scholarly journals P4UIoT: Pay-Per-Piece Patch Update Delivery for IoT Using Gradual Release

Sensors ◽  
2020 ◽  
Vol 20 (7) ◽  
pp. 2156
Author(s):  
Nachiket Tapas ◽  
Yechiav Yitzchak ◽  
Francesco Longo ◽  
Antonio Puliafito ◽  
Asaf Shabtai

P 4 UIoT—pay-per-piece patch update delivery for IoT using gradual release—introduces a distributed framework for delivering patch updates to IoT devices. The framework facilitates distribution via peer-to-peer delivery networks and incentivizes the distribution operation. The peer-to-peer delivery network reduces load by delegating the patch distribution to the nodes of the network, thereby protecting against a single point of failure and reducing costs. Distributed file-sharing solutions currently available in the literature are limited to sharing popular files among peers. In contrast, the proposed protocol incentivizes peers to distribute patch updates, which might be relevant only to IoT devices, using a blockchain-based lightning network. A manufacturer/owner named vendor of the IoT device commits a bid on the blockchain, which can be publicly verified by the members of the network. The nodes, called distributors, interested in delivering the patch update, compete among each other to exchange a piece of patch update with cryptocurrency payment. The pay-per-piece payments protocol addresses the problem of misbehavior between IoT devices and distributors as either of them may try to take advantage of the other. The pay-per-piece protocol is a form of a gradual release of a commodity like a patch update, where the commodity can be divided into small pieces and exchanged between the sender and the receiver building trust at each step as the transactions progress into rounds. The permissionless nature of the framework enables the proposal to scale as it incentivizes the participation of individual distributors. Thus, compared to the previous solutions, the proposed framework can scale better without any overhead and with reduced costs. A combination of the Bitcoin lightning network for cryptocurrency incentives with the BitTorrent delivery network is used to present a prototype of the proposed framework. Finally, a financial and scalability evaluation of the proposed framework is presented.

2020 ◽  
Vol 10 (19) ◽  
pp. 6744
Author(s):  
Elizabeth Nathania Witanto ◽  
Yustus Eko Oktian ◽  
Sang-Gon Lee ◽  
Jin-Heung Lee

As the usage growth rate of Internet of Things (IoT) devices is increasing, various issues related to these devices need attention. One of them is the distribution of the IoT firmware update. The IoT devices’ software development does not end when the manufacturer sells the devices to the market. It still needs to be kept updated to prevent cyber-attacks. The commonly used firmware update process, over-the-air (OTA), mostly happens in a centralized way, in which the IoT devices directly download the firmware update from the manufacturer’s server. This central architecture makes the manufacturer’s server vulnerable to single-point-of-failure and latency issues that can delay critical patches from being applied to vulnerable devices. The Open Connectivity Foundation (OCF) is one organization contributing to providing interoperability services for IoT devices. In one of their subject areas, they provide a firmware update protocol for IoT devices. However, their firmware update process does not ensure the integrity and security of the patches. In this paper, we propose a blockchain-based OCF firmware update for IoT devices. Specifically, we introduce two types of firmware update protocol, direct and peer-to-peer updates, integrated into OCF firmware update specifications. In the direct scenario, the device, through the IoT gateway, can download the new firmware update from the manufacturer’s server. Meanwhile, in the peer-to-peer scheme, the device can query the update from the nearby gateways. We implemented our protocol using Raspberry Pi hardware and Ethereum-based blockchain with the smart contracts to record metadata of the manufacturer’s firmware updates. We evaluated the proposed system’s performance by measuring the average throughput, the latency, and the firmware update distribution’s duration. The analysis results indicate that our proposal can deliver firmware updates in a reasonable duration, with the peer-to-peer version having a faster completion time than the direct one.


2019 ◽  
Vol 28 (20) ◽  
pp. S21-S26
Author(s):  
Leanne Atkin ◽  
Alison Schofield ◽  
Anita Kilroy-Findley

Regardless of the amount of literature and evidence on leg ulcer management, there are still significant variations in treatment. Implementing a standardised leg ulcer pathway to ensure patients are appropriately and timely assessed could help reduce nursing time and overall costs, while improving healing outcomes and patients' quality of life. Such a pathway was introduced in Lincolnshire and Leicestershire, UK, to treat venous leg ulcers (VLUs). The results showed improved healing times, reduced costs and fewer nurse visits, among other findings.


