scholarly journals Validating the Adoption of Heterogeneous Internet of Things with Blockchain

2020 ◽  
Vol 12 (6) ◽  
pp. 107 ◽  
Author(s):  
Lulwah AlSuwaidan ◽  
Nuha Almegren

Emerging technologies such as Internet of Things (IoT) and blockchain have affected the digital transformation. Blockchain, on the one hand, was initially developed for the purpose of financial trading due to its robustness especially for fault tolerance and cryptographic security in addition to its decentralized architecture. IoT, on the other hand, is an open interconnected network of smart devices able to communicate simultaneously. This arises a challenge in privacy and security, specifically for the data being exchanged. To overcome this, studies have focused on the blockchain to resolve the security and privacy issues of IoT. Indeed, limited studies have proposed to assess blockchain’s viability for IoT and the associated challenges. In this paper, a conceptual model has proposed to identify the crucial factors affecting the adoption of blockchain in IoT. The model consists of four dimensions of factors that we assume will affect the adoption of the two technologies. The dimensions are: attitude-related factors, social influence related factors, data-related factors, and security-related factors. This model is validated through a survey that was distributed between professionals in blockchain and IoT. The findings show a significant impact of data-related factors on the adoption of blockchain in IoT and the intention to use them. The model can play an important role in the development of strategies, standards, and performance assessment.

2019 ◽  
Vol 239 (4) ◽  
pp. 661-701 ◽  
Author(s):  
Sandra Dummert ◽  
Ute Leber ◽  
Barbara Schwengler

AbstractThe current situation in the German apprenticeship market is characterized by two contradictory developments. On the one hand, establishments are experiencing increasing problems filling the training positions they offer, and the number of vacant training positions is climbing. On the other hand, the transition into training is still difficult for many young people, and the number of unsuccessful vocational training applicants is rising. Hence, matching supply with demand is becoming increasingly difficult in the German job market for training positions. Using the Linked Employer-Employee dataset (LIAB) from the Institute for Employment Research (IAB), our paper provides a closer examination of the phenomenon of unfilled training positions. It presents an overview of the evolution of vacant training positions in eastern and western Germany and attempts to explain the number of vacancies by investigating the factors responsible for the establishments’ inability to fill their training positions. We assume that training position vacancies are due not only to internal company reasons such as firm size or the wage offer for apprentices but also to external conditions such as general regional factors. Therefore, our analysis also considers the situation on the demand side of the labor market within a region. The results of our multilevel mixed-effects estimations show that in addition to characteristics on the enterprise level, regional determinants also affect the share of vacant apprenticeships. With respect to establishment-related factors, mainly characteristics that describe the attractiveness of the firm prove to be important. With regard to regional-specific factors, we find that the availability of school leavers in a region in addition to the level of regional-sectoral competition impacts the recruiting success of establishments. Our analysis also shows that there are remarkable differences between eastern and western Germany concerning both the quantitative importance of unfilled training positions and the factors affecting them.


2015 ◽  
Vol 46 (4) ◽  
pp. 326-344 ◽  
Author(s):  
Govert Valkenburg ◽  
Irma van der Ploeg

What concepts such as ‘security’ and ‘privacy’ mean in practice is not merely a matter of policy choices or value concepts, but is inherently tied up with the socio-material and technological arrangement of the practices in which they come to matter. In this article, one trajectory in the implementation of a security regime into the sociotechnical arrangement of airport security checking is reconstructed. During this trajectory, gradual modifications or ‘translations’ are performed on what are initially defined as the privacy and security problems. The notion of translation is used to capture the modifications that concepts undergo between different stages of the process: the initial security problem shifts, transforms and comes to be aligned with several other interests and values. We articulate how such translations take place in the material realm, where seemingly technical and natural-scientific givens take part in the negotiations. On the one hand, these negotiations may produce technologies that perform social inequalities. On the other hand, it is in this material realm that translations of problem definitions appear as simply technical issues, exempted from democratic governance. The forms of privacy and security that emerge in the end are thus specific versions with specific social effects, which do not follow in an obvious way from the generic, initial concepts. By focusing on problem definitions and their translations at various stages of the development, we explain how it is possible for potentially stigmatizing and privacy-encroaching effects to occur, even though the security technologies were introduced exactly to preclude those effects.


