1,201 research outputs found

    Diverse perceptions of smart spaces

    No full text
    This is the era of smart technology and of ‘smart’ as a meme, so we have run three workshops to examine the ‘smart’ meme and the exploitation of smart environments. The literature relating to smart spaces focuses primarily on technologies and their capabilities. Our three workshops demonstrated that we require a stronger user focus if we are advantageously to exploit spaces ascribed as smart: we examined the concept of smartness from a variety of perspectives, in collaboration with a broad range of contributors. We have prepared this monograph mainly to report on the third workshop, held at Bournemouth University in April 2012, but do also consider the lessons learned from all three. We conclude with a roadmap for a fourth (and final) workshop, which is intended to emphasise the overarching importance of the humans using the spac

    Navigating the IoT landscape: Unraveling forensics, security issues, applications, research challenges, and future

    Full text link
    Given the exponential expansion of the internet, the possibilities of security attacks and cybercrimes have increased accordingly. However, poorly implemented security mechanisms in the Internet of Things (IoT) devices make them susceptible to cyberattacks, which can directly affect users. IoT forensics is thus needed for investigating and mitigating such attacks. While many works have examined IoT applications and challenges, only a few have focused on both the forensic and security issues in IoT. Therefore, this paper reviews forensic and security issues associated with IoT in different fields. Future prospects and challenges in IoT research and development are also highlighted. As demonstrated in the literature, most IoT devices are vulnerable to attacks due to a lack of standardized security measures. Unauthorized users could get access, compromise data, and even benefit from control of critical infrastructure. To fulfil the security-conscious needs of consumers, IoT can be used to develop a smart home system by designing a FLIP-based system that is highly scalable and adaptable. Utilizing a blockchain-based authentication mechanism with a multi-chain structure can provide additional security protection between different trust domains. Deep learning can be utilized to develop a network forensics framework with a high-performing system for detecting and tracking cyberattack incidents. Moreover, researchers should consider limiting the amount of data created and delivered when using big data to develop IoT-based smart systems. The findings of this review will stimulate academics to seek potential solutions for the identified issues, thereby advancing the IoT field.Comment: 77 pages, 5 figures, 5 table

    Cheating Detection in Online Examinations

    Get PDF
    In this research, we develop and analyze a tool that monitor student browsing activity during online examination. Our goal is to detect cheating in real time. In our design, a server capture packets using KISMET and detects cheating based on either a whitelist or blacklist of URLs. We provide implementation details and give experimental results, and we analyze various attack strategies. Finally, we show that the system is practical and lightweight in comparison to other available tools

    Social Media Roadmaps. Exploring the futures triggered by social media.

    Get PDF
    Social media refers to a combination of three elements: content, user communities and Web 2.0 technologies. This foresight report presents six roadmaps of the anticipated developments of social media in three themes: society, companies, and local environment. One of the roadmaps, the meta-roadmap, is the synthesis of them all. The society sub-roadmap explores societal participation through communities. There are three sub-roadmaps relating to companies: interacting with companies through communities, social media in work environment, and social media enhanced shopping. The local environment sub-roadmap looks at social media in local environment. The roadmapping process was carried out through two workshops at VTT. The results of the report are crystallized into five main development lines triggered by social media. First development line is transparency referring to its increasing role in society, both with positive and negative consequences. The second development line is the rise of ubiquitous participatory communication model. This refers to an increase of two-directional and community-based interactivity in every field, where it has some added value. The third development is reflexive empowerment. This refers to the role of social media as an enabler of grass-root community collaboration. The fourth development line is the duality personalization/fragmentation vs. mass effects/integration. Personalization /fragmentation emphasises the tailoring of the web services and content. This development is counterweighted by mass effects/integration, like the formation of super-nodes in the web. The fifth development line is the new relations of physical and virtual worlds. This development line highlights the idea that practices induced by social media, e.g. communication, participation, co-creation, feedback and rating, will get more common in daily environment, and that virtual and physical worlds will be more and more interlinked.</p

