607 research outputs found

    Federated Embedded Systems – a review of the literature in related fields

    Get PDF
    This report is concerned with the vision of smart interconnected objects, a vision that has attracted much attention lately. In this paper, embedded, interconnected, open, and heterogeneous control systems are in focus, formally referred to as Federated Embedded Systems. To place FES into a context, a review of some related research directions is presented. This review includes such concepts as systems of systems, cyber-physical systems, ubiquitous computing, internet of things, and multi-agent systems. Interestingly, the reviewed fields seem to overlap with each other in an increasing number of ways

    Energy consideration when integrating Blockchain with IoT for anti-counterfeit

    Get PDF
    Blockchain technology has been growing in popularity after Bitcoin, the first protocol has demonstrated a strong use case of the technology in Finance. Over the years, as the technology develops more and more, other use cases for the technology which basically relies on a distributed ledger database system have been explored in areas like supply chain and Internet of Things, to help in some of the bottleneck which IoT faces, some of the challenges are security, privacy, scalability, etc. This thesis work will consider energy consumption when integrating IoT with the Blockchain for anti-counterfeit purposes. Because there is little public academic information about the integration of Blockchain with IoT, it is very difficult to ascertain quantitatively, the energy requirement in application areas like anti-counterfeit. This thesis work has to qualitatively, rely on projects whitepapers and application documentation when comparing the energy requirement in the integration of Blockchain and IoT used for counterfeit solutions by different projects. Both private and public (open-sourced) projects were considered and resulted in two broad classifications ‘integration by brands using a unique identifier (RFID and NFC)’ and ‘integration throughout a product lifecycle’. Energy need for each project(s) in a class is considered based on the IoT hardware used and the Blockchain generation and consensus which also seems to have an impact on the implementation cost and complexity of the project

    Taxonomies for Reasoning About Cyber-physical Attacks in IoT-based Manufacturing Systems

    Get PDF
    The Internet of Things (IoT) has transformed many aspects of modern manufacturing, from design to production to quality control. In particular, IoT and digital manufacturing technologies have substantially accelerated product development- cycles and manufacturers can now create products of a complexity and precision not heretofore possible. New threats to supply chain security have arisen from connecting machines to the Internet and introducing complex IoT-based systems controlling manufacturing processes. By attacking these IoT-based manufacturing systems and tampering with digital files, attackers can manipulate physical characteristics of parts and change the dimensions, shapes, or mechanical properties of the parts, which can result in parts that fail in the field. These defects increase manufacturing costs and allow silent problems to occur only under certain loads that can threaten safety and/or lives. To understand potential dangers and protect manufacturing system safety, this paper presents two taxonomies: one for classifying cyber-physical attacks against manufacturing processes and another for quality control measures for counteracting these attacks. We systematically identify and classify possible cyber-physical attacks and connect the attacks with variations in manufacturing processes and quality control measures. Our taxonomies also provide a scheme for linking emerging IoT-based manufacturing system vulnerabilities to possible attacks and quality control measures

    Unpacking People's Understandings of Bluetooth Beacon Systems - A Location-Based IoT Technology

    Get PDF
    Bluetooth beacon technology is an emerging location-based Internet of Things (IoT) technology, designed to transform proximity-based services in various domains such as retail. Beacons are part of the IoT infrastructure, but people rarely interact with them directly and yet they could still pose privacy risks to users. However, little is known about people's understandings of how beacon-based systems work. This is an important question since it can influence people's perceptions, adoption, and usage of this emerging technology. Drawing from 22 semi-structured interviews, we studied people's understandings of how beacon-based systems work and identified several factors that shaped their understandings or misunderstandings, such as how information flows among the components and who owns the beacons. These understandings and misunderstandings can potentially pose significant privacy risks to beacon users

    Unpacking People\u27s Understandings of Bluetooth Beacon Systems - A Location-Based IoT Technology

    Get PDF
    Bluetooth beacon technology is an emerging location-based Internet of Things (IoT) technology, designed to transform proximity-based services in various domains such as retail. Beacons are part of the IoT infrastructure, but people rarely interact with them directly and yet they could still pose privacy risks to users. However, little is known about people\u27s understandings of how beacon-based systems work. This is an important question since it can influence people\u27s perceptions, adoption, and usage of this emerging technology. Drawing from 22 semi-structured interviews, we studied people\u27s understandings of how beacon-based systems work and identified several factors that shaped their understandings or misunderstandings, such as how information flows among the components and who owns the beacons. These understandings and misunderstandings can potentially pose significant privacy risks to beacon users

