5,329 research outputs found

    A survey of secure middleware for the Internet of Things

    Get PDF
    The rapid growth of small Internet connected devices, known as the Internet of Things (IoT), is creating a new set of challenges to create secure, private infrastructures. This paper reviews the current literature on the challenges and approaches to security and privacy in the Internet of Things, with a strong focus on how these aspects are handled in IoT middleware. We focus on IoT middleware because many systems are built from existing middleware and these inherit the underlying security properties of the middleware framework. The paper is composed of three main sections. Firstly, we propose a matrix of security and privacy threats for IoT. This matrix is used as the basis of a widespread literature review aimed at identifying requirements on IoT platforms and middleware. Secondly, we present a structured literature review of the available middleware and how security is handled in these middleware approaches. We utilise the requirements from the first phase to evaluate. Finally, we draw a set of conclusions and identify further work in this area

    Trust Transfer and the Intention to Use App-enabled Carpooling Service

    Get PDF
    In China, with the rapid dissemination of mobile communications technology along with congested traffic and increasingly expensive transportation costs, consumers are turning to smartphone-enabled, ride-sharing services. Sharing economy requires trust in strangers. Based on trust transfer theory and a dyadic conceptualization of trust from cognitive to affective, the purpose of this study is to examine trust building through the use of Didi, a third-party, ride-sharing platform that mediates exchanges among strangers

    Cyber security investigation for Raspberry Pi devices

    Get PDF
    Big Data on Cloud application is growing rapidly. When the cloud is attacked, the investigation relies on digital forensics evidence. This paper proposed the data collection via Raspberry Pi devices, in a healthcare situation. The significance of this work is that could be expanded into a digital device array that takes big data security issues into account. There are many potential impacts in health area. The field of Digital Forensics Science has been tagged as a reactive science by some who believe research and study in the field often arise as a result of the need to respond to event which brought about the needs for investigation; this work was carried as a proactive research that will add knowledge to the field of Digital Forensic Science. The Raspberry Pi is a cost-effective, pocket sized computer that has gained global recognition since its development in 2008; with the wide spread usage of the device for different computing purposes. Raspberry Pi can potentially be a cyber security device, which can relate with forensics investigation in the near future. This work has used a systematic approach to study the structure and operation of the device and has established security issues that the widespread usage of the device can pose, such as health or smart city. Furthermore, its evidential information applied in security will be useful in the event that the device becomes a subject of digital forensic investigation in the foreseeable future. In healthcare system, PII (personal identifiable information) is a very important issue. When Raspberry Pi plays a processor role, its security is vital; consequently, digital forensics investigation on the Raspberry Pies becomes necessary

    Developments and key issues in tourism mobilities

    Get PDF
    This paper examines key developments in recent tourism mobilities research. It begins by outlining the recent conceptualisation of tourism mobilities, arguing that it is not just that tourism is a form of mobility like other forms of mobility but that different mobilities inform and are informed by tourism. It then examines work which has been developed in terms of materialities, autmobilities and new technologies. It concludes by discussing mobile methodologies and some thoughts on future research directions

    Cognitive radio-enabled Internet of Vehicles (IoVs): a cooperative spectrum sensing and allocation for vehicular communication

    Get PDF
    Internet of Things (IoTs) era is expected to empower all aspects of Intelligent Transportation System (ITS) to improve transport safety and reduce road accidents. US Federal Communication Commission (FCC) officially allocated 75MHz spectrum in the 5.9GHz band to support vehicular communication which many studies have found insufficient. In this paper, we studied the application of Cognitive Radio (CR) technology to IoVs in order to increase the spectrum resource opportunities available for vehicular communication, especially when the officially allocated 75MHz spectrum in 5.9GHz band is not enough due to high demands as a result of increasing number of connected vehicles as already foreseen in the near era of IoTs. We proposed a novel CR Assisted Vehicular NETwork (CRAVNET) framework which empowers CR enabled vehicles to make opportunistic usage of licensed spectrum bands on the highways. We also developed a novel co-operative three-state spectrum sensing and allocation model which makes CR vehicular secondary units (SUs) aware of additional spectrum resources opportunities on their current and future positions and applies optimal sensing node allocation algorithm to guarantee timely acquisition of the available channels within a limited sensing time. The results of the theoretical analyses and simulation experiments have demonstrated that the proposed model can significantly improve the performance of a cooperative spectrum sensing and provide vehicles with additional spectrum opportunities without harmful interference against the Primary Users (PUs) activities

