27,822 research outputs found

    Resource Efficient Authentication and Session Key Establishment Procedure for Low-Resource IoT Devices

    Get PDF
    open access journalThe Internet of Things (IoT) can includes many resource-constrained devices, with most usually needing to securely communicate with their network managers, which are more resource-rich devices in the IoT network. We propose a resource-efficient security scheme that includes authentication of devices with their network managers, authentication between devices on different networks, and an attack-resilient key establishment procedure. Using automated validation with internet security protocols and applications tool-set, we analyse several attack scenarios to determine the security soundness of the proposed solution, and then we evaluate its performance analytically and experimentally. The performance analysis shows that the proposed solution occupies little memory and consumes low energy during the authentication and key generation processes respectively. Moreover, it protects the network from well-known attacks (man-in-the-middle attacks, replay attacks, impersonation attacks, key compromission attacks and denial of service attacks)

    Looking to the future: M-learning with the iPad

    Get PDF
    Might Apple’s new iPad gain unprecedented traction in education, or is just another example of the over-hyping of new devices in a time of technological determinism (Postman, 2000)? This paper explores the potential affordances and limitations of the Apple iPad in the wider context of emergent mobile learning theory, and the social and economic drivers that fuel technology development. Against the background of effective teaching and learning, the functionality offered by the iPad, and its potential uses for learning, are discussed. A critical review of the way the iPad may support learning, that draws on learning theory, contemporary articles and e-learning literature, suggests that the device may offer an exciting platform for consuming and creating content in a collaborative, interactive way. However, of greater importance is that effective, evidence-driven, innovative practices, combined with a clear-sighted assessment of the advantages and limitations of any product, should take priority over the device itself

    In Things We Trust? Towards trustability in the Internet of Things

    Full text link
    This essay discusses the main privacy, security and trustability issues with the Internet of Things

    Biometric Authentication System on Mobile Personal Devices

    Get PDF
    We propose a secure, robust, and low-cost biometric authentication system on the mobile personal device for the personal network. The system consists of the following five key modules: 1) face detection; 2) face registration; 3) illumination normalization; 4) face verification; and 5) information fusion. For the complicated face authentication task on the devices with limited resources, the emphasis is largely on the reliability and applicability of the system. Both theoretical and practical considerations are taken. The final system is able to achieve an equal error rate of 2% under challenging testing protocols. The low hardware and software cost makes the system well adaptable to a large range of security applications
    corecore