Stroke ◽  
2016 ◽  
Vol 47 (suppl_1) ◽  
Author(s):  
Corey R Fehnel ◽  
Linda C Wendell ◽  
N. Stevenson Potter ◽  
Kimberly Glerum ◽  
Richard N Jones ◽  
...  

Background: There is little data to support level of care decisions for lower risk intracerebral hemorrhage (ICH) patients. The addition of a dedicated stroke unit (SU) at our institution allowed for a comparison of such patients cared for in the intensive care unit (ICU) or SU. We hypothesized that SU care of select ICH patients would not change functional outcome, and result in reduced costs. Methods: Two retrospective cohorts of consecutive patients with small (<20 cc) supratentorial ICH and the absence of anticoagulation were enrolled. In the first study period from August 1, 2008 to February 1, 2011, patients were admitted to the neurological or medical ICU (historical control). In the second study period from August 1, 2012 to January 30, 2014, patients were admitted to a dedicated SU. Intubated patients, those requiring vasopressors, osmotic therapy, or ventriculostomy were excluded. Primary outcomes were discharge modified Rankin Score (mRS) and total hospital charges. Multivariate analyses were used for predicting mRS and early complications. Results: There were 104 patients included in the analysis (41 ICU, 63 SU). Mean age, gender and race did not differ significantly between groups. Mean ICH volume was 6cc in the SU group and 8cc in the ICU group (P>.05). Prior antiplatelet use, ICH location, and ICH score did not differ between groups. Intraventricular hemorrhage and hydrocephalus were more common in the ICU group (P<.001). Two SU patients transferred to the ICU for pneumonia and acute myocardial infarction. There were no significant differences in complications such as ICH expansion, use of osmotic therapy, seizures, or pneumonia. There was no difference in discharge mRS between groups (P>.05). Median hospital length of stay was 6 days in the ICU group and 3 days in SU group (P<.001). Median direct costs for the ICU group were $5,859 (IQR 4,782-9,733) and were $4,078 (IQR 2,861-6,865) for the SU group (P<.001). Unit of admission was not a significant predictor of early complication (P=.73) or discharge mRS (P=.43) in multivariate analysis. Conclusions: This preliminary retrospective study provides support for select low-risk ICH patients to be safely cared for in a lower intensity setting with potential for reducing costs.


Sensors ◽  
2018 ◽  
Vol 18 (8) ◽  
pp. 2664 ◽  
Author(s):  
Luis Belem Pacheco ◽  
Eduardo Pelinson Alchieri ◽  
Priscila Mendez Barreto

The use of Internet of Things (IoT) is rapidly growing and a huge amount of data is being generated by IoT devices. Cloud computing is a natural candidate to handle this data since it has enough power and capacity to process, store and control data access. Moreover, this approach brings several benefits to the IoT, such as the aggregation of all IoT data in a common place and the use of cloud services to consume this data and provide useful applications. However, enforcing user privacy when sending sensitive information to the cloud is a challenge. This work presents and evaluates an architecture to provide privacy in the integration of IoT and cloud computing. The proposed architecture, called PROTeCt—Privacy aRquitecture for integratiOn of internet of Things and Cloud computing, improves user privacy by implementing privacy enforcement at the IoT devices instead of at the gateway, as is usually done. Consequently, the proposed approach improves both system security and fault tolerance, since it removes the single point of failure (gateway). The proposed architecture is evaluated through an analytical analysis and simulations with severely constrained devices, where delay and energy consumption are evaluated and compared to other architectures. The obtained results show the practical feasibility of the proposed solutions and demonstrate that the overheads introduced in the IoT devices are worthwhile considering the increased level of privacy and security.


Sensors ◽  
2020 ◽  
Vol 20 (3) ◽  
pp. 945 ◽  
Author(s):  
Rafael Torres Moreno ◽  
Jorge Bernal Bernabe ◽  
Jesús García Rodríguez ◽  
Tore Kasper Frederiksen ◽  
Michael Stausholm ◽  
...  

