14,283 research outputs found
Survey and Systematization of Secure Device Pairing
Secure Device Pairing (SDP) schemes have been developed to facilitate secure
communications among smart devices, both personal mobile devices and Internet
of Things (IoT) devices. Comparison and assessment of SDP schemes is
troublesome, because each scheme makes different assumptions about out-of-band
channels and adversary models, and are driven by their particular use-cases. A
conceptual model that facilitates meaningful comparison among SDP schemes is
missing. We provide such a model. In this article, we survey and analyze a wide
range of SDP schemes that are described in the literature, including a number
that have been adopted as standards. A system model and consistent terminology
for SDP schemes are built on the foundation of this survey, which are then used
to classify existing SDP schemes into a taxonomy that, for the first time,
enables their meaningful comparison and analysis.The existing SDP schemes are
analyzed using this model, revealing common systemic security weaknesses among
the surveyed SDP schemes that should become priority areas for future SDP
research, such as improving the integration of privacy requirements into the
design of SDP schemes. Our results allow SDP scheme designers to create schemes
that are more easily comparable with one another, and to assist the prevention
of persisting the weaknesses common to the current generation of SDP schemes.Comment: 34 pages, 5 figures, 3 tables, accepted at IEEE Communications
Surveys & Tutorials 2017 (Volume: PP, Issue: 99
A case study of MMO2's Madic: A framework for creating mobile internet systems
Mobile Internet applications on ubiquitous mobile networks allows real-time, anywhere, anytime connectivity to services. Due to its scalability and potential cost savings, mobile communication is being increasingly applied in the business and consumer communities to create innovative data and voice application, which run over the Internet infrastructure. This paper reports on a case study at an organisation that created an innovative approach to developing mobile applications developed by third party independent developers. A conceptual wireless reference model is presented that was used to define the various system components required to create effective mobile applications
In Things We Trust? Towards trustability in the Internet of Things
This essay discusses the main privacy, security and trustability issues with
the Internet of Things
Middleware Technologies for Cloud of Things - a survey
The next wave of communication and applications rely on the new services
provided by Internet of Things which is becoming an important aspect in human
and machines future. The IoT services are a key solution for providing smart
environments in homes, buildings and cities. In the era of a massive number of
connected things and objects with a high grow rate, several challenges have
been raised such as management, aggregation and storage for big produced data.
In order to tackle some of these issues, cloud computing emerged to IoT as
Cloud of Things (CoT) which provides virtually unlimited cloud services to
enhance the large scale IoT platforms. There are several factors to be
considered in design and implementation of a CoT platform. One of the most
important and challenging problems is the heterogeneity of different objects.
This problem can be addressed by deploying suitable "Middleware". Middleware
sits between things and applications that make a reliable platform for
communication among things with different interfaces, operating systems, and
architectures. The main aim of this paper is to study the middleware
technologies for CoT. Toward this end, we first present the main features and
characteristics of middlewares. Next we study different architecture styles and
service domains. Then we presents several middlewares that are suitable for CoT
based platforms and lastly a list of current challenges and issues in design of
CoT based middlewares is discussed.Comment: http://www.sciencedirect.com/science/article/pii/S2352864817301268,
Digital Communications and Networks, Elsevier (2017
Middleware Technologies for Cloud of Things - a survey
The next wave of communication and applications rely on the new services
provided by Internet of Things which is becoming an important aspect in human
and machines future. The IoT services are a key solution for providing smart
environments in homes, buildings and cities. In the era of a massive number of
connected things and objects with a high grow rate, several challenges have
been raised such as management, aggregation and storage for big produced data.
In order to tackle some of these issues, cloud computing emerged to IoT as
Cloud of Things (CoT) which provides virtually unlimited cloud services to
enhance the large scale IoT platforms. There are several factors to be
considered in design and implementation of a CoT platform. One of the most
important and challenging problems is the heterogeneity of different objects.
This problem can be addressed by deploying suitable "Middleware". Middleware
sits between things and applications that make a reliable platform for
communication among things with different interfaces, operating systems, and
architectures. The main aim of this paper is to study the middleware
technologies for CoT. Toward this end, we first present the main features and
characteristics of middlewares. Next we study different architecture styles and
service domains. Then we presents several middlewares that are suitable for CoT
based platforms and lastly a list of current challenges and issues in design of
CoT based middlewares is discussed.Comment: http://www.sciencedirect.com/science/article/pii/S2352864817301268,
Digital Communications and Networks, Elsevier (2017
The Mobile Generation: Global Transformations at the Cellular Level
Every year we see a new dimension of the ongoing Digital Revolution, which is enabling an abundance of information to move faster, cheaper, in more intelligible forms, in more directions, and across borders of every kind. The exciting new dimension on which the Aspen Institute focused its 2006 Roundtable on Information Technology was mobility, which is making the Digital Revolution ubiquitous. As of this writing, there are over two billion wireless subscribers worldwide and that number is growing rapidly. People are constantly innovating in the use of mobile technologies to allow them to be more interconnected. Almost a half century ago, Ralph Lee Smith conjured up "The Wired Nation," foretelling a world of interactive communication to and from the home that seems commonplace in developed countries today. Now we have a "Wireless World" of communications potentially connecting two billion people to each other with interactive personal communications devices. Widespead adoption of wireless handsets, the increasing use of wireless internet, and the new, on-the-go content that characterizes the new generation of users are changing behaviors in social, political and economic spheres. The devices are easy to use, pervasive and personal. The affordable cell phone has the potential to break down the barriers of poverty and accessibility previously posed by other communications devices. An entire generation that is dependant on ubiquitous mobile technologies is changing the way it works, plays and thinks. Businesses, governments, educational institutions, religious and other organizations in turn are adapting to reach out to this mobile generation via wireless technologies -- from SMS-enabled vending machines in Finland to tech-savvy priests in India willing to conduct prayers transmitted via cell phones. Cellular devices are providing developing economies with opportunities unlike any others previously available. By opening the lines of communication, previously disenfranchised groups can have access to information relating to markets, economic opportunities, jobs, and weather to name just a few. When poor village farmers from Bangladesh can auction their crops on a craigslist-type service over the mobile phone, or government officials gain instantaneous information on contagious diseases via text message, the miracles of mobile connectivity move us from luxury to necessity. And we are only in the early stages of what the mobile electronic communications will mean for mankind. We are now "The Mobile Generation." Aspen Institute Roundtable on Information Technology. To explore the implications of these phenomena, the Aspen Institute Communications and Society Program convened 27 leaders from business, academia, government and the non-profit sector to engage in three days of dialogue on related topics. Some are experts in information and communications technologies, others are leaders in the broader society affected by these innovations. Together, they examined the profound changes ahead as a result of the convergence of wireless technologies and the Internet. In the following report of the Roundtable meeting held August 1-4, 2006, J. D. Lasica, author of Darknet and co-founder of Ourmedia.org, deftly sets up, contextualizes, and captures the dialogue on the impact of the new mobility on economic models for businesses and governments, social services, economic development, and personal identity
- …