Governance and Accountability in Internet of Things (IoT) Networks

Author(s):  
Naomi Jacobs ◽  
Peter Edwards ◽  
Caitlin D. Cottrill ◽  
Karen Salt

Societies and their underlying infrastructure are in the process of being transformed by digital technology, a change that requires updated legislation and governance structures to respond to new information contexts. One particular area of rapid growth is that of connected devices that are increasingly being deployed in the physical environment as part of the so-called Internet of Things (IoT). There has been significant attention by policymakers at both national and international levels as to the economic and social benefits these technologies can bring and how they can be effectively implemented, leading to a range of different governance models. Many of these models relate to larger scale deployments as part of “smart city” urban infrastructure programs. Unlike private sector Internet of Things devices, which require buy-in from individuals who voluntarily purchase technology and choose to use it, public space deployments can affect entire communities. They must therefore particularly include mechanisms by which citizens can be empowered. We present a thematic review of literature and policy pertaining to IoT governance models, and construct a framework of principles for IoT governance, highlighting emerging and remaining questions. Four emergent themes (Levels of Governance, Legitimacy and Representation, Accountability, and Transparency) are illustrated using case studies at two levels; national and supranational top-down governance models, and city-based context-specific implementation models.

Author(s):  
Cameron Norman ◽  
Adrian Guta ◽  
Sarah Flicker

New information technologies are creating virtual spaces that allow youth to network and express themselves with unprecedented freedom and influence. However, these virtual spaces call into question traditional understandings of private and public space and open up new tensions for institutions (e.g. schools and law enforcement) trying to maintain safe spaces. For adolescent health researchers, these virtual spaces provide exciting opportunities to study youth culture, but also challenge the utility of ethical guidelines designed for a non-networked world. At issue are tensions between the realities of ‘natural’ interactions that occur online, often in full public view, and creating ethical research environments. These tensions and issues will be explored within this chapter, through an overview of the Teen- Net project, a discussion of anonymity and confidentiality within social networking technologies and software (including Friendster, Facebook, and Myspace), and a discussion of ethical considerations for researchers engaged in adolescent health research and promotion.


2019 ◽  
Vol 20 ◽  
pp. 316-325 ◽  
Author(s):  
Mohanasundar Radhakrishnan ◽  
Indira Kenzhegulova ◽  
M.G. Eloffy ◽  
W.A. Ibrahim ◽  
Chris Zevenbergen ◽  
...  

Symmetry ◽  
2019 ◽  
Vol 12 (1) ◽  
pp. 32 ◽  
Author(s):  
Ahmed Alamer ◽  
Ben Soh ◽  
David E. Brumbaugh

Lightweight stream ciphers have attracted significant attention in the last two decades due to their security implementations in small devices with limited hardware. With low-power computation abilities, these devices consume less power, thus reducing costs. New directions in ultra-lightweight cryptosystem design include optimizing lightweight cryptosystems to work with a low number of gate equivalents (GEs); without affecting security, these designs consume less power via scaled-down versions of the Mutual Irregular Clocking KEYstream generator—version 2-(MICKEY 2.0) cipher. This study aims to obtain a scaled-down version of the MICKEY 2.0 cipher by modifying its internal state design via reducing shift registers and modifying the controlling bit positions to assure the ciphers’ pseudo-randomness. We measured these changes using the National Institutes of Standards and Testing (NIST) test suites, investigating the speed and power consumption of the proposed scaled-down version named MICKEY 2.0.85. The (85) refers to the new modified bit-lengths of each MICKEY 2.0 register. The results show that it is faster, requires less power, and needs fewer GEs. The proposed variant will enhance the security of applications, such asRadio-frequency identification (RFID) technology, sensor networks, and in Internet of things (IoT) in general. It also will enhance research on the optimization of existing lightweight cryptosystems.


2016 ◽  
Vol 75 (1) ◽  
pp. 46-65 ◽  
Author(s):  
Andrada Tomoaia-Cotisel ◽  
Timothy W. Farrell ◽  
Leif I. Solberg ◽  
Carolyn A. Berry ◽  
Neil S. Calman ◽  
...  

Care management (CM) is a promising team-based, patient-centered approach “designed to assist patients and their support systems in managing medical conditions more effectively.” As little is known about its implementation, this article describes CM implementation and associated lessons from 12 Agency for Healthcare Research and Quality–sponsored projects. Two rounds of data collection resulted in project-specific narratives that were analyzed using an iterative approach analogous to framework analysis. Informants also participated as coauthors. Variation emerged across practices and over time regarding CM services provided, personnel delivering these services, target populations, and setting(s). Successful implementation was characterized by resource availability (both monetary and nonmonetary), identifying as well as training employees with the right technical expertise and interpersonal skills, and embedding CM within practices. Our findings facilitate future context-specific implementation of CM within medical homes. They also inform the development of medical home recognition programs that anticipate and allow for contextual variation.


