scholarly journals BLOFF

Author(s):  
Promise Agbedanu ◽  
Anca Delia Jurcut

In this era of explosive growth in technology, the internet of things (IoT) has become the game changer when we consider technologies like smart homes and cities, smart energy, security and surveillance, and healthcare. The numerous benefits provided by IoT have become attractive technologies for users and cybercriminals. Cybercriminals of today have the tools and the technology to deploy millions of sophisticated attacks. These attacks need to be investigated; this is where digital forensics comes into play. However, it is not easy to conduct a forensic investigation in IoT systems because of the heterogeneous nature of the IoT environment. Additionally, forensic investigators mostly rely on evidence from service providers, a situation that can lead to evidence contamination. To solve this problem, the authors proposed a blockchain-based IoT forensic model that prevents the admissibility of tampered logs into evidence.

Author(s):  
Wassila Guebli ◽  
Abdelkader Belkhir

The emergence of the internet of things in the smart homes has given rise to many services to meet the user's expectations. It is possible to control the temperature, the brightness, the sound system, and even the security of the house via a smartphone, at the request of the inhabitant or by scheduling it. This growing number of “things” must deal with material constraints such as home network infrastructure, but also applicative due to the number of proposed services. The heterogeneity of users' preferences often creates conflicts between them like turn on and off light or using a heater and an air conditioner in the same time. To manage these conflicts, the authors proposed a solution based on linked open data (LOD). The LOD allows defining the relation between the different services and things in the house and a better exploitation of the attributes of the inhabitant's profile and services. It consists to find inconsistency relation between the equipment using the antonym thesaurus.


Sensors ◽  
2020 ◽  
Vol 20 (23) ◽  
pp. 6761
Author(s):  
Anjan Bandyopadhyay ◽  
Vikash Kumar Singh ◽  
Sajal Mukhopadhyay ◽  
Ujjwal Rai ◽  
Fatos Xhafa ◽  
...  

In the Internet of Things (IoT) + Fog + Cloud architecture, with the unprecedented growth of IoT devices, one of the challenging issues that needs to be tackled is to allocate Fog service providers (FSPs) to IoT devices, especially in a game-theoretic environment. Here, the issue of allocation of FSPs to the IoT devices is sifted with game-theoretic idea so that utility maximizing agents may be benign. In this scenario, we have multiple IoT devices and multiple FSPs, and the IoT devices give preference ordering over the subset of FSPs. Given such a scenario, the goal is to allocate at most one FSP to each of the IoT devices. We propose mechanisms based on the theory of mechanism design without money to allocate FSPs to the IoT devices. The proposed mechanisms have been designed in a flexible manner to address the long and short duration access of the FSPs to the IoT devices. For analytical results, we have proved the economic robustness, and probabilistic analyses have been carried out for allocation of IoT devices to the FSPs. In simulation, mechanism efficiency is laid out under different scenarios with an implementation in Python.


Sensors ◽  
2020 ◽  
Vol 20 (10) ◽  
pp. 2783 ◽  
Author(s):  
Linh-An Phan ◽  
Taehong Kim

Smart home is one of the most promising applications of the Internet of Things. Although there have been studies about this technology in recent years, the adoption rate of smart homes is still low. One of the largest barriers is technological fragmentation within the smart home ecosystem. Currently, there are many protocols used in a connected home, increasing the confusion of consumers when choosing a product for their house. One possible solution for this fragmentation is to make a gateway to handle the diverse protocols as a central hub in the home. However, this solution brings about another issue for manufacturers: compatibility. Because of the various smart devices on the market, supporting all possible devices in one gateway is also an enormous challenge. In this paper, we propose a software architecture for a gateway in a smart home system to solve the compatibility problem. By creating a mechanism to dynamically download and update a device profile from a server, the gateway can easily handle new devices. Moreover, the proposed gateway also supports unified control over heterogeneous networks. We implemented a prototype to prove the feasibility of the proposed gateway architecture and evaluated its performance from the viewpoint of message execution time over heterogeneous networks, as well as the latency for device profile downloads and updates, and the overhead needed for handling unknown commands.


2014 ◽  
Vol 102 (25) ◽  
pp. 1018-1023 ◽  
Author(s):  
Viviana Vumbaca ◽  
Francesca Brando ◽  
Marguerite J. Pinto ◽  
Thomas Duffy ◽  
Elisabeth Anna Malsch ◽  
...  

2019 ◽  
Author(s):  
Israel C. Vidal ◽  
Franck Rousseau ◽  
Javam C. Machado

With the growth of the Internet of Things (IoT) and Smart Homes, there is an ever-growing amount of data coming from within people’s houses. These data are intrinsically private and should be treated carefully, despite their high value for analysis. In this work, we propose a differentially private strategy to estimate frequencies of values in the context of Smart Home data.


Energies ◽  
2021 ◽  
Vol 14 (17) ◽  
pp. 5381
Author(s):  
Zbysław Dobrowolski

Energy firms are the beneficiaries and initiators of innovation, and energy investments are a crucial area of business activity that is specially protected in any country. This is no wonder, as energy security is the basis for the functioning of states and economies. The Internet of Things and Big Data create both new challenges and new threats. This study aimed to identify the potential threats and determine preventive measures, as well as to establish the agile principles related to energy firms’ logistics. The method of the narrative summary in combination with the literature searching method was used. Two conclusions emerged: first, research serves to develop the discipline of management science; second, the identification of risks associated with innovation serves practitioners. In addition, the study defined further research directions.


Author(s):  
Linh Manh Pham

Many domains of human life are more and moreimpacted by applications of the Internet of Things (i.e., IoT).The embedded devices produce masses of data day after dayrequiring a strong network infrastructure. The inclusion ofmessaging protocols like MQTT is important to ensure as fewerrors as possible in sending millions of IoT messages. Thisprotocol is a great component of the IoT universe due to itslightweight design and low power consumption. DistributedMQTT systems are typically needed in actual applicationenvironments because centralized MQTT methods cannotaccommodate a massive volume of data. Although beingscalable decentralized MQTT systems, they are not suited totraffic workload variability. IoT service providers may incurexpense because the computing resources are overestimated.This points to the need for a new approach to adapt workloadfluctuation. Through proposing a modular MQTT framework,this article provides such an elasticity approach. In order toguarantee elasticity of MQTT server cluster while maintainingintact IoT implementation, the MQTT framework used offthe-shelf components. The elasticity feature of our frameworkis verified by various experiments.


The future of Internet of Things (IoT) is already upon us. The Internet of Things (IoT) is the ability to provide everyday devices with a way of identification and another way for communication with each other. The spectrum of IoT application domains is very large including smart homes, smart cities, wearables, e-health, etc. Consequently, tens and even hundreds of billions of devices will be connected. Such devices will have smart capabilities to collect, analyze and even make decisions without any human interaction. Security is a supreme requirement in such circumstances, and in particular authentication is of high interest given the damage that could happen from a malicious unauthenticated device in an IoT system. While enjoying the convenience and efficiency that IoT brings to us, new threats from IoT also have emerged. There are increasing research works to ease these threats, but many problems remain open. To better understand the essential reasons of new threats and the challenges in current research, this survey first proposes the concept of “IoT features”. Then, the security and privacy effects of eight IoT new features were discussed including the threats they cause, existing solutions and challenges yet to be solved.


Sign in / Sign up

Export Citation Format

Share Document