91,004 research outputs found
Recommended from our members
Using the Internet of Things to Teach Good Software Engineering Practice to High School Students
This paper describes a course to introduce high school students
to software engineering in practice using the Internet Of
Things (IoT). IoT devices allow students to get quick, visible
results without watering down technical aspects of
programming and networking. The course has three broad
goals: (1) to make software engineering fun and applicable,
with the aim of recruiting traditionally underrepresented
groups into computing; (2) to make young students begin to
approach problems with a design mindset; and (3) to show
students that computer science, generally, and software
engineering, specifically, is about much more than
programming. The course unfolds in three segments. The first
is a whirlwind introduction to a subset of IoT technologies.
Students complete a specific task (or set of tasks) using each
technology. This segment culminates in a “do-it-yourself”
project, in which the students implement a simple IoT
application using their basic knowledge of the technologies.
The course’s second segment introduces software engineering
practices, again primarily via hands-on practical tutorials. In
the third segment of the course, the students conceive of,
design, and implement a project that uses the technologies
introduced in the first segment, all while being attentive to the
good software engineering practices acquired in the second
segment. In addition to presenting the course curriculum, the
paper also discusses a first offering of the course in a threeweek
summer intensive program in 2017, including
assessments done to evaluate the curriculum.Cockrell School of Engineerin
PETRAS: a socio-technical framework for Internet of Things research and development
This paper presents a case application of a socio-technical framework for Internet of Things (IoT) research and development in the United Kingdom. Applying a socio-technical system approach to IoT, this paper seeks to provide a clear understanding of the interplay between technical and non-technical aspects of IoT research and development. It describes the socio-technical requirements for IoT design and development and provides the current snapshot of research in the United Kingdom to meet these requirements. Finally, the paper provides useful information on how to conceptualize IoT research within human-centered contexts and a useful guide for centre design and evaluation to those developing new research centres or seeking to reinvigorate existing ones
Governance and Policy Cooperation on the Cyber Security of the Internet of Things
This report was based on a workshop. The impetus for this workshop was the recognition that international policy cooperation on the cybersecurity aspects of the IoT has made little progress. This is due in part to a failure to establish a functioning community of technicians and policymakers who are jointly focusing on these issues. From a technical perspective, the IoT will significantly increase opportunities to breach security via new attack surfaces. For policymakers, the heightened insecurity created by the rapid expansion of the IoT marks a significant governance challenge. Addressing these security deficiencies will require an increase in the capacity to share threat information as well as a range of innovative technical and policy solutions. The workshop marked a starting point in building a global community of security practitioners and policymakers who are interested in these issues and who are working on similar topics
eHealth and the Internet of Things
To respond to an ageing population, eHealth strategies offer significant opportunities in achieving a balanced and sustainable healthcare infrastructure. Advances in technology both at the sensor and device levels and in respect of information technology have opened up other possibilities and options. Of significance among these is what is increasingly referred to as the Internet of Things, the interconnection of physical devices to an information infrastructure. The paper therefore sets out to position the Internet of Things at the core of future developments in eHealt
Privacy, the internet of things and state surveillance: handling personal information within an inhuman system
The Internet of Things (IoT) is, in part, an information handling system that can remove humans from the information handling process. The particular problem explored is how we are to understand privacy when considering informational systems that handle personal information in ways that impact people's lives when there is no human operator in direct contact with that personal information. I argue that these new technologies need to take concepts like privacy into account, but also, that we ought also to take these technologies into account to reconsider and perhaps reconceptualise privacy. This paper argues that while an inhuman system like the IoT does not necessarily violate the interpersonal privacy of people, if the IoT is used as part of a state surveillance program, a political notion of privacy may be violated.This work was supported by European Research Council, Funder Id:,
Grant Number: Project Title: Global Terrorism and Collective Mor, Australian
Research Council, Funder Id: http://dx.doi.org/10.13039/501100000923, Grant
Number: DP180103439: Intelligence And National Security: E
A Middleware for the Internet of Things
The Internet of Things (IoT) connects everyday objects including a vast array
of sensors, actuators, and smart devices, referred to as things to the
Internet, in an intelligent and pervasive fashion. This connectivity gives rise
to the possibility of using the tracking capabilities of things to impinge on
the location privacy of users. Most of the existing management and location
privacy protection solutions do not consider the low-cost and low-power
requirements of things, or, they do not account for the heterogeneity,
scalability, or autonomy of communications supported in the IoT. Moreover,
these traditional solutions do not consider the case where a user wishes to
control the granularity of the disclosed information based on the context of
their use (e.g. based on the time or the current location of the user). To fill
this gap, a middleware, referred to as the Internet of Things Management
Platform (IoT-MP) is proposed in this paper.Comment: 20 pages, International Journal of Computer Networks & Communications
(IJCNC) Vol.8, No.2, March 201
Big Data and the Internet of Things
Advances in sensing and computing capabilities are making it possible to
embed increasing computing power in small devices. This has enabled the sensing
devices not just to passively capture data at very high resolution but also to
take sophisticated actions in response. Combined with advances in
communication, this is resulting in an ecosystem of highly interconnected
devices referred to as the Internet of Things - IoT. In conjunction, the
advances in machine learning have allowed building models on this ever
increasing amounts of data. Consequently, devices all the way from heavy assets
such as aircraft engines to wearables such as health monitors can all now not
only generate massive amounts of data but can draw back on aggregate analytics
to "improve" their performance over time. Big data analytics has been
identified as a key enabler for the IoT. In this chapter, we discuss various
avenues of the IoT where big data analytics either is already making a
significant impact or is on the cusp of doing so. We also discuss social
implications and areas of concern.Comment: 33 pages. draft of upcoming book chapter in Japkowicz and Stefanowski
(eds.) Big Data Analysis: New algorithms for a new society, Springer Series
on Studies in Big Data, to appea
Authorization Framework for the Internet-of-Things
This paper describes a framework that allows fine-grained
and flexible access control to connected devices with very
limited processing power and memory.
We propose a set of security and performance requirements
for this setting and derive an authorization framework distributing
processing costs between constrained devices and less constrained back-end servers while keeping message exchanges
with the constrained devices at a minimum.
As a proof of concept we present performance results from
a prototype implementing the device part of the framework
Edge analytics in the internet of things
High-data-rate sensors are becoming ubiquitous in the Internet of Things. GigaSight is an Internet-scale repository of crowd-sourced video content that enforces privacy preferences and access controls. The architecture is a federated system of VM-based cloudlets that perform video analytics at the edge of the Internet
- …