scholarly journals Testbed for LoRaWAN Security: Design and Validation through Man-in-the-Middle Attacks Study

2021 ◽  
Vol 11 (16) ◽  
pp. 7642
Author(s):  
Ondrej Pospisil ◽  
Radek Fujdiak ◽  
Konstantin Mikhaylov ◽  
Henri Ruotsalainen ◽  
Jiri Misurec

The low-power wide-area (LPWA) technologies, which enable cost and energy-efficient wireless connectivity for massive deployments of autonomous machines, have enabled and boosted the development of many new Internet of things (IoT) applications; however, the security of LPWA technologies in general, and specifically those operating in the license-free frequency bands, have received somewhat limited attention so far. This paper focuses specifically on the security and privacy aspects of one of the most popular license-free-band LPWA technologies, which is named LoRaWAN. The paper’s key contributions are the details of the design and experimental validation of a security-focused testbed, based on the combination of software-defined radio (SDR) and GNU Radio software with a standalone LoRaWAN transceiver. By implementing the two practical man-in-the-middle attacks (i.e., the replay and bit-flipping attacks through intercepting the over-the-air activation procedure by an external to the network attacker device), we demonstrate that the developed testbed enables practical experiments for on-air security in real-life conditions. This makes the designed testbed perspective for validating the novel security solutions and approaches and draws attention to some of the relevant security challenges extant in LoRaWAN.

2021 ◽  
Vol 20 (2) ◽  
pp. 1-24
Author(s):  
Stef Verreydt ◽  
Koen Yskout ◽  
Wouter Joosen

Electronic consent (e-consent) has the potential to solve many paper-based consent approaches. Existing approaches, however, face challenges regarding privacy and security. This literature review aims to provide an overview of privacy and security challenges and requirements proposed by papers discussing e-consent implementations, as well as the manner in which state-of-the-art solutions address them. We conducted a systematic literature search using ACM Digital Library, IEEE Xplore, and PubMed Central. We included papers providing comprehensive discussions of one or more technical aspects of e-consent systems. Thirty-one papers met our inclusion criteria. Two distinct topics were identified, the first being discussions of e-consent representations and the second being implementations of e-consent in data sharing systems. The main challenge for e-consent representations is gathering the requirements for a “valid” consent. For the implementation papers, many provided some requirements but none provided a comprehensive overview. Blockchain is identified as a solution to transparency and trust issues in traditional client-server systems, but several challenges hinder it from being applied in practice. E-consent has the potential to grant data subjects control over their data. However, there is no agreed-upon set of security and privacy requirements that must be addressed by an e-consent platform. Therefore, security- and privacy-by-design techniques should be an essential part of the development lifecycle for such a platform.


2021 ◽  
Vol 2 (3) ◽  
pp. 1-44
Author(s):  
Akm Iqtidar Newaz ◽  
Amit Kumar Sikder ◽  
Mohammad Ashiqur Rahman ◽  
A. Selcuk Uluagac

Recent advancements in computing systems and wireless communications have made healthcare systems more efficient than before. Modern healthcare devices can monitor and manage different health conditions of patients automatically without any manual intervention from medical professionals. Additionally, the use of implantable medical devices, body area networks, and Internet of Things technologies in healthcare systems improve the overall patient monitoring and treatment process. However, these systems are complex in software and hardware, and optimizing between security, privacy, and treatment is crucial for healthcare systems because any security or privacy violation can lead to severe effects on patients’ treatments and overall health conditions. Indeed, the healthcare domain is increasingly facing security challenges and threats due to numerous design flaws and the lack of proper security measures in healthcare devices and applications. In this article, we explore various security and privacy threats to healthcare systems and discuss the consequences of these threats. We present a detailed survey of different potential attacks and discuss their impacts. Furthermore, we review the existing security measures proposed for healthcare systems and discuss their limitations. Finally, we conclude the article with future research directions toward securing healthcare systems against common vulnerabilities.


