Security, Data Analytics, and Energy-Aware Solutions in the IoT最新文献

筛选
英文 中文
Brain-Computer Interface 脑机接口
Security, Data Analytics, and Energy-Aware Solutions in the IoT Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-7323-5.ch010
Anthony Triche, Md Abdullah Al Momin
{"title":"Brain-Computer Interface","authors":"Anthony Triche, Md Abdullah Al Momin","doi":"10.4018/978-1-7998-7323-5.ch010","DOIUrl":"https://doi.org/10.4018/978-1-7998-7323-5.ch010","url":null,"abstract":"Launched in 2017 to widespread publicity due to the involvement of tech magnate and outspoken futurist Elon Musk, Neuralink Corp. aims to develop an advanced brain-computer interface (BCI) platform capable of assisting in the treatment of serious neurological conditions with longer-term goals of approaching transhumanism through nonmedical human enhancement to enable human-machine “symbiosis with artificial intelligence.” The first published description of a complete prototype Neuralink system, detailed by Muskin the company's only white paper to date, describes a closed-loop, invasive BCI architecture with an unprecedented magnitude of addressable electrodes. Invasive BCI systems require surgical implantation to allow for directly targeted capture and/or stimulation of neural spiking activity in functionally associated clusters of neurons beneath the surface of the cortex.","PeriodicalId":137552,"journal":{"name":"Security, Data Analytics, and Energy-Aware Solutions in the IoT","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115594966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Named Data Networking for Internet of Things Search Engines 面向物联网搜索引擎的命名数据网络
Security, Data Analytics, and Energy-Aware Solutions in the IoT Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-7323-5.ch001
Hengshuo Liang, Lauren Burgess, Weixian Liao, Chao Lu, Wei Yu
{"title":"Towards Named Data Networking for Internet of Things Search Engines","authors":"Hengshuo Liang, Lauren Burgess, Weixian Liao, Chao Lu, Wei Yu","doi":"10.4018/978-1-7998-7323-5.ch001","DOIUrl":"https://doi.org/10.4018/978-1-7998-7323-5.ch001","url":null,"abstract":"The advance of internet of things (IoT) techniques enables a variety of smart-world systems in energy, transportation, home, and city infrastructure, among others. To provide cost-effective data-oriented service, internet of things search engines (IoTSE) have received growing attention as a platform to support efficient data analytics. There are a number of challenges in designing efficient and intelligent IoTSE. In this chapter, the authors focus on the efficiency issue of IoTSE and design the named data networking (NDN)-based approach for IoTSE. To be specific, they first design a simple simulation environment to compare the IP-based network's performance against named data networking (NDN). They then create four scenarios tailored to study the approach's resilience to address network issues and scalability with the growing number of queries in IoTSE. They implement the four scenarios using ns-3 and carry out extensive performance evaluation to determine the efficacy of the approach concerning network resilience and scalability. They also discuss some remaining issues that need further research.","PeriodicalId":137552,"journal":{"name":"Security, Data Analytics, and Energy-Aware Solutions in the IoT","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122543069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Handwritten Signature Spoofing With Conditional Generative Adversarial Nets 条件生成对抗网络的手写签名欺骗
Security, Data Analytics, and Energy-Aware Solutions in the IoT Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-7323-5.ch006
Md Fazle Rabby, Md Abdullah Al Momin, X. Hei
{"title":"Handwritten Signature Spoofing With Conditional Generative Adversarial Nets","authors":"Md Fazle Rabby, Md Abdullah Al Momin, X. Hei","doi":"10.4018/978-1-7998-7323-5.ch006","DOIUrl":"https://doi.org/10.4018/978-1-7998-7323-5.ch006","url":null,"abstract":"Generative adversarial networks have been a highly focused research topic in computer vision, especially in image synthesis and image-to-image translation. There are a lot of variations in generative nets, and different GANs are suitable for different applications. In this chapter, the authors investigated conditional generative adversarial networks to generate fake images, such as handwritten signatures. The authors demonstrated an implementation of conditional generative adversarial networks, which can generate fake handwritten signatures according to a condition vector tailored by humans.","PeriodicalId":137552,"journal":{"name":"Security, Data Analytics, and Energy-Aware Solutions in the IoT","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122474348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Survey of Automotive Cyber-Physical System Security 汽车信息物理系统安全研究
Security, Data Analytics, and Energy-Aware Solutions in the IoT Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-7323-5.ch005
Michael Arienmughare, Andrew S. Yoshimura, Md Abdullah Al Momin
