2,548 research outputs found
Challenges and opportunities of introducing Internet of Things and Artificial Intelligence applications into Supply Chain Management
The study examines the challenges and opportunities of introducing Artificial Intelligence (AI) and the Internet of Things (IoT) into the Supply Chain Management (SCM). This research focuses on the Logistic Management. The central research question is âWhat are the key challenges and opportunities of introducing AI and IoT applications into the Supply Chain Management?â
The goal of this research is to collect the most appropriate literature to help create a conceptual framework, which involves the integration of the IoT and AI applications into contemporary supply chain management with the emphasis on the logistics management. Additionally, the role of 5G Network is closely studied in order to indicate its capabilities and the processing capacity that it can provide to the AI and IoT operations.
In addition, the semi-structured online interview with the top managers from several companies was conducted in order to identify the degree of readiness of the companies for the AI and IoT applications in SCM. From the retrieved results, the major challenges of integrating the IoT into SCM are the security and privacy issues, the sensitivity of the data and high costs of the implementation at an initial stage.
Moreover, the research results have shown that the IoT applications can positively affect the SCM activities, in particular, the high visibility across the SC, an effective traceability and an automated data collection. Furthermore, the predictive analysis of AI programs can help the SCM to eliminate the potential errors and failures in the processes.fi=OpinnÀytetyö kokotekstinÀ PDF-muodossa.|en=Thesis fulltext in PDF format.|sv=LÀrdomsprov tillgÀngligt som fulltext i PDF-format
Survey and Systematization of Secure Device Pairing
Secure Device Pairing (SDP) schemes have been developed to facilitate secure
communications among smart devices, both personal mobile devices and Internet
of Things (IoT) devices. Comparison and assessment of SDP schemes is
troublesome, because each scheme makes different assumptions about out-of-band
channels and adversary models, and are driven by their particular use-cases. A
conceptual model that facilitates meaningful comparison among SDP schemes is
missing. We provide such a model. In this article, we survey and analyze a wide
range of SDP schemes that are described in the literature, including a number
that have been adopted as standards. A system model and consistent terminology
for SDP schemes are built on the foundation of this survey, which are then used
to classify existing SDP schemes into a taxonomy that, for the first time,
enables their meaningful comparison and analysis.The existing SDP schemes are
analyzed using this model, revealing common systemic security weaknesses among
the surveyed SDP schemes that should become priority areas for future SDP
research, such as improving the integration of privacy requirements into the
design of SDP schemes. Our results allow SDP scheme designers to create schemes
that are more easily comparable with one another, and to assist the prevention
of persisting the weaknesses common to the current generation of SDP schemes.Comment: 34 pages, 5 figures, 3 tables, accepted at IEEE Communications
Surveys & Tutorials 2017 (Volume: PP, Issue: 99
SecuCode: Intrinsic PUF Entangled Secure Wireless Code Dissemination for Computational RFID Devices
The simplicity of deployment and perpetual operation of energy harvesting
devices provides a compelling proposition for a new class of edge devices for
the Internet of Things. In particular, Computational Radio Frequency
Identification (CRFID) devices are an emerging class of battery-free,
computational, sensing enhanced devices that harvest all of their energy for
operation. Despite wireless connectivity and powering, secure wireless firmware
updates remains an open challenge for CRFID devices due to: intermittent
powering, limited computational capabilities, and the absence of a supervisory
operating system. We present, for the first time, a secure wireless code
dissemination (SecuCode) mechanism for CRFIDs by entangling a device intrinsic
hardware security primitive Static Random Access Memory Physical Unclonable
Function (SRAM PUF) to a firmware update protocol. The design of SecuCode: i)
overcomes the resource-constrained and intermittently powered nature of the
CRFID devices; ii) is fully compatible with existing communication protocols
employed by CRFID devices in particular, ISO-18000-6C protocol; and ii) is
built upon a standard and industry compliant firmware compilation and update
method realized by extending a recent framework for firmware updates provided
by Texas Instruments. We build an end-to-end SecuCode implementation and
conduct extensive experiments to demonstrate standards compliance, evaluate
performance and security.Comment: Accepted to the IEEE Transactions on Dependable and Secure Computin
Real-time auditing of domotic robotic cleaners
Domotic Robotic Cleaners are autonomous devices that are designed to operate almost entirely unattended. In this paper we propose a system that aims to evaluate the performance of such devices by analysis of their trails. This concept of trails is central to our approach, and it encompasses the traditional notion of a path followed by a robot between arbitrary numbers of points in a physical space. We enrich trails with context-specific metadata, such
as proximity to landmarks, frequency of visitation, duration, etc. We then process the trail data collected by the robots, we store it an appropriate data structure and derive useful statistical information from the raw data.
The usefulness of the derived information is twofold: it can primarily be used to audit the performance of the robotic cleaner âfor example, to give an accurate indication of how well a space is covered (cleaned). And secondarily information can be analyzed in real-time to
affect the behavior of specific robots â for example to notify a robot that specific areas have not been adequately covered. Towards our first goal, we have developed and evaluated a prototype of our system that uses a particular commercially available robotic cleaner. Our implementation deploys adhoc wireless local networking capability available through a surrogate device mounted onto this commodity robot; the device senses relative proximity to a grid of RFID tags attached to the floor. We report on the performance of this system in experiments conducted in a laboratory environment, which highlight the advantages and limitations of our approach
- âŠ