11 research outputs found
MARGOT: Dynamic IoT Resource Discovery for HADR Environments
Smart City services leverage sophisticated IT architectures whose assets are deployed in dynamic and heterogeneous computing and communication scenarios. Those services are particularly interesting for Humanitarian Assistance and Disaster Relief (HADR) operations in urban environments, which could improve Situation Awareness by exploiting the Smart City IT infrastructure. To this end, an enabling requirement is the discovery of the available Internet-of-Things (IoT) resources, including sensors, actuators, services, and computing resources, based on a variety of criteria, such as geographical location, proximity, type of device, type of capability, coverage, resource availability, and communication topology / quality of network links. To date, no single standard has emerged that has been widely adopted to solve the discovery challenge. Instead, a variety of different standards have been proposed and cities have either adopted one that is convenient or reinvented a new standard just for themselves. Therefore, enabling discovery across different standards and administrative domains is a fundamental requirement to enable HADR operations in Smart Cities. To address these challenges, we developed MARGOT (Multi-domain Asynchronous Gateway Of Things), a comprehensive solution for resource discovery in Smart City environments that implements a distributed and federated architecture and supports a wide range of discovery protocols
THE INTERNET OF THINGS (IOT) IN DISASTER RESPONSE
Disaster management is a complex practice that relies on access to and the usability of critical information to develop strategies for effective decision-making. The emergence of wearable internet of things (IoT) technology has attracted the interests of several major industries, making it one of the fastest-growing technologies to date. This thesis asks, How can disaster management incorporate wearable IoT technology in operations and decision-making practices in disaster response? How IoT is applied in other prominent industries, including construction, manufacturing and distribution, the Department of Defense, and public safety, provides a basis for furthering its application to challenges affecting agency coordination. The critical needs of disaster intelligence in the context of hurricanes, structural collapses, and wildfires are scrutinized to identify gaps that wearable technology could address in terms of information-sharing in multi-agency coordination and the decision-making practices that routinely occur in disaster response. Last, the specifics of wearable technology from the perspective of the private consumer and commercial industry illustrate its potential to improve disaster response but also acknowledge certain limitations including technical capabilities and information privacy and security.Civilian, Virginia Beach Fire Department / FEMA - USAR VATF-2Approved for public release. Distribution is unlimited
Internet of Things : technologies and applications in healthcare management and manufacturing
L'Internet des Objets (ou IoT) s'appuie sur des objets connectés dotés de capteurs et technologies capables d'échanger des données entre eux de manière indépendante. Ces nouvelles technologies offrent aux entreprises et à toutes les organisations des moyens pour l’acquisition et le traitement intelligent de l’information (Industrie 4.0) pour demeurer compétitives. Ce mémoire vise à analyser la contribution de l'IoT dans les soins de santé et production, mettant l'accent sur l'Industrie 4.0 et la maintenance prédictive, particulièrement en maintenance, sur la base d’oeuvres littéraires récentes publiées au cours de la dernière décennie. L’objectif principal de ce mémoire est de comprendre l'IoT, d’exposer ses potentiels et sa stratégie de déploiement dans différents domaines d’applications. Même, le but est de comprendre que l'IoT ne se limite pas à l'application de la maintenance des systèmes de production mais aussi du bien-être des patients, c'est pourquoi j'ai choisi ces deux domaines importants où l'IoT peut être appliqué (santé et production) pour ce travail de recherche. Cette thèse aidera à explorer comment l'IoT transforme le système de santé. J'explique comment l'IoT offre de grandes avancées dans ce système. Je donne quelques exemples où ses concepts souhaiteraient être implémentés pour améliorer la qualité des soins des patients et quelques études récentes. Outre, je clarifie l'impact de l’Industrie 4.0 sur la production, notamment en maintenance, en lien avec la maintenance prédictive rendue possible par l’IoT. Je fournis une vue d'ensemble de l'Industrie 4.0 et de la maintenance prédictive. J’aborde les fonctionnalités de l'Industrie 4.0 et présente ses technologies de pilotage susceptibles d'améliorer les domaines de processus de production, tels que la réduction des temps d'immobilisation, les coûts de service, etc. J'attire l'attention sur les implications de la maintenance prédictive dans l’Industrie 4.0 en décrivant son fonctionnement et comment les