Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Item TypeItem Type
-
SubjectSubject
-
YearFrom:-To:
-
More FiltersMore FiltersSourceLanguage
Done
Filters
Reset
44
result(s) for
"Pal, Shantanu"
Sort by:
Development and Progress in Sensors and Technologies for Human Emotion Recognition
by
Mukhopadhyay, Subhas
,
Suryadevara, Nagender
,
Pal, Shantanu
in
Affect (Psychology)
,
Application programming interface
,
Automation
2021
With the advancement of human-computer interaction, robotics, and especially humanoid robots, there is an increasing trend for human-to-human communications over online platforms (e.g., zoom). This has become more significant in recent years due to the Covid-19 pandemic situation. The increased use of online platforms for communication signifies the need to build efficient and more interactive human emotion recognition systems. In a human emotion recognition system, the physiological signals of human beings are collected, analyzed, and processed with the help of dedicated learning techniques and algorithms. With the proliferation of emerging technologies, e.g., the Internet of Things (IoT), future Internet, and artificial intelligence, there is a high demand for building scalable, robust, efficient, and trustworthy human recognition systems. In this paper, we present the development and progress in sensors and technologies to detect human emotions. We review the state-of-the-art sensors used for human emotion recognition and different types of activity monitoring. We present the design challenges and provide practical references of such human emotion recognition systems in the real world. Finally, we discuss the current trends in applications and explore the future research directions to address issues, e.g., scalability, security, trust, privacy, transparency, and decentralization.
Journal Article
Security Requirements for the Internet of Things: A Systematic Approach
by
Hitchens, Michael
,
Mukhopadhyay, Subhas
,
Rabehaja, Tahiry
in
Access control
,
Architecture
,
Internet of Things
2020
There has been a tremendous growth in the number of smart devices and their applications (e.g., smart sensors, wearable devices, smart phones, smart cars, etc.) in use in our everyday lives. This is accompanied by a new form of interconnection between the physical and digital worlds, commonly known as the Internet of Things (IoT). This is a paradigm shift, where anything and everything can be interconnected via a communication medium. In such systems, security is a prime concern and protecting the resources (e.g., applications and services) from unauthorized access needs appropriately designed security and privacy solutions. Building secure systems for the IoT can only be achieved through a thorough understanding of the particular needs of such systems. The state of the art is lacking a systematic analysis of the security requirements for the IoT. Motivated by this, in this paper, we present a systematic approach to understand the security requirements for the IoT, which will help designing secure IoT systems for the future. In developing these requirements, we provide different scenarios and outline potential threats and attacks within the IoT. Based on the characteristics of the IoT, we group the possible threats and attacks into five areas, namely communications, device/services, users, mobility and integration of resources. We then examine the existing security requirements for IoT presented in the literature and detail our approach for security requirements for the IoT. We argue that by adhering to the proposed requirements, an IoT system can be designed securely by achieving much of the promised benefits of scalability, usability, connectivity, and flexibility in a practical and comprehensive manner.
Journal Article
Protocol-Based and Hybrid Access Control for the IoT: Approaches and Research Opportunities
2021
Internet of Things (IoT) applications and services are becoming more prevalent in our everyday life. However, such an interconnected network of intelligent physical entities needs appropriate security to sensitive information. That said, the need for proper authentication and authorization is paramount. Access control is in the front line of such mechanisms. Access control determines the use of resources only to the specified and authorized users based on appropriate policy enforcement. IoT demands more sophisticated access control in terms of its usability and efficiency in protecting sensitive information. This conveys the need for access control to serve system-specific requirements and be flexibly combined with other access control approaches. In this paper, we discuss the potential for employing protocol-based and hybrid access control for IoT systems and examine how that can overcome the limitations of traditional access control mechanisms. We also focus on the key benefits and constraints of this integration. Our work further enhances the need to build hierarchical access control for large-scale IoT systems (e.g., Industrial IoT (IIoT) settings) with protocol-based and hybrid access control approaches. We, moreover, list the associated open issues to make such approaches efficient for access control in large-scale IoT systems.
