Tracking of Wearable IoT Devices Through WAP Using Intelligent Rule-Based Location Aware Approach

2021 ◽  
Vol 20 (Supp01) ◽  
pp. 2140005
Author(s):  
L. Sai Ramesh ◽  
S. Shyam Sundar ◽  
K. Selvakumar ◽  
S. Sabena

Usage of the internet is increasing in the daily life of humans due to the need for speedy task completion for their daily services. Most of the living time is spent in some indoor environment which provides WiFi which is the basic need of internet connectivity using Wireless Access Points (WAP). Nowadays, most of the devices are IoT-based ones, which connect with the outer world through the access points in the existing environment. The wearable IoT devices may be misplaced somewhere and we need a specific scenario which helps to identify the misplaced mobile devices based on access points where they are connected by their unique identity such as MAC address. Most of the time, unrestricted WiFi access provided in the public environment is used by the end-user. In that scenario, the tracking of misplaced mobile devices is creating an issue when the WiFi is in switch-off mode. This paper proposes a technique for tracking a mobile device by using a location-aware approach with KNN and intelligent rules by tracking the channel accessed by the user to find the misplaced path by examining the device connected WAP positions.

Author(s):  
Hugo Lopes ◽  
Valderi R. Q. Leithardt ◽  
Ivan Miguel Pires ◽  
Raúl García-Ovejero ◽  
María Navarro-Cáceres

The mobile devices caused a constant struggle for the pursuit of data privacy. Nowadays, it appears that the number of mobile devices in the world is increasing. With this increase and technological evolution, thousands of data associated with everyone are generated and stored remotely. Thus, the topic of data privacy is highlighted in several areas. There is a need for control and management of data in circulation inherent to this theme. This article presents an approach of the interaction between the individual and the public environment, where this interaction will determine the access to information. This analysis was based on a data privacy management model in public environments created after reading and analyzing the current technologies. A mobile application based on location via Global Positioning System (GPS) was created to substantiate this model, which it considers the General Data Protection Regulation (GDPR) to control and manage access to the data of each individual.


Sensors ◽  
2020 ◽  
Vol 20 (4) ◽  
pp. 1062
Author(s):  
Yongle Chen ◽  
Xiaojian Wang ◽  
Yuli Yang ◽  
Hong Li

Advanced wireless technology in Internet of Things (IoT) devices is increasing and facing various security threats. The authentication of IoT devices is the first line of defense for the wireless network. Especially in a Wi-Fi network, the existing authentication methods mainly use a password or digital certificate, these methods are inconvenient to manage due to certificate issuance or prone to be attacked because passwords are easily cracked. In this paper, we propose a location-aware authentication scheme using smart contracts to ensure that IoT devices can securely perform Wi-Fi network authentication. The scheme adopts the concept of secondary authentication and consists of two phases: the registration phase, which is mainly designed to complete the generation of the public and private keys, and to link the device information with its related device information; the authentication phase, which is mainly designed to determine whether the requesting device is within a legal location range. We use the smart contract to ensure the credibility and irreparability of the authentication process. Analysis of the attack model and the attacks at different stages proves that this certification scheme is assured, and the simulation results show that the overhead introduced by this scheme is acceptable, this scheme can provide greater security for the Wi-Fi authentication of IoT devices.


Computers ◽  
2020 ◽  
Vol 9 (4) ◽  
pp. 77
Author(s):  
Hugo Lopes ◽  
Ivan Miguel Pires ◽  
Hector Sánchez San Blas ◽  
Raúl García-Ovejero ◽  
Valderi Leithardt

The mobile devices cause a constant struggle for the pursuit of data privacy. Nowadays, it appears that the number of mobile devices in the world is increasing. With this increase and technological evolution, thousands of data associated with everyone are generated and stored remotely. Thus, the topic of data privacy is highlighted in several areas. There is a need for control and management of data in circulation inherent to this theme. This article presents an approach to the interaction between the individual and the public environment, where this interaction will determine the access to information. This analysis was based on a data privacy management model in open environments created after reading and analyzing the current technologies. A mobile application based on location by Global Positioning System (GPS) was developed to substantiate this model, which considers the General Data Protection Regulation (GDPR) to control and manage access to each individual’s data.