    When Internet of Things meets Metaverse: Convergence of Physical and Cyber Worlds

    Get PDF
    In recent years, the Internet of Things (IoT) is studied in the context of the Metaverse to provide users immersive cyber-virtual experiences in mixed reality environments. This survey introduces six typical IoT applications in the Metaverse, including collaborative healthcare, education, smart city, entertainment, real estate, and socialization. In the IoT-inspired Metaverse, we also comprehensively survey four pillar technologies that enable augmented reality (AR) and virtual reality (VR), namely, responsible artificial intelligence (AI), high-speed data communications, cost-effective mobile edge computing (MEC), and digital twins. According to the physical-world demands, we outline the current industrial efforts and seven key requirements for building the IoT-inspired Metaverse: immersion, variety, economy, civility, interactivity, authenticity, and independence. In addition, this survey describes the open issues in the IoT-inspired Metaverse, which need to be addressed to eventually achieve the convergence of physical and cyber worlds.info:eu-repo/semantics/publishedVersio

    Use of blockchain technology to manage the supply chains: Comparison of perspectives between technology providers and early industry adopters

    Get PDF
    Following the interest in blockchain technology (BCT) business solutions and the nascent stage of technology in supply chain (SC) practices, this research compares views from business practitioners who are experienced in real cases of BCT adoption with the views of technology consultants proficient in the complexities of BCT to analyze the benefits and challenges BCT holds for SCs. Based on the comparison of the two sides, the joint views that both adopters and technology consultants share is the ability that BCT holds to speed up processes across SCs through decentralized data access, thus decreasing human errors and reducing paperwork. However, technology consultants perceive the need to increase BCT awareness levels of businesses, to prevent BCT implementation just for reasons such as ‘recordkeeping’ and to reduce misconceptions in areas such as cryptocurrency applications. The findings also revealed that technology consultants insist on the careful evaluation and definition of records to be kept on BCT platforms prior to the adoption process, in order to avoid unnecessary data input. Currently, according to early industry adopters’ cases, most business attempts of BCT adoption use private networks, so technology consultants promote business entities on developing plans towards open-access public networks.info:eu-repo/semantics/publishedVersio

    Securing the Internet of Healthcare

    Get PDF
    Cybersecurity, including the security of information technology (IT), is a critical requirement in ensuring society trusts, and therefore can benefit from, modern technology. Problematically, though, rarely a day goes by without a news story related to how critical data has been exposed, exfiltrated, or otherwise inappropriately used or accessed as a result of supply chain vulnerabilities. From the Russian government\u27s campaign to influence the 2016 U.S. presidential election to the September 2017 Equifax breach of more than 140-million Americans\u27 credit reports, mitigating cyber risk has become a topic of conversation in boardrooms and the White House, on Wall Street and Main Street. But oftentimes these discussions miss the problems replete in the often-expansive supply chains on which many of these products and services we depend on are built; this is particularly true in the medical device context. The problem recently made national news with the FDA-mandated recall of more than 400,000 pacemakers that were found to be vulnerable to hackers necessitating a firmware update. This Article explores the myriad vulnerabilities in the supply chain for medical devices, investigates existing FDA cybersecurity and privacy regulations to identify any potential governance gaps, and suggests a path forward to boost cybersecurity due diligence for manufacturers by making use of new approaches and technologies, including blockchain

    Securing the Internet of Healthcare

    Get PDF
    Cybersecurity, which includes the security of information technology (IT), is critical to ensuring that society trusts, and therefore can benefit from, modern technology. Problematically, though, rarely a day goes by without a news story related to how critical data has been exposed, exfiltrated, or otherwise inappropriately used or accessed as a result of supply chain vulnerabilities. From the Russian government’s campaign to influence the 2016 U.S. presidential election to the September 2017 Equifax breach of more than 140 million Americans’ credit reports, cyber risk has become a topic of conversation in boardrooms and the White House, on Wall Street and main street. But these discussions often miss the problems replete in the expansive supply chains on which many of these products and services we depend on are built; this is particularly true in the medical device context. The problem recently made national news with the voluntary recall of more than 400,000 pacemakers that were found to be vulnerable to hackers, necessitating a firmware update. This Article explores the myriad vulnerabilities in the supply chain for medical devices, investigates existing FDA cybersecurity and privacy regulations to identify any potential governance gaps, and suggests a path forward to boost cybersecurity due diligence for manufacturers by making use of new approaches and technologies, including blockchain
    • 

    corecore