5,487 research outputs found

    IoTSan: Fortifying the Safety of IoT Systems

    Full text link
    Today's IoT systems include event-driven smart applications (apps) that interact with sensors and actuators. A problem specific to IoT systems is that buggy apps, unforeseen bad app interactions, or device/communication failures, can cause unsafe and dangerous physical states. Detecting flaws that lead to such states, requires a holistic view of installed apps, component devices, their configurations, and more importantly, how they interact. In this paper, we design IoTSan, a novel practical system that uses model checking as a building block to reveal "interaction-level" flaws by identifying events that can lead the system to unsafe states. In building IoTSan, we design novel techniques tailored to IoT systems, to alleviate the state explosion associated with model checking. IoTSan also automatically translates IoT apps into a format amenable to model checking. Finally, to understand the root cause of a detected vulnerability, we design an attribution mechanism to identify problematic and potentially malicious apps. We evaluate IoTSan on the Samsung SmartThings platform. From 76 manually configured systems, IoTSan detects 147 vulnerabilities. We also evaluate IoTSan with malicious SmartThings apps from a previous effort. IoTSan detects the potential safety violations and also effectively attributes these apps as malicious.Comment: Proc. of the 14th ACM CoNEXT, 201

    Critical success factors of total quality management in autonomous driving business models

    Get PDF
    Autonomous driving is undoubtedly one of the most strategically relevant and financially promising developing industries. The requirements for autonomous driving systems’ reliability are dramatically higher than in the driver-based car industry. This study explores a model to identify the structure and evaluate the critical success factors (CSFs) of total quality management (TQM) in the autonomous driving industry. Fifteen CSFs are defined according to the expected ecosystem of autonomous driving. VDA and IATF 16,949 quality systems are used as starting points for deriving the CSFs for an autonomous driving TQM system (AD-TQM). The CSFs are integrated into a framework to reveal their effects and interdependencies. The framework is qualitatively empirically tested and designed to be employed as a model for future (quantitative empirical) research

    CAPABILITIES FOR DATA ANALYTICS IN INDUSTRIAL INTERNET OF THINGS (IIOT)

    Get PDF
    The use of Industrial Internet of Things (IIoT) technologies in various industrial sectors has resulted in the generation of large volumes of data that can be analyzed using analytics tools to improve firm performance. However, there is a gap in our understanding of the capabilities that companies need to create business value through data analytics in IIoT environments. Although previous research has extensively investigated general data analytics capabilities, the literature on these capabilities cannot be simply transferred to IIoT settings due to the unique characteristics of the IIoT. In this paper, we aim to contribute to our understanding of this phenomenon by identifying the capabilities required for IIoT data analytics. Firstly, we identify data analytics capabilities from existing literature. Next, we investigate the relevance of these capabilities in the context of IIoT, while also identifying novel capabilities that are specific to IIoT, by conducting 16 expert interviews within nine organizations. We identify a set of 24 capabilities for data analytics in IIoT, which we classify into an integrative framework. The proposed framework can assist industrial companies dealing with the complexities and uncertainties associated with IIoT data analytics initiatives

    A critical review of intrusion detection systems in the internet of things : techniques, deployment strategy, validation strategy, attacks, public datasets and challenges

    Get PDF
    The Internet of Things (IoT) has been rapidly evolving towards making a greater impact on everyday life to large industrial systems. Unfortunately, this has attracted the attention of cybercriminals who made IoT a target of malicious activities, opening the door to a possible attack on the end nodes. To this end, Numerous IoT intrusion detection Systems (IDS) have been proposed in the literature to tackle attacks on the IoT ecosystem, which can be broadly classified based on detection technique, validation strategy, and deployment strategy. This survey paper presents a comprehensive review of contemporary IoT IDS and an overview of techniques, deployment Strategy, validation strategy and datasets that are commonly applied for building IDS. We also review how existing IoT IDS detect intrusive attacks and secure communications on the IoT. It also presents the classification of IoT attacks and discusses future research challenges to counter such IoT attacks to make IoT more secure. These purposes help IoT security researchers by uniting, contrasting, and compiling scattered research efforts. Consequently, we provide a unique IoT IDS taxonomy, which sheds light on IoT IDS techniques, their advantages and disadvantages, IoT attacks that exploit IoT communication systems, corresponding advanced IDS and detection capabilities to detect IoT attacks. © 2021, The Author(s)

    Data Sharing Within Connected Business Ecosystems

    Get PDF

    Business Case and Technology Analysis for 5G Low Latency Applications

    Get PDF
    A large number of new consumer and industrial applications are likely to change the classic operator's business models and provide a wide range of new markets to enter. This article analyses the most relevant 5G use cases that require ultra-low latency, from both technical and business perspectives. Low latency services pose challenging requirements to the network, and to fulfill them operators need to invest in costly changes in their network. In this sense, it is not clear whether such investments are going to be amortized with these new business models. In light of this, specific applications and requirements are described and the potential market benefits for operators are analysed. Conclusions show that operators have clear opportunities to add value and position themselves strongly with the increasing number of services to be provided by 5G.Comment: 18 pages, 5 figure
    • …
    corecore