2019 ◽  
Vol 6 (1) ◽  
pp. 15-30 ◽  
Author(s):  
Yasmine Labiod ◽  
Abdelaziz Amara Korba ◽  
Nacira Ghoualmi-Zine

In the recent years, the Internet of Things (IoT) has been widely deployed in different daily life aspects such as home automation, electronic health, the electric grid, etc. Nevertheless, the IoT paradigm raises major security and privacy issues. To secure the IoT devices, many research works have been conducted to counter those issues and discover a better way to remove those risks, or at least reduce their effects on the user's privacy and security requirements. This article mainly focuses on a critical review of the recent authentication techniques for IoT devices. First, this research presents a taxonomy of the current cryptography-based authentication schemes for IoT. In addition, this is followed by a discussion of the limitations, advantages, objectives, and attacks supported of current cryptography-based authentication schemes. Finally, the authors make in-depth study on the most relevant authentication schemes for IoT in the context of users, devices, and architecture that are needed to secure IoT environments and that are needed for improving IoT security and items to be addressed in the future.


Sensors ◽  
2018 ◽  
Vol 18 (9) ◽  
pp. 2784 ◽  
Author(s):  
Chao Qu ◽  
Ming Tao ◽  
Ruifen Yuan

With the fast development and expansion of the Internet of Things (IoT), billions of smart devices are being continuously connected, and smart homes, as a typical IoT application, are providing people with various convenient applications, but face security and privacy issues. The idea of Blockchain (BC) theory has brought about a potential solution to the IoT security problem. The emergence of blockchain technology has brought about a change of decentralized management, providing an effective solution for the protection of network security and privacy. On the other hand, the smart devices in IoT are always lightweight and have less energy and memory. This makes the application of blockchain difficult. Against this background, this paper proposes a blockchain model based on hypergraphs. The aims of this model are to reduce the storage consumption and to solve the additional security issues. In the model, we use the hyperedge as the organization of storage nodes and convert the entire networked data storage into part network storage. We discuss the design of the model and security strategy in detail, introducing some use cases in a smart home network and evaluating the storage performance of the model through simulation experiments and an evaluation of the network.


Author(s):  
Syrine Sahmim Ep Guerbouj ◽  
Hamza Gharsellaoui ◽  
Sadok Bouamama

This journal article deals with the most important existing problems of security and privacy of the Cloud Computing (CC), Internet of Things (IoT) and Cloud of Things (CoT) concepts especially confidentiality issues. With the evolution of ubiquitous computing, everything is connected everywhere, therefore these concepts have been widely studied in the literature. However, due to the systems complexity and the difficulty to control each access attempt, intrusions and vulnerabilities will be more recurrent. To tackle this issue, researchers have been focused on various approaches enforcing security and privacy. In the present article, risk factors and solutions regarding these technologies are reviewed then current and future trends are discussed.


Sensors ◽  
2020 ◽  
Vol 20 (20) ◽  
pp. 5897
Author(s):  
Shantanu Pal ◽  
Michael Hitchens ◽  
Tahiry Rabehaja ◽  
Subhas Mukhopadhyay

There has been a tremendous growth in the number of smart devices and their applications (e.g., smart sensors, wearable devices, smart phones, smart cars, etc.) in use in our everyday lives. This is accompanied by a new form of interconnection between the physical and digital worlds, commonly known as the Internet of Things (IoT). This is a paradigm shift, where anything and everything can be interconnected via a communication medium. In such systems, security is a prime concern and protecting the resources (e.g., applications and services) from unauthorized access needs appropriately designed security and privacy solutions. Building secure systems for the IoT can only be achieved through a thorough understanding of the particular needs of such systems. The state of the art is lacking a systematic analysis of the security requirements for the IoT. Motivated by this, in this paper, we present a systematic approach to understand the security requirements for the IoT, which will help designing secure IoT systems for the future. In developing these requirements, we provide different scenarios and outline potential threats and attacks within the IoT. Based on the characteristics of the IoT, we group the possible threats and attacks into five areas, namely communications, device/services, users, mobility and integration of resources. We then examine the existing security requirements for IoT presented in the literature and detail our approach for security requirements for the IoT. We argue that by adhering to the proposed requirements, an IoT system can be designed securely by achieving much of the promised benefits of scalability, usability, connectivity, and flexibility in a practical and comprehensive manner.


