386 research outputs found
Personal data broker instead of blockchain for students’ data privacy assurance
Data logs about learning activities are being recorded at a growing pace due to the adoption and evolution of educational technologies (Edtech). Data analytics has entered the field of education under the name of learning analytics. Data analytics can provide insights that can be used to enhance learning activities for educational stakeholders, as well as helping online learning applications providers to enhance their services. However, despite the goodwill in the use of Edtech, some service providers use it as a means to collect private data about the students for their own interests and benefits. This is
showcased in recent cases seen in media of bad use of students’ personal information. This growth in cases is due to the recent tightening in data privacy regulations, especially in the EU. The students or their parents should be the owners of the information about them and their learning activities online. Thus they should have the right tools to control how their information is accessed and for what purposes. Currently, there is no technological solution to prevent leaks or the misuse of data about the students or their activity. It seems appropriate to try to solve it from an automation technology perspective. In this paper, we consider the use of Blockchain technologies as a possible basis for a solution to this problem. Our analysis indicates that the Blockchain is not a suitable solution. Finally, we propose a cloud-based solution with a central personal point of management that we have called Personal Data Broker.Peer ReviewedPostprint (author's final draft
PAWN: a payload-based mutual authentication scheme for wireless sensor networks
Copyright © 2016 John Wiley & Sons, Ltd. Wireless sensor networks (WSNs) consist of resource-starving miniature sensor nodes deployed in a remote and hostile environment. These networks operate on small batteries for days, months, and even years depending on the requirements of monitored applications. The battery-powered operation and inaccessible human terrains make it practically infeasible to recharge the nodes unless some energy-scavenging techniques are used. These networks experience threats at various layers and, as such, are vulnerable to a wide range of attacks. The resource-constrained nature of sensor nodes, inaccessible human terrains, and error-prone communication links make it obligatory to design lightweight but robust and secured schemes for these networks. In view of these limitations, we aim to design an extremely lightweight payload-based mutual authentication scheme for a cluster-based hierarchical WSN. The proposed scheme, also known as payload-based mutual authentication for WSNs, operates in 2 steps. First, an optimal percentage of cluster heads is elected, authenticated, and allowed to communicate with neighboring nodes. Second, each cluster head, in a role of server, authenticates the nearby nodes for cluster formation. We validate our proposed scheme using various simulation metrics that outperform the existing schemes
PAAL : a framework based on authentication, aggregation, and local differential privacy for internet of multimedia things
Internet of Multimedia Things (IoMT) applications generate huge volumes of multimedia data that are uploaded to cloud servers for storage and processing. During the uploading process, the IoMT applications face three major challenges, i.e., node management, privacy-preserving, and network protection. In this article, we propose a multilayer framework (PAAL) based on a multilevel edge computing architecture to manage end and edge devices, preserve the privacy of end-devices and data, and protect the underlying network from external attacks. The proposed framework has three layers. In the first layer, the underlying network is partitioned into multiple clusters to manage end-devices and level-one edge devices (LOEDs). In the second layer, the LOEDs apply an efficient aggregation technique to reduce the volumes of generated data and preserve the privacy of end-devices. The privacy of sensitive information in aggregated data is protected through a local differential privacy-based technique. In the last layer, the mobile sinks are registered with a level-two edge device via a handshaking mechanism to protect the underlying network from external threats. Experimental results show that the proposed framework performs better as compared to existing frameworks in terms of managing the nodes, preserving the privacy of end-devices and sensitive information, and protecting the underlying network. © 2014 IEEE
Blockchain and Federated Learning-enabled Distributed Secure and Privacy-preserving Computing Architecture for IoT Network
Postprin
An Overview of Security Challenges in Vehicular Ad-Hoc Networks
© 2017 IEEE. Vehicular Ad hoc Networks (VANET) is emerging as a promising technology of the Intelligent Transportation systems (ITS) due to its potential benefits for travel planning, notifying road hazards, cautioning of emergency scenarios, alleviating congestion, provisioning parking facilities and environmental predicaments. But, the security threats hinder its wide deployment and acceptability by users. This paper gives an overview of the security threats at the various layers of the VANET communication stack and discuss some of the existing solutions, thus concluding why designing a security framework for VANET needs to consider these threats for overcoming security challenges in VANET
Secure data collection and critical data transmission technique in mobile sink wireless sensor networks
In Mobile sink wireless sensor networks (MSWSN) Sensor nodes are low cost tiny devices with limited storage,computational capability and power except the sink node. Mobile sink has no resource limitation. It has wide range of application in the real world problem like military and civilian domain etc. The nodes in the network are unattended and unprotected so energy efficient and security are two major issues of sensor network. The sensors have limited battery power and low computational capability, requires a security mechanism that must be energy efficient. In this proposed system model mobile sink traverse the network to collect the data. Here we proposed energy efficient secure data collection techniques with mobile sink wireless sensor networks based on symmetric key cryptography. In proposed data collection technique mobile sink traverse network and collect data from one hop neighbors. Proposed cryptosystem is time based as after each fixed amount of time sink generates a large prime number. Using the prime number all nodes in the network update their key to avoid replay attack keep. Data collection MSWSN is three step process. At each new position mobile sink broadcast a beacon frame to alert the static sensors about its presence, secondly sensors send their sensed data towards sink node and finaly mobile sink broad cast another beacon frame to stop the data transmission by sensors. Sensor authenticate the mobile sink with the shared key concept, if it finds that sink is the legitimate node then sensor encrypt their data and transmit it to the sink. A static sensor sense some critical information and sink is not within its range, that that time sensor needs to transmit its data towards sink immediately. It cannot wait till sink come to its range. For that we proved an existing protocol Sensor Protocol for Information via Negation (SPIN) is efficient for critical data transmission to the mobile sink. Then we make it as the secured protocol by using symmetric key cryptography. Here we use the previous assumption to make it as the secure protocol. All the simulation has been carried out with NS 2.34. This thesis is supported bythe literature survey in the area of Mobile Sink Wireless Sensor Networks to make it complete
Design and Discovery of Sensor Web Registry Services for Wireless Sensor Network with x-SOA Approach
The application of wireless sensor network is emerging as a new trend in different sphere of modern society. However due to the advancement of SWE, designing & discovering sensor web registry services throughout heterogeneous environments is becoming a challenging task and raises several concerns like performance, reliability, and robustness. Many approaches and frameworks have been proposed to discover the sensor web registry services. Some of the approaches assume that the requests are placed in SOAP compatible formats while others focus on GUI based parametric query processing. We have formulated an approach that uses the Natural Language Query Processing which is a convenient and easy method of data access, especially for casual users who do not understand complicated database query languages such as SQL or XML based Query Language like XQuery and XPath. SOA is the proven technology for designing an efficient Sensor Web Registry by describing various parameters and sensor web services needed. We also propose an architecture based on x-SOA that organizes the method of sensor web registry service discovery in an efficient and structured manner using an intermediary, requester friendly layer called the Request Parser & Query Generator (RPQ) between the service provider and service requester via a service registry. We describe how RPQ facilitates the processing of plain text request query to a most appropriate sensor web service and also an algorithm with implementation for a complete cycle of sensor web registry service discovery
- …
