358,006 research outputs found

    Community-Based Security for the Internet of Things

    Full text link
    With more and more devices becoming connectable to the internet, the number of services but also a lot of threats increases dramatically. Security is often a secondary matter behind functionality and comfort, but the problem has already been recognized. Still, with many IoT devices being deployed already, security will come step-by-step and through updates, patches and new versions of apps and IoT software. While these updates can be safely retrieved from app stores, the problems kick in via jailbroken devices and with the variety of untrusted sources arising on the internet. Since hacking is typically a community effort? these days, security could be a community goal too. The challenges are manifold, and one reason for weak or absent security on IoT devices is their weak computational power. In this chapter, we discuss a community based security mechanism in which devices mutually aid each other in secure software management. We discuss game-theoretic methods of community formation and light-weight cryptographic means to accomplish authentic software deployment inside the IoT device community

    Critical Controlling for the Network Security and Privacy Based on Blockchain Technology: A Fuzzy DEMATEL Approach

    Get PDF
    The Internet of Things (IoT) has been considered in various fields in the last decade. With the increasing number of IoT devices in the community, secure, accessible, and reliable infrastructure for processing and storing computed data has become necessary. Since traditional security protocols are unsuitable for IoT devices, IoT implementation is fraught with privacy and security challenges. Thus, blockchain technology has become an effective solution to the problems of IoT security. Blockchain is an empirical data distribution and storage model involving point-to-point transmission, consensus mechanism, asymmetric encryption, smart contract, and other computer technologies. Security and privacy are becoming increasingly important in using the IoT. Therefore, this study provides a comprehensive framework for classifying security criteria based on blockchain technology. Another goal of the present study is to identify causal relationship factors for the security issue using the Fuzzy Decision-Making Trial-and-Evaluation Laboratory (FDEMATEL) approach. In order to deal with uncertainty in human judgment, fuzzy logic is considered an effective tool. The present study’s results show the proposed approach’s efficiency. Authentication (CR6), intrusion detection (CR4), and availability (CR5) were also introduced as the most effective and essential criteria, respectively

    Research Agenda in Intelligent Infrastructure to Enhance Disaster Management, Community Resilience and Public Safety

    Full text link
    Modern societies can be understood as the intersection of four interdependent systems: (1) the natural environment of geography, climate and weather; (2) the built environment of cities, engineered systems, and physical infrastructure; (3) the social environment of human populations, communities and socio-economic activities; and (4) an information ecosystem that overlays the other three domains and provides the means for understanding, interacting with, and managing the relationships between the natural, built, and human environments. As the nation and its communities become more connected, networked and technologically sophisticated, new challenges and opportunities arise that demand a rethinking of current approaches to public safety and emergency management. Addressing the current and future challenges requires an equally sophisticated program of research, technology development, and strategic planning. The design and integration of intelligent infrastructure-including embedded sensors, the Internet of Things (IoT), advanced wireless information technologies, real-time data capture and analysis, and machine-learning-based decision support-holds the potential to greatly enhance public safety, emergency management, disaster recovery, and overall community resilience, while addressing new and emerging threats to public safety and security. Ultimately, the objective of this program of research and development is to save lives, reduce risk and disaster impacts, permit efficient use of material and social resources, and protect quality of life and economic stability across entire regions.Comment: A Computing Community Consortium (CCC) white paper, 4 page

    BECA: A Blockchain-Based Edge Computing Architecture for Internet of Things Systems

    Get PDF
    The scale of Internet of Things (IoT) systems has expanded in recent times and, in tandem with this, IoT solutions have developed symbiotic relationships with technologies, such as edge Computing. IoT has leveraged edge computing capabilities to improve the capabilities of IoT solutions, such as facilitating quick data retrieval, low latency response, and advanced computation, among others. However, in contrast with the benefits offered by edge computing capabilities, there are several detractors, such as centralized data storage, data ownership, privacy, data auditability, and security, which concern the IoT community. This study leveraged blockchain’s inherent capabilities, including distributed storage system, non-repudiation, privacy, security, and immutability, to provide a novel, advanced edge computing architecture for IoT systems. Specifically, this blockchain-based edge computing architecture addressed centralized data storage, data auditability, privacy, data ownership, and security. Following implementation, the performance of this solution was evaluated to quantify performance in terms of response time and resource utilization. The results show the viability of the proposed and implemented architecture, characterized by improved privacy, device data ownership, security, and data auditability while implementing decentralized storage

    ASPECTS OF LEGAL PROTECTION FOR CHILDREN FROM CYBERCRIME

    Get PDF
    The 21st century has progressed further. As in Indonesia, currently, the development of technology is increasingly rapid. This certainly affects aspects of social life in society and its security. Today's threats are not only enemies in the military, but also non-military. Among them are the threats faced by internet users, the penetration rate shows a high cumulation, opening up opportunities for the emergence of cyber-based crimes. The development of infrastructure is in line with the development of technology. Increasingly sophisticated technology is not only used by the community for positive things. However, not a few are taking advantage of technological sophistication to reap benefits that result in losses for technology users themselves. This study aims to research, examine how legal protection for children from cybercrime. In this case, children become vulnerable to cybercrime in digital era. Why is that? Considering that the control for internet access, as well as legal products in Indonesia, cannot yet fully guarantee protection for victims of cybercrime. The method used in this research is to use the descriptive analysis approach. Assessing and analyzing legal protection for children from cybercrime based on legal theories and applicable laws and regulations. Besides, it also reveals the phenomena of the current situation in the community

    The new communication network for an internet of everything based security/safety/general management/visitor's services for the Papal Basilica and Sacred Convent of Saint Francis in Assisi, Italy

    Get PDF
    © 2017 IEEE.The Papal Basilica and the Sacred Convent of St. Francis in Assisi, Italy together represent a unique and specific cultural heritage site where the mortal remains of St. Francis have been housed since 1230 AD. Millions of pilgrims and visitors from all over the world visit this site each year. In 2000 AD, together with other Franciscan sites in the surrounding area, it achieved UNESCO World Heritage status. Unique and complex cultural heritage sites, such as this, require a significant effort to ensure visitor security and safety. Along with such needs are cultural heritage preservation and protection as well as accessibility for visitors, with particular reference to visitors with disabilities, and for personnel normally present for site management, including the Friar's community. These aims can be achieved using integrated systems and innovative technologies, such as Internet of Everything (IoE) which can connect people, things (mobile terminals, smart sensors, devices, actuators; wearable devices; etc.), data/information/knowledge and particular processes. The purpose of this paper is to illustrate the methodology and show the results obtained from the study and the design of a new communication network for Internet of Everything based security/safety/general management and visitors' services of the Papal Basilica and Sacred Convent of Saint Francis in Assisi
    • …
    corecore