9 research outputs found

    Brief Survey and Testbed Development for Blockchain Based Internet of Things

    Get PDF
    Blockchain and the Internet of Things are uprising in today’s technology world. Internet of Things or IoT are the devices with unique identifiers that share data or information over the internet whereas, Blockchain is a peer to peer network with a distributed ledger that contains a list of blocks that are linked together by cryptography. Fascinated and motivated by blockchain and Internet of Things (IoT), this thesis provides a review on blockchain based internet of things and also introduces a working testbed that integrates the two together. It also uses IoT device to invoke transactions into the blockchain. The reasons behind combining of blockchain and IoT is because the present centralized architecture won’t hold the exponentially growing use of IoT, blockchain implementation can reduce cost and moreover, decentralization will remove the bottleneck from the centralized server

    The Role of the Internet of Things in Health Care: A Systematic and Comprehensive Study

    Get PDF
    The Internet of Things (IoT) is becoming an emerging trend and has significant potential to replace other technologies, where researchers consider it as the future of the internet. It has given tremendous support and become the building blocks in the development of important cyber-physical systems and it is being severed in a variety of application domains, including healthcare. A methodological evolution of the Internet of Things, enabled it to extend to the physical world beyond the electronic world by connecting miscellaneous devices through the internet, thus making everything is connected. In recent years it has gained higher attention for its potential to alleviate the strain on the healthcare sector caused by the rising and aging population along with the increase in chronic diseases and global pandemics. This paper surveys about various usages of IoT healthcare technologies and reviews the state of the art services and applications, recent trends in IoT based healthcare solutions, and various challenges posed including security and privacy issues, which researchers, service providers and end users need to pay higher attention. Further, this paper discusses how innovative IoT enabled technologies like cloud computing, fog computing, blockchain, and big data can be used to leverage modern healthcare facilities and mitigate the burden on healthcare resources

    Big Data em cidades inteligentes: um mapeamento sistemático

    Get PDF
    O conceito de Cidades Inteligentes ganhou maior atenção nos círculos acadêmicos, industriais e governamentais. À medida que a cidade se desenvolve ao longo do tempo, componentes e subsistemas como redes inteligentes, gerenciamento inteligente de água, tráfego inteligente e sistemas de transporte, sistemas de gerenciamento de resíduos inteligentes, sistemas de segurança inteligentes ou governança eletrônica são adicionados. Esses componentes ingerem e geram uma grande quantidade de dados estruturados, semiestruturados ou não estruturados que podem ser processados usando uma variedade de algoritmos em lotes, microlotes ou em tempo real, visando a melhoria de qualidade de vida dos cidadãos. Esta pesquisa secundária tem como objetivo facilitar a identificação de lacunas neste campo, bem como alinhar o trabalho dos pesquisadores com outros para desenvolver temas de pesquisa mais fortes. Neste estudo, é utilizada a metodologia de pesquisa formal de mapeamento sistemático para fornecer uma revisão abrangente das tecnologias de Big Data na implantação de cidades inteligentes

    Is Fragmentation a Threat to the Success of the Internet of Things?

    Full text link
    The current revolution in collaborating distributed things is seen as the first phase of IoT to develop various services. Such collaboration is threatened by the fragmentation found in the industry nowadays as it brings challenges stemming from the difficulty to integrate diverse technologies in system. Diverse networking technologies induce interoperability issues, hence, limiting the possibility of reusing the data to develop new services. Different aspects of handling data collection must be available to provide interoperability to the diverse objects interacting; however, such approaches are challenged as they bring substantial performance impairments in settings with the increasing number of collaborating devices/technologies.Comment: 16 pages, 2 figures, Internet of Things Journal (http://ieee-iotj.org

    Does Collaborative Editing Help Mitigate Security Vulnerabilities in Crowd-Shared IoT Code Examples?

    Full text link
    Background: With the proliferation of crowd-sourced developer forums, software developers are increasingly sharing more coding solutions to programming problems with others in forums. The decentralized nature of knowledge sharing on sites has raised the concern of sharing security vulnerable code, which then can be reused into mission critical software systems - making those systems vulnerable in the process. Collaborative editing has been introduced in forums like Stack Overflow to improve the quality of the shared contents. Aim: In this paper, we investigate whether code editing can mitigate shared vulnerable code examples by analyzing IoT code snippets and their revisions in three Stack Exchange sites: Stack Overflow, Arduino, and Raspberry Pi. Method:We analyze the vulnerabilities present in shared IoT C/C++ code snippets, as C/C++ is one of the most widely used languages in mission-critical devices and low-powered IoT devices. We further analyse the revisions made to these code snippets, and their effects. Results: We find several vulnerabilities such as CWE 788 - Access of Memory Location After End of Buffer, in 740 code snippets . However, we find the vast majority of posts are not revised, or revisions are not made to the code snippets themselves (598 out of 740). We also find that revisions are most likely to result in no change to the number of vulnerabilities in a code snippet rather than deteriorating or improving the snippet. Conclusions: We conclude that the current collaborative editing system in the forums may be insufficient to help mitigate vulnerabilities in the shared code.Comment: 10 pages, 14 figures, ESEM2

