269 research outputs found
Development of a virtual personal video recorder based on a set top box
Estágio realizado na Fraunhofer Portugal ResearchTese de mestrado integrado. Engenharia Electrotécnica e de Computadores (Major Telecomunicações). Faculdade de Engenharia. Universidade do Porto. 200
Recent advances in industrial wireless sensor networks towards efficient management in IoT
With the accelerated development of Internet-of- Things (IoT), wireless sensor networks (WSN) are gaining importance in the continued advancement of information and communication technologies, and have been connected and integrated with Internet in vast industrial applications. However, given the fact that most wireless sensor devices are resource constrained and operate on batteries, the communication overhead and power consumption are therefore important issues for wireless sensor networks design. In order to efficiently manage these wireless sensor devices in a unified manner, the industrial authorities should be able to provide a network infrastructure supporting various WSN applications and services that facilitate the management of sensor-equipped real-world entities. This paper presents an overview of industrial ecosystem, technical architecture, industrial device management standards and our latest research activity in developing a WSN management system. The key approach to enable efficient and reliable management of WSN within such an infrastructure is a cross layer design of lightweight and cloud-based RESTful web service
Generic and Parameterizable Service for Remote Configuration of Mobile Phones Using Near Field Communication
Os serviços nos nossos dispositivos móveis têm aumentado em número e complexidade nos últimos anos. Utilizadores menos experientes sentem dificuldade em tirar total partido destes serviços. De forma a atenuar este problema, é necessário encontrar novas e inovadoras formas que permitam assistir o utilizador no processo de configuração. Para além disso, vivemos numa sociedade do imediato. As pessoas querem que o acesso aos recursos seja rápido, simples e seguro. É também sabido que grande parte dos utilizadores são leigos no que diz respeito à utilização de funcionalidades avançadas dos dispositivos móveis, o que resulta em alguma inércia no uso de certas aplicações e funcionalidades.O Near Field Communication oferece uma oportunidade única para introduzir novos paradigmas de negócio no que diz respeito à interação e facilidade de utilização. Esta dissertação especifica um serviço genérico e parametrizável para a configuração remota de dispositivos.Mobile services have increased both in number and complexity in the past few years. This means that in order to get the most out of these services, less experienced users will have a hard time configuring them by hand. To address this issue, we must find new and innovative solutions to assist the user in this process. Furthermore, we live in a society of the immediate. Everyone wants access to resources to be fast, simple and secure. It is also known that most of the users are laymen when referring to advanced configuration of mobile phone, resulting in some inertia in the use of applications and functionalities.Near Field Communication (NFC) provides an unique opportunity to introduce new business paradigms in terms of interaction and ease of use. This dissertation specifies a generic and parameterizable service for remote configuration of mobile devices using Near Field Communication, which requires minimal user intervention
The Difference Adoption of E-Commerce Technology among Z and Y Generations
The rapid growth of e-commerce transactions among Y and Z generations in Indonesia goes along with the large number of internet users on both of the generations. Indonesia has become a potential market for the digital creative industry, especially to applications of online payments, online shopping, online booking, and online banking. In-depth investigations into these two generations in the form of developing e-commerce technology adoption models will provide valuable contributions in the development of models
and implementation of e-commerce industries in Indonesia. This study aims to obtain factors that influence the acceptance of generation Z and Y against e-commerce technology and reveal the differences in their acceptance of it. Investigation was done by collecting 343 questionnaires in age range of Y and Z generations. The results of this study reveal that all variables employing in the model naming Satisfaction, Trust, Perceived
Information Quality, Perceived Service Quality, Performance
Expectancy, Effort Expectancy, Hedonic Motivation, Social
Influence, Price Value, Habit, and Facilitating Conditions have statistically significantly correlation to Behavioral Intention and to each other. The significantly difference of adoption of ecommerce technology among Z and Y generations are only found on Hedonic Motivation and Social Influence. The other difference on gender is found on Age, Education, Satisfaction, Effort Expectancy, and Perceive Information Quality. This study can contribute to who have concern on enhance adopting of e-commerce technology especially to the
two generations, especially developers of e-commerce application considering the factors that have correlation
to intention to use e-commerce
Deploying traditional and smartphone app survey methods in measuring door-to-door travel satisfaction in eight European cities
This study describes the lessons learned from designing, deploying and analysing the results from different travel satisfaction survey tools which measures the travellers' door-to-door travel satisfaction. The travel satisfaction measurement survey tools tested consisted of two types of smartphone applications (a satellite navigation app and a game app), an on-line survey, a paper-based semi-structured questionnaire and a focus group questionnaire. Each of the measurement tools comprised the same set of basic questions, but in different formats, aimed at exploring the pros and cons of each tool among different groups of travellers. The data collection was carried out at eight different European cities and five FIA motorist networks. 5,275 valid responses were gathered from the survey. Further analysis results show that different survey methods performed better in different sites. The satisfaction that was gathered via main trip leg does not necessarily correspond with overall satisfaction of the door-to-door journey. The results of this study highlight the need for more inclusive, complete, door-to-door, travel survey measurements
Understanding consumer adoption of mobile payment in India: Extending Meta-UTAUT model with personal innovativeness, anxiety, trust, and grievance redressal
