Webinos is a collective project to make the web work for apllications aiming to design an open source platform and software components for the future Internet in the form of web runtime extensions to enable web services to be used and shared consistently and securely over a broad spectrum of converged and connective devices including mobile, pc, home-media(tv) and in car-units.
In this presentation, Vipul introduces IoT, talks about why he chose IoT and latest trends in that domain. Vipul loves all things related to data and he is interested in data mining for monetization.
CUbRIK tutorial at ICWE 2013: part 1 Introduction to Human ComputationCUbRIK Project
2013, July 8
Part 1 of the tutorial illustrated at ICWE 2013, by Alessandro Bozzon (Delft University of Technology)
Crowdsourcing and human computation are novel disciplines that enable the design of computation processes that include humans as actors for task execution. In such a context, Games With a Purpose are an effective mean to channel, in a constructive manner, the human brainpower required to perform tasks that computers are unable to perform, through computer games. This tutorial introduces the core research questions in human computation, with a specific focus on the techniques required to manage structured and unstructured data. The second half of the tutorial delves into the field of game design for serious task, with an emphasis on games for human computation purposes. Our goal is to provide participants with a wide, yet complete overview of the research landscape; we aim at giving practitioners a solid understanding of the best practices in designing and running human computation tasks, while providing academics with solid references and, possibly, promising ideas for their future research activities.
Computer Science is an ever-changing field with new inventions each day. Here are the latest trends in the field of computer science which are making their mark in this era of digitization.
Source: http://www.techsparks.co.in
This ppt mainly focuses on detailed description of the Internet of Everythinmg (IoE), Evolution of Internet of things (IoE)
Features of IoE,Pillars of IoE, Internet of Things (IoT) and the Internet of Everything (IoE),Similarities between IoT & IoE
Framework: Securing IoE, Application of IoE and i
Future scope of IoE
In this presentation, Vipul introduces IoT, talks about why he chose IoT and latest trends in that domain. Vipul loves all things related to data and he is interested in data mining for monetization.
CUbRIK tutorial at ICWE 2013: part 1 Introduction to Human ComputationCUbRIK Project
2013, July 8
Part 1 of the tutorial illustrated at ICWE 2013, by Alessandro Bozzon (Delft University of Technology)
Crowdsourcing and human computation are novel disciplines that enable the design of computation processes that include humans as actors for task execution. In such a context, Games With a Purpose are an effective mean to channel, in a constructive manner, the human brainpower required to perform tasks that computers are unable to perform, through computer games. This tutorial introduces the core research questions in human computation, with a specific focus on the techniques required to manage structured and unstructured data. The second half of the tutorial delves into the field of game design for serious task, with an emphasis on games for human computation purposes. Our goal is to provide participants with a wide, yet complete overview of the research landscape; we aim at giving practitioners a solid understanding of the best practices in designing and running human computation tasks, while providing academics with solid references and, possibly, promising ideas for their future research activities.
Computer Science is an ever-changing field with new inventions each day. Here are the latest trends in the field of computer science which are making their mark in this era of digitization.
Source: http://www.techsparks.co.in
This ppt mainly focuses on detailed description of the Internet of Everythinmg (IoE), Evolution of Internet of things (IoE)
Features of IoE,Pillars of IoE, Internet of Things (IoT) and the Internet of Everything (IoE),Similarities between IoT & IoE
Framework: Securing IoE, Application of IoE and i
Future scope of IoE
Research Issues, Challenges and Directions in IoT (Internet of Things)Praveen Hanchinal
Presentation focuses on Research Issues, Challenges and Directions in IoT (Internet of Things) at This Presentation was presented at Kongu Engineering College, Erode, India
Application and Usefulness of Internet of Things in Information TechnologyDr. Amarjeet Singh
The Internet of Things (IoT) is a system of
interrelated computing devices, mechanical and digital
machines, objects, animals or people that are provided with
unique identifiers and the ability to transfer data over a
network without requiring human-to-human or human-tocomputer interaction. It is an ambiguous term, but it is fast
becoming a tangible technology that can be applied in data
centers to collect information on just about anything that
IT wants to control. IoT has evolved from the convergence
of wireless technologies, micro-electromechanical systems
(MEMS), microservices and the internet. The convergence
has helped tear down the silo walls between operational
technology (OT) and information technology (IT), allowing
unstructured machine-generated data to be analyzed for
insights that will drive improvements. The Internet of
Things (IoT) is essentially a system of machines or objects
outfitted with data-collecting technologies so that those
objects can communicate with one another. The machineto-machine (M2M) data that is generated has a wide range
of uses, but is commonly seen as a way to determine the
health and status of things -- inanimate or living.
Study on Issues in Managing and Protecting Data of IOTijsrd.com
This paper discusses variety of issues for preserving and managing data produced by IoT. Every second large amount of data are added or updated in the IoT databases across the heterogeneous environment. While managing the data each phase of data processing for IoT data is exigent like storing data, querying, indexing, transaction management and failure handling. We also refer to the problem of data integration and protection as data requires to be fit in single layout and travel securely as they arrive in the pool from diversified sources in different structure. Finally, we confer a standardized pathway to manage and to defend data in consistent manner.
IoT and machine learning - Computational Intelligence conferenceAjit Jaokar
Slides for IoT and Machine learning talk. Sign up at Sign up at www.futuretext.com to get forthcoming copies of papers on IoT and Machine learning, Real time algorithms for IoT and Machine learning algorithms for Smart cities
The slide helps to get an insight on the concepts of Artificial Intelligence.
The topics covered are as follows,
* Concept of AI
* Meaning of AI
* History of AI
* Levels of AI
* Types of AI
* Applications of AI - Agriculture, Health, Business (Emerging market), Education
* AI Tools and Platforms
Now a days we are living in an era of Information Technology where each and every person has to become IT incumbent either intentionally or unintentionally. Technology plays a vital role in our day to day life since last few decades and somehow we all are depending on it in order to obtain maximum benefit and comfort. This new era equipped with latest advents of technology, enlightening world in the form of Internet of Things (IoT). Internet of things is such a specified and dignified domain which leads us to the real world scenarios where each object can perform some task while communicating with some other objects. The world with full of devices, sensors and other objects which will communicate and make human life far better and easier than ever. This paper provides an overview of current research work on IoT in terms of architecture, a technology used and applications. It also highlights all the issues related to technologies used for IoT, after the literature review of research work. The main purpose of this survey is to provide all the latest technologies, their corresponding
trends and details in the field of IoT in systematic manner. It will be helpful for further research.
In the networking field, Internet of Things (IoT) can be referred to technological e-learning advancements. It is seen that through the internet, nowadays it becomes easier to be connected with the real world affairs by being acknowledges about the all-around happenings. Even everyone is aware about communicating with each other all over world. ‘Things’ can be specified as the objects which are connected through internet.Over the internet, the specific kind of interconnection of different things can serve its capability through the information which can be utilized in receiving and sending of evaluated data. It is said to be specialized in almost every field that can be determined in numerous manner for implementing wide range of applications format. Wide ranges can be mentioned aseducation, business, transportation, agriculture, healthcare and management. In a generalized manner, in this article specifically and mainly the discussion is being held over the Internet of Things (IoT). Specific emphasis on E-learning is said to be implemented as a source of information applied for its readers. By the utilization of smart learning as the IOT the smart techniques can also be represented shown by e-learning methods. by Vishal Dineshkumar Soni 2019. IOT connected with e-learning . International Journal on Integrated Education. 2, 5 (Oct. 2019), 273-277. DOI:https://doi.org/10.31149/ijie.v2i5.496. https://journals.researchparks.org/index.php/IJIE/article/view/496/477 https://journals.researchparks.org/index.php/IJIE/article/view/496
IoT: Ongoing challenges and opportunities in Mobile TechnologyAI Publications
Mobile technology opens the door for a new kind of learning called here and now learning that occurs when learners have access to information anytime and anywhere to perform authentic activities in the context of their learning. Mobile devices, applications and services have become integrated into people's daily lives on a personal and professional level. The purpose of this study was to investigate challenges &opportunities of IoT in mobile technology. The paper is divided in 5 sections and the content of the paper covers the history, elements, challenges and opportunities salong with future of IoT specific to Indian Mobile arena.
