Mostrar el registro sencillo del ítem

dc.contributor.editorFigueroa-Garcia J.C.
dc.contributor.editorDuarte-Gonzalez M.
dc.contributor.editorJaramillo-Isaza S.
dc.contributor.editorOrjuela-Canon A.D.
dc.contributor.editorDiaz-Gutierrez Y.
dc.creatorSabalza-Mejia M.
dc.creatorMagre Colorado, Luz Alejandra
dc.creatorBaños I.
dc.creatorMartínez-Santos J.C.
dc.date.accessioned2020-03-26T16:33:07Z
dc.date.available2020-03-26T16:33:07Z
dc.date.issued2019
dc.identifier.citationCommunications in Computer and Information Science; Vol. 1052, pp. 475-486
dc.identifier.isbn9783030310189
dc.identifier.issn18650929
dc.identifier.urihttps://hdl.handle.net/20.500.12585/9168
dc.description.abstractIn this paper, we present a secure system to control devices at home through the web, which we implement based on the Do It Yourself (DIY) culture. We use a model based on the Goal Question Metric approach to evaluate the quality of our system. Given that we are now in the era of the Internet of Things (IoT), security must be at the same level or even in a higher priority than other aspects such as speed, size, and power consumption. The objective of this work is to verify that acceptable levels of confidentiality, integrity, availability, access control, authentication and non-repudiation can be guaranteed in open platforms such as Arduino, Galileo, Energia, Tiva C, among others. Taking into account these platforms, we developed a system with access control that implements motion detection, light control, and generates a power consumption record. The results show a comparison between our security implementation and other authors’ implementation. © 2019, Springer Nature Switzerland AG.eng
dc.format.mediumRecurso electrónico
dc.format.mimetypeapplication/pdf
dc.language.isoeng
dc.publisherSpringer
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/4.0/
dc.sourcehttps://www.scopus.com/inward/record.uri?eid=2-s2.0-85075681794&doi=10.1007%2f978-3-030-31019-6_40&partnerID=40&md5=ec89944fdf901961d1ae89a278a03fbd
dc.titleFrom a Home-Area-Network to a Secure Internet of Things Application
dcterms.bibliographicCitationFIPS Pub: Standards for security categorization of federal information and information systems (2004) NIST FIPS, p. 199
dcterms.bibliographicCitationNixon, R., (2012) Learning PHP, Mysql, Javascript, and CSS: A Step-By-Step Guide to Creating Dynamic Websites
dcterms.bibliographicCitation(2006), Nicholas Zambetti: Wire.h library
dcterms.bibliographicCitationMargolis, M., (2011), https://uxplanet.org/how-to-customize-bootstrap-b8078a011203
dcterms.bibliographicCitationBulger, B., Greenspan, J., Wall, D., (2003) Mysql/Php Database Applications, , Wiley, New York
dcterms.bibliographicCitationRamon, M.C., (2014) Intel Galileo and Intel Galileo Gen 2. IntelR○ Galileo and IntelR○ Galileo Gen, 2, pp. 1-33. , https://doi.org/10.1007/978-1-4302-6838-31, pp., Apress, Berkeley, CA
dcterms.bibliographicCitationHummen, R., Hiller, J., Wirtz, H., Henze, M., Shafagh, H., Wehrle, K., 6LoWPAN fragmentation attacks and mitigation mechanisms (2013) Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 55-66. , pp., ACM, April
dcterms.bibliographicCitationHenze, M., Hermerschmidt, L., Kerpen, D., Huling, R., Rumpe, B., Wehrle, K., User-driven privacy enforcement for cloud-based services in the internet of things (2014) 2014 International Conference on Future Internet of Things and Cloud, pp. 191-196. , pp., IEEE, August
dcterms.bibliographicCitationStamp, M., (2011) Information Security: Principles and Practice, , Wiley, Hoboken
dcterms.bibliographicCitationLounis, A., Hadjidj, A., Bouabdallah, A., Challal, Y., Secure and scalable cloud-based architecture for e-health wireless sensor networks (2012) 2012 21St International Conference on Computer Communications and Networks (ICCCN), pp. 1-7
dcterms.bibliographicCitationInternational Organization for Standardization: Technical Committee ISO/TC 97: ISO7498-2: Information processing system, open system interconnection, basic reference mode. Part 2: Security architecture (1989) International Organization for Standardization
dcterms.bibliographicCitationLi, X., Xuan, Z., Wen, L., Research on the architecture of trusted security system based on the internet of things (2011) 2011 Fourth International Conference on Intelligent Computation Technology and Automation, 2, pp. 1172-1175. , vol., pp., IEEE, March
dcterms.bibliographicCitationLi, D., Sampalli, S., Aung, Z., Williams, J., Sanchez, A., Fine-grained encryption for search and rescue operation on Internet of Things (2014) Asia-Pacific World Congress on Computer Science and Engineering, pp. 1-9. , pp., IEEE, November
