em Inglês | MEDLINE | ID: mdl-30959401

RESUMO

Web browsers are among the most commonly used applications to access the web from any platform nowadays. With recent digital incidents involving breach of data, users are becoming more cognizant of the threat posed by malicious actors having access to personal data as well as vulnerable applications which may compromise their data. For this very reason, users are being offered privacy preserving solutions for trust maturity. The onion router (Tor) browser is one such application which not only ensures the privacy preservation goals but also provides promising anonymity. Due to this feature, majority of the users use Tor browser for normal use as well as malign activities. In order to validate the claims of Tor browser and help digital forensic investigators and researchers, we created different scenarios to forensically analyze the Tor browser privacy and anonymity. As a result of the findings, it can be concluded that the Tor browser leaves plethora of sensitive digital artifacts on host machine, which can be further used to compromise user data.


Assuntos
Ciências Forenses/métodos , Navegador , Artefatos , Anonimização de Dados , Humanos , Internet , Privacidade
5.
J Nanosci Nanotechnol ; 15(10): 7564-8, 2015 Oct.
Artigo em Inglês | MEDLINE | ID: mdl-26726372

RESUMO

To investigate the nature of the switching phenomenon at the metal-tantalum oxide interface, we fabricated a memory device in which a tantalum oxide amorphous layer acted as a switching medium. Different metals were deposited on top of the tantalum oxide layer to ensure that they will react with some of the oxygen contents already present in the amorphous layer of the tantalum oxide. This will cause the formation of metal oxide (MOx) at the interface. Two devices with Ti and Cu as the top electrodes were fabricated for this purpose. Both devices showed bipolar switching characteristics. The SET and RESET voltages for the Ti top electrode device were ~+1.7 V and ~-2 V, respectively, whereas the SET and RESET voltages for the Cu top electrode device were ~+0.9 V and ~-0.9 V, respectively. In the high-resistance state (HRS) conduction, the mechanisms involved in the devices with Ti and Cu top electrodes were space-charge limited conduction (SCLC) and ohmic, respectively. On the other hand, in the low-resistance state (LRS), the Ti top electrode device undergoes SCLC at a high voltage and ohmic conduction at a low voltage, and the Cu top electrode again undergoes ohmic conduction. From the consecutive sweep cycles, it was observed that the SET voltage gradually decreased with the sweeps for the Cu top electrode device, whereas for the Ti top electrode device, the set voltage did not vary with the sweeps.

SELEÇÃO DE REFERÊNCIAS
DETALHE DA PESQUISA
...