1,256 research outputs found

    SECURE INTERNET OF THINGS ONBOARDING USING PUBLIC KEY CRYPTOGRAPHY AND DIFFIE-HELLMAN INTEGRATED ENCRYPTION SCHEME

    Get PDF
    Techniques are described for using public key cryptography and blockchain methods to automatically and securely on-board Internet of Things (IOT) devices. This is an improvement over typical approaches in which IOT devices are on-boarded to Wi-Fi® networks with a pre-shared key that could be built-in or configured through out-of-band connectivity (e.g., Bluetooth®, Wi-Fi Protected Setup (WPS), etc.)

    Edge Computing Research Survey

    Get PDF
    In this paper, we present a survey in edge computing research

    Fostering Value Co-Creation in Incumbent Firms: The Case of Bosch’s IoT Ecosystem Landscape

    Get PDF
    The advent of the Internet of Things (IoT) forces incumbent firms to reshape their organizational structures toward platform ecosystems. However, prior research lacks concrete insights about how incumbent firms can foster value co-creation to become ecosystem orchestrators. In particular, it only sheds little light on the complex challenges incumbents face in designing and governing IoT platform ecosystems. In response, we present a single case study describing how the departments of Robert Bosch GmbH, a leading IoT company, overcame these challenges in three dimensions—IoT ecosystem, IoT platform, and value co-creation. We tie in our research with the existing body of literature, identify four prevailing tensions in ecosystem establishment, and provide actionable design and governance recommendations to resolve them

    Internet of Things Based Technology for Smart Home System: A Generic Framework

    Get PDF
    Internet of Things (IoT) is a technology which enables computing devices, physical and virtual objects/devices to be connected to the internet so that users can control and monitor devices. The IoT offers huge potential for development of various applications namely: e-governance, environmental monitoring, military applications, infrastructure management, industrial applications, energy management, healthcare monitoring, home automation and transport systems. In this paper, the brief overview of existing frameworks for development of IoT applications, techniques to develop smart home applications using existing IoT frameworks, and a new generic framework for the development of IoTbasedsmart home system is presented. The proposed generic framework comprises various modules such as Auto-Configuration and Management, Communication Protocol, Auto-Monitoring and Control, and Objects Access Control. The architecture of the new generic framework and the functionality of various modules in the framework are also presented. The proposed generic framework is helpful for making every house as smart house to increase the comfort of inhabitants. Each of the components of generic framework is robust in nature in providing services at any time. The components of smart home system are designed to take care of various issues such as scalability, interoperability, device adaptability, security and privacy. The proposed generic framework is designed to work on all vendor boards and variants of Linux and Windows operating system

    Secure collaboration in onboarding

    Get PDF
    The process of onboarding a company is characterized by inter-enterprise collaboration between the acquiring and the acquired companies. Multiple cross-functional teams are formed to assimilate and integrate the processes, products, data, customers, and partners of the company under acquisition. Dynamic access control management in such inter-enterprise collaboration is the subject of this thesis. A problem in inter-enterprise collaboration in onboarding is that information assets shared by collaborating teams are not adequately protected. As a result, there is potential for accidental or malicious leakage of sensitive business information like the intellectual property, product roadmaps and strategy, customer lists etc. Also, the statically defined access control policies are not sufficient to address access control requirements of dynamic collaboration where there is a constant change in people, processes, and information assets in collaboration repository. This research proposes a new approach and model to integrate security in onboarding collaboration process. Research methods such as, literature review, field studies including direct experiential projects in onboarding and interviews with experts in Mergers and Acquisitions, and detailed data collection and analysis through surveys are used to identify the issues that need to be addressed in the onboarding process. Literature review enabled the identification of access control requirements from the perspective of statically defined policies and the need to determine access dynamically. From the field studies, it was deciphered that there is a need for a well-defined onboarding collaboration process. The data analysis and interpretation from the survey results provided insights into the needs for integrating security in all phases of onboarding collaboration. All these research methods essentially enabled identification of two key issues that this research addresses: 1) well-defined onboarding collaboration process and 2) building security in all phases of onboarding collaboration. A new approach and model called SCODA is developed to integrate security in all phases of onboarding collaboration. Onboarding collaboration process consists of four phases: create, operate, dissolve, and archive. These phases provide the basis for systematically addressing security and access control when the collaboration team is formed, while it is operating, when the team is dissolved after completing its tasks, and when shared information assets are archived. The research adapts role based access control (RBAC) and formally defines the enterprise, functional, and collaboration roles for making access control management decisions. New ideas are developed in trustbased access control management in dynamic collaboration. The change management aspects are also discussed. The SCODA model is validated and the refinements incorporated accordingly. This research contributed to both theory and practice of information security in general and access control in particular in the context of dynamic collaboration. It proposed a new approach of building security in, i.e. to integrate security in all phases of collaboration. In order to build security in, a new onboarding collaboration process is developed that is adaptable and customizable. It has also developed a new approach for trust based dynamic access control based on the new concepts of strong and weak trust relationships. These trust relationships are also adaptable and customizable. Finally, this research has potential for future research work in the design and implementation of multi-paradigm based enterprise security frameworks and interenterprise collaboration

