17,434 research outputs found
Locational wireless and social media-based surveillance
The number of smartphones and tablets as well as the volume of traffic generated by these devices has been growing constantly over the past decade and this growth is predicted to continue at an increasing rate over the next five years. Numerous native features built into contemporary smart devices enable highly accurate digital fingerprinting techniques. Furthermore, software developers have been taking advantage of locational capabilities of these devices by building applications and social media services that enable convenient sharing of information tied to geographical locations. Mass online sharing resulted in a large volume of locational and personal data being publicly available for extraction. A number of researchers have used this opportunity to design and build tools for a variety of uses â both respectable and nefarious. Furthermore, due to the peculiarities of the IEEE 802.11 specification, wireless-enabled smart devices disclose a number of attributes, which can be observed via passive monitoring. These attributes coupled with the information that can be extracted using social media APIs present an opportunity for research into locational surveillance, device fingerprinting and device user identification techniques. This paper presents an in-progress research study and details the findings to date
Implementation of Middleware for Internet of Things in Asset Tracking Applications: In-lining Approach
ThesisInternet of Things (IoT) is a concept that involves giving objects a digital identity and limited
artificial intelligence, which helps the objects to be interactive, process data, make decisions,
communicate and react to events virtually with minimum human intervention. IoT is intensified
by advancements in hardware and software engineering and promises to close the gap that exists
between the physical and digital worlds. IoT is paving ways to address complex phenomena,
through designing and implementation of intelligent systems that can monitor phenomena,
perform real-time data interpretation, react to events, and swiftly communicate observations. The
primary goal of IoT is ubiquitous computing using wireless sensors and communication
protocols such as Bluetooth, Wireless Fidelity (Wi-Fi), ZigBee and General Packet Radio
Service (GPRS).
Insecurity, of assets and lives, is a problem around the world. One application area of IoT is
tracking and monitoring; it could therefore be used to solve asset insecurity. A preliminary
investigation revealed that security systems in place at Central University of Technology, Free
State (CUT) are disjointed; they do not instantaneously and intelligently conscientize security
personnel about security breaches using real time messages. As a result, many assets have been
stolen, particularly laptops. The main objective of this research was to prove that a real-life application built over a generic
IoT architecture that innovatively and intelligently integrates: (1) wireless sensors; (2) radio
frequency identification (RFID) tags and readers; (3) fingerprint readers; and (4) mobile phones,
can be used to dispel laptop theft. To achieve this, the researcher developed a system, using the
heterogeneous devices mentioned above and a middleware that harnessed their unique
capabilities to bring out the full potential of IoT in intelligently curbing laptop theft.
The resulting system has the ability to: (1) monitor the presence of a laptop using RFID reader
that pro-actively interrogates a passive tag attached to the laptop; (2) detect unauthorized
removal of a laptop under monitoring; (3) instantly communicate security violations via cell
phones; and (4) use Windows location sensors to track the position of a laptop using Googlemaps.
The system also manages administrative tasks such as laptop registration, assignment and withdrawal which used to be handled manually. Experiments conducted using the resulting
system prototype proved the hypothesis outlined for this research
Mobile Authentication with NFC enabled Smartphones
Smartphones are becoming increasingly more deployed and as such new possibilities for utilizing the smartphones many capabilities for public and private use are arising. This project will investigate the possibility of using smartphones as a platform for authentication and access control, using near field communication (NFC). To achieve the necessary security for authentication and access control purposes, cryptographic concepts such as public keys, challenge-response and digital signatures are used. To focus the investigation a case study is performed based on the authentication and access control needs of an educational institutions student ID. To gain a more practical understanding of the challenges mobile authentication encounters, a prototype has successfully been developed on the basis of the investigation. The case study performed in this project argues that NFC as a standalone technology is not yet mature to support the advanced communication required by this case. However, combining NFC with other communication technologies such as Bluetooth has proven to be effective. As a result, a general evaluation has been performed on several aspects of the prototype, such as cost-effectiveness, usability, performance and security to evaluate the viability of mobile authentication
Make it so! Jean-Luc Picard, Bart Simpson and the design of e-public services
In this paper, we report on a project applying participatory design methods to include people who have experience of social exclusion (in one form or another) in designing possible technologies for e-(local)-government services. The work was part of a project for the Office of the Deputy Prime Minister in the UK, and was concerned with âaccess
tokensâ that can provide personal identification for individuals accessing public services, based on technologies such as multi-functional smartcards, flash memory sticks, mobile phone SIMs or similar devices.
In particular we report on our experience using the âpastiche scenariosâ technique recently developed by Mark Blythe. Our findings indicate that the technique can be effective and engaging in helping people to create realistic scenarios of future technology use and highlight some possible pitfalls to consider when using this technique.</p
Internet of Things-aided Smart Grid: Technologies, Architectures, Applications, Prototypes, and Future Research Directions
Traditional power grids are being transformed into Smart Grids (SGs) to
address the issues in existing power system due to uni-directional information
flow, energy wastage, growing energy demand, reliability and security. SGs
offer bi-directional energy flow between service providers and consumers,
involving power generation, transmission, distribution and utilization systems.
