Search results

1 – 5 of 5
Article
Publication date: 25 June 2024

Amruta Chandrakant Amune and Himangi Pande

Security is the major issue that motivates multiple scholars to discover security solutions apart from the advantages of wireless sensor networks (WSN) such as strong…

Abstract

Purpose

Security is the major issue that motivates multiple scholars to discover security solutions apart from the advantages of wireless sensor networks (WSN) such as strong compatibility, flexible communication and low cost. However, there exist a few challenges, such as the complexity of choosing the expected cluster, communication overhead, routing selection and the energy level that affects the entire communication. The ultimate aim of the research is to secure data communication in WSN using prairie indica optimization.

Design/methodology/approach

Initially, the network simulator sets up clusters of sensor nodes. The simulator then selects the Cluster Head and optimizes routing using an advanced Prairie Indica Optimization algorithm to find the most efficient communication paths. Sensor nodes collect data, which is securely transmitted to the base station. By applying prairie indica optimization to WSNs, optimize key aspects of data communication, including secure routing and encryption, to protect sensitive information from potential threats.

Findings

The Prairie Indica Optimization, as proposed, achieves impressive results for networks comprising 50 nodes, with delay, energy and throughput values of 77.39 ms, 21.68 J and 22.59 bps. In the case of 100-node networks, the achieved values are 80.95 ms, 27.74 J and 22.03 bps, significantly surpassing the performance of current techniques. These outcomes underscore the substantial improvements brought about by the Prairie Indica Optimization in enhancing WSN data communication.

Originality/value

In this research, the Prairie Indica Optimization is designed to enhance the security of data communication within WSN.

Details

International Journal of Intelligent Unmanned Systems, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2049-6427

Keywords

Open Access
Article
Publication date: 31 July 2020

Ado Adamou Abba Ari, Olga Kengni Ngangmo, Chafiq Titouna, Ousmane Thiare, Kolyang, Alidou Mohamadou and Abdelhak Mourad Gueroui

The Cloud of Things (IoT) that refers to the integration of the Cloud Computing (CC) and the Internet of Things (IoT), has dramatically changed the way treatments are done in the…

8590

Abstract

The Cloud of Things (IoT) that refers to the integration of the Cloud Computing (CC) and the Internet of Things (IoT), has dramatically changed the way treatments are done in the ubiquitous computing world. This integration has become imperative because the important amount of data generated by IoT devices needs the CC as a storage and processing infrastructure. Unfortunately, security issues in CoT remain more critical since users and IoT devices continue to share computing as well as networking resources remotely. Moreover, preserving data privacy in such an environment is also a critical concern. Therefore, the CoT is continuously growing up security and privacy issues. This paper focused on security and privacy considerations by analyzing some potential challenges and risks that need to be resolved. To achieve that, the CoT architecture and existing applications have been investigated. Furthermore, a number of security as well as privacy concerns and issues as well as open challenges, are discussed in this work.

Details

Applied Computing and Informatics, vol. 20 no. 1/2
Type: Research Article
ISSN: 2634-1964

Keywords

Article
Publication date: 21 July 2023

Serap Ergün

The purpose of this study is to propose a decentralized multi-party cross-trading scheme based on a certificate transaction mechanism for the transaction of excess consumption…

Abstract

Purpose

The purpose of this study is to propose a decentralized multi-party cross-trading scheme based on a certificate transaction mechanism for the transaction of excess consumption certificates (ECCs) of renewable energy. The aim is to address the problems associated with the existing centralized transaction mode and to promote the development of the green electricity industry.

Design/methodology/approach

The proposed scheme involves calculating the quotation difference for the same type of certificate transaction based on the quotations of all users of both buyers and sellers. The transaction volume is then determined based on the order of quotation difference from large to small, and the total interests of cooperation are calculated. The nucleolus method is adopted to allocate the total interests to each member of the alliance and calculate the final transaction price. The blockchain technology is used for the transaction to achieve accurate traceability and efficient supervision, and a corresponding smart contract is designed and simulated in the Ethereum consortium chain.

Findings

The results of the simulation show the rationality and effectiveness of the proposed scheme. The decentralized multi-party cross-trading scheme can overcome the problems associated with the existing centralized transaction mode, such as low transaction efficiency, difficulty in obtaining the optimal transaction strategy and efficient supervision. The proposed scheme can promote the development of the green electricity industry by stimulating users' demand potential for green electricity.

Originality/value

The proposed scheme is original in its use of a certificate transaction mechanism to facilitate the trading of ECCs of renewable energy. The scheme adopts a decentralized multi-party cross-trading approach that overcomes the problems associated with the existing centralized transaction mode. The use of the nucleolus method for the allocation of total interests to each member of the alliance is also original. Finally, the use of blockchain technology for accurate traceability and efficient supervision of the transaction is an original contribution to the field.

Article
Publication date: 7 May 2024

Swathi Pennapareddy, Ramprasad Srinivasan and Natarajan K.