    Authentication Schemes\u27 Impact on Working Memory

    Get PDF
    Authentication is the process by which a computing system validates a user’s identity. Although this process is necessary for system security, users view authentication as a frequent disruption to their primary tasks. During this disruption, primary task information must be actively maintained in working memory. As a result, primary task information stored in working memory is at risk of being lost or corrupted while users authenticate. For over two decades, researchers have focused on developing more memorable passwords by replacing alphanumeric text with visual graphics (Biddle et al., 2012). However, very little attention has been given to the impact authentication has on working memory. A recent exploratory study suggests that working memory can be disrupted during graphical authentication (Still & Cain, 2019). In this study, we take the next step by controlling for task difficulty and contrasting performance with conventional password-based authentication. Baddeley’s model was employed to examine the impact of authentication on verbal, visuospatial, and central executive working memory (Baddeley & Hitch, 1974). Our findings may help designers select authentication systems that minimize adverse effects on users’ critical primary task performance. For instance, we revealed that conventional passwords do not have a greater negative impact on verbal primary task information compared to graphical passcodes. We also replicated findings reported by Still and Cain (2019), where visuospatial was least impaired by authentication. These findings are not intuitive, highlighting the need for further investigation of how authentication impacts primary task information in working memory

    Pedal 4 Purification

    Get PDF
    The lack of access to clean drinking water remains one of the largest issues still facing humanity. The Pedal 4 Purification is a product that addresses this need by utilizing pre-existing bicycle infrastructure and local freshwater sources to allow people to purify their own drinking water on a daily basis. Attachable to any standard bicycle, the Pedal 4 Purification product consists of pump, purification, cart and adjustable kickstand subsystems that allow the operator to pump, purify and transport 40L of potable water. Pedaling at the reasonable rate of 60 rpm will provide the optimal flow rate of 1.54L/min through the filter. At this rate, it would take the operator 26 minutes to provide enough drinking water to satiate 20 people for the day. As a result of the drastic reduction in the time and effort it takes for individuals to obtain drinking water, target communities will have more free time allowing them to focus on other pressing issues. Use of the Pedal 4 Purification product results in a 266% increase in user time savings as well as 54 times the amount of water collected per minute of user exertion compared to traditional methods. The Pedal 4 Purification team travelled to San Andres Itzapa, Guatemala to manufacture the entire device at Maya Pedal, an NGO that creates ‘bicimaquinas’ to help provide its local community members with basic human resource infrastructure. After the manufacturing process was complete, the team and Maya Pedal workers drove to the highland community of Patzun to implement the design and instruct the local people about how to use it. User feedback was noted after the successful implementation in the developing community of Patzun

    Electrical and Computer Engineering Annual Report 2017

    Get PDF
    Early Career Awards Faculty Directory Faculty Highlights Special Report: Mobility at Michigan Tech Faculty Publications Staff Profile & Directory Graduate Student Research Accelerated Master\u27s Degree Graduate Student Awards & Degrees Undergraduate Highlights Senior Design Enterprise Undergraduate Student Awards & Advisory Grants & Contracts Departmental Statistics A Pioneer\u27s Storyhttps://digitalcommons.mtu.edu/ece-annualreports/1001/thumbnail.jp

    Spartan Daily, August 29, 2007

    Get PDF
    Volume 129, Issue 3https://scholarworks.sjsu.edu/spartandaily/10375/thumbnail.jp
    corecore