Author(s):  
Viktor Aulin ◽  
◽  
Andrey Grinkiv ◽  
Artem Holovatyi ◽  
◽  
...  

The content of the cyberphysical approach to the creation, functioning and improvement of transport and production systems is analyzed. It was found out how, on the basis of the approach, cyberphysical transport and production systems are created as the integration of special technologies of the Internet of Things; embedded systems; ubiquitous and cloud computing. It was revealed that cyberphysical transport and production systems have a trinitarian concept and are defined by three entities: communication, computation and control, which unites information. It is determined that the main functions of cyberphysical transport and production systems are: information processing, intelligent communications, performance and process control. A component model of such a system has been built, which includes two groups of components - evolutionary and technological. The evolutionary group of components includes subsystems: digital; integrated; robotic, intelligent distributed. These components are a kind of basis for the presence of prerequisites for the creation of transport and production systems. It is noted that the technology group of components is the basis for concrete implementations of the Internet of Things, embedded systems and ubiquitous and cloud computing. A cyberphysical system of technical service is proposed as a specific implementation of cyberphysical transport and production systems. It was determined that the modes of the proposed functional cyber system are: high adaptability; an appropriate level of efficiency; intelligence of management; high level of reliability; the use of a new on-net online simulation type; using a new type of self-verifying models; internal online optimization, etc. It is shown that the presence of intelligent models in the cyberphysical model of technical service makes the system resistant to cyberattacks and increases the degree of safety when ensuring traffic in transport and the development of an occupational safety system during maintenance and repair operations.


Author(s):  
Meriem Aziez ◽  
Saber Benharzallah ◽  
Hammadi Bennoui

Abstract—The Internet of Things (IOT) has gained a significant attention in the last years. It covers multiple domains and applications such as smart home, smart healthcare, IT transportation...etc. the highly dynamic nature of the IOT environment brings to the service discovery new challenges and requirements. As a result, discovering the desirable services has become very challenging. In this paper, we aim to address the IoT service discovery problem and investigate the existing solutions to tackle this problem in many aspects, therefore we present a full comparative analysis of the most representative (or outstanding) service discovery approaches in the literature over four perspectives: (1) the IoT service description model, (2) the mechanism of IoT service discovery, (3) the adopted architecture and (4) the context awareness.


Data & Policy ◽  
2020 ◽  
Vol 2 ◽  
Author(s):  
Naomi Jacobs ◽  
Peter Edwards ◽  
Milan Markovic ◽  
Caitlin D Cottrill ◽  
Karen Salt

Abstract Internet of Things (IoT) devices such as connected sensors are increasingly being used in the public sector, often deployed and collecting data in public spaces. A theme commonly seen in the rhetoric surrounding public space IoT initiatives is empowerment, and these deployments are broadly perceived as beneficial by policy makers. However, such technology presents new governance challenges. It is important to ask who is empowered and who benefits, and we must ensure that such technological interventions follow democratic principles and are trusted by citizens. In this paper, we investigate how risk, transparency, and data governance require careful consideration in this domain, describing work which investigates how these combine to form components of trusted IoT ecosystems. This includes an overview of the landscape of public space IoT deployments, consideration of how they may often be subsumed in idealized smart city focused rhetoric, and discussion of how methodologies such as design fiction in community settings can uncover potential risks and concerns. Our findings suggest that agency, value and intent associated with IoT systems are key components that must be made transparent, particularly when multiple actors and stakeholders are involved. We suggest that good governance requires consideration of these systems in their entirety, throughout the full planning, implementation, and evaluation process, and in consultation with multiple stakeholders who are impacted, including the public. To achieve this effectively, we argue for transparency at the device and system level, which may require legislative change.


2013 ◽  
Vol 416-417 ◽  
pp. 2055-2058
Author(s):  
Yuan Chen

We discuss the application of internet of things (IOT) in the management of urban infrastructure and study critical technology in IOT. As an important component and critical technology in IOT, radio frequency identification (RFID) system provides an effective method to detect, monitor or control the object and is composed of tag, reader and antenna. At last we design a compact microstrip antenna with low cost and small weight for a RFID system in IOT which can also be used in narrow-band wireless communication.


Sign in / Sign up

Export Citation Format

Share Document