The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The use of big data for cyber-physical systems (CPS) is gaining more importance due to the ever-increasing amount of collectable data. Due to the decreasing cost of sensors and the growth of embedded systems, which are increasingly used in the industries as well as in the private sectors, new methods are needed to evaluate and process the collected data. Therefore, in this paper we proposed a framework...
The explosive proliferation of smart devices and cloud computing has ushered the era of Cyberphysical Systems (CPS), a congruence of physical dynamical systems with the cyberspace. The success of deploying an Internet of Things (IoT) interconnecting billions of devices relies heavily upon making the right choices in revisiting traditional architectures for networked control and information processing...
With the enhanced computing capabilities and a wide variety of functions available on smartphones, critical and sensitive information, such as contact lists, messages, schedules, credit card numbers, is stored on smartphones, which makes preventing smartphone from being stolen of an unprecedented importance. Loss of smartphones not only causes economic loss but also jeopardizes the privacy of the...
As an emerging cross-disciplinary research area, Cyber Physical Systems (CPS) are attracting considerable attention worldwide. It is an essential but challenging requirement to offer secure and trustworthy real-time feedback to CPS users using spectrum sharing wireless networks. This requirement can be satisfied by collaborative spectrum sensing technology in Cognitive radio networks (CRN). Despite...
Cloud computing and big data analysis are gaining lots of interest across a range of applications including disaster management. These two technologies together provide the capability of real-time data analysis not only to detect emergencies in disaster areas, but also to rescue the affected people. This paper presents a framework that supports emergency event detection and alert generation by analyzing...
Real-time monitoring of physiological data can reduce the likelihood of injury in noncombat military personnel and first-responders. MIT Lincoln Laboratory is developing a tactical Real-Time Physiological Status Monitoring (RT-PSM) system architecture and reference implementation named OBAN (Open Body Area Network), the purpose of which is to provide an open, government-owned framework for integrating...
Cloud computing is gaining more and more popularity due to the wide use of the Internet. It can now be integrated into vehicle applications to enhance mobility, preventing accidents, improve safety, and improve driving comfort. In this paper, we propose a secure architecture of inter-vehicle communication which is obtained from a cloud services, including architecture level, communication level and...
Internet of Things (IoT) is the connection of the physical world to the Internet. It is fast emerging as the sustainable solution for providing access to affordable and clean energy all around the world. The utilities with IoT can have real-time feedback capabilities to better understand the customer needs and therefore make intelligent decisions to improve their service experience. With IoT, the...
Cyber-Physical Systems require the development of security models at cloud interacting with physical systems. The current research discusses the security requirements in the future engineering systems includes the state of security in cloud cyber-physical systems, and a security model in sensor networks in relation to cyber-physical systems. In addition, we develop a model to transfer the packets...
Security & Dependability (SEC&DEP) monitoring has definitely become a number one priority, since it is understood that it is the pre-requisite for allowing system operation to continue also in the presence of faults and/or attacks. Since effective remediation requires that the right actions be taken at the right time, in order for SEC&DEP monitoring to be really useful, the results of...
Cyber-Physical Systems (CPS) covers from M2M and Internet of Things (IoT) communications, heterogeneous data integration from multiple sources, security / privacy and its integration into the cloud computing and Big Data platforms. The integration of Big Data into CPS solutions presents several challenges and opportunities. Big Data for CPS is not suitable with conventional solutions based on offline...
There is usually a tradeoff between security strength and computing power in a real time health monitoring system. In this paper, we firstly investigated the performance of several cryptographic protocols for different data sizes applied on the system in different network condition, and then presented a security protocol adaption scheme allowing to automatically change the encryption algorithm to...
This paper presents a networking platform which provides real-time monitoring and rule-based control of transport fleets and transferred goods. Special emphasis is given in providing tools and services to fleet administrators, which, among others, comprise an object oriented rule detection mechanism based on the occurrence of predefined events which are fully configurable and are considered important...
Information Security Risk Assessment is a means of providing decision-makers with information needed to understand the vulnerabilities and threats factors that can negatively influence operations and outcomes and make informed judgments concerning the extent of actions needed to reduce risk. The first is to improve the parameter learning algorithm of CTHMMs. We compare it to the previous using the...
As wireless sensor networks (WSNs) are being developed for a wide range of application fields of real-time monitoring and control, a design overview seems important so as to investigate alternative communication aspects while treating the WSN as a whole system. As applications become more demanding the need to consider also deployment constraints and application particularities on top of the commonly...
Signature based network intrusion detection systems (NIDSs) often report a massive number of elementary alerts of low-level security-related events which are logically involved in a single multi-stage attack. Since be overwhelmed by these alerts, security administrators almost unable to discover complicated multistage attack in time. It is necessary to develop a real-time system to extracting useful...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.