10 research outputs found

    Evaluation of Anonymized ONS Queries

    Full text link
    Electronic Product Code (EPC) is the basis of a pervasive infrastructure for the automatic identification of objects on supply chain applications (e.g., pharmaceutical or military applications). This infrastructure relies on the use of the (1) Radio Frequency Identification (RFID) technology to tag objects in motion and (2) distributed services providing information about objects via the Internet. A lookup service, called the Object Name Service (ONS) and based on the use of the Domain Name System (DNS), can be publicly accessed by EPC applications looking for information associated with tagged objects. Privacy issues may affect corporate infrastructures based on EPC technologies if their lookup service is not properly protected. A possible solution to mitigate these issues is the use of online anonymity. We present an evaluation experiment that compares the of use of Tor (The second generation Onion Router) on a global ONS/DNS setup, with respect to benefits, limitations, and latency.Comment: 14 page

    A privacy gap around the internet of things for open-source projects

    Get PDF
    The Internet of Things (IoT) is having a more important role in the everyday lives of people. The distribution of connectivity across social and personal interaction discloses personalised information and gives access to a sphere of sensitivities that were previously masked. Privacy measures and security to protect personal sensitivities are weak and in their infancy. In this paper we review the issue of privacy in the context of IoT open-source projects, and the IoT security concerns. A proposal is made to create a privacy bubble around the interoperability of devices and systems and a filter layer to mitigate the exploitation of personal and private information by marketing companies

    Valuation of online social networks - An economic model and its application using the case of Xing.com

    Get PDF
    Ubiquitous information technologies like RFID allow for immediate, extensive and fine-grained capture of real world information. Scalable and efficient networks for exchange of this vast amount of information amongst companies are crucial for the economic exploitation of benefits of ubiquitous information technologies. Existing networks bear several limitations like risks of single-point-offailures or bottlenecks, unequally distributed power and burdens as well as inflexibility through stringent structures and formats. In particular there is a need for improving the scalability of solutions and ensuring autonomy of network participants. In this paper we introduce a Peer-to-Peer-based architecture for exchanging distributed information, which are shared among participants of a supply chain facilitated with ubiquitous information technologies. This architecture builds on the wellestablished EPCglobal standards, but can be implemented as an autonomous network. Unlike other architectures it does not need central coordination mechanisms, because it is based on self-organizing Peer-to-Peer protocols. We argue that our architecture supports business processes especially of small and medium-sized enterprises better than other architectures. We provide a discussion about requirements for solutions and a simulation-based analysis of the proposed architecture

    RFID in the Cloud: A Service for High-Speed Data Access in Distributed Value Chains

    Get PDF
    Radio-Frequency Identification (RFID) is emerging as an important technology for exchanging information about physical objects along distributed value chains. The influential standardization organization EPCglobal has released standards for RFID-based data exchange that follow the data-on-network paradigm. Here, the business-relevant object data is provided by network services, whereas RFID tags are only used to carry a reference number for data retrieval via the Internet. However, as we show in this paper, this paradigm can result in long response times for data access. We present experiments that explore what factors impact the response times and identify obstacles in current architectures. Based on these analyses, we designed a cloud-based service that realizes high-speed data access for data-on-network solutions. We further present simulation experiments analyzing the benefits of our cloud-based concept with regards to fast RFID-data access and reduced infrastructure cost through scale effects

    The Virtual Object as a Major Element of the Internet of Things: a Survey

    Get PDF
    The Internet of Things (IoT) paradigm has been evolving toward the creation of a cyber-physical world where everything can be found, activated, probed, interconnected, and updated, so that any possible interaction, both virtual and/or physical, can take place. A Crucial concept of this paradigm is that of the virtual object, which is the digital counterpart of any real (human or lifeless, static or mobile, solid or intangible) entity in the IoT. It has now become a major component of the current IoT platforms, supporting the discovery and mash up of services, fostering the creation of complex applications, improving the objects energy management efficiency, as well as addressing heterogeneity and scalability issues. This paper aims at providing the reader with a survey of the virtual object in the IoT world. Virtualness is addressed from several perspectives: historical evolution of its definitions, current functionalities assigned to the virtual object and how they tackle the main IoT challenges, and major IoT platforms, which implement these functionalities. Finally, we illustrate the lessons learned after having acquired a comprehensive view of the topic

