13 research outputs found

    Internet of Things for Mental Health: Open Issues in Data Acquisition, Self-Organization, Service Level Agreement, and Identity Management

    Get PDF
    The increase of mental illness cases around the world can be described as an urgent and serious global health threat. Around 500 million people suffer from mental disorders, among which depression, schizophrenia, and dementia are the most prevalent. Revolutionary technological paradigms such as the Internet of Things (IoT) provide us with new capabilities to detect, assess, and care for patients early. This paper comprehensively survey works done at the intersection between IoT and mental health disorders. We evaluate multiple computational platforms, methods and devices, as well as study results and potential open issues for the effective use of IoT systems in mental health. We particularly elaborate on relevant open challenges in the use of existing IoT solutions for mental health care, which can be relevant given the potential impairments in some mental health patients such as data acquisition issues, lack of self-organization of devices and service level agreement, and security, privacy and consent issues, among others. We aim at opening the conversation for future research in this rather emerging area by outlining possible new paths based on the results and conclusions of this work.Consejo Nacional de Ciencia y Tecnologia (CONACyT)Sonora Institute of Technology (ITSON) via the PROFAPI program PROFAPI_2020_0055Spanish Ministry of Science, Innovation and Universities (MICINN) project "Advanced Computing Architectures and Machine Learning-Based Solutions for Complex Problems in Bioinformatics, Biotechnology and Biomedicine" RTI2018-101674-B-I0

    A survey of IoT security based on a layered architecture of sensing and data analysis

    Get PDF
    The Internet of Things (IoT) is leading today鈥檚 digital transformation. Relying on a combination of technologies, protocols, and devices such as wireless sensors and newly developed wearable and implanted sensors, IoT is changing every aspect of daily life, especially recent applications in digital healthcare. IoT incorporates various kinds of hardware, communication protocols, and services. This IoT diversity can be viewed as a double-edged sword that provides comfort to users but can lead also to a large number of security threats and attacks. In this survey paper, a new compacted and optimized architecture for IoT is proposed based on five layers. Likewise, we propose a new classification of security threats and attacks based on new IoT architecture. The IoT architecture involves a physical perception layer, a network and protocol layer, a transport layer, an application layer, and a data and cloud services layer. First, the physical sensing layer incorporates the basic hardware used by IoT. Second, we highlight the various network and protocol technologies employed by IoT, and review the security threats and solutions. Transport protocols are exhibited and the security threats against them are discussed while providing common solutions. Then, the application layer involves application protocols and lightweight encryption algorithms for IoT. Finally, in the data and cloud services layer, the main important security features of IoT cloud platforms are addressed, involving confidentiality, integrity, authorization, authentication, and encryption protocols. The paper is concluded by presenting the open research issues and future directions towards securing IoT, including the lack of standardized lightweight encryption algorithms, the use of machine-learning algorithms to enhance security and the related challenges, the use of Blockchain to address security challenges in IoT, and the implications of IoT deployment in 5G and beyond

    A Practical Evaluation of a High-Security Energy-Efficient Gateway for IoT Fog Computing Applications