Journal Article
Analysis of Security Issues and Countermeasures for the Industrial Internet of Things
2021
Industrial Internet of Things (IIoT) can be seen as an extension of the Internet of Things (IoT) services and applications to industry with the inclusion of Industry 4.0 that provides automation, reliability, and control in production and manufacturing. IIoT has tremendous potential to accelerate industry automation in many areas, including transportation, manufacturing, automobile, marketing, to name a few places. When the benefits of IIoT are visible, the development of large-scale IIoT systems faces various security challenges resulting in many large-scale cyber-attacks, including fraudulent transactions or damage to critical infrastructure. Moreover, a large number of connected devices over the Internet and resource limitations of the devices (e.g., battery, memory, and processing capability) further pose challenges to the system. The IIoT inherits the insecurities of the traditional communication and networking technologies; however, the IIoT requires further effort to customize the available security solutions with more focus on critical industrial control systems. Several proposals discuss the issue of security, privacy, and trust in IIoT systems, but comprehensive literature considering the several aspects (e.g., users, devices, applications, cascading services, or the emergence of resources) of an IIoT system is missing in the present state of the art IIoT research. In other words, the need for considering a vision for securing an IIoT system with broader security analysis and its potential countermeasures is missing in recent times. To address this issue, in this paper, we provide a comparative analysis of the available security issues present in an IIoT system. We identify a list of security issues comprising logical, technological, and architectural points of view and consider the different IIoT security requirements. We also discuss the available IIoT architectures to examine these security concerns in a systematic way. We show how the functioning of different layers of an IIoT architecture is affected by various security issues and report a list of potential countermeasures against them. This study also presents a list of future research directions towards the development of a large-scale, secure, and trustworthy IIoT system. The study helps understand the various security issues by indicating various threats and attacks present in an IIoT system.
Journal Article
Correlation-Based Anomaly Detection in Industrial Control Systems
by
Hussain, Mukhtar
,
Nguyen Thanh, Kien
,
Jadidi, Zahra
in
anomaly detection
,
Correlation analysis
,
cyber attacks
2023
Industrial Control Systems (ICSs) were initially designed to be operated in an isolated network. However, recently, ICSs have been increasingly connected to the Internet to expand their capability, such as remote management. This interconnectivity of ICSs exposes them to cyber-attacks. At the same time, cyber-attacks in ICS networks are different compared to traditional Information Technology (IT) networks. Cyber attacks on ICSs usually involve a sequence of actions and a multitude of devices. However, current anomaly detection systems only focus on local analysis, which misses the correlation between devices and the progress of attacks over time. As a consequence, they lack an effective way to detect attacks at an entire network scale and predict possible future actions of an attack, which is of significant interest to security analysts to identify the weaknesses of their network and prevent similar attacks in the future. To address these two key issues, this paper presents a system-wide anomaly detection solution using recurrent neural networks combined with correlation analysis techniques. The proposed solution has a two-layer analysis. The first layer targets attack detection, and the second layer analyses the detected attack to predict the next possible attack actions. The main contribution of this paper is the proof of the concept implementation using two real-world ICS datasets, SWaT and Power System Attack. Moreover, we show that the proposed solution effectively detects anomalies and attacks on the scale of the entire ICS network.
Journal Article
TrackInk: An IoT-Enabled Real-Time Object Tracking System in Space
by
Seth, Avishkar
,
James, Alice
,
Mukhopadhyay, Subhas
in
access control
,
architecture
,
Artificial satellites
2022
Nowadays, there is tremendous growth in the Internet of Things (IoT) applications in our everyday lives. The proliferation of smart devices, sensors technology, and the Internet makes it possible to communicate between the digital and physical world seamlessly for distributed data collection, communication, and processing of several applications dynamically. However, it is a challenging task to monitor and track objects in real-time due to the distinct characteristics of the IoT system, e.g., scalability, mobility, and resource-limited nature of the devices. In this paper, we address the significant issue of IoT object tracking in real time. We propose a system called ‘TrackInk’ to demonstrate our idea. TrackInk will be capable of pointing toward and taking pictures of visible satellites in the night sky, including but not limited to the International Space Station (ISS) or the moon. Data will be collected from sensors to determine the system’s geographical location along with its 3D orientation, allowing for the system to be moved. Additionally, TrackInk will communicate with and send data to ThingSpeak for further cloud-based systems and data analysis. Our proposed system is lightweight, highly scalable, and performs efficiently in a resource-limited environment. We discuss a detailed system’s architecture and show the performance results using a real-world hardware-based experimental setup.
