Search results

1 – 10 of 41
Article
Publication date: 28 October 2014

Arijit Ukil, Soma Bandyopadhyay, Abhijan Bhattacharyya, Arpan Pal and Tulika Bose

The purpose of this paper is to study lightweight security scheme for Internet of Things (IoT) applications using Constrained Application Protocol (CoAP)…

1457

Abstract

Purpose

The purpose of this paper is to study lightweight security scheme for Internet of Things (IoT) applications using Constrained Application Protocol (CoAP). Resource-constrained characteristics of IoT systems have ushered in compelling requirements for lightweight application protocol and security suites. CoAP has already been established as the candidate protocol for IoT systems. However, low overhead security scheme for CoAP is still an open problem. Existing security solutions like Datagram Transport Layer Security (DTLS) is not suitable, particularly due to its expensive handshaking, public key infrastructure (PKI)-based authentication and lengthy ciphersuite agreement process.

Design/methodology/approach

This paper proposes a lightweight security scheme in CoAP using Advanced Encryption Standard (AES) 128 symmetric key algorithm. The paper presents an object security (payload embedded)-based robust authentication mechanism with integrated key management. The paper introduces few unique modifications to CoAP header to optimize security operation and minimize communication cost.

Findings

It is resilient to number of security attacks like replay attack, meet-in-the-middle attack and secure under chosen plaintext attack. This scheme is generic in nature, applicable for gamut of IoT applications. The paper proves efficacy of our proposed scheme for vehicle tracking application in emulated laboratory setup. Specifically, it compares with DTLS-enabled CoAP to establish the lightweight feature of our proposed solution.

Research limitations/implications

This paper mainly focuses on implementing in-vehicle tracking systems as an IoT application and used CoAP as the application protocol.

Practical implications

Such a lightweight security scheme would provide immense benefit in IoT systems so that resource constraint-sensing devices and nodes can be made secure. This would impact IoT eco systems to a large extent.

Originality/value

Such kind of security suite that provides both robustness and lightweight feature is hitherto not known to the authors, particularly in CoAP for IoT applications.

Details

International Journal of Pervasive Computing and Communications, vol. 10 no. 4
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 17 April 2007

Nikolaos Korfiatis, Marios Poulos and George Bokos

The purpose of this research is to address the need for a definition of metadata descriptors for use in enhancing the accuracy of bibliometric instruments of scholarly…

1143

Abstract

Purpose

The purpose of this research is to address the need for a definition of metadata descriptors for use in enhancing the accuracy of bibliometric instruments of scholarly evaluation, such as the impact factor.

Design/methodology/approach

A semantic vocabulary – COAP – is constructed, deployed on top of the Resource Description Framework (RDF), by extending the Friend‐of‐a‐Friend (FOAF) schema.

Findings

An extension of the FOAF vocabulary is considered as the ability to describe a publication record such as this paper in terms of scholar contributions and participations. In order to achieve that, the FOAF vocabulary is extended.

Practical implications

The application of this semantic vocabulary could be used as a way of enhancing the accuracy of source data for bibliometric evaluation instruments.

Originality/value

The paper discusses how metadata descriptors can contribute to the improvement of already established scholar evaluation instruments such as the impact factor. It will be of use in the development of digital libraries.

Details

The Electronic Library, vol. 25 no. 2
Type: Research Article
ISSN: 0264-0473

Keywords

Article
Publication date: 9 August 2011

Miriam Marcus‐Smith

Four Washington State associations came together to form a novel organization in response to rising healthcare sector costs, coupled with the need to ensure efficient…

289

Abstract

Purpose

Four Washington State associations came together to form a novel organization in response to rising healthcare sector costs, coupled with the need to ensure efficient provision of high quality care that improves health outcomes. This article seeks to explain the work and progress of that organization.

Design/methodology/approach

The article takes the form of a historical narrative.

Findings

The initiative has evolved from reliance on grants to becoming self‐funding, expanded the scope of its activities, and satisfied the needs of the stakeholders.

Practical implications

This organizational model is more efficient than going it alone on every effort, and may be a desirable solution for other communities.

