1,970 research outputs found

    A survey on subjecting electronic product code and non-ID objects to IP identification

    Full text link
    Over the last decade, both research on the Internet of Things (IoT) and real-world IoT applications have grown exponentially. The IoT provides us with smarter cities, intelligent homes, and generally more comfortable lives. However, the introduction of these devices has led to several new challenges that must be addressed. One of the critical challenges facing interacting with IoT devices is to address billions of devices (things) around the world, including computers, tablets, smartphones, wearable devices, sensors, and embedded computers, and so on. This article provides a survey on subjecting Electronic Product Code and non-ID objects to IP identification for IoT devices, including their advantages and disadvantages thereof. Different metrics are here proposed and used for evaluating these methods. In particular, the main methods are evaluated in terms of their: (i) computational overhead, (ii) scalability, (iii) adaptability, (iv) implementation cost, and (v) whether applicable to already ID-based objects and presented in tabular format. Finally, the article proves that this field of research will still be ongoing, but any new technique must favorably offer the mentioned five evaluative parameters.Comment: 112 references, 8 figures, 6 tables, Journal of Engineering Reports, Wiley, 2020 (Open Access

    Securing openHAB Smart Home Through User Authentication and Authorization

    Get PDF
    Asjade Internet ehk vĂ€rkvĂ”rk on dĂŒnaamiline ja heterogeenne keskkond, kus asjad koguvad erinevate ĂŒlesannete tĂ€itmiseks keskkonnast andmeid. VĂ€rkvĂ”rgu rakendusvaldkondades nagu nĂ€iteks tark kodu kasutatakse harilikult operatsioonide tĂ€itmisel kasutaja privaatandmeid. Kui sellised rakendused on turvamata vĂ”rkudele avatud, muutub turvalisus oluliseks probleemiks. OpenHAB on OSGi-pĂ”hine automatiseerimistarkvara, mis koondab kodukeskkonna seadmete andmeid. OpenHAB ei tee kasutajatele ligipÀÀsu reguleerimismehhanismide kasutamist kohustuslikuks ning sĂ”ltub seega tĂ€ielikult juhtmevaba vĂ”rgu turvalisusest. KĂ€esolevas lĂ”putöös uurisime ning arendasime JSON Web Token’i-pĂ”hist tĂ”endi autenturit Eclipse SmartHome platvormile, millel pĂ”hineb ka openHAB. TĂ”endi autentur on baasiks ligipÀÀsu reguleerimismehhanismile. Lisaks esitleme kasutatavat volitusmudelit, mis vĂ”imaldab hallata kasutajate ligipÀÀsuĂ”igusi asjadele. Saavutatud tulemused osutavad, et ligipÀÀsu reguleerimismehhanismide rakendamine servlet-ide ja REST ressursside jaoks openHABi arhitektuuris on teostatav.The Internet of Things (IoT) is a dynamic and heterogenous environment where Things gather data from the real world to perform various tasks. Applications in IoT, such as the smart home, typically use private data derived from its users for its operations. Security becomes a concern when these applications are exposed to insecure networks. OpenHAB is an OSGi-based automation software that integrates the data from devices at home. OpenHAB does not enforce any access control mechanism for its users, and depends solely on the security of the wireless network. In this work, we studied and implemented a JSON Web Token-based authenticator for Eclipse SmartHome, the core of openHAB, as a base for access control mechanisms. Furthermore, we propose a fine-grained, yet usable authorization model to manage access permissions to things among legitimate users. The results obtained show that it is feasible to enforce access control mechanisms for servlet and REST resources in the architecture of openHAB

    Internet of things for medication control: e-health architecture and service implementation

    Get PDF
    The use of Radio Frequency Identification technology (RFID) in medical context enables drug identification but also a rapid and, of course, precise identification of patients, physicians, nurses or any other health caregiver. Combining RFID tag identification with structured and secure Internet of Things (IoT) solutions, one can establish a ubiquitous and quick access to any type of medical related records, as long as one can control and adequately secure all the Internet mediated interactions. This paper presents an e-Health service architecture, along with the corresponding Internet of Things prototype implementation, that makes use of RFID tags and Electronic Product Codes (EPC) standards, in order to easily establish in a ubiquitous manner a medication control system. The system, presented and tested, has a web interface and allowed for a first evaluation of the e-health proposed service. As the service is mainly focused on elderly Ambient Assisted Living (AAL) solutions, all these technologies - RFID, EPC, Object Naming Service (ONS) and IoT – have been integrated into a suitable system, able to promote better patient/physician, patient/nurse and, generally, any patient/health caregiver, interactions. The whole prototype service, entitled "RFID-based IoT for Medication Control", and its web interface are presented and evaluated.FEDER Funds through the Programa Operacional Fatores de Competitividade – COMPETE and by National Funds through the FCT - Fundação para a CiĂȘncia e a Tecnologia (Portuguese Foundation for Science and Technology) within project FCOMP-01-0124-FEDER-02267

    A survey paper on blockchain and its implementation to reduce security risks in various domains

    Get PDF
    Every technology with its powerful uses has issues connected to it and security is at the top of it. As for the changing environment, the world has been shifting to Virtual Reality, the new coming world seems to be the internet and blockchain technology which is more powerful than others and has its applications in every field, be it quantum computing, internet of things, security or others. This survey paper covers the blockchain and its security in different fields of sciences and technology. We begin with the introduction of blockchain and then discuss its structure. After that security issues have been highlighted which include attacks and their behavior in quantum computing, internet of things, cloud computing. Furthermore, we have discussed the most common types of attacks and the SRM model of blockchain followed by the conclusion

