Search results
1 – 6 of 6Jun Lin, Zhiqi Shen, Chunyan Miao and Siyuan Liu
With the rapid growth of the Internet of Things (IoT) market and requirement, low power wide area (LPWA) technologies have become popular. In various LPWA technologies, Narrow…
Abstract
Purpose
With the rapid growth of the Internet of Things (IoT) market and requirement, low power wide area (LPWA) technologies have become popular. In various LPWA technologies, Narrow Band IoT (NB-IoT) and long range (LoRa) are two main leading competitive technologies. Compared with NB-IoT networks, which are mainly built and managed by mobile network operators, LoRa wide area networks (LoRaWAN) are mainly operated by private companies or organizations, which suggests two issues: trust of the private network operators and lack of network coverage. This study aims to propose a conceptual architecture design of a blockchain built-in solution for LoRaWAN network servers to solve these two issues for LoRaWAN IoT solution.
Design/methodology/approach
The study proposed modeling, model analysis and architecture design.
Findings
The proposed solution uses the blockchain technology to build an open, trusted, decentralized and tamper-proof system, which provides the indisputable mechanism to verify that the data of a transaction has existed at a specific time in the network.
Originality/value
To the best of our knowledge, this is the first work that integrates blockchain technology and LoRaWAN IoT technology.
Details
Keywords
Peiman Tavakoli, Ibrahim Yitmen, Habib Sadri and Afshin Taheri
The purpose of this study is to focus on structured data provision and asset information model maintenance and develop a data provenance model on a blockchain-based digital twin…
Abstract
Purpose
The purpose of this study is to focus on structured data provision and asset information model maintenance and develop a data provenance model on a blockchain-based digital twin smart and sustainable built environment (DT) for predictive asset management (PAM) in building facilities.
Design/methodology/approach
Qualitative research data were collected through a comprehensive scoping review of secondary sources. Additionally, primary data were gathered through interviews with industry specialists. The analysis of the data served as the basis for developing blockchain-based DT data provenance models and scenarios. A case study involving a conference room in an office building in Stockholm was conducted to assess the proposed data provenance model. The implementation utilized the Remix Ethereum platform and Sepolia testnet.
Findings
Based on the analysis of results, a data provenance model on blockchain-based DT which ensures the reliability and trustworthiness of data used in PAM processes was developed. This was achieved by providing a transparent and immutable record of data origin, ownership and lineage.
Practical implications
The proposed model enables decentralized applications (DApps) to publish real-time data obtained from dynamic operations and maintenance processes, enhancing the reliability and effectiveness of data for PAM.
Originality/value
The research presents a data provenance model on a blockchain-based DT, specifically tailored to PAM in building facilities. The proposed model enhances decision-making processes related to PAM by ensuring data reliability and trustworthiness and providing valuable insights for specialists and stakeholders interested in the application of blockchain technology in asset management and data provenance.
Details
Keywords
This paper aims to describe a method for Internet-of-Things-devices to achieve industrial grade reliability for information transfer from wireless sensor systems to production…
Abstract
Purpose
This paper aims to describe a method for Internet-of-Things-devices to achieve industrial grade reliability for information transfer from wireless sensor systems to production systems using blockchain technologies.
Design/methodology/approach
An increased security and reliability of submitted data within the sensor network could be achieved on an application level. Therefore, a lightweight, high-level communication protocol based on blockchain principles was designed.
Findings
Blockchain mechanisms can secure the wireless communication of Internet-of-Things-devices in a lightweight and scalable manner.
Originality/value
The innovation of this research is the successful application of general blockchain mechanisms to increase security of a wireless sensor system without binding to a dedicated blockchain technology.
Details
Keywords
Blockchain, which was originally created to enable peer-to-peer digital payment systems (bitcoin), is considered to have several benefits for different sectors, such as the real…
Abstract
Purpose
Blockchain, which was originally created to enable peer-to-peer digital payment systems (bitcoin), is considered to have several benefits for different sectors, such as the real estate one. In a standard European-wide real estate transaction, several intermediaries are involved. As a consequence, these agreements are usually time-consuming and involve extra difficulties to cross-border operations. As blockchain, combined with smart contracts, may have an important role in these transactions, this paper aims to explore its prospective challenges, limitations and opportunities in the real estate sector and discover how the traditional intermediaries have to face a possible implementation of this technology.
Design/methodology/approach
This paper analyses the current intermediaries in the real estate sector in European Union (EU), their functions and how can blockchain strengthen the security of these transactions while reducing their time. The author uses a legal methodology to approach it.
Findings
Blockchain, combined with smart contracts, has both challenges and opportunities for the real estate sector. On the one hand, it may improve procedures, allow EU transactions and the interconnection between public administration. However, to not reduce parties rights, this blockchain should have some special features, such as the possibility of being amended.
Originality/value
This paper provides a valuable overview of all the intermediaries that could be affected by blockchain protocols. It is of interest of blockchain developers, public administrations and researchers who are working on blockchain and property conveyancing.
Details
Keywords
Jan-Willem Bullee, Lorena Montoya, Marianne Junger and Pieter Hartel
When security managers choose to deploy a smart lock activation system, the number of units needed and their location needs to be established. This study aims to present the…
Abstract
Purpose
When security managers choose to deploy a smart lock activation system, the number of units needed and their location needs to be established. This study aims to present the results of a penetration test involving smart locks in the context of building security. The authors investigated how the amount of effort an employee has to invest in complying with a security policy (i.e. walk from the office to the smart key activator) influences vulnerability. In particular, the attractiveness of a no-effort alternative (i.e. someone else walking from your office to the key activators to perform a task on your behalf) was evaluated. The contribution of this study relates to showing how experimental psychology can be used to determine the cost-benefit analysis (CBA) of physical building security measures.
Design/methodology/approach
Twenty-seven different “offenders” visited the offices of 116 employees. Using a script, each offender introduced a problem, provided a solution and asked the employee to hand over their office key.
Findings
A total of 58.6 per cent of the employees handed over their keys to a stranger; no difference was found between female and male employees. The likelihood of handing over the keys for employees close to a key activator was similar to that of those who were further away.
Research limitations/implications
The results suggest that installing additional key activators is not conducive to reducing the building’s security vulnerability associated with the handing over of keys to strangers.
Originality/value
No research seems to have investigated the distribution of smart key activators in the context of a physical penetration test. This research highlights the need to raise awareness of social engineering and of the vulnerabilities introduced via smart locks (and other smart systems).
Details
Keywords
Ado Adamou Abba Ari, Olga Kengni Ngangmo, Chafiq Titouna, Ousmane Thiare, Kolyang, Alidou Mohamadou and Abdelhak Mourad Gueroui
The Cloud of Things (IoT) that refers to the integration of the Cloud Computing (CC) and the Internet of Things (IoT), has dramatically changed the way treatments are done in the…
Abstract
The Cloud of Things (IoT) that refers to the integration of the Cloud Computing (CC) and the Internet of Things (IoT), has dramatically changed the way treatments are done in the ubiquitous computing world. This integration has become imperative because the important amount of data generated by IoT devices needs the CC as a storage and processing infrastructure. Unfortunately, security issues in CoT remain more critical since users and IoT devices continue to share computing as well as networking resources remotely. Moreover, preserving data privacy in such an environment is also a critical concern. Therefore, the CoT is continuously growing up security and privacy issues. This paper focused on security and privacy considerations by analyzing some potential challenges and risks that need to be resolved. To achieve that, the CoT architecture and existing applications have been investigated. Furthermore, a number of security as well as privacy concerns and issues as well as open challenges, are discussed in this work.
Details