3 research outputs found
A Machine to Machine framework for the charging of Electric Autonomous Vehicles
Electric Autonomous Vehicles (EAVs) have gained increasing attention of
industry, governments and scientific communities concerned about issues related
to classic transportation including accidents and casualties, gas emissions and
air pollution, intensive traffic and city viability. One of the aspects,
however, that prevent a broader adoption of this technology is the need for
human interference to charge EAVs, which is still mostly manual and
time-consuming. This study approaches such a problem by introducing the
Inno-EAV, an open-source charging framework for EAVs that employs
machine-to-machine (M2M) distributed communication. The idea behind M2M is to
have networked devices that can interact, exchange information and perform
actions without any manual assistance of humans. The advantages of the Inno-EAV
include the automation of charging processes and the collection of relevant
data that can support better decision making in the spheres of energy
distribution. In this paper, we present the software design of the framework,
the development process, the emphasis on the distributed architecture and the
networked communication, and we discuss the back-end database that is used to
store information about car owners, cars, and charging stations
Cyber-Storms Come from Clouds: Security of Cloud Computing in the IoT Era
The Internet of Things (IoT) is rapidly changing our society to a world where
every "thing" is connected to the Internet, making computing pervasive like
never before. This tsunami of connectivity and data collection relies more and
more on the Cloud, where data analytics and intelligence actually reside. Cloud
computing has indeed revolutionized the way computational resources and
services can be used and accessed, implementing the concept of utility
computing whose advantages are undeniable for every business. However, despite
the benefits in terms of flexibility, economic savings, and support of new
services, its widespread adoption is hindered by the security issues arising
with its usage. From a security perspective, the technological revolution
introduced by IoT and Cloud computing can represent a disaster, as each object
might become inherently remotely hackable and, as a consequence, controllable
by malicious actors. While the literature mostly focuses on security of IoT and
Cloud computing as separate entities, in this article we provide an up-to-date
and well-structured survey of the security issues of Cloud computing in the IoT
era. We give a clear picture of where security issues occur and what their
potential impact is. As a result, we claim that it is not enough to secure IoT
devices, as cyber-storms come from Clouds
Cyber-storms come from clouds:Security of cloud computing in the IoT era
The Internet of Things (IoT) is rapidly changing our society to a world where every “thing” is connected to the Internet, making computing pervasive like never before. This tsunami of connectivity and data collection relies more and more on the Cloud, where data analytics and intelligence actually reside. Cloud computing has indeed revolutionized the way computational resources and services can be used and accessed, implementing the concept of utility computing whose advantages are undeniable for every business. However, despite the benefits in terms of flexibility, economic savings, and support of new services, its widespread adoption is hindered by the security issues arising with its usage. From a security perspective, the technological revolution introduced by IoT and Cloud computing can represent a disaster, as each object might become inherently remotely hackable and, as a consequence, controllable by malicious actors. While the literature mostly focuses on the security of IoT and Cloud computing as separate entities, in this article we provide an up-to-date and well-structured survey of the security issues of cloud computing in the IoT era. We give a clear picture of where security issues occur and what their potential impact is. As a result, we claim that it is not enough to secure IoT devices, as cyber-storms come from Clouds