Privacy enhancing technologies (PETs) allow to achieve user’s transactions unlinkability across different online Service Providers. However, current PETs fail to guarantee unlinkability against the Identity Provider (IdP), which becomes a single point of failure in terms of privacy and security, and therefore, might impersonate its users. To address this issue, OLYMPUS EU project establishes an interoperable framework of technologies for a distributed privacy-preserving identity management based on cryptographic techniques that can be applied both to online and offline scenarios. Namely, distributed cryptographic techniques based on threshold cryptography are used to split up the role of the Identity Provider (IdP) into several authorities so that a single entity is not able to impersonate or track its users. The architecture leverages PET technologies, such as distributed threshold-based signatures and privacy attribute-based credentials (p-ABC), so that the signed tokens and the ABC credentials are managed in a distributed way by several IdPs. This paper describes the Olympus architecture, including its associated requirements, the main building blocks and processes, as well as the associated use cases. In addition, the paper shows how the Olympus oblivious architecture can be used to achieve privacy-preserving M2M offline transactions between IoT devices.


Electronics ◽  
2020 ◽  
Vol 9 (10) ◽  
pp. 1610 ◽  
Author(s):  
Li-Yuan Hou ◽  
Tsung-Yi Tang ◽  
Tyng-Yeu Liang

BitTorrent (BT) is the most popular peer-to-peer file-sharing system. According to official BT information, more than 100 million active users use BT for file transfers every month. However, BT mainly relies on either a central tracker (tracker) or distributed hash table (DHT) for locating file seeders while it runs a risk of a single point of failure or cyber-attacks such as Sybil and Eclipses. To attack this problem, we proposed a Peer-to-Peer (P2P) file-sharing system called IOTA-BT by integrating BitTorrent with IOTA in this paper. The advantages of IOTA over blockchain include scalability for high throughput, compatibility with Internet of Things (IoT) footprints, zero transaction fees, partition-tolerant, and quantum-resistant cryptography. The autopeering and neighbor selection of the Coordicide of IOTA is aimed at defending a Sybil or Eclipse attack. IOTA-BT inherits these advantages from IOTA. Moreover, our experimental results have shown that the cost of executing BT functions, such as releasing torrent files and retrieving seeder information on IOTA-BT, is acceptable for improving the security of BT. IOTA-BT can indeed efficiently provide users with a P2P file-sharing environment of higher security.


recent experienceindicates that mobile and connected devices are increasingly becoming a key enabler of advanced services and applications. Specifically in the case of the enterprise, they represent a land of opportunities to grow in efficiency and quality with reduced costs and time-to-market. However, mobile and IoT also exposes enterprises to new challenges, such as security and safety risks, scale, heterogeneity, resources constraints, or context fluctuations. This paper introduces an evaluation framework that elicits the needed capabilities to enroll, control, and manage mobile and IoT devices, towards properly integrating them with the organization workflow, in accordance with internal policies. To demonstrate the usability of the framework, the paper presents a comprehensive review of Enterprise Mobility Management (EMM) and Unified Endpoint Management (UEM) solutions. A preliminary evaluation is conducted with various companies to prove the framework’s relevance, ease of use and completeness.


2021 ◽  
Author(s):  
Bawankar Chetan D ◽  
Sanjeev Kumar Sharma

The paper aims to clarify the relationship between Internet-of-Things devices and Ethereum blockchain. It proposes the arrangement to ensure information transmission among parties in an open system of IoT must be secure using Ethereum. The accompanying joining strategy utilized terminal gadgets as system innovation and Ethereum blockchain stage that delivered back-end, which guarantees high security, accessibility, and protection, supplanting conventional back-end frameworks. The following issues should be considered to prevent the malicious hub from attacking, resist distributed denial-of-service attacks, and prevent firmware backdoor access. This paper proposed a system in which the Peer-to-Peer authentication model, where every IoT node in the system must be authenticated and verified by the proposed framework. The paper provides empirical insights into IoT nodes manufactured in bulk, and they are remaining with their default username and password.


Sign in / Sign up

Export Citation Format

Share Document