scholarly journals Hybrid Reality in the Internet of Things as an Environment for Transferring Knowledge

Author(s):  
Tomasz Woźniakowski ◽  
Arkadiusz Orłowski

The paper presents features and applications of hybrid reality technology and the Internet of Things. The analysed thesis states that such a solution is a favourable environment for the dissemination of knowledge through the concept of interaction of objects of postulated environment with the theoretical model of knowledge objects. The article discusses an initial version of the potential information system method. The method, in the form of a mathematical formula, makes it possible to evaluate objects in the postulated space. The article presents the case study implementing a similar environment in the service of advanced industrial equipment. The results of the analysis indicate a high potential of the postulated solution, which requires further refinement and research. At the same time, the practice of the implementation case points to technological and organisational threats which should be neutralised to ensure a high probability of the project’s success.

Computer ◽  
2016 ◽  
Vol 49 (5) ◽  
pp. 87-90 ◽  
Author(s):  
Phillip A. Laplante ◽  
Jeffrey Voas ◽  
Nancy Laplante

2018 ◽  
Vol 5 (2) ◽  
pp. 1275-1284 ◽  
Author(s):  
Gopika Premsankar ◽  
Mario Di Francesco ◽  
Tarik Taleb

Sensors ◽  
2019 ◽  
Vol 19 (19) ◽  
pp. 4121 ◽  
Author(s):  
Alberto Giaretta ◽  
Nicola Dragoni ◽  
Fabio Massacci

Cybersecurity is one of the biggest challenges in the Internet of Things (IoT) domain, as well as one of its most embarrassing failures. As a matter of fact, nowadays IoT devices still exhibit various shortcomings. For example, they lack secure default configurations and sufficient security configurability. They also lack rich behavioural descriptions, failing to list provided and required services. To answer this problem, we envision a future where IoT devices carry behavioural contracts and Fog nodes store network policies. One requirement is that contract consistency must be easy to prove. Moreover, contracts must be easy to verify against network policies. In this paper, we propose to combine the security-by-contract (S × C) paradigm with Fog computing to secure IoT devices. Following our previous work, first we formally define the pillars of our proposal. Then, by means of a running case study, we show that we can model communication flows and prevent information leaks. Last, we show that our contribution enables a holistic approach to IoT security, and that it can also prevent unexpected chains of events.


Sensors ◽  
2015 ◽  
Vol 15 (1) ◽  
pp. 2137-2160 ◽  
Author(s):  
Minwoo Ryu ◽  
Jaeho Kim ◽  
Jaeseok Yun

Sign in / Sign up

Export Citation Format

Share Document