    Secured Framework for Data Outsourcing using ABE in Cloud Computing

    Get PDF
    Cloud has been around for two decades and it comprises of the tremendous measure of data from everywhere throughout the world. The vast majority of the general population at an individual level and association level have moved their data to the cloud and share data over all around the globe. The fundamental test looked by everybody is to share the data everywhere throughout the world or at hierarchical level safely without giving endlessly the essential data to any exploiters. To beat the test to share the data safely finished the cloud, a productive data encryption calculation for scrambling data before sending it to the cloud. In this proposed we are utilizing a mix of Attribute-Based Encryption Algorithm for scrambling the data previously sending it to the cloud. This will push the client to safely store and share the data in encoded shape. Additionally we utilize the AES (Advance Standard Encryption) calculation for data encryption and decryption reason

    A framework for smart homes for elderly people using Labview

    Full text link
    This paper deals with home automation systems that are essential for safe and independent living of elderly people. These individuals must be able to perform their Activities of Daily Living (ADLs) without help from caretakers. They must be confident enough that help is just a few minutes with the systems in place. The focus will be on the medical and emergency systems, which are most essential for independent living. Zigbee based Wireless Sensor Networks (WSN) are used to collect the data throughout the home. Smart shirts and smart phones monitor different parameters of the individual and transmit the data to the home network. A PC running LabVIEW is used as the central control unit for the entire house. The house must have a fail proof communication framework for connecting with emergency services, doctors, helpers and relatives. The home network is connected to the Public Switched Telephone Network (PSTN) and internet. SMS, email, prerecorded voice-based telephone calls are appropriately used to report emergencies. A GUI (Graphical User Interface) was built in LabVIEW in order to control and simulate an entire home. Ambient Intelligence is built into the system to make it adaptive and dynamic as far as possible

    A User-Focused Reference Model for Wireless Systems Beyond 3G

    Get PDF
    This whitepaper describes a proposal from Working Group 1, the Human Perspective of the Wireless World, for a user-focused reference model for systems beyond 3G. The general structure of the proposed model involves two "planes": the Value Plane and the Capability Plane. The characteristics of these planes are discussed in detail and an example application of the model to a specific scenario for the wireless world is provided

    Flexible and Affordable Foreign Language Learning Environment based on Web 2.0 Technologies

    Get PDF
    Web technologies and educational platforms have greatly evolved over the past decade. One of the most significant factors contributing to education on the Internet has been the development of Web 2.0 technologies. These technologies, socially interactive in nature, have much to contribute to the area of Computer Assisted Language Leaning. Unfortunately, Web 2.0 technologies for the most part have been used in an ad hoc manner, permitting language learners acquire knowledge through interaction, but not through a more structured manner as these technologies were not developed to help lean languages as such. The goal of our work is to research and develop an environment, which employs Web 2.0 technology plus online language learning tools to provide a more integrated language learning environment. This paper will explore the technologies and provide information about how tools can be better integrated to provide a more productive working environment for language learners. A first working proof of concept based on our approach introduced is promising supporting modern language requirements and first findings and space for improvements are discussed

    IoT-Based Applications in Healthcare Devices

    Get PDF
    The last decade has witnessed extensive research in the field of healthcare services and their technological upgradation. To be more specific, the Internet of Things (IoT) has shown potential application in connecting various medical devices, sensors, and healthcare professionals to provide quality medical services in a remote location. This has improved patient safety, reduced healthcare costs, enhanced the accessibility of healthcare services, and increased operational efficiency in the healthcare industry. The current study gives an up-to-date summary of the potential healthcare applications of IoT- (HIoT-) based technologies. Herein, the advancement of the application of the HIoT has been reported from the perspective of enabling technologies, healthcare services, and applications in solving various healthcare issues. Moreover, potential challenges and issues in the HIoT system are also discussed. In sum, the current study provides a comprehensive source of information regarding the different fields of application of HIoT intending to help future researchers, who have the interest to work and make advancements in the field to gain insight into the topic
    • …
    corecore