首页 > 最新文献

Security, Data Analytics, and Energy-Aware Solutions in the IoT最新文献

英文 中文
Brain-Computer Interface 脑机接口
Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-7323-5.ch010
Anthony Triche, Md Abdullah Al Momin
Launched in 2017 to widespread publicity due to the involvement of tech magnate and outspoken futurist Elon Musk, Neuralink Corp. aims to develop an advanced brain-computer interface (BCI) platform capable of assisting in the treatment of serious neurological conditions with longer-term goals of approaching transhumanism through nonmedical human enhancement to enable human-machine “symbiosis with artificial intelligence.” The first published description of a complete prototype Neuralink system, detailed by Muskin the company's only white paper to date, describes a closed-loop, invasive BCI architecture with an unprecedented magnitude of addressable electrodes. Invasive BCI systems require surgical implantation to allow for directly targeted capture and/or stimulation of neural spiking activity in functionally associated clusters of neurons beneath the surface of the cortex.
Neuralink公司于2017年成立,由于科技巨头、直言不讳的未来主义者埃隆·马斯克的参与而得到广泛宣传,该公司旨在开发一种先进的脑机接口(BCI)平台,能够协助治疗严重的神经系统疾病,其长期目标是通过非医疗人类增强来接近超人类主义,使人机“与人工智能共生”。这是该公司迄今为止发布的唯一一份白皮书,详细描述了一个完整的Neuralink系统原型,描述了一个闭环、侵入式脑机接口架构,具有前所未有的可寻址电极数量。侵入性脑机接口系统需要手术植入,以允许直接靶向捕获和/或刺激皮层表面下功能相关的神经元簇中的神经尖峰活动。
{"title":"Brain-Computer Interface","authors":"Anthony Triche, Md Abdullah Al Momin","doi":"10.4018/978-1-7998-7323-5.ch010","DOIUrl":"https://doi.org/10.4018/978-1-7998-7323-5.ch010","url":null,"abstract":"Launched in 2017 to widespread publicity due to the involvement of tech magnate and outspoken futurist Elon Musk, Neuralink Corp. aims to develop an advanced brain-computer interface (BCI) platform capable of assisting in the treatment of serious neurological conditions with longer-term goals of approaching transhumanism through nonmedical human enhancement to enable human-machine “symbiosis with artificial intelligence.” The first published description of a complete prototype Neuralink system, detailed by Muskin the company's only white paper to date, describes a closed-loop, invasive BCI architecture with an unprecedented magnitude of addressable electrodes. Invasive BCI systems require surgical implantation to allow for directly targeted capture and/or stimulation of neural spiking activity in functionally associated clusters of neurons beneath the surface of the cortex.","PeriodicalId":137552,"journal":{"name":"Security, Data Analytics, and Energy-Aware Solutions in the IoT","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115594966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Named Data Networking for Internet of Things Search Engines 面向物联网搜索引擎的命名数据网络
Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-7323-5.ch001
Hengshuo Liang, Lauren Burgess, Weixian Liao, Chao Lu, Wei Yu
The advance of internet of things (IoT) techniques enables a variety of smart-world systems in energy, transportation, home, and city infrastructure, among others. To provide cost-effective data-oriented service, internet of things search engines (IoTSE) have received growing attention as a platform to support efficient data analytics. There are a number of challenges in designing efficient and intelligent IoTSE. In this chapter, the authors focus on the efficiency issue of IoTSE and design the named data networking (NDN)-based approach for IoTSE. To be specific, they first design a simple simulation environment to compare the IP-based network's performance against named data networking (NDN). They then create four scenarios tailored to study the approach's resilience to address network issues and scalability with the growing number of queries in IoTSE. They implement the four scenarios using ns-3 and carry out extensive performance evaluation to determine the efficacy of the approach concerning network resilience and scalability. They also discuss some remaining issues that need further research.
