1,970 research outputs found
A survey on subjecting electronic product code and non-ID objects to IP identification
Over the last decade, both research on the Internet of Things (IoT) and
real-world IoT applications have grown exponentially. The IoT provides us with
smarter cities, intelligent homes, and generally more comfortable lives.
However, the introduction of these devices has led to several new challenges
that must be addressed. One of the critical challenges facing interacting with
IoT devices is to address billions of devices (things) around the world,
including computers, tablets, smartphones, wearable devices, sensors, and
embedded computers, and so on. This article provides a survey on subjecting
Electronic Product Code and non-ID objects to IP identification for IoT
devices, including their advantages and disadvantages thereof. Different
metrics are here proposed and used for evaluating these methods. In particular,
the main methods are evaluated in terms of their: (i) computational overhead,
(ii) scalability, (iii) adaptability, (iv) implementation cost, and (v) whether
applicable to already ID-based objects and presented in tabular format.
Finally, the article proves that this field of research will still be ongoing,
but any new technique must favorably offer the mentioned five evaluative
parameters.Comment: 112 references, 8 figures, 6 tables, Journal of Engineering Reports,
Wiley, 2020 (Open Access
Securing openHAB Smart Home Through User Authentication and Authorization
Asjade Internet ehk vĂ€rkvĂ”rk on dĂŒnaamiline ja heterogeenne keskkond, kus asjad koguvad erinevate ĂŒlesannete tĂ€itmiseks keskkonnast andmeid. VĂ€rkvĂ”rgu rakendusvaldkondades nagu nĂ€iteks tark kodu kasutatakse harilikult operatsioonide tĂ€itmisel kasutaja privaatandmeid. Kui sellised rakendused on turvamata vĂ”rkudele avatud, muutub turvalisus oluliseks probleemiks. OpenHAB on OSGi-pĂ”hine automatiseerimistarkvara, mis koondab kodukeskkonna seadmete andmeid. OpenHAB ei tee kasutajatele ligipÀÀsu reguleerimismehhanismide kasutamist kohustuslikuks ning sĂ”ltub seega tĂ€ielikult juhtmevaba vĂ”rgu turvalisusest. KĂ€esolevas lĂ”putöös uurisime ning arendasime JSON Web Tokenâi-pĂ”hist tĂ”endi autenturit Eclipse SmartHome platvormile, millel pĂ”hineb ka openHAB. TĂ”endi autentur on baasiks ligipÀÀsu reguleerimismehhanismile. Lisaks esitleme kasutatavat volitusmudelit, mis vĂ”imaldab hallata kasutajate ligipÀÀsuĂ”igusi asjadele. Saavutatud tulemused osutavad, et ligipÀÀsu reguleerimismehhanismide rakendamine servlet-ide ja REST ressursside jaoks openHABi arhitektuuris on teostatav.The Internet of Things (IoT) is a dynamic and heterogenous environment where Things gather data from the real world to perform various tasks. Applications in IoT, such as the smart home, typically use private data derived from its users for its operations. Security becomes a concern when these applications are exposed to insecure networks. OpenHAB is an OSGi-based automation software that integrates the data from devices at home. OpenHAB does not enforce any access control mechanism for its users, and depends solely on the security of the wireless network. In this work, we studied and implemented a JSON Web Token-based authenticator for Eclipse SmartHome, the core of openHAB, as a base for access control mechanisms. Furthermore, we propose a fine-grained, yet usable authorization model to manage access permissions to things among legitimate users. The results obtained show that it is feasible to enforce access control mechanisms for servlet and REST resources in the architecture of openHAB
Internet of things for medication control: e-health architecture and service implementation
The use of Radio Frequency Identification technology (RFID) in medical context enables drug identification but also a rapid and, of course, precise identification of patients, physicians, nurses or any other health caregiver. Combining RFID tag identification with structured and secure Internet of Things (IoT) solutions, one can establish a ubiquitous and quick access to any type of medical related records, as long as one can control and adequately secure all the Internet mediated interactions.
This paper presents an e-Health service architecture, along with the corresponding Internet of Things prototype implementation, that makes use of RFID tags and Electronic Product Codes (EPC) standards, in order to easily establish in a ubiquitous manner a medication control system. The system, presented and tested, has a web interface and allowed for a first evaluation of the e-health proposed service. As the service is mainly focused on elderly Ambient Assisted Living (AAL) solutions, all these technologies - RFID, EPC, Object Naming Service (ONS) and IoT â have been integrated into a suitable system, able to promote better patient/physician, patient/nurse and, generally, any patient/health caregiver, interactions.
