Wireless Electrocardiography and Impedance Cardiography Devices Using a Network Time Protocol for Synchronized Data

Author(s):  
Stefano Orsolini ◽  
Enrico Pannicke ◽  
Ivan Fomin ◽  
Oliver Thieme ◽  
Georg Rose
Proceedings ◽  
2021 ◽  
Vol 74 (1) ◽  
pp. 1
Author(s):  
Hilal Çepik ◽  
Ömer Aydın ◽  
Gökhan Dalkılıç

With virtual assistants, both changes and serious conveniences are provided in human life. For this reason, the use of virtual assistants is increasing. The virtual assistant software has started to be produced as separate devices as well as working on phones, tablets, and computer systems. Google Home is one of these devices. Google Home can work integrated with smart home systems and various Internet of Things devices. The security of these systems is an important issue. As a result of attackers taking over these systems, very serious problems may occur. It is very important to take the necessary actions to detect these problems and to take the necessary measures to prevent possible attacks. The purpose of this study is to test whether an attack that attackers can make to these systems via network time protocol will be successful or not. Accordingly, it has been tried to attack the wireless connection established between Google Home and an Internet of Things device over the network time protocol. Attack results have been shared.


2014 ◽  
Vol 644-650 ◽  
pp. 2875-2880
Author(s):  
A. Alfraih Abdulaziz Nasser ◽  
Wen Bo Chen

The Network Time Protocol (NTP) is used to synchronize clocks of various computer devices such as personal computers, tablets, and phones based their set time zones. The network of devices that use these NTP servers form a huge distributed network that attracted a number of attacks from late 2013 towards early 2014. This paper presents a hands-on test of the Distributed Reflection Denial of Service (DRDoS) attack by the monlist command, provides more vulnerability in the protocol, and offers mitigation to these vulnerabilities. A Kali Linux server was used to test the monlist command on its localhost. The results showed that a request with a size of 234 bytes got a response of 4,680 bytes. A busy NTP server can return up to 600 addresses which were theoretically calculated to return approximately 48 kilobytes in 100 packets. Consequently, this results in an amplification factor of 206×. The knowledge of the way the attack can be propagated was an important step in thwarting the attack and mitigating more such threats in the same protocol.


2021 ◽  
Author(s):  
Claudia Fernanda Rodriguez ◽  

Diffusing the legal time in Colombia is one missional assessment of INM (National Metrology Institute of Colombia). This is done via a public IP through an NTP server (Network Time Protocol Server) disciplined to the National Standard of Time and Frequency. So, the companies can synchronize their servers, but they do not have certainty about the difference that exists between the time of the client-server and the legal time of the INM server because there is not a constant verification implemented by themselves. In Colombia, the demand for the legal time service has increased because it is used by many companies due to the rise of innovative applications such as time-stamp, digital signature, electronic invoice, and economic transactions. This has an impact on the economic environment of a country for world trade. For this reason, the INM of Colombia implemented a new service to measure the synchronization offset with the legal time, which allows the companies to have a new service that generates reliability respecting the time they use to provide their services. Inspired by the INM contribution to the international comparison Universal Time Coordinated (UTC) and the intercomparison of the National Standards of Time and Frequency implemented through the SIM time scale (SIMT) using GPS (Global Positioning System), the INM developed a customized application for national comparison using NTP. As a result, this is the first remote measurement service as evidence of metrology for digital transformation in Colombia in the field of time and frequency.


Author(s):  
Richard Garling

Open source software (OSS) is very well known for allowing free access to the source code of the application. The idea is to allow for the creation of a better product. The more people working to make each aspect of an application better, more minds create more ideas, create a better project. OSS runs the internet since all of the protocols—network time protocol (NTP), HTTP, amongst many others—are OSS projects with many years of use. These projects are run by volunteers worldwide. But, none of these projects are run using the traditional methodologies of project management: Waterfall and Agile. This chapter asks: How does an open source development environment facilitate conventional Waterfall project management approaches? and How does an open source development environment facilitate Agile project collaborative work? The method used to determine the answers used surveys and questionnaires involving actual participants in a variety of OSS projects from across the United States (US). The questions asked concerned the organization OSS projects, did they use a particular traditional methodology or some other non-defined method of organization? The answers received by this study centered on non-defined methods of organization; traditional methodologies were considered too restrictive and not agile enough to allow for the freedom cherished by their volunteers.


Sensors ◽  
2020 ◽  
Vol 20 (20) ◽  
pp. 5928
Author(s):  
Hüseyin Yiğitler ◽  
Behnam Badihi ◽  
Riku Jäntti

Internet of Things (IoT) is expected to change the everyday life of its users by enabling data exchanges among pervasive things through the Internet. Such a broad aim, however, puts prohibitive constraints on applications demanding time-synchronized operation for the chronological ordering of information or synchronous execution of some tasks, since in general the networks are formed by entities of widely varying resources. On one hand, the existing contemporary solutions for time synchronization, such as Network Time Protocol, do not easily tailor to resource-constrained devices, and on the other, the available solutions for constrained systems do not extend well to heterogeneous deployments. In this article, the time synchronization problems for IoT deployments for applications requiring a coherent notion of time are studied. Detailed derivations of the clock model and various clock relation models are provided. The clock synchronization methods are also presented for different models, and their expected performance are derived and illustrated. A survey of time synchronization protocols is provided to aid the IoT practitioners to select appropriate components for a deployment. The clock discipline algorithms are presented in a tutorial format, while the time synchronization methods are summarized as a survey. Therefore, this paper is a holistic overview of the available time synchronization methods for IoT deployments.


Sign in / Sign up

Export Citation Format

Share Document