    Get PDF
    [Abstract] Fog computing extends cloud computing to the edge of a network enabling new Internet of Things (IoT) applications and services, which may involve critical data that require privacy and security. In an IoT fog computing system, three elements can be distinguished: IoT nodes that collect data, the cloud, and interconnected IoT gateways that exchange messages with the IoT nodes and with the cloud. This article focuses on securing IoT gateways, which are assumed to be constrained in terms of computational resources, but that are able to offload some processing from the cloud and to reduce the latency in the responses to the IoT nodes. However, it is usually taken for granted that IoT gateways have direct access to the electrical grid, which is not always the case: in mission-critical applications like natural disaster relief or environmental monitoring, it is common to deploy IoT nodes and gateways in large areas where electricity comes from solar or wind energy that charge the batteries that power every device. In this article, how to secure IoT gateway communications while minimizing power consumption is analyzed. The throughput and power consumption of Rivest鈥揝hamir鈥揂dleman (RSA) and Elliptic Curve Cryptography (ECC) are considered, since they are really popular, but have not been thoroughly analyzed when applied to IoT scenarios. Moreover, the most widespread Transport Layer Security (TLS) cipher suites use RSA as the main public key-exchange algorithm, but the key sizes needed are not practical for most IoT devices and cannot be scaled to high security levels. In contrast, ECC represents a much lighter and scalable alternative. Thus, RSA and ECC are compared for equivalent security levels, and power consumption and data throughput are measured using a testbed of IoT gateways. The measurements obtained indicate that, in the specific fog computing scenario proposed, ECC is clearly a much better alternative than RSA, obtaining energy consumption reductions of up to 50% and a data throughput that doubles RSA in most scenarios. These conclusions are then corroborated by a frame temporal analysis of Ethernet packets. In addition, current data compression algorithms are evaluated, concluding that, when dealing with the small payloads related to IoT applications, they do not pay off in terms of real data throughput and power consumption.Galicia. Conseller铆a de Cultura, Educaci贸n e Ordenaci贸n Universitaria; ED431C 2016-045Agencia Estatal de Investigaci贸n (Espa帽a); TEC2013-47141-C4-1-RAgencia Estatal de Investigaci贸n (Espa帽a); TEC2015-69648-REDCAgencia Estatal de Investigaci贸n (Espa帽a); TEC2016-75067-C4-1-RGalicia. Conseller铆a de Cultura, Educaci贸n e Ordenaci贸n Universitaria; ED341D2016/012Galicia. Conseller铆a de Cultura, Educaci贸n e Ordenaci贸n Universitaria; ED431G/0

    Analysis of Security Attacks & Taxonomy in Underwater Wireless Sensor Networks

    Get PDF
    Abstract: Underwater Wireless Sensor Networks (UWSN) have gained more attention from researchers in recent years due to their advancement in marine monitoring, deployment of various applications, and ocean surveillance. The UWSN is an attractive field for both researchers and the industrial side. Due to the harsh underwater environment, own capabilities, open acoustic channel, it's also vulnerable to malicious attacks and threats. Attackers can easily take advantage of these characteristics to steal the data between the source and destination. Many review articles are addressed some of the security attacks and Taxonomy of the Underwater Wireless Sensor Networks. In this study, we have briefly addressed the Taxonomy of the UWSNs from the most recent research articles related to the well-known research databases. This paper also discussed the security threats on each layer of the Underwater Wireless sensor networks. This study will help the researcher鈥檚 design the routing protocols to cover the known security threats and help industries manufacture the devices to observe these threats and security issues

    Internet of Things for system integrity: a comprehensive survey on security, attacks and countermeasures for industrial applications

    Get PDF
    The growth of the Internet of Things (IoT) offers numerous opportunities for developing industrial applications such as smart grids, smart cities, smart manufacturers, etc. By utilising these opportunities, businesses engage in creating the Industrial Internet of Things (IIoT). IoT is vulnerable to hacks and, therefore, requires various techniques to achieve the level of security required. Furthermore, the wider implementation of IIoT causes an even greater security risk than its benefits. To provide a roadmap for researchers, this survey discusses the integrity of industrial IoT systems and highlights the existing security approaches for the most significant industrial applications. This paper mainly classifies the attacks and possible security solutions regarding IoT layers architecture. Consequently, each attack is connected to one or more layers of the architecture accompanied by a literature analysis on the various IoT security countermeasures. It further provides a critical analysis of the existing IoT/IIoT solutions based on different security mechanisms, including communications protocols, networking, cryptography and intrusion detection systems. Additionally, there is a discussion of the emerging tools and simulations used for testing and evaluating security mechanisms in IoT applications. Last, this survey outlines several other relevant research issues and challenges for IoT/IIoT security

    RFID application in a multi-agent cyber physical manufacturing system

    Get PDF
    In manufacturing supply chains with labour-intensive operations and processes, individuals perform various types of manual tasks and quality checks. These operations and processes embrace engagement with various forms of paperwork, regulation obligations and external agreements between multiple stakeholders. Such manual activities can increase human error and near misses, which may ultimately lead to a lack of productivity and performance. In this paper, a multi-agent cyber-physical system (CPS) architecture with radio frequency identification (RFID) technology is presented to assist inter-layer interactions between different manufacturing phases on the shop floor and external interactions with other stakeholders within a supply chain. A dynamic simulation model in the AnyLogic software is developed to implement the CPS-RFID solution by using the agent-based technique. A case study from cryogenic warehousing in cell and gene therapy has been chosen to test the validity of the presented CPS-RFID architecture. The analyses of the simulation results show improvement in efficiency and productivity, in terms of resource time-in-syste