    Evaluation of Anonymized ONS Queries

    Full text link
    Electronic Product Code (EPC) is the basis of a pervasive infrastructure for the automatic identification of objects on supply chain applications (e.g., pharmaceutical or military applications). This infrastructure relies on the use of the (1) Radio Frequency Identification (RFID) technology to tag objects in motion and (2) distributed services providing information about objects via the Internet. A lookup service, called the Object Name Service (ONS) and based on the use of the Domain Name System (DNS), can be publicly accessed by EPC applications looking for information associated with tagged objects. Privacy issues may affect corporate infrastructures based on EPC technologies if their lookup service is not properly protected. A possible solution to mitigate these issues is the use of online anonymity. We present an evaluation experiment that compares the of use of Tor (The second generation Onion Router) on a global ONS/DNS setup, with respect to benefits, limitations, and latency.Comment: 14 page

    The Road Ahead for Networking: A Survey on ICN-IP Coexistence Solutions

    Full text link
    In recent years, the current Internet has experienced an unexpected paradigm shift in the usage model, which has pushed researchers towards the design of the Information-Centric Networking (ICN) paradigm as a possible replacement of the existing architecture. Even though both Academia and Industry have investigated the feasibility and effectiveness of ICN, achieving the complete replacement of the Internet Protocol (IP) is a challenging task. Some research groups have already addressed the coexistence by designing their own architectures, but none of those is the final solution to move towards the future Internet considering the unaltered state of the networking. To design such architecture, the research community needs now a comprehensive overview of the existing solutions that have so far addressed the coexistence. The purpose of this paper is to reach this goal by providing the first comprehensive survey and classification of the coexistence architectures according to their features (i.e., deployment approach, deployment scenarios, addressed coexistence requirements and architecture or technology used) and evaluation parameters (i.e., challenges emerging during the deployment and the runtime behaviour of an architecture). We believe that this paper will finally fill the gap required for moving towards the design of the final coexistence architecture.Comment: 23 pages, 16 figures, 3 table

    Forensic Data Properties of Digital Signature BDOC and ASiC-E Files on Classic Disk Drives

    Get PDF
    KĂ€esolevas magistritöös vaadeldakse BDOC ja ASiC-E digitaalselt allkirjastatud dokumendikonteinerite sisu ning kirjeldatakse nende huvipakkuvaid omadusi. Teatava hulga nĂ€idiskonteinerite vaatlemise jĂ€rel pakub autor vĂ€lja faili pĂ€ise ja faili jaluse kombinatsiooni (signatuuri), mis oluliselt parandab nimetatud failide kustutatud olekust sihitud taastamist kĂŒlgnevatest klastritest NTFS vormindatud tihendamata kettal, vĂ”ttes arvesse klassikalise kĂ”vaketta geomeetriat. Ühtlasi kirjeldab autor kohtuekspertiisi koha pealt tĂ€hendust omavaid andmeid ZIP kohaliku faili pĂ€ises ja keskkataloogi kirjes, XML signatuuris ja ASN.1 kodeeritud kihtides ning nende kĂ€ttesaamise algoritmi. Nendele jĂ€reldustele tuginedes loob autor Phytoni skripte ja viib lĂ€bi mitmeid teste failide taastamiseks faili signatuuri jĂ€rgi ning huvipakkuvate andmete vĂ€ljavĂ”tmiseks. Teste viiakse lĂ€bi teatava valiku failide ĂŒle ja tulemusi vĂ”rreldakse mitme kohtuekspertiisis laialt kasutatava peavoolu töökeskkonnaga, samuti mĂ”ningate andmetaaste tööriistadega. LĂ”puks testitakse magistritöö kĂ€igus pakutud digitaalselt allkirjastatud dokumentide taastamiseks mĂ”eldud signatuuri ja andmete vĂ€ljavĂ”tmise algoritmi suurel hulgal avalikust dokumendiregistrist pĂ€rit kehtivate dokumentidega, mis saadi kĂ€tte spetsiaalselt selleks kirjutatud veebirobotiga. Nimetatud teste viiakse lĂ€bi dokumentide ĂŒle, mille hulgas on nii digitaalselt allkirjastatud dokumente kui ka teisi, nendega struktuurilt sarnaseid dokumente.This thesis reviews the contents and observes certain properties of digitally signed documents of BDOC and ASiC-E container formats. After reviewing a set of sample containers, the author comes up with a header and footer combination (signature) significantly improving pinpointed carving-based recovery of those files from a deleted state on NTFS formatted uncompressed volumes in contiguous clusters, taking into account the geometry of classic disk drives. The author also describes forensically meaningful attributive data found in ZIP Headers and Central Directory, XML signatures as well as embedded ASN.1 encoded data of the sample files and suggests an algorithm for the extraction of such data. Based on these findings, the author creates scripts in Python and executes a series of tests for file carving and extraction of attributive data. These tests are run over the samples placed into unallocated clusters and the results are compared to several mainstream commercial forensic examination suites as well as some popular data recovery tools. Finally, the author web-scrapes a large number of real-life documents from a government agency’s public document registry. The carving signature and the data-extractive algorithm are thereafter applied on a larger scale and in an environment competitively supplemented with structurally similar containers
    • 

    corecore