Results 1 - 10
of
10
Short Paper: Smartphones: Not Smart Enough?
"... Today’s mobile devices are packed with sensors that are capable of gathering rich contextual information, such as location, wireless device signatures, ambient noise, and photographs. This paper exhorts the security community to re-design authentication mechanisms for users on mobile devices. Instea ..."
Abstract
-
Cited by 3 (0 self)
- Add to MetaCart
(Show Context)
Today’s mobile devices are packed with sensors that are capable of gathering rich contextual information, such as location, wireless device signatures, ambient noise, and photographs. This paper exhorts the security community to re-design authentication mechanisms for users on mobile devices. Instead of relying on one simplistic, worst-case threat model, we should use contextual information to develop more nuanced models that assess the risk level of the user’s current environment. This would allow us to decrease or eliminate the level of user interaction required to authenticate in some situations, improving usability without any effective impact on security. Ideally, authentication mechanisms will scale up or down to match users ’ own mental threat models of their environments. We sketch out several scenarios demonstrating how contextual information can be used to assess risks and adapt authentication mechanisms. This is a research-rich area, and we outline future research directions for developing and evaluating dynamic security mechanisms using contextual information.
Toward Securing Sensor Clouds
"... We aim to secure smart sensor networks, where computationally powerful sensing devices such as smartphones or cognitive radios interact with the cloud. In previous work, we have proposed a large-scale brokering framework, and we are researching several facets of securing sensors in the context of th ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
(Show Context)
We aim to secure smart sensor networks, where computationally powerful sensing devices such as smartphones or cognitive radios interact with the cloud. In previous work, we have proposed a large-scale brokering framework, and we are researching several facets of securing sensors in the context of this framework. In this paper we discuss initial results for three portions of this effort, challenges that remain for secure sensor networks, and specific directions we are currently pursuing. In particular, we discuss our work on (i) Sensor risk assessment, relating to the possession and environment of the smartphone sensors, (ii) New malware threats and defenses installed on the sensor network proper, and (iii) Defense against the side-channel analysis on the Software-as-a-Service infrastructure.
User-Centric Social Interaction for Digital Cities
- SUBMITTED TO IGI GLOBAL AS A BOOK CHAPTER ON CREATING PERSONAL, SOCIAL, AND URBAN AWARENESS THROUGH PERVASIVE COMPUTING
, 2013
"... Pervasive Computing was envisioned by pioneers like Marc Weiser, but has yet to become an everyday technology in our society. The recent advances regarding Internet of Things, social computing and mobile access technologies however converge to make pervasive computing truly ubiquitous. The key chall ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
Pervasive Computing was envisioned by pioneers like Marc Weiser, but has yet to become an everyday technology in our society. The recent advances regarding Internet of Things, social computing and mobile access technologies however converge to make pervasive computing truly ubiquitous. The key challenge is however to make simple and robust solutions for normal users, which shifts the focus from complex platforms involving machine learning and artificial intelligence to more hands on construction of services that are tailored or personalized for individual users. This chapter therefore discusses Internet of Things together with Social Computing as a basis for components that users in a ’digital city ’ could utilize to make their daily life better, safer, etc. A novel environment for user-created services, such as social apps, is presented as a possible solution for this. The vision is that anyone could make simple service based on Internet-enabled devices (Internet of Things) and encapsulated digital resources such as Open Data, which also can have social aspects embedded. This chapter also aims to identify trends, challenges and recommendations in regard of Social Interaction for Digital Cities. This work will help expose future themes with high innovation and business potential based on a timeframe roughly 15 years ahead of now. The purpose is to create a common outlook on the future of information and communication technologies (ICT) based on the extrapolation of current trends and ongoing research efforts.
Trust in Cloud Infrastructure and Security in Sensor Cloud Computing (Invited Vision Paper)
"... Abstract- In this paper, we outline research issues in cloud computing with respect to trustworthiness of the cloud infrastructure, as well as security measures needed in sensor cloud paradigm. The objective is to develop the mission-oriented security risk management framework to evaluate the cloud ..."
Abstract
- Add to MetaCart
(Show Context)
Abstract- In this paper, we outline research issues in cloud computing with respect to trustworthiness of the cloud infrastructure, as well as security measures needed in sensor cloud paradigm. The objective is to develop the mission-oriented security risk management framework to evaluate the cloud infrastructure for any given application as well as design security approaches which can be used for securing the sensor cloud infrastructure. 1. Risk Evaluation in Cloud Computing Security concerns are the most prominent reasons that discourage organizations to adopt to cloud services [1]. Therefore, while considering the cloud adoption, cloud consumers need a way to measure the security capability of the cloud-based resources. Unfortunately, cloud environment is not homogeneous as each cloud
Study of Security Issues in Pervasive Environment of Next Generation Internet of Things
"... Abstract. Internet of Things is a novel concept that semantically implies a world-wide network of uniquely addressable interconnected smart objects. It is aimed at establishing any paradigm in computing. This environment is one where the boundary between virtual and physical world is eliminated. As ..."
Abstract
- Add to MetaCart
(Show Context)
Abstract. Internet of Things is a novel concept that semantically implies a world-wide network of uniquely addressable interconnected smart objects. It is aimed at establishing any paradigm in computing. This environment is one where the boundary between virtual and physical world is eliminated. As the network gets loaded with hitherto unknown applications, security threats also become rampant. Current security solutions fail as new threats appear to de-struct the reliability of information. The network has to be transformed to IPv6 enabled network to address huge number of smart objects. Thus new addressing schemes come up with new attacks. Real time analysis of information from the heterogeneous smart objects needs use of cloud services. This can fall prey to cloud specific security threats. Therefore need arises for a review of security threats for a new area having huge demand. Here a study of security issues in this domain is briefly presented.
