183 research outputs found

    Security and privacy issues of physical objects in the IoT: Challenges and opportunities

    Get PDF
    In the Internet of Things (IoT), security and privacy issues of physical objects are crucial to the related applications. In order to clarify the complicated security and privacy issues, the life cycle of a physical object is divided into three stages of pre-working, in-working, and post-working. On this basis, a physical object-based security architecture for the IoT is put forward. According to the security architecture, security and privacy requirements and related protecting technologies for physical objects in different working stages are analyzed in detail. Considering the development of IoT technologies, potential security and privacy challenges that IoT objects may face in the pervasive computing environment are summarized. At the same time, possible directions for dealing with these challenges are also pointed out

    From truth to trust: the impact of blockchain traceability on trust in product authenticity

    Get PDF
    In the global marketplace, customers are increasingly unaware of the source, provenance, and authenticity of products. Early research has shown that the introduction of blockchain technology into the supply chain area can make it more transparent and trustworthy. As a platform that supports distributed, cryptographically secure, auditable transactions, blockchain has expanded from the domain of digital cryptocurrency into the domain of physical asset provenance and ownership tracking and tracing. This research examines blockchain support of trust in product authenticity adopting a two-paper dissertation format. In the first conceptual paper, I develop a conceptual framework on blockchain technology\u27s unique features and characteristics and how it can boost trust in product authenticity. The second paper adopts the conceptual framework to test through a vignette experiment the effects of blockchain traceability, product identification, and the interaction between them on trust in product origin authenticity. Academics can use this research to develop new instruments to inform practice about how blockchain can boost trust in product authenticity. Results from this study can inform managers considering investments into blockchain solutions and unique product identification as a customer product authenticity, brand protection, or anti-counterfeiting strategy

    Healthcare 5.0 Security Framework: Applications, Issues and Future Research Directions

    Get PDF
    Healthcare 5.0 is a system that can be deployed to provide various healthcare services. It does these services by utilising a new generation of information technologies, such as Internet of Things (IoT), Artificial Intelligence (AI), Big data analytics, blockchain and cloud computing. Due to the introduction of healthcare 5.0, the paradigm has been now changed. It is disease-centered to patient-centered care where it provides healthcare services and supports to the people. However, there are several security issues and challenges in healthcare 5.0 which may cause the leakage or alteration of sensitive healthcare data. This demands that we need a robust framework in order to secure the data of healthcare 5.0, which can facilitate different security related procedures like authentication, access control, key management and intrusion detection. Therefore, in this review article, we propose the design of a secure generalized healthcare 5.0 framework. The details of various applications of healthcare 5.0 along with the security requirements and threat model of healthcare 5.0 are provided. Next, we discuss about the existing security mechanisms in healthcare 5.0 along with their performance comparison. Some future research directions are finally discussed for the researchers working in healthcare 5.0 domain

    Spectral sensitivity near exceptional points as a resource for hardware encryption

    Get PDF
    The spectral sensitivity near exceptional points (EPs) has been recently explored as an avenue for building sensors with enhanced sensitivity. However, to date, it is not clear whether this class of sensors does indeed outperform traditional sensors in terms of signal-to-noise ratio. In this work, we investigate the spectral sensitivity associated with EPs under a different lens and propose to utilize it as a resource for hardware security. In particular, we introduce a physically unclonable function (PUF) based on analogue electronic circuits that benefit from the drastic eigenvalues bifurcation near a divergent exceptional point to enhance the stochastic entropy caused by inherent parameter fluctuations in electronic components. This in turn results in a perfect entropy source for the generation of encryption keys encoded in analog electrical signals. This lightweight and robust analog-PUF structure may lead to a variety of unforeseen securities and anti-counterfeiting applications in radio-frequency fingerprinting and wireless communications

    Non-invasive Techniques Towards Recovering Highly Secure Unclonable Cryptographic Keys and Detecting Counterfeit Memory Chips

    Get PDF
    Due to the ubiquitous presence of memory components in all electronic computing systems, memory-based signatures are considered low-cost alternatives to generate unique device identifiers (IDs) and cryptographic keys. On the one hand, this unique device ID can potentially be used to identify major types of device counterfeitings such as remarked, overproduced, and cloned. On the other hand, memory-based cryptographic keys are commercially used in many cryptographic applications such as securing software IP, encrypting key vault, anchoring device root of trust, and device authentication for could services. As memory components generate this signature in runtime rather than storing them in memory, an attacker cannot clone/copy the signature and reuse them in malicious activity. However, to ensure the desired level of security, signatures generated from two different memory chips should be completely random and uncorrelated from each other. Traditionally, memory-based signatures are considered unique and uncorrelated due to the random variation in the manufacturing process. Unfortunately, in previous studies, many deterministic components of the manufacturing process, such as memory architecture, layout, systematic process variation, device package, are ignored. This dissertation shows that these deterministic factors can significantly correlate two memory signatures if those two memory chips share the same manufacturing resources (i.e., manufacturing facility, specification set, design file, etc.). We demonstrate that this signature correlation can be used to detect major counterfeit types in a non-invasive and low-cost manner. Furthermore, we use this signature correlation as side-channel information to attack memory-based cryptographic keys. We validate our contribution by collecting data from several commercially available off-the-shelf (COTS) memory chips/modules and considering different usage-case scenarios

    Secure and Transparent Supply Chain Management using Blockchain and IoT

    Get PDF
    Blockchain technology has emerged as a disruptive force across various industries, and its integration with the Internet of Things (IoT) has unlocked new avenues for supply chain management. The conventional supply chain systems often encounter challenges related to privacy, security, and data integrity. In contrast, blockchain's decentralized and tamper-proof nature ensures a secure, auditable, and transparent record of product movement within the supply chain. By leveraging the immutable properties of blockchain, the system enhances product traceability, authenticity, and accountability while significantly reducing operational costs. IoT devices are vulnerable to attack as due to low processing power, storage limitations etc.  Blockchain integrated with IoT provides a solution faced by the several industries. Blockchains and smart contracts are technology that has gained massive attention. The integration of blockchain addresses these shortcomings by providing robust data security and integrity, minimizing the risk of unauthorized access or alteration. This paper presents a system that helps the industrialist to have an access to agricultural data and supply of crops data to farmer. As industries continue to embrace digitization and connectivity, the presented system offers a significant step towards a more streamlined and secure future for agricultural information sharing. This system will be effective for the supply chain management for the trusted delivery
    • …
    corecore