3,296 research outputs found

    Platforms and Protocols for the Internet of Things

    Get PDF
    Building a general architecture for the Internet of Things (IoT) is a very complex task, exacerbated by the extremely large variety of devices, link layer technologies, and services that may be involved in such a system. In this paper, we identify the main blocks of a generic IoT architecture, describing their features and requirements, and analyze the most common approaches proposed in the literature for each block. In particular, we compare three of the most important communication technologies for IoT purposes, i.e., REST, MQTT, and AMQP, and we also analyze three IoT platforms: openHAB, Sentilo, and Parse. The analysis will prove the importance of adopting an integrated approach that jointly addresses several issues and is able to flexibly accommodate the requirements of the various elements of the system. We also discuss a use case which illustrates the design challenges and the choices to make when selecting which protocols and technologies to use

    Securing Cyber-Physical Social Interactions on Wrist-worn Devices

    Get PDF
    Since ancient Greece, handshaking has been commonly practiced between two people as a friendly gesture to express trust and respect, or form a mutual agreement. In this article, we show that such physical contact can be used to bootstrap secure cyber contact between the smart devices worn by users. The key observation is that during handshaking, although belonged to two different users, the two hands involved in the shaking events are often rigidly connected, and therefore exhibit very similar motion patterns. We propose a novel key generation system, which harvests motion data during user handshaking from the wrist-worn smart devices such as smartwatches or fitness bands, and exploits the matching motion patterns to generate symmetric keys on both parties. The generated keys can be then used to establish a secure communication channel for exchanging data between devices. This provides a much more natural and user-friendly alternative for many applications, e.g., exchanging/sharing contact details, friending on social networks, or even making payments, since it doesn’t involve extra bespoke hardware, nor require the users to perform pre-defined gestures. We implement the proposed key generation system on off-the-shelf smartwatches, and extensive evaluation shows that it can reliably generate 128-bit symmetric keys just after around 1s of handshaking (with success rate >99%), and is resilient to different types of attacks including impersonate mimicking attacks, impersonate passive attacks, or eavesdropping attacks. Specifically, for real-time impersonate mimicking attacks, in our experiments, the Equal Error Rate (EER) is only 1.6% on average. We also show that the proposed key generation system can be extremely lightweight and is able to run in-situ on the resource-constrained smartwatches without incurring excessive resource consumption

    A client-server architecture for distributed and scalable multimedia content analysis: an Android app for assisting phone users in shooting aesthetically valuable pictures

    Get PDF
    Nowadays developing modern scientific image and video analysis algorithms faces the issue of distributing them among the open community with multiple versions for very different platforms. This requires software development skills usually unknown by the researchers outside of the computer science world. Client/server communications have acquired a leading role by abstracting the business logic of applications from thin clients running on small devices like smartphones which end users can carry with them. The present work describes the design, modeling, development and testing of a client/server architecture that has the ability to perform computations on image and video characteristics on independent Matlab® instances and offer production efficient SQL persistence to store the results. All of this, immersed in a user authenticated environment. This project has been specifically focused on a currently ongoing study by researchers from Universidad Carlos III and Universidad Politécnica de Madrid. Their main goal is to estimate the aesthetic value of images and videos by the computation of audiovisual content. However, the architecture has been designed and built with the objective of being applicable to any kind of biomedical, audiovisual or any other engineering image or video analysis study.Hoy en día, desarrollar nuevos algoritmos científicos que analicen videos o imágenes lleva consigo el problema de la distribución abierta a la comunidad con las múltiples versiones de las distintas plataformas utilizadas. Para que ello sea posible, se requieren habilidades de desarrollo de software que normalmente son desconocidas por parte de los investigadores no inmersos en campo de la informática. Las plataformas cliente/servidor han adquirido un rol primordial al abstraer la funcionalidad principal de las aplicaciones de los clientes livianos como los teléfonos inteligentes que pueden llevarse en el bolsillo. Este trabajo describe el diseño, modelado, desarrollo y prueba de una arquitectura cliente/servidor que tiene la habilidad de realizar cálculos de características de imágenes y videos en instancias independientes de Matlab® y ofrecer persistencia de datos SQL al nivel de un entorno de producción donde guardar los resultados obtenidos, todo ello sumergido en un ambiente donde los usuarios están completamente autentificados. Este proyecto ha estado particularmente enfocado a una investigación actualmente en desarrollo por investigadores de la Universidad Carlos III y la Universidad Politécnica de Madrid. Esta investigación tiene como objetivo el estudio del valor estético de imágenes y videos a través del cálculo de descriptores objetivos. De todas maneras, la arquitectura se ha diseñado y construido con el objetivo de posibilitar la aplicación a cualquier otro estudio dentro de la ingeniería biomédica, audiovisual u otra ingeniería donde se requiera el análisis de video o imagen.Ingeniería Biomédic

    Design and Development of Widgets for a Corporate Security Application

    Get PDF
    Aquest projecte es lliura com a Treball Final del Grau d'Enginyeria Informàtica de la Facultat d'Informàtica de Barcelona. L'objectiu és posar en pràctica els coneixements adquirits durant l'especialitat d'enginyeria del Software. El projecte consisteix a dissenyar i desenvolupar widgets per a una aplicació móvil corporativa de seguretat que permet als usuaris interaccionar amb una de les funcionalitats principals de la aplicació, sempre mantenint la perspectiva de la seguretat i la usabilitat.This project is delivered as the Bachelor Thesis of the Informatics Engineering Degree of the Barcelona Faculty of Computer Science. The objective is to put into practice the knowledge acquired during the Software engineering specialty. The project consists of designing and developing widgets for a corporate security mobile application that allows users to interact with one of the main functionalities of the application, always maintaining the perspective of security and usability