    An Energy-Efficient Scheme for IoT Networks

    Get PDF
    With the advent of the Internet of Things era, "things-things interconnection" has become a new concept, that is, through the informatization and networking of the physical world, the traditionally separated physical world and the information world are interconnected and integrated. Different from the concept of connecting people in the information world in the Internet, the Internet of Things extends its tentacles to all aspects of the physical world. The proposed algorithm considers the periodical uplink data transmission in IEEE 802.11ah LWPAN and a real-time raw settings method is used. The uplink channel resources were divided into Beacon periods after the multiple nodes send data to the access point. First, the access point predicted the next data uploading time during the Beacon period. In the next Beacon period, the total number of devices that will upload data is predicted. Then, the optimal read-and-write parameters were calculated for minimum energy cost and broadcasted such information to all nodes. After this, the data is uploaded according the read-and-write scheduling by all the devices. Simulation results show that the proposed algorithm effectively improved the network state prediction accuracy and dynamically adjusted the configuration parameters which results in improved network energy efficiency in the IoT environment

    Knowledge Sharing and Customer Relations in Mobility

    Get PDF
    After the events of September 11, 2001, inadequacies in how government organizations and agencies shared knowledge and communication with defense mission partners became readily apparent. A reasonable U.S. government information technology expectation is the integrated use of mobile phones across organizations and agencies. Yet, it is difficult to meet this expectation, as the provisioning process for mobile devices can be different for each government organization or agency. The Department of Commerce National Institute of Standards and Technology does not set provisioning standards, and organizations and agencies determine policies tailored to their particular needs. Using Schein\u27s theory on organizational culture, the focus of this phenomenological study was to explore the Mobility provisioning process from the experiences of government customer support personnel. Eleven personnel responded to 10 semistructured interview questions derived from the research question. The data were manually transcribed and then coded, arranged, and analyzed using a software tool. Three major themes emerged from the analyzed data: (a) expand communication with customers and leaders, (b) identify policy guidelines, and (c) streamline and centralize the process. Using these themes, recommendations include enhancing communication among stakeholders, provisioners, and Warfighters, soldiers in the field; implementing standardized user policies; and improving cross-organization and cross-agency provisioning processes. Social change actions include increasing mobility provisioning efficiencies among provisioners, which not only saves time and money, but also provides Warfighters with affordable, dependable, and reliable mobile communications systems

    Demystifying Internet of Things Security

    Get PDF
    Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Security Engine capabilities to simplify it. This book explores the challenges to secure these devices to make them immune to different threats originating from within and outside the network. The requirements and robustness rules to protect the assets vary greatly and there is no single blanket solution approach to implement security. Demystifying Internet of Things Security provides clarity to industry professionals and provides and overview of different security solutions What You'll Learn Secure devices, immunizing them against different threats originating from inside and outside the network Gather an overview of the different security building blocks available in Intel Architecture (IA) based IoT platforms Understand the threat pyramid, secure boot, chain of trust, and the software stack leading up to defense-in-depth Who This Book Is For Strategists, developers, architects, and managers in the embedded and Internet of Things (IoT) space trying to understand and implement the security in the IoT devices/platforms

    Network Function Virtualization technologies applied to cellular systems

    Get PDF
    Future 5G networks will exploit the inherent flexibility associated to the introduction of Network Function Virtualization (NFV) technologies in both the core network and even the Radio Access Network (RAN) through the software implementation of network functions running on general purpose computing/storage resources. The advent of the NFV paradigm provides an inherent capability to add new functionalities, extend, upgrade or evolve existing functionalities and to customize the network on a per-tenant basis. In this context, this work intends to make an analysis of the cuFuture 5G networks open a new spectrum of possibilities, both at the level of services it can offer, and at the level of its deployment. This thesis aims to make a study of some of the technologies that make possible the arrival of 5G, such as virtualization and virtualization applied to networks, NFV. In order to better understand the defined standard for NFV, the analysis of market NFV-MANO available tools is included. In addition, the study and evaluation of the deployment process of a virtualized 5G network scenario has been performed with HPE NFV Director
    • …
    corecore