smart object
Recently Published Documents


TOTAL DOCUMENTS

83
(FIVE YEARS 22)

H-INDEX

10
(FIVE YEARS 2)

2021 ◽  
Vol 2107 (1) ◽  
pp. 012020
Author(s):  
Ooi Nian Chze ◽  
Marni Azira Markom ◽  
Ong Xin Hui ◽  
Wong Tze Chin ◽  
Koay Yu Vern ◽  
...  

Abstract In COVID 19 pandemic, new norms have been introduced, including, to leave a record when checking-in to a particular place. This new norm is regulated in order to trace locations that have been visited by someone with positive COVID-19. This paper presents a work on development of check-in location system. The system implemented Near Field Communication (NFC) technology which is mainly utilized two NFC compatible devices where an identification card (IC) is used as a smart object (NFC tag) and the NFC detector as an NFC reader to exchange information. Testing has been conducted in order to observe the system performance, and, the results showed that this system is able to collect information of users who were coming to premise. Also, the information can be checked by authority in order to track someone with positive COVID-19. As conclusion, this system can be an alternative to MySejahtera App.


2021 ◽  
Vol 67 (1) ◽  
pp. 895-915
Author(s):  
Sulaiman Khan ◽  
Shah Nazir ◽  
Habib Ullah Khan

Author(s):  
Sabrina Sicari ◽  
Alessandra Rizzardi ◽  
Gianluca Dini ◽  
Pericle Perazzo ◽  
Michele La Manna ◽  
...  

AbstractRegulating the access to the Internet of Things (IoT) network’s resources is a complex-prone task, which requires to pay a great attention on how policies are defined, shared, and enforced. The present paper considers the specific context of a smart home, which represents one of the main IoT application domains, and it focuses on two solutions proposed in the literature to cope with the aforementioned issues. On the one side, approaches based on attribute-based encryption (ABE) allow one to encrypt data for multiple recipients, in such a way that only those recipients whose attributes satisfy a given access policy can decrypt afterward. ABE guarantees a high level of customization due to the variety of attributes which can be defined, and it is also flexible enough to be adapted to different kinds of scenarios. On the other side, approaches based on sticky policies allow to attach an access policy directly to the data itself, and to employ a trusted authority to evaluate and enforce the policy itself. Sticky policies also guarantee a highly distributed and customizable enforcement of access control rules. In this paper, we compare the advantages and the drawbacks in terms of performance and robustness of such two techniques by means of their integration within the prototype of an IoT middleware, named networked smart object. Hence, the effectiveness of the presented solutions is validated by means of a real test-bed in the smart home scenario, in terms of storage occupancy, CPU load, and data retrieval delay. The final goal is to reveal the best approach to be used depending on the application’s requirements.


Sign in / Sign up

Export Citation Format

Share Document