No abstract available.
NeuroMesh: IoT Security Enabled by a Blockchain Powered Botnet Vaccine
Internet-of-Things (IoT) devices are ubiquitous and growing rapidly in number. However, IoT manufacturers have focused on the functionality and features of the devices and made security an afterthought. Since IoT devices have small memory capacities and ...
Leveraging User Mobility and Mobile App Services Behavior for Optimal Edge Resource Utilization
Edge computing has seen a great progress nowadays eliminating the network latency risks by placing data and functionality in low-end devices closer to the end user is central in application domains such as the support of the backend of mobile apps. When ...
Under Sampling Bagging Shapelet Transformation for Hydraulic System
In order to preserve the prediction of machine defects, fault conditions and normal conditions must be classified from time series data collected in real time from various sensors. For predictive maintenance of machine defects, fault conditions and ...
The 51 V's Of Big Data: Survey, Technologies, Characteristics, Opportunities, Issues and Challenges
Currently Big Data is the biggest buzzword, and definitely, we believe that Big Data is changing the world. Some researchers say Big Data will be even bigger buzzword than the Internet. With fast-growing computing resources, information and knowledge a ...
Dynamic Constraints for Mixed-Criticality Systems
We define quality of service requirements for mixed-criticality systems based on min-plus algebra rather than discrete criticality levels. The requirements (1) unify a spectrum of weakly-hard real-time requirements with strongly-hard real-time and soft ...
Security and Safety Co-Engineering of the FlexRay Bus in Vehicular Networks
Recently, researchers have demonstrated how the lack of security features in road vehicles may allow adversaries to take over partial or even full control. Specifically, in-vehicle communication protocols are prone to attacks, because no security ...
Representation learning for social networks using Homophily based Latent Space Model
Representing data in the form of a graph (network) is becoming an increasingly common approach for modelling complex systems. Graph representation models have thus emerged as a unified vocabulary across scientific domains. The advantage of graphs for ...
A Design Flow Framework for Fully-Connected Neural Networks Rapid Prototyping
The current work deploys a framework for rapid prototyping of Fully-Connected Neural Networks (FCNs). The scope is to provide an automatic design flow that generates a template-based VHDL code considering the accuracy, the resource utilization and the ...
Bitcoin Payment-Channels for Resource Limited IoT Devices
Resource-constrained devices are unable to maintain a full copy of the Bitcoin Blockchain in memory. This paper proposes a bidirectional payment channel framework for IoT devices. This framework utilizes Bitcoin Lightning-Network-like payment channels ...
Enhanced Data Transmission Platform in Smart Farms
The Internet of Things (IoT) is an emerging technology that incentivizes industry, agriculture and academia to develop smart platforms. One of the areas where IoT is being developed is in smart farms. IoT in agricultural systems helps farmers collect ...
IoT-based Urban Noise Identification Using Machine Learning: Performance of SVM, KNN, Bagging, and Random Forest
Noise is any undesired environmental sound. A sound at the same dB level may be perceived as annoying noise or as pleasant music. Therefore, it is necessary to go beyond the state-of-the-art approaches that measure only the dB level and also identify ...
Analysis of Performance and Energy Consumption of Wearable Devices and Mobile Gateways in IoT Applications
Smartphones and wearable devices, such as smart watches, can act as mobile gateways and sensor nodes in IoT applications, respectively. In conventional IoT systems, wearable devices gather and transmit data to mobile gateways where most of computations ...
Cloud Security Distributary Set (CSDS): A Policy-Based Framework to Define Multi-Level Security Structure in Clouds
Security challenges are the most important obstacles for the advancement of IT-based on-demand services and cloud computing as an emerging technology. In this paper, a structural policy management engine has been introduced to enhance the reliability of ...
Experimental Evaluation of Scenario Aware Synchronous Data Flow based Power Management
In all modern computer systems power consumption and thermal management is a major concern to control battery life and ageing to guarantee system availability. In such systems, a power manager changes the hardware component parameters at runtime to ...
A Design-flow for implementing, validating and evaluating Machine-learning Classifiers on FPGAs
The emergence of artificial intelligence (AI) applications have shown great benefits in saving costs and at the same time in executing efficiently many of our daily life tasks. Yet the application of AI in the safety-critical embedded systems domain is ...