Author(s):  
Jayashree Kanniappan ◽  
Babu Rajendiran

Internet of Things technology is rapidly gaining popularity, not only in industrial and commercial environments, but also in personal life by means of smart devices at home. The Internet of Things (IoT) spawn new businesses and make buildings, cities and transport smarter. The IoT allows for ubiquitous data collection or tracking, but these useful features are also examples of privacy threats that are already limiting the success of the IoT vision when not implemented correctly. Privacy should be protected in the device, in storage, during communication, and at processing. The privacy of users and their data protection have been identified as one of the important challenges that need to be addressed in the IoT. The chapter presents the IoT technology, the various applications, and privacy issues. Various other issues such as security and performance are also addressed.


2019 ◽  
Vol 10 (5) ◽  
pp. 387 ◽  
Author(s):  
Sheikh Muhammad Hizam ◽  
Waqas Ahmed

Service quality possesses the vital prominence in usability of innovative products and services. As Technological innovation has made the life synchronized and effective, Internet of Things (IoT) is matter of discussion everywhere. From users’ perspective, IoT services are always embraced by various system characteristics of security and performance. A service quality model can better present the preference of such technology customers. The study intends to project theoretical model of service quality for Internet of Things (IoT). Based on the existing models of service quality and the literature on internet of things, a framework is proposed to conceptualize and measure service quality for internet of things. This study establishes the IoT-SERVQUAL model with four dimensions (i.e., Privacy, Functionality, Efficiency and Tangibility) of multiple service quality models. These dimensions are essential and inclined towards the users’ leaning of IoT services. This paper contributes to research on internet of things services by the development of a comprehensive framework for customers’ quality apprehensions. This model will previse the expression of information secrecy concerns of users related with Internet of Things (IoT). This research will advance understanding of service quality in modern day technology and assist firms to devise the fruitful services structure.


Informatics ◽  
2019 ◽  
Vol 6 (1) ◽  
pp. 8 ◽  
Author(s):  
Christopher McDermott ◽  
John Isaacs ◽  
Andrei Petrovski

The growth of the Internet of Things (IoT), and demand for low-cost, easy-to-deploy devices, has led to the production of swathes of insecure Internet-connected devices. Many can be exploited and leveraged to perform large-scale attacks on the Internet, such as those seen by the Mirai botnet. This paper presents a cross-sectional study of how users value and perceive security and privacy in smart devices found within the IoT. It analyzes user requirements from IoT devices, and the importance placed upon security and privacy. An experimental setup was used to assess user ability to detect threats, in the context of technical knowledge and experience. It clearly demonstrated that without any clear signs when an IoT device was infected, it was very difficult for consumers to detect and be situationally aware of threats exploiting home networks. It also demonstrated that without adequate presentation of data to users, there is no clear correlation between level of technical knowledge and ability to detect infected devices.


2011 ◽  
Vol 2 (2) ◽  
pp. 35-64 ◽  
Author(s):  
Sanjay K. Jain ◽  
Manika Jain

The paper aims at examining the impact of various consumer and product characteristics on adoption of e-commerce among consumers in India. The study is based on primary data collected through survey of consumers residing in and around Delhi. A structured non- disguised questionnaire has been employed for collecting the information from the respondents about their demographics, shopping orientations, security and privacy concerns, technological familiarity, past online shopping experiences and intentions to buy various types of products through internet in future. Past online shopping satisfaction, recreational shopping orientation, education and income emerge as significant factors affecting consumer past online purchases. In respect of future online shopping intentions, only three consumer-related factors viz., past online shopping satisfaction, past online shopping frequency and education, are found as significant predictors. Amongst product characteristics, product expensiveness is found to be negatively related to consumer future online purchase intentions. While consumers appear quite willing to buy services online that are high in their intangible value proposition, they appear somewhat ambivalent in their intentions to buy online the 'frequently purchased products'. Some of the consumer and product characteristics do influence consumer adoption of e-commerce. Study findings entail interesting implications for the marketers. They need to give adequate attention to consumer and product characteristics while designing their e-marketing strategies. As compared to goods, the surveyed respondents have expressed greater willingness to buy services online in future. Services thus appear to be more promising product category for sale through internet channel in future.


Sign in / Sign up

Export Citation Format

Share Document