135 research outputs found

    A Design Approach to IoT Endpoint Security for Production Machinery Monitoring

    Get PDF
    The Internet of Things (IoT) has significant potential in upgrading legacy production machinery with monitoring capabilities to unlock new capabilities and bring economic benefits. However, the introduction of IoT at the shop floor layer exposes it to additional security risks with potentially significant adverse operational impact. This article addresses such fundamental new risks at their root by introducing a novel endpoint security-by-design approach. The approach is implemented on a widely applicable production-machinery-monitoring application by introducing real-time adaptation features for IoT device security through subsystem isolation and a dedicated lightweight authentication protocol. This paper establishes a novel viewpoint for the understanding of IoT endpoint security risks and relevant mitigation strategies and opens a new space of risk-averse designs that enable IoT benefits, while shielding operational integrity in industrial environments

    Defining the Internet of Devices: Privacy and Security Implications

    Get PDF
    Presented at the 2014 Privacy Law Scholars Conference, hosted by the George Washington University Law School in Washington, DC, June 2014.What observers have called the Internet of Things (IoT) presents privacy and security challenges for contemporary society. The conceptual model of the IoT evolved rapidly from technologies used to track parts in industrial supply chain management to a diverse set of smart technologies. This rapid evolution has merged several conceptually distinct technologies into a single, difficult-to-define concept. A key difficulty is defining what constitutes a “thing.” The term has been used to refer both to the things sensed, such as a star or the contents of a refrigerator, and to the things that do the sensing (devices). We argue that the Internet of Things is better conceptualized as an Internet of Devices (IoD) because devices, not things, act in a digital form and connect to the Internet. Along with the other requirements of an effective IoD, technologists and policy makers must develop standards, network protocols, identity management solutions, and governance for the IoD to address privacy and security challenges a priori rather than retrofitted after the fact. Privacy and security cannot easily be added to a system that is already deployed and established. In this paper, we define the IoT and the IoD and summarize the independent technologies from which they have evolved. We provide a five-stage general policy framework for evaluating privacy and security concerns in the IoD. Our framework seeks to provide a consistent approach to evaluating privacy and security concerns across all IoD technologies while remaining flexible enough to adapt to new technical developments

    The Metaverse: Survey, Trends, Novel Pipeline Ecosystem & Future Directions

    Full text link
    The Metaverse offers a second world beyond reality, where boundaries are non-existent, and possibilities are endless through engagement and immersive experiences using the virtual reality (VR) technology. Many disciplines can benefit from the advancement of the Metaverse when accurately developed, including the fields of technology, gaming, education, art, and culture. Nevertheless, developing the Metaverse environment to its full potential is an ambiguous task that needs proper guidance and directions. Existing surveys on the Metaverse focus only on a specific aspect and discipline of the Metaverse and lack a holistic view of the entire process. To this end, a more holistic, multi-disciplinary, in-depth, and academic and industry-oriented review is required to provide a thorough study of the Metaverse development pipeline. To address these issues, we present in this survey a novel multi-layered pipeline ecosystem composed of (1) the Metaverse computing, networking, communications and hardware infrastructure, (2) environment digitization, and (3) user interactions. For every layer, we discuss the components that detail the steps of its development. Also, for each of these components, we examine the impact of a set of enabling technologies and empowering domains (e.g., Artificial Intelligence, Security & Privacy, Blockchain, Business, Ethics, and Social) on its advancement. In addition, we explain the importance of these technologies to support decentralization, interoperability, user experiences, interactions, and monetization. Our presented study highlights the existing challenges for each component, followed by research directions and potential solutions. To the best of our knowledge, this survey is the most comprehensive and allows users, scholars, and entrepreneurs to get an in-depth understanding of the Metaverse ecosystem to find their opportunities and potentials for contribution

    5G: 2020 and Beyond

    Get PDF
    The future society would be ushered in a new communication era with the emergence of 5G. 5G would be significantly different, especially, in terms of architecture and operation in comparison with the previous communication generations (4G, 3G...). This book discusses the various aspects of the architecture, operation, possible challenges, and mechanisms to overcome them. Further, it supports users? interac- tion through communication devices relying on Human Bond Communication and COmmunication-NAvigation- SENsing- SErvices (CONASENSE).Topics broadly covered in this book are; • Wireless Innovative System for Dynamically Operating Mega Communications (WISDOM)• Millimeter Waves and Spectrum Management• Cyber Security• Device to Device Communicatio

    Addressing data accuracy and information integrity in mHealth using ML

    Full text link
    The aim of the study was finding a way in which Machine Learning can be applied in mHealth Solutions to detect inaccurate data that can potentially harm patients. The result was an algorithm that classified accurate and inaccurate data

    5G: 2020 and Beyond

    Get PDF
    The future society would be ushered in a new communication era with the emergence of 5G. 5G would be significantly different, especially, in terms of architecture and operation in comparison with the previous communication generations (4G, 3G...). This book discusses the various aspects of the architecture, operation, possible challenges, and mechanisms to overcome them. Further, it supports users? interac- tion through communication devices relying on Human Bond Communication and COmmunication-NAvigation- SENsing- SErvices (CONASENSE).Topics broadly covered in this book are; • Wireless Innovative System for Dynamically Operating Mega Communications (WISDOM)• Millimeter Waves and Spectrum Management• Cyber Security• Device to Device Communicatio

    Exploring Implementation Strategies of IoT Technology in Organizations: Technology, Organization, and Environment

    Get PDF
    AbstractAfter organizations successfully adopt the internet of things (IoT) technology, many corporate information technology (IT) leaders face challenges during the implementation phase. Corporate IT leaders\u27 potential failures in implementing IoT devices may impede organizations from integrating IoT solutions and promoting business benefits. Grounded in technology-organization-environment (TOE) theory, the purpose of this qualitative, pragmatic inquiry study was to explore strategies that corporate IT leaders use to implement IoT technology in their organizations. The participants were six corporate healthcare IT leaders who successfully used implementation strategies for implementing IoT solutions for their organizations. Data were collected using semistructured interviews and industry security documents. After using the thematic analysis for the data analysis process, six themes were identified: using all identified internal project staff skills, aligning current IoT technology with business needs, using all identified current internal infrastructure, using all identified external support technologies, taking full advantage of vendor support, and using all identified external influencers and influences. A key recommendation for IT leaders is to use the IoT ecosystem from the implemented IoT solutions to promote benefits and profits. The implications for positive social change include the potential to improve technology to support and encourage benefits to organizations and increase the number of organizations successfully implementing IoT technology. Businesses and end-users can benefit from the IoT ecosystem with IoT devices in smart cities, offices, hospitals, or homes
    • …
    corecore