scholarly journals WND-Identifier: Automated and Efficient Identification of Wireless Network Devices

2021 ◽  
Vol 2021 ◽  
pp. 1-16
Author(s):  
Fangzhou Zhu ◽  
Liang Liu ◽  
Simin Hu ◽  
Ting Lv ◽  
Renjun Ye

The widespread application of wireless communication technology brings great convenience to people, but security and privacy problems also arise. To assess and guarantee the security of wireless networks and user devices, discovering and identifying wireless devices become a foremost task. Currently, effective device identification is still a challenging issue, as device fingerprinting requires huge training datasets and is difficult to expand, and rule-based identification is not accurate and reliable enough. In this paper, we propose WND-Identifier, a universal and extensible framework for the identification of wireless devices, which can generate high-precision device labels (vendor, type, and product model) efficiently without user interaction. We first introduce the concept of device-info-related network protocols. WND-Identifier makes full use of the natural language features in such protocol messages and combines with the device description in the welcome page, thereby utilizing extraction rules to generate concrete device labels. Considering that the device information in the protocol messages may be incomplete or forged, we further take advantage of the application logic independence and stability of the device-info-related protocol, so as to build a multiprotocol text classification model, which maps the device to a known label. We conduct experiments in homes and public networks and present three application scenarios to verify the effectiveness of WND-Identifier.

Author(s):  
Muthu Ramachandran

Cyber-physical systems (CPS) have emerged to address the need for more efficient integration of modern advancement in cyber and wireless communications technologies such as 5G with physical objects. In addition, CPSs systems also needed to efficient control of security and privacy when we compare them with internet of things (IoT). In recent years, we experienced lack of security concerns with smart home IoT applications such as home security camera, etc. Therefore, this paper proposes a systematic software engineering framework for CPS and IoT systems. This paper also proposed a comprehensive requirements engineering framework for CPS-IoT applications which can also be specified using BPMN modelling and simulation to verify and validate CPS-IoT requirements with smart contracts. In this context, one of the key contribution of this paper is the innovative and generic requirements classification model for CPS-IoT application services, and this can also be applied to other emerging technologies such as fog, edge, cloud, and blockchain computing.


2017 ◽  
Author(s):  
Leming Zhou ◽  
Bambang Parmanto ◽  
James Joshi

BACKGROUND The widespread application of technologies such as electronic health record systems, mobile health apps, and telemedicine platforms, has made it easy for health care providers to collect relevant data and deliver health care regimens. While efficacious, these new technologies also pose serious security and privacy challenges. OBJECTIVE The training program described here aims at preparing well-informed health information security and privacy professionals with enhanced course materials and various approaches. METHODS A new educational track has been built within a health informatics graduate program. Several existing graduate courses have been enhanced with new security and privacy modules. New labs and seminars have been created, and students are being encouraged to participate in research projects and obtain real-world experience from industry partners. Students in this track receive both theoretical education and hands-on practice. Evaluations have been performed on this new track by conducting multiple surveys on a sample of students. RESULTS We have succeeded in creating a new security track and developing a pertinent curriculum. The newly created security materials have been implemented in multiple courses. Our evaluation indicated that students (N=72) believed that receiving security and privacy training was important for health professionals, the provided security contents were interesting, and having the enhanced security and privacy training in this program was beneficial for their future career. CONCLUSIONS The security and privacy education for health information professionals in this new security track has been significantly enhanced.


Author(s):  
Andreas Lorenz

The use of mobile and hand-held devices is a desirable option for implementation of user interaction with remote services from a distance, whereby the user should be able to select the input device depending on personal preferences, capabilities and availability of interaction devices. Because of the heterogeneity of available devices and interaction styles, the interoperability needs particular attention by the developer. This paper describes the design of a general solution to enable mobile devices to have control on services at remote hosts. The applied approach enhances the idea of separating the user interface from the application logic, leading to the definition of virtual or logical input devices physically separated from the controlled services.


Author(s):  
Mary R. Lind

In this article, wireless technology use is addressed with a focus on the factors that underlie wireless interaction. A de-construction of the information processing theories of user/technology interaction is presented. While commercial and useful applications of wireless devices are numerous, wireless interaction is emerging as a means of social interaction—an extension of the user’s personal image—and as an object of amusement and play. The technology/user interaction theories that have driven the discussions of computer assisted communication media are information richness, communicative action, and social influence modeling. This article will extend this theoretical view of wireless devices by using flow theory to address elements of fun, control, and focus. Then, these technology/user interaction theories are used with respect to wireless devices to propose areas for future research.


2019 ◽  
Author(s):  
Wei Dai ◽  
Zhiguo Zhang ◽  
Shimin Wang ◽  
Cui Liu ◽  
Rui Yao ◽  
...  