Internet of Things IoT Meaning, Application and Challengesijtsrd
The idea of making self- communicating devices conceived back in 1999 however it caught attention only after the British Entrepreneur Kevin Ashton christened the term Internet of Things. Since then, many distinguished researchers and other academicians of this domain have been adding significant knowledge on the fundamental concepts of IoT in the form of extensive researches, review papers and visual presentations. Here, in this paper, we are shedding light on the core concepts of Internet of Things. We further examine the potential impact of other existing or establishing technologies on IoT. We are presenting an extensive multi-facet report on the implementation of IoT while addressing many probable challenges that may occur in future. Ibrar Ahmed | Shilpi | Mohammad Amjad "Internet of Things (IoT) Meaning, Application and Challenges" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-6 , October 2018, URL: http://www.ijtsrd.com/papers/ijtsrd18773.pdf
Research Issues, Challenges and Directions in IoT (Internet of Things)Praveen Hanchinal
Presentation focuses on Research Issues, Challenges and Directions in IoT (Internet of Things) at This Presentation was presented at Kongu Engineering College, Erode, India
Application and Usefulness of Internet of Things in Information TechnologyDr. Amarjeet Singh
The Internet of Things (IoT) is a system of
interrelated computing devices, mechanical and digital
machines, objects, animals or people that are provided with
unique identifiers and the ability to transfer data over a
network without requiring human-to-human or human-tocomputer interaction. It is an ambiguous term, but it is fast
becoming a tangible technology that can be applied in data
centers to collect information on just about anything that
IT wants to control. IoT has evolved from the convergence
of wireless technologies, micro-electromechanical systems
(MEMS), microservices and the internet. The convergence
has helped tear down the silo walls between operational
technology (OT) and information technology (IT), allowing
unstructured machine-generated data to be analyzed for
insights that will drive improvements. The Internet of
Things (IoT) is essentially a system of machines or objects
outfitted with data-collecting technologies so that those
objects can communicate with one another. The machineto-machine (M2M) data that is generated has a wide range
of uses, but is commonly seen as a way to determine the
health and status of things -- inanimate or living.
Study on Issues in Managing and Protecting Data of IOTijsrd.com
This paper discusses variety of issues for preserving and managing data produced by IoT. Every second large amount of data are added or updated in the IoT databases across the heterogeneous environment. While managing the data each phase of data processing for IoT data is exigent like storing data, querying, indexing, transaction management and failure handling. We also refer to the problem of data integration and protection as data requires to be fit in single layout and travel securely as they arrive in the pool from diversified sources in different structure. Finally, we confer a standardized pathway to manage and to defend data in consistent manner.
IoT and machine learning - Computational Intelligence conferenceAjit Jaokar
Slides for IoT and Machine learning talk. Sign up at Sign up at www.futuretext.com to get forthcoming copies of papers on IoT and Machine learning, Real time algorithms for IoT and Machine learning algorithms for Smart cities
The slide helps to get an insight on the concepts of Artificial Intelligence.
The topics covered are as follows,
* Concept of AI
* Meaning of AI
* History of AI
* Levels of AI
* Types of AI
* Applications of AI - Agriculture, Health, Business (Emerging market), Education
* AI Tools and Platforms
Now a days we are living in an era of Information Technology where each and every person has to become IT incumbent either intentionally or unintentionally. Technology plays a vital role in our day to day life since last few decades and somehow we all are depending on it in order to obtain maximum benefit and comfort. This new era equipped with latest advents of technology, enlightening world in the form of Internet of Things (IoT). Internet of things is such a specified and dignified domain which leads us to the real world scenarios where each object can perform some task while communicating with some other objects. The world with full of devices, sensors and other objects which will communicate and make human life far better and easier than ever. This paper provides an overview of current research work on IoT in terms of architecture, a technology used and applications. It also highlights all the issues related to technologies used for IoT, after the literature review of research work. The main purpose of this survey is to provide all the latest technologies, their corresponding
trends and details in the field of IoT in systematic manner. It will be helpful for further research.
In the networking field, Internet of Things (IoT) can be referred to technological e-learning advancements. It is seen that through the internet, nowadays it becomes easier to be connected with the real world affairs by being acknowledges about the all-around happenings. Even everyone is aware about communicating with each other all over world. ‘Things’ can be specified as the objects which are connected through internet.Over the internet, the specific kind of interconnection of different things can serve its capability through the information which can be utilized in receiving and sending of evaluated data. It is said to be specialized in almost every field that can be determined in numerous manner for implementing wide range of applications format. Wide ranges can be mentioned aseducation, business, transportation, agriculture, healthcare and management. In a generalized manner, in this article specifically and mainly the discussion is being held over the Internet of Things (IoT). Specific emphasis on E-learning is said to be implemented as a source of information applied for its readers. By the utilization of smart learning as the IOT the smart techniques can also be represented shown by e-learning methods. by Vishal Dineshkumar Soni 2019. IOT connected with e-learning . International Journal on Integrated Education. 2, 5 (Oct. 2019), 273-277. DOI:https://doi.org/10.31149/ijie.v2i5.496. https://journals.researchparks.org/index.php/IJIE/article/view/496/477 https://journals.researchparks.org/index.php/IJIE/article/view/496
IoT: Ongoing challenges and opportunities in Mobile TechnologyAI Publications
Mobile technology opens the door for a new kind of learning called here and now learning that occurs when learners have access to information anytime and anywhere to perform authentic activities in the context of their learning. Mobile devices, applications and services have become integrated into people's daily lives on a personal and professional level. The purpose of this study was to investigate challenges &opportunities of IoT in mobile technology. The paper is divided in 5 sections and the content of the paper covers the history, elements, challenges and opportunities salong with future of IoT specific to Indian Mobile arena.
Internet of Things IoT Meaning, Application and Challengesijtsrd
The idea of making self- communicating devices conceived back in 1999 however it caught attention only after the British Entrepreneur Kevin Ashton christened the term Internet of Things. Since then, many distinguished researchers and other academicians of this domain have been adding significant knowledge on the fundamental concepts of IoT in the form of extensive researches, review papers and visual presentations. Here, in this paper, we are shedding light on the core concepts of Internet of Things. We further examine the potential impact of other existing or establishing technologies on IoT. We are presenting an extensive multi-facet report on the implementation of IoT while addressing many probable challenges that may occur in future. Ibrar Ahmed | Shilpi | Mohammad Amjad "Internet of Things (IoT) Meaning, Application and Challenges" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-6 , October 2018, URL: http://www.ijtsrd.com/papers/ijtsrd18773.pdf
A MIDDLEWARE FOR THE INTERNET OF THINGSIJCNCJournal
The Internet of Things (IoT) connects everyday objects including a vast array of sensors, actuators, and smart devices, referred to as “things” to the Internet, in an intelligent and pervasive fashion. This connectivity gives rise to the possibility of using the tracking capabilities of things to impinge on the location privacy of users. Most of the existing management and location privacy protection solutions do not consider the low-cost and low-power requirements of things; or, they do not account for the heterogeneity, scalability, or autonomy of communications supported in the IoT. Moreover, these traditional solutions do not consider the case where a user wishes to control the granularity of the disclosed information based on
the context of their use (e.g. based on the time or the current location of the user). To fill this gap, a middleware, referred to as the Internet of Things Management Platform (IoT-MP) is proposed in this paper.
Internet of things iot based real time gas leakage monitoring and controllingIAEME Publication
As the majority of the people in India uses Liquefied Petroleum Gas (LPG) as a fuel for
cooking, but in India the technology applied in this field (security) is very less. Liquefied petroleum
gas is a flammable gas, which has the potential to create a hazard. Therefore it is important that the
properties and safe handling of LPG are understood and applied in the domestic and
commercial/industrial situations.
The proposed paper is aimed at developing a prototype that constantly monitors the gas leak
with the help of the electronic sensors. This data is made available real time through real time feeds
over the internet. We intend to use Xively (new platform) to feed real time sensor data over the
internet. The sensor monitors, detects and raises an alarm whenever a gas leak or fire broke out
condition is detected. Then it raised an emergency alarm. The emergency alarm condition can be
handled through proper arrangement and alert message to rescue team, which could be an in house
rescue team. Based on the real time data feed connected to Xively, user can easily look at the history
of data and accurately determine the time and date at which emergency condition occurred. This data
helps in easily locating the root cause of the emergency condition occurred. This data helps in easily
locating the root cause of the emergency condition. So that one can know the complete detail of the
hazard.
Internet of Things: Surveys for Measuring Human Activities from Everywhere IJECEIAES
The internet of things (IoT), also called internet of all, is a new paradigm that combines several technologies such as computers, the internet, sensors network, radio frequency identification (RFID), communication technology and embedded systems to form a system that links the real worlds with digital worlds. With an increase in the deployment of smart objects, the internet of things should have a significant impact on human life in the near future. To understand the development of the IoT, this paper reviews the current research of the IoT, key technologies, the main applications of the IoT in various fields, and identifies research challenges. A main contribution of this review article is that it summarizes the current state of the IoT technology in several areas, and also the applications of IoT that cause side effects on our environment for monitoring and evaluation of the impact of human activity on the environment around us, and also provided an overview of some of the main challenges and application of IoT. This article presents not only the problems and challenges of IoT, but also solutions that help overcome some of the problems and challenges.
The Internet of Things (IoT) is the network of physical objects or "things" embedded with electronics, software, sensors, and network connectivity, which enables these objects to collect and exchange data.
Artificial intelligence in cyber physical systemsPetar Radanliev
The results determine a new hierarchical cascading conceptual framework for analysing the evolution of AI decision-making in cyber physical systems. We argue that such evolution is inevitable and autonomous because of the increased integration of connected devices (IoT) in cyber physical systems. To support this argument, taxonomic methodol- ogy is adapted and applied for transparency and justifications of concepts selection decisions through building summary maps that are applied for designing the hierarchical cascading conceptual framework.
