4,504 research outputs found

    Survey and Systematization of Secure Device Pairing

    Full text link
    Secure Device Pairing (SDP) schemes have been developed to facilitate secure communications among smart devices, both personal mobile devices and Internet of Things (IoT) devices. Comparison and assessment of SDP schemes is troublesome, because each scheme makes different assumptions about out-of-band channels and adversary models, and are driven by their particular use-cases. A conceptual model that facilitates meaningful comparison among SDP schemes is missing. We provide such a model. In this article, we survey and analyze a wide range of SDP schemes that are described in the literature, including a number that have been adopted as standards. A system model and consistent terminology for SDP schemes are built on the foundation of this survey, which are then used to classify existing SDP schemes into a taxonomy that, for the first time, enables their meaningful comparison and analysis.The existing SDP schemes are analyzed using this model, revealing common systemic security weaknesses among the surveyed SDP schemes that should become priority areas for future SDP research, such as improving the integration of privacy requirements into the design of SDP schemes. Our results allow SDP scheme designers to create schemes that are more easily comparable with one another, and to assist the prevention of persisting the weaknesses common to the current generation of SDP schemes.Comment: 34 pages, 5 figures, 3 tables, accepted at IEEE Communications Surveys & Tutorials 2017 (Volume: PP, Issue: 99

    Wireless Sensor Networks - An Introduction

    Get PDF

    Code, space and everyday life

    Get PDF
    In this paper we examine the role of code (software) in the spatial formation of collective life. Taking the view that human life and coded technology are folded into one another, we theorise space as ontogenesis. Space, we posit, is constantly being bought into being through a process of transduction – the constant making anew of a domain in reiterative and transformative practices - as an incomplete solution to a relational problem. The relational problem we examine is the ongoing encounter between individuals and environment where the solution, to a greater or lesser extent, is code. Code, we posit, is diversely embedded in collectives as coded objects, coded infrastructure, coded processes and coded assemblages. These objects, infrastructure, processes and assemblages possess technicity, that is, unfolding or evolutive power to make things happen; the ability to mediate, supplement, augment, monitor, regulate, operate, facilitate, produce collective life. We contend that when the technicity of code is operationalised it transduces one of three forms of hybrid spatial formations: code/space, coded space and backgrounded coded space. These formations are contingent, relational, extensible and scaleless, often stretched out across networks of greater or shorter length. We demonstrate the coded transduction of space through three vignettes – each a day in the life of three people living in London, UK, tracing the technical mediation of their interactions, transactions and mobilities. We then discuss how code becomes the relational solution to five different classes of problems – domestic living, travelling, working, communicating, and consuming

    SAFEST: A Framework for Early Security Triggers in Public Spaces

    Get PDF
    International audiencePublic spaces such as airports, railway stations or stadiums bring together large numbers of people on a quite limited space to use a security-sensitive infrastructure. Electronic security systems may help to provide better and faster security, as well as safety for the general public. Application scenarios may include intrusion detection and monitoring of large crowds in order to provide guidance in case of unexpected events (e.g., a mass panic). However, current security systems used within the public infrastructure are typically expensive, non-trivial to deploy, difficult to operate and maintain, prone to malfunction due to individual component failures, and generally lack citizen privacy-friendliness. The advent of novel, large-scale distributed security systems based on wireless, lightweight sensors may enhance security and safety in public spaces. In this realm, SAFEST is a project aiming at analyzing the social context of area surveillance and developing a system that can fulfill this task, both in terms of technology as well as acceptance by the general public. The targeted system will operate in a distributed way, collect anonymized data, securely transfer this data to a central location for evaluation, and - if necessary - notify the operator or issue alerts directly to the general public. Work on the technical aspects of the system is accompanied by social studies investigating the individual perception of risk and the methods for reaching public acceptance of the technical solutions

    Sensor Networks in the Low Lands

    Get PDF
    This paper provides an overview of scientific and industrial developments of the last decade in the area of sensor networks in The Netherlands (Low Lands). The goal is to highlight areas in which the Netherlands has made most contributions and is currently a dominant player in the field of sensor networks. On the one hand, motivations, addressed topics, and initiatives taken in this period are presented, while on the other hand, special emphasis is given to identifying current and future trends and formulating a vision for the coming five to ten years. The presented overview and trend analysis clearly show that Dutch research and industrial efforts, in line with recent worldwide developments in the field of sensor technology, present a clear shift from sensor node platforms, operating systems, communication, networking, and data management aspects of the sensor networks to reasoning/cognition, control, and actuation

    Mobihealth: mobile health services based on body area networks

    Get PDF
    In this chapter we describe the concept of MobiHealth and the approach developed during the MobiHealth project (MobiHealth, 2002). The concept was to bring together the technologies of Body Area Networks (BANs), wireless broadband communications and wearable medical devices to provide mobile healthcare services for patients and health professionals. These technologies enable remote patient care services such as management of chronic conditions and detection of health emergencies. Because the patient is free to move anywhere whilst wearing the MobiHealth BAN, patient mobility is maximised. The vision is that patients can enjoy enhanced freedom and quality of life through avoidance or reduction of hospital stays. For the health services it means that pressure on overstretched hospital services can be alleviated

    Anti-Theft Box: Arduino Safety Box with IoT Notifications

    Get PDF
    Theft cases often go unnoticed and are everywhere we are. It can happen in public, at school, at work or even in your own home. Things like this often happen to teens and older adults. Some of them do not have a safe place to store their valuables because of their carelessness. This is because they do not take this seriously. On the other hand, they already have their own safety box which is a great example of keeping items from being stolen or robbed. With the Internet of Things (IoT), this safety box can be improved by adding features that make it even safer to receive notifications on a mobile phone when the safety box is opened. With these improvements, property owners will become more aware of their goods because not everyone around us can be trusted. The use of these notifications is an update that will be created to improve the security of your goods. The methodology used to carry out this project is called Prototyping Method. In this way, prototype can be said to be both a design and an example of an existing system, but not yet fully functional. Prototypes will outline how a system works, and most prototype systems are not yet the perfect system to run

    Using security risk analysis: Is the bring your own device policy becoming a liability risk within healthcare?

    Get PDF
    Using computer simulation modeling, this research examined the problems contributing to data breaches within healthcare industry. The study attempted to answer two questions: 1) is the Bring Your Own Device policy becoming a liability risk within hospitals causing an increase in data breaches and 2) is there a lower risk compared to using wired desktops. An iPad was the primary focused device as one of many Bring Your Own Devices. The study used a randomly generated sample of an approximate 2,700 patients, one nurse and doctor on a eight hour work-day within the clinic (eight A.M five P.M) considering a one hour lunch break in between. The outcome of the study revealed that the Bring Your Own Policy has a lower risk than using wired desktops within hospitals
    • …
    corecore