    Simplifying Mobile Social Media Authentication On Android

    Get PDF
    Tänapäeval kasutatakse igapäevaselt nutitelefone. Kui mobiiltelefoni põhiline funktsioon oli helistamine, siis nutitelefonid pakuvad kasutajatele palju suuremaid võimalusi: võimalust suhtlemiseks, kasutada sotsiaalmeediat, saata kiirsõnumeid, telefoniga lindistada, vaadata videoid jne. Pew Research Center poolt 2014. aasta jaanuaris täiskasvanute seas läbiviidud interneti kasutamise uuringu vastustest selgus, et kasutades internetti kasutavad vastajatest 74 protsenti sealjuures sotsiaalmeediat. Juhul, kui need isikud omavad nutitelefoni, on tõenäosus, et nad kasutavad sotsiaalmeediat ka oma\n\rnutiseadmel, kuid piiranguga, mis tuleneb seadme suurusest. Nutitelefoni suurus mõjutab info vaatamist ja teksti sisestamist. Teksti trükkimine võib osutuda raskemaks klaviatuuri väiksuse tõttu, samuti võivad selle tõttu tekkida probleemid autentimisel, eriti kui teksti peab mitmeid kordi sisestama. Sellised olukorrad võivad viia lühemate paroolide kasutamiseni, mis omakorda vähendab meie kontode turvalisust. Käesolev töö pakub välja lahenduse sellistele olukordadele, kasutades trükkimise asemel mustreid. Mustrid võimaldavad\n\refektiivsemat ekraani kasutust ja annavad kasutajale rohkem kindlust. Uuringu\n\rtulemused näitavad, et selline lähenemine autentimisele on võimalik.Nowadays, smartphones are very common and are being used in everyday life. Even though mobile phones were originally invented as calling devices, smartphones allow the user to communicate in different ways including social media, instant messaging, recording and watching videos, etc. Recent statistics presented by Pew Research Center as of January 2014 claim, that 74 percentage of online adults use social media. In case they own a smartphone, they probably use social media on it as well, but with restrictions that come with the size of the device, affecting how we view content and also type. Typing on smartphones can be frustrating, but more so when the keyboard size prevents us from succeeding with authentication and we have to type the same text numerous times, which can lead to shorter passwords decreasing the security of the accounts. This paper proposes a solution to such occurrences by using pattern recognition rather than typing. Patterns allow the screen to be used more efficiently, giving the user more room for accuracy errors. Survey results indicate that approaching authentication in this way is feasible

    Attendio: Attendance Tracking Made Simple

    Get PDF

    Development of a mobile platform to create and manage digital business cards

    Get PDF
    With the raising number of student entrepreneurs and groups of individuals creating start-ups, snding funding for a company is becoming increasingly diwcult. The Digital Business Cards project aims to help entrepreneurs exchange contact information without having to rely on expensive physical business cards. The application consists of a mobile platform that allows users to freely create and manage business cards allowing easy sharing and making cards accessible to everyone, regardless of whether they have an account or not.Con el creciente número de estudiantes emprendedores y grupos de individuos creando empresas, encontrar snanciación se está convirtiendo cada vez más difícil. El proyecto tarjetas de contacto digitales tiene como objetivo ayudar a emprendedores a intercambiar información de contacto evitando la dependencia en las costosas tarjetas de visita tradicionales. La aplicación consiste en una plataforma móvil que permite a los usuarios crear y gestionar tarjetas de forma gratuita, permitiendo compartirlas con facilidad y con cualquiera, independientemente de si tienen una cuenta con la aplicación o no.Amb el creixent nombre d'estudiants emprenedors i grups d'individus creant empreses, trobar snançament s'està convertint en una tasca cada vegada més difícil. El projecte targetes de contacte digitals té com a objectiu ajudar a emprenedors a intercanviar informació de contacte evitant haver de dependre de les costoses targetes de visita tradicionals. L'aplicació consisteix en una plataforma mòbil que permet als usuaris crear i gestionar targetes de forma gratuïta, permetent compartir-les amb facilitat i amb qualsevol, independentment de si tenen una compta amb l'aplicació o no

    A Survey of Machine Learning Techniques for Behavioral-Based Biometric User Authentication

    Get PDF
    Authentication is a way to enable an individual to be uniquely identified usually based on passwords and personal identification number (PIN). The main problems of such authentication techniques are the unwillingness of the users to remember long and challenging combinations of numbers, letters, and symbols that can be lost, forged, stolen, or forgotten. In this paper, we investigate the current advances in the use of behavioral-based biometrics for user authentication. The application of behavioral-based biometric authentication basically contains three major modules, namely, data capture, feature extraction, and classifier. This application is focusing on extracting the behavioral features related to the user and using these features for authentication measure. The objective is to determine the classifier techniques that mostly are used for data analysis during authentication process. From the comparison, we anticipate to discover the gap for improving the performance of behavioral-based biometric authentication. Additionally, we highlight the set of classifier techniques that are best performing for behavioral-based biometric authentication
    corecore