6,202 research outputs found
Sensing as a Service Model for Smart Cities Supported by Internet of Things
The world population is growing at a rapid pace. Towns and cities are
accommodating half of the world's population thereby creating tremendous
pressure on every aspect of urban living. Cities are known to have large
concentration of resources and facilities. Such environments attract people
from rural areas. However, unprecedented attraction has now become an
overwhelming issue for city governance and politics. The enormous pressure
towards efficient city management has triggered various Smart City initiatives
by both government and private sector businesses to invest in ICT to find
sustainable solutions to the growing issues. The Internet of Things (IoT) has
also gained significant attention over the past decade. IoT envisions to
connect billions of sensors to the Internet and expects to use them for
efficient and effective resource management in Smart Cities. Today
infrastructure, platforms, and software applications are offered as services
using cloud technologies. In this paper, we explore the concept of sensing as a
service and how it fits with the Internet of Things. Our objective is to
investigate the concept of sensing as a service model in technological,
economical, and social perspectives and identify the major open challenges and
issues.Comment: Transactions on Emerging Telecommunications Technologies 2014
(Accepted for Publication
Semantic discovery and reuse of business process patterns
Patterns currently play an important role in modern information systems (IS) development and their use has mainly been restricted to the design and implementation phases of the development lifecycle. Given the increasing significance of business modelling in IS development, patterns have the potential of providing a viable solution for promoting reusability of recurrent generalized models in the very early stages of development. As a statement of research-in-progress this paper focuses on business process patterns and proposes an initial methodological framework for the discovery and reuse of business process patterns within the IS development lifecycle. The framework borrows ideas from the domain engineering literature and proposes the use of semantics to drive both the discovery of patterns as well as their reuse
THE END-CUSTOMER’S PERCEPTION ABOUT THE ELECTRONIC PRODUCT CODE (EPC) AT A RETAILER
The concept involves an active or more likely passive RFID data tag that stores information on the product that can easily be retrieved by a reader system. Therefore entities in the supply can identify a pallet, a case and increasingly, as the prices of the tag drop even individual products. The consequence will be that the supply chain will become more transparent, since products can be tracked individually. If a product disappears for any reason or is misrouted, the discrepancy can be located immediately.1 Heavy loss generated by theft and poor planning can be minimized and wholesalers can offer their products with a much better service. Over the last twenty years the barcode has been indicating the characteristics of a consumer products’ specific category. This has been sufficient for many years, but since markets are more dynamic than ever before companies have to adapt quickly to the changing environment. Therefore the Electronic Product Code (EPC), which will be first introduced in 2008, will definitely change the existing business habits and procedures from the ground. According to the consumer industry and their objectives, inefficiencies in the supply chain will be removed and costs can be decreased, which will finally benefit the end-customer. However on the other hand, there are a number of concerns the consumer industry as well as the end-customer needs to face: the EPC-technology requires a new infrastructure and organization that will cause huge expenses into the logistic.2 Regarding privacy issues many consumers reject the new technology so far and companies will have a hard job on convincing them of the great overall value. As trends in the industry have shown, the EPC technology will have an enormous impact on mass products and on a variety of items. The end customers’ acceptance of the Electronic Product Code will become essential, whether all the efforts done in the research and development will finally pay off. This paper presents the results of an exploratory study about the consumers’ perception regarding the EPC-technology and how it could affect their purchase habits; the study focused on consumers of a specific supermarket chain (HEB in Monterrey, Mexico) I will thanks to the master students for your collaboration in this empirical study . An already existing research study about the US end-customer perception regarding the EPC technology was conducted by Capgemini in October 2003 and served as an outline for this project in order to better compare the final results.customer; product; code; retailer; perception
Efficient and Low-Cost RFID Authentication Schemes
Security in passive resource-constrained Radio Frequency Identification
(RFID) tags is of much interest nowadays. Resistance against illegal tracking,
cloning, timing, and replay attacks are necessary for a secure RFID
authentication scheme. Reader authentication is also necessary to thwart any
illegal attempt to read the tags. With an objective to design a secure and
low-cost RFID authentication protocol, Gene Tsudik proposed a timestamp-based
protocol using symmetric keys, named YA-TRAP*. Although YA-TRAP* achieves its
target security properties, it is susceptible to timing attacks, where the
timestamp to be sent by the reader to the tag can be freely selected by an
adversary. Moreover, in YA-TRAP*, reader authentication is not provided, and a
tag can become inoperative after exceeding its pre-stored threshold timestamp
value. In this paper, we propose two mutual RFID authentication protocols that
aim to improve YA-TRAP* by preventing timing attack, and by providing reader
authentication. Also, a tag is allowed to refresh its pre-stored threshold
value in our protocols, so that it does not become inoperative after exceeding
the threshold. Our protocols also achieve other security properties like
forward security, resistance against cloning, replay, and tracking attacks.
Moreover, the computation and communication costs are kept as low as possible
for the tags. It is important to keep the communication cost as low as possible
when many tags are authenticated in batch-mode. By introducing aggregate
function for the reader-to-server communication, the communication cost is
reduced. We also discuss different possible applications of our protocols. Our
protocols thus capture more security properties and more efficiency than
YA-TRAP*. Finally, we show that our protocols can be implemented using the
current standard low-cost RFID infrastructures.Comment: 21 pages, Journal of Wireless Mobile Networks, Ubiquitous Computing,
and Dependable Applications (JoWUA), Vol 2, No 3, pp. 4-25, 201
The Internet-of-Things Meets Business Process Management: Mutual Benefits and Challenges
The Internet of Things (IoT) refers to a network of connected devices
collecting and exchanging data over the Internet. These things can be
artificial or natural, and interact as autonomous agents forming a complex
system. In turn, Business Process Management (BPM) was established to analyze,
discover, design, implement, execute, monitor and evolve collaborative business
processes within and across organizations. While the IoT and BPM have been
regarded as separate topics in research and practice, we strongly believe that
the management of IoT applications will strongly benefit from BPM concepts,
methods and technologies on the one hand; on the other one, the IoT poses
challenges that will require enhancements and extensions of the current
state-of-the-art in the BPM field. In this paper, we question to what extent
these two paradigms can be combined and we discuss the emerging challenges
Big Data and the Internet of Things
Advances in sensing and computing capabilities are making it possible to
embed increasing computing power in small devices. This has enabled the sensing
devices not just to passively capture data at very high resolution but also to
take sophisticated actions in response. Combined with advances in
communication, this is resulting in an ecosystem of highly interconnected
devices referred to as the Internet of Things - IoT. In conjunction, the
advances in machine learning have allowed building models on this ever
increasing amounts of data. Consequently, devices all the way from heavy assets
such as aircraft engines to wearables such as health monitors can all now not
only generate massive amounts of data but can draw back on aggregate analytics
to "improve" their performance over time. Big data analytics has been
identified as a key enabler for the IoT. In this chapter, we discuss various
avenues of the IoT where big data analytics either is already making a
significant impact or is on the cusp of doing so. We also discuss social
implications and areas of concern.Comment: 33 pages. draft of upcoming book chapter in Japkowicz and Stefanowski
(eds.) Big Data Analysis: New algorithms for a new society, Springer Series
on Studies in Big Data, to appea
- …