7,753 research outputs found

    An Android Generic Geo-Fencing Application: Proximity Triggered Notification Service Delivery

    Get PDF
    The widespread availability of smartphones, presents unprecedented opportunity to devise creative software solutions that leverage on the powerful hardware embedded in this devices to aid and improve interactions between the user and the environmen

    ACUTA Journal of Telecommunications in Higher Education

    Get PDF
    In This Issue President\u27s Message From the ACUTA CEO Leg/Reg lssues Facing Higher Education Future Proof? The Coming lP Transition Growing Gigs Air U: Transforming TV White Spaces into lnternet Connectivity Taming the Social Media Beast Technology to Comply with Clery Act Emerging Trends on Campus 0ARnet and Ohio\u27s 100 Gbps Broadband Pipeline Iowa State Moves Voice Communications to the Cloud lnstitutional Excellence Awar

    Vulnerability Analysis of the MAVLink Protocol for Command and Control of Unmanned Aircraft

    Get PDF
    The MAVLink protocol is an open source, point-to-point networking protocol used to carry telemetry and to command and control many small unmanned aircraft. This research presents three exploits that compromise confidentiality, integrity, and availability vulnerabilities in the communication between an unmanned aerial vehicle and a ground control station using the MAVLink protocol. The attacks assume the configuration settings for the data-link hardware have been obtained. Field experiments using MAVProxy to compromise communication between an ArduPilot Mega 2.5 autopilot and the Mission Planner application demonstrate that all three exploits are successful when MAVLink messages are unprotected. A methodology is proposed to quantify the cost of securing the MAVLink protocol through the measurement of network latency, power consumption, and exploit success. Experimental measurements indicate that the ArduPilot Mega 2.5 autopilot running the ATmega2560 processor at 16 MHz with the standard, unsecured MAVLink protocol consumes on average 0.0105 additional watts of power per second and operates with an average additional latency of 0.11 seconds while under the most resource-intensive attack than when not under attack

    Residential access control system using QR code and the IoT

    Get PDF
    This paper presents a residential access control system (RACs) using QR codes and the internet of things (IoT) to improve security and help house owners. The contribution of this paper is that it proposes two mechanisms in the authentication phase and the verification phase, respectively, to enhance residential access control. The main idea is using cryptography between smartphones and access control devices. The cryptography compares secret codes on the key server via the internet. The RACs can notify a user of the residential access status through the LINE application and show the statuses of devices through the network platform for the internet of everything (NETPIE) in real-time. We compare this system’s performance with that of the current access control methods in terms of security and access speed. The results show that this system has more security and has an access speed of 5.63 seconds. Moreover, this system is safer and more flexible than the comparative methods and suitable for contactless authentication

    I Know What You Did Last Summer: Your Smart Home Internet of Things and Your iPhone Forensically Ratting You Out

    Get PDF
    The adoption of smart home Internet of Things (IoT) devices continues to grow. What if your devices can snitch on you and let us know where you are at any given point in time? In this work we examined the forensic artifacts produced by Nest devices, and in specific, we examined the logical backup structure of an iPhone used to control a Nest thermostat, Nest Indoor Camera and a Nest Outdoor Camera. We also integrated the Google Home Mini as another method of controlling the studied Smart Home devices. Our work is the primary account for the examination of Nest artifacts produced by an iPhone, and is also the first open source research to produce a usable forensics tool we name the Forensic Evidence Acquisition and Analysis System (FEAAS). FEAAS consolidates evidentiary data into a readable report that can infer user events (like entering or leaving a home) and what triggered an event (whether it was the Google Assistant through a voice command, or the use of an iPhone application). Our results are important for the advancement of digital forensics, as there are cases starting to emerge in which smart home IoT devices have already been used as culpatory evidence

    Cost-Effective Platforms for Near-Space Research and Experiments

    Get PDF
    High-altitude balloons (HABs) are commonly used for atmospheric research. In recent years, newly developed platforms and instruments allow to measure position, temperature, radiation, humidity and gas profile in the troposphere and stratosphere. However, current platforms, such as radiosonde, have limited bandwidth and relatively small number of possible sensors on board. Furthermore, all the measuring instruments carried on board the balloon cannot be reused since most of the times the radiosonde cannot be retrieved. In this chapter, we present a generic near-space research platform based on an improved radio frequency (RF) communication, an advanced set of sensors that might also include a return-to-home (RTH) micro-UAV. We present the overall structure of an advanced HAB payload, which is equipped with a low-cost sophisticated set of sensors along with HD camera system, which weight less than 300 g. The payload is tied to a weather balloon with a smart autonomous release mechanism and two-way RF telemetry channel (LoRa or Iridium communication). The payload can be released from the balloon at any given time or position, allowing it to fall at a predicted area. In case the payload is attached to a micro UAV, it can return autonomously by multioptional smart decline to a pre-defined location using a built-in autopilot. The suggested new strategy is presented using several case studies and field experiments
    • …
    corecore