14,283 research outputs found

    Towards a reference model for m-commerce over ad hoc wireless networks

    Get PDF

    Survey and Systematization of Secure Device Pairing

    Full text link
    Secure Device Pairing (SDP) schemes have been developed to facilitate secure communications among smart devices, both personal mobile devices and Internet of Things (IoT) devices. Comparison and assessment of SDP schemes is troublesome, because each scheme makes different assumptions about out-of-band channels and adversary models, and are driven by their particular use-cases. A conceptual model that facilitates meaningful comparison among SDP schemes is missing. We provide such a model. In this article, we survey and analyze a wide range of SDP schemes that are described in the literature, including a number that have been adopted as standards. A system model and consistent terminology for SDP schemes are built on the foundation of this survey, which are then used to classify existing SDP schemes into a taxonomy that, for the first time, enables their meaningful comparison and analysis.The existing SDP schemes are analyzed using this model, revealing common systemic security weaknesses among the surveyed SDP schemes that should become priority areas for future SDP research, such as improving the integration of privacy requirements into the design of SDP schemes. Our results allow SDP scheme designers to create schemes that are more easily comparable with one another, and to assist the prevention of persisting the weaknesses common to the current generation of SDP schemes.Comment: 34 pages, 5 figures, 3 tables, accepted at IEEE Communications Surveys & Tutorials 2017 (Volume: PP, Issue: 99

    A case study of MMO2's Madic: A framework for creating mobile internet systems

    Get PDF
    Mobile Internet applications on ubiquitous mobile networks allows real-time, anywhere, anytime connectivity to services. Due to its scalability and potential cost savings, mobile communication is being increasingly applied in the business and consumer communities to create innovative data and voice application, which run over the Internet infrastructure. This paper reports on a case study at an organisation that created an innovative approach to developing mobile applications developed by third party independent developers. A conceptual wireless reference model is presented that was used to define the various system components required to create effective mobile applications

    In Things We Trust? Towards trustability in the Internet of Things

    Full text link
    This essay discusses the main privacy, security and trustability issues with the Internet of Things

    Middleware Technologies for Cloud of Things - a survey

    Get PDF
    The next wave of communication and applications rely on the new services provided by Internet of Things which is becoming an important aspect in human and machines future. The IoT services are a key solution for providing smart environments in homes, buildings and cities. In the era of a massive number of connected things and objects with a high grow rate, several challenges have been raised such as management, aggregation and storage for big produced data. In order to tackle some of these issues, cloud computing emerged to IoT as Cloud of Things (CoT) which provides virtually unlimited cloud services to enhance the large scale IoT platforms. There are several factors to be considered in design and implementation of a CoT platform. One of the most important and challenging problems is the heterogeneity of different objects. This problem can be addressed by deploying suitable "Middleware". Middleware sits between things and applications that make a reliable platform for communication among things with different interfaces, operating systems, and architectures. The main aim of this paper is to study the middleware technologies for CoT. Toward this end, we first present the main features and characteristics of middlewares. Next we study different architecture styles and service domains. Then we presents several middlewares that are suitable for CoT based platforms and lastly a list of current challenges and issues in design of CoT based middlewares is discussed.Comment: http://www.sciencedirect.com/science/article/pii/S2352864817301268, Digital Communications and Networks, Elsevier (2017

    Middleware Technologies for Cloud of Things - a survey

    Full text link
    The next wave of communication and applications rely on the new services provided by Internet of Things which is becoming an important aspect in human and machines future. The IoT services are a key solution for providing smart environments in homes, buildings and cities. In the era of a massive number of connected things and objects with a high grow rate, several challenges have been raised such as management, aggregation and storage for big produced data. In order to tackle some of these issues, cloud computing emerged to IoT as Cloud of Things (CoT) which provides virtually unlimited cloud services to enhance the large scale IoT platforms. There are several factors to be considered in design and implementation of a CoT platform. One of the most important and challenging problems is the heterogeneity of different objects. This problem can be addressed by deploying suitable "Middleware". Middleware sits between things and applications that make a reliable platform for communication among things with different interfaces, operating systems, and architectures. The main aim of this paper is to study the middleware technologies for CoT. Toward this end, we first present the main features and characteristics of middlewares. Next we study different architecture styles and service domains. Then we presents several middlewares that are suitable for CoT based platforms and lastly a list of current challenges and issues in design of CoT based middlewares is discussed.Comment: http://www.sciencedirect.com/science/article/pii/S2352864817301268, Digital Communications and Networks, Elsevier (2017

    The Mobile Generation: Global Transformations at the Cellular Level

    Get PDF
    Every year we see a new dimension of the ongoing Digital Revolution, which is enabling an abundance of information to move faster, cheaper, in more intelligible forms, in more directions, and across borders of every kind. The exciting new dimension on which the Aspen Institute focused its 2006 Roundtable on Information Technology was mobility, which is making the Digital Revolution ubiquitous. As of this writing, there are over two billion wireless subscribers worldwide and that number is growing rapidly. People are constantly innovating in the use of mobile technologies to allow them to be more interconnected. Almost a half century ago, Ralph Lee Smith conjured up "The Wired Nation," foretelling a world of interactive communication to and from the home that seems commonplace in developed countries today. Now we have a "Wireless World" of communications potentially connecting two billion people to each other with interactive personal communications devices. Widespead adoption of wireless handsets, the increasing use of wireless internet, and the new, on-the-go content that characterizes the new generation of users are changing behaviors in social, political and economic spheres. The devices are easy to use, pervasive and personal. The affordable cell phone has the potential to break down the barriers of poverty and accessibility previously posed by other communications devices. An entire generation that is dependant on ubiquitous mobile technologies is changing the way it works, plays and thinks. Businesses, governments, educational institutions, religious and other organizations in turn are adapting to reach out to this mobile generation via wireless technologies -- from SMS-enabled vending machines in Finland to tech-savvy priests in India willing to conduct prayers transmitted via cell phones. Cellular devices are providing developing economies with opportunities unlike any others previously available. By opening the lines of communication, previously disenfranchised groups can have access to information relating to markets, economic opportunities, jobs, and weather to name just a few. When poor village farmers from Bangladesh can auction their crops on a craigslist-type service over the mobile phone, or government officials gain instantaneous information on contagious diseases via text message, the miracles of mobile connectivity move us from luxury to necessity. And we are only in the early stages of what the mobile electronic communications will mean for mankind. We are now "The Mobile Generation." Aspen Institute Roundtable on Information Technology. To explore the implications of these phenomena, the Aspen Institute Communications and Society Program convened 27 leaders from business, academia, government and the non-profit sector to engage in three days of dialogue on related topics. Some are experts in information and communications technologies, others are leaders in the broader society affected by these innovations. Together, they examined the profound changes ahead as a result of the convergence of wireless technologies and the Internet. In the following report of the Roundtable meeting held August 1-4, 2006, J. D. Lasica, author of Darknet and co-founder of Ourmedia.org, deftly sets up, contextualizes, and captures the dialogue on the impact of the new mobility on economic models for businesses and governments, social services, economic development, and personal identity
    corecore