1,075 research outputs found
COLLECT: COLLaborativE ConText-aware service oriented architecture for intelligent decision-making in the Internet of Things
Internet of Things (IoT) has radically transformed the world; currently, every device can be connected to the Internet and provide valuable information for decision-making. In spite of the fast evolution of technologies accompanying the grow of IoT, we are still faced with the challenge of providing a service oriented architecture, which facilitates the inclusion of data coming together from several IoT devices, data delivery among a system’s agents, real-time data processing and service provision to users. Furthermore, context-aware data processing and architectures still pose a challenge, in spite of being key requirements in order to get stronger IoT architectures. To face this challenge, we propose a COLLaborative ConText Aware Service Oriented Architecture (COLLECT), which facilitates both the integration of IoT heterogeneous domain context data — through the use of a light message broker — and easy data delivery among several agents and collaborative participants in the system — making use of an enterprise service bus —. In addition, this architecture provides real-time data processing thanks to the use of a complex event processing engine as well as services and intelligent decision-making procedures to users according to the needs of the domain in question. As a result, COLLECT has a great impact on context-aware decentralized and collaborative reasoning for IoT, promoting context-aware intelligent decision making in such scope. Since context-awareness is key for a wide range of recommender and intelligent systems, the presented novel solution improves decision making in a large number of fields where such systems require to promptly process a variety of ubiquitous collaborative and context-aware data
C-FLAT: Control-FLow ATtestation for Embedded Systems Software
Remote attestation is a crucial security service particularly relevant to
increasingly popular IoT (and other embedded) devices. It allows a trusted
party (verifier) to learn the state of a remote, and potentially
malware-infected, device (prover). Most existing approaches are static in
nature and only check whether benign software is initially loaded on the
prover. However, they are vulnerable to run-time attacks that hijack the
application's control or data flow, e.g., via return-oriented programming or
data-oriented exploits. As a concrete step towards more comprehensive run-time
remote attestation, we present the design and implementation of Control- FLow
ATtestation (C-FLAT) that enables remote attestation of an application's
control-flow path, without requiring the source code. We describe a full
prototype implementation of C-FLAT on Raspberry Pi using its ARM TrustZone
hardware security extensions. We evaluate C-FLAT's performance using a
real-world embedded (cyber-physical) application, and demonstrate its efficacy
against control-flow hijacking attacks.Comment: Extended version of article to appear in CCS '16 Proceedings of the
23rd ACM Conference on Computer and Communications Securit
Medical data processing and analysis for remote health and activities monitoring
Recent developments in sensor technology, wearable computing, Internet of Things (IoT), and wireless communication have given rise to research in ubiquitous healthcare and remote monitoring of human\u2019s health and activities. Health monitoring systems involve processing and analysis of data retrieved from smartphones, smart watches, smart bracelets, as well as various sensors and wearable devices. Such systems enable continuous monitoring of patients psychological and health conditions by sensing and transmitting measurements such as heart rate, electrocardiogram, body temperature, respiratory rate, chest sounds, or blood pressure. Pervasive healthcare, as a relevant application domain in this context, aims at revolutionizing the delivery of medical services through a medical assistive environment and facilitates the independent living of patients. In this chapter, we discuss (1) data collection, fusion, ownership and privacy issues; (2) models, technologies and solutions for medical data processing and analysis; (3) big medical data analytics for remote health monitoring; (4) research challenges and opportunities in medical data analytics; (5) examples of case studies and practical solutions
Container-based microservice architecture for local IoT services
Abstract. Edge services are needed to save networking and computational resources on higher tiers, enable operation during network problems, and to help limiting private data propagation to higher tiers if the function needing it can be handled locally. MEC at access network level provides most of these features but cannot help when access network is down. Local services, in addition, help alleviating the MEC load and limit the data propagation even more, on local level. This thesis focuses on the local IoT service provisioning. Local service provisioning is subject to several requirements, related to resource/energy-efficiency, performance and reliability.
This thesis introduces a novel way to design and implement a Docker container-based micro-service system for gadget-free future IoT (Internet of Things) network. It introduces a use case scenario and proposes few possible required micro-services as of solution to the scenario. Some of these services deployed on different virtual platforms along with software components that can process sensor data providing storage capacity to make decisions based on their algorithm and business logic while few other services deployed with gateway components to connect rest of the devices to the system of solution. It also includes a state-of-the-art study for design, implementation, and evaluation as a Proof-of-Concept (PoC) based on container-based microservices with Docker. The used IoT devices are Raspberry Pi embedded computers along with an Ubuntu machine with a rich set of features and interfaces, capable of running virtualized services.
This thesis evaluates the solution based on practical implementation. In addition, the thesis also discusses the benefits and drawbacks of the system with respect to the empirical solution. The output of the thesis shows that the virtualized microservices could be efficiently utilized at the local and resource constrained IoT using Dockers. This validates that the approach taken in this thesis is feasible for providing such services and functionalities to the micro and nanoservice architecture. Finally, this thesis proposes numerous improvements for future iterations
Smart speaker design and implementation with biometric authentication and advanced voice interaction capability
Advancements in semiconductor technology have reduced dimensions and cost
while improving the performance and capacity of chipsets. In addition,
advancement in the AI frameworks and libraries brings possibilities to
accommodate more AI at the resource-constrained edge of consumer IoT devices.
Sensors are nowadays an integral part of our environment which provide
continuous data streams to build intelligent applications. An example could be
a smart home scenario with multiple interconnected devices. In such smart
environments, for convenience and quick access to web-based service and
personal information such as calendars, notes, emails, reminders, banking, etc,
users link third-party skills or skills from the Amazon store to their smart
speakers. Also, in current smart home scenarios, several smart home products
such as smart security cameras, video doorbells, smart plugs, smart carbon
monoxide monitors, and smart door locks, etc. are interlinked to a modern smart
speaker via means of custom skill addition. Since smart speakers are linked to
such services and devices via the smart speaker user's account. They can be
used by anyone with physical access to the smart speaker via voice commands. If
done so, the data privacy, home security and other aspects of the user get
compromised. Recently launched, Tensor Cam's AI Camera, Toshiba's Symbio,
Facebook's Portal are camera-enabled smart speakers with AI functionalities.
Although they are camera-enabled, yet they do not have an authentication scheme
in addition to calling out the wake-word. This paper provides an overview of
cybersecurity risks faced by smart speaker users due to lack of authentication
scheme and discusses the development of a state-of-the-art camera-enabled,
microphone array-based modern Alexa smart speaker prototype to address these
risks
IoT Based Image Processing Filters
Internet of things (IoT) becomes the backbone of the advanced countries and it has a real contribute to exchange the traditional style or way of practical life, even personal life into smart style, with (IoT) technology the life become more and more easy and professional. internet of things achieves various applications coordinate with sensors and standard protocols to apply what is called machine -to- machine connection (M2M), in this paper we will talk more about the concept of (M2M), the main component of internet of things and finally the common protocols that is used in network, in addition to that this work present an IOT operation with processing system using camera for capturing image and Xilinx system generator(XSG)models for designing image processing algorithms and the result of the processing is an image with black and white for edge detection and Thresholding models and gray color image for gray enhancement model
- …