scholarly journals "Network Sentiment" Framework to Improve Security and Privacy for Smart Home

Author(s):  
Tommaso Pecorella ◽  
Laura Pierucci ◽  
Francesca Nizzi

A Smart Home is characterized by the presence of a huge number of small, low power devices, along with more classical devices. According to the Internet of Things (IoT) paradigm, all of them are expected to be always connected to the Internet in order to provide enhanced services. In this scenario, an attacker can undermine both the network security and the user’s security/privacy. Traditional security measures are not sufficient, because they are too difficult to setup and are either too weak to effectively protect the user or too limiting for the new services effectiveness. The paper suggests to dynamically adapt the security level of the smart home network according to the user perceived risk level what we have called network sentiment analysis. The security level is not fixed, established by a central system (usually by the Internet Service Provider) but can be changed with the users cooperation. The security of the smart home network is improved by a distributed firewalling and Intrusion Detection Systems both to the smart home side as to the Internet Service Provider side. These two parts must cooperate and integrate their actions for reacting dynamically to new and ongoing threats. Moreover, the level of network sentiment detected can be propagate to nearby home networks (e.g. the smart home networks of the apartments inside a building) to increase/decrease their level of security, thus creating a true in-line Intrusion Prevention System (IPS). The paper also presents a test bed for Smart Home to detect and counteract to different attacks against the IoT devices,,Wi-Fi and Ethernet connections .

2018 ◽  
Vol 10 (12) ◽  
pp. 125 ◽  
Author(s):  
Tommaso Pecorella ◽  
Laura Pierucci ◽  
Francesca Nizzi

A Smart Home is characterized by the presence of a huge number of small, low power devices, along with more classical devices. According to the Internet of Things (IoT) paradigm, all of them are expected to be always connected to the Internet in order to provide enhanced services. In this scenario, an attacker can undermine both the network security and the user’s security/privacy. Traditional security measures are not sufficient, because they are too difficult to setup and are either too weak to effectively protect the user or too limiting for the new services effectiveness. The paper suggests to dynamically adapt the security level of the smart home network according to the user perceived risk level what we have called network sentiment analysis. The security level is not fixed, established by a central system (usually by the Internet Service Provider) but can be changed with the users cooperation. The security of the smart home network is improved by a distributed firewalls and Intrusion Detection Systems both to the smart home side as to the Internet Service Provider side. These two parts must cooperate and integrate their actions for reacting dynamically to new and on going threats. Moreover, the level of network sentiment detected can be propagate to nearby home networks (e.g., the smart home networks of the apartments inside a building) to increase/decrease their level of security, thus creating a true in-line Intrusion Prevention System (IPS). The paper also presents a test bed for Smart Home to detect and counteract to different attacks against the IoT sensors, Wi-Fi and Ethernet connections.


2005 ◽  
Vol 01 (03) ◽  
pp. 359-369
Author(s):  
IAN FENTY ◽  
ERIC BONABEAU ◽  
JUERGEN BRANKE

In this paper, co-evolution is used to examine the long-term evolution of business models in an industry. Two types of co-evolution are used: synchronous, whereby the entire population of business models is replaced with a new population at each generation, and asynchronous, whereby only one individual is replaced.


Author(s):  
Thomas Hardjono ◽  
Alexander Lipton ◽  
Alex Pentland

With the recent rise in the cost of transactions on blockchain platforms, there is a need to explore other service models that may provide a more predictable cost to customers and end-users. We discuss the Contract Service Provider (CSP) model as a counterpart of the successful Internet Service Provider (ISP) model. Similar to the ISP business model based on peered routing-networks, the CSP business model is based on multiple CSP entities forming a CSP Community or group offering a contract service for specific types of virtual assets. We discuss the contract domain construct which encapsulates well-defined smart contract primitives, policies and contract-ledger. We offer a number of design principles borrowed from the design principles of the Internet architecture.


2011 ◽  
pp. 218-234
Author(s):  
George Yee

The growth of the Internet is increasing the deployment of e-commerce B2C services within such areas as e-retailing, e-learning, and e-health. However, a major impediment to the growth of e-commerce on the Internet is the lack of consumer trust in the provider of the e-service (Van Slyke, Belanger, Comunale, 2004). This chapter presents a literature survey of recent contributions to building trust in e-commerce, followed by a description of seven ways for the B2C Internet service provider to build trust in the use of its services among consumers.


Author(s):  
Salim M Zaki

<p>The number of devices connected to the Internet using mobile devices is increasing every day. Charge for mobile data over 3G and 4G networks is high in some countries which pushes users to browse the Internet through text-only service. Facebook proposed free basics service which allows users to browse Facebook for free but without showing images. This research formats the images on web pages in a method that makes images transferred over text-only networks. This allows users with low income or slow connections to surf text service over the internet with images supported. The main objective is to test the free basic service by Facebook and Internet Service Provider over 3G networks additionally proposing an image format for text-only networks. The proposed algorithm converts .png and .jpg images and post them on the Facebook page. The results from the Facebook page show images can be seen over 3G networks with free mode enabled.</p>


2021 ◽  
Vol 3 (3) ◽  
pp. 22-33
Author(s):  
Julian Richards

In this paper, I review some of the discussions about the politics of the internet and relate them to our most recent understanding of rapidly evolving Violent Transnational Social Movements (VTSMs). I frame the analysis in terms of the key actors involved in shaping and governing the internet, organised as a triumvirate of citizen, state and internet service provider (ISP). I conclude that the internet may not be as powerful a force in shaping democracy as we may think, although further research and experience of a rapidly evolving situation will be critical. I also suggest that the state has more power to shape the situation to its interests than we might suppose, and this has a major bearing on the formulation of counter-extremism policy and strategy.


2020 ◽  
Vol 13 (2) ◽  
pp. 167
Author(s):  
Indira Rachmawati

<p>The present study developed a conceptual research framework for potential predictors of loyalty to intention and loyalty to the action ofinternet service providers. This study examined whether customer loyalty of Indonesia service provider was related to service quality dimensions (namely network quality, customer service, information quality, security, and privacy) by providing empirical evidence of the relationship among there variables. Customer loyaltywas reflected by the indicators of loyalty to intention, loyalty to action, and willingness to recommend to others. This is to fill the research gap generated by the fact that many previous studies have only studied up to the intention phase and/or have jumped to the action phase without looking at the intention phase.  A quantitative approach through a questionnaire survey was conducted in primary data collection.Out of 400 internet service provider customers surveyed in this study that collected through internet online survey. The findings and results show: Firstly, network quality directly influences attitudinal loyalty. Secondly, customer service directly influences attitudinal loyalty. Thirdly, information quality directly influences attitudinal loyalty. Fourthly, securityand privacynot only directly influence attitudinal loyalty but also influence behavioral loyalty. Finally, attitudinal loyalty directly influences behavioral loyalty. The contribution to academicians interested in the same research topic was the conceptual model. It contributed to the understanding of the cognition-to action loyalty phase framework, also known as the four-stage loyalty phase framework.</p>


Author(s):  
George Yee

The growth of the Internet is increasing the deployment of e-commerce B2C services within such areas as e-retailing, e-learning, and e-health. However, a major impediment to the growth of e-commerce on the Internet is the lack of consumer trust in the provider of the e-service (Van Slyke, Belanger, Comunale, 2004). This chapter presents a literature survey of recent contributions to building trust in e-commerce, followed by a description of seven ways for the B2C Internet service provider to build trust in the use of its services among consumers.


Sign in / Sign up

Export Citation Format

Share Document