625 research outputs found

    Demystifying Internet of Things Security

    Get PDF
    Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Security Engine capabilities to simplify it. This book explores the challenges to secure these devices to make them immune to different threats originating from within and outside the network. The requirements and robustness rules to protect the assets vary greatly and there is no single blanket solution approach to implement security. Demystifying Internet of Things Security provides clarity to industry professionals and provides and overview of different security solutions What You'll Learn Secure devices, immunizing them against different threats originating from inside and outside the network Gather an overview of the different security building blocks available in Intel Architecture (IA) based IoT platforms Understand the threat pyramid, secure boot, chain of trust, and the software stack leading up to defense-in-depth Who This Book Is For Strategists, developers, architects, and managers in the embedded and Internet of Things (IoT) space trying to understand and implement the security in the IoT devices/platforms

    Digital Signature Method to Overcome Sniffing Attacks on LoRaWAN Network

    Get PDF
    LoRa or Long Range with LoRaWAN technology is a protocol for low-power wireless networks. The absence of an encryption process on the data payload becomes a challenge for the LoRaWAN network. When the process of sending messages is running inter devices, sniffing might occur, thereby reducing the confidentiality aspect of the data communication process. This paper optimized the digital signature method to secure messages sent by LoRaWAN network devices, along with Advanced Encryption Standard (AES) algorithm and Ed25519 algorithm. AES was used for message encryption, while Ed25519 was used for signature purposes. The aim of applying digital signatures in this paper was to verify that the payload data sent was original and not changed during the transmission process and to ensure data confidentiality. The addition of security mechanisms to the LoRaWAN network, such as the process of encryption, decryption, and verification results, has caused some overheads. The overhead caused by the usage of a digital signature is also analyzed to ensure that the digital signature is feasible to be implemented in LoRa devices. Based on the experimental results, it was found that there was an increase in the size of memory usage and some additional processing delay during the deployment of digital signatures for LoRa devices. The overall overhead caused by implementing digital signatures on the LoRa devices was relatively low, making it possible to implement it on the LoRa network widely

    Distributed Data-Gathering and -Processing in Smart Cities: An Information-Centric Approach

    Get PDF
    The technological advancements along with the proliferation of smart and connected devices (things) motivated the exploration of the creation of smart cities aimed at improving the quality of life, economic growth, and efficient resource utilization. Some recent initiatives defined a smart city network as the interconnection of the existing independent and heterogeneous networks and the infrastructure. However, considering the heterogeneity of the devices, communication technologies, network protocols, and platforms the interoperability of these networks is a challenge requiring more attention. In this paper, we propose the design of a novel Information-Centric Smart City architecture (iSmart), focusing on the demand of the future applications, such as efficient machineto-machine communication, low latency computation offloading, large data communication requirements, and advanced security. In designing iSmart, we use the Named-Data Networking (NDN) architecture as the underlying communication substrate to promote semantics-based communication and achieve seamless compute/data sharing

    Emerging Technology Adoption and Use : Consolidated Assignments from Spring 2020

    Get PDF
    Digitalization changes the world. Information systems, software applications and other technologies are in a central role in this change. They enable new work practices and processes, new business models and opportunities, initiate changes in how technologies are used, perceived and interpreted, and ultimately force individuals, organizations, and even societies at large to respond to those changes. Individuals, organizations, and societies have to somehow transform and adjust their old ways of doing things. Yet, not only technologies drive digital transformation. Increasing amounts of data that is produced by numerous sensors, applications, and systems account for the transformation as well. Such data is gathered and collected, merged together, and analyzed by different methods and tools; by using artificial intelligence, data analytics, or data science. The sense-making of such versatile data is of importance because not only can it be used to improve decision-making at workplaces but also, it can be utilized for the benefit of individuals and societies, in organizational and non-work settings. These views, transformation and smartness, pose several questions for information system (IS) research. In general, we might ask what actually is the smartness of individuals, organizations, or a society. We can even ask whether stakeholders possess the required abilities, skills and competences to enable and support the change. These, and other related questions arise due to fast evolving landscape of information technology, and information and technology. The nuanced understanding of Smart Transformation in IS has become even more critical due to governmental and organizational programs that foster smartness. This report summarizes research reports of students attending “Emerging Technology Adoption and Use” course in Tampere University. During the course, we focused on three emerging technologies. Extended Reality Blockchain Artificial Intelligence Each group collaborated on finding a common topic of interest. They focused on the adoption and/or use of a particular emerging technology in a setting of their own choosing. As you are about to see, the findings of each group emphasize different perspectives. These range from the negative effects of technology use to the opportunities and delights of information systems

    5G-PPP Software Network Working Group:Network Applications: Opening up 5G and beyond networks 5G-PPP projects analysis

    Get PDF
    As part of the 5G-PPP Initiative, the Software Network Working Group prepared this white paper to demystify the concept of the Network Applications. In fact, the Network Application ecosystem is more than the introduction of new vertical applications that have interaction capabilities. It refers to the need for a separate middleware layer to simplify the implementation and deployment of vertical systems on a large scale. Specifically, third parties or network operators can contribute to Network Applications, depending on the level of interaction and trust. Different implementations have been conducted by the different projects considering different API types and different level of trust between the verticals and the owner of 5G platforms. In this paper, the different approaches considered by the projects are summarized. By analysing them, it appears three options of interaction between the verticals and the 5G platform owner: - aaS Model: it is the model where the vertical application consumes the Network Applications as a service. The vertical application deployed in the vertical service provider domain. It connects with the 3GPP network systems (EPS, 5GS) in one or more PLMN operator domain. - Hybrid: it is the model where the vertical instantiates a part of its Vertical App in the operator domain like the EDGE. The other part remains in the vertical domain. A similar approach has been followed in TS 23.286 related to the deployment of V2X server. - Coupled/Delegated: it is the model where the vertical delegates its app to the operator. The Network Applications will be composed and managed by the operator. This approach is the one followed in the platforms like 5G-EVE. In addition, the paper brings an analysis of the different API type deployed. It appears that the abstraction from network APIs to service APIs is necessary to hide the telco complexity making APIs easy to consume for verticals with no telco expertise and to adress data privacy requirements

    Effective Management of Hybrid Workloads in Public and Private Cloud Platforms

    Get PDF
    As organizations increasingly adopt hybrid cloud architectures to meet their diverse computing needs, managing workloads across on-premises and on multiple cloud environments has become a critical challenge. This thesis explores the concept of hybrid workload management through the implementation of Azure Arc, a cutting-edge solution offered by Microsoft Azure. The primary objective of this study is to investigate how Azure Arc enables efficient resource utilization and scalability for hybrid workloads. The research methodology involves a comprehensive analysis of the key features and functionalities of Azure Arc, coupled with practical experimentation in a simulated hybrid environment. The thesis begins by examining the fundamental principles of hybrid cloud computing and the associated workload management challenges. It then introduces Azure Arc as a novel approach that extends Azure control to on-premises and multi-cloud systems. The architecture, components, and integration mechanisms of Azure Arc are presented in detail, highlighting its ability to centralize management, enforce governance policies, and streamline operational tasks. This thesis contributes to the understanding of hybrid workload management by exploring the capabilities of Azure Arc. It provides valuable insights into the benefits of adopting this technology for organizations seeking to optimize resource utilization, streamline operations, and scale their workloads efficiently across on-premises and multi-cloud environments. The research findings serve as a foundation for further advancements in hybrid cloud computing and workload management strategies
    corecore