    New Secure IoT Architectures, Communication Protocols and User Interaction Technologies for Home Automation, Industrial and Smart Environments

    Get PDF
    Programa Oficial de Doutoramento en Tecnolox铆as da Informaci贸n e das Comunicaci贸ns en Redes M贸biles. 5029V01Tese por compendio de publicaci贸ns[Abstract] The Internet of Things (IoT) presents a communication network where heterogeneous physical devices such as vehicles, homes, urban infrastructures or industrial machinery are interconnected and share data. For these communications to be successful, it is necessary to integrate and embed electronic devices that allow for obtaining environmental information (sensors), for performing physical actuations (actuators) as well as for sending and receiving data (network interfaces). This integration of embedded systems poses several challenges. It is needed for these devices to present very low power consumption. In many cases IoT nodes are powered by batteries or constrained power supplies. Moreover, the great amount of devices needed in an IoT network makes power e ciency one of the major concerns of these deployments, due to the cost and environmental impact of the energy consumption. This need for low energy consumption is demanded by resource constrained devices, con icting with the second major concern of IoT: security and data privacy. There are critical urban and industrial systems, such as tra c management, water supply, maritime control, railway control or high risk industrial manufacturing systems such as oil re neries that will obtain great bene ts from IoT deployments, for which non-authorized access can posse severe risks for public safety. On the other hand, both these public systems and the ones deployed on private environments (homes, working places, malls) present a risk for the privacy and security of their users. These IoT deployments need advanced security mechanisms, both to prevent access to the devices and to protect the data exchanged by them. As a consequence, it is needed to improve two main aspects: energy e ciency of IoT devices and the use of lightweight security mechanisms that can be implemented by these resource constrained devices but at the same time guarantee a fair degree of security. The huge amount of data transmitted by this type of networks also presents another challenge. There are big data systems capable of processing large amounts of data, but with IoT the granularity and dispersion of the generated information presents a new scenario very di erent from the one existing nowadays. Forecasts anticipate that there will be a growth from the 15 billion installed devices in 2015 to more than 75 billion devices in 2025. Moreover, there will be much more services exploiting the data produced by these networks, meaning the resulting tra c will be even higher. The information must not only be processed in real time, but data mining processes will have to be performed to historical data. The main goal of this Ph.D. thesis is to analyze each one of the previously described challenges and to provide solutions that allow for an adequate adoption of IoT in Industrial, domestic and, in general, any scenario that can obtain any bene t from the interconnection and exibility that IoT brings.[Resumen] La internet de las cosas (IoT o Internet of Things) representa una red de intercomunicaciones en la que participan dispositivos f铆sicos de toda 铆ndole, como veh铆culos, viviendas, electrodom茅sticos, infraestructuras urbanas o maquinaria y dispositivos industriales. Para que esta comunicaci贸n se pueda llevar a cabo es necesario integrar elementos electr onicos que permitan obtener informaci on del entorno (sensores), realizar acciones f sicas (actuadores) y enviar y recibir la informaci on necesaria (interfaces de comunicaciones de red). La integraci贸n y uso de estos sistemas electr贸nicos embebidos supone varios retos. Es necesario que dichos dispositivos presenten un consumo reducido. En muchos casos deber铆an ser alimentados por bater铆as o fuentes de alimentaci贸n limitadas. Adem谩s, la gran cantidad de dispositivos que involucra la IoT hace necesario que la e ciencia energ茅tica de los mismos sea una de las principales preocupaciones, por el coste e implicaciones medioambientales que supone el consumo de electricidad de los mismos. Esta necesidad de limitar el consumo provoca que dichos dispositivos tengan unas prestaciones muy limitadas, lo que entra en conflicto con la segunda mayor preocupaci贸n de la IoT: la seguridad y privacidad de los datos. Por un lado existen sistemas cr铆ticos urbanos e industriales, como puede ser la regulaci贸n del tr谩fi co, el control del suministro de agua, el control mar铆timo, el control ferroviario o los sistemas de producci贸n industrial de alto riesgo, como refi ner铆as, que son claros candidatos a benefi ciarse de la IoT, pero cuyo acceso no autorizado supone graves problemas de seguridad ciudadana. Por otro lado, tanto estos sistemas de naturaleza publica, como los que se desplieguen en entornos privados (viviendas, entornos de trabajo o centros comerciales, entre otros) suponen un riesgo para la privacidad y tambi茅n para la seguridad de los usuarios. Todo esto hace que sean necesarios mecanismos de seguridad avanzados, tanto de acceso