dcterms.bibliographicCitationIslam, S., Falcarin, P., Measuring security requirements for software security (2011) 2011 IEEE 10Th International Conference on Cybernetic Intelligent Systems (CIS), pp. 70-75. , pp., IEEE, September
dcterms.bibliographicCitationvan Solingen, R., Basili, V., Caldiera, G., Rombach, H.D., Goal question metric (GQM) approach (2002) Encyclopedia of Software Engineering
dcterms.bibliographicCitationPirbhulal, S., A novel secure IoT-based smart home automation system using a wireless sensor network (2017) Sensors, 17 (1), p. 69
dcterms.bibliographicCitationHan, J.H., Jeon, Y., Kim, J., Security considerations for secure and trustworthy smart home system in the IoT environment (2015) 2015 International Conference on Information and Communication Technology Convergence (ICTC), pp. 1116-1118. , pp., IEEE, October
dcterms.bibliographicCitationStergiou, C., Psannis, K.E., Kim, B.G., Gupta, B., Secure integration of IoT and cloud computing (2018) Future Gener. Comput. Syst., 78, pp. 964-975
dcterms.bibliographicCitationSantoso, F.K., Vun, N.C., Securing IoT for smart home system (2015) 2015 International Symposium on Consumer Electronics (ISCE), pp. 1-2. , pp., IEEE, June
dcterms.bibliographicCitationMagre Colorado, L.A., Martíinez-Santos, J.C., Leveraging 1-wire communication bus system for secure home automation (2017) CCC 2017. CCIS, 735, pp. 759-771. , https://doi.org/10.1007/978-3-319-66562-754, Solano, A., Ordoñez, H. (eds.), vol., pp., Springer, Cham
dcterms.bibliographicCitationBeaulieu, R., Treatman-Clark, S., Shors, D., Weeks, B., Smith, J., Wingers, L., The SIMON and SPECK lightweight block ciphers (2015) 2015 52Nd ACM/EDAC/IEEE Design Automation Conference (DAC), pp. 1-6. , pp., IEEE, June
dcterms.bibliographicCitationGriffor, E.R., Greer, C., Wollman, D.A., Burns, M.J., Framework for cyber-physical systems: Volume 1, overview (No (2017) Special Publication (NIST SP)-1500-201)
dcterms.bibliographicCitationSabalza, M.M., Santos, J.C.M., Design and construction of a power meter to optimize usage of the electric power (2014) 2014 III International Congress of Engineering Mechatronics and Automation (CIIMA), pp. 1-5. , pp., IEEE, October
datacite.rightshttp://purl.org/coar/access_right/c_16ec
oaire.resourceTypehttp://purl.org/coar/resource_type/c_c94f
oaire.versionhttp://purl.org/coar/version/c_970fb48d4fbd8a85
dc.source.event6th Workshop on Engineering Applications, WEA 2019
dc.type.driverinfo:eu-repo/semantics/conferenceObject
dc.type.hasversioninfo:eu-repo/semantics/publishedVersion
dc.identifier.doi10.1007/978-3-030-31019-6_40
dc.subject.keywordsHome area network
dc.subject.keywordsInternet of things
dc.subject.keywordsOpen source
dc.subject.keywordsSecurity
dc.subject.keywordsTDES
dc.subject.keywordsAccess control
dc.subject.keywordsElectric power utilization
dc.subject.keywordsInternet of things
dc.subject.keywordsNetwork security
dc.subject.keywordsQuality control
dc.subject.keywordsGoal-question-metric approach
dc.subject.keywordsHome area network
dc.subject.keywordsInternet of thing (IOT)
dc.subject.keywordsMotion detection
dc.subject.keywordsOpen sources
dc.subject.keywordsSecurity
dc.subject.keywordsSecurity implementations
dc.subject.keywordsTDES
dc.subject.keywordsHome networks
dc.rights.accessrightsinfo:eu-repo/semantics/restrictedAccess
dc.rights.ccAtribución-NoComercial 4.0 Internacional
dc.identifier.instnameUniversidad Tecnológica de Bolívar
dc.identifier.reponameRepositorio UTB
dc.description.notesWe would like to thank the anonymous WEA reviewers for their comments and feedback on the ideas in this paper and Tecnologica de Bolivar University for their support.
dc.relation.conferencedate16 October 2019 through 18 October 2019
dc.type.spaConferencia
dc.identifier.orcid57212001418
dc.identifier.orcid56682785300
dc.identifier.orcid57212004586
dc.identifier.orcid26325154200


Ficheros en el ítem

FicherosTamañoFormatoVer

No hay ficheros asociados a este ítem.

Este ítem aparece en la(s) siguiente(s) colección(ones)

Mostrar el registro sencillo del ítem

http://creativecommons.org/licenses/by-nc-nd/4.0/
http://creativecommons.org/licenses/by-nc-nd/4.0/

Universidad Tecnológica de Bolívar - 2017 Institución de Educación Superior sujeta a inspección y vigilancia por el Ministerio de Educación Nacional. Resolución No 961 del 26 de octubre de 1970 a través de la cual la Gobernación de Bolívar otorga la Personería Jurídica a la Universidad Tecnológica de Bolívar.