15,266 research outputs found

    Trust Evaluation for Embedded Systems Security research challenges identified from an incident network scenario

    Get PDF
    This paper is about trust establishment and trust evaluations techniques. A short background about trust, trusted computing and security in embedded systems is given. An analysis has been done of an incident network scenario with roaming users and a set of basic security needs has been identified. These needs have been used to derive security requirements for devices and systems, supporting the considered scenario. Using the requirements, a list of major security challenges for future research regarding trust establishment in dynamic networks have been collected and elaboration on some different approaches for future research has been done.This work was supported by the Knowledge foundation and RISE within the ARIES project

    Secure Identification in Social Wireless Networks

    Get PDF
    The applications based on social networking have brought revolution towards social life and are continuously gaining popularity among the Internet users. Due to the advanced computational resources offered by the innovative hardware and nominal subscriber charges of network operators, most of the online social networks are transforming into the mobile domain by offering exciting applications and games exclusively designed for users on the go. Moreover, the mobile devices are considered more personal as compared to their desktop rivals, so there is a tendency among the mobile users to store sensitive data like contacts, passwords, bank account details, updated calendar entries with key dates and personal notes on their devices. The Project Social Wireless Network Secure Identification (SWIN) is carried out at Swedish Institute of Computer Science (SICS) to explore the practicality of providing the secure mobile social networking portal with advanced security features to tackle potential security threats by extending the existing methods with more innovative security technologies. In addition to the extensive background study and the determination of marketable use-cases with their corresponding security requirements, this thesis proposes a secure identification design to satisfy the security dimensions for both online and offline peers. We have implemented an initial prototype using PHP Socket and OpenSSL library to simulate the secure identification procedure based on the proposed design. The design is in compliance with 3GPP‟s Generic Authentication Architecture (GAA) and our implementation has demonstrated the flexibility of the solution to be applied independently for the applications requiring secure identification. Finally, the thesis provides strong foundation for the advanced implementation on mobile platform in future

    Don’t Isolate E-Business from the Marketing Communication Curriculum

    Get PDF

    Sustainable Waste Sorter

    Get PDF
    Indiana University Purdue University IndianapolisThe purpose of this project is to help people eliminate the confusion on whether they should throw their trash away or dispose of it in a recycling bin. The sustainable waste sorter is an informative device that tells the user where to place their trash. Our customer and the origin of the idea came from an organization called Roche Diagnostics Operations. Roche Diagnostics Operations is a multinational healthcare organization, the Indianapolis location focuses more on creating and developing their diabetic test strips. The device is created of four main components which include a Raspberry Pi 2 Model B, a camera module, an LCD screen, and a casing/mount that holds all of these components together. All of these components are compatible with the Raspberry Pi 2 Model B. The software was programmed in Python and the database in MySQL. During the development of the device, the most challenging task was learning how to develop in the new language, Python. Once the device reached a stable state it was piloted at Roche Diagnostics Operations. The purpose of the first of three pilot sessions was to verify that the device worked in the environment and that the items entered in the database were recognized; as a result, the device passed that test. The second pilot session had the same purpose as the first pilot session but with more items in the database. The device received more interaction during the second pilot session, though the team decided to schedule a third pilot session once all the items were entered into the database and a revamped user interface was completed. The team entered about 800 entries into the database and created a new and interactive user interface for the device. The third pilot session was a success; the items that were scanned by testers were recognized and the new user interface was a success as well. Overall, the sustainable waste sorter project was successful and educational. We, as students, took all of our fundamental learnings from our previous courses and applied them to this project. This allowed us to enhance our problem solving and project management skills. As people use the device, we hope that it educates them on how to properly recycle therefore improving the environmental state of our planet.Computer Engineering Technolog

    SensorCloud: Towards the Interdisciplinary Development of a Trustworthy Platform for Globally Interconnected Sensors and Actuators

    Get PDF
    Although Cloud Computing promises to lower IT costs and increase users' productivity in everyday life, the unattractive aspect of this new technology is that the user no longer owns all the devices which process personal data. To lower scepticism, the project SensorCloud investigates techniques to understand and compensate these adoption barriers in a scenario consisting of cloud applications that utilize sensors and actuators placed in private places. This work provides an interdisciplinary overview of the social and technical core research challenges for the trustworthy integration of sensor and actuator devices with the Cloud Computing paradigm. Most importantly, these challenges include i) ease of development, ii) security and privacy, and iii) social dimensions of a cloud-based system which integrates into private life. When these challenges are tackled in the development of future cloud systems, the attractiveness of new use cases in a sensor-enabled world will considerably be increased for users who currently do not trust the Cloud.Comment: 14 pages, 3 figures, published as technical report of the Department of Computer Science of RWTH Aachen Universit
    • …
    corecore