物联网(IoT)技术的进步使能源、交通、家庭和城市基础设施等领域的各种智能世界系统成为可能。为了提供具有成本效益的数据导向服务,物联网搜索引擎(IoTSE)作为支持高效数据分析的平台受到越来越多的关注。设计高效、智能的IoTSE存在许多挑战。在本章中,作者重点研究了IoTSE的效率问题,并设计了基于命名数据网络(NDN)的IoTSE方法。具体来说,他们首先设计了一个简单的模拟环境来比较基于ip的网络与命名数据网络(NDN)的性能。然后,他们创建了四个定制的场景来研究该方法的弹性,以解决IoTSE中查询数量不断增加的网络问题和可扩展性。他们使用ns-3实现了四种场景,并进行了广泛的性能评估,以确定该方法在网络弹性和可扩展性方面的有效性。他们还讨论了一些有待进一步研究的问题。
{"title":"Towards Named Data Networking for Internet of Things Search Engines","authors":"Hengshuo Liang, Lauren Burgess, Weixian Liao, Chao Lu, Wei Yu","doi":"10.4018/978-1-7998-7323-5.ch001","DOIUrl":"https://doi.org/10.4018/978-1-7998-7323-5.ch001","url":null,"abstract":"The advance of internet of things (IoT) techniques enables a variety of smart-world systems in energy, transportation, home, and city infrastructure, among others. To provide cost-effective data-oriented service, internet of things search engines (IoTSE) have received growing attention as a platform to support efficient data analytics. There are a number of challenges in designing efficient and intelligent IoTSE. In this chapter, the authors focus on the efficiency issue of IoTSE and design the named data networking (NDN)-based approach for IoTSE. To be specific, they first design a simple simulation environment to compare the IP-based network's performance against named data networking (NDN). They then create four scenarios tailored to study the approach's resilience to address network issues and scalability with the growing number of queries in IoTSE. They implement the four scenarios using ns-3 and carry out extensive performance evaluation to determine the efficacy of the approach concerning network resilience and scalability. They also discuss some remaining issues that need further research.","PeriodicalId":137552,"journal":{"name":"Security, Data Analytics, and Energy-Aware Solutions in the IoT","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122543069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Handwritten Signature Spoofing With Conditional Generative Adversarial Nets 条件生成对抗网络的手写签名欺骗
Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-7323-5.ch006
Md Fazle Rabby, Md Abdullah Al Momin, X. Hei
Generative adversarial networks have been a highly focused research topic in computer vision, especially in image synthesis and image-to-image translation. There are a lot of variations in generative nets, and different GANs are suitable for different applications. In this chapter, the authors investigated conditional generative adversarial networks to generate fake images, such as handwritten signatures. The authors demonstrated an implementation of conditional generative adversarial networks, which can generate fake handwritten signatures according to a condition vector tailored by humans.
生成对抗网络一直是计算机视觉领域中备受关注的研究课题,特别是在图像合成和图像到图像翻译方面。生成网络有很多变化,不同的gan适用于不同的应用。在本章中,作者研究了条件生成对抗网络来生成假图像,如手写签名。作者展示了条件生成对抗网络的实现,该网络可以根据人类定制的条件向量生成假手写签名。
{"title":"Handwritten Signature Spoofing With Conditional Generative Adversarial Nets","authors":"Md Fazle Rabby, Md Abdullah Al Momin, X. Hei","doi":"10.4018/978-1-7998-7323-5.ch006","DOIUrl":"https://doi.org/10.4018/978-1-7998-7323-5.ch006","url":null,"abstract":"Generative adversarial networks have been a highly focused research topic in computer vision, especially in image synthesis and image-to-image translation. There are a lot of variations in generative nets, and different GANs are suitable for different applications. In this chapter, the authors investigated conditional generative adversarial networks to generate fake images, such as handwritten signatures. The authors demonstrated an implementation of conditional generative adversarial networks, which can generate fake handwritten signatures according to a condition vector tailored by humans.","PeriodicalId":137552,"journal":{"name":"Security, Data Analytics, and Energy-Aware Solutions in the IoT","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122474348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Survey of Automotive Cyber-Physical System Security 汽车信息物理系统安全研究
Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-7323-5.ch005
Michael Arienmughare, Andrew S. Yoshimura, Md Abdullah Al Momin
This chapter will provide a survey on cyber-physical systems security related to automobiles. In modern vehicles, there has been discussion on how automobiles fit into the world of cyber-physical systems, considering their interaction with both the cyber and physical worlds and interconnected systems. With many modern vehicles being connected to the outside world, there are many vulnerabilities introduced. Modern cars contain many electronic control units and millions of lines of code, which, if compromised, could have fatal consequences. Interfaces to the outside world (e.g., in-vehicle infotainment) may be used as a vector to attack these critical components.
