98 research outputs found

    Demystifying Internet of Things Security

    Get PDF
    Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Security Engine capabilities to simplify it. This book explores the challenges to secure these devices to make them immune to different threats originating from within and outside the network. The requirements and robustness rules to protect the assets vary greatly and there is no single blanket solution approach to implement security. Demystifying Internet of Things Security provides clarity to industry professionals and provides and overview of different security solutions What You'll Learn Secure devices, immunizing them against different threats originating from inside and outside the network Gather an overview of the different security building blocks available in Intel Architecture (IA) based IoT platforms Understand the threat pyramid, secure boot, chain of trust, and the software stack leading up to defense-in-depth Who This Book Is For Strategists, developers, architects, and managers in the embedded and Internet of Things (IoT) space trying to understand and implement the security in the IoT devices/platforms

    A survey of secure middleware for the Internet of Things

    Get PDF
    The rapid growth of small Internet connected devices, known as the Internet of Things (IoT), is creating a new set of challenges to create secure, private infrastructures. This paper reviews the current literature on the challenges and approaches to security and privacy in the Internet of Things, with a strong focus on how these aspects are handled in IoT middleware. We focus on IoT middleware because many systems are built from existing middleware and these inherit the underlying security properties of the middleware framework. The paper is composed of three main sections. Firstly, we propose a matrix of security and privacy threats for IoT. This matrix is used as the basis of a widespread literature review aimed at identifying requirements on IoT platforms and middleware. Secondly, we present a structured literature review of the available middleware and how security is handled in these middleware approaches. We utilise the requirements from the first phase to evaluate. Finally, we draw a set of conclusions and identify further work in this area