Hardware Acceleration of Image Registration Algorithm on FPGA-based Systems on Chip
- Ioannis Stratakos,
- Dimitrios Gourounas,
- Vasileios Tsoutsouras,
- Theodore Economopoulos,
- George Matsopoulos,
- Dimitrios Soudris
Image processing algorithms are dominating contemporary digital systems due to their importance and adoption by a large number of application domains. Despite their significance, their computational requirements often limit their usage, especially in ...
A Quality Attribute-based Evaluation of Time-series Databases for Edge-centric Architectures
Edge computing is unlocking the potential of Industrial Internet of Things (IIoT) to deliver business value and impact. Reliable data processing and guarantee of services within the IIoT sphere mandates the use of local storage within the device. The ...
SAFEPOWER: Application of Power Management Techniques in SoCs for Safety-Relevant Systems
With the ever increasing industrial demand for bigger, faster and more efficient systems, a growing number of cores is integrated on a single chip. Additionally, their performance is further maximized by simultaneously executing as many processes as ...
Workload-aware Management Targeting Multi-Gateway Internet-of-Things
Edge Computing has risen as a new promising computing paradigm, that relies on connected devices to communicate and exchange data closer to the end-user. Specifically, gateways are a critical component as they receive requests from multiple edge devices ...
An Implemented Open Source Blockchain Market for Smart Grids and Microgrids Using Autonomous Agents
This article presents a system for creating an implemented open energy market for future smart grid systems, microgrids, the Internet of Things, and the Industrial Internet of Things. We also investigate and analyze different aspects of blockchain ...
Differentiating Attacks and Faults in Energy Aware Smart Home System using Supervised Machine Learning
The topics of fault diagnosis and security attack diagnosis in Cyber Physical Systems (CPS) have been studied extensively in a stand-alone manner. However, considering the co-existence of both of these sources of abnormality in a system, and being able ...
Metis: Optimal Task Allocation Framework for the Edge/Hub/Cloud Paradigm
Increased demands for real-time decision support and data analytics facilitate the need of performing significant computing away from the cloud and onto the IoT devices. In this paper, we propose Metis, a mathematical programming based framework, able ...
Towards Collaborative Machine Learning Driven Healthcare Internet of Things
The relationship between technology and healthcare due to the rise of Intelligent Internet of Things (IoT) and the rapid public embracement of medical-grade wearables has been dramatically transformed in the past few years. Powered by IoT, technology ...
Towards Distributed Runtime Monitoring with C++ Contracts
Design by Contract supports the specification of the intended behavior of a software component at its interfaces. Out of these specifications, runtime monitors can be generated. While those runtime monitors check the correct behavior of the software ...
Assessment of Model-based Methodologies to Architect Cyber-Physical Systems
The steady progression of the digital transformation within all business sectors and society thrive the importance of Cyber-Physical Systems (CPSs), whereas their areas of application grow and expand to an unmanageable amount. Since the model-based ...
Blockchain-based Smart-IoT Trust Zone Measurement Architecture
With a rapid growth in the IT industry, Internet of Things (IoT) has gained a tremendous attention and become a central aspect of our environment. In IoT the things (devices) communicate and exchange the data without the act of human intervention. Such ...
Decentralized Directed acyclic graph based DLT Network
In this paper, we analyse the foundations of Blockchain and DAG Directed acyclic graph its evolution and the tangle, DAG try to solve the most issues in blockchain and make a system that stable for Internet-of Things (IOT) industry. In addition, to ...
Securing Over-The-Air IoT Firmware Updates using Blockchain
Over-the-air (OTA) firmware updates are very common in IoT (Internet of Things) devices with wireless capabilities. Although they are convenient, they may also be open to attack since physical access may not be needed. In addition, most frameworks use a ...
Employing Blockchain and Physical Unclonable Functions for Counterfeit IoT Devices Detection
- Lydia Negka,
- Georgios Gketsios,
- Nikolaos A. Anagnostopoulos,
- Georgios Spathoulas,
- Athanasios Kakarountas,
- Stefan Katzenbeisser
Counterfeit copycat devices have become one of the most important problems in IoT ecosystem. The number of IoT devices manufactured has grown exponentially through last years. In order to be competitive in terms of production cost, they usually need to ...
The Evolving Enterprise Architecture: A Digital Transformation Perspective
The advancement of technology has influenced all the enterprises. Enterprises should come up with the evolving approaches to face the challenges. With an evolving approach, the enterprise will be able to adapt to successive changes. Enterprise ...