Internet of Things (IoT) integrates billions of the heterogeneous IoT things with the Internet in which the embedded systems such as sensors and actuators linked together to improve quality of life, and becomes the future of technologies in any field of human daily life. These IoT devices cooperate with each other and generate useful information to provide better services and applications to the governments and the society. Also, there is a need to store these data on Cloud for monitoring. This paper, surveys IoT applications, new challenges and issues arise in different fields and provides IoT architecture, focuses on explanation of IoT protocols and their operations and functionalities, presents different microcontroller types used by researchers. With the huge amount of data generated from IoT devices, the integrating Cloud and IoT may helpful, Therefore, a survey on open issues faced when these two concepts integrating together is discussed. The objective of this paper is to provide a survey for everything related to IoT and direct it to all beginners in this filed or academic researchers.
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
# Internet Security: Safeguarding Your Digital World
In the contemporary digital age, the internet is a cornerstone of our daily lives. It connects us to vast amounts of information, provides platforms for communication, enables commerce, and offers endless entertainment. However, with these conveniences come significant security challenges. Internet security is essential to protect our digital identities, sensitive data, and overall online experience. This comprehensive guide explores the multifaceted world of internet security, providing insights into its importance, common threats, and effective strategies to safeguard your digital world.
## Understanding Internet Security
Internet security encompasses the measures and protocols used to protect information, devices, and networks from unauthorized access, attacks, and damage. It involves a wide range of practices designed to safeguard data confidentiality, integrity, and availability. Effective internet security is crucial for individuals, businesses, and governments alike, as cyber threats continue to evolve in complexity and scale.
### Key Components of Internet Security
1. **Confidentiality**: Ensuring that information is accessible only to those authorized to access it.
2. **Integrity**: Protecting information from being altered or tampered with by unauthorized parties.
3. **Availability**: Ensuring that authorized users have reliable access to information and resources when needed.
## Common Internet Security Threats
Cyber threats are numerous and constantly evolving. Understanding these threats is the first step in protecting against them. Some of the most common internet security threats include:
### Malware
Malware, or malicious software, is designed to harm, exploit, or otherwise compromise a device, network, or service. Common types of malware include:
- **Viruses**: Programs that attach themselves to legitimate software and replicate, spreading to other programs and files.
- **Worms**: Standalone malware that replicates itself to spread to other computers.
- **Trojan Horses**: Malicious software disguised as legitimate software.
- **Ransomware**: Malware that encrypts a user's files and demands a ransom for the decryption key.
- **Spyware**: Software that secretly monitors and collects user information.
### Phishing
Phishing is a social engineering attack that aims to steal sensitive information such as usernames, passwords, and credit card details. Attackers often masquerade as trusted entities in email or other communication channels, tricking victims into providing their information.
### Man-in-the-Middle (MitM) Attacks
MitM attacks occur when an attacker intercepts and potentially alters communication between two parties without their knowledge. This can lead to the unauthorized acquisition of sensitive information.
### Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
guildmasters guide to ravnica Dungeons & Dragons 5...
Webinos approach in IOT
1. 1. INTRODUCTION
During the past few years, in the area of wireless communications and networking, a novel
paradigm named the Internet of Things (IoT) which was first introduced by Kevin Ashton in the year
1998, has gained increasingly more attention in the academia and industry. By embedding short-range
mobile transceivers into a wide array of additional gadgets and everyday items, enabling new forms of
communication between people and things, and between things themselves, IoT would add a new
dimension to the world of information and communication.
Unquestionably, the main strength of the IoT vision is the high impact it will have on several
aspects of every-day life and behaviour of potential users. From the point of view of a private user, the
most obvious effects of the IoT will be visible in both working and domestic fields. In this context,
assisted living, smart homes and offices, e-health, enhanced learning is only a few examples of possible
application scenarios in which the new paradigm will play a leading role in the near future. Similarly,
from the perspective of business users, the most apparent consequences will be equally visible in fields
such as automation and industrial manufacturing, logistics, business process management, intelligent
transportation of people and goods.
However, many challenging issues still need to be addressed and both technological as well as
social knots need to be united before the vision of IoT becomes a reality. The central issues are how to
achieve full interoperability between interconnected devices, and how to provide them with a high degree
of smartness by enabling their adaptation and autonomous behaviour, while guaranteeing trust, security,
and privacy of the users and their data. More-over, IoT will pose several new problems concerning issues
related to efficient utilization of resources in low-powered resource constrained objects.
Several industrial, standardization and research bodies are currently involved in the activity of
development of solutions to fulfill the technological requirements of IoT. The objective of this paper is to
provide the reader a comprehensive discussion on the current state of the art of IoT, with particular focus
on what have been done in the areas of protocol, algorithm and system design and development, and what
are the future research and technology trends.
2. Definition: The Internet of Things (IoT) is a computing concept that describes a future where everyday
physical objects will be connected to the Internet and will be able to identify themselves to other devices.
The term is closely identified with RFID as the method of communication, although it could also include
other sensor technologies, other wireless technologies, QR codes, etc.
In the context of “Internet of Things” a “thing” could be defined as a real/physical or digital/virtual
entity that exists and move in space and time and is capable of being identified. Things are commonly
identified either by assigned identification numbers, names and/or location addresses.
The Internet of Things allows people and things to be connected Anytime, Anyplace, with
Anything and Anyone, ideally using Any path/network and Any service.
The IoT has been defined from various different perspectives and hence numerous definitions for
IoT exist in the literature. The reason for apparent fuzziness of the definition stems from the fact that it
is syntactically composed of two terms—Internet and things. The first one pushes towards a network
oriented vision of IoT, while the second tends to move the focus on generic objects to be integrated into
a common framework. However, the terms ‘Internet’ and ‘things’, when put together assume a meaning
which introduces a disruptive level of innovation into the ICT world.
The Internet of Things implies a symbiotic interaction among the real/physical, the digital/virtual
worlds: physical entities have digital counterparts and virtual representation; things become context aware
and they can sense, communicate, interact, exchange, data, information and knowledge.
The sequel of this report is structured as follows: Section 2 explains the literature survey , two
major components in the Internet of Things – Global Sensor Networks and RFID, Three research results
from other fields that we believe are worth investigating for the Internet of Things are introduced and an
analysis of the components in the Internet of Things, their sensitivity to security and privacy, as well as an
analysis of the state in research for topics considered as highly sensitive. In Section 3, Webinos approach
is introduced and detailed on related security and privacy work using Createnotes and Baseline in Section
4. In Section 5,Challenges and future trends are explained. Concluding remarks are given in Section 6.
Future works are mentioned in section 7.
3. 2. LITERATURE SURVEY
In the research communities, IoT has been defined from various different perspectives and hence
numerous definitions for IoT exist in the literature. In fact, IoT semantically means a “world-wide
network of interconnected objects uniquely addressable, based on standard communication protocols” .
This implies that a huge number of possibly heterogeneous objects are involved in the process. In
IoT, unique identification of objects and the representation and storing of exchanged information is the
most challenging issue. This brings the perspective of IoT—semantic perspective.
2.1 Government, Academia and Industry:
Rodrigo Roman , Jianying Zhou , Javier Lopez “ On the features and challenges of security and
privacy in distributed internet of things” Institute for Infocomm Research, ,in Elsevier
journal,Malaga 29071,spain
In this work, the author is of the opinion that, the concept of a distributed IoT is not novel. In
fact, various official documents consider it as one of the possible strategies that can push the dream of the
IoT into the real world, and it has been explicitly mentioned that the development of decentralized
autonomic architectures and the location of intelligence at the very edge of the networks are issues that
need to be addressed. Still, some key questions have been answered to make the most of this strategy in
the real world, such as the specific situations on which the network intelligence should be distributed. In
order to answer these questions, it is necessary to study the specific requirements of applications. For
exam- ple, whether an application needs support for distributed ownership of data. This and other issues
that have been raised by these governmental studies are being carefully considered by the research
community.
There are various research articles that study different instances of distributed IoT architectures.
A.Gómez-Goiri, D. López-de-Ipiña, “On the complementarity of Triple Spaces and the Web of
Things,” in: 2nd International Workshop on Web of Things (WoT’11), San Francisco, USA, 2011.
In this work, the authors Go- mez-Goiri and López-de-Ipiña combine the concept of the web of
things (using web protocols to implement the IoT) with the concept of triple spaces (using semantic web
techniques to exchange knowledge in a distributed local shared space) to create a distributed environment
where devices located in two or more spaces can collaborate with each other through Internet services. In
another example, which follows a more holistic point of view, describe a heterogeneous system known as
U2IoT that comprises two subsystems: Unit IoTs, which are basic local cells that provide solutions for
special applications, and Ubiquitous IoT, which comprises the different Unit IoTs plus other managers
and controls the collaboration between all entities.
4. There are also many research projects funded by various government bodies that, directly or
indirectly, are studying as of 2012 the needs of a distributed IoT architecture. Precisely, one of these
projects, IoT-A, is aiming to provide an architectural reference model for the interoperability of Internet
of Things systems. Note that such a reference architecture does not mandate how all entities
should collaborate, or who should analyze the data and provide the different services.
Still, the communication model provides the foundations for the creation of distributed
applications, allowing digital entities to directly connect and interact with other digital entities.
