60 research outputs found

    Authentication schemes for Smart Mobile Devices: Threat Models, Countermeasures, and Open Research Issues

    Get PDF
    The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.This paper presents a comprehensive investigation of authentication schemes for smart mobile devices. We start by providing an overview of existing survey articles published in the recent years that deal with security for mobile devices. Then, we give a classification of threat models in smart mobile devices in five categories, including, identity-based attacks, eavesdropping-based attacks, combined eavesdropping and identity-based attacks, manipulation-based attacks, and service-based attacks. This is followed by a description of multiple existing threat models. We also provide a classification of countermeasures into four types of categories, including, cryptographic functions, personal identification, classification algorithms, and channel characteristics. According to the characteristics of the countermeasure along with the authentication model iteself, we categorize the authentication schemes for smart mobile devices in four categories, namely, 1) biometric-based authentication schemes, 2) channel-based authentication schemes, 3) factors-based authentication schemes, and 4) ID-based authentication schemes. In addition, we provide a taxonomy and comparison of authentication schemes for smart mobile devices in form of tables. Finally, we identify open challenges and future research directions

    Wearable devices and IoT applications for symptom detection, infection tracking, and diffusion containment of the COVID-19 pandemic: a survey

    Get PDF
    Until a safe and effective vaccine to fight the SARS-CoV-2 virus is developed and available for the global population, preventive measures, such as wearable tracking and monitoring systems supported by Internet of Things (IoT) infrastructures, are valuable tools for containing the pandemic. In this review paper we analyze innovative wearable systems for limiting the virus spread, early detection of the first symptoms of the coronavirus disease COVID-19 infection, and remote monitoring of the health conditions of infected patients during the quarantine. The attention is focused on systems allowing quick user screening through ready-to-use hardware and software components. Such sensor-based systems monitor the principal vital signs, detect symptoms related to COVID-19 early, and alert patients and medical staff. Novel wearable devices for complying with social distancing rules and limiting interpersonal contagion (such as smart masks) are investigated and analyzed. In addition, an overview of implantable devices for monitoring the effects of COVID-19 on the cardiovascular system is presented. Then we report an overview of tracing strategies and technologies for containing the COVID-19 pandemic based on IoT technologies, wearable devices, and cloud computing. In detail, we demonstrate the potential of radio frequency based signal technology, including Bluetooth Low Energy (BLE), Wi-Fi, and radio frequency identification (RFID), often combined with Apps and cloud technology. Finally, critical analysis and comparisons of the different discussed solutions are presented, highlighting their potential and providing new insights for developing innovative tools for facing future pandemics

    Navigating the IoT landscape: Unraveling forensics, security issues, applications, research challenges, and future

    Full text link
    Given the exponential expansion of the internet, the possibilities of security attacks and cybercrimes have increased accordingly. However, poorly implemented security mechanisms in the Internet of Things (IoT) devices make them susceptible to cyberattacks, which can directly affect users. IoT forensics is thus needed for investigating and mitigating such attacks. While many works have examined IoT applications and challenges, only a few have focused on both the forensic and security issues in IoT. Therefore, this paper reviews forensic and security issues associated with IoT in different fields. Future prospects and challenges in IoT research and development are also highlighted. As demonstrated in the literature, most IoT devices are vulnerable to attacks due to a lack of standardized security measures. Unauthorized users could get access, compromise data, and even benefit from control of critical infrastructure. To fulfil the security-conscious needs of consumers, IoT can be used to develop a smart home system by designing a FLIP-based system that is highly scalable and adaptable. Utilizing a blockchain-based authentication mechanism with a multi-chain structure can provide additional security protection between different trust domains. Deep learning can be utilized to develop a network forensics framework with a high-performing system for detecting and tracking cyberattack incidents. Moreover, researchers should consider limiting the amount of data created and delivered when using big data to develop IoT-based smart systems. The findings of this review will stimulate academics to seek potential solutions for the identified issues, thereby advancing the IoT field.Comment: 77 pages, 5 figures, 5 table

    Wireless Antenna Sensors for Biosimilar Monitoring Towards Cyber-Physical Systems : A Review of Current Trends and Future Prospects

    Get PDF
    The integration of wireless antenna sensors for cyber-physical systems has become increasingly prevalent in various biosimilar applications due to the escalating need for monitoring techniques that are efficient, accurate, and reliable. The primary objective of this comprehensive investigation is to offer a scholarly examination of the present advancements, challenges, and potentialities in the realm of wireless antenna sensor technology for monitoring biosimilars. Specifically, the focus will be on the current state of the art in wireless antenna sensor design, manufacturing, and implementation along with the discussion of cyber security trends. The advantages of wireless antenna sensors, including increased sensitivity, real-time data gathering, and remote monitoring, will next be discussed in relation to their use in a variety of biosimilar applications. Furthermore, we will explore the challenges of deploying wireless antenna sensors for biosimilar monitoring, such as power consumption, signal integrity, and biocompatibility concerns. To wrap things off, there will be a discussion about where this subject is headed and why collaborative work is essential to advancing wireless antenna sensor technology and its applications in biosimilar monitoring. Providing an in-depth overview of the present landscape and potential developments, this article aims to be an asset for academics and professionals in the fields of antenna sensors, biosimilar development, wireless communication technologies, and cyber physical systems.© 2023 The Authors. This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License. For more information, see https://creativecommons.org/licenses/by-nc-nd/4.0/fi=vertaisarvioitu|en=peerReviewed

