With the continued improvement and innovation, technology has become an integral part of our daily lives. The rapid adoption of technology and its affordability has given rise to the Internet-of-Things (IoT). IoT is an interconnected network of devices that are able to communicate and share information seamlessly. IoT encompasses a gamut of heterogeneous devices ranging from a small sensor to large industrial machines. One such domain of IoT that has seen a significant growth in the recent few years is that of the wearable devices. While the privacy issues for medical devices has been well-researched and documented in the literature, the threats to privacy arising from the use of consumer wearable devices have received very little attention from the research community. This paper presents a survey of the literature to understand the various privacy challenges, mitigation strategies, and future research directions as a result of the widespread adoption of wearable devices.
more »
« less
Solid-if-IoT: An Internet of Things Client Bridge to Interface with Solid Backend Infrastructure
Web decentralization has the potential to radically change the way we produce, store, and manage data. Much of the focus of decentralization has been on blockchain tech-nologies which have high energy requirements. An alternative and potentially complementary decentralization technology exists in the form of the Solid project. Solid primarily exists for the decentralization of online social data that is prevalent in social media. However, many of the key challenges to realizing a decentralized social web exist in the current Internet of Things (IoT). IoT-especially industrial IoT-is currently a collection of many intranets of things rather than an interconnected network of machines. Those devices that are public facing produce data and consume commands often devoid of context. Devices at the edge are resource constrained and the overhead of many decentralization technologies may be technologically infeasible or would result in performance degradation. It is our hypothesis that a mechanism to overcome some of these challenges can exist in the form of a client bridge to integrate IoT devices with the Solid infrastructure, which would in turn enable finer access control and improved context that are necessary to realize a more interconnected Internet of Things. This work demonstrates the feasibility of this paradigm, and plots future directions to bring this technology to fruition.
more »
« less
- Award ID(s):
- 2237945
- PAR ID:
- 10510379
- Publisher / Repository:
- IEEE
- Date Published:
- ISBN:
- 979-8-3503-0858-7
- Page Range / eLocation ID:
- 227 to 231
- Format(s):
- Medium: X
- Location:
- Springdale, AR, USA
- Sponsoring Org:
- National Science Foundation
More Like this
-
-
The constant and rapid evolution of technology has led to some amazing achievements. Normal people can communicate with others across the globe, relatively cheap Internet of Things (IoT) devices can be used to secure homes, track fitness and health, control appliances, etc., many people have access to a seemingly endless wealth of information in small devices in their pockets, organizations can provide high availability for important services by spinning up/down servers in minutes to scale with demand through cloud services, etc. However, not everyone who uses these technologies does so with a pure heart and good intentions, many people use them to commit or help commit crimes. A nefarious individual may use cloud services to host a highly available Command and Control (C2) server, a messaging app to form and communicate with a gang or hacking group, or IoT devices as part of a botnet designed to perform Distributed Denial of Service (DDoS) attacks. When these technologies are used in the commission of a crime, they hold valuable information that needs to be recovered forensically to use as evidence to convict the perpetrators. Unfortunately, that ever-evolving technology poses many challenges for digital forensics. This paper identifies and presents many of the challenges faced in digital forensics involving mobile devices, IoT devices, and cloud services in addition to proposing a framework for solving the IoT Forensic Data Analysis problem.more » « less
-
Over six decades of semiconductor technology scaling (Moore's Law) and subsequently system size scaling (Bell's Law) has reduced the size of unit computing to virtually zero. This has led to computing becoming ubiquitous in everything around us, making everyday things smart. Similarly, tremendous progress in communication capacity (Shannon's theorem) has made these smart things connected to the internet and forming the Internet of Things (IoT). Many of these smart, connected devices are present in, on, or around the human body. This subset of IoT around the human body has a distinguishing feature, that it has a common medium, i.e. the body itself. This subset is increasingly becoming popular as the Internet of Bodies (IoB). In this paper, we look into the need and growth of IoB devices, including the technological landscape, current challenges and the future that IoB will enable for empowering humans.more » « less
-
The Internet of Things (IoT) [3, 16, 35] is a physical-digital ecosystem of compliant technologies and heterogeneous parts, enabling vast transmissions of data and candid, pervasive presence of things [40]. Fashion, on the other hand, is an embodied practice, an information medium of material, social, cultural, economic and political forces. Many wearables are outfitted to actuate data input sources as a visualised display. However, the impact and rich possibilities of fashion adornment practices for embodied data engagement in IoT wearables design have been overlooked. Introducing computational materials of the IoT to physical properties pushes this virtual system into the physical realm. In this research, an aesthetic criterion of haute couture practices considers the material turn [34, 39]. Design cases of fashion-led adornment style are a promising path to follow in the context of designing wearables for an Internet of Worn Things.more » « less
-
The Internet of Things (IoT) is a vast collection of interconnected sensors, devices, and services that share data and information over the Internet with the objective of leveraging multiple information sources to optimize related systems. The technologies associated with the IoT have significantly improved the quality of many existing applications by reducing costs, improving functionality, increasing access to resources, and enhancing automation. The adoption of IoT by industries has led to the next industrial revolution: Industry 4.0. The rise of the Industrial IoT (IIoT) promises to enhance factory management, process optimization, worker safety, and more. However, the rollout of the IIoT is not without significant issues, and many of these act as major barriers that prevent fully achieving the vision of Industry 4.0. One major area of concern is the security and privacy of the massive datasets that are captured and stored, which may leak information about intellectual property, trade secrets, and other competitive knowledge. As a way forward toward solving security and privacy concerns, we aim in this paper to identify common input-output (I/O) design patterns that exist in applications of the IIoT. These design patterns enable constructing an abstract model representation of data flow semantics used by such applications, and therefore better understand how to secure the information related to IIoT operations. In this paper, we describe communication protocols and identify common I/O design patterns for IIoT applications with an emphasis on data flow in edge devices, which, in the industrial control system (ICS) setting, are most often involved in process control or monitoring.more » « less
An official website of the United States government
