Time-critical applications, such as early warning systems or live event broadcasting, present particular challenges. They have hard limits on Quality of Service constraints that must be maintained, despite network fluctuations and varying peaks of load. Consequently, such applications must adapt elastically on-demand, and so must be capable of reconfiguring themselves, along with the underlying cloud infrastructure, to satisfy their constraints. Software engineering tools and methodologies currently do not support such a paradigm. In this paper, we describe a framework that has been designed to meet these objectives, as part of the EU SWITCH project. SWITCH offers a flexible co-programming architecture that provides an abstraction layer and an underlying infrastructure environment, which can help to both specify and support the life cycle of time-critical cloud native applications. We describe the architecture, design and implementation of the SWITCH components and describe how such tools are applied to three time-critical real-world use cases.
Distributed Ledger Technology (DLT) refers to a digital method for registering virtual transactions and other similar data in multiple locations simultaneously. The main characteristic of distributed ledgers is that they do not have a central administration component, due to advanced algorithms and methods used for record-keeping. Thus, transactions are faster and reasonable, as they do not require a central authority to validate them. The network is formed by multiple nodes through which the participant can access recordings, making the network become less vulnerable when referring to cyberattacks. After several years of technological development in this area, different distributed ledger technologies are available. This article presents Blockchain and Tangle technologies along with their main characteristics, in order to make an extended comparison of their approaches. In addition to this, the paper contains experimentation details and results for each technology presented.
Currently, much effort is being made on a European and global level, to push towards realizing a sustainable development of the Smart Grid, with the minimum vulnerability to external attacks or to malicious Smart Grid nodes. Utility companies globally invest in an efficient, controlled and flexible distribution of the energy to optimize the services they provide to the end customers. On the other hand, individual clients call for more efficient Smart Grid solutions with guaranteed highly secure Demand Response services that could reduce their electricity bill without sacrificing their privacy or their energy-consuming habits. In this paper, we present the SealedGRID that provides an innovative platform that abides by the existing standardization work and is directly utilized by the shareholders to provide new tools towards a scalable, highly trusted, and interoperable Smart Grid security platform.
In our days, almost every business relays on medium-to-high performance computer systems which presents the possibility of being the target of different threats that can exploit the vulnerable software, respectively hardware components. The concept of "security risk" can be described as a specific threat that using a specific type of attack presents the ability to exploit system vulnerabilities, action which will affect the entire integrity of the targeted systems. From this point of view, the main idea of this paper is to present a Lego methodology approach for Common Criteria certification that can be applied to IoT Telemetry systems. Furthermore, we present scenarios of implementation of our approach to increase robustness level applied for agro-telemetry system.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.