Blockchain leveraged task migration in body area sensor networks
- Authors: Uddin, Ashraf , Stranieri, Andrew , Gondal, Iqbal , Balasubramanian, Venki
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 25th Asia-Pacific Conference on Communications, APCC 2019 p. 177-184
- Full Text:
- Reviewed:
- Description: Blockchain technologies emerging for healthcare support secure health data sharing with greater interoperability among different heterogeneous systems. However, the collection and storage of data generated from Body Area Sensor Net-works(BASN) for migration to high processing power computing services requires an efficient BASN architecture. We present a decentralized BASN architecture that involves devices at three levels; 1) Body Area Sensor Network-medical sensors typically on or in patient's body transmitting data to a Smartphone, 2) Fog/Edge, and 3) Cloud. We propose that a Patient Agent(PA) replicated on the Smartphone, Fog and Cloud servers processes medical data and execute a task offloading algorithm by leveraging a Blockchain. Performance analysis is conducted to demonstrate the feasibility of the proposed Blockchain leveraged, distributed Patient Agent controlled BASN. © 2019 IEEE.
- Description: E1
Measuring trustworthiness of IoT image sensor data using other sensors' complementary multimodal data
- Authors: Islam, Mohammad , Karmakar, Gour , Kamruzzaman, Joarder , Murshed, Manzur
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering, TrustCom/BigDataSE 2019 p. 775-780
- Full Text: false
- Reviewed:
- Description: Trust of image sensor data is becoming increasingly important as the Internet of Things (IoT) applications grow from home appliances to surveillance. Up to our knowledge, there exists only one work in literature that estimates trustworthiness of digital images applied to forensic applications, based on a machine learning technique. The efficacy of this technique is heavily dependent on availability of an appropriate training set and adequate variation of IoT sensor data with noise, interference and environmental condition, but availability of such data cannot be assured always. Therefore, to overcome this limitation, a robust method capable of estimating trustworthy measure with high accuracy is needed. Lowering cost of sensors allow many IoT applications to use multiple types of sensors to observe the same event. In such cases, complementary multimodal data of one sensor can be exploited to measure trust level of another sensor data. In this paper, for the first time, we introduce a completely new approach to estimate the trustworthiness of an image sensor data using another sensor's numerical data. We develop a theoretical model using the Dempster-Shafer theory (DST) framework. The efficacy of the proposed model in estimating trust level of an image sensor data is analyzed by observing a fire event using IoT image and temperature sensor data in a residential setup under different scenarios. The proposed model produces highly accurate trust level in all scenarios with authentic and forged image data. © 2019 IEEE.
- Description: E1
Cyber attacks in mechatronics systems based on Internet of Things
- Authors: Chowdhury, Abdullahi
- Date: 2017
- Type: Text , Conference proceedings , Conference paper
- Relation: 2017 IEEE International Conference on Mechatronics, ICM 2017; Gippsland, Victoria; 13th-15th February 2017 p. 476-481
- Full Text: false
- Reviewed:
- Description: Internet of things (IoT) systems are becoming multidisciplinary day by day and integrating more and more mechanical, electrical, electronics, control and information disciplines. This integration is making mechatronics systems based on IoT easily available for public uses. Government organisations, different industries, healthcare systems and individual users are using these systems to store different kind of public, private, confidential and classified information. This is attracting cyber attackers to make cyber and cyber physical attacks to these systems. Currently, security policy researchers of both industries and academic institutes are analysing existing cyber attacks and are developing different types of techniques to protect the systems against potential cyber-threats and cyber attacks. This paper analyses the increasing exploitation of IoT based mechatronics system, which has created more opportunities for the current cybercrimes. Contemporary and important mitigation approaches for cyber-crimes have also been articulated in this paper. © 2017 IEEE.
- Description: Proceedings - 2017 IEEE International Conference on Mechatronics, ICM 2017