Author(s):  
Siti Hafsah

Azab dan Sengsara is an Indonesian novel written by Merari Siregar (1921), one of the famous roman novelists in Indonesia in Balai Pustaka era. The novel is a material object of the present study. The study aims at revealing oppression, violence, exploitation of woman and all varieties of injustice to woman, revealing social symptoms ideological forms containing in the novel as a manifestation of a company condition in old era. This research uses a qualitative method and approaches of literary feminist and literary sociology as its support. This research succeeds in answering the problems of woman life, as manifestation of real life which reflects kinds of woman’s life in society of Indonesian, for example: marriage, custom, violence, etc. for the hero “Mariamin” (a woman). She is the manifestation of the authority life, besides talking on oppression of woman images of its community lives. The author succeeded offering solutions with various contradictions, conflicts, handling down the novel as manifestation in real life.


2011 ◽  
Vol 39 (111) ◽  
pp. 7-26
Author(s):  
Jonas Kjærgård Laursen

POLITICS OF APPEARANCE. ON REALITY MODELLING IN JOSEPH CONRAD’S NOSTROMOArtistically Nostromo is arguably the most ambitious of Joseph Conrad’s novels. It is also without a doubt the most explicitly political in that it openly engages with the question of how capitalism, imperialism, and revolution affect the human consciousness. There is however no agreement as to how this political problem is to be understood or, more precisely, what kind of understanding of the interrelationship between politics and literature is necessary when engaging this artwork. As a necessary supplement to both a 60’s Marxist reading and readings from the 70’s and 80’s dealing with ideological criticism, this article suggests a reading focusing on how the text creates a model of society by reconfiguring certain real life elements. By developing a specific artistic idiom Nostromo attempts to show the very limited view of the whole of society caused by, in the wording of the novel, the material interests of imperial capitalism. Under the inspiration of both Jurij Lotman and Jacques Rancière the analysis presented here is able to address some key political insights that appear as a consequence of the novelistic form when understood as a relatively autonomous model of society. And that is what is meant by the expression politics of appearance: the politics of literature is to be analysed as something generated by the specific gestalt of the text, as something that comes into sight with – and only with – the text.


Author(s):  
Simon Glew ◽  
Elizabeth M Ford ◽  
Helen Elizabeth Smith

Introduction and Objectives The accuracy of conclusions based on Electronic Healthcare Record (EHR) research is highly dependent on the correct selection of descriptors (codes) by users. We aimed to evaluate the feasibility and acceptability of filmed vignette monologues as a resource-light method of assessing and comparing how different EHR users record the same clinical scenario. Methods Six short monologues of actors portraying patients presenting allergic conditions to their General Practitioners were filmed head-on then electronically distributed for the study; no researcher was present during data collection. The method was assessed by participant uptake, reported ease of completion by participants, compliance with instructions, the receipt of interpretable data by researchers, and participant perceptions of vignette quality, realism and information content. Results 22 participants completed the study, reporting only minor difficulties. 132 screen prints were returned electronically, enabling analysis of codes, free text and EHR features. Participants assigned a quality rating of 7.7/10 (range 2-10) to the vignettes and rated the extent to which vignettes reflected real-life (86-100%). Between 1 and 2 hours were required to complete the task. Full compliance with instructions varied between participants but was largely successful. Conclusions Filmed monologues are a reproducible, standardized method which require few resources, yet allow clear assessment of clinicians’ and EHRs systems’ impact on documentation. The novel nature of this method necessitates clear instructions so participants can fully complete the study without face to face researcher oversight.