a los dispositivos como de protecci贸n de los datos que estos intercambian. En consecuencia, es necesario avanzar en dos aspectos principales: la e ciencia energ茅tica de los dispositivos y el uso de mecanismos de seguridad e ficientes, tanto computacional como energ茅ticamente, que permitan la implantaci贸n de la IoT sin comprometer la seguridad y la privacidad de los usuarios. Por otro lado, la ingente cantidad de informaci贸n que estos sistemas puede llegar a producir presenta otros dos retos que deben ser afrontados. En primer lugar, el tratamiento y an谩lisis de datos toma una nueva dimensi贸n. Existen sistemas de big data capaces de procesar cantidades enormes de informaci贸n, pero con la internet de las cosas la granularidad y dispersi贸n de los datos plantean un escenario muy distinto al actual. La previsi贸n es pasar de 15.000.000.000 de dispositivos instalados en 2015 a m谩s de 75.000.000.000 en 2025. Adem谩s existir谩n multitud de servicios que har谩n un uso intensivo de estos dispositivos y de los datos que estos intercambian, por lo que el volumen de tr谩fico ser谩 todav铆a mayor. Asimismo, la informaci贸n debe ser procesada tanto en tiempo real como a posteriori sobre hist贸ricos, lo que permite obtener informaci贸n estad铆stica muy relevante en diferentes entornos. El principal objetivo de la presente tesis doctoral es analizar cada uno de estos retos (e ciencia energ茅tica, seguridad, procesamiento de datos e interacci贸n con el usuario) y plantear soluciones que permitan una correcta adopci贸n de la internet de las cosas en 谩mbitos industriales, dom茅sticos y en general en cualquier escenario que se pueda bene ciar de la interconexi贸n y flexibilidad de acceso que proporciona el IoT.[Resumo] O internet das cousas (IoT ou Internet of Things) representa unha rede de intercomunicaci 贸ns na que participan dispositivos f铆sicos moi diversos, coma veh铆culos, vivendas, electrodom茅sticos, infraestruturas urbanas ou maquinaria e dispositivos industriais. Para que estas comunicaci贸ns se poidan levar a cabo 茅 necesario integrar elementos electr贸nicos que permitan obter informaci贸n da contorna (sensores), realizar acci贸ns f铆sicas (actuadores) e enviar e recibir a informaci贸n necesaria (interfaces de comunicaci贸ns de rede). A integraci贸n e uso destes sistemas electr贸nicos integrados sup贸n varios retos. En primeiro lugar, 茅 necesario que estes dispositivos te帽an un consumo reducido. En moitos casos deber铆an ser alimentados por bater铆as ou fontes de alimentaci贸n limitadas. Ademais, a gran cantidade de dispositivos que se empregan na IoT fai necesario que a e ciencia enerx茅tica dos mesmos sexa unha das principais preocupaci贸ns, polo custo e implicaci贸ns medioambientais que sup贸n o consumo de electricidade dos mesmos. Esta necesidade de limitar o consumo provoca que estes dispositivos te帽an unhas prestaci贸ns moi limitadas, o que entra en con ito coa segunda maior preocupaci贸n da IoT: a seguridade e privacidade dos datos. Por un lado existen sistemas cr铆ticos urbanos e industriais, como pode ser a regulaci贸n do tr谩fi co, o control de augas, o control mar铆timo, o control ferroviario ou os sistemas de produci贸n industrial de alto risco, como refiner铆as, que son claros candidatos a obter benefi cios da IoT, pero cuxo acceso non autorizado sup贸n graves problemas de seguridade cidad谩. Por outra parte tanto estes sistemas de natureza p煤blica como os que se despreguen en contornas privadas (vivendas, contornas de traballo ou centros comerciais entre outros) supo帽en un risco para a privacidade e tam茅n para a seguridade dos usuarios. Todo isto fai que sexan necesarios mecanismos de seguridade avanzados, tanto de acceso aos dispositivos como de protecci贸n dos datos que estes intercambian. En consecuencia, 茅 necesario avanzar en dous aspectos principais: a e ciencia enerx茅tica dos dispositivos e o uso de mecanismos de seguridade re cientes, tanto computacional como enerx茅ticamente, que permitan o despregue da IoT sen comprometer a seguridade e a privacidade dos usuarios. Por outro lado, a inxente cantidade de informaci贸n que estes sistemas poden chegar a xerar presenta outros retos que deben ser tratados. O tratamento e a an谩lise de datos toma unha nova dimensi贸n. Existen sistemas de big data capaces de procesar cantidades enormes de informaci贸n, pero coa internet das cousas a granularidade e dispersi贸n dos datos sup贸n un escenario moi distinto ao actual. A previsi贸n e pasar de 15.000.000.000 de dispositivos instalados no ano 2015 a m ais de 75.000.000.000 de dispositivos no ano 2025. Ademais existir铆an multitude de servizos que far铆an un uso intensivo destes dispositivos e dos datos que intercambian, polo que o volume de tr谩fico ser铆a a铆nda maior. Do mesmo xeito a informaci贸n debe ser procesada tanto en tempo real como posteriormente sobre hist贸ricos, o que permite obter informaci贸n estat铆stica moi relevante en diferentes contornas. O principal obxectivo da presente tese doutoral 茅 analizar cada un destes retos (e ciencia enerx茅tica, seguridade, procesamento de datos e interacci贸n co usuario) e propor soluci贸ns que permitan unha correcta adopci贸n da internet das cousas en 谩mbitos industriais, dom茅sticos e en xeral en todo aquel escenario que se poda bene ciar da interconexi贸n e flexibilidade de acceso que proporciona a IoT