    Método para la preservación de la privacidad en dispositivos iot vestibles extendiendo la Seguridad usando fog computing

    Get PDF
    Los dispositivos Wearables o vestibles son elementos IoT personales que permiten la recolección de datos de una persona y enviarlas a un sistema informático para su procesamiento, dichos dis-positivos hacen uso de conexiones locales (área de cobertura) y normalmente están dentro de dicha área en dónde se puede tener control de la privacidad, integridad o confidencialidad, por lo cual, cuando es necesario una movilidad de la persona, el IoT debe salir de su área de cobertura, , perdiendo dicho proceso de seguridad. El objetivo es proponer un método que ayude a mitigar el riesgo de pérdida de privacidad sobre los datos en los dispositivos IoT Wearables, cuando estos salen de un área protegida (en la cual normalmente se conectan) a través de la computación en la niebla o Fog Computing (en adelante FC) que viaje con el Wearable. Para esto se han evaluado tres tecnologías de comunicación inalámbrica, las cuales son Bluetooth, RFID y NFC; determinando así cuál es la que mejor se adapta para transportar la información desde IoT hasta FC. También se evalúan los algoritmos de cifrado RSA, Diffie-Hellman Elliptic Curve - DHEC, Homomórfico JPAILLIER - HJP y AES, como mecanismo de protección de la información que se envía desde FC hacia la nube, por lo cual, para la selección de la tecnología y algoritmo de cifrado más adecuado se hace una serie de pruebas técnicas, entregando a través de un sistema de puntos, la valoración de cada prueba. Por último, los resultados de las pruebas son positivos y demuestran que la tecnología NFC es la que mejor se adapta a las limitantes de IoT y que DHEC es un algoritmo de cifrado que proporciona mejor escalabilidad al método planteado. Más tarde se realiza una evaluación de la propuesta en la cual se demuestra que soluciona el problema de pérdida de protección por salir de una cobertura protegidaWearables devices are personal IoT elements that allow the collection of data from a person and send them to a computer system for processing, said devices make use of local connections (cove-rage area) and are usually within that area in where you can have control of privacy, integrity or confidentiality, whereby, when a mobility of the person is necessary, the IoT must leave its cove-rage area, losing this security process. The objective is to propose a method that helps mitigate the risk of loss of privacy on the data in the IoT Wearables devices, when they leave a protected area (in which they normally connect) through fog computing or Fog. Computing (hereinafter FC) that travels with the Wearable. For this, three wireless communication technologies have been evalua-ted, which are Bluetooth, RFID and NFC; determining which is the best adapted to transport infor-mation from IoT to FC. The RSA encryption algorithms, Diffie-Hellman Elliptic Curve - DHEC, Homo-morphic JPAILLIER - HJP and AES, are also evaluated as a protection mechanism for the information sent from FC to the cloud, for which, for the selection of The most suitable technology and en-cryption algorithm is a series of technical tests, delivering through a points system, the valuation of each test. Finally, the results of the tests are positive and show that the NFC technology is the one that best adapts to the limitations of IoT and that DHEC is an encryption algorithm that provides better sca-lability to the proposed method. Later an evaluation of the proposal is made in which it is demons-trated that it solves the problem of loss of protection by leaving a protected coverageMagister en Seguridad Informátic

    Revisión sistemática del uso de Blockchains en datos clínicos y su aplicación en Colombia

    Get PDF
    Trabajo de investigaciónEste documento presenta una revisión sistemática realizada en 3 fuentes de datos como IEEE, Scopus y Web of Science, buscando una síntesis de información para visualizar qué aplicaciones o desarrollos hay en el mundo acerca de blockchain, qué temas y soluciones abarca, qué se está tratando, qué implantaciones hay en curso y cuáles son los retos actuales y futuros para de esta manera divisar cuáles pueden ser los campos en los que esta tecnología se incorpore en la salud colombiana.INTRODUCCIÓN 1. GENERALIDADES 2. PLANIFICACIÓN DE LA REVISIÓN SISTEMÁTICA 3. RESULTADOS 4. DESARROLLO DE LA PROPUESTA CONCLUSIONES RECOMENDACIONES BIBLIOGRAFÍA ANEXOSPregradoIngeniero de Sistema

    SHELDON Smart habitat for the elderly.

    Get PDF
    An insightful document concerning active and assisted living under different perspectives: Furniture and habitat, ICT solutions and Healthcare
    corecore