Originality/value

This is the first published description of a unique, non‐profit organization founded in 1998, which can serve as a model for other regions that wish to promote collaborative benchmarking among competitive independent health care providers.

Details

Clinical Governance: An International Journal, vol. 16 no. 3
Type: Research Article
ISSN: 1477-7274

Keywords

Article
Publication date: 23 July 2019

Meriem Aziez, Saber Benharzallah and Hammadi Bennoui

The purpose of this paper is to address the Internet of Things (IoT) service discovery problem and investigate the existing solutions to tackle this problem in many aspects.

Abstract

Purpose

The purpose of this paper is to address the Internet of Things (IoT) service discovery problem and investigate the existing solutions to tackle this problem in many aspects.

Design/methodology/approach

This paper presents an overview of IoT services aiming at providing a clear understanding about their features because this term is still ambiguous for the IoT service discovery approaches. Besides, a full comparison study of the most representative service discovery approaches in the literature is presented over four perspectives: the IoT information model, the mechanism of IoT service discovery, the adopted architecture and the context awareness. These perspectives allow classifying, comparing and giving a deeper understanding of the existing IoT service discovery solutions.

Findings

This paper presents a new definition and a new classification of IoT services and citation of their features comparing with the traditional Web services. This paper discusses the existing solutions, as well as the main challenges, that face the service discovery issue in the IoT domain. Besides, two classifications of the approaches are adopted on the basis of their service description model and their mechanism of discovery, and a set of requirements that need to be considered when defining an IoT service are proposed.

Originality/value

There are few number works that survey the service discovery approaches in the IoT domain, but none of these surveys discuss the service description models in the IoT or the impact of the context awareness aspect in the service discovery solution. There are also few works that give a comprehensive overview of IoT services to understand their nature to facilitate their description and discovery. This paper fills this gap by performing a full comparison study of multi-category and recent approaches for service discovery in the IoT over many aspects and also by performing a comprehensive study of the IoT service features.

Details

International Journal of Pervasive Computing and Communications, vol. 15 no. 1
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 2 November 2015

Nancy Ambritta P, Poonam N. Railkar and Parikshit N. Mahalle

This paper aims at providing a comparative analysis of the existing protocols that address the security issues in the Future Internet (FI) and also to introduce a…

192

Abstract

Purpose

This paper aims at providing a comparative analysis of the existing protocols that address the security issues in the Future Internet (FI) and also to introduce a Collaborative Mutual Identity Establishment (CMIE) scheme which adopts the elliptical curve cryptography (ECC), to address the issues, such as content integrity, mutual authentication, forward secrecy, auditability and resistance to attacks such as denial-of-service (DoS) and replay attack.

Design/methodology/approach

This paper provides a comparative analysis of the existing protocols that address the security issues in the FI and also provides a CMIE scheme, by adopting the ECC and digital signature verification mechanism, to address the issues, such as content integrity, mutual authentication, forward secrecy, auditability and resistance to attacks such as DoS and replay attack. The proposed scheme enables the establishment of secured interactions between devices and entities of the FI. Further, the algorithm is evaluated against Automated Validation of Internet Security Protocols and Application (AVISPA) tool to verify the security solutions that the CMIE scheme has claimed to address to have been effectively achieved in reality.

Findings

The algorithm is evaluated against AVISPA tool to verify the security solutions that the CMIE scheme has claimed to address and proved to have been effectively achieved in reality. The proposed scheme enables the establishment of secured interactions between devices and entities of the FI.

Research limitations/implications

Considering the Internet of Things (IoT) scenario, another important aspect that is the device-to-location (D2L) aspect has not been considered in this protocol. Major focus of the protocol is centered around the device-to-device (D2D) and device-to-server (D2S) scenarios. Also, IoT basically works upon a confluence of hundreds for protocols that support the achievement of various factors in the IoT, for example Data Distribution Service, Message Queue Telemetry Transport, Extensible Messaging and Presence Protocol, Constrained Application Protocol (CoAP) and so on. Interoperability of the proposed CMIE algorithm with the existing protocols has to be considered to establish a complete model that fits the FI. Further, each request for mutual authentication requires a querying of the database and a computation at each of the participating entities side for verification which could take considerable amount of time. However, for applications that require firm authentication for maintaining and ensuring secure interactions between entities prior to access control and initiation of actual transfer of sensitive information, the negligible difference in computation time can be ignored for the greater benefit that comes with stronger security. Other factors such as quality of service (QoS) (i.e. flexibility of data delivery, resource usage and timing), key management and distribution also need to be considered. However, the user still has the responsibility to choose the required protocol that suits one’s application and serves the purpose.

