48 research outputs found

    Secure Computations in Opportunistic Networks: An Edgelet Demonstration with a Medical Use-Case

    Get PDF
    International audienceIn this demonstration paper, we leverage the current convergence between Trusted Execution Environments and Opportunistic Networks to perform secure and privacy-preserving computations on personal devices. We call this convergence Edgelet computing and show that it can drastically change the way distributed processing over personal data is conceived. We demonstrate the pertinence of the approach through a real medical use-case being deployed in the field

    Characteristic Formulae: From Automata to Logic

    Get PDF
    This paper discusses the classic notion of characteristic formulae for processes using variations on Hennessy-Milner logic as the underlying logical specification language. It is shown how to characterize logically (states of) finite labelled transition systems modulo bisimilarity using a single formula in Hennessy-Milner logic with recursion. Moreover, characteristic formulae for timed automata with respect to timed bisimilarity and the faster-than preorder of Moller and Tofts are offered in terms of the logic L_nu of Laroussinie, Larsen and Weise

    Internet of Vehicles and Autonomous Connected Car - Privacy and Security Issues

    Full text link
    In the Intelligent Vehicle Grid, the car is becoming a formidable sensor platform, absorbing information from the environment, from other cars (and from the driver) and feeding it to other cars and infrastructure to assist in safe navigation, pollution control and traffic management. The Vehicle Grid essentially becomes an Internet of Things (IOT), which we call Internet of Vehicles (IOV), capable to make its own decisions about driving customers to their destinations. Like other important IOT examples (e.g., smart buildings), the Internet of Vehicles will not merely upload data to the Internet using V2I. It will also use V2V communications between peers to complement on board sensor inputs and provide safe and efficient navigation. In this paper, we first describe several vehicular applications that leverage V2V and V2I. Communications with infrastructure and with other vehicles, however, can create privacy and security violations. In the second part of the paper we address these issues and more specifically focus on the need to guarantee location privacy to mobile users. We argue on the importance of creating public, open ``smart city" data repositories for the research community and propose privacy preserving techniques for the anonymous uploading of urban sensor data from vehicles
    corecore