scholarly journals Blockchain-Based Secure Device Management Framework for an Internet of Things Network in a Smart City

2019 ◽  
Vol 11 (14) ◽  
pp. 3889 ◽  
Author(s):  
Seonghyeon Gong ◽  
Erzhena Tcydenova ◽  
Jeonghoon Jo ◽  
Younghun Lee ◽  
Jong Hyuk Park

The broadly configured smart city network requires a variety of security considerations for a heterogeneous device environment. Because a network of heterogeneous devices facilitates an attacker’s intrusion through a specific device or node, a device management framework is required to manage each node comprehensively. This paper proposes a blockchain-based device management framework for efficient device management, scalable firmware update and resiliences on attacks against smart city network. This framework offers four device management and firmware update mechanisms based on the performance and requirements of each device: bidirectional mechanism of general end node and a unidirectional mechanism of the lightweight end node. This difference optimizes the resource of network and devices in terms of management and security. All management history of each device is stored in the blockchain and transmitting firmware between vendor and management node is conducted through a smart contract of blockchain for security and resilience on the attack. Through the framework proposed in this paper, the confidentiality and availability of device management on smart city network as well as integrity, auditability, adaptability and authentication for each node are ensured and the effectiveness of the proposed framework is presented through the security analysis.

Vision ◽  
2020 ◽  
Vol 4 (3) ◽  
pp. 39
Author(s):  
Michele Nicolai ◽  
Alessandro Franceschi ◽  
Paolo Pelliccioni ◽  
Vittorio Pirani ◽  
Cesare Mariotti

The EX-PRESS glaucoma filtration device appears to be an effective addition to our options to treat refractory glaucoma. The possibility to create a sclerostomy without tissue excision provides a safe and reliable outflow pathway for aqueous that is standard in size, reducing much of the variability associated with a surgical procedure. Prospective randomized studies comparing EX-PRESS implantation with trabeculectomy show encouraging results. However, complications usually encountered in filtration surgery have been reported, and EX-PRESS implantation can also lead to specific device-related complications. This article reviews the most common complications associated with this procedure.


2021 ◽  
Author(s):  
◽  
Benjamin Philip Palmer

<p>An increasing number of products are exclusively digital items, such as media files, licenses, services, or subscriptions. In many cases customers do not purchase these items directly from the originator of the product but through a reseller instead. Examples of some well known resellers include GoDaddy, the iTunes music store, and Amazon. This thesis considers the concept of provenance of digital items in reseller chains. Provenance is defined as the origin and ownership history of an item. In the context of digital items, the origin of the item refers to the supplier that created it and the ownership history establishes a chain of ownership from the supplier to the customer. While customers and suppliers are concerned with the provenance of the digital items, resellers will not want the details of the transactions they have taken part in made public. Resellers will require the provenance information to be anonymous and unlinkable to prevent third parties building up large amounts of information on the transactions of resellers. This thesis develops security mechanisms that provide customers and suppliers with assurances about the provenance of a digital item, even when the reseller is untrusted, while providing anonymity and unlinkability for resellers . The main contribution of this thesis is the design, development, and analysis of the tagged transaction protocol. A formal description of the problem and the security properties for anonymously providing provenance for digital items in reseller chains are defined. A thorough security analysis using proofs by contradiction shows the protocol fulfils the security requirements. This security analysis is supported by modelling the protocol and security requirements using Communicating Sequential Processes (CSP) and the Failures Divergences Refinement (FDR) model checker. An extended version of the tagged transaction protocol is also presented that provides revocable anonymity for resellers that try to conduct a cloning attack on the protocol. As well as an analysis of the security of the tagged transaction protocol, a performance analysis is conducted providing complexity results as well as empirical results from an implementation of the protocol.</p>


2019 ◽  
Vol 132 ◽  
pp. 274-283 ◽  
Author(s):  
Paola G. Vinueza Naranjo ◽  
Zahra Pooranian ◽  
Mohammad Shojafar ◽  
Mauro Conti ◽  
Rajkumar Buyya

Author(s):  
Lee Chao

In today’s mobile computing, Linux plays a significant role. The Linux kernel has been adopted by a variety of mobile operating systems to handle tasks such as device management, memory management, process management, networking, power management, application interface management, and user interface management. This chapter introduces Linux based mobile operating systems installed on various mobile devices. It first gives a brief introduction of the history of mobile Linux. Then, the chapter introduces the mobile Linux features that can be used to meet the mobile learning requirements. The last part of the chapter presents strategies on selecting a Linux based operating system for a particular mobile learning project.


Author(s):  
Jin-ho Park ◽  
Mikail Mohammed Salim ◽  
Jeong Hoon Jo ◽  
Jose Costa Sapalo Sicato ◽  
Shailendra Rathore ◽  
...  

Healthcare ◽  
2020 ◽  
Vol 8 (1) ◽  
pp. 46 ◽  
Author(s):  
Zaheer Allam ◽  
David S. Jones

As the Coronavirus (COVID-19) expands its impact from China, expanding its catchment into surrounding regions and other countries, increased national and international measures are being taken to contain the outbreak. The placing of entire cities in ‘lockdown’ directly affects urban economies on a multi-lateral level, including from social and economic standpoints. This is being emphasised as the outbreak gains ground in other countries, leading towards a global health emergency, and as global collaboration is sought in numerous quarters. However, while effective protocols in regard to the sharing of health data is emphasised, urban data, on the other hand, specifically relating to urban health and safe city concepts, is still viewed from a nationalist perspective as solely benefiting a nation’s economy and its economic and political influence. This perspective paper, written one month after detection and during the outbreak, surveys the virus outbreak from an urban standpoint and advances how smart city networks should work towards enhancing standardization protocols for increased data sharing in the event of outbreaks or disasters, leading to better global understanding and management of the same.


IEEE Access ◽  
2017 ◽  
Vol 5 ◽  
pp. 20524-20535 ◽  
Author(s):  
Olivera Kotevska ◽  
A. Gilad Kusne ◽  
Daniel V. Samarov ◽  
Ahmed Lbath ◽  
Abdella Battou

Sign in / Sign up

Export Citation Format

Share Document