6 research outputs found

    Innovation Labs: Leveraging Openness for Radical Innovation?

    Get PDF
    A growing range of public, private and civic organisations, from Unicef through Nesta to NHS, now run units known as “innovation labs”. The hopeful assumption they share is that labs, by building on openness among other features, can generate promising solutions to grand challenges of systemic nature. Despite their seeming proliferation and popularisation, the underlying innovation principles embodied by labs have, however, received scant academic attention. This is a missed opportunity, because innovation labs appear to leverage openness for radical innovation in an unusual fashion. Indeed, in this exploratory paper we draw on original interview data and online self-descriptions to illustrate that, beyond convening “uncommon partners” across organisational boundaries, labs apply the principle of openness throughout the innovation process, including the experimentation and development phases. While the emergence of labs clearly forms part of a broader trend towards openness, we show how it transcends established conceptualisations of open innovation (Chesbrough et al., 2006), open science (David, 1998) or open government (Janssen et al., 2012)

    DoubleEcho: Mitigating Context-Manipulation Attacks in Copresence Verification

    Full text link
    Copresence verification based on context can improve usability and strengthen security of many authentication and access control systems. By sensing and comparing their surroundings, two or more devices can tell whether they are copresent and use this information to make access control decisions. To the best of our knowledge, all context-based copresence verification mechanisms to date are susceptible to context-manipulation attacks. In such attacks, a distributed adversary replicates the same context at the (different) locations of the victim devices, and induces them to believe that they are copresent. In this paper we propose DoubleEcho, a context-based copresence verification technique that leverages acoustic Room Impulse Response (RIR) to mitigate context-manipulation attacks. In DoubleEcho, one device emits a wide-band audible chirp and all participating devices record reflections of the chirp from the surrounding environment. Since RIR is, by its very nature, dependent on the physical surroundings, it constitutes a unique location signature that is hard for an adversary to replicate. We evaluate DoubleEcho by collecting RIR data with various mobile devices and in a range of different locations. We show that DoubleEcho mitigates context-manipulation attacks whereas all other approaches to date are entirely vulnerable to such attacks. DoubleEcho detects copresence (or lack thereof) in roughly 2 seconds and works on commodity devices

    DoubleEcho: Mitigating Context-Manipulation Attacks in Copresence Verification

    No full text
    Copresence verification based on context can improve usability and strengthen security of many authentication and access control systems. By sensing and comparing their surroundings, two or more devices can tell whether they are copresent and use such information to make access control decisions. To the best of our knowledge, all context-based copresence verification mechanisms to date are susceptible to context-manipulation attacks. In such attacks, a distributed adversary replicates the same context at the (different) locations of the victim devices, and induces them to conclude that they are copresent. In this paper we propose DoubleEcho, a copresence verification scheme based on acoustic Room Impulse Response (RIR) that mitigates context-manipulation attacks. In DoubleEcho, one device emits a short, wide-band audible chirp and all participating devices record reflections of the chirp from the surrounding environment. Since RIR is, by its very nature, dependent on the physical surroundings, it constitutes a unique location signature that is hard for an adversary to replicate. We evaluate DoubleEcho by collecting RIR data with various mobile devices and in different locations. DoubleEcho exhibits robustness to context-manipulation attacks with a false positive rate can be as low as 0.089, whereas all other approaches to date are entirely vulnerable to such attacks. The false negative rate can be as low as 0.021. DoubleEcho detects copresence (or lack thereof) in roughly 2 seconds and works on commodity devices

    DoubleEcho: Mitigating Context-Manipulation Attacks in Copresence Verification

    No full text
    Copresence verification based on context can improve usability and strengthen security of many authentication and access control systems. By sensing and comparing their surroundings, two or more devices can tell whether they are copresent and use such information to make access control decisions. To the best of our knowledge, all context-based copresence verification mechanisms to date are susceptible to context-manipulation attacks. In such attacks, a distributed adversary replicates the same context at the (different) locations of the victim devices, and induces them to conclude that they are copresent. In this paper we propose DoubleEcho, a copresence verification scheme based on acoustic Room Impulse Response (RIR) that mitigates context-manipulation attacks. In DoubleEcho, one device emits a short, wide-band audible chirp and all participating devices record reflections of the chirp from the surrounding environment. Since RIR is, by its very nature, dependent on the physical surroundings, it constitutes a unique location signature that is hard for an adversary to replicate. We evaluate DoubleEcho by collecting RIR data with various mobile devices and in different locations. DoubleEcho exhibits robustness to context-manipulation attacks with a false positive rate can be as low as 0.089, whereas all other approaches to date are entirely vulnerable to such attacks. The false negative rate can be as low as 0.021. DoubleEcho detects copresence (or lack thereof) in roughly 2 seconds and works on commodity devices

    DoubleEcho

    No full text
    | openaire: EC/H2020/779852/EU//IoTCrawlerCopresence verification based on context can improve usability and strengthen security of many authentication and access control systems. By sensing and comparing their surroundings, two or more devices can tell whether they are copresent and use this information to make access control decisions. To the best of our knowledge, all context-based copresence verification mechanisms to date are susceptible to context-manipulation attacks. In such attacks, a distributed adversary replicates the same context at the (different) locations of the victim devices, and induces them to believe that they are copresent. In this paper we propose DoubleEcho, a context-based copresence verification technique that leverages acoustic Room Impulse Response (RIR) to mitigate context-manipulation attacks. In DoubleEcho, one device emits a wide-band audible chirp and all participating devices record reflections of the chirp from the surrounding environment. Since RIR is, by its very nature, dependent on the physical surroundings, it constitutes a unique location signature that is hard for an adversary to replicate. We evaluate DoubleEcho by collecting RIR data with various mobile devices and in a range of different locations. We show that DoubleEcho mitigates context-manipulation attacks whereas all other approaches to date are entirely vulnerable to such attacks. DoubleEcho detects copresence (or lack thereof) in roughly 2 seconds and works on commodity devices.Peer reviewe
    corecore