82 research outputs found

    China: Rule-taker or Rule-maker in the International Intellectual Property System?

    Get PDF
    Intellectual property has been a crucial issue for China in the past four decades. Internationally, it was central to China’s fifteen-year negotiation on its accession to the WTO and has been a priority in China-US bilateral relations. Domestically, changes in the regulation and use of intellectual property reflect a larger picture of rapid economic and social transition in China. Initially, China was a rule-taker in intellectual property, experiencing pressure from abroad to do much more on intellectual property. In response, China enacted comprehensive domestic intellectual property laws. From 2001, the Chinese Trademark Office was registering more trademarks than any other office in the world and from 2011, the State Intellectual Property Office of China (SIPO) became the world's largest patent office. Today the Chinese government promotes intellectual property protection in its national strategy of “innovation-driven development” and seeks to transform China into the world’s leading intellectual property power. This thesis focuses on whether the large-scale deployment of intellectual property by China in various markets means that it has become a regulatory power in intellectual property, in the sense of being an agenda setter and source of global influence over IP rules. The UK in the nineteenth century and the US in the twentieth were regulatory IP powers in this sense. China’s regulatory and international influence over IP rules is tracked empirically through case studies on geographical indications (Chapter 3), the disclosure obligation (Chapter 4), and intellectual property and standardization (Chapter 5), along with an examination of China’s international IP engagement at the bilateral level (Chapter 6) and plurilateral and multilateral levels (Chapter 7). This thesis also analyses the roles of sub-state actors and non-state actors in China’s international intellectual property engagement (Chapter 8). This thesis argues that China’s role in international intellectual property regulation is more nuanced and complicated than a binary categorization of “rule-maker” or “rule-taker”. China’s international IP engagement is guided by a group of key principles, specifically the principles of IP instrumentalism and a set of foreign policy principles. These principles have been implemented through a process of modeling, while potential conflicts have been minimized through a strategy of balancing. The effects of modeling are compliance and institutional isomorphism which makes the Chinese IP system similar to those of developed countries. Balancing leads to constructed inconsistency and has led China into keeping a low-profile in international policy debates on intellectual property

    Security and Privacy for IoT Ecosystems

    Get PDF
    Smart devices have become an integral part of our everyday life. In contrast to smartphones and laptops, Internet of Things (IoT) devices are typically managed by the vendor. They allow little or no user-driven customization. Users need to use and trust IoT devices as they are, including the ecosystems involved in the processing and sharing of personal data. Ensuring that an IoT device does not leak private data is imperative. This thesis analyzes security practices in popular IoT ecosystems across several price segments. Our results show a gap between real-world implementations and state-of-the-art security measures. The process of responsible disclosure with the vendors revealed further practical challenges. Do they want to support backward compatibility with the same app and infrastructure over multiple IoT device generations? To which extent can they trust their supply chains in rolling out keys? Mature vendors have a budget for security and are aware of its demands. Despite this goodwill, developers sometimes fail at securing the concrete implementations in those complex ecosystems. Our analysis of real-world products reveals the actual efforts made by vendors to secure their products. Our responsible disclosure processes and publications of design recommendations not only increase security in existing products but also help connected ecosystem manufacturers to develop secure products. Moreover, we enable users to take control of their connected devices with firmware binary patching. If a vendor decides to no longer offer cloud services, bootstrapping a vendor-independent ecosystem is the only way to revive bricked devices. Binary patching is not only useful in the IoT context but also opens up these devices as research platforms. We are the first to publish tools for Bluetooth firmware and lower-layer analysis and uncover a security issue in Broadcom chips affecting hundreds of millions of devices manufactured by Apple, Samsung, Google, and more. Although we informed Broadcom and customers of their technologies of the weaknesses identified, some of these devices no longer receive official updates. For these, our binary patching framework is capable of building vendor-independent patches and retrofit security. Connected device vendors depend on standards; they rarely implement lower-layer communication schemes from scratch. Standards enable communication between devices of different vendors, which is crucial in many IoT setups. Secure standards help making products secure by design and, thus, need to be analyzed as early as possible. One possibility to integrate security into a lower-layer standard is Physical-Layer Security (PLS). PLS establishes security on the Physical Layer (PHY) of wireless transmissions. With new wireless technologies emerging, physical properties change. We analyze how suitable PLS techniques are in the domain of mmWave and Visible Light Communication (VLC). Despite VLC being commonly believed to be very secure due to its limited range, we show that using VLC instead for PLS is less secure than using it with Radio Frequency (RF) communication. The work in this thesis is applied to mature products as well as upcoming standards. We consider security for the whole product life cycle to make connected devices and IoT ecosystems more secure in the long term