fabricants peuvent l'exécuter efficacement, avec des exemples à l'appui.The Internet of Things (or IoT) relies on connected objects embedded with sensors and other technologies capable of exchanging data with each other independently. These new technologies provide businesses and all organizations with the means to acquire and intelligently process information (Industry 4.0) to remain competitive. This thesis aims to analyze the contribution of IoT in healthcare and manufacturing, with a focus on Industry 4.0 and Predictive Maintenance, specifically in maintenance, based on recent literary works published over the last decade. The main purpose of this thesis is to understand what IoT is, to highlight its potentials and its deployment strategy in various areas of application. Similarly, the goal is to understand that IoT is not limited to the application of the maintenance of production systems but also of patients’ wellbeing which is the reason why I selected these two important areas where IoT can be applied (healthcare and manufacturing) for this research work. This thesis will help explore how IoT is transforming the healthcare system. I explain how IoT offers great advances in the healthcare system. I give some examples of where its concepts would like to be implemented to improve the quality of care of patients and some recent studies. In addition, I clarify the impact of Industry 4.0 in manufacturing especially in maintenance, in connection with predictive maintenance made possible by IoT. I provide an overview of Industry 4.0 and predictive maintenance. I discuss the capabilities of Industry 4.0 and present its driving technologies that can improve all areas of production processes such as reducing downtime, service costs , etc. Moreover, I draw attention to the implications of predictive maintenance in Industry 4.0 by describing how it works and how manufacturers can run it effectively, with supporting examples
Drones, Signals, and the Techno-Colonisation of Landscape
This research project is a cross-disciplinary, creative practice-led investigation that interrogates increasing military interest in the electromagnetic spectrum (EMS). The project’s central argument is that painted visualisations of normally invisible aspects of contemporary EMS-enabled warfare can reveal useful, novel, and speculative but informed perspectives that contribute to debates about war and technology. It pays particular attention to how visualising normally invisible signals reveals an insidious techno-colonisation of our extended environment from Earth to orbiting satellites
Authentication Protocols for Internet of Things: A Comprehensive Survey
In this paper, a comprehensive survey of authentication protocols for Internet of Things (IoT) is presented. Specifically more than forty authentication protocols developed for or applied in the context of the IoT are selected and examined in detail. These protocols are categorized based on the target environment: (1) Machine to Machine Communications (M2M), (2) Internet of Vehicles (IoV), (3) Internet of Energy (IoE), and (4) Internet of Sensors (IoS). Threat models, countermeasures, and formal security verification techniques used in authentication protocols for the IoT are presented. In addition a taxonomy and comparison of authentication protocols that are developed for the IoT in terms of network model, specific security goals, main processes, computation complexity, and communication overhead are provided. Based on the current survey, open issues are identified and future research directions are proposed
Securing the Edges of IoT Networks: a Scalable SIP DDoS Defense Framework with VNF, SDN, and Blockchain
An unintended consequence of the global deployment of IoT devices is that they provide a fertile breeding ground for IoT botnets. An adversary can take advantage of an IoT botnet to launch DDoS attacks against telecommunication services. Due to the magnitude of such an attack, legacy security systems are not able to provide adequate protection. The impact ranges from loss of revenue for businesses to endangering public safety.
This risk has prompted academia, government, and industry to reevaluate the existing de- fence model. The current model relies on point solutions and the assumption that adversaries and their attacks are readily identifiable. But adversaries have challenged this assumption, building a botnet from thousands of hijacked IoT devices to launch DDoS attacks. With bot- net DDoS attacks there are no clear boundary where the attacks originate and what defensive measures to use.
The research question is: in what ways programmable networks could defend against Session Initiation Protocol (SIP) Distributed Denial-of-Service (DDoS) flooding attacks from IoT botnets? My significant and original contribution to the knowledge is a scalable and collaborative defence framework that secures the edges of IoT networks with Virtual Network Function (VNF), Software-Defined Networking (SDN), and Blockchain technology to prevent, detect, and mitigate SIP DDoS flooding attacks from IoT botnets.