BACKGROUND In the last few decades, the literature related to Internet of Medical Things (IoMT) has grown rapidly. Obviously, widespread application of IoMT is helpful for considerably improving the efficiency of medical services. In addition, IoMT enables economies and societies to develop in a sustainable way to some extent. However, little is known about the panorama of IoMT-related research based on a visualization approach and bibliometrics. OBJECTIVE The purpose of this study was to deeply detect the knowledge structure, including literature distribution, clustering of keywords and topic evolution of IoMT-related research, by analyzing the current publication outputs related to IoMT. METHODS We conducted various bibliometric analyses on IoMT-related literature, including publication growth analysis, and the distribution of core countries and journals. Then, keyword co-occurrence analysis, as well as temporal visualization bar, was performed based on the bibliographic records during the period from 1997 to 2018. RESULTS A total of 6415 bibliographic records related to IoMT were identified. The United States and China take the lead in the publication output related to IoMT, followed by Korea, United Kingdom, and India. Furthermore, the collaboration between continents as well as countries is uneven; North America and Asia have the greatest frequent cooperation with other continents, mainly owing to the great contribution of the United States and China. There are 6 important research directions identified, with an imbalanced state. Moreover, these 6 topics can be further categorized into 3 areas: (1) Technologies and devices of IoMT, (2) Healthcare applications, and (3) Security and privacy. Finally, the evolution of topic were identified, namely from “basic research” through “hardware and software updates” to “application of new technologies”. CONCLUSIONS This study provides important insights into the knowledge structure of IoMT. Cooperation among countries is not balanced, and the main research content of IoMT is the application of new technologies in recent years. Moreover, user security and privacy issues are also hotspots in the future. All of these are helpful for scholars and institutions worldwide to obtain the basis for comprehensive understanding and potential guidance in future research in this field, which can further enhance the sustainable development of countries.


2021 ◽  
Vol 3 (1) ◽  
pp. 36-51
Author(s):  
Samuel Manoharan J

Cloud computing models have emerged to be a key player in the field of information processing in the recent decade. Almost all the services related to data processing and storage from firms work on a cloud platform providing the requested services to the consumers at any point of time and location. Security is an essential concern in cloud models as they primarily deal with data. Since multitude of user’s access cloud by way of storing confidential information in the virtual storage platform or accessing vital data from archives, security and privacy is of prime concern. This has been taken as the motivation of this research work. An effective Chaotic based Biometric authentication scheme for user interaction layer of cloud is proposed and implemented in this research paper. The proposed method uses fingerprint as the biometric trait and varies from conventional methods by utilizing a N-stage Arnold Transform to securely verify the claim of the so-called legitimate user. The experimentations have been compared with existing benchmark methods and superior performances observed in terms of detections, false detection accuracy etc.


2013 ◽  
Vol 321-324 ◽  
pp. 2960-2964
Author(s):  
Xi Hui Yang ◽  
Xiao Yuan Liu ◽  
Sheng Yu Gong

This paper studies the virtual product model and user interaction techniques for virtual scene of 3DSMAX, VRML and WEB technology to build a phone virtual display system, so that the user can navigate the phone structure from different perspectives, conduct phone local remote zoom, move and rotation and to learn more about the structure of their components, the various parts of the physical shape and assembly characteristics by assembling animation. The phone virtual display system treats VRML as the core, uses JavaScript largely and shows virtual product designing method.


Author(s):  
Teresa Guarda ◽  
Maria Fernanda Augusto ◽  
Oscar Barrionuevo ◽  
Filipe Mota Pinto

Throughout the stunning development of wireless communication technologies, sensors and wireless sensor networks (WSN) are being used in almost every area, such as in healthcare field. The ubiquitous sensing enabled by WSN technologies, in particularly the wireless medical sensor network (WMSN), might be one important key success factor in the modern medical system. The recent advances, and wireless devices proliferation, had proved the technical feasibility of the pervasive health care systems. The data collected by sensors are very sensitive and important, and the leakage of them could compromise security and privacy. This work presents the pervasive health care systems (PHCS) focusing on security and privacy of pervasive environments.


Author(s):  
Mary R. Lind

In this article, wireless technology use is addressed with a focus on the factors that underlie wireless interaction. A de-construction of the information processing theories of user/technol-ogy interaction is presented. While commercial and useful applications of wireless devices are numerous, wireless interaction is emerging as a means of social interaction—an extension of the user’s personal image—and as an object of amusement and play. The technology/user in-teraction theories that have driven the discussions of computer assisted communication media are information richness, communicative action, and social influence modeling. This article will extend this theoretical view of wireless devices by using flow theory to address elements of fun, control, and focus. Then, these technology/user interaction theories are used with respect to wireless devices to propose areas for future research.


Sign in / Sign up

Export Citation Format

Share Document