scholarly journals SAR.IoT: Secured Augmented Reality for IoT Devices Management

Sensors ◽  
2021 ◽  
Vol 21 (18) ◽  
pp. 6001
Author(s):  
Daniel Fuentes ◽  
Luís Correia ◽  
Nuno Costa ◽  
Arsénio Reis ◽  
João Barroso ◽  
...  

Currently, solutions based on the Internet of Things (IoT) concept are increasingly being adopted in several fields, namely, industry, agriculture, and home automation. The costs associated with this type of equipment is reasonably small, as IoT devices usually do not have output peripherals to display information about their status (e.g., a screen or a printer), although they may have informative LEDs, which is sometimes insufficient. For most IoT devices, the price of a minimalist display, to output and display the device’s running status (i.e., what the device is doing), might cost much more than the actual IoT device. Occasionally, it might become necessary to visualize the IoT device output, making it necessary to find solutions to show the hardware output information in real time, without requiring extra equipment, only what the administrator usually has with them. In order to solve the above, a technological solution that allows for the visualization of IoT device information in actual time, using augmented reality and a simple smartphone, was developed and analyzed. In addition, the system created integrates a security layer, at the level of AR, to secure the shown data from unwanted eyes. The results of the tests carried out allowed us to validate the operation of the solution when accessing the information of the IoT devices, verify the operation of the security layer in AR, analyze the interaction between smartphones, the platform, and the devices, and check which AR markers are most optimized for this use case. This work results in a secure augmented reality solution, which can be used with a simple smartphone, to monitor/manage IoT devices in industrial, laboratory or research environments.

Author(s):  
WASIN ALKISHRI ◽  
Mahmood Al-Bahri

Biometrics In conjunction with the new development of the Internet of Things (IoT), augmented reality (AR) systems are evolving to visualize 3D virtual models of the real world into an intelligent and interactive virtual reality environment that facilitates physical identification of objects and defines their specifications efficiently. The integration between AR and IoT in a complementary way helps identify network-related items' specifications and interact with the Internet of Things more efficiently. An identity is a dedicated, publicly known attribute or set of names for an individual device. Typically, identifiers operate within a specific area or network, making it difficult to identify things globally. This paper explores the use of Augmented Reality (AR) Technology for identifying devices and displaying relevant information about the device to the user. Based on the developed model network, the developed system of identification of IoT devices was tested. Also, the traffic generated by the AR device when generating requests to the organization server was investigated. According to the test results, the system is undemanding to the main network indicators. The system-generated traffic is self-similar. The test results show that the server software can solve the problems of identifying IoT devices through interaction with augmented reality devices.


2021 ◽  
Vol 9 (2) ◽  
Author(s):  
Feroz Khan A.B ◽  
◽  
Anandharaj G ◽  

The smart devices connected on the internet turn to be the internet of things, which connect other objects or devices through unique identifiers with the capability of transferring and receiving the information over the internet. There are numerous applications in different areas such as healthcare, home automation, transportation, military, agriculture, and still so many sectors that incorporate cutting-edge technologies of communication, networking, cloud computing, sensing, and actuation. With this huge increase in the number of connected devices, a strong security mechanism is required to protect the IoT devices. Hence, it is required to focus on the challenges and issues of IoT enabled applications to safeguard the entire network from the outside invasion. This paper discusses some of the challenges in building IoT applications, a detailed study of the existing security protocols, and its issues, and the potential of the IoT.


2021 ◽  
Vol 2 (5) ◽  
pp. 29-37
Author(s):  
Sabrina Sicari ◽  
Alessandra Rizzardi ◽  
Alberto Coen-Porisini

Nowadays, the capability of rapidly designing and prototyping, simple, yet real domotics systems (e.g., smart homes and smart buildings applications) is even more compelling, due to the availability and increasing spread of Internet of Things (IoT) devices. Home automation services enable the remote monitoring of indoor environments and facilities. The main advantages include saving energy consumption and improving the overall management (and users' experience) in certain application domains. The pervasive adoption and diffusion of such remote monitoring solutions is hampered by the timing required for design, prototyping and further developing applications and underlying architecture, which must be often customized on the basis of specific domains' needs and involved entities. To cope with this issue, the paper proposes the analysis and prototyping of a domotics case study, in order to demonstrate the effectiveness of proper IoT?related tools in speeding up the testing phase.


Sensors ◽  
2019 ◽  
Vol 19 (20) ◽  
pp. 4354
Author(s):  
Sin Kit Lo ◽  
Chee Sun Liew ◽  
Kok Soon Tey ◽  
Saad Mekhilef

The advancement of the Internet of Things (IoT) as a solution in diverse application domains has nurtured the expansion in the number of devices and data volume. Multiple platforms and protocols have been introduced and resulted in high device ubiquity and heterogeneity. However, currently available IoT architectures face challenges to accommodate the diversity in IoT devices or services operating under different operating systems and protocols. In this paper, we propose a new IoT architecture that utilizes the component-based design approach to create and define the loosely-coupled, standalone but interoperable service components for IoT systems. Furthermore, a data-driven feedback function is included as a key feature of the proposed architecture to enable a greater degree of system automation and to reduce the dependency on mankind for data analysis and decision-making. The proposed architecture aims to tackle device interoperability, system reusability and the lack of data-driven functionality issues. Using a real-world use case on a proof-of-concept prototype, we examined the viability and usability of the proposed architecture.


