19,645 research outputs found
Responsibility and non-repudiation in resource-constrained Internet of Things scenarios
The proliferation and popularity of smart
autonomous systems necessitates the development
of methods and models for ensuring the effective
identification of their owners and controllers. The aim
of this paper is to critically discuss the responsibility of
Things and their impact on human affairs. This starts
with an in-depth analysis of IoT Characteristics such
as Autonomy, Ubiquity and Pervasiveness. We argue
that Things governed by a controller should have an
identifiable relationship between the two parties and
that authentication and non-repudiation are essential
characteristics in all IoT scenarios which require
trustworthy communications. However, resources can
be a problem, for instance, many Things are designed
to perform in low-powered hardware. Hence, we also
propose a protocol to demonstrate how we can achieve the
authenticity of participating Things in a connectionless
and resource-constrained environment
A two-way interactive broadband satellite architecture to break the digital divide barrier
September 24-26, 2007, Turin, Ital
TV-Centric technologies to provide remote areas with two-way satellite broadband access
October 1-2, 2007, Rome, Italy TV-Centric Technologies To Provide Remote Areas With Two-Way Satellite Broadband Acces
TechNews digests: Jan - Nov 2009
TechNews is a technology, news and analysis service aimed at anyone in the education sector keen to stay informed about technology developments, trends and issues. TechNews focuses on emerging technologies and other technology news. TechNews service : digests september 2004 till May 2010 Analysis pieces and News combined publish every 2 to 3 month
Recommended from our members
Information Society Strategies in the European Context: The Case of Greece
This article sets out to analyze the policies adopted by the Greek government in its effort to accelerate the pace of reform towards a knowledge-based economy. These policies have to take into account the position that the country occupies within the emerging information society and, of course, the opportunities created by EU initiatives that aim to promote economic competitiveness and reduce regional disparities. Within this framework Greek policy makers have recognized the need for a coordinated, coherent and integrated approach, which attempts to diminish inequalities both within the country and with respect to other European Union economies. What emerges as a distinctive feature of the Greek information society strategy is the emphasis placed on the pivotal role of the state and the adoption of active interventionist policies
Denial of service attacks and challenges in broadband wireless networks
Broadband wireless networks are providing internet and related services to end users. The three most important broadband wireless technologies are IEEE 802.11, IEEE 802.16, and
Wireless Mesh Network (WMN). Security attacks and
vulnerabilities vary amongst these broadband wireless networks because of differences in topologies, network operations and physical setups. Amongst the various security risks, Denial of Service (DoS) attack is the most severe security threat, as DoS can compromise the availability and integrity of broadband
wireless network. In this paper, we present DoS attack issues in broadband wireless networks, along with possible defenses and future directions
Conceivable security risks and authentication techniques for smart devices
With the rapidly escalating use of smart devices and fraudulent transaction of usersâ data from their devices, efficient and reliable techniques for authentication of the smart devices have become an obligatory issue. This paper reviews the security risks for mobile devices and studies several authentication techniques available for smart devices. The results from field studies enable a comparative evaluation of user-preferred authentication mechanisms and their opinions about reliability, biometric authentication and visual authentication techniques
An e-learning platform for delivering educational contents in a school environment
Learning is a continuous process, without end, which takes place throughout life, and is the result of the interaction of an individual with a physical external environment, a social context or with herself. In what new technologies may help improving and making more effective the interaction of an individual during his learning process? This paper describes the use of a platform for delivering educational contents to students, to put theories into practice through the use of an LMS and highlight the strengths and weaknesses that have these learning tools in a school environment, in which - besides its formative aspect - upbringing is important.learning management system, digital contents.
- âŠ