2020 ◽  
Vol 30 (Supplement_5) ◽  
Author(s):  
S Houwaart

Abstract End-user (e.g. patients or the public) testing of information material is becoming more common in the German public health care system. However, including the end-user (in this case patients) in an optimisation process and thus enabling a close collaboration while developing PIMs is still rare. This is surprising, given the fact that patients provide the exact perspective one is trying to address. Within the isPO project, a patient organization is included as a legal project partner to act as the patient representative and provide the patient's perspective. As such, the patient organization was included in the PHR approach as part of the PIM-optimisation team. During the optimisation process, the patients gave practical insights into the procedures of diagnosing and treating different types of cancer as well as into the patient's changing priorities and challenges at different time points. This was crucial information for the envisioned application of the individual PIMs and their hierarchical overview. Moreover, the developed PIM-checklist enabled the patients to give detailed feedback to the PIMs. With their experience of being in the exact situation in which the PIMs will be applied, their recommendations, especially on the wording and layout of the materials, have been a valuable contribution to the PIM optimisation process. In this part of the seminar, we will take a closer look at the following skill building aspects: What is gained from including patients as end-users in the development and optimization of PIM?How can we reach patients to contribute to a PIM optimization process? Which requirements and prerequisites do patients have to provide to successfully work on an optimisation team?How to compromise and weigh opinions when different ideas occur? Altogether, this part will construct a structured path of productive patient involvement and help to overcome uncertainties regarding a collaboration with patient organizations.


2013 ◽  
Vol 869-870 ◽  
pp. 791-795
Author(s):  
Zhi Yuan Hu ◽  
De Xiang Zhou

On the contemporary, human beings are facing serious environmental problems. The Environmental system in which human beings are living and the construction of peoples livelihood is not two mutually fragmented systems. The problems of ecological environment have many important implications on the contemporary peoples livelihood, affecting a country's social stability and public political participation. For this effect, our government should actively response to it. With the guidance of scientific development view, we should strengthen the treatment of ecological environment, coordinate the conflicts of environmental interest fairly, unimpeded channels to promote active participation in the public environment, strengthening international environmental cooperation and exchanges so as to make the treatment of ecological environment and the construction of peoples livelihood to achieve the progress and development.


Author(s):  
Jitendra Singh ◽  
Vikas Kumar

Regulatory compliance is equally binding on small and medium business groups. Owing to the small scale and limited budget, such SMBs are unable to seek expert advice. To adequately guard the SMBs in regulatory compliance, the present work proposed a third-party managed-end user-driven approach that renders the list of regulatory acts applicable in one's case according to the country of one's residence, services subscribed, and type of the operations to be carried out in subscribed cloud paradigm. The list of applicable regulatory acts are rendered at the subscriber's end only. In addition, the proposed method notifies the present state of compliance of under-considered cloud providers. Based on the recommendation received, the subscriber can proceed with his decision to subscribe or not to subscribe in the event if desired compliances do not exist. This technological assistance will eliminate the need to possess the required knowledge in regulatory acts or seeking advice from the regulatory expert.


2021 ◽  
Author(s):  
Annie Williams

Healthcare communications is a niche area of the professional communication field that has been studied from a social identity perspective by several researchers. In this qualitative study, interviews and documents were collected to evaluate the relationship between internal communications and social identity at St. Michael’s Hospital in Toronto, Ontario. Results showed a process of internal communications management that began with planning communications, moved through implementation and then involved measuring communications practices and planning for future changes. Throughout this process, the ‘unique identity’ of St. Michael’s Hospital was used as an inspiration for communications planning, messaging and measurement in order to reinforce a valid identity for employees. Moving forward, the public affairs and communications department could further expand their staff training and measurement tools in order to further solidify their status as an adaptive communications system.


Author(s):  
G.I. Ogle ◽  
A.L. Craigie ◽  
M.J. Baker

The AgLINK bulletin series dominated all agricultural and horticultural information publications from the late 1960s to the late 1980s, when it was discontinued. The collapse of such a high profile series raises questions about the viability of such a mechanism for linking farmers with facts. This failure highlights three key issues: the need to define and allocate the costs based on who benefits; the appropriate positioning of parties within the distribution chain; and a quality specification to which bulletins must adhere. We consider that AgFACT, the AgResearch pastoral agriculture information base which superseded AgLINK in 1997, should largely be cost neutral to science groups in AgResearch. However, the resources for providing information need to be met by science programmes, a cost which is outweighed by the opportunity to communicate with science stakeholders. The costs of distribution and retail need to fall with the other parties who benefit from the dissemination of this information - the retailer and the end user. We also consider that the role of AgResearch is in manufacture rather than sales to the public, which is best done by the agricultural service sector. AgFACT must maintain tight specifications, to ensure that it is relevant to farmers and other users, accurate and unbiased, and up to date. The penalty for not doing so is a loss of value and, moreover, a risk of it becoming a public liability. Keywords: AgFACT, AgLINK, agricultural information, information base, technology transfer


Sign in / Sign up

Export Citation Format

Share Document