Successful experiments were performed using VNF, SDN, and Blockchain. Three kinds of SIP attacks (scan, brute force, and DDoS) were launched against a VNF running on a virtual switch and each was successfully detected and mitigated. The SDN controller gathers threat intelligence from the switch where the attacks originate and installs them as packet filtering rules on all switches in the organisation. With the switches synchronised, the same botnet outbreak is prevented from attacking other parts of the organisation. A distributed application scales this framework further by writing the threat intelligence to a smart contract on the Ethereum Blockchain so that it is available for external organisations. The receiving organisation retrieves the threat intelligence from the smart contract and installs them as packet filtering rules on their switches. In this collaborative framework, attack detection/mitigation efforts by one organisation can be leveraged as attack prevention efforts by other organisations in the community
Recommended from our members
Secure expandable communication framework for POCT system development and deployment
This thesis was submitted for the award of Doctor of Philosophy and was awarded by Brunel University LondonHealth-care delivery in developing countries has many challenges because they do not
have enough resources for meeting the healthcare needs and they lack testing lab infras-
tructures in communities. It has been proven that Point-Of-Care (POC) testing can be
considered as one of the ways to resolve the crisis in healthcare delivery in these com-
munities. The POC testing is a mission critical processes in which the patient conduct
tests outside of laboratory environment and it needs a secure communication system of
architecture support which the research refers as POCT system
Almost every ten years there will be a new radio access technology (RAT) is released
in the wireless communication system evolution which is primarily driven by the 3GPP
standards organisation. It is challenging to develop a predictable communication sys-
tem in an environment of frequent changes originated by the 3GPP and the wireless
operators. The scalable and expandable network architecture is needed for cost-effective
network management, deployment and operation of the POC devices. Security mecha-
nisms are necessary to address the specific threats associated with POCT system. Se-
curity mechanisms are necessary to address the specific threats associated with POCT
system.The POCT system communication must provide secure storage and secure com-
munication to maintain patient data privacy and security. The Federal Drug Admin-
istration (FDA) reports the leading causes of defects and system failures in medical
devices are caused by gaps between the requirements, implementation and testing.
The research was conducted, and technical research contributions are made to resolve
the issues and challenges related to the POCT system. A communication protocol
implemented at the application level, independent of radio access technologies. A new
methodology was created by combining Easy Approach to Requirement Specifications
(EARS) methodology and Use Case Maps (UCM) model which is a new approach and
it addresses the concerns raised by the FDA. Secure cloud architecture was created
which is a new way of data storage and security algorithms models were designed to
address the security threats in the POCT system. The security algorithms, secure cloud
architecture and the communication protocol coexist together to provide Radio access
technology Independent Secure and Expandable (RISE) POCT system.
These are the contributions to new knowledge that came out of the research. The
research was conducted with a team of experts who are the subject matter experts in
the areas such as microfluidics, bio-medical, mechanical engineering and medicine
Recommended from our members
Authentication and Message Integrity Verification without Secrets
Embedding network capabilities in a plethora of new devices and infrastructures--the Internet-of-Things, vehicular and aviation networks, the critical national infrastructure, industrial plants--are dramatically transforming the modern way of living. The rapid deployment pace of these emerging applications has brought unprecedented security challenges related to data confidentiality, user privacy, and critical infrastructure availability. A significant portion of these threats is attributed to the broadcast nature of the wireless medium, which exposes systems to easy-to-launch passive and active attacks. The slow security standards rollout combined with the ever-shrinking time-to-market, the device heterogeneity and the lack of user-friendly input interfaces (screen, keyboard, etc.) only exacerbate the security challenges.
In this dissertation, we address the fundamental problem of trust establishment in the context of emerging network applications. We present techniques integrating physical layer properties with cryptographic primitives to guarantee message integrity and bootstrap initial trust without relying on any prior secrets. We present the ``helper'' security paradigm in which security is outsourced to one or more dedicated devices to allow for the scalable pairing of off-the-shelf heterogeneous devices. In addition, we present our work on message integrity verification of navigation information for aircrafts (speed, location, and heading) by exploiting the Doppler spread of the wireless channel. Finally, we develop a secure and fast voting technique for distributed networks which allows fast coordination of a group of devices without the overhead of messaging