824 research outputs found
Recommended from our members
Heterogeneous Access: Survey and Design Considerations
As voice, multimedia, and data services are converging to IP, there is a need for a new networking architecture to support future innovations and applications. Users are consuming Internet services from multiple devices that have multiple network interfaces such as Wi-Fi, LTE, Bluetooth, and possibly wired LAN. Such diverse network connectivity can be used to increase both reliability and performance by running applications over multiple links, sequentially for seamless user experience, or in parallel for bandwidth and performance enhancements. The existing networking stack, however, offers almost no support for intelligently exploiting such network, device, and location diversity. In this work, we survey recently proposed protocols and architectures that enable heterogeneous networking support. Upon evaluation, we abstract common design patterns and propose a unified networking architecture that makes better use of a heterogeneous dynamic environment, both in terms of networks and devices. The architecture enables mobile nodes to make intelligent decisions about how and when to use each or a combination of networks, based on access policies. With this new architecture, we envision a shift from current applications, which support a single network, location, and device at a time to applications that can support multiple networks, multiple locations, and multiple devices
An Overview of IoT and Healthcare
This paper is an overview of some of the implications of IoT
on the healthcare field. Due to the increasing of IoT solutions, healthcare
cannot be outside of this paradigm. The contribution of this paper is to
introduce directions to achieve a global connectivity between the Internet
of Things (IoT) and the medical environments. The need to integrate
all in a global environment is a huge challenge to all (from electrical
engineers to data engineers).This revolution is redesigning the way we
see healthcare, from the smallest sensor to the big data collected
Securing PIN-based Authentication in Smartwatches With just Two Gestures
Smartwatches are becoming increasingly ubiquitous as they offer new capabilities to
develop sophisticated applications that make daily life easier and more convenient
for consumers. The services provided include applications for mobile payment, ticketing,
identification, access control, etc. While this makes modern smartwatches very
powerful devices, it also makes them very attractive targets for attackers. Indeed,
PINs and Pattern Lock have been widely used in smartwatches for user authentication.
However, such authentication methods are not robust against various forms of
cybersecurity attacks, such as side channel, phishing, smudge, shoulder surfing, and
video recording attacks. Moreover, the recent adoption of hardware-based solutions,
like the Trusted Execution Environment (TEE), can mitigate only partially such problems.
Thus, the user’s security and privacy are at risk without a strong authentication
scheme in place. In this work, we propose 2GesturePIN, a new authentication framework
that allows users to authenticate securely to their smartwatches and related
sensitive services through solely two gestures. 2GesturePIN leverages the rotating
bezel or crown, which are the most intuitive ways to interact with a smartwatch, as a
dedicated hardware. 2GesturePIN improves the resilience of the regular PIN authentication
method against state-of-the-art cybersecurity attacks while maintaining a
high level of usability
Container-based microservice architecture for local IoT services
Abstract. Edge services are needed to save networking and computational resources on higher tiers, enable operation during network problems, and to help limiting private data propagation to higher tiers if the function needing it can be handled locally. MEC at access network level provides most of these features but cannot help when access network is down. Local services, in addition, help alleviating the MEC load and limit the data propagation even more, on local level. This thesis focuses on the local IoT service provisioning. Local service provisioning is subject to several requirements, related to resource/energy-efficiency, performance and reliability.
This thesis introduces a novel way to design and implement a Docker container-based micro-service system for gadget-free future IoT (Internet of Things) network. It introduces a use case scenario and proposes few possible required micro-services as of solution to the scenario. Some of these services deployed on different virtual platforms along with software components that can process sensor data providing storage capacity to make decisions based on their algorithm and business logic while few other services deployed with gateway components to connect rest of the devices to the system of solution. It also includes a state-of-the-art study for design, implementation, and evaluation as a Proof-of-Concept (PoC) based on container-based microservices with Docker. The used IoT devices are Raspberry Pi embedded computers along with an Ubuntu machine with a rich set of features and interfaces, capable of running virtualized services.
This thesis evaluates the solution based on practical implementation. In addition, the thesis also discusses the benefits and drawbacks of the system with respect to the empirical solution. The output of the thesis shows that the virtualized microservices could be efficiently utilized at the local and resource constrained IoT using Dockers. This validates that the approach taken in this thesis is feasible for providing such services and functionalities to the micro and nanoservice architecture. Finally, this thesis proposes numerous improvements for future iterations
The future of maritime cyber security
The Maritime environment is not immune to the radical ability of modern digital communications and computing to be disruptive. In order to gain the advantages of modern technology those operating in the maritime must also become aware and develop strategies to handle the inevitable security issues that modern computing systems bring with them. This report presents a first step on the road to this understanding by presenting the findings from a joint workshop run by Security Lancaster and the Developments, Concepts and Doctrine Centre with participants from a range of government and commercial stakeholders. Here we present the salient points that we discussed within a framework that underpins a repeatable approach to scenario planning based on assessing key traits and trends in three key elements of the cyber maritime domain: Information, People and Technology. This report identifies how the use of technology is extending the scope for maritime security far beyond traditional littoral boundaries and the key influences shaping the cyber maritime environment
Cybersecurity of Industrial Cyber-Physical Systems: A Review
Industrial cyber-physical systems (ICPSs) manage critical infrastructures by
controlling the processes based on the "physics" data gathered by edge sensor
networks. Recent innovations in ubiquitous computing and communication
technologies have prompted the rapid integration of highly interconnected
systems to ICPSs. Hence, the "security by obscurity" principle provided by
air-gapping is no longer followed. As the interconnectivity in ICPSs increases,
so does the attack surface. Industrial vulnerability assessment reports have
shown that a variety of new vulnerabilities have occurred due to this
transition while the most common ones are related to weak boundary protection.
Although there are existing surveys in this context, very little is mentioned
regarding these reports. This paper bridges this gap by defining and reviewing
ICPSs from a cybersecurity perspective. In particular, multi-dimensional
adaptive attack taxonomy is presented and utilized for evaluating real-life
ICPS cyber incidents. We also identify the general shortcomings and highlight
the points that cause a gap in existing literature while defining future
research directions.Comment: 32 pages, 10 figure
- …