Originality/value

The originality of the work lies in adopting the ECC and digital signature verification mechanism to develop a new scheme that ensures mutual authentication between participating entities in the FI based upon certain user information such as identities. ECC provides efficiency in terms of key size generated and security against main-in-middle attack. The proposed scheme provides secured interactions between devices/entities in the FI.

Details

International Journal of Pervasive Computing and Communications, vol. 11 no. 4
Type: Research Article
ISSN: 1742-7371

Keywords

Content available
Article
Publication date: 28 October 2014

Ismail Khalil and Liming Chen

106

Abstract

Details

International Journal of Pervasive Computing and Communications, vol. 10 no. 4
Type: Research Article
ISSN: 1742-7371

Article
Publication date: 3 September 2018

Mohan Liyanage, Chii Chang and Satish Narayana Srirama

The distant data centre-centric Internet of Things (IoT) systems face the latency issue especially in the real-time-based applications, such as augmented reality, traffic…

Abstract

Purpose

The distant data centre-centric Internet of Things (IoT) systems face the latency issue especially in the real-time-based applications, such as augmented reality, traffic analytics and ambient assisted living. Recently, Fog computing models have been introduced to overcome the latency issue by using the proximity-based computational resources, such as the computers co-located with the cellular base station, grid router devices or computers in local business. However, the increasing users of Fog computing servers cause bottleneck issues and consequently the latency issue arises again. This paper aims to introduce the utilisation of Mist computing (Mist) model, which exploits the computational and networking resources from the devices at the very edge of the IoT networks.

Design/methodology/approach

This paper proposes a service-oriented mobile-embedded Platform as a Service (mePaaS) framework that allows the mobile device to provide a flexible platform for proximal users to offload their computational or networking program to mePaaS-based Mist computing node.

Findings

The prototype has been tested and performance has been evaluated on the real-world devices. The evaluation results have shown the promising nature of mePaaS.

Originality/value

The proposed framework supports resource-aware autonomous service configuration that can manage the availability of the functions provided by the Mist node based on the dynamically changing hardware resource availability. In addition, the framework also supports task distribution among a group of Mist nodes.

Details

International Journal of Pervasive Computing and Communications, vol. 14 no. 3/4
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 21 September 2021

Satyanarayana Pamarthi and R. Narmadha

Nowadays, more interest is found among the researchers in MANETs in practical and theoretical areas and their performance under various environments. WSNs have begun to…

Abstract

Purpose

Nowadays, more interest is found among the researchers in MANETs in practical and theoretical areas and their performance under various environments. WSNs have begun to combine with the IoT via the sensing capability of Internet-connected devices and the Internet access ability of sensor nodes. It is essential to shelter the network from attacks over the Internet by keeping the secure router.

Design/methodology/approach

This paper plans to frame an effective literature review on diverse intrusion detection and prevention systems in Wireless Sensor Networks (WSNs) and Mobile Ad hoc NETworks (MANETs) highly suitable for security in Internet of Things (IoT) applications. The literature review is focused on various types of attacks concentrated in each contribution and the adoption of prevention and mitigation models are observed. In addition, the types of the dataset used, types of attacks concentrated, types of tools used for implementation, and performance measures analyzed in each contribution are analyzed. Finally, an attempt is made to conclude the review with several future research directions in designing and implementing IDS for MANETs that preserve the security aspects of IoT.

Findings

It observed the different attack types focused on every contribution and the adoption of prevention and mitigation models. Additionally, the used dataset types, the focused attack types, the tool types used for implementation, and the performance measures were investigated in every contribution.