YesMobile payments are the future as we move towards a cashless society. In some markets, cash is already being replaced by digital transactions, but consumers of many developing countries are slower in transition towards digital payments. This study aims to identify major determinants of consumer mobile payment adoption in India the country with second largest mobile subscribers in the world. Existing mobile payments adoption studies have predominantly utilised Technology Acceptance Model (TAM), which was primarily developed in organisational context and criticised for having deterministic approach without much consideration for users’ individual characteristics. Therefore, this study adapted meta-UTAUT model with individual difference variable attitude as core construct and extended the model with consumer related constructs such as personal innovativeness, anxiety, trust, and grievance redressal. Empirical examination of the model among 491 Indian consumers revealed performance expectancy, intention to use, and grievance redressal as significant positive predictor of consumer use behaviour towards mobile payment. Moreover, intention to use was significantly influenced by attitude, social influence, and facilitating conditions. The major contribution of this study includes re-affirming the central role of attitude in consumer adoption studies and examining usage behaviour in contrast to most existing studies, which examine only behavioural intention
Android wear : usability guidelines, features and development of a prototype
Este trabajo fue desarrollado colaborando al Joint Open Lab de la compañĂa Telecom Italia. El desarrollo fue basado en la aplicaciĂłn Table Me, previamente desarrollada por el laboratorio. La aplicaciĂłn maneja el resultado de una partida de fĂştbol de mesa para cuatro jugadores. Las funcionalidades principales permiten trazar los resultados y estadĂsticas de los jugadores y sus partidas. Sin embargo el uso de la aplicaciĂłn es difĂcil para el creador de la partida (siendo un participante o no), dado que requiere tener el telĂ©fono en mano todo y prestar atenciĂłn a los resultados de los demás jugadores durante el juego (limitando la experiencia del usuario y adicionando complejiodad al juego).This project was developed with collaboratlon of the Joint Open Lab of the Telecom Italia Company. The development was based on the previous developed applicatĂon Table Me. This application was developed to manage the score of a table foosball match of four players. The main features allow to trace the results and statistics of each player and the matches where they were part of. However, the usage of the applicatĂon is difficult to the match s host (being a participant player or not), due that he/she require to have the moblle devlce on hand and keep track of the score of each four playees during the game (limiting user experience and adding (complexity to the game). To solve this main issue this thesis is focused on the development and integration of an Androtd Mobile application and an Android Wear application. that allow the usage of the same features of the previous Table Me applicatĂon in a smart watch. This will improve the players experience in the game, involving it to give its results during the match in a more precise and confortable way, from a click away in his/her smart watch without the necessity of using the mobile device. All this is integrated with the Table Me applicatĂon, to manage the communication between the smart watch and the mobile device. Moreover, giving a multiplayer interactive environment distributed between multiple devices.Ingeniero (a) de SistemasPregrad
Demystifying Internet of Things Security
Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Security Engine capabilities to simplify it. This book explores the challenges to secure these devices to make them immune to different threats originating from within and outside the network. The requirements and robustness rules to protect the assets vary greatly and there is no single blanket solution approach to implement security. Demystifying Internet of Things Security provides clarity to industry professionals and provides and overview of different security solutions What You'll Learn Secure devices, immunizing them against different threats originating from inside and outside the network Gather an overview of the different security building blocks available in Intel Architecture (IA) based IoT platforms Understand the threat pyramid, secure boot, chain of trust, and the software stack leading up to defense-in-depth Who This Book Is For Strategists, developers, architects, and managers in the embedded and Internet of Things (IoT) space trying to understand and implement the security in the IoT devices/platforms
Recommended from our members
Honeypots in the age of universal attacks and the Internet of Things
Today's Internet connects billions of physical devices. These devices are often immature and insecure, and share common vulnerabilities. The predominant form of attacks relies on recent advances in Internet-wide scanning and device discovery. The speed at which (vulnerable) devices can be discovered, and the device monoculture, mean that a single exploit, potentially trivial, can affect millions of devices across brands and continents.
In an attempt to detect and profile the growing threat of autonomous and Internet-scale attacks against the Internet of Things, we revisit honeypots, resources that appear to be legitimate systems. We show that this endeavour was previously limited by a fundamentally flawed generation of honeypots and associated misconceptions.
We show with two one-year-long studies that the display of warning messages has no deterrent effect in an attacked computer system. Previous research assumed that they would measure individual behaviour, but we find that the number of human attackers is orders of magnitude lower than previously assumed.
Turning to the current generation of low- and medium-interaction honeypots, we demonstrate that their architecture is fatally flawed. The use of off-the-shelf libraries to provide the transport layer means that the protocols are implemented subtly differently from the systems being impersonated. We developed a generic technique which can find any such honeypot at Internet scale with just one packet for an established TCP connection.
We then applied our technique and conducted several Internet-wide scans over a one-year period. By logging in to two SSH honeypots and sending specific commands, we not only revealed their configuration and patch status, but also found that many of them were not up to date. As we were the first to knowingly authenticate to honeypots, we provide a detailed legal analysis and an extended ethical justification for our research to show why we did not infringe computer-misuse laws.
Lastly, we present honware, a honeypot framework for rapid implementation and deployment of high-interaction honeypots. Honware automatically processes a standard firmware image and can emulate a wide range of devices without any access to the manufacturers' hardware. We believe that honware is a major contribution towards re-balancing the economics of attackers and defenders by reducing the period in which attackers can exploit vulnerabilities at Internet scale in a world of ubiquitous networked `things'.Premium Research Studentship, Department of Computer Science and Technology, University of Cambridg
- …