Moreover, the location of intelligence at the edge of the network is implicitly considered, as digital
entities range from simple devices to abstract entities made up of various distributed devices. Therefore,
its building blocks could be used in the future to create fully distributed IoT applications.
Some concrete building blocks, which can help to build a distributed IoT, have been indirectly
studied in other research projects. For example, the HYDRA project developed an open source
middleware that allows legacy devices to provide web services over the Internet – directly or indirectly.
HYDRA also provides some tools that can be used to enable collaboration, such as a device and service
discovery interface. This interface can make use of anontology to describe the available services,
achieving semantic consistency. Another project, SENSEI, was more focused on providing a consistent
interface to access the services of Wireless Sensor Networks (WSN) islands. But it produced other
relevant results, such as semantically-enabled resource directories, and local management systems that
benefit of the existence of such directories.
Finally, other projects, like CUBIQ and SMARTPRODUCTS, studied and developed various
P2P-based distributed mechanisms, such as a distributed publish/subscribe system and a distributed
storage system.
Beyond theoretical research, there are numerous companies and start-ups that are making use of
cloud technologies to provide IoT services. The key idea is that all edge devices and intranet of things
will send their information periodically to an application platform located in the cloud. This platform
stores all the data and provides specialized API interfaces that can be used by 3rd parties to create their
IoT applications.
There are various approaches for implementing these types of platforms: from closed
environments where even the sensors are controlled by the company to more open platforms that allow
the integration of external devices and databases. Most of these solutions are completely centralized:
edge systems act mainly as data acquisition networks, and application plat- forms from different vendors
are not prepared to interact with each other.
Yet there are some platforms that, pursuing the idea of creating private and hybrid clouds, can be
deployed in a local environment. These platforms not only enable the existence of local intelligence but
5. also can exchange information and services with external systems, thus they can easily become instances
of the distributed IoT.
2.2 Research from other Domains :
The current Internet has failed in many ways to provide adequate security and privacy. We
present three research results that are worth considering in the Internet of Things. We shortly present
these approaches and motivate in investigating them for the use in the Internet of Things.
B. Schneier, Weitzner et al “The Future of Privacy,” Presentation at RSA Conference Europe,
Oct. 2008
In this work, the author describes the concept of “ Information Accountability” relating it to the
concepts in Internet of Things. Since first information systems have been set up and the Web has taken
its way to reach millions of people, the dilemma of privacy in the digital world has begun. Using the
same techniques to protect privacy of people – and maybe the privacy of ‘things’ in the Internet of
Things – will maybe end in the same results: uncontrolled information flow and uncontrolled privacy.
The current large-scale databases storing personal data will get filled up even more in the days of the
Internet of Things and record our every steps.
As Schneier explained we have quite no way of controlling the collection and use of personal
data. Worse, lots of data is linked to personal information – which is often not necessary. All of this data
is collected and stored, but not deleted, which inevitably result in data garbage that goes uncontrolled.
Weitzner et al. present a new concept to privacy which they call Information Accountability
The main principle of information accountability is not to try to prevent the leakage of data – and being
helpless once data leaks – but rather being able to control the usage of the data. Therewith being able to
call persons to account that misuse the data – which is not able with the current concept of privacy that
is based on keeping information secret
G. Montenegro, C. Castelluccia Crypto-based Identifiers(CBIDs): Concepts and Applications.
ACM Transactions on Information and System Security 7(1):97-127 Feb.2004
Here, the authors present a concept which known as “Cryptographic Identifiers” .
Cryptographic Identifiers are used within several newer networking protocols to prove ownership of an
address. The IPv6 Secure Neighbour Discovery (Send), e. g., uses Cryptographically Generated
Addresses to prevent address spoofing, as possible in the Address Resolution Protocol (ARP) used in
LANs. Furthermore, given the large size of Overlay identifiers, the use of Cryptographic Identifiers can
there be used to prove the ownership of ones identifier. The Host Identity Protocol (HIP), e. g., bases its
security highly on Cryptographic Identifiers.
The Cryptographic Identifiers as RFID IDs would enable tags to prove that they really own the
ID. With current RFID solutions mainly deployed in self-contained systems, the need to ownership
6. proof does hardly arise. Having public databases that store all information about a tags and are publicly
queriable, brings up the problem of tag ID spoofing as an attacked can gather all tag information from
the database and then prepare a tag that spoofs its identity as some other tag. Cryptographic Identifiers
can help detect tags that spoof their ID as other tags. Furthermore, the scheme can be deployed for
sensor nodes that take part in an overlay network where identifiers are long enough to use Cryptographic
Identifiers. These nodes can then prove ownership of their identifier. This allows to detect rogue sensors
that spoof as another tag and possible give out corrupted sensing data.
E.Blab, M. Zitterbart. Towards Acceptable Public-Key Encryption in Sensor Networks. In
roceedings of 2nd
Interntional Workshop on Ubiquitous Computing.Pp. 88-93. May 2005
In this work, the authors has given a menthod of solving the Cryptographic Identifiers. These
Cryptographic Identifiers are based on asymmetric-key cryptography and therefore have a large
overhead compared to symmetric-key cryptography in terms of computational power and key-size. As it
has been shown that sensor nodes can be able to perform asymmetric-key cryptography, the use of
Cryptographic Identifiers in sensor nodes is possible. RFID tags are quite some time away from
performing asymmetric-key cryptography, but will eventually be able. Therefore, interesting results are
to arise when using the RFID tags ID in combination with Cryptographic Identifiers.
S. Mathur, W. Trappe, N. Mandayam, C. Ye, A. Reznik. Radio-telepathy: Extracting a Security
Key from an Unauthendicated Wireless Channel. In Proceedings of MobiCom. Pp. 128-139. Sept.
2008
Here, S. Mathur has given an approach for “Key Extraction from Wireless Channel
Characteristics”. As a large part of communication in the Internet of Things will occur over wireless
channels – that are susceptible to eavesdropping – key establishment is necessary to provide confidential
communication.
The work of Mathur et al. provides the establishment of a common cryptographic key for two
users by the use of characteristics of the wireless channel. As the wireless channel characteristics for a
communication context between A and B are the same only for exactly A and B, it is possible to use this
characteristic to extract bits from stochastic processes. These bits can then be used to form a symmetric
cryptographic key. So, A and B independently calculate the same symmetric key for their
communication– solely through the fact that A talks to B and B talks to A. This scheme seems
promising when it comes to wireless communication in the Internet of Things, because (1) it is based
only on symmetric-key cryptography, and (2) it would be expensive to establish key infrastructures or
distribute keys in the Internet of Things that is made up of such large numbers of ‘things’.
7. Fig 2.1: Shows convergence of different visions of IoT
While the perspective of things (shown in figure1) focuses on integrating generic objects into a
common framework, the perspective of ‘Internet’ pushes towards a network-oriented definition.
According to IPSO (IP for Smart Objects) alliance , a forum formed in the year 2008, the IP stack is a
light-weight protocol that already connects a large number of communicating devices and runs on battery-
operated devices.
This guarantees that IP has all the qualities to make IoT a reality. It is likely that through an
intelligent adaptation of IP and by incorporating IEEE 802.15.4 protocol into the IP architecture, and by
adoption of 6LoWPAN, a large-scale deployment of IoT will be a reality.
As mentioned earlier in this section, semantic oriented IoT visions have also been proposed in the
literature . The idea behind this proposition is that the number of items involved in the future Internet is
designed to become extremely high. Therefore, issues pertaining how to represent, store, interconnect,
search, and organize information generated by the IoT will become very challenging. In this context,
semantic technologies will play a key role. in fact, these technologies can exploit appropriate modelling
solutions for things description, reasoning over data generated by IoT, semantic execution environments
and architectures that accommodate IoT requirements and scalable storing and communication
infrastructure .
Marina ruggieri, homayoun nikookar “Internet of Things: Converging Technologies for Smart
Environments and Integrated Ecosystems”,University of Roma “Tor Vergata” Delft University of
Technology,Italy The Netherlands
The authors of Clusterbook 2012, did research on IoT technologies. They clearly stated that the
InternetofThings(IoT) has reached many different players and gained further recognition. Out of the
potential Internet of Things application areas, Smart Cities (and regions), Smart Car and mobility, Smart
8. Home and assisted living, Smart Industries, Public safety, Energy & environmental protection,
Agriculture and Tourism as part of a future IoT Ecosystem (shown in figure2) have acquired high
attention.
Fig 2.2: IoT Ecosystem
As the Internet of Things continues to develop, further potential is estimated by a combination
with related technology approaches and concepts such as Cloud computing, Future Internet, Big Data,
robotics and Semantic technologies. The idea is of course not new as such but becomes now evident as
those related concepts have started to reveal synergies by combining them.