    A survey of secure middleware for the Internet of Things

    Get PDF

    Information support system comfort and energy efficiency of living spaces

    Get PDF
    Робота присвячена методам та засобам автоматичного регулювання параметрів повітряного середовища в приміщеннях. Запропоновано рішення про автоматизацію управління кліматичними параметрами, що підлягають контролю в приміщенні обслуговування. Об'єктом детального вивчення є процеси кліматичного забезпечення в середовищі людини. Була вивчена технічна документація на цей об’єкт: загальна інформація; характеристики мікроклімату в житлових приміщеннях, структурна взаємодія системи контролю клімату з її основними підсистемами. Також були обрані та розраховані елементи для підсистем підсистем управління параметрами, розроблена функціональна схема автоматизації. Написано програмне забезпечення для контролера та створено інтерфейс людина-машина, який є складовою системи SCADA, що забезпечує візуалізацію системи клімат-контролю в офісі. Основним завданням дипломної роботи є розробка інформаційної системи для дистанційного контролю параметрів мікроклімату житлових приміщень з оптимальною надійністю та зниженою вартістю. У першій частині роботи були розглянуті методи реалізації автоматизованого управління в системах контролю мікроклімату. У другій частині роботи були описані характеристики мікрокліматичних умов для забезпечення комфорту людини. У третій частині розглядаються основні варіанти обладнання для впровадження інформаційної системи. Четверта частина описує загальні характеристики протоколу MQTT. Об’єкт дослідження: інформаційна система мікроклімату житлових приміщень. Предмет дослідження: автоматизована система на базі апаратної платформи ESP 8266. Метою роботи є вивчення апаратної платформи та їх можливостей для здійснення дистанційного клімат-контролю. Основні результати: автоматизована система дистанційного контролю параметрів мікроклімату житлових приміщень на базі апаратної платформи ESP 8266. Ця розробка дозволить дистанційно контролювати і контролювати параметри мікроклімату в приміщенні як вручну, так і автоматично.Thesis is devoted to methods and means of automatic regulation of parameters of air environment in premises. The decision on automation of management of the climate parameters which are subject to control in a service room is offered. The object of detailed study are the processes of climate supply in the human environment. The technical documentation for this object was studied: general information; characteristics of microclimate in living quarters, structural interaction of climate control system with its main subsystems. Elements for subsystems of parameter management subsystems were also selected and calculated, the functional scheme of automation was developed. Software for the controller was written and a human-machine interface was created, which is a component of the SCADA system, which provides visualization of the climate control system in the office. The main task of the thesis is to develop an information system for remote control of the parameters of the microclimate of residential premises with optimal reliability and reduced cost. In the first part of the work the methods of realization of automated control in microclimate control systems were considered. The second part of the work described the characteristics of microclimatic conditions to ensure human comfort. The third part considers the main choices of equipment for the implementation of the information system. The fourth part describes the general characteristics of the MQTT protocol. Object of research: information system of microclimate of living quarters. Subject of research: automated system based on hardware platform ESP 8266. The aim of the work is to study the hardware platform and their capabilities for the implementation of remote climate control. Main results: an automated system for remote control of microclimate parameters of residential premises based on the hardware platform ESP 8266. This development will allow remote monitoring and control of microclimate parameters in the room both manually and automatically.INTRODUCTION 8 1 METHODS OF IMPLEMENTATION OF AUTOMATED CONTROL IN MICROCLIMATE CONTROL SYSTEMS 9 2 ANALYSIS OF HARDWARE PLATFORMS FOR IMPLEMENTATION OF INFORMATION SYSTEM 17 2.1 CHARACTERISTICS OF MICROCLIMATIC CONDITIONS TO ENSURE HUMAN COMFORT 17 2.2. PROBLEM STATEMENT FOR INFORMATION SYSTEM DEVELOPMENT 22 2.3 HARDWARE PLATFORMS FOR SYSTEM IMPLEMENTATION 26 2.3.1 ARDUINO 26 2.3.2 ESP 8266 34 2.3.3 INDUSTRIAL CONTROLLERS 36 2.4 CONCLUSIONS TO THE SECOND SECTION 37 3 CHOICE OF METHODS AND EQUIPMENT FOR IMPLEMENTATION OF THE INFORMATION SYSTEM 38 3.1 HARDWARE IMPLEMENTATION OF THE SYSTEM 38 3.2 ALGORITHM OF INFORMATION SYSTEM OPERATION 40 3.3 CONCLUSIONS TO THE THIRD SECTION 49 4 LIFE SAFETY 50 4.1 OCCUPATIONAL SAFETY MANAGEMENT SYSTEM. 50 4.2 REQUIREMENTS FOR THE WORKING ENVIRONMENT OF THE COMPUTER USER: MICROCLIMATE, LIGHTING, NOISE LEVEL, ELECTROMAGNETIC RADIATION 53 4.3 ESTABLISHMENT AND OPERATION OF AN ENVIRONMENTAL MONITORING SYSTEM FOR THE INTEGRATION OF ENVIRONMENTAL INFORMATION SYSTEMS COVERING CERTAIN AREAS 54 4.4 ORGANIZATION OF CIVIL PROTECTION AT INDUSTRIAL FACILITIES AND IMPLEMENTATION OF MEASURES TO PREVENT EMERGENCIES OF MAN-MADE ORIGIN 57 4.5 CONCLUSIONS TO THE SIXTH SECTION 59 GENERAL CONCLUSIONS FOR THE THESIS 60 REFERENCES 6

    New Waves of IoT Technologies Research – Transcending Intelligence and Senses at the Edge to Create Multi Experience Environments

    Get PDF
    The next wave of Internet of Things (IoT) and Industrial Internet of Things (IIoT) brings new technological developments that incorporate radical advances in Artificial Intelligence (AI), edge computing processing, new sensing capabilities, more security protection and autonomous functions accelerating progress towards the ability for IoT systems to self-develop, self-maintain and self-optimise. The emergence of hyper autonomous IoT applications with enhanced sensing, distributed intelligence, edge processing and connectivity, combined with human augmentation, has the potential to power the transformation and optimisation of industrial sectors and to change the innovation landscape. This chapter is reviewing the most recent advances in the next wave of the IoT by looking not only at the technology enabling the IoT but also at the platforms and smart data aspects that will bring intelligence, sustainability, dependability, autonomy, and will support human-centric solutions.acceptedVersio

    Holistic security 4.0

    Get PDF
    The future computer climate will represent an ever more aligned world of integrating technologies, affecting consumer, business and industry sectors. The vision was first outlined in the Industry 4.0 conception. The elements which comprise smart systems or embedded devices have been investigated to determine the technological climate. The emerging technologies revolve around core concepts, and specifically in this project, the uses of Internet of Things (IoT), Industrial Internet of Things (IIoT) and Internet of Everything (IoE). The application of bare metal and logical technology qualities are put under the microscope to provide an effective blue print of the technological field. The systems and governance surrounding smart systems are also examined. Such an approach helps to explain the beneficial or negative elements of smart devices. Consequently, this ensures a comprehensive review of standards, laws, policy and guidance to enable security and cybersecurity of the 4.0 systems