    Internet of Things and Artificial Vision, Performance and Applications: Literature Review

    Get PDF
    Internet of Things (or also known as IoT) is one of the technologies most named today because of the ability it envisages to connect all kinds of devices to the Internet. If to the potentialities of IoT we add another technology of high impact as It is the Artificial Vision we have a wide field of innovative applications, where the processing of images and video in real time allow the visualization of large amounts of data on the Internet. The main applications developed with IoT and Artificial Vision can be implemented in education, medicine, intelligent buildings, surveillance systems of people and vehicles, among others. This type of applications improves the quality of life of users, however, for their development an infrastructure is required that allows the convergence of different protocols and devices, but in a special way that can handle the different phases of the acquisition of images. In this work, a review of the beginnings, concepts, technologies and applications related to the Artificial Vision with the Internet of Things has been carried out to be able to understand in a precise way the impact of its application in daily life

    The Proceedings of 14th Australian Information Security Management Conference, 5-6 December 2016, Edith Cowan University, Perth, Australia

    Get PDF
    The annual Security Congress, run by the Security Research Institute at Edith Cowan University, includes the Australian Information Security and Management Conference. Now in its fourteenth year, the conference remains popular for its diverse content and mixture of technical research and discussion papers. The area of information security and management continues to be varied, as is reflected by the wide variety of subject matter covered by the papers this year. The conference has drawn interest and papers from within Australia and internationally. All submitted papers were subject to a double blind peer review process. Fifteen papers were submitted from Australia and overseas, of which ten were accepted for final presentation and publication. We wish to thank the reviewers for kindly volunteering their time and expertise in support of this event. We would also like to thank the conference committee who have organised yet another successful congress. Events such as this are impossible without the tireless efforts of such people in reviewing and editing the conference papers, and assisting with the planning, organisation and execution of the conferences. To our sponsors also a vote of thanks for both the financial and moral support provided to the conference. Finally, thank you to the administrative and technical staff, and students of the ECU Security Research Institute for their contributions to the running of the conference

    Task allocation in the Internet of Things

    Get PDF
    The last few years have been involved by the technological revolution represented by the Internet of Things (IoT). The IoT vision aims to interconnect devices with different capabilities such as sensors, actuators, Radio Frequency Identification (RFID) tags, smart objects (e.g. smartphones), and servers, within the same heterogeneous network. The aim is to enable the network objects to dynamically cooperate and make their resources available, in order to reach a goal, i.e. the execution of one or more applications assigned to the network. As known since its invention, the Internet interconnects nodes with dissimilar characteristics without central authorities by introducing some simple yet effective protocols that allow for nodes' interoperability so that information is successfully exchanged and services are provided by servers to clients and among peers. Fortunately, the same happens among objects in the IoT so that interoperability is assured and the data sensed by objects distributed and connected to the physical world is now available for the benefit of the human users. The realization of the IoT paradigm relies on the implementation of systems of cooperative intelligent objects with key interoperability capabilities. However, to reach this goal, it's important to consider some key features that characterize many IoT objects: i) available nodes' resources (electrical energy, memory, processing, node capability to perform a given task) are often limited. This is the case, for example, of battery powered nodes, which have limited energy amounts. ii) sensors may provide information that is not unique but can be generated by set of different objects which for example are capable to sense the same physical measure of the same geographical. iii) the number of nodes in the IoT is quickly overcoming the number of hosts in the 'traditional' Internet and most of these have a low reliability due mostly to the mobility and energy. This entails for a new paradigm of communication according to which objects coordinate with the other objects in groups and provide a unified service to the external world (the application that requires the service), with the intent to distribute the load of the requested services according to specific community defined rules, which could be: lifetime extension, QoS (Quality of Service) maximization, reward maximization, or others. It is evident that an appropriate coordination of objects' resources utilization would consistently improve their performance. This foreword is necessary to introduce this thesis, which is defined as follows. Task allocation in the IoT: given the IoT paradigm and the requirements of IoT applications, the nodes involved in the execution of the same application should cooperate to reach the optimal allocation of tasks among them. They should execute tasks to reach the global application target and to satisfy the relevant requirements while optimizing the network performance in terms of resources used. This issue should be continuously addressed to dynamically adapt the system to changes in terms of application requirements and network topolog

