15,321 research outputs found

    Spamming the Internet of Things: A Possibility and its probable Solution

    Get PDF
    AbstractThe Internet of Things (IoT) enabled users to bring physical objects into the sphere of cyber world. This was made possible by different tagging technologies like NFC, RFID and 2D barcode which allowed physical objects to be identified and referred over the Internet. Due to less complexity and low development and deployment cost of 2D barcodes, they have become modus operandi for building an IoT system. This paper explores the possibility of spamming the Internet of Things. It tries to establish that web spammers can use 2D barcodes to flood the physical side of the IoT, trick users to see or reach unsolicited and unrelated content over the Internet and possibly destroy the legitimacy of correct content. Preliminary results from an experiment establishing the possibility of the problem are outlined. This paper also proposes the use of digital signatures (ECDSA) to address the problem of spamming the IoT. A prototype implementation of the solution and its experimental results are given in this paper

    IoTSan: Fortifying the Safety of IoT Systems

    Full text link
    Today's IoT systems include event-driven smart applications (apps) that interact with sensors and actuators. A problem specific to IoT systems is that buggy apps, unforeseen bad app interactions, or device/communication failures, can cause unsafe and dangerous physical states. Detecting flaws that lead to such states, requires a holistic view of installed apps, component devices, their configurations, and more importantly, how they interact. In this paper, we design IoTSan, a novel practical system that uses model checking as a building block to reveal "interaction-level" flaws by identifying events that can lead the system to unsafe states. In building IoTSan, we design novel techniques tailored to IoT systems, to alleviate the state explosion associated with model checking. IoTSan also automatically translates IoT apps into a format amenable to model checking. Finally, to understand the root cause of a detected vulnerability, we design an attribution mechanism to identify problematic and potentially malicious apps. We evaluate IoTSan on the Samsung SmartThings platform. From 76 manually configured systems, IoTSan detects 147 vulnerabilities. We also evaluate IoTSan with malicious SmartThings apps from a previous effort. IoTSan detects the potential safety violations and also effectively attributes these apps as malicious.Comment: Proc. of the 14th ACM CoNEXT, 201

    Mapping Big Data into Knowledge Space with Cognitive Cyber-Infrastructure

    Full text link
    Big data research has attracted great attention in science, technology, industry and society. It is developing with the evolving scientific paradigm, the fourth industrial revolution, and the transformational innovation of technologies. However, its nature and fundamental challenge have not been recognized, and its own methodology has not been formed. This paper explores and answers the following questions: What is big data? What are the basic methods for representing, managing and analyzing big data? What is the relationship between big data and knowledge? Can we find a mapping from big data into knowledge space? What kind of infrastructure is required to support not only big data management and analysis but also knowledge discovery, sharing and management? What is the relationship between big data and science paradigm? What is the nature and fundamental challenge of big data computing? A multi-dimensional perspective is presented toward a methodology of big data computing.Comment: 59 page

    Code, space and everyday life

    Get PDF
    In this paper we examine the role of code (software) in the spatial formation of collective life. Taking the view that human life and coded technology are folded into one another, we theorise space as ontogenesis. Space, we posit, is constantly being bought into being through a process of transduction – the constant making anew of a domain in reiterative and transformative practices - as an incomplete solution to a relational problem. The relational problem we examine is the ongoing encounter between individuals and environment where the solution, to a greater or lesser extent, is code. Code, we posit, is diversely embedded in collectives as coded objects, coded infrastructure, coded processes and coded assemblages. These objects, infrastructure, processes and assemblages possess technicity, that is, unfolding or evolutive power to make things happen; the ability to mediate, supplement, augment, monitor, regulate, operate, facilitate, produce collective life. We contend that when the technicity of code is operationalised it transduces one of three forms of hybrid spatial formations: code/space, coded space and backgrounded coded space. These formations are contingent, relational, extensible and scaleless, often stretched out across networks of greater or shorter length. We demonstrate the coded transduction of space through three vignettes – each a day in the life of three people living in London, UK, tracing the technical mediation of their interactions, transactions and mobilities. We then discuss how code becomes the relational solution to five different classes of problems – domestic living, travelling, working, communicating, and consuming
    • …
    corecore