Information Technologies
"... Abstract — The deployment and provisioning of intelligent systems and utility-based services will greatly benefit from a cloud-based intelligent middleware framework, which could be deployed over multiple infrastructure providers (such as smart cities, hospitals, campus and private enterprises, offi ..."
Abstract
- Add to MetaCart
(Show Context)
Abstract — The deployment and provisioning of intelligent systems and utility-based services will greatly benefit from a cloud-based intelligent middleware framework, which could be deployed over multiple infrastructure providers (such as smart cities, hospitals, campus and private enterprises, offices, etc.) in order to deliver on-demand access to smart services. This paper introduces the formulation of an open source integrated intelligent platform as solution for integrating global sensor networks, providing design principles for cloud-based intelligent environments and discuss infrastructure functional modules and their implementation. This paper review briefly technologies enabling the framework, towards emphasizes ondemand establishment of smart cities services based on the automated formulation of ubiquitous intelligence of Internet connected objects. The framework introduced founds on the GSN infrastructure. The framework leverages W3C SSN-XG formal language and the IETF COAP protocol, providing support for enabling intelligent (sensors-objects) services. The service requirements for particular smart city scenario are introduced and initial implementations and results from performed simulations studied and discussed.
Technical Foresight Report on Social Interaction for Digital Cities
, 2012
"... This report aims to identify trends, challenges and recommendations in regard of Social Interaction for Digital Cities. This foresight will help expose future themes with high innovation and business potential based on a timeframe roughly 15 years ahead. The purpose is to create a common outlook on ..."
Abstract
- Add to MetaCart
(Show Context)
This report aims to identify trends, challenges and recommendations in regard of Social Interaction for Digital Cities. This foresight will help expose future themes with high innovation and business potential based on a timeframe roughly 15 years ahead. The purpose is to create a common outlook on the future of ICT and to establish a strong community across EIT ICT Labs nodes and partner organizations.
Goal-Oriented Opportunistic Sensor Clouds
- OTM 2012
, 2012
"... Activity- and context-aware systems, as they are known, established, and well evaluated in small-scale laboratory settings for years and decades, suffer from the fact, that they are limited concerning the underlying data delivering entities. The sensor systems are usually attached on the body, on ..."
Abstract
- Add to MetaCart
(Show Context)
Activity- and context-aware systems, as they are known, established, and well evaluated in small-scale laboratory settings for years and decades, suffer from the fact, that they are limited concerning the underlying data delivering entities. The sensor systems are usually attached on the body, on objects, or in the environment, directly surrounding persons or groups whose activities or contextual information has to be detected. For sensors that are exploited in this kind of systems, it is essential that their modalities, positions and technical details are initially defined to ensure a stable and accurate system execution. In contrast to that, opportunistic sensing allows for selecting and utilizing sensors, as they happen to be accessible according to their spontaneous availability, without presumably defining the input modalities, on a goal-oriented principle. One major benefit thereby is the capability of utilizing sensors of different kinds and modalities, even immaterial sources of information like webservices, by abstracting low-level access details. This emerges the need to roll out the data federating entity as decentralized collecting point. Cloud-based technologies enable space- and time-free utilization of a vast amount of heterogeneous sensor devices reaching from simple physical devices (e.g., GPS, accelerometers, as they are conventionally included on today’s smart phones) to social media sensors, like Facebook, Twitter, or LinkedIn. This paper presents an opportunistic, cloud-based approach for large-scale activity- and context-recognition.
Enterprise Mobile Security using Wireless Sensor Network: Extending a Secure Wireless Sensor Network to the
"... Abstract—Use of wireless sensor technology has increased rapidly in recent years, with many varied applications. In the same timeframe the ubiquitous cell phone has evolved from a simple voice communication device; smart phone technology has enabled consumers to have mobile computing power that riva ..."
Abstract
- Add to MetaCart
(Show Context)
Abstract—Use of wireless sensor technology has increased rapidly in recent years, with many varied applications. In the same timeframe the ubiquitous cell phone has evolved from a simple voice communication device; smart phone technology has enabled consumers to have mobile computing power that rivals the capabilities of desktop computers in the not too distant past. When one takes into consideration the widespread availability of internet connectivity that cell phone networks provide, juxtaposition of wireless sensor technology and cell phone technology is a natural progression. This paper consists of designing and implementing a novel Android application (NodeDroid) that integrates with our existing secure wireless sensor network and addresses the issues encountered in joining two disparate software systems.
Social Interaction for Digital Cities
, 2012
"... This report aims to identify trends, challenges and recommendations in regard of Social Interaction for Digital Cities. This foresight will help expose future themes with high innovation and business potential based on a timeframe roughly 15 years ahead. The purpose is to create a common outlook on ..."
Abstract
- Add to MetaCart
(Show Context)
This report aims to identify trends, challenges and recommendations in regard of Social Interaction for Digital Cities. This foresight will help expose future themes with high innovation and business potential based on a timeframe roughly 15 years ahead. The purpose is to create a common outlook on the future of ICT and to establish a strong community across EIT ICT Labs nodes and partner organizations.