2.3Security And Privacy Issues:
Christoph P. Mayer “ Security and Privacy Challenges in the Internet of Things” Institute of
Telematics Universitat¨ Karlsruhe (TH), Germany
In this work, Mayer explains the IoT categorization which serves as base to detail on the security
and privacy sensitivity in the respective fields. The Internet of Things can be categorized into eight
topics(see figure2.1):
Communication to enable information exchange between devices
Sensors for capturing and representing the physical world in the digital world
Actuators to perform actions in the physical world triggered in the digital world
Storage for data collection from sensors, identification and tracking systems
Devices for interaction with humans in the physical world
Processing to provide data mining and services
Localization and Tracking for physical world location determination and tracking
9. Identification to provide unique physical object identification in the digital world
Fig2.3: Categorization of topics and technologies in the Internet of Things
Rodrigo Roman , Jianying Zhou , Javier Lopez “ On the features and challenges of security and
privacy in distributed internet of things” Institute for Infocomm Research, ,in Elsevier
journal,Malaga 29071,spain
Here, the author presents one of the major challenges that must be overcome in order to push
the Internet of Things into the real world is security. IoT architectures are supposed to deal with an
estimated population of billions of objects, which will interact with each other and with other entities,
such as human beings or virtual entities. And all these interactions must be secured somehow, protecting
the information and service provisioning of all relevant actors and limiting the number of incidents that
will affect the entire IoT.
However, protecting the Internet of Things is a complex and difficult task. The number of
attack vectors available to malicious attackers might become staggering, as global connectivity (‘‘access
anyone’’) and accessibility (‘‘access anyhow, anytime’’) are key tenets of the IoT. The threats that can
affect the IoT entities are numerous, such as at- tacks that target diverse communication channels,
physical threats, denial of service, identity fabrication, and others. Finally, the inherent complexity of the
IoT, where multiple heterogeneous entities located in different con- texts can exchange information with
each other, further complicates the design and deployment of efficient, inter- operable and scalable
10. security mechanisms.
Some of the previously mentioned challenges, alongside with the security mechanisms that
should be integrated into the Internet of Things, have been already enumerated by the research
community. They are as follows:
• Heterogeneity has a great influence over the protocol and network security services that must be
implemented in the IoT. These protocols require credentials, thus optimal key management systems
must be implemented to distribute these credentials and to help in establishing the necessary session
keys between peers.
• The existence of billions of heterogeneous objects also affects identity management. Another
important aspect related to authentication is authorization. If there is no access control whatsoever,
everything will be accessed by everyone, which is neither viable nor realistic.
• The size and heterogeneity of the IoT also affects its trust and governance. There are actually two
dimensions of trust: (a) trust in the interaction between entities, where we have to deal with
uncertainty about the future actions of all collaborating entities, and (b) trust in the system from the
point of view of the user, as users must be able to manage their things so as to not feel under some
unknown external control.
• The number of vulnerable systems and attacks vectors will surely increase in the context of the IoT,
thus fault tolerance becomes essential. Not only we must strive for security by default (robust
implementations, usable systems, etc.) in the IoT, but also we need to develop awareness mechanisms
that can be used to create the foundations of intrusion detection and prevention mechanisms, which
will help IoT entities to protect or even gracefully degrade their services. Finally, recovery services
must be able to locate unsafe zones (i.e. zones affected by attacks) and redirect the functionality of the
systems to other trusted zones.
Rodrigo Roman , Jianying Zhou , Javier Lopez “ On the features and challenges of security and
privacy in distributed internet of things” Institute for Infocomm Research, ,in Elsevier
journal,Malaga 29071,spain
As aforementioned, in order to understand how the different approaches presented in Section
2.3 should be secured in the future, it is firstly necessary to enumerate and analyze the attacker models.
These models have been defined in a way that they can be applied to both centralized and distributed IoT
approaches. Note, however, that the concept of ‘perimeter’ in the Internet of Things is a bit fuzzy: an
attacker can control part of the network, but due to the inherent distributed nature of the IoT, it is nearly
impossible for an attacker to fully control the whole system. As a result, an attacker can be both ‘internal’
and ‘external’ at the same time. These attacker models, categorized by threats, are introduced in the
following paragraph.
11. Denial of service (DoS): There are a wide number of DoS attacks that can be launched against the
IoT. Beyond traditional Internet DoS attacks that exhaust service provider resources and network
bandwidth, the actual wireless communication infrastructure of most data acquisition networks can
also be targeted (e.g. jamming the channels). Malicious internal attackers that take control of part of
the infrastructure can create even more mayhem.
Physical damage: This threat can be seen as a subset of the DoS threat. In this attacker model, active
attackers usually lack technical knowledge, and can only hinder the provisioning of IoT services by
destroying the actual ‘things’. This is a realistic attack in the IoT context, because things might be
easily accessible to anyone (e.g. a street light). If that is not possible, the attacker can simply target the
hardware module in charge of creating the ‘virtual persona’ of the thing.
Eavesdropping: Passive attackers can target various communication channels (e.g. wireless networks,
local wired networks, Internet) in order to extract data from the information flow. Obviously, an
internal attacker that gains access to a particular infrastructure will be able to extract the information
that circulates within that infrastructure.
Node Capture: As aforementioned, things (e.g. household appliances, street lights) are physically
located in a certain environment. Instead of destroying them, an active attacker can try to extract the
information they contain. Note also that, instead of things, active attackers can also target other
infrastructures that store information, such as data processing or data storage entities.
Controlling: As long as there is an attack path, active attackers can try to gain partial or full control
over an IoT entity. The scope of the damage caused by these attackers depends mainly on (a) the
importance of the data managed by that particular entity, (b) the services that are provided by that
particular entity.
However, the Internet of Things is still maturing, in particular due to a number of factors, which
limit the full exploitation of the IoT. Among those factors the following appear to be most relevant:
No clear approach for the utilisation of unique identifiers and numbering spaces for various
kinds of persistent and volatile objects at a global scale.
No accelerated use and further development of IoT reference architectures like for example the
Architecture Reference Model(ARM) of the project IoT-A.
Less rapid advance in semantic interoperability for exchanging sensor information in
heterogeneous environments.
Difficulties in developing a clear approach for enabling innovation, trust and ownership of data in
the IoT while at the same time respecting security and privacy in a complex environment.
Difficulties in developing business which embraces the full potential of the Internet of Things.
12. Overcoming those hurdles would result in a better exploitation of the Internet of Things potential
by a stronger cross-domain interactivity, increased real-world awareness and utilization of an infinite
problem-solving space.
In addition eight new projects from the recent call on SMARTCITIES in the scope of the
European Research Program FP7, including a support and coordination action on technology road-
mapping, will reinforce this year the research and innovation on a safe/reliable and smart Internet of
Things, and complete the direct IoT related funding of 70M in FP7. Furthermore, a project resulting
from a joint call with Japan will explore the potential of combining IoT and Cloud technologies. The
further vision correlated with the IoT is the so called web of things (Webinos). According to this vision of
IoT, web standards are reused to connect and integrate into the web every-day-life objects that contain an
embedded device or computer.
13. 3. PROPOSED SYSTEM
Webinos is a collective project to make the web work for applications. Webinos has a vision to
build a multi-device, applications platform based on web technology that:
allows web apps to run seamlessly across multiple devices and to use resources across devices
allows web applications to communicate with other web applications and (non web components)
over multiple device
links the application experience with the social network
achieves all of the above in a security preserving manner
explicitly targets the four distinct “screens”: the mobile, the PC, the in-car (automotive) and the
home media (TV) devices
The intent in webinos is to translate the success of the web as a distributed document publishing
system into a successful, distributed applications platform.
The webinos platform should be built upon and move forward the required open standards. This
platform should have a concrete implementation that is accessible to all as an open source asset.
Technically, all of this should be achieved reusing the core development technologies that have
already proven themselves on the Web (HTML and JavaScript), affording the benefits of speed of
development and access to a large developer talent pool.
The innovation webinos brings shall not just be technical; by embracing an open web culture, we
hope to create an application framework that does not favour any particular corporation, and on which
may parties can collaborate, and from which many companies benefit.
Webinos approach is an EU-funded approach aiming to define and deliver an Open Source
Platform and software components for the Future Internet in the form of web runtime extensions, to
enable web applications and services to be used and shared consistently and securely over a broad
spectrum of converged and connected devices, including mobile, PC, home media (TV) and in-car units.
By promoting a “single service for every device” vision, webinos will move the existing baseline
of web development from installed applications to services, running consistently across a wide range of
connected devices, ensuring that the technologies for describing, negotiating, securing, utilizing device
functionalities and adapting to context are fit to purpose.
One of the main focuses for Telefónica R&D in webinos approach is to provide SMEs with
innovative tools to help them to work more efficiently. This motivation is aligned with the interests of
different business units at Telefónica for SMEs and several initiatives which have been already launched
such as Wayra and Amérigo.
Benefits provided by webinos platform enabling web applications and services to be used and
14. shared consistently and securely over a broad spectrum of converged and connected devices, Telefónica
R&D is being developing an innovative collaboration tool to be used by SMEs.
Webinos platform provides developers with integrated and powerful tools and interfaces to
create applications able to work in different contexts of use. It is therefore easy to devise a huge range of
possible use cases suitable to use this platform, such as:
A new vision of social networks interaction, i.e., collaboratively writing of “tweets” with the
help of a large TV screen as visualization device and using two or more mobile phones or tabs as
input devices to enter the data through them.