2022 ◽  
Vol 54 (7) ◽  
pp. 1-34
Author(s):  
Sophie Dramé-Maigné ◽  
Maryline Laurent ◽  
Laurent Castillo ◽  
Hervé Ganem

The Internet of Things is taking hold in our everyday life. Regrettably, the security of IoT devices is often being overlooked. Among the vast array of security issues plaguing the emerging IoT, we decide to focus on access control, as privacy, trust, and other security properties cannot be achieved without controlled access. This article classifies IoT access control solutions from the literature according to their architecture (e.g., centralized, hierarchical, federated, distributed) and examines the suitability of each one for access control purposes. Our analysis concludes that important properties such as auditability and revocation are missing from many proposals while hierarchical and federated architectures are neglected by the community. Finally, we provide an architecture-based taxonomy and future research directions: a focus on hybrid architectures, usability, flexibility, privacy, and revocation schemes in serverless authorization.


Author(s):  
Konstantinos Kotis ◽  
Artem Katasonov

Internet of Things should be able to integrate an extremely large amount of distributed and heterogeneous entities. To tackle heterogeneity, these entities will need to be consistently and formally represented and managed (registered, aligned, composed and queried) trough suitable abstraction technologies. Two distinct types of these entities are a) sensing/actuating devices that observe some features of interest or act on some other entities (call it ‘smart entities’), and b) applications that utilize the data sensed from or sent to the smart entities (call it ‘control entities’). The aim of this paper is to present the Semantic Smart Gateway Framework for supporting semantic interoperability between these types of heterogeneous IoT entities. More specifically, the paper describes an ontology as the key technology for the abstraction and semantic registration of these entities, towards supporting their automated deployment. The paper also described the alignment of IoT entities and of their exchanged messages. More important, the paper presents a use case scenario and a proof-of-concept implementation.


2018 ◽  
Author(s):  
Henry Tranter

Security is always at the forefront of developing technologies. One can seldom go a week without hearing of a new data breach or hacking attempt from various groups around the world, often taking advantage of a simple flaw in a system’s architecture. The Internet of Things (IoT) is one of these developing technologies which may be at risk of such attacks. IoT devices are becoming more and more prevalent in everyday life. From keeping track of an individual’s health, to suggesting meals from items available in an individual’s fridge, these technologies are taking a much larger role in the personal lives of their users. With this in mind, how is security being considered in the development of these technologies? Are these devices that monitor individual’s personal lives just additional vectors for potential data theft? Throughout this survey, various approaches to the development of security systems concerning IoT devices in the home will be discussed, compared, and contrasted in the hope of providing an ideal solution to the problems this technology may produce.


Author(s):  
Clinton Fernandes ◽  
Vijay Sivaraman

This article examines the implications of selected aspects of the Telecommunications (Interception and Access) Amendment (Data Retention) Act 2015, which was passed by the Australian Parliament in March 2015. It shows how the new law has strengthened protections for privacy. However, focusing on the investigatory implications, it shows how the law provides a tactical advantage to investigators who pursue whistleblowers and investigative journalists. The article exposes an apparent discrepancy in the way ‘journalist’ is defined across different pieces of legislation. It argues that although legislators’ interest has been overwhelmingly focused on communications data, the explosion of data generated by the so-called Internet-of-Things (IoT) is as important or more. It shows how the sensors in selected IoT devices lead to a loss of user control and will enable non-stop, involuntary and ubiquitous monitoring of individuals. It suggests that the law will need to be amended further once legislators and investigators’ knowledge of the potential of IoT increases. 


Author(s):  
Tanweer Alam

In next-generation computing, the role of cloud, internet and smart devices will be capacious. Nowadays we all are familiar with the word smart. This word is used a number of times in our daily life. The Internet of Things (IoT) will produce remarkable different kinds of information from different resources. It can store big data in the cloud. The fog computing acts as an interface between cloud and IoT. The extension of fog in this framework works on physical things under IoT. The IoT devices are called fog nodes, they can have accessed anywhere within the range of the network. The blockchain is a novel approach to record the transactions in a sequence securely. Developing a new blockchains based middleware framework in the architecture of the Internet of Things is one of the critical issues of wireless networking where resolving such an issue would result in constant growth in the use and popularity of IoT. The proposed research creates a framework for providing the middleware framework in the internet of smart devices network for the internet of things using blockchains technology. Our main contribution links a new study that integrates blockchains to the Internet of things and provides communication security to the internet of smart devices.


Sign in / Sign up

Export Citation Format

Share Document