3,339 research outputs found

    SUTMS - Unified Threat Management Framework for Home Networks

    Get PDF
    Home networks were initially designed for web browsing and non-business critical applications. As infrastructure improved, internet broadband costs decreased, and home internet usage transferred to e-commerce and business-critical applications. Today’s home computers host personnel identifiable information and financial data and act as a bridge to corporate networks via remote access technologies like VPN. The expansion of remote work and the transition to cloud computing have broadened the attack surface for potential threats. Home networks have become the extension of critical networks and services, hackers can get access to corporate data by compromising devices attacked to broad- band routers. All these challenges depict the importance of home-based Unified Threat Management (UTM) systems. There is a need of unified threat management framework that is developed specifically for home and small networks to address emerging security challenges. In this research, the proposed Smart Unified Threat Management (SUTMS) framework serves as a comprehensive solution for implementing home network security, incorporating firewall, anti-bot, intrusion detection, and anomaly detection engines into a unified system. SUTMS is able to provide 99.99% accuracy with 56.83% memory improvements. IPS stands out as the most resource-intensive UTM service, SUTMS successfully reduces the performance overhead of IDS by integrating it with the flow detection mod- ule. The artifact employs flow analysis to identify network anomalies and categorizes encrypted traffic according to its abnormalities. SUTMS can be scaled by introducing optional functions, i.e., routing and smart logging (utilizing Apriori algorithms). The research also tackles one of the limitations identified by SUTMS through the introduction of a second artifact called Secure Centralized Management System (SCMS). SCMS is a lightweight asset management platform with built-in security intelligence that can seamlessly integrate with a cloud for real-time updates

    Design for energy-efficient and reliable fog-assisted healthcare IoT systems

    Get PDF
    Cardiovascular disease and diabetes are two of the most dangerous diseases as they are the leading causes of death in all ages. Unfortunately, they cannot be completely cured with the current knowledge and existing technologies. However, they can be effectively managed by applying methods of continuous health monitoring. Nonetheless, it is difficult to achieve a high quality of healthcare with the current health monitoring systems which often have several limitations such as non-mobility support, energy inefficiency, and an insufficiency of advanced services. Therefore, this thesis presents a Fog computing approach focusing on four main tracks, and proposes it as a solution to the existing limitations. In the first track, the main goal is to introduce Fog computing and Fog services into remote health monitoring systems in order to enhance the quality of healthcare. In the second track, a Fog approach providing mobility support in a real-time health monitoring IoT system is proposed. The handover mechanism run by Fog-assisted smart gateways helps to maintain the connection between sensor nodes and the gateways with a minimized latency. Results show that the handover latency of the proposed Fog approach is 10%-50% less than other state-of-the-art mobility support approaches. In the third track, the designs of four energy-efficient health monitoring IoT systems are discussed and developed. Each energy-efficient system and its sensor nodes are designed to serve a specific purpose such as glucose monitoring, ECG monitoring, or fall detection; with the exception of the fourth system which is an advanced and combined system for simultaneously monitoring many diseases such as diabetes and cardiovascular disease. Results show that these sensor nodes can continuously work, depending on the application, up to 70-155 hours when using a 1000 mAh lithium battery. The fourth track mentioned above, provides a Fog-assisted remote health monitoring IoT system for diabetic patients with cardiovascular disease. Via several proposed algorithms such as QT interval extraction, activity status categorization, and fall detection algorithms, the system can process data and detect abnormalities in real-time. Results show that the proposed system using Fog services is a promising approach for improving the treatment of diabetic patients with cardiovascular disease

    Technologies for safe and resilient earthmoving operations: A systematic literature review

    Get PDF
    Resilience engineering relates to the ability of a system to anticipate, prepare, and respond to predicted and unpredicted disruptions. It necessitates the use of monitoring and object detection technologies to ensure system safety in excavation systems. Given the increased investment and speed of improvement in technologies, it is necessary to review the types of technology available and how they contribute to excavation system safety. A systematic literature review was conducted which identified and classified the existing monitoring and object detection technologies, and introduced essential enablers for reliable and effective monitoring and object detection systems including: 1) the application of multisensory and data fusion approaches, and 2) system-level application of technologies. This study also identified the developed functionalities for accident anticipation, prevention and response to safety hazards during excavation, as well as those that facilitate learning in the system. The existing research gaps and future direction of research have been discussed

    Investigation and Implementation of Beacon Technology for Man Tracking in Oil and Gas Industry

    Get PDF
    The oil and gas industry deals with various challenges, and one of it is to comply with frequently changing environmental regulations in monitoring and management system. In this project, the focus will be in the necessity for oil and gas industry to monitor the movement of their employees especially for whom that were conducting tasks in remote areas to wisely optimise the runway resources while simultaneously reaching the needs of delivery schedules. To oversee the workers position, a comprehensive floor mapping system that indicates the real-time status of individuals is required on 24/7 basis. Therefore, the use of beacon system with IOT platform will be applied in this project. The concept is such as the employees are required to carry a customised beacon badge, for this badge will communicate valuable information to the Bluetooth gateway that coordinates the collected information to a cloud-based system for floor mapping process. In other words, an investigation and implementation of a beacon system through a Bluetooth gateway to a cloud-based system in accordance with IEEE 802.15 standard will work out

    Innovative IoT Solutions and Wearable Sensing Systems for Monitoring Human Biophysical Parameters: A Review

    Get PDF
    none3noDigital and information technologies are heavily pervading several aspects of human activities, improving our life quality. Health systems are undergoing a real technological revolution, radically changing how medical services are provided, thanks to the wide employment of the Internet of Things (IoT) platforms supporting advanced monitoring services and intelligent inferring systems. This paper reports, at first, a comprehensive overview of innovative sensing systems for monitoring biophysical and psychophysical parameters, all suitable for integration with wearable or portable accessories. Wearable devices represent a headstone on which the IoT-based healthcare platforms are based, providing capillary and real-time monitoring of patient’s conditions. Besides, a survey of modern architectures and supported services by IoT platforms for health monitoring is presented, providing useful insights for developing future healthcare systems. All considered architectures employ wearable devices to gather patient parameters and share them with a cloud platform where they are processed to provide real-time feedback. The reported discussion highlights the structural differences between the discussed frameworks, from the point of view of network configuration, data management strategy, feedback modality, etc.Article Number: 1660openRoberto De Fazio; Massimo De Vittorio; Paolo ViscontiDE FAZIO, Roberto; DE VITTORIO, Massimo; Visconti, Paol

    An Approach to Guide Users Towards Less Revealing Internet Browsers

    Get PDF
    When browsing the Internet, HTTP headers enable both clients and servers send extra data in their requests or responses such as the User-Agent string. This string contains information related to the sender’s device, browser, and operating system. Previous research has shown that there are numerous privacy and security risks result from exposing sensitive information in the User-Agent string. For example, it enables device and browser fingerprinting and user tracking and identification. Our large analysis of thousands of User-Agent strings shows that browsers differ tremendously in the amount of information they include in their User-Agent strings. As such, our work aims at guiding users towards using less exposing browsers. In doing so, we propose to assign an exposure score to browsers based on the information they expose and vulnerability records. Thus, our contribution in this work is as follows: first, provide a full implementation that is ready to be deployed and used by users. Second, conduct a user study to identify the effectiveness and limitations of our proposed approach. Our implementation is based on using more than 52 thousand unique browsers. Our performance and validation analysis show that our solution is accurate and efficient. The source code and data set are publicly available and the solution has been deployed
    • …
    corecore