本章将概述与汽车相关的网络物理系统安全。在现代车辆中,人们一直在讨论汽车如何适应网络物理系统的世界,考虑到它们与网络和物理世界以及互联系统的相互作用。随着许多现代车辆与外部世界连接,引入了许多漏洞。现代汽车包含许多电子控制单元和数百万行代码,如果受到损害,可能会造成致命的后果。与外部世界的接口(例如,车载信息娱乐)可能被用作攻击这些关键组件的载体。
{"title":"Survey of Automotive Cyber-Physical System Security","authors":"Michael Arienmughare, Andrew S. Yoshimura, Md Abdullah Al Momin","doi":"10.4018/978-1-7998-7323-5.ch005","DOIUrl":"https://doi.org/10.4018/978-1-7998-7323-5.ch005","url":null,"abstract":"This chapter will provide a survey on cyber-physical systems security related to automobiles. In modern vehicles, there has been discussion on how automobiles fit into the world of cyber-physical systems, considering their interaction with both the cyber and physical worlds and interconnected systems. With many modern vehicles being connected to the outside world, there are many vulnerabilities introduced. Modern cars contain many electronic control units and millions of lines of code, which, if compromised, could have fatal consequences. Interfaces to the outside world (e.g., in-vehicle infotainment) may be used as a vector to attack these critical components.","PeriodicalId":137552,"journal":{"name":"Security, Data Analytics, and Energy-Aware Solutions in the IoT","volume":"166 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114912325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Attacks on Voice Assistant Systems 对语音助理系统的攻击
Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-7323-5.ch004
Jie Lien, Md Abdullah Al Momin, Xu Yuan
Voice assistant systems (e.g., Siri, Alexa) have attracted wide research attention. However, such systems could receive voice information from malicious sources. Recent work has demonstrated that the voice authentication system is vulnerable to different types of attacks. The attacks are categorized into two main types: spoofing attacks and hidden voice commands. In this chapter, how to launch and defend such attacks is explored. For the spoofing attack, there are four main types, such as replay attacks, impersonation attacks, speech synthesis attacks, and voice conversion attacks. Although such attacks could be accurate on the speech recognition system, they could be easily identified by humans. Thus, the hidden voice commands have attracted a lot of research interest in recent years.
语音助理系统(如Siri, Alexa)已经引起了广泛的研究关注。然而,这样的系统可能会从恶意来源接收语音信息。最近的研究表明,语音认证系统容易受到不同类型的攻击。这些攻击主要分为两种类型:欺骗攻击和隐藏语音命令。本章将探讨如何发起和防御此类攻击。对于欺骗攻击,主要有四种类型:重放攻击、模拟攻击、语音合成攻击和语音转换攻击。虽然这种攻击在语音识别系统上是准确的,但它们很容易被人类识别出来。因此,隐式语音命令近年来引起了广泛的研究兴趣。
{"title":"Attacks on Voice Assistant Systems","authors":"Jie Lien, Md Abdullah Al Momin, Xu Yuan","doi":"10.4018/978-1-7998-7323-5.ch004","DOIUrl":"https://doi.org/10.4018/978-1-7998-7323-5.ch004","url":null,"abstract":"Voice assistant systems (e.g., Siri, Alexa) have attracted wide research attention. However, such systems could receive voice information from malicious sources. Recent work has demonstrated that the voice authentication system is vulnerable to different types of attacks. The attacks are categorized into two main types: spoofing attacks and hidden voice commands. In this chapter, how to launch and defend such attacks is explored. For the spoofing attack, there are four main types, such as replay attacks, impersonation attacks, speech synthesis attacks, and voice conversion attacks. Although such attacks could be accurate on the speech recognition system, they could be easily identified by humans. Thus, the hidden voice commands have attracted a lot of research interest in recent years.","PeriodicalId":137552,"journal":{"name":"Security, Data Analytics, and Energy-Aware Solutions in the IoT","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132138183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Deep Learning Approach for Protecting Voice-Controllable Devices From Laser Attacks 保护声控设备免受激光攻击的深度学习方法
Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-7323-5.ch008
Vijay Srinivas Tida, Raghabendra Shah, X. Hei
The laser-based audio signal injection can be used for attacking voice controllable systems. An attacker can aim an amplitude-modulated light at the microphone's aperture, and the signal injection acts as a remote voice-command attack on voice-controllable systems. Attackers are using vulnerabilities to steal things that are in the form of physical devices or the form of virtual using making orders, withdrawal of money, etc. Therefore, detection of these signals is important because almost every device can be attacked using these amplitude-modulated laser signals. In this project, the authors use deep learning to detect the incoming signals as normal voice commands or laser-based audio signals. Mel frequency cepstral coefficients (MFCC) are derived from the audio signals to classify the input audio signals. If the audio signals are identified as laser signals, the voice command can be disabled, and an alert can be displayed to the victim. The maximum accuracy of the machine learning model was 100%, and in the real world, it's around 95%.