    Cybersecurity and the Digital Health: An Investigation on the State of the Art and the Position of the Actors

    Get PDF
    Cybercrime is increasingly exposing the health domain to growing risk. The push towards a strong connection of citizens to health services, through digitalization, has undisputed advantages. Digital health allows remote care, the use of medical devices with a high mechatronic and IT content with strong automation, and a large interconnection of hospital networks with an increasingly effective exchange of data. However, all this requires a great cybersecurity commitment—a commitment that must start with scholars in research and then reach the stakeholders. New devices and technological solutions are increasingly breaking into healthcare, and are able to change the processes of interaction in the health domain. This requires cybersecurity to become a vital part of patient safety through changes in human behaviour, technology, and processes, as part of a complete solution. All professionals involved in cybersecurity in the health domain were invited to contribute with their experiences. This book contains contributions from various experts and different fields. Aspects of cybersecurity in healthcare relating to technological advance and emerging risks were addressed. The new boundaries of this field and the impact of COVID-19 on some sectors, such as mhealth, have also been addressed. We dedicate the book to all those with different roles involved in cybersecurity in the health domain

    Applications

    Get PDF
    Volume 3 describes how resource-aware machine learning methods and techniques are used to successfully solve real-world problems. The book provides numerous specific application examples: in health and medicine for risk modelling, diagnosis, and treatment selection for diseases in electronics, steel production and milling for quality control during manufacturing processes in traffic, logistics for smart cities and for mobile communications

    Applications

    Get PDF
    Volume 3 describes how resource-aware machine learning methods and techniques are used to successfully solve real-world problems. The book provides numerous specific application examples: in health and medicine for risk modelling, diagnosis, and treatment selection for diseases in electronics, steel production and milling for quality control during manufacturing processes in traffic, logistics for smart cities and for mobile communications

    Securing IoT Applications through Decentralised and Distributed IoT-Blockchain Architectures

    Get PDF
    The integration of blockchain into IoT can provide reliable control of the IoT network's ability to distribute computation over a large number of devices. It also allows the AI system to use trusted data for analysis and forecasts while utilising the available IoT hardware to coordinate the execution of tasks in parallel, using a fully distributed approach. This thesis's  rst contribution is a practical implementation of a real world IoT- blockchain application, ood detection use case, is demonstrated using Ethereum proof of authority (PoA). This includes performance measurements of the transaction con-  rmation time, the system end-to-end latency, and the average power consumption. The study showed that blockchain can be integrated into IoT applications, and that Ethereum PoA can be used within IoT for permissioned implementation. This can be achieved while the average energy consumption of running the ood detection system including the Ethereum Geth client is small (around 0.3J). The second contribution is a novel IoT-centric consensus protocol called honesty- based distributed proof of authority (HDPoA) via scalable work. HDPoA was analysed and then deployed and tested. Performance measurements and evaluation along with the security analyses of HDPoA were conducted using a total of 30 di erent IoT de- vices comprising Raspberry Pis, ESP32, and ESP8266 devices. These measurements included energy consumption, the devices' hash power, and the transaction con rma- tion time. The measured values of hash per joule (h/J) for mining were 13.8Kh/J, 54Kh/J, and 22.4Kh/J when using the Raspberry Pi, the ESP32 devices, and the ESP8266 devices, respectively, this achieved while there is limited impact on each de- vice's power. In HDPoA the transaction con rmation time was reduced to only one block compared to up to six blocks in bitcoin. The third contribution is a novel, secure, distributed and decentralised architecture for supporting the implementation of distributed arti cial intelligence (DAI) using hardware platforms provided by IoT. A trained DAI system was implemented over the IoT, where each IoT device hosts one or more neurons within the DAI layers. This is accomplished through the utilisation of blockchain technology that allows trusted interaction and information exchange between distributed neurons. Three di erent datasets were tested and the system achieved a similar accuracy as when testing on a standalone system; both achieved accuracies of 92%-98%. The system accomplished that while ensuring an overall latency of as low as two minutes. This showed the secure architecture capabilities of facilitating the implementation of DAI within IoT while ensuring the accuracy of the system is preserved. The fourth contribution is a novel and secure architecture that integrates the ad- vantages o ered by edge computing, arti cial intelligence (AI), IoT end-devices, and blockchain. This new architecture has the ability to monitor the environment, collect data, analyse it, process it using an AI-expert engine, provide predictions and action- able outcomes, and  nally share it on a public blockchain platform. The pandemic caused by the wide and rapid spread of the novel coronavirus COVID-19 was used as a use-case implementation to test and evaluate the proposed system. While providing the AI-engine trusted data, the system achieved an accuracy of 95%,. This is achieved while the AI-engine only requires a 7% increase in power consumption. This demon- strate the system's ability to protect the data and support the AI system, and improves the IoT overall security with limited impact on the IoT devices. The  fth and  nal contribution is enhancing the security of the HDPoA through the integration of a hardware secure module (HSM) and a hardware wallet (HW). A performance evaluation regarding the energy consumption of nodes that are equipped with HSM and HW and a security analysis were conducted. In addition to enhancing the nodes' security, the HSM can be used to sign more than 120 bytes/joule and encrypt up to 100 bytes/joule, while the HW can be used to sign up to 90 bytes/joule and encrypt up to 80 bytes/joule. The result and analyses demonstrated that the HSM and HW enhance the security of HDPoA, and also can be utilised within IoT-blockchain applications while providing much needed security in terms of con dentiality, trust in devices, and attack deterrence. The above contributions showed that blockchain can be integrated into IoT systems. It showed that blockchain can successfully support the integration of other technolo- gies such as AI, IoT end devices, and edge computing into one system thus allowing organisations and users to bene t greatly from a resilient, distributed, decentralised, self-managed, robust, and secure systems