SGs employ various devices for the monitoring, analysis and control of the
grid, deployed at power plants, distribution centers and in consumers' premises
in a very large number. Hence, an SG requires connectivity, automation and the
tracking of such devices. This is achieved with the help of Internet of Things
(IoT). IoT helps SG systems to support various network functions throughout the
generation, transmission, distribution and consumption of energy by
incorporating IoT devices (such as sensors, actuators and smart meters), as
well as by providing the connectivity, automation and tracking for such
devices. In this paper, we provide a comprehensive survey on IoT-aided SG
systems, which includes the existing architectures, applications and prototypes
of IoT-aided SG systems. This survey also highlights the open issues,
challenges and future research directions for IoT-aided SG systems
A Generic Information and Consent Framework for the IoT
The Internet of Things (IoT) raises specific issues in terms of information
and consent, which makes the implementation of the General Data Protection
Regulation (GDPR) challenging in this context. In this report, we propose a
generic framework for information and consent in the IoT which is protective
both for data subjects and for data controllers. We present a high level
description of the framework, illustrate its generality through several
technical solutions and case studies, and sketch a prototype implementation
Locational wireless and social media-based surveillance
The number of smartphones and tablets as well as the volume of traffic generated by these devices has been growing constantly over the past decade and this growth is predicted to continue at an increasing rate over the next five years. Numerous native features built into contemporary smart devices enable highly accurate digital fingerprinting techniques. Furthermore, software developers have been taking advantage of locational capabilities of these devices by building applications and social media services that enable convenient sharing of information tied to geographical locations. Mass online sharing resulted in a large volume of locational and personal data being publicly available for extraction. A number of researchers have used this opportunity to design and build tools for a variety of uses â both respectable and nefarious. Furthermore, due to the peculiarities of the IEEE 802.11 specification, wireless-enabled smart devices disclose a number of attributes, which can be observed via passive monitoring. These attributes coupled with the information that can be extracted using social media APIs present an opportunity for research into locational surveillance, device fingerprinting and device user identification techniques. This paper presents an in-progress research study and details the findings to date
Context-aware Dynamic Discovery and Configuration of 'Things' in Smart Environments
The Internet of Things (IoT) is a dynamic global information network
consisting of Internet-connected objects, such as RFIDs, sensors, actuators, as
well as other instruments and smart appliances that are becoming an integral
component of the future Internet. Currently, such Internet-connected objects or
`things' outnumber both people and computers connected to the Internet and
their population is expected to grow to 50 billion in the next 5 to 10 years.
To be able to develop IoT applications, such `things' must become dynamically
integrated into emerging information networks supported by architecturally
scalable and economically feasible Internet service delivery models, such as
cloud computing. Achieving such integration through discovery and configuration
of `things' is a challenging task. Towards this end, we propose a Context-Aware
Dynamic Discovery of {Things} (CADDOT) model. We have developed a tool
SmartLink, that is capable of discovering sensors deployed in a particular
location despite their heterogeneity. SmartLink helps to establish the direct
communication between sensor hardware and cloud-based IoT middleware platforms.
We address the challenge of heterogeneity using a plug in architecture. Our
prototype tool is developed on an Android platform. Further, we employ the
Global Sensor Network (GSN) as the IoT middleware for the proof of concept
validation. The significance of the proposed solution is validated using a
test-bed that comprises 52 Arduino-based Libelium sensors.Comment: Big Data and Internet of Things: A Roadmap for Smart Environments,
Studies in Computational Intelligence book series, Springer Berlin
Heidelberg, 201
ANGELAH: A Framework for Assisting Elders At Home
The ever growing percentage of elderly people within modern societies poses welfare systems under relevant stress. In fact, partial and progressive loss of motor, sensorial, and/or cognitive skills renders elders unable to live autonomously, eventually leading to their hospitalization. This results in both relevant emotional and economic costs. Ubiquitous computing technologies can offer interesting opportunities for in-house safety and autonomy. However, existing systems partially address in-house safety requirements and typically focus on only elder monitoring and emergency detection. The paper presents ANGELAH, a middleware-level solution integrating both âelder monitoring and emergency detectionâ solutions and networking solutions. ANGELAH has two main features: i) it enables efficient integration between a variety of sensors and actuators deployed at home for emergency detection and ii) provides a solid framework for creating and managing rescue teams composed of individuals willing to promptly assist elders in case of emergency situations. A prototype of ANGELAH, designed for a case study for helping elders with vision impairments, is developed and interesting results are obtained from both computer simulations and a real-network testbed
- âŠ