Integrating mobile phone to control the home entertainment, i.e. using the mobile phone to
replace the TV remote control, providing different functionalities such as channel selection.
Device-to-device communication, i.e. using the geolocation capabilities of devices with built-in
GPS to provide another device (such as a camera) with that information.
3.1 Webinos architecture
Webinos architecture (see Figure 3.1) is based on the concept of personal zones. A personal
zone includes all the devices associated to a specific user and it provides a framework for managing all
these devices, together with the services able to run on them.
To enable external access to personal zones as well as managing communications, Webinos
implements a Personal Zone Hub (PZH). The rest of the devices have a Web Runtime (WRT), e.g. a
browser, intended to present the applications, and a Personal Zone Proxy (PZP) that might be connected
to the PZH to offer specific local services to the rest of components of the personal area.
The interaction between devices is implemented through a common discovery service and an
event system. The discovery service is in charge of finding the services offered by remote devices, and
once they have been identified, accessing them through specific APIs. The event system is used for
solving the different communication needs among the applications. An application could either publish
its own events or subscribe to a type of event published by others.
Webinos APIs can be categorized as follows :
Webinos base and generic objects/interfaces: for example, the webinos core module that defines
a common interface which all webinos APIs can be accessed through.
APIs for service discovery and remote access: APIs allowing applications to discover other
devices and services/applications on other devices and on network servers.
Hardware resources APIs: APIs to access information and functionality relating to specific
device hardware such as GPS, camera, microphone, sensors, etc.
15. Application data APIs: application capabilities such as contact items, calendar information,
messages, files, etc.
Communication APIs: APIs allowing applications to communicate with other applications in the
same or another device.
Application execution APIs: in order to let webinos applications to launch other webinos and
native applications.
User profile and context APIs: APIs allowing applications access to user profile data and user
context.
Fig3.1: Webinos architecture overview
16. 4. TOOLS AND TECHNOLOGIES
4.1 Creativenotes :
CreativeNotes has been designed taking advantage of several features of webinos platform,
namely:
Webinos apps are implemented using the most modern web technology (e.g. HTML5 or Javascript),
taking advantage of all the interactive capabilities offered by these technologies. Besides, the User
Interfaces (UIs) developed using webinos are written in standard languages such as HTML5,
making it possible an easy migration to another environments if needed.
Webinos extends the capabilities offered by traditional Web technologies. In this sense, webinos
allows the developers to access to services offered by the devices such as the browsing of own
personal files. On the contrary, this flexibility would not be allowed using HTML5 due to its
security policies.
“A single service for every device" vision. UIs are implemented once, and they are able to run on
several different devices. This vision is extremely useful nowadays, because of the great amount of
existing heterogeneous devices.
Webinos platform offers interesting security features including a policy of access control for APIs,
multi-level authentication modelling and encrypted communication channels. These features are
actually quite useful for the creation of different layers of allowed people & devices able to access
several different personal services (e.g. different teams involved in a creativity/brainstorming
process could access to the services related with a specific creation process).
Furthermore, Webinos API is intended to support the information collection from the users’
perspective (e.g. the temperature to that some food is being boiled, the anxiety level experienced
from the participants in an evaluation session, etc.). Thanks to the incorporation of user’s
perspective, application designed will have a much higher acceptance degree among their users
4.1.1 Creativenotes Application Workflow:
The basic scenario of CreativeNotes(see figure 4.1) consists of a session of creativity or
brainstorming where several participants are involved. The participants would have mobile devices (e.g.
tablets or smart phones) in order to create individually contents through several input modalities such as
voice, photos or videos. Besides the different devices used by the different users involved in the creation
process, there will be a large main screen where certain contents can be sent and it will be used for
sharing ideas among the participants. This main screen would be present in the creation lab and it is not
17. needed that all participants were physically present there, on the contrary, some of them would
contribute remotely to the brainstorming process, but their contributions and ideas will be displayed in
the main screen.
In this scenario, special attention should be paid to the information sharing, the event handling
and the privacy management. The workflow supporting this scenario would be the following:
The information sharing will
contents provided by the different participants. Once a note is sent to the server, it will inform to the
content creator about the resource location (i.e. a URL).
Then, using the event handling mechanisms implemented in the
will let the other participants know about the new provided
would be very important that the content creator could have the possibilit
to be applied. For example, according to a
restricted to only some specific users or group of users.
In the figure, workflow about a simple case of note sharing is represented, showing the different
components and their interactions in the process.
Fig4.1
The workflow would be:
Firstly, the PZP (Personal Zone Proxy) uploads a note into the Web Server
After that, the web server sends back to the PZP a URL for the note previously uploaded.
An event is sent to the PZH (Personal Zone Hub)
The PZH will inform another participants about the just created content
4.2 Implementation of security in Baseline
The following architectural details(see figure 4
needed that all participants were physically present there, on the contrary, some of them would
contribute remotely to the brainstorming process, but their contributions and ideas will be displayed in
In this scenario, special attention should be paid to the information sharing, the event handling
and the privacy management. The workflow supporting this scenario would be the following:
The information sharing will be supported by a web server which will be in charge of storing the
contents provided by the different participants. Once a note is sent to the server, it will inform to the
about the resource location (i.e. a URL).
he event handling mechanisms implemented in the webinos
will let the other participants know about the new provided content and its location
content creator could have the possibility to manage the
to be applied. For example, according to a specific profile, the access to the notifications sent can be
restricted to only some specific users or group of users.
workflow about a simple case of note sharing is represented, showing the different
eir interactions in the process.
.1: Workflow diagram of notes sharing
Firstly, the PZP (Personal Zone Proxy) uploads a note into the Web Server
After that, the web server sends back to the PZP a URL for the note previously uploaded.
An event is sent to the PZH (Personal Zone Hub)
l inform another participants about the just created content
.2 Implementation of security in Baseline
itectural details(see figure 4.2) are a snapshot of current work in progress. The
needed that all participants were physically present there, on the contrary, some of them would
contribute remotely to the brainstorming process, but their contributions and ideas will be displayed in
In this scenario, special attention should be paid to the information sharing, the event handling
and the privacy management. The workflow supporting this scenario would be the following:
which will be in charge of storing the
contents provided by the different participants. Once a note is sent to the server, it will inform to the
webinos platform, the creator
location. At this point, it
y to manage the privacy profile
specific profile, the access to the notifications sent can be
workflow about a simple case of note sharing is represented, showing the different
Firstly, the PZP (Personal Zone Proxy) uploads a note into the Web Server
After that, the web server sends back to the PZP a URL for the note previously uploaded.
are a snapshot of current work in progress. The
18. key technologies are still under development and therefore subject to change. This should, however, give a
strong indication of direction and technology.
Fig4.2: Security implementation in Baseline architecture
The baseline of webinos architecture
current state of the art, this encompasses BONDI, WAC, ChromeOS, HP WebOS, Nokia implementations
and is the most probable implementation for the W3C Widget and DAP specifications.
It resolves all the challenges raised in IoT through
1. A packaging layer for physically distributing the web application, adding descriptive meta data to
the application and embedding identity and least privilege s
2. Web interpretation layer: this maps closely to a chrome
can be found within Webkit or Mozilla code bases. It consists of HMTL interpretation, and
JavaScript interpreted and an obj
including the XHR communication mechanism
3. There exists a policy layer, to mediate security sensitive action. A basic security layer is to be
found in standard browser. This is the policy element that c
inhibit scripts or plugins running on the web runtime. More advanced policy mechanisms are to
be found in widget implementations and extended runtimes. These advanced policy layers will
mediate access to remote networ
development and therefore subject to change. This should, however, give a
strong indication of direction and technology.
: Security implementation in Baseline architecture
webinos architecture - existing and already used today
current state of the art, this encompasses BONDI, WAC, ChromeOS, HP WebOS, Nokia implementations
and is the most probable implementation for the W3C Widget and DAP specifications.
It resolves all the challenges raised in IoT through its four coarse grained conceptual layers:
A packaging layer for physically distributing the web application, adding descriptive meta data to
the application and embedding identity and least privilege security elements to a web application.
Web interpretation layer: this maps closely to a chrome-less web browsing component, such as
can be found within Webkit or Mozilla code bases. It consists of HMTL interpretation, and
JavaScript interpreted and an object model on to key dynamic elements of the web page,
including the XHR communication mechanism
There exists a policy layer, to mediate security sensitive action. A basic security layer is to be
found in standard browser. This is the policy element that can intercept popups, file downloads or
inhibit scripts or plugins running on the web runtime. More advanced policy mechanisms are to
be found in widget implementations and extended runtimes. These advanced policy layers will
mediate access to remote network components (e.g. WARP) on a least privileged basis. Or may
development and therefore subject to change. This should, however, give a
: Security implementation in Baseline architecture
existing and already used today - is informed by the
current state of the art, this encompasses BONDI, WAC, ChromeOS, HP WebOS, Nokia implementations
and is the most probable implementation for the W3C Widget and DAP specifications.
four coarse grained conceptual layers:
A packaging layer for physically distributing the web application, adding descriptive meta data to
ecurity elements to a web application.
less web browsing component, such as
can be found within Webkit or Mozilla code bases. It consists of HMTL interpretation, and
ect model on to key dynamic elements of the web page,
There exists a policy layer, to mediate security sensitive action. A basic security layer is to be
an intercept popups, file downloads or
inhibit scripts or plugins running on the web runtime. More advanced policy mechanisms are to
be found in widget implementations and extended runtimes. These advanced policy layers will
k components (e.g. WARP) on a least privileged basis. Or may
19. implement global (user preferences) on access to sensitive capabilities such a location access or
contacts etc.