    The right to privacy through the development of smart technologies : how our personal health data is affected

    Full text link
    L’évolution de la technologie, nonobstant ses apports, peut enfreindre certains de nos droits fondamentaux puisqu’elle se développe plus rapidement que ces derniers. Ce mémoire vise à relever les défis que les technologies intelligentes peuvent poser tant sur la santé des communautés que sur les droits fondamentaux. La thèse porte sur les contraintes juridiques, présentes et à venir, notamment sur le droit à la vie privée à travers le développement et l’usage des technologies intelligentes qui captent notre information personnelle en lien avec la santé. Plus précisément, ce travail analyse si les bénéfices de l’accès à notre information à travers les technologies intelligentes en vue d’améliorer la santé et la sécurité des populations surpassent les conséquences juridiques. Ce travail explore, entre autres, le potentiel des technologies intelligentes, leurs avantages individuels et collectifs, notamment en matière de santé publique, et les violations des droits de l’Homme que leur usage peut générer. Mais encore, il présente des innovations technologiques qui permettent d’améliorer les systèmes de santé étatiques afin d’être en mesure de mieux réagir aux futures épidémies, notamment au niveau international, comme à l’OMS. Ces données, suivies des autres complications possibles du fait d’un usage accru des technologies intelligentes qui restreignent notre vie privée, permettront de conclure si une telle intrusion peut être justifiée dans une société libre et démocratique. Finalement, ce travail regarde les limites de l’acceptabilité sociale de l’intrusion dans la vie privée en échange à de meilleures conditions de santé afin que les organes étatiques et supraétatiques puissent prendre des décisions éclairées, sans que les droits constitutionnels soient violés. Ce travail permettra de comprendre les enjeux que notre système judiciaire inévitablement devra surmonter en proposant des stratégies visant la prévention des maladies et autres problèmes de santé à travers l’usage des technologies intelligentes. Une des solutions principales proposées est la création de bases de données nationale et internationale à l’OMS qui captent les données des appareils intelligents portables.The evolution of technology, notwithstanding its benefits, can negatively impact some of our fundamental rights as it develops faster than the latter. Indeed, this thesis aims to meet challenges generated by smart technologies and the impact they can have on the health of communities as well as on our fundamental rights. This thesis focuses on the legal constraints, present and to come, including the right to privacy, through the development and use of smart technologies that seize our personal health information. More specifically, this work seeks to analyze whether the benefits of accessing our information through smart technologies to improve the health and safety of populations outweigh the legal consequences. This work explores the potential of smart technologies, the interest in using them individually and collectively, especially in the public health sector, and the human rights violations their use can generate. Moreover, it looks at technological innovations that help improve State health systems to be able to better respond to future epidemics, particularly at the international level, such as at the WHO. These data, followed by other possible complications due to the increased use of intelligent technologies that restrict our privacy, will allow us to conclude whether such an intrusion in our right to privacy can be justified in a free and democratic society. Finally, this work examines the limits of the social acceptability of the invasion of privacy in exchange for better health conditions so that States and supra-State bodies can make informed decisions, without violating constitutional rights. This work will help us understand the issues that our judicial system will inevitably face while proposing strategies for the prevention of diseases and other health problems through the use of smart technologies. One of the main proposed solutions is the creation of a national and international database at the WHO generated by the data of smart health devices

    ARTIFICIAL INTELLIGENCE-ENABLED EDGE-CENTRIC SOLUTION FOR AUTOMATED ASSESSMENT OF SLEEP USING WEARABLES IN SMART HEALTH

    Get PDF
    ARTIFICIAL INTELLIGENCE-ENABLED EDGE-CENTRIC SOLUTION FOR AUTOMATED ASSESSMENT OF SLEEP USING WEARABLES IN SMART HEALT
    • …
    corecore