The whole prototype service, entitled "RFID-based IoT for Medication Control", and its web interface are presented and evaluated.FEDER Funds through the Programa Operacional Fatores de Competitividade â COMPETE and by National Funds through the FCT - Fundação para a CiĂȘncia e a Tecnologia (Portuguese Foundation for Science and Technology) within project FCOMP-01-0124-FEDER-02267
A survey paper on blockchain and its implementation to reduce security risks in various domains
Every technology with its powerful uses has issues connected to it and security is at the top of it. As for the changing environment, the world has been shifting to Virtual Reality, the new coming world seems to be the internet and blockchain technology which is more powerful than others and has its applications in every field, be it quantum computing, internet of things, security or others. This survey paper covers the blockchain and its security in different fields of sciences and technology. We begin with the introduction of blockchain and then discuss its structure. After that security issues have been highlighted which include attacks and their behavior in quantum computing, internet of things, cloud computing. Furthermore, we have discussed the most common types of attacks and the SRM model of blockchain followed by the conclusion
Evaluation of Anonymized ONS Queries
Electronic Product Code (EPC) is the basis of a pervasive infrastructure for
the automatic identification of objects on supply chain applications (e.g.,
pharmaceutical or military applications). This infrastructure relies on the use
of the (1) Radio Frequency Identification (RFID) technology to tag objects in
motion and (2) distributed services providing information about objects via the
Internet. A lookup service, called the Object Name Service (ONS) and based on
the use of the Domain Name System (DNS), can be publicly accessed by EPC
applications looking for information associated with tagged objects. Privacy
issues may affect corporate infrastructures based on EPC technologies if their
lookup service is not properly protected. A possible solution to mitigate these
issues is the use of online anonymity. We present an evaluation experiment that
compares the of use of Tor (The second generation Onion Router) on a global
ONS/DNS setup, with respect to benefits, limitations, and latency.Comment: 14 page
The Road Ahead for Networking: A Survey on ICN-IP Coexistence Solutions
In recent years, the current Internet has experienced an unexpected paradigm
shift in the usage model, which has pushed researchers towards the design of
the Information-Centric Networking (ICN) paradigm as a possible replacement of
the existing architecture. Even though both Academia and Industry have
investigated the feasibility and effectiveness of ICN, achieving the complete
replacement of the Internet Protocol (IP) is a challenging task.
Some research groups have already addressed the coexistence by designing
their own architectures, but none of those is the final solution to move
towards the future Internet considering the unaltered state of the networking.
To design such architecture, the research community needs now a comprehensive
overview of the existing solutions that have so far addressed the coexistence.
The purpose of this paper is to reach this goal by providing the first
comprehensive survey and classification of the coexistence architectures
according to their features (i.e., deployment approach, deployment scenarios,
addressed coexistence requirements and architecture or technology used) and
evaluation parameters (i.e., challenges emerging during the deployment and the
runtime behaviour of an architecture). We believe that this paper will finally
fill the gap required for moving towards the design of the final coexistence
architecture.Comment: 23 pages, 16 figures, 3 table
Forensic Data Properties of Digital Signature BDOC and ASiC-E Files on Classic Disk Drives
KĂ€esolevas magistritöös vaadeldakse BDOC ja ASiC-E digitaalselt allkirjastatud dokumendikonteinerite sisu ning kirjeldatakse nende huvipakkuvaid omadusi. Teatava hulga nĂ€idiskonteinerite vaatlemise jĂ€rel pakub autor vĂ€lja faili pĂ€ise ja faili jaluse kombinatsiooni (signatuuri), mis oluliselt parandab nimetatud failide kustutatud olekust sihitud taastamist kĂŒlgnevatest klastritest NTFS vormindatud tihendamata kettal, vĂ”ttes arvesse klassikalise kĂ”vaketta geomeetriat. Ăhtlasi kirjeldab autor kohtuekspertiisi koha pealt tĂ€hendust omavaid andmeid ZIP kohaliku faili pĂ€ises ja keskkataloogi kirjes, XML signatuuris ja ASN.1 kodeeritud kihtides ning nende kĂ€ttesaamise algoritmi. Nendele jĂ€reldustele tuginedes loob autor Phytoni skripte ja viib lĂ€bi mitmeid teste failide taastamiseks faili signatuuri jĂ€rgi ning huvipakkuvate andmete vĂ€ljavĂ”tmiseks. Teste viiakse lĂ€bi teatava valiku failide ĂŒle ja tulemusi vĂ”rreldakse mitme kohtuekspertiisis laialt kasutatava peavoolu töökeskkonnaga, samuti mĂ”ningate andmetaaste tööriistadega. LĂ”puks testitakse magistritöö kĂ€igus pakutud digitaalselt allkirjastatud dokumentide taastamiseks mĂ”eldud signatuuri ja andmete vĂ€ljavĂ”tmise algoritmi suurel hulgal avalikust dokumendiregistrist pĂ€rit kehtivate dokumentidega, mis saadi kĂ€tte spetsiaalselt selleks kirjutatud veebirobotiga. Nimetatud teste viiakse lĂ€bi dokumentide ĂŒle, mille hulgas on nii digitaalselt allkirjastatud dokumente kui ka teisi, nendega struktuurilt sarnaseid dokumente.This thesis reviews the contents and observes certain properties of digitally signed documents of BDOC and ASiC-E container formats. After reviewing a set of sample containers, the author comes up with a header and footer combination (signature) significantly improving pinpointed carving-based recovery of those files from a deleted state on NTFS formatted uncompressed volumes in contiguous clusters, taking into account the geometry of classic disk drives. The author also describes forensically meaningful attributive data found in ZIP Headers and Central Directory, XML signatures as well as embedded ASN.1 encoded data of the sample files and suggests an algorithm for the extraction of such data. Based on these findings, the author creates scripts in Python and executes a series of tests for file carving and extraction of attributive data. These tests are run over the samples placed into unallocated clusters and the results are compared to several mainstream commercial forensic examination suites as well as some popular data recovery tools. Finally, the author web-scrapes a large number of real-life documents from a government agencyâs public document registry. The carving signature and the data-extractive algorithm are thereafter applied on a larger scale and in an environment competitively supplemented with structurally similar containers
- âŠ