    Sistema electr贸nico con aplicaci贸n IOT de monitoreo de movimiento corporal de las extremidades inferiores de un estudiante universitario que brinde estimadores de posici贸n dentro del aula en la Universidad T茅cnica del Norte a escala de laboratorio

    Get PDF
    Desarrollar un sistema electr贸nico con aplicaci贸n IOT del monitoreo de movimiento corporal de las extremidades inferiores de un estudiante universitario que brinde estimadores de posici贸n dentro del aula durante 8 meses en la Universidad T茅cnica del Norte a escala de laboratorio.El proyecto muestra la creaci贸n de un novedoso sistema para el monitoreo corporal de extremidades inferiores del estudiante, a trav茅s del an谩lisis de los movimientos y c谩lculo de 谩ngulos de flexi贸n de sus piernas en base a software libre. Este sistema est谩 basado en el uso del sensor Kinect de Microsoft, para cumplir con esta finalidad de capturar y esquematizar el cuerpo humano de tal manera que se logre captar los movimientos y virtualizarlos consiguiendo determinar 4 posturas generando un archivo de texto plano que contenga el registro de los datos previamente capturados, para luego ser procesados utilizando un software de an谩lisis estad铆stico. El sistema de monitoreo corporal ser谩 sometido a diversas pruebas tanto en la Facultad de Ingenier铆a en Ciencias Aplicadas como en la Biblioteca de la Universidad T茅cnica del Norte para encontrar el escenario ideal y las condiciones en la que el Sistema funcione id贸neamente logrando detectar todas las posturas. Finalmente se realiza un an谩lisis monitoreando a grupo de estudiantes a los cuales fueron evaluados durante un determinado tiempo en dos circunstancias, la primera, en donde al estudiante se le proporcion贸 un dispositivo digital cuyo tama帽o no interfiera con las capturas del sensor y a su vez incrementa su atenci贸n, y la segunda, donde se le facilit贸 un documento para que el estudiante lea con la finalidad de que muestre aptitudes diferentes que sean esquematizadas y genere datos. El software muestra la esquematizaci贸n de las extremidades inferiores del cuerpo humano y el seguimiento de su movimiento basadas en puntos denominados 驴Joins驴 los cuales interpretan y emulan las rotaciones y flexiones que realizan las articulaciones. El resultado del trabajo final se lo puede catalogar como portable, no-invasivo, econ贸mico y de f谩cil implementaci贸n. Se investig贸 de forma general el Internet de las Cosas, el modo en el que los objetos cotidianos se vuelven cada vez m谩s inteligentes y logran conectarse a la internet de tal manera que estas se vuelven herramientas que impulsan el mejoramiento en el campo de la educaci贸n, ayudando de una u otro forma al desarrollo y desenvolvimiento del estudiante. Se analizar谩n los conceptos fundamentales del IoT, sus principales problemas y amenazas, as铆 como la innovaci贸n que brinda esta tecnol贸gica, la forma como se est谩 difundiendo en el mundo y cu谩l es su futura expansi贸n. Como parte final de la investigaci贸n se concluye y recomienda luego de haber hecho varias pruebas de funcionamiento en diversas circunstancias de las cuales exponemos los resultados obtenidos de la recolecci贸n, an谩lisis y procesamiento de la informaci贸n tras el monitoreo del estudiante
    corecore