4. Finally there exists an extensible framework for adding new and exciting APIs that enhance the
standard web browsing experience.
These layers are copiously documented with respect to current state of the art implementation
in the webinos state of the art analysis documents .
4.3 Relationship to existing initiatives
Webinos does not exist in a vacuum. It explicitly recognises and has a concrete plan to coordinate
with the other bodies and technologies that are relevant to its execution. These include but are not
limited to
W3C HTML5
The HTML5 emergent standards, are one of the foundations upon which webinos is built.
HTML5 itself is a vital part, but insufficient in itself to address all the issues that webinos has identified
as vital for multi device web applications to be successful. webinos will actively feedback
implementation experience on some of the wider multi device problems to the HTML5 working group
to facilitate wider and long term adoption.
W3C DAP
Similarly, the Device APIs and Policy working group, forms one of the principle foundations of
webinos specifically definitions of APIs, but is insufficient in its own right to deliver web applications.
webinos will engage to provide direct implementation feedback to this process as it evolves.
W3C Widgets
The 1.0 widget specifications are complete and form one of the principle cornerstones of a web
application: how to package and secure a web application. To deliver the innovations webinos envisions,
these specifications will have to be enhanced and webinos shall feed into the Widget 2.0 specifications
to make this happen.
WAC (BONDI-JIL)
The WAC specifications, which subsume both the BONDI and JIL specifications, shall be used as a
basis for delivering the first version of the webinos platform.
20. 4.4 Web Technology and Web Foundations:
webinos, is of course based upon pre-existing web standards. In the course of it’s development it
will review and make change recommendations to some of these foundation components. Likely areas
for consideration are:
Widget related:
To attempt to reconcile the use of local JavaScript APIs with access to remotely define web
based APIS. webinos will look to creating common abstractions, delivered as local JavaScript,
but implemented in both remotely and locally, but dealing with the security and performance
optimization issues in sensible ways.
Extending the outreach of a widget to other devices
Provide possibility to make 1:1 installations of web applications/widgets on another device
(transportable widgets) which allows to use an application further on another device (which
might have some special additional features needed by the application)
Partially code outsourcing to another device which only contains code suitable for a given
task, e.g., take a picture or send an SMS (including code created at runtime). Here we could
have an API that allows the creation of widgets on the client site. The newly created widget
can then be installed on other devices where it is executed. Providing the application to
outsource as common web pages may also an approach in conjunction with HTML5 app
cache. However, this may also influences W3C Widget Update over HTTP procedure.
To make dynamically created or statically provided widgets available to other devices we could
provide web server functionality via JavaScript to widgets. Thus widgets could act as common
web server and provide the code exchange/widget download functionality by their own.
Even if we allow very huge payload sizes for the webinos Eventing/Messaging/Notification API
it would not allow streaming communication between widgets. For proper Widget2Widget
communication, especially for streaming data communication, we could provide some kind of
data pipe / socket API to widgets.
With socket and http/web server APIs we would enable web applications to be first class citizens
in the web like native applications.
21. 5. RESULT
Webinos is a powerful but well balanced consortium, bringing together key players (industry and
academia) across the four domains. It currently comprises 22 organisations and secured funding to the
tune of €14 million over 3 years. It is made up from
Mobile Operators: Telecom Italia, Telefonica, Docomo, Deutsche Telekom
Handset/Vehicle Manufacturers: Samsung, Sony Ericson and BMW
Universities: University of Oxford, Instituto Superiore Mario Boella, National Technical
University of Athens, Politecnico di Torino, Technische Universität München, Università di
Catania
Research Insititutes: Fraunhofer-Institute FOKUS, IBBT , TNO
Analyst houses and Consultancies: VisionMobile Futuretext
SME: AmbieSense, Antenna Volantis Systems, Impleo
Standards bodies: W3C
This approach has proved successful, as demonstrated by the number of implementations now
employing it; however, it has been designed with the single application on the single device, connected to
a standard web server in mind.
And this sums up the technical scope of webinos: to build upon the existing foundations of web
applications, and to extend this with the architectural elements necessary
to allow web apps to run seamlessly across multiple devices and to use resources across devices
to allow web applications to communicate with other web applications and (nonweb
components) over multiple device
to link the application experience with the social network
and to do all of this in a security preserving manner.
In the new world of the cloud where provenance of data and applications can be hard to detect,
the fundamentals that bridge the gaps become essential. It is not a insignificant challenge!
So some of the key components through which webinos is achieved are as follows:
22. Webinos Browsers features:
The webinos Platform extends the browser with new capabilities to discover and access services
on other devices whether they are local or remote. This allows your tablet to stream audio to your room's
speakers, or to work in tandem with your TV to enrich the viewing experience with live discussions with
your friends including access to ancillary information, e.g. where to locally get the ingredients for a
cooking program. The webinos Platform enables applications to expose services for other devices to use
through lightweight discovery and connection mechanisms. The browser thus also acts as a server.
Webinos Servers features:
Not all webinos devices will include a browser. Some will instead provide specific services, such
as the room's speakers above. Other roles include communication hubs that bridge different interconnect
technologies; basic sensors and actuators, e.g. to control heating and lighting; media servers, and context
managers. Public servers are needed to support wide scale discovery and access to services, including
establishing P2P communication paths.
webinos creates a world where:
A mobile device runs a web application, e.g. an Electronic Program Guide (EPG) viewer, and the
set-top box runs a web application (also an EPG viewer). But the mobile would like to make use of
the set-top box data, so it must also act as a server providing information to the mobile. This scenario
is not a new one. On Android and iPhone you can find an ecosystem of mobile native applications,
set-top box native applications, and background set-top box servers that deliver this service. The
webinos vision is to bring this basic use case and deliver it all through a single technology, and an
integrated, easy to build web technology. But all of this delivered under a common security model.
A second example shows how, again using web technology, we have a media player a rich HTML5
based application – wants to make use a “dumb device” – a set of speakers. In this scenario the
mobile device runs the master, but using web technology HTTP, can securely connect to and stream
to the speakers, as a webinos server. It is also worth noting here that what makes a webinos browser
is its ability to interpret an execute webinos packaged programming script, and the server is remotely
executable services. We can also fit native applications into this model, which may not be able to
execute webinos script (cannot be the browser) but can expose services, ie act as a server.
A third and final example, simply shows how a classic web server can be thought of as webinos
23. server. webinos service exposure, is little more than a web service or restful interfaces, packed more
effectively. This is the traditional model. However, we can start to see some interesting opportunities
when we enhance the classic server role so that it can act as a browser role also. Interestingly a web
server implemented using node.js has almost all the technical components required to allow it to act
in browser mode.
. Discovery, messaging and identity are three distinct concepts, and are developed as such within
the webinos project .
Download any “remote” application from app-store and you will see this familiar experience
Discovery: usually enter the raw IP address of the set-top box on the mobile phone. If you are lucky,
a local network name will resolve.
Identify: generally the server generates a secret pin that has to be entered manually on the phone,
and this doubles as security (policy) also.
Messaging: is either a custom made asymmetric protocol over HTTP, or a symmetric protocol
implemented over TCP.
However, this is only the start. To succeed webinos must cast its net wider. The long term vision
is to create the webinos foundation, to which organisations can join. This shall be the long term
resourcing model, to evolve and administer the webinos collective assets. In the shorter term the
webinos consortium shall be opening its doors to external parties through two different models:
webinos affiliate program: whereby organisation can apply, get access and contribute to webinos
deliveries, code assets and meetings
Invited expert program: for individuals with profound expertise and vision who wish to
participate and contribute to the work program
24. 6. CONCLUSION
The Internet of Things is quickly coming closer. The incremental deployment of the technologies
that will make up the Internet of Things must not fail what the Internet has failed to do: provide
adequate security and privacy mechanisms from the start. The introduction of e-passports, e. g., has been
pushed by politics into deployment with back then insufficient privacy mechanism. We must be sure that
adequate security and privacy is available before the technology gets deployed and becomes part of our
daily live.
In this report, we presented a categorization of topics and technologies in the Internet of Things
with analysis of sensitivity and state in research to different security and privacy properties. We see this
(1) as a basis for coming up with an integrated systems approach for security and privacy in the Internet
of Things, and (2) as stimulator for discussion on the categorization and sensitivity rating in the Internet
of Things. Furthermore, we presented research in security and privacy for two major technologies in the
Internet of Things – GSN and RFID – and finally pointed out research from other fields that is worth
considering for use in the Internet of Things.
An innovative application running under the Webinos platform has been created to enhance
collaborative working and information sharing.