    Trusted Artificial Intelligence in Manufacturing; Trusted Artificial Intelligence in Manufacturing

    Get PDF
    The successful deployment of AI solutions in manufacturing environments hinges on their security, safety and reliability which becomes more challenging in settings where multiple AI systems (e.g., industrial robots, robotic cells, Deep Neural Networks (DNNs)) interact as atomic systems and with humans. To guarantee the safe and reliable operation of AI systems in the shopfloor, there is a need to address many challenges in the scope of complex, heterogeneous, dynamic and unpredictable environments. Specifically, data reliability, human machine interaction, security, transparency and explainability challenges need to be addressed at the same time. Recent advances in AI research (e.g., in deep neural networks security and explainable AI (XAI) systems), coupled with novel research outcomes in the formal specification and verification of AI systems provide a sound basis for safe and reliable AI deployments in production lines. Moreover, the legal and regulatory dimension of safe and reliable AI solutions in production lines must be considered as well. To address some of the above listed challenges, fifteen European Organizations collaborate in the scope of the STAR project, a research initiative funded by the European Commission in the scope of its H2020 program (Grant Agreement Number: 956573). STAR researches, develops, and validates novel technologies that enable AI systems to acquire knowledge in order to take timely and safe decisions in dynamic and unpredictable environments. Moreover, the project researches and delivers approaches that enable AI systems to confront sophisticated adversaries and to remain robust against security attacks. This book is co-authored by the STAR consortium members and provides a review of technologies, techniques and systems for trusted, ethical, and secure AI in manufacturing. The different chapters of the book cover systems and technologies for industrial data reliability, responsible and transparent artificial intelligence systems, human centered manufacturing systems such as human-centred digital twins, cyber-defence in AI systems, simulated reality systems, human robot collaboration systems, as well as automated mobile robots for manufacturing environments. A variety of cutting-edge AI technologies are employed by these systems including deep neural networks, reinforcement learning systems, and explainable artificial intelligence systems. Furthermore, relevant standards and applicable regulations are discussed. Beyond reviewing state of the art standards and technologies, the book illustrates how the STAR research goes beyond the state of the art, towards enabling and showcasing human-centred technologies in production lines. Emphasis is put on dynamic human in the loop scenarios, where ethical, transparent, and trusted AI systems co-exist with human workers. The book is made available as an open access publication, which could make it broadly and freely available to the AI and smart manufacturing communities

    Contributions to Securing Software Updates in IoT

    Get PDF
    The Internet of Things (IoT) is a large network of connected devices. In IoT, devices can communicate with each other or back-end systems to transfer data or perform assigned tasks. Communication protocols used in IoT depend on target applications but usually require low bandwidth. On the other hand, IoT devices are constrained, having limited resources, including memory, power, and computational resources. Considering these limitations in IoT environments, it is difficult to implement best security practices. Consequently, network attacks can threaten devices or the data they transfer. Thus it is crucial to react quickly to emerging vulnerabilities. These vulnerabilities should be mitigated by firmware updates or other necessary updates securely. Since IoT devices usually connect to the network wirelessly, such updates can be performed Over-The-Air (OTA). This dissertation presents contributions to enable secure OTA software updates in IoT. In order to perform secure updates, vulnerabilities must first be identified and assessed. In this dissertation, first, we present our contribution to designing a maturity model for vulnerability handling. Next, we analyze and compare common communication protocols and security practices regarding energy consumption. Finally, we describe our designed lightweight protocol for OTA updates targeting constrained IoT devices. IoT devices and back-end systems often use incompatible protocols that are unable to interoperate securely. This dissertation also includes our contribution to designing a secure protocol translator for IoT. This translation is performed inside a Trusted Execution Environment (TEE) with TLS interception. This dissertation also contains our contribution to key management and key distribution in IoT networks. In performing secure software updates, the IoT devices can be grouped since the updates target a large number of devices. Thus, prior to deploying updates, a group key needs to be established among group members. In this dissertation, we present our designed secure group key establishment scheme. Symmetric key cryptography can help to save IoT device resources at the cost of increased key management complexity. This trade-off can be improved by integrating IoT networks with cloud computing and Software Defined Networking (SDN).In this dissertation, we use SDN in cloud networks to provision symmetric keys efficiently and securely. These pieces together help software developers and maintainers identify vulnerabilities, provision secret keys, and perform lightweight secure OTA updates. Furthermore, they help devices and systems with incompatible protocols to be able to interoperate
    corecore