{"title":"Survey of Automotive Cyber-Physical System Security","authors":"Michael Arienmughare, Andrew S. Yoshimura, Md Abdullah Al Momin","doi":"10.4018/978-1-7998-7323-5.ch005","DOIUrl":"https://doi.org/10.4018/978-1-7998-7323-5.ch005","url":null,"abstract":"This chapter will provide a survey on cyber-physical systems security related to automobiles. In modern vehicles, there has been discussion on how automobiles fit into the world of cyber-physical systems, considering their interaction with both the cyber and physical worlds and interconnected systems. With many modern vehicles being connected to the outside world, there are many vulnerabilities introduced. Modern cars contain many electronic control units and millions of lines of code, which, if compromised, could have fatal consequences. Interfaces to the outside world (e.g., in-vehicle infotainment) may be used as a vector to attack these critical components.","PeriodicalId":137552,"journal":{"name":"Security, Data Analytics, and Energy-Aware Solutions in the IoT","volume":"166 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114912325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Attacks on Voice Assistant Systems 对语音助理系统的攻击
Security, Data Analytics, and Energy-Aware Solutions in the IoT Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-7323-5.ch004
Jie Lien, Md Abdullah Al Momin, Xu Yuan
{"title":"Attacks on Voice Assistant Systems","authors":"Jie Lien, Md Abdullah Al Momin, Xu Yuan","doi":"10.4018/978-1-7998-7323-5.ch004","DOIUrl":"https://doi.org/10.4018/978-1-7998-7323-5.ch004","url":null,"abstract":"Voice assistant systems (e.g., Siri, Alexa) have attracted wide research attention. However, such systems could receive voice information from malicious sources. Recent work has demonstrated that the voice authentication system is vulnerable to different types of attacks. The attacks are categorized into two main types: spoofing attacks and hidden voice commands. In this chapter, how to launch and defend such attacks is explored. For the spoofing attack, there are four main types, such as replay attacks, impersonation attacks, speech synthesis attacks, and voice conversion attacks. Although such attacks could be accurate on the speech recognition system, they could be easily identified by humans. Thus, the hidden voice commands have attracted a lot of research interest in recent years.","PeriodicalId":137552,"journal":{"name":"Security, Data Analytics, and Energy-Aware Solutions in the IoT","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132138183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Deep Learning Approach for Protecting Voice-Controllable Devices From Laser Attacks 保护声控设备免受激光攻击的深度学习方法
Security, Data Analytics, and Energy-Aware Solutions in the IoT Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-7323-5.ch008
Vijay Srinivas Tida, Raghabendra Shah, X. Hei
{"title":"Deep Learning Approach for Protecting Voice-Controllable Devices From Laser Attacks","authors":"Vijay Srinivas Tida, Raghabendra Shah, X. Hei","doi":"10.4018/978-1-7998-7323-5.ch008","DOIUrl":"https://doi.org/10.4018/978-1-7998-7323-5.ch008","url":null,"abstract":"The laser-based audio signal injection can be used for attacking voice controllable systems. An attacker can aim an amplitude-modulated light at the microphone's aperture, and the signal injection acts as a remote voice-command attack on voice-controllable systems. Attackers are using vulnerabilities to steal things that are in the form of physical devices or the form of virtual using making orders, withdrawal of money, etc. Therefore, detection of these signals is important because almost every device can be attacked using these amplitude-modulated laser signals. In this project, the authors use deep learning to detect the incoming signals as normal voice commands or laser-based audio signals. Mel frequency cepstral coefficients (MFCC) are derived from the audio signals to classify the input audio signals. If the audio signals are identified as laser signals, the voice command can be disabled, and an alert can be displayed to the victim. The maximum accuracy of the machine learning model was 100%, and in the real world, it's around 95%.","PeriodicalId":137552,"journal":{"name":"Security, Data Analytics, and Energy-Aware Solutions in the IoT","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127350408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Teleoperated Surgical Robot Security 远程手术机器人安全
Security, Data Analytics, and Energy-Aware Solutions in the IoT Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-7323-5.ch009
Md Abdullah Al Momin, Md. Nazmul Islam
{"title":"Teleoperated Surgical Robot Security","authors":"Md Abdullah Al Momin, Md. Nazmul Islam","doi":"10.4018/978-1-7998-7323-5.ch009","DOIUrl":"https://doi.org/10.4018/978-1-7998-7323-5.ch009","url":null,"abstract":"Technology has greatly increased the availability of medical procedures in remote locations that are difficult to access, such as battlefields. Teleoperated surgical robots can be used to perform surgeries on patients over the internet in remote locations. A surgeon can remotely operate the robot to perform a procedure in another room or in a different continent. However, security technology has not yet caught up to these cyber-physical devices. There exist potential cybersecurity attacks on these medical devices that could expose a patient to danger in contrast to traditional surgery. Hence, the security of the system is very important. A malicious actor can gain control of the device and potentially threaten the life of a patient. In this chapter, the authors conduct a survey of potential attack vectors a malicious actor could exploit to deny service to the device, gain control of the device, and steal patient data. Furthermore, after the vulnerability analysis, the authors provide mitigation techniques to limit the risk of these attack vectors.","PeriodicalId":137552,"journal":{"name":"Security, Data Analytics, and Energy-Aware Solutions in the IoT","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123628194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Medical Device Security 医疗设备安全