基于激光的音频信号注入可用于攻击语音可控系统。攻击者可以将调幅光对准麦克风的孔径,信号注入就像对语音控制系统的远程语音命令攻击一样。攻击者正在利用漏洞窃取物理设备或虚拟设备的形式进行订单,提取资金等。因此,检测这些信号非常重要,因为几乎所有设备都可以使用这些调幅激光信号进行攻击。在这个项目中,作者使用深度学习来检测输入信号,作为正常的语音命令或基于激光的音频信号。从音频信号中推导出低频倒谱系数(MFCC)来对输入的音频信号进行分类。如果音频信号被识别为激光信号,则可以禁用语音命令,并向受害者显示警告。机器学习模型的最大准确率是100%,而在现实世界中,它在95%左右。
{"title":"Deep Learning Approach for Protecting Voice-Controllable Devices From Laser Attacks","authors":"Vijay Srinivas Tida, Raghabendra Shah, X. Hei","doi":"10.4018/978-1-7998-7323-5.ch008","DOIUrl":"https://doi.org/10.4018/978-1-7998-7323-5.ch008","url":null,"abstract":"The laser-based audio signal injection can be used for attacking voice controllable systems. An attacker can aim an amplitude-modulated light at the microphone's aperture, and the signal injection acts as a remote voice-command attack on voice-controllable systems. Attackers are using vulnerabilities to steal things that are in the form of physical devices or the form of virtual using making orders, withdrawal of money, etc. Therefore, detection of these signals is important because almost every device can be attacked using these amplitude-modulated laser signals. In this project, the authors use deep learning to detect the incoming signals as normal voice commands or laser-based audio signals. Mel frequency cepstral coefficients (MFCC) are derived from the audio signals to classify the input audio signals. If the audio signals are identified as laser signals, the voice command can be disabled, and an alert can be displayed to the victim. The maximum accuracy of the machine learning model was 100%, and in the real world, it's around 95%.","PeriodicalId":137552,"journal":{"name":"Security, Data Analytics, and Energy-Aware Solutions in the IoT","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127350408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Teleoperated Surgical Robot Security 远程手术机器人安全
Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-7323-5.ch009
Md Abdullah Al Momin, Md. Nazmul Islam
Technology has greatly increased the availability of medical procedures in remote locations that are difficult to access, such as battlefields. Teleoperated surgical robots can be used to perform surgeries on patients over the internet in remote locations. A surgeon can remotely operate the robot to perform a procedure in another room or in a different continent. However, security technology has not yet caught up to these cyber-physical devices. There exist potential cybersecurity attacks on these medical devices that could expose a patient to danger in contrast to traditional surgery. Hence, the security of the system is very important. A malicious actor can gain control of the device and potentially threaten the life of a patient. In this chapter, the authors conduct a survey of potential attack vectors a malicious actor could exploit to deny service to the device, gain control of the device, and steal patient data. Furthermore, after the vulnerability analysis, the authors provide mitigation techniques to limit the risk of these attack vectors.