    Remote vital signs monitoring based on wireless sensor networks

    Get PDF
    Tese de doutoramento em Líderes para as Indústrias TecnológicasGovernmental and private institutions face a major challenge to provide quality health care to a population consisting of a growing number of elderly and chronically ill patients. According to the World Health Organization, in 2006, the total global health expenditures exceeded US$ 4 trillion and are rising in the majority of countries including Portugal which, during 2006, expended 9.9% of its gross domestic product in health care. The use of remote vital signs monitoring systems increases the probability of early detection of risky situations, allows frequent monitoring of in-patients, elderly and chronically ill patients, and streamlines the work of health professionals. However, at present, these systems are expensive, complex and employ obtrusive sensors, which limit their application to intensive care units and cardiac intermediate care units. This work is part of a project that aims to design, prototype and evaluate a remote vital signs monitoring system based on the IEEE 802.15.4 and ZigBee protocols, which allow the development of small low-power sensors. The prototype system comprises electrocardiogram/heart rate and axillary thermometer sensors, networking devices and three informatics applications that collect, process, and exhibit medical data. The wireless sensors, the networking devices and one of the applications were developed under this work. Additionally, the wireless sensor network was evaluated through simulations at the MAC level and experimental and field tests. Field tests were performed at an in-patient floor of Hospital Privado de Guimarães, a Portuguese hospital. Finally, questionnaires were used to measure the satisfaction of users and catalog their critics and suggestions for improvement. Simulations considered different topologies, operation modes and a crescent number of sensors and hops. Experimental and field tests confirmed most of the results obtained by simulations, but revealed that networks which did not assign transmission time slots to electrocardiogram sensors were unable to maintain a high delivery ratio. Contention between devices, aggravated by the inability of routers in receiving incoming packets during backoff, and collisions between packets generated by hiddennodes were responsible for most message losses. On the other hand, beacon-enabled star IEEE 802.15.4 networks that assigned a guaranteed time slot to sensors were able to maintain a very high delivery ratio. In contrast, these networks are restricted in terms of the coverage area and the number of sensors. Also, field tests showed that under low traffic scenarios ZigBee nonbeacon-enabled networks can achieve a high delivery ratio even in presence of a high percentage of hidden-nodes.Instituições governamentais e privadas enfrentam um grande desafio para prestar cuidados de saúde de qualidade a uma população constituída por um número crescente de idosos e doentes crónicos. Segundo a Organização Mundial de Saúde, em 2006, a despesa mundial em saúde ultrapassou a quantia de 4 bilhões de dólares americanos e cresce anualmente na maioria dos países, incluindo Portugal, o qual, em 2006, gastou 9,9% do seu produto interno bruto em cuidados de saúde. O uso de sistemas de monitorização remota de sinais vitais aumenta a probabilidade de deteção precoce de situações de risco, permite que doentes internados, idosos ou doentes crónicos sejam frequentemente monitorizados e agiliza o trabalho dos profissionais de saúde. No entanto, atualmente, estes sistemas são caros e complexos, o que limita a sua aplicação a alguns setores dos hospitais, tais como as unidades de cuidados intensivos e as unidades de cuidados intermédios na área da cardiologia. O projeto no qual insere-se este trabalho visa a conceção, a prototipagem e a avaliação de um sistema de monitorização remota de sinais vitais com base nos protocolos IEEE 802.15.4 e ZigBee, os quais oferecem a possibilidade de construção de sensores com consumos energéticos muito baixos e reduzidas dimensões. O sistema consiste em sensores de eletrocardiograma/frequência cardíaca e temperatura axilar, dispositivos de rede e três aplicações que coletam, processam e apresentam o eletrocardiograma e os sinais vitais. No âmbito deste trabalho foram desenvolvidos os sensores sem fios, os dispositivos de rede e uma das aplicações informáticas. Além disso, foi feita a avaliação do desempenho da rede de sensores sem fios através da análise de simulações a nível da camada de acesso ao meio (MAC) e de testes de laboratório e de campo. Os testes de campo da rede de sensores sem fios foram executados em um dos pisos de internamento do Hospital Privado de Guimarães. Finalmente, foram usados questionários para medir a satisfação dos utilizadores e recolher críticas e sugestões de melhoria. As simulações consideraram diferentes topologias e modos de operação, além de um número crescente de sensores e saltos. Testes experimentais e de campo confirmaram grande parte dos resultados obtidos por simulação mas, adicionalmente, revelaram que as redes constituídas por vários sensores de eletrocardiograma e que não reservaram um intervalo de tempo de transmissão aos sensores não foram capazes de manter uma elevada taxa de entrega de mensagens. Perdas de mensagens ocorreram devido a disputas entre sensores pelo acesso ao canal sem fios e devido a ocorrência de colisões de pacotes transmitidos por nós escondidos. Por outro lado, as redes baseadas no protocolo IEEE 802.15.4 que atribuíram um intervalo de tempo de transmissão a cada sensor conseguiram manter uma elevada taxa de entrega. Entretanto, essas redes são limitadas em termos da área de cobertura e do número de sensores. Adicionalmente, durante os testes de campo em cenários de tráfego reduzido, as redes ZigBee que não empregaram beacons atingiram uma elevada taxa de entrega mesmo na presença de uma grande percentagem de nós escondidos