This application is able to run in different mobile devices and in the ultimate touch-screen
tablets, following the principle of “a single service for every device”.
Given the flexible approach, the application could be adapted to many different domains, making
it possible that SMEs form different business sectors could benefit from the developed architecture and
approach.
25. FUTURE WORK
There are several areas in which further research is needed for making deployment of the
concept of Webinos approach reliable, robust and efficient. Some of the areas are identified in the
following. In identification technology domain, further research is needed in development of new
technologies that address the global ID schemes, identity management, identity encoding/ encryption,
pseudonimity, revocable anonymity, authentication of parties, repository management using
identification, authentication and addressing schemes and the creation of global directory lookup
services and discovery services for webinos applications with various identifier schemes.
In architecture design domain, some of the issues that need attention are: design of distributed
open architecture with end-to-end characteristics, interoperability of heterogeneous systems, neutral
access, clear layering and resilience to physical network disruption, decentralized autonomic
architectures based on peering of nodes etc. In communication protocol domain, the issues that need to
be addressed are: design of energy efficient communication by multi frequency protocol,
communication spectrum and frequency allocation, software defined radios to remove the needs for
hardware upgrades for new protocols, and design of high performance, scalable algorithms and
protocols.
In network technology domain further research is needed on network on chip technology
considering on chip communication architectures for dynamic configurations design time parameterized
architecture with a dynamic routing scheme and a variable number of allowed virtual connections at
each output.
In addition, power-aware network design that turns on and off the links in response to burst and
dips of traffic on demand, scalable communication infrastructures design on chip to dynamically support
the communication among circuit modules based on varying workloads and /or changing constraints are
some of the important research issues.
Security objectives (requirements) were assigned to assets using the CIA (Confidentiality,
Integrity, and Availability) model:
Confidentiality means that the asset (or information about the asset) must only be accessible by
authorized parties.
Integrity means that the asset must not be modifiable; in case of software, it must not deviate
from normal operation.
Availability means that the asset must be ready for use whenever it is needed.
26. webinos is still in its first year. The first batch of use cases, requirements and landscape technology
analysis deliveries has been produced. This is just the first step; a necessary one in order to generate the
consensus and shared vision to help such a diverse community in a common direction. The next 6 -12
months shall be essential in driving forward the technical platform, at a concrete implementation level.
Future measures can be analyzed as follows:
Table: Future technological developments
Development 2012–2015 2016–2020 Beyond 2020
Identification
Technology
• Unified framework for
unique identifiers Open
framework for the IoT
• URIs
• Identity management
• Soft Identities
• Semantics
• Privacy awareness
• “Thing/Object
DNA” identifier
Internet of Things
Architecture
Technology
• IoT 1architecture
developments
architecture in the FI
• Network of networks
architectures
• F-O-T platforms
interoperability
• Adaptive, context based
architectures
• Self- properties
• Cognitive
architectures
• Experimental
architectures
Internet of Things
Infrastructure
• Special purpose IoT
infrastructures
Application specific
deployment Operator
specific deployment
• Integrated IoT
infrastructures
• Multi application
infrastructures
• Multi provider
infrastructures
• Global, general
purpose IoT
infrastructures
• Global discovery
mechanism
27. REFERENCES
[1] E.Blab, M. Zitterbart. “Towards Acceptable Public-Key Encryption in Sensor Networks”. In proceedings
of 2nd
Interntional Workshop on Ubiquitous Computing.Pp. 88-93. May 2005
[2] B. Schneier, The Future of Privacy. Presentation at RSA Conference Europe, Oct. 2008
[3] S. Mathur, W. Trappe, N. Mandayam, C. Ye, A. Reznik. Radio-telepathy: Extracting a Security Key
from an Unauthendicated Wireless Channel. In Proceedings of MobiCom. Pp. 128-139. Sept. 2008
[4] G. Montenegro, C. Castelluccia Crypto-based Identifiers(CBIDs): Concepts and Applications. ACM
Transactions on Information and System Security 7(1):97-127 Feb.2004
[5] Ro4drigo Roman, Jianying Zhou, Javier Lopez:’On the features and challenges of security and privacy
in distributed internet of things’.Institute for Infocomm Research,in Elsevier journal,singapore 2013
[6] Chakib Bekera:’Security and challenges for IOT’,center for development and technologies,in Elsevier
journal,Baba Hassen,Alger,Algeria,2014
[7] Antonio Marcos Alberti,Dhananjaysingh:’Internetofthings:perspectives.challenges and
opportunities’Instituto nacional de telecommunicacoes,MinasGerais,Brazil,Department of Electronics
engineering,south korea
[8] Hui Suo,Jiafu Wan,Caifeng Zou,Jianqi Liu:’Security in the Internet of things’Guangzhou,china
[9] Kevin Ashton: That 'Internet of Things' Thing. In: RFID Journal, 22. Juli 2009. Abgerufen am 8.
April 2011
[10] Tobias Heer,Oscar Garcia-Morchon,Rene Hummen,Sye Loong Keoh,Sandeep S.Kumar and Klaus
Wehrle:’Security challenges in the IP based Internet of things’,In sringer journal,Netherlands
[11] H. Chan, A. Perrig, and D Song. Random key predistribution schemes for sensor networks. In in
Proceedings of the 2003 IEEE Symposium on Security and Privacy, 2003.
[12] Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D Tygar. Spins: Security protocols for sensor networks.
In in Wireless Networks Journal, September 2002, 2002.
[13] R. H. Weber, “Internet of things – new security and privacy challenges,” Computer Law & Security
Review, vol. 26, pp. 23-30, 2010.
[14] J. F. Wan, H. H. Yan, H. Suo, and F. Li, “Advances in cyber-physical systems research,” KSII
Transactions on Internet and Information Systems, 2011, 5(11): 1891-1908.
[15] M. Chen, J. F. Wan, and F. Li, “Machine-to-machine communications: architectures, standards, and
applications,” KSII Transactions on Internet and Information Systems, to appear, January 2012.
[16] G. Yang, J. Xu, W. Chen, Z. H. Qi, and H. Y. Wang, “Security characteristic and technology in the
internet of things,” Journal of Nanjing University of Posts and Telecommunications (Natural Science),
vol. 30, no. 4, Aug 2010.
28. [17] Z. H. Hu, “The research of several key question of internet of things,” in Proc. of 2011 Int. Conf. on
Intelligence Science and Information Engineering, pp. 362-365.
[18] G. Gan, Z. Y. Lu, and J. Jiang, “Internet of Things Security Analysis,” in Proc. of 2011 Int. Conf. on
Internet Technology and Applications (iTAP), Aug. 2011.
[19] M. Langheinrich, “Privacy by design-principles of privacy-aware ubiquitous systems,” In Proc. of
Ubicomp, pp. 273-291, Oct. 2001.
[20] C. P. Mayer, “Security and privacy challenges in the internet of things,” Electronic Communications of
the EASST, vol. 17, 2009.
[21] T. Polk, and S. Turner. “Security challenges for the internet of things,” http://www.iab.org/wp-
content/IAB-uploads/2011/03/Turner.pdf
[22] C. Ding, L. J. Yang, and M. Wu, “Security architecture and key technologies for IoT/CPS”, ZTE
Technology Journal, vol. 17, no. 1, Feb. 2011.
[23] D. Evans. “Internet of Things”, Cisco, white paper, https://www.cisco.com/.../IoT_IBSG_0411FINAL.pdf
(accessed on 5/02/2014)
[24] CERP-IoT Cluster, Visions and Challenges for Realising the Internet of Things, European Commission,
2010.
[25] O. Vermesan, P. Friess, P. Guillemin, S. Gusmeroli, H. Sundmaeker, A. Bassi, I.S. Jubert, M. Mazura, M.
Harrison, M. Eisenhauer, P. Doody, Internet of Things Strategic Research Roadmap, Cluster of
European Research Projects on the Internet of Things, CERP-IoT, 2011.
[26] Gómez-Goiri, D. López-de-Ipiña, On the complementarity of Triple Spaces and the Web of Things, in:
2nd International Workshop on Web of Things (WoT’11), San Francisco, USA, 2011.
[27] H. Ning, H. Liu, Cyber-physical-social based security architecture for future internet of things, Advances
in Internet of Things 2 (1) (2012) 1–7.
[28] Cisco: Over 50 billions of devices connected to Internet http://blogs.cisco.com/news/the-internet-of-
things-infographic/
[29] “Telefónica bets on tech with venture capital” Amérigo related news. Accessible at:
http://in.reuters.com/article/2012/09/04/telefonica-venture- capital-idINL6E8K42TB20120904
[30] Grief I. (Ed) 'Computer Supported Cooperative Work: A Book of Readings', Morgan Kaufmann
Publishers, San Mateo CA., 1988, ISBN 0-934613-57-5.
[31] H. Sundmaeker, P. Guillemin, P Friess, S. Woelfflé–Cerp‐IoT: Vision and Challenges for Realising the
Internet of Things, 2010 (http://www.grifs‐project.eu/data/File/CERP‐ IoT%20SRA_IoT_v11.pdf)
[32] Website: http://www.webinos.org