Author(s):  
Oles Fedoruk

The paper analyzes different sources of anthroponyms in the original and final texts of P. Kulish’s novel “Chorna Rada: Khronika 1663 Roku” (“The Black Council: A Chronicle of the Year 1663”). Three types of sources have been identified: the historical prototypes, names and surnames of Kulish’s friends, and archival (documentary) records. In addition, numerous notes in the early editions of the Russian novel contain references to the works of various people (M. Markevych, D. Bantysh-Kamenskyi, V. Kokhovskyi, etc.). The last group of anthroponyms stands outside of the plot, and the paper does not focus on it. The historical and autobiographical sources of anthroponyms are generally known. Among the first are prototypes of two hetmans — Yakym Somko and Ivan Briukhovetskyi, military secretary M. Vukhaievych, regimental osaul M. Hvyntovka. The second group comprises the occasional characters Hordii Kostomara (a historian M. Kostomarov), Ivan Yusko (a teacher I. Yuskevych-Kraskovskyi), Hulak (M. Hulak, the founder of The Brotherhood of Saints Cyril and Methodius), Bilozerets (Kulish’s brother-in-law V. Bilozerskyi), Petro Serdiuk (Kulish’s close friend Petro Serdiukov), Oleksa Senchylo (teacher Oleksa Senchylo-Stefanovskyi). In the novel, Kulish drew the love line as a projection of his relationship with Oleksandra Bilozerska and her mother Motrona. The characters of Petro Shramenko, Lesia Cherevanivna and her mother Melaniia have an autobiographical basis. Accordingly, Lesia’s name was also taken from real life. The third group of sources supplying the anthroponyms is archival records. The paper analуzes Kulish’s extracts from the roster of Cossack regiments of the Hetmanate (1741). This source wasn’t used previously. It contains the anthroponyms Vasyl Nevolnyk (‘Slave’), Puhach, Petro Serdiuk, Taranukha, Chepurnyi, Cherevan, Tur, Shramko and Shramchenko, Shkoda, which the author used in various editions of the novel.


Politeja ◽  
2015 ◽  
Vol 12 (8 (31/2)) ◽  
pp. 11-26
Author(s):  
Małgorzata Ossowska-Czader

The aim of this paper is to show how politics, culture and ethnicity interweave in the context of the Rushdie Affair in both the real‑life dimension of the historical events taking place in the late 1980s, as well as the literary dimension of the novel by Hanif Kureishi entitled The Black Album. The paper briefly outlines the Rushdie Affair as it unfolded in the British public sphere with particular emphasis placed on the process of consolidation of the Muslim identity among the representatives of different ethnic groups in Great Britain in the political and cultural context of the event which is deemed to be defining from the point of view of British Muslims. The author of the paper presents the profile of Hanif Kureishi, to indicate why he is ideally positioned to look critically at both sides of the conflict. The paper analyses the novel itself insofar as it examines the implications of the Rushdie Affair depicted in The Black Album, the reactions of the second‑generation immigrants of Pakistani descent in the face of the controversy, the influence this event exerted on the process of their searching for identity as well as their integration into British society. Two opposing identity options taken up by the protagonists of The Black Album are analysed by the author of the paper.


1996 ◽  
Vol 19 (2) ◽  
pp. 198-199 ◽  
Author(s):  
Arie W. Kruglanski

AbstractThe novel correspondence metaphor outlined by Koriat & Goldsmith offers important advantages for studying critical issues of memory-accuracy. It also fits well with the current emphasis on the reconstructive nature of memory and on the role of cognitive, metacognitive, and motivational factors in memory performance. These positive features notwithstanding, the storehouse/correspondence framework faces potential perils having to do with its implied linkage to the laboratory/real-life controversy and its proposal of studying correspondence issues in isolation from memory phenomena captured by the storehouse paradigm.


Kybernetes ◽  
2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Zhihao Yu ◽  
Liang Song ◽  
Linhua Jiang ◽  
Omid Khold Sharafi

