8,661 research outputs found
A BLE-based multi-gateway network infrastructure with handover support for mobile BLE peripherals
Bluetooth Low Energy (BLE) is a popular technology within the Internet of Things. It allows low-power, star networks to be set up between a BLE gateway and multiple, power-constrained BLE devices. However, these networks tend to be static, not supporting BLE devices that can freely move around in an environment of multiple interconnected BLE gateways and perform handovers whenever necessary. This work proposes two alternative network architectures for mobile BLE peripherals. One leverages on IPv6 over BLE, whereas the other combines default BLE mechanisms with an additional custom controller. On top, we study in detail the handover mechanism that must be present in both architectures and compare the performance of both a passive and active handover approach. The passive handover approach can be set up without any extra implementation, but an active handover approach offers more proactive handover decisions and can provide a much lower handover latency. All proposed solutions have been implemented and validated on real hardware, showing the feasibility of having future infrastructures with support for mobile BLE devices
Selective Jamming of LoRaWAN using Commodity Hardware
Long range, low power networks are rapidly gaining acceptance in the Internet
of Things (IoT) due to their ability to economically support long-range sensing
and control applications while providing multi-year battery life. LoRa is a key
example of this new class of network and is being deployed at large scale in
several countries worldwide. As these networks move out of the lab and into the
real world, they expose a large cyber-physical attack surface. Securing these
networks is therefore both critical and urgent. This paper highlights security
issues in LoRa and LoRaWAN that arise due to the choice of a robust but slow
modulation type in the protocol. We exploit these issues to develop a suite of
practical attacks based around selective jamming. These attacks are conducted
and evaluated using commodity hardware. The paper concludes by suggesting a
range of countermeasures that can be used to mitigate the attacks.Comment: Mobiquitous 2017, November 7-10, 2017, Melbourne, VIC, Australi
Alcuni abstract di articoli che trattano argomenti relativi all'eHealth
Non utile per esam
Distributed Hybrid Simulation of the Internet of Things and Smart Territories
This paper deals with the use of hybrid simulation to build and compose
heterogeneous simulation scenarios that can be proficiently exploited to model
and represent the Internet of Things (IoT). Hybrid simulation is a methodology
that combines multiple modalities of modeling/simulation. Complex scenarios are
decomposed into simpler ones, each one being simulated through a specific
simulation strategy. All these simulation building blocks are then synchronized
and coordinated. This simulation methodology is an ideal one to represent IoT
setups, which are usually very demanding, due to the heterogeneity of possible
scenarios arising from the massive deployment of an enormous amount of sensors
and devices. We present a use case concerned with the distributed simulation of
smart territories, a novel view of decentralized geographical spaces that,
thanks to the use of IoT, builds ICT services to manage resources in a way that
is sustainable and not harmful to the environment. Three different simulation
models are combined together, namely, an adaptive agent-based parallel and
distributed simulator, an OMNeT++ based discrete event simulator and a
script-language simulator based on MATLAB. Results from a performance analysis
confirm the viability of using hybrid simulation to model complex IoT
scenarios.Comment: arXiv admin note: substantial text overlap with arXiv:1605.0487
Occupational safety and health practice: a study at Infrastructure construction work
Safety is the state of being “safe”, the condition of being protected against physical, social, spiritual, financial, political, emotional, occupational, psychological, educational or other types of consequences of failure, damage, error, accidents, harm or any other event which could be considered non-desirable. Health is a state of complete physical, mental, and social well-being and not merely the absence of disease or infirmity. In that case, Occupational Safety and Health Act (OSHA) is an act that ensure the well-being of workers in a broad scope of many specialized fields. This study is focused on the construction of a police headquarters located in Seriab, Perlis. A big number of construction companies in Malaysia might not perform safety practice for their workers, lack of safety appliances, and did not perform a regular safety check-up on their workers as the reason was they want to earn more profits and they took the safety measures of their foreign workers for granted. Note that most of construction workers in Malaysia are immigrants. The data collection was carried out through site investigation using Preliminary Hazard analysis (PHA), HIRARC form and interview session with a worker in the construction site. The objective of this study is to spread the awareness of the importance of safety among workers in the construction site based on the existing potential hazards. This report was initially to identify the hazard on the construction site and to analyse the occupational safety and health factor in the workplace. The results are to analyse and suggest recommendations for improving occupational safety and health act in the construction site. Practicing a good safety measures in the workplace will ensure the well-being of workers
A Proposed Access Control-Based Privacy Preservation Model to Share Healthcare Data in Cloud
Healthcare data in cloud computing facilitates the treatment of patients
efficiently by sharing information about personal health data between the
healthcare providers for medical consultation. Furthermore, retaining the
confidentiality of data and patients' identity is a another challenging task.
This paper presents the concept of an access control-based (AC) privacy
preservation model for the mutual authentication of users and data owners in
the proposed digital system. The proposed model offers a high-security
guarantee and high efficiency. The proposed digital system consists of four
different entities, user, data owner, cloud server, and key generation center
(KGC). This approach makes the system more robust and highly secure, which has
been verified with multiple scenarios. Besides, the proposed model consisted of
the setup phase, key generation phase, encryption phase, validation phase,
access control phase, and data sharing phase. The setup phases are run by the
data owner, which takes input as a security parameter and generates the system
master key and security parameter. Then, in the key generation phase, the
private key is generated by KGC and is stored in the cloud server. After that,
the generated private key is encrypted. Then, the session key is generated by
KGC and granted to the user and cloud server for storing, and then, the results
are verified in the validation phase using validation messages. Finally, the
data is shared with the user and decrypted at the user-end. The proposed model
outperforms other methods with a maximal genuine data rate of 0.91
- …