Originality/value

This paper presents a literature review on diverse contributions of attack detection and prevention, and the stand of different machine learning and deep learning models along with the analysis of types of the dataset used, attacks concentrated, tools used for implementation and performance measures on the network security for IoT applications.

Details

International Journal of Intelligent Unmanned Systems, vol. 10 no. 4
Type: Research Article
ISSN: 2049-6427

Keywords

Article
Publication date: 7 April 2015

Chii Chang, Satish Narayana Srirama and Sea Ling

Recent smart mobile devices are capable of letting users produce various digital content, and share/upload the content to many social network services (SNS) directly via…

Abstract

Purpose

Recent smart mobile devices are capable of letting users produce various digital content, and share/upload the content to many social network services (SNS) directly via wireless network connections. The phenomenon has increased the number of people using mobile SNS applications. Although the applications have become more popular, mobile users have been restricted in the virtual communities of online SNS and are not aware of the social opportunities available to them in real-time surrounding. While they spend most of their time accessing online SNS, they have missed many opportunities to interact with others for new friendships, business opportunities or information sharing. Consequently, a new breed of mobile social network (MSN) system has arisen to assist mobile users to interact with proximal people and perform various social activities. Such a proximal-based MSN environment is termed a Mobile Social Network in Proximity (MSNP).

Design/methodology/approach

Developing an MSNP system needs to address a number of issues and challenges, such as heterogeneity, content/service discovery, privacy and trust, resource management, and so on. This paper identifies and describes these challenges, and reviews a number of related solutions from existing literature. In the follow up, this paper addresses a number of open challenges in the MSNP domain.

Findings

Although various works have been proposed to enable and overcome challenges in MSNP, there are still many unsolved open challenges in terms of identification, content management, social-aware discovery, trust in public environment, adaptation, quality of service and the development of MSNP. We have addressed these challenges in this paper as future research directions in the MSNP domain.

Originality/value

This paper provides an original literature review in MSNP and identifies a number of open challenges as research direction in the MSNP domain.

Details

International Journal of Pervasive Computing and Communications, vol. 11 no. 1
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 9 October 2019

Elham Ali Shammar and Ammar Thabit Zahary

Internet has changed radically in the way people interact in the virtual world, in their careers or social relationships. IoT technology has added a new vision to this…

4965

Abstract

Purpose

Internet has changed radically in the way people interact in the virtual world, in their careers or social relationships. IoT technology has added a new vision to this process by enabling connections between smart objects and humans, and also between smart objects themselves, which leads to anything, anytime, anywhere, and any media communications. IoT allows objects to physically see, hear, think, and perform tasks by making them talk to each other, share information and coordinate decisions. To enable the vision of IoT, it utilizes technologies such as ubiquitous computing, context awareness, RFID, WSN, embedded devices, CPS, communication technologies, and internet protocols. IoT is considered to be the future internet, which is significantly different from the Internet we use today. The purpose of this paper is to provide up-to-date literature on trends of IoT research which is driven by the need for convergence of several interdisciplinary technologies and new applications.

Design/methodology/approach

A comprehensive IoT literature review has been performed in this paper as a survey. The survey starts by providing an overview of IoT concepts, visions and evolutions. IoT architectures are also explored. Then, the most important components of IoT are discussed including a thorough discussion of IoT operating systems such as Tiny OS, Contiki OS, FreeRTOS, and RIOT. A review of IoT applications is also presented in this paper and finally, IoT challenges that can be recently encountered by researchers are introduced.

Findings

Studies of IoT literature and projects show the disproportionate importance of technology in IoT projects, which are often driven by technological interventions rather than innovation in the business model. There are a number of serious concerns about the dangers of IoT growth, particularly in the areas of privacy and security; hence, industry and government began addressing these concerns. At the end, what makes IoT exciting is that we do not yet know the exact use cases which would have the ability to significantly influence our lives.

Originality/value

This survey provides a comprehensive literature review on IoT techniques, operating systems and trends.

Details

Library Hi Tech, vol. 38 no. 1
Type: Research Article
ISSN: 0737-8831

Keywords

1 – 10 of 41