    Graphs behind data: A network-based approach to model different scenarios

    Get PDF
    openAl giorno d鈥檕ggi, i contesti che possono beneficiare di tecniche di estrazione della conoscenza a partire dai dati grezzi sono aumentati drasticamente. Di conseguenza, la definizione di modelli capaci di rappresentare e gestire dati altamente eterogenei 猫 un argomento di ricerca molto dibattuto in letteratura. In questa tesi, proponiamo una soluzione per affrontare tale problema. In particolare, riteniamo che la teoria dei grafi, e pi霉 nello specifico le reti complesse, insieme ai suoi concetti ed approcci, possano rappresentare una valida soluzione. Infatti, noi crediamo che le reti complesse possano costituire un modello unico ed unificante per rappresentare e gestire dati altamente eterogenei. Sulla base di questa premessa, mostriamo come gli stessi concetti ed approcci abbiano la potenzialit脿 di affrontare con successo molti problemi aperti in diversi contesti. 鈥婲owadays, the amount and variety of scenarios that can benefit from techniques for extracting and managing knowledge from raw data have dramatically increased. As a result, the search for models capable of ensuring the representation and management of highly heterogeneous data is a hot topic in the data science literature. In this thesis, we aim to propose a solution to address this issue. In particular, we believe that graphs, and more specifically complex networks, as well as the concepts and approaches associated with them, can represent a solution to the problem mentioned above. In fact, we believe that they can be a unique and unifying model to uniformly represent and handle extremely heterogeneous data. Based on this premise, we show how the same concepts and/or approach has the potential to address different open issues in different contexts. 鈥婭NGEGNERIA DELL'INFORMAZIONEopenVirgili, Luc

    Data Science and Knowledge Discovery

    Get PDF
    Data Science (DS) is gaining significant importance in the decision process due to a mix of various areas, including Computer Science, Machine Learning, Math and Statistics, domain/business knowledge, software development, and traditional research. In the business field, DS's application allows using scientific methods, processes, algorithms, and systems to extract knowledge and insights from structured and unstructured data to support the decision process. After collecting the data, it is crucial to discover the knowledge. In this step, Knowledge Discovery (KD) tasks are used to create knowledge from structured and unstructured sources (e.g., text, data, and images). The output needs to be in a readable and interpretable format. It must represent knowledge in a manner that facilitates inferencing. KD is applied in several areas, such as education, health, accounting, energy, and public administration. This book includes fourteen excellent articles which discuss this trending topic and present innovative solutions to show the importance of Data Science and Knowledge Discovery to researchers, managers, industry, society, and other communities. The chapters address several topics like Data mining, Deep Learning, Data Visualization and Analytics, Semantic data, Geospatial and Spatio-Temporal Data, Data Augmentation and Text Mining
    corecore