Automatic dependent surveillance-broadcast (ADS-B) is the foundational technology of the next generation air transportation system defined by Federal Aviation Authority and is one…

Abstract

Purpose

Automatic dependent surveillance-broadcast (ADS-B) is the foundational technology of the next generation air transportation system defined by Federal Aviation Authority and is one of the most precise ways for tracking aircraft position. ADS-B is intended to provide greater situational awareness to the pilots by displaying the traffic information like aircraft ID, altitude, speed and other critical parameters on the Cockpit Display of Traffic Information displays in the cockpit. Unfortunately, due to the initial proposed nature of ADS-B protocol, it is neither encrypted nor has any other innate security mechanisms, which makes it an easy target for malicious attacks. The system is vulnerable to various active and passive attacks like message ingestion, message deletion, eavesdropping, jamming, etc., which has become an area of concern for the aviation industry. The purpose of this study is to propose a method based on modified advanced encryption standard (AES) algorithm to secure the ADS=B messages and increase the integrity of ADS-B data transmissions.

Design/methodology/approach

Though there are various cryptographic and non-cryptographic methods proposed to secure ADS-B data transmissions, it is evident that most of these systems have limitations in terms of cost, implementation or feasibility. The new proposed method implements AES encryption techniques on the ADS-B data on the sender side and correlated decryption mechanism at the receiver end. The system is designed based on the flight schedule data available from any flight planning systems and implementing the AES algorithm on the ADS-B data from each aircraft in the flight schedule.

Findings

The suitable hardware was developed using Raspberry pi, ESP32 and Ra-02. Several runs were done to verify the original message, transmitted data and received data. During transmission, encryption algorithm was being developed, which has got very high secured transmission, and during the reception, the data was secured. Field test was conducted to validate the transmission and quality. Several trials were done to validate the transmission process. The authors have successfully shown that the ADS-B data can be encrypted using AES algorithm. The authors are successful in transmitting and receiving the ADS-B data packet using the discussed hardware and software methodology. One major advantage of using the proposed solution is that the information received is encrypted, and the receiver ADS-B system can decrypt the messages on the receiving end. This clearly proves that when the data is received by an unknown receiver, the messages cannot be decrypted, as the receiver is not capable of decrypting the AES-authenticated messages transmitted by the authenticated source. Also, AES encryption is highly unlikely to be decrypted if the encryption key and the associated decryption key are not known.

Research limitations/implications

Implementation of the developed solution in actual onboard avionics systems is not within the scope of this research. Hence, assessing in the real-time distances is not covered.

Social implications

The authors propose to extend this as a software solution to the onboard avionics systems by considering the required architectural changes. This solution can also bring in positive results for unmanned air vehicles in addition to the commercial aircrafts. Enhancement of security to the key operational and navigation data elements is going to be invaluable for future air traffic management and saving lives of people.

Originality/value

The proposed solution has been practically implemented by developing the hardware and software as part of this research. This has been clearly brought out in the paper. The implementation has been tested using the actual ADS-B data/messages received from using the ADS-B receiver. The solution works perfectly, and this brings immense value to the aircraft-to-aircraft and aircraft-to-ground communications, specifically while using ADS-B data for communicating the position information. With the proposed architecture and minor software updates to the onboard avionics, this solution can enhance safety of flights.

Details

Aircraft Engineering and Aerospace Technology, vol. 96 no. 7
Type: Research Article
ISSN: 1748-8842

Keywords

Article
Publication date: 12 June 2023

Mark Anthony Camilleri

Many educators are increasingly acquainting themselves and becoming adept with interactive technologies like augmented reality and virtual reality. Some of them are also looking…

Abstract

Purpose

Many educators are increasingly acquainting themselves and becoming adept with interactive technologies like augmented reality and virtual reality. Some of them are also looking forward to using Metaverse applications, as they want to benefit from its immersive three-dimensional capabilities. Therefore, the purpose of this study is to critically review the extant literature to investigate how, why, where and when the Metaverse can be used for educational purposes. This study also discusses opportunities, challenges and risks related to this disruptive technology.

Design/methodology/approach

A Preferred Reporting Items for Systematic Reviews and Meta-Analyses rigorous protocol is used to search, extract, scrutinize and synthesize content from high-impact articles focused on the use of the Metaverse technology in the realms of education. Afterwards, this study theorizes on the costs and benefits of using this interactive technology with students.

Findings

A number of researchers are already experimenting with virtual technologies that are very similar to the Metaverse, in different contexts. This research indicates that most students are lured by immersive multi-sensory three-dimensional environments as well as by virtual reality applications that could simulate real-life situations and provide engaging experiences with virtual representations of people, places and objects. On the other hand, this study reveals that educators ought to consider the potential pitfalls of the Metaverse, including privacy breaches and security risks, as well as possible addictions and the development of mental health issues, among others.

Practical implications

Students and educators can use the Metaverse to catapult themselves in a simulated digital universe that could reconfigure their sensory inputs, definitions of space, time and points of access to information. This research calls for the development of regulatory instruments, including sound principles, guidelines and procedures that are intended to safeguard and protect Metaverse users.

Originality/value

This contribution implies that there is scope for educators to continue developing the Metaverse’s virtual spaces to improve their students’ motivations, aptitudes and learning outcomes. This study clarifies that the use of the Metaverse in education can create infinite possibilities to enhance their knowledge, competences and abilities through its immersive applications. Yet this paper also raises awareness about possible challenges in the short term as well on other risks associated to the prolonged use of this captivating technology.

Details

Interactive Technology and Smart Education, vol. 21 no. 2
Type: Research Article
ISSN: 1741-5659

Keywords

1 – 5 of 5