Security, Data Analytics, and Energy-Aware Solutions in the IoT Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-7323-5.ch011
Md Abdullah Al Momin
{"title":"Medical Device Security","authors":"Md Abdullah Al Momin","doi":"10.4018/978-1-7998-7323-5.ch011","DOIUrl":"https://doi.org/10.4018/978-1-7998-7323-5.ch011","url":null,"abstract":"Implantable medical devices (IMDs) are miniaturized computer systems used to monitor and treat various medical conditions. Examples of IMDs include insulin pumps, artificial pacemakers, neuro-stimulators, and implantable cardiac defibrillators. These devices have adopted wireless communication to help facilitate the care they provide for patients by allowing easier transferal of data or remote control of machine operations. However, with such adoption has come exposure to various security risks and issues that must be addressed due to the close relation of patient health and IMD performance. With patient lives on the line, these security risks pose increasingly real problems. This chapter hopes to provide an overview of these security risks, their proposed solutions, and the limitations on IMD systems which make solving these issues nontrivial. Later, the chapter will analyze the security issues and the history of vulnerabilities in pacemakers to illustrate the theoretical topics by considering a specific device.","PeriodicalId":137552,"journal":{"name":"Security, Data Analytics, and Energy-Aware Solutions in the IoT","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123054169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Internet of Things From a Legal Perspective 法律视角下的物联网
Security, Data Analytics, and Energy-Aware Solutions in the IoT Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-7323-5.ch002
Sidi Mohamed Sidi Ahmed
{"title":"The Internet of Things From a Legal Perspective","authors":"Sidi Mohamed Sidi Ahmed","doi":"10.4018/978-1-7998-7323-5.ch002","DOIUrl":"https://doi.org/10.4018/978-1-7998-7323-5.ch002","url":null,"abstract":"The internet of things (IoT) is one of successive technological waves that could have great impact on different aspects of modern life. It is being used in transport, smart grids, healthcare, environmental monitoring, logistics, as well as for processing pure personal data through a fitness tracker, wearable medical device, smartwatch, smart clothing, wearable camera, and so forth. From a legal viewpoint, processing personal data has to be done in accordance with rules of data protection law. This law aims to protect data from collection to retention. It usually applies to the processing of personal data that identifies or can identify a specific natural person. Strict adherence to this law is necessary for protecting personal data from being misused and also for promoting the IoT industry. This chapter discusses the applicability of the data protection law to IoT and the consequences of non-compliance with this law. It also provides recommendations on how to effectively comply with the data protection law in the IoT environment.","PeriodicalId":137552,"journal":{"name":"Security, Data Analytics, and Energy-Aware Solutions in the IoT","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132615097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Generating Device Fingerprints for Smart Device Pairing Using the Unique Spectrum Characteristic From LEDs 利用led独特的频谱特性为智能设备配对生成设备指纹
Security, Data Analytics, and Energy-Aware Solutions in the IoT Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-7323-5.ch007
Md Imran Hossen, Md Abdullah Al Momin, X. Hei
{"title":"Generating Device Fingerprints for Smart Device Pairing Using the Unique Spectrum Characteristic From LEDs","authors":"Md Imran Hossen, Md Abdullah Al Momin, X. Hei","doi":"10.4018/978-1-7998-7323-5.ch007","DOIUrl":"https://doi.org/10.4018/978-1-7998-7323-5.ch007","url":null,"abstract":"Currently, the vast majority of smart devices with LEDs are on the rise. It has been observed that the lights emitted by each LED have unique spectral characteristics. Despite the fact that there are a number of methods out there to generate fingerprints, none seem to explore the possibility of generating fingerprints using this unique feature. In this chapter, the method to perform device fingerprinting using the unique spectrum emitted from the LED lights is discussed. The generated fingerprint is then used in device pairing.","PeriodicalId":137552,"journal":{"name":"Security, Data Analytics, and Energy-Aware Solutions in the IoT","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121444161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信