技术大大增加了难以进入的偏远地区(如战场)医疗程序的可用性。远程手术机器人可以通过互联网在偏远地区为病人进行手术。外科医生可以远程操作机器人在另一个房间或不同的大陆进行手术。然而,安全技术还没有赶上这些网络物理设备。与传统手术相比,这些医疗设备存在潜在的网络安全攻击,可能使患者面临危险。因此,系统的安全性是非常重要的。恶意行为者可以获得对设备的控制,并可能威胁到患者的生命。在本章中,作者对恶意行为者可能利用的潜在攻击向量进行了调查,以拒绝对设备的服务,获得对设备的控制并窃取患者数据。此外,在漏洞分析之后,作者提供了缓解技术来限制这些攻击向量的风险。
{"title":"Teleoperated Surgical Robot Security","authors":"Md Abdullah Al Momin, Md. Nazmul Islam","doi":"10.4018/978-1-7998-7323-5.ch009","DOIUrl":"https://doi.org/10.4018/978-1-7998-7323-5.ch009","url":null,"abstract":"Technology has greatly increased the availability of medical procedures in remote locations that are difficult to access, such as battlefields. Teleoperated surgical robots can be used to perform surgeries on patients over the internet in remote locations. A surgeon can remotely operate the robot to perform a procedure in another room or in a different continent. However, security technology has not yet caught up to these cyber-physical devices. There exist potential cybersecurity attacks on these medical devices that could expose a patient to danger in contrast to traditional surgery. Hence, the security of the system is very important. A malicious actor can gain control of the device and potentially threaten the life of a patient. In this chapter, the authors conduct a survey of potential attack vectors a malicious actor could exploit to deny service to the device, gain control of the device, and steal patient data. Furthermore, after the vulnerability analysis, the authors provide mitigation techniques to limit the risk of these attack vectors.","PeriodicalId":137552,"journal":{"name":"Security, Data Analytics, and Energy-Aware Solutions in the IoT","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123628194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Medical Device Security 医疗设备安全
Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-7323-5.ch011
Md Abdullah Al Momin
Implantable medical devices (IMDs) are miniaturized computer systems used to monitor and treat various medical conditions. Examples of IMDs include insulin pumps, artificial pacemakers, neuro-stimulators, and implantable cardiac defibrillators. These devices have adopted wireless communication to help facilitate the care they provide for patients by allowing easier transferal of data or remote control of machine operations. However, with such adoption has come exposure to various security risks and issues that must be addressed due to the close relation of patient health and IMD performance. With patient lives on the line, these security risks pose increasingly real problems. This chapter hopes to provide an overview of these security risks, their proposed solutions, and the limitations on IMD systems which make solving these issues nontrivial. Later, the chapter will analyze the security issues and the history of vulnerabilities in pacemakers to illustrate the theoretical topics by considering a specific device.
植入式医疗设备(imd)是用于监测和治疗各种医疗状况的小型化计算机系统。imd的例子包括胰岛素泵、人工起搏器、神经刺激器和植入式心脏除颤器。这些设备采用无线通信,通过更容易地传输数据或远程控制机器操作,帮助促进对患者的护理。然而,由于患者健康与IMD性能的密切关系,这种采用带来了各种安全风险和必须解决的问题。由于病人的生命危在旦夕,这些安全风险构成了越来越现实的问题。本章希望提供这些安全风险的概述,他们提出的解决方案,以及IMD系统的局限性,使得解决这些问题变得不容易。随后,本章将分析起搏器的安全问题和漏洞历史,通过考虑特定的设备来说明理论主题。
{"title":"Medical Device Security","authors":"Md Abdullah Al Momin","doi":"10.4018/978-1-7998-7323-5.ch011","DOIUrl":"https://doi.org/10.4018/978-1-7998-7323-5.ch011","url":null,"abstract":"Implantable medical devices (IMDs) are miniaturized computer systems used to monitor and treat various medical conditions. Examples of IMDs include insulin pumps, artificial pacemakers, neuro-stimulators, and implantable cardiac defibrillators. These devices have adopted wireless communication to help facilitate the care they provide for patients by allowing easier transferal of data or remote control of machine operations. However, with such adoption has come exposure to various security risks and issues that must be addressed due to the close relation of patient health and IMD performance. With patient lives on the line, these security risks pose increasingly real problems. This chapter hopes to provide an overview of these security risks, their proposed solutions, and the limitations on IMD systems which make solving these issues nontrivial. Later, the chapter will analyze the security issues and the history of vulnerabilities in pacemakers to illustrate the theoretical topics by considering a specific device.","PeriodicalId":137552,"journal":{"name":"Security, Data Analytics, and Energy-Aware Solutions in the IoT","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123054169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Internet of Things From a Legal Perspective 法律视角下的物联网
Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-7323-5.ch002
Sidi Mohamed Sidi Ahmed
The internet of things (IoT) is one of successive technological waves that could have great impact on different aspects of modern life. It is being used in transport, smart grids, healthcare, environmental monitoring, logistics, as well as for processing pure personal data through a fitness tracker, wearable medical device, smartwatch, smart clothing, wearable camera, and so forth. From a legal viewpoint, processing personal data has to be done in accordance with rules of data protection law. This law aims to protect data from collection to retention. It usually applies to the processing of personal data that identifies or can identify a specific natural person. Strict adherence to this law is necessary for protecting personal data from being misused and also for promoting the IoT industry. This chapter discusses the applicability of the data protection law to IoT and the consequences of non-compliance with this law. It also provides recommendations on how to effectively comply with the data protection law in the IoT environment.