Purpose Security is the most important issue in Internet of Things (IoT)-based smart cities and blockchain (BC). So, the present paper aims to detect and organize the literature regarding security in the IoT-based smart cities and BC context. It also proposes an agenda for future research. Therefore, the authors did a statistical review of security in IoT and BC in smart cities. The present investigation aims to determine the principal challenges and disturbances in IoT because of the BC adoption, the central BC applications in IoT-based smart cities and the BC future in IoT-based smart cities. Design/methodology/approach IoT) has a notable influence on modernizing and transforming the society and industry for knowledge digitizing. Therefore, it may be perceived and operated in real time. The IoT is undergoing exponential development in industry and investigation. Still, it contains some security and privacy susceptibilities. Naturally, the research community pays attention to the security and privacy of the IoT. Also, the academic community has put a significant focus on BC as a new security project. In the present paper, the significant mechanisms and investigations in BC ground have been checked out systematically because of the significance of security in the IoT and BC in smart cities. Electronic databases were used to search for keywords. Totally, based on different filters, 131 papers have been gained, and 17 related articles have been obtained and analyzed. The security mechanisms of BC in IoT-based smart cities have been ranked into three main categories as follows, smart health care, smart home and smart agriculture. Findings The findings showed that BC’s distinctive technical aspects might impressively find a solution for privacy and security problems encountering the IoT-based smart cities development. They also supply distributed storage, transparency, trust and other IoT support to form a valid, impressive and secure distributed IoT network and provide a beneficial guarantee for IoT-based smart city users’ security and privacy. Research limitations/implications The present investigation aims to be comprehensive, but some restrictions were also observed. Owing to the use of some filters for selecting the original papers, some complete works may be excluded. Besides, inspecting the total investigations on the security topic in BC and the IoT-based smart cities is infeasible. Albeit, the authors attempt to introduce a complete inspection of the security challenges in BC and the IoT-based smart cities. BC includes significant progress and innovation in the IoT-based smart cities’ security domain as new technology. Still, it contains some deficiencies as well. Investigators actively encounter the challenges and bring up persistent innovation and inspection of related technologies in the vision of the issues available in diverse application scenarios. Practical implications The use of BC technology in finding a solution for the security issues of the IoT-based smart cities is a research hotspot. There is numerable literature with data and theoretical support despite the suggestion of numerous relevant opinions. Therefore, this paper offers insights into how findings may guide practitioners and researchers in developing appropriate security systems dependent upon the features of IoT-based smart city systems and BC. This paper may also stimulate further investigation on the challenge of security in BC and IoT-based smart cities. The outcomes will be of great value for scholars and may supply sights into future investigation grounds in the present field. Originality/value As the authors state according to their knowledge, it is the first work using security challenges on BC and IoT-based smart cities. The literature review shows that few papers discuss how solving security issues in the IoT-based smart cities can benefit from the BC. The investigation suggests a literature review on the topic, recommending some thoughts on using security tools in the IoT-based smart cities. The present investigation helps organizations plan to integrate IoT and BC to detect the areas to focus. It also assists in better resource planning for the successful execution of smart technologies in their supply chains.


PMLA ◽  
1952 ◽  
Vol 67 (4) ◽  
pp. 375-382
Author(s):  
Charles I. Patterson

Charles Lamb exhibited the same genial attitude toward books as toward people; he never expected too much of either, and was therefore seldom disappointed. This whimsical tolerance was especially evident in his reactions to prose fiction. He never went at a novel too seriously—with hammer and tongs, as we say; yet he could distinguish between the enduring works and the pulp. Moreover, he professed to like the same qualities in books as in people: individuality, personality, and even eccentricity. In 1821 he disclaimed a taste for the external events in narrative fiction, contrasting his attitude with that of his sister: “Narrative teases me. I have little concern with the progress of events. She must have a story.... The fluctuations of fortune in fiction ... and almost in real life ... have ceased to interest, or to operate but dully upon me. Out of the way humours and opinions—heads with some diverting twist in them—the oddities of authorship please me most” (ii, 75). There is, however, ample evidence that Lamb read widely in prose fiction and enjoyed the works of the great eighteenth-century masters—Defoe, Richardson, Fielding, and Smollett. He also was acquainted with the writings of Sterne, Goldsmith, Henry Mackenzie, Robert Paltock, Aleman, Cervantes, Jane and Maria Porter, Godwin, Scott, and many figures of less note, including the Minerva Press offerings. As Lamb himself put it, “Defoe was always my darling” (i, 524). In 1829, at the request of his friend Walter Wilson, Lamb wrote a critical essay on Defoe's secondary novels for Wilson's book Memoirs of the Life and Times of Daniel Defoe.4


Sign in / Sign up

Export Citation Format

Share Document