Journal Article
Fed4UL: A Cloud–Edge–End Collaborative Federated Learning Framework for Addressing the Non-IID Data Issue in UAV Logistics
2024
Artificial intelligence and the Internet of Things (IoT) have brought great convenience to people’s everyday lives. With the emergence of edge computing, IoT devices such as unmanned aerial vehicles (UAVs) can process data instantly at the point of generation, which significantly decreases the requirement for on-board processing power and minimises the data transfer time to enable real-time applications. Meanwhile, with federated learning (FL), UAVs can enhance their intelligent decision-making capabilities by learning from other UAVs without directly accessing their data. This facilitates rapid model iteration and improvement while safeguarding data privacy. However, in many UAV applications such as UAV logistics, different UAVs may perform different tasks and cover different areas, which can result in heterogeneous data and add to the problem of non-independent and identically distributed (Non-IID) data for model training. To address such a problem, we introduce a novel cloud–edge–end collaborative FL framework, which organises and combines local clients through clustering and aggregation. By employing the cosine similarity, we identified and integrated the most appropriate local model into the global model, which can effectively address the issue of Non-IID data in UAV logistics. The experimental results showed that our approach outperformed traditional FL algorithms on two real-world datasets, CIFAR-10 and MNIST.
Journal Article
Uncertainty propagation in the internet of things
by
Dedeoglu, Volkan
,
Moghadam, Peyman
,
Miller, Dimity
in
Automation
,
Computer Science
,
Cyber-physical systems
2024
The Internet of Things (IoT) detects context through sensors capturing data from dynamic physical environments, in order to inform automation decisions within cyber physical systems (CPS). Diverse types of uncertainty in the IoT pipeline can propagate within and across nodes, involving complex interactions with security, privacy, and trust that remain largely unexplored. This paper conducts an in-depth analysis of the types of uncertainties in IoT and how they propagate within IoT nodes and networks. We consider adversarial uncertainty in the context of distributed IoT networks to capture perturbations due to malicious actors in the network that can influence IoT security, privacy and trust. We examine the propagation of adversarial uncertainty and well-known uncertainty types, namely aleatoric and epistemic uncertainty, within the five distinct stages of sensing, communication, storage, processing and decision-making in an IoT pipeline, across network layer boundaries, and across nodes within an IoT network. Using this mapping, we analyse the interactions between the uncertainty types and their propagation, and security, privacy, and trust in IoT. Based on this analysis, we discuss guidelines and considerations for mitigating uncertainty in IoT through a smart grid use case study.
Article highlights
We map interactions between uncertainty types (aleatoric, epistemic, adversarial) and IoT security, privacy, and trust.
We analyze uncertainty sources in IoT, focusing on adversarial impacts in distributed IoT networks.
Guidelines are derived to mitigate IoT uncertainties using emerging solutions.
Journal Article
Fine-Grained Access Control for Smart Healthcare Systems in the Internet of Things
by
Hitchens, Michael
,
Rabehaja, Tahiry
,
Pal, Shantanu
in
Access control
,
Architecture
,
Authentication
2018
There has been tremendous growth in the application of the Internet of Things (IoT) in our daily lives. Yet with this growth has come numerous security concerns and privacy challenges for both the users and the systems. Smart devices have many uses in a healthcare system, e.g. collecting and reporting patient data and controlling the administration of treatment. In this paper, we address the specific security issue of access control for smart healthcare systems and the protection of smart things from unauthorised access in such large scale systems. Commonly used access control approaches e.g. Role-Based Access Control (RBAC), Attribute-Based Access Control (ABAC) and Capability-Based Access Control (CapBAC) do not, in isolation, provide a complete solution for securing access to IoT-enabled smart healthcare devices. They may, for example, require an overly-centralised solution or an unmanageably large policy base. We propose a novel access control architecture which improves policy management by reducing the required number of authentication policies in a large-scale healthcare system while providing fine-grained access control. The devised access control model employs attributes, roles and capabilities. We apply attributes for role membership assignment and in permission evaluation. Membership of roles grants capabilities. The capabilities which are issued may be parameterised based on attributes of the user and are then used to access specific services provided by things. We also provide a formal specification of the model and a description of its implementation and demonstrate its application through di?erent use-case scenarios. The evaluation results of core functionality of our architecture are provided with the practical testbed experiments.
Journal Article
EVALUATING ROUTING PERFORMANCES IN MOBILE OPPORTUNISTIC NETWORKS USING DIFFERENT WIRELESS COMMUNICATION TECHNIQUES
2015
Mobile opportunistic networks help users gain the advantage of accessing an available network connection for communication in rural areas or in high interference zones. Using local user's social interactions and communication platforms, users in such networks store, carry and forward messages between each other within a fairly close distance. In this paper, we examine how different wireless networking technologies affect the network performance. We use real-life trace driven simulations to evaluate their effects on the routing performances within the network. Furthermore, our intention is to study whether different communication ranges influence data forwarding in the mobile opportunistic networks. Our results show that local user's social interactions and collaborations help to improve the overall message delivery performance in the network. Moreover, we note that a higher communication range improve the overall message delivery performance but when communicating in a shorter range, users' interactions and collaborations are significant for data forwarding.
Journal Article