物联网(IoT)是连续的技术浪潮之一,可能对现代生活的各个方面产生巨大影响。它被用于交通运输、智能电网、医疗保健、环境监测、物流,以及通过健身追踪器、可穿戴医疗设备、智能手表、智能服装、可穿戴相机等处理纯个人数据。从法律的角度来看,处理个人数据必须按照数据保护法的规定进行。该法律旨在保护从收集到保留的数据。它通常适用于识别或可以识别特定自然人的个人数据的处理。严格遵守这一法律是保护个人数据不被滥用的必要条件,也是促进物联网产业发展的必要条件。本章讨论了数据保护法对物联网的适用性以及不遵守该法的后果。它还就如何在物联网环境中有效遵守数据保护法提供了建议。
{"title":"The Internet of Things From a Legal Perspective","authors":"Sidi Mohamed Sidi Ahmed","doi":"10.4018/978-1-7998-7323-5.ch002","DOIUrl":"https://doi.org/10.4018/978-1-7998-7323-5.ch002","url":null,"abstract":"The internet of things (IoT) is one of successive technological waves that could have great impact on different aspects of modern life. It is being used in transport, smart grids, healthcare, environmental monitoring, logistics, as well as for processing pure personal data through a fitness tracker, wearable medical device, smartwatch, smart clothing, wearable camera, and so forth. From a legal viewpoint, processing personal data has to be done in accordance with rules of data protection law. This law aims to protect data from collection to retention. It usually applies to the processing of personal data that identifies or can identify a specific natural person. Strict adherence to this law is necessary for protecting personal data from being misused and also for promoting the IoT industry. This chapter discusses the applicability of the data protection law to IoT and the consequences of non-compliance with this law. It also provides recommendations on how to effectively comply with the data protection law in the IoT environment.","PeriodicalId":137552,"journal":{"name":"Security, Data Analytics, and Energy-Aware Solutions in the IoT","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132615097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Generating Device Fingerprints for Smart Device Pairing Using the Unique Spectrum Characteristic From LEDs 利用led独特的频谱特性为智能设备配对生成设备指纹
Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-7323-5.ch007
Md Imran Hossen, Md Abdullah Al Momin, X. Hei
Currently, the vast majority of smart devices with LEDs are on the rise. It has been observed that the lights emitted by each LED have unique spectral characteristics. Despite the fact that there are a number of methods out there to generate fingerprints, none seem to explore the possibility of generating fingerprints using this unique feature. In this chapter, the method to perform device fingerprinting using the unique spectrum emitted from the LED lights is discussed. The generated fingerprint is then used in device pairing.
目前,绝大多数采用led的智能设备正在崛起。已经观察到,每个LED发出的光具有独特的光谱特性。尽管有很多方法可以生成指纹,但似乎没有一种方法可以利用这种独特的功能来生成指纹。在本章中,讨论了利用LED灯发出的独特光谱进行器件指纹识别的方法。生成的指纹随后用于设备配对。
{"title":"Generating Device Fingerprints for Smart Device Pairing Using the Unique Spectrum Characteristic From LEDs","authors":"Md Imran Hossen, Md Abdullah Al Momin, X. Hei","doi":"10.4018/978-1-7998-7323-5.ch007","DOIUrl":"https://doi.org/10.4018/978-1-7998-7323-5.ch007","url":null,"abstract":"Currently, the vast majority of smart devices with LEDs are on the rise. It has been observed that the lights emitted by each LED have unique spectral characteristics. Despite the fact that there are a number of methods out there to generate fingerprints, none seem to explore the possibility of generating fingerprints using this unique feature. In this chapter, the method to perform device fingerprinting using the unique spectrum emitted from the LED lights is discussed. The generated fingerprint is then used in device pairing.","PeriodicalId":137552,"journal":{"name":"Security, Data Analytics, and Energy-Aware Solutions in the IoT","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121444161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Security, Data Analytics, and Energy-Aware Solutions in the IoT
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1