    Compilation of thesis abstracts, December 2006

    Get PDF
    NPS Class of December 2006This quarter’s Compilation of Abstracts summarizes cutting-edge, security-related research conducted by NPS students and presented as theses, dissertations, and capstone reports. Each expands knowledge in its field.http://archive.org/details/compilationofsis109452750

    Smart Monitoring and Control in the Future Internet of Things

    Get PDF
    The Internet of Things (IoT) and related technologies have the promise of realizing pervasive and smart applications which, in turn, have the potential of improving the quality of life of people living in a connected world. According to the IoT vision, all things can cooperate amongst themselves and be managed from anywhere via the Internet, allowing tight integration between the physical and cyber worlds and thus improving efficiency, promoting usability, and opening up new application opportunities. Nowadays, IoT technologies have successfully been exploited in several domains, providing both social and economic benefits. The realization of the full potential of the next generation of the Internet of Things still needs further research efforts concerning, for instance, the identification of new architectures, methodologies, and infrastructures dealing with distributed and decentralized IoT systems; the integration of IoT with cognitive and social capabilities; the enhancement of the sensing–analysis–control cycle; the integration of consciousness and awareness in IoT environments; and the design of new algorithms and techniques for managing IoT big data. This Special Issue is devoted to advancements in technologies, methodologies, and applications for IoT, together with emerging standards and research topics which would lead to realization of the future Internet of Things

    Building the Future Internet through FIRE

    Get PDF
    The Internet as we know it today is the result of a continuous activity for improving network communications, end user services, computational processes and also information technology infrastructures. The Internet has become a critical infrastructure for the human-being by offering complex networking services and end-user applications that all together have transformed all aspects, mainly economical, of our lives. Recently, with the advent of new paradigms and the progress in wireless technology, sensor networks and information systems and also the inexorable shift towards everything connected paradigm, first as known as the Internet of Things and lately envisioning into the Internet of Everything, a data-driven society has been created. In a data-driven society, productivity, knowledge, and experience are dependent on increasingly open, dynamic, interdependent and complex Internet services. The challenge for the Internet of the Future design is to build robust enabling technologies, implement and deploy adaptive systems, to create business opportunities considering increasing uncertainties and emergent systemic behaviors where humans and machines seamlessly cooperate

    Discrete Event Simulations

    Get PDF
    Considered by many authors as a technique for modelling stochastic, dynamic and discretely evolving systems, this technique has gained widespread acceptance among the practitioners who want to represent and improve complex systems. Since DES is a technique applied in incredibly different areas, this book reflects many different points of view about DES, thus, all authors describe how it is understood and applied within their context of work, providing an extensive understanding of what DES is. It can be said that the name of the book itself reflects the plurality that these points of view represent. The book embraces a number of topics covering theory, methods and applications to a wide range of sectors and problem areas that have been categorised into five groups. As well as the previously explained variety of points of view concerning DES, there is one additional thing to remark about this book: its richness when talking about actual data or actual data based analysis. When most academic areas are lacking application cases, roughly the half part of the chapters included in this book deal with actual problems or at least are based on actual data. Thus, the editor firmly believes that this book will be interesting for both beginners and practitioners in the area of DES

    Building the Future Internet through FIRE

    Get PDF
    The Internet as we know it today is the result of a continuous activity for improving network communications, end user services, computational processes and also information technology infrastructures. The Internet has become a critical infrastructure for the human-being by offering complex networking services and end-user applications that all together have transformed all aspects, mainly economical, of our lives. Recently, with the advent of new paradigms and the progress in wireless technology, sensor networks and information systems and also the inexorable shift towards everything connected paradigm, first as known as the Internet of Things and lately envisioning into the Internet of Everything, a data-driven society has been created. In a data-driven society, productivity, knowledge, and experience are dependent on increasingly open, dynamic, interdependent and complex Internet services. The challenge for the Internet of the Future design is to build robust enabling technologies, implement and deploy adaptive systems, to create business opportunities considering increasing uncertainties and emergent systemic behaviors where humans and machines seamlessly cooperate

    Pertanika Journal of Science & Technology

    Get PDF
    corecore