scholarly journals Establishing End-to-End Secure Channel for IoT Devices through an Untrusted C-ITS Network

Author(s):  
Simon Bouget ◽  
Shahid Raza ◽  
Martin Furuhed
Author(s):  
Archana Rajakaruna ◽  
Ahsan Manzoor ◽  
Pawani Porambage ◽  
Madhusanka Liyanage ◽  
Mika Ylianttila ◽  
...  

2020 ◽  
Vol 101 ◽  
pp. 102098 ◽  
Author(s):  
Zhongru Ren ◽  
Haomin Wu ◽  
Qian Ning ◽  
Iftikhar Hussain ◽  
Bingcai Chen

2016 ◽  
Vol 11 (1) ◽  
pp. 50-63 ◽  
Author(s):  
Raul Munoz ◽  
Josep Mangues-Bafalluy ◽  
Ricard Vilalta ◽  
Christos Verikoukis ◽  
Jesus Alonso-Zarate ◽  
...  

2021 ◽  
Author(s):  
Norisvaldo Ferraz Junior ◽  
Anderson AA Silva ◽  
Adilson E Guelfi ◽  
Sergio T Kofuji

Abstract Background: The Internet of Things (IoT) enables the development of innovative applications in various domains such as healthcare, transportation, and Industry 4.0. Publish-subscribe systems enable IoT devices to communicate with the cloud platform. However, IoT applications need context-aware messages to translate the data into contextual information, allowing the applications to act cognitively. Besides, end-to-end security of publish-subscribe messages on both ends (devices and cloud) is essential. However, achieving security on constrained IoT devices with memory, payload, and energy restrictions is a challenge. Contribution: Messages in IoT need to achieve both energy efficiency and secure delivery. Thus, the main contribution of this paper refers to a performance evaluation of a message structure that standardizes the publish-subscribe topic and payload used by the cloud platform and the IoT devices. We also propose a standardization for the topic and payload for publish-subscribe systems. Conclusion: The messages promote energy efficiency, enabling ultra-low-power and high-capacity devices and reducing the bytes transmitted in the IoT domain. The performance evaluation demonstrates that publish-subscribe systems (namely, AMQP, DDS, and MQTT) can use our proposed energy-efficient message structure on IoT. Additionally, the message system provides end-to-end confidentiality, integrity, and authenticity between IoT devices and the cloud platform.


2015 ◽  
Vol 2015 ◽  
pp. 1-10 ◽  
Author(s):  
JeongGil Ko ◽  
Byung-Bog Lee ◽  
Kyesun Lee ◽  
Sang Gi Hong ◽  
Naesoo Kim ◽  
...  

The vision of theInternet of Things (IoT)is coming closer to reality as a large number of embedded devices are introduced to our everyday environments. For many commercial IoT devices, ubiquitously connected mobile platforms can provide global connectivity and enable various applications. Nevertheless, the types of IoT resource-utilizing applications are still limited due to the traditional stovepipe software architecture, where the vendors provide supporting software on an end-to-end basis. This paper tries to address this issue by introducing theSensor Virtualization Module (SVM), which provides a software abstraction for external IoT objects and allows applications to easily utilize various IoT resources through open APIs. We implement the SVM on both Android and iOS and show that the SVM architecture can lead to easy development of applications. We envision that this simplification in application development will catalyze the development of various IoT services.


Author(s):  
Chau Thi Minh Nguyen ◽  
Doan B. Hoang

Internet of things (IoT) has developed into an interconnected platform infrastructure for providing everyday services. Emerging end-to-end IoT services are being developed for local and multiple distributed regions. To realize the on-demand services in a timely and economically beneficial way, programmability and reusability are crucial for provisioning and reusing IoT resources. Existing IoT platforms are rigid and cannot be easily adapted to accommodate new services. This paper proposes a programmable large-scale software-defined IoT model for provisioning IoT services on demand with two levels of management and orchestration. One orchestrates services over geographically distributed clusters and the other orchestrates services over IoT devices within a cluster. The model entails the design of IoT-specific controllers, software-defined virtual sensors, and a new protocol for managing resource-constrained but enriched devices. The model allows provisioning and resource-sharing of end-to-end IoT services on demand. Implementation results demonstrate the feasibility and efficiency of the proposed model.


Author(s):  
Moreno Ambrosin ◽  
Mauro Conti ◽  
Ahmad Ibrahim ◽  
Ahmad-Reza Sadeghi ◽  
Matthias Schunter

VASA ◽  
2016 ◽  
Vol 45 (3) ◽  
pp. 223-228 ◽  
Author(s):  
Jan Paweł Skóra ◽  
Jacek Kurcz ◽  
Krzysztof Korta ◽  
Przemysław Szyber ◽  
Tadeusz Andrzej Dorobisz ◽  
...  

Abstract. Background: We present the methods and results of the surgical management of extracranial carotid artery aneurysms (ECCA). Postoperative complications including early and late neurological events were analysed. Correlation between reconstruction techniques and morphology of ECCA was assessed in this retrospective study. Patients and methods: In total, 32 reconstructions of ECCA were performed in 31 symptomatic patients with a mean age of 59.2 (range 33 - 84) years. The causes of ECCA were divided among atherosclerosis (n = 25; 78.1 %), previous carotid endarterectomy with Dacron patch (n = 4; 12.5 %), iatrogenic injury (n = 2; 6.3 %) and infection (n = 1; 3.1 %). In 23 cases, intervention consisted of carotid bypass. Aneurysmectomy with end-to-end suture was performed in 4 cases. Aneurysmal resection with patching was done in 2 cases and aneurysmorrhaphy without patching in another 2 cases. In 1 case, ligature of the internal carotid artery (ICA) was required. Results: Technical success defined as the preservation of ICA patency was achieved in 31 cases (96.9 %). There was one perioperative death due to major stroke (3.1 %). Two cases of minor stroke occurred in the 30-day observation period (6.3 %). Three patients had a transient hypoglossal nerve palsy that subsided spontaneously (9.4 %). At a mean long-term follow-up of 68 months, there were no major or minor ipsilateral strokes or surgery-related deaths reported. In all 30 surviving patients (96.9 %), long-term clinical outcomes were free from ipsilateral neurological symptoms. Conclusions: Open surgery is a relatively safe method in the therapy of ECCA. Surgical repair of ECCAs can be associated with an acceptable major stroke rate and moderate minor stroke rate. Complication-free long-term outcomes can be achieved in as many as 96.9 % of patients. Aneurysmectomy with end-to-end anastomosis or bypass surgery can be implemented during open repair of ECCA.


Author(s):  
Ahmed Mousa ◽  
Ossama M. Zakaria ◽  
Mai A. Elkalla ◽  
Lotfy A. Abdelsattar ◽  
Hamad Al-Game'a

AbstractThis study was aimed to evaluate different management modalities for peripheral vascular trauma in children, with the aid of the Mangled Extremity Severity Score (MESS). A single-center retrospective analysis took place between 2010 and 2017 at University Hospitals, having emergencies and critical care centers. Different types of vascular repair were adopted by skillful vascular experts and highly trained pediatric surgeons. Patients were divided into three different age groups. Group I included those children between 5 and 10 years; group II involved pediatrics between 11 and 15 years; while children between 16 and 21 years participated in group III. We recruited 183 children with peripheral vascular injuries. They were 87% males and 13% females, with the mean age of 14.72 ± 04. Arteriorrhaphy was performed in 32%; end-to-end anastomosis and natural vein graft were adopted in 40.5 and 49%, respectively. On the other hand, 10.5% underwent bypass surgery. The age groups I and II are highly susceptible to penetrating trauma (p = 0.001), while patients with an extreme age (i.e., group III) are more susceptible to blunt injury (p = 0.001). The MESS has a significant correlation to both age groups I and II (p = 0.001). Vein patch angioplasty and end-to-end primary repair should be adopted as the main treatment options for the repair of extremity vascular injuries in children. Moreover, other treatment modalities, such as repair with autologous vein graft/bypass surgery, may be adopted whenever possible. They are cost-effective, reliable, and simple techniques with fewer postoperative complication, especially in poor/limited resources.


Sign in / Sign up

Export Citation Format

Share Document