Explore PETRAS's research knowledge base of peer reviewed, multidisciplinary publications.
51. Radanliev, Petar; Roure, David Charles De; Kleek, Max Goodwin Van; Ani, Uchenna P. Daniel; Burnap, Peter; Anthi, Eirini; Nurse, Jason R. C.; Santos, Omar; Montalvo, Rafael Mantilla; Maddox, La'Treall: Dynamic real-time risk analytics of uncontrollable states in complex internet of things systems: cyber risk at the edge. In: vol. 41, pp. 236–247, 2020. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-radanliev_dynamic_2020,
title = {Dynamic real-time risk analytics of uncontrollable states in complex internet of things systems: cyber risk at the edge},
author = {Petar Radanliev and David Charles De Roure and Max Goodwin Van Kleek and Uchenna P. Daniel Ani and Peter Burnap and Eirini Anthi and Jason R. C. Nurse and Omar Santos and Rafael Mantilla Montalvo and La'Treall Maddox},
url = {https://doi.org/10.1007%2Fs10669-020-09792-x},
doi = {10.1007/s10669-020-09792-x},
year = {2020},
date = {2020-11-22},
volume = {41},
pages = {236--247},
publisher = {Springer Science and Business Media LLC},
abstract = {The Internet of Things (IoT) triggers new types of cyber risks. Therefore, the integration of new IoT devices and services requires a self-assessment of IoT cyber security posture. By security posture this article refers to the cybersecurity strength of an organisation to predict, prevent and respond to cyberthreats. At present, there is a gap in the state of the art, because there are no self-assessment methods for quantifying IoT cyber risk posture. To address this gap, an empirical analysis is performed of 12 cyber risk assessment approaches. The results and the main findings from the analysis is presented as the current and a target risk state for IoT systems, followed by conclusions and recommendations on a transformation roadmap, describing how IoT systems can achieve the target state with a new goal-oriented dependency model. By target state, we refer to the cyber security target that matches the generic security requirements of an organisation. The research paper studies and adapts four alternatives for IoT risk assessment and identifies the goal-oriented dependency modelling as a dominant approach among the risk assessment models studied. The new goal-oriented dependency model in this article enables the assessment of uncontrollable risk states in complex IoT systems and can be used for a quantitative self-assessment of IoT cyber risk posture.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
52. Bahl, Paramvir Victor; Cáceres, Ramón; Davies, Nigel; Want, Roy: Pervasive Computing at the Edge. In: vol. 19, no. 4, pp. 8–9, 2020. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-bahl_pervasive_2020,
title = {Pervasive Computing at the Edge},
author = {Paramvir Victor Bahl and Ram\'{o}n C\'{a}ceres and Nigel Davies and Roy Want},
url = {https://doi.org/10.1109%2Fmprv.2020.3032205},
doi = {10.1109/mprv.2020.3032205},
year = {2020},
date = {2020-11-18},
volume = {19},
number = {4},
pages = {8--9},
publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
abstract = {Today the infrastructure needed to support pervasive computing and the Internet of Things (IoT) is unparalleled as entirely new classes of applications and systems emerge. For example, pervasive systems designed to augment human cognition with tasks such as face recognition must operate at "superhuman speeds," delivering insights to help with human decision-making within very strict and narrow time limits. Similarly, the emergence of pervasive video analytics demands processing of very large volumes of video data in near-real-time. In general, the field of pervasive computing is rapidly changing in the face of major advances in sensing, data processing techniques, and wearable computing. The ever increasing data rates of high-speed networks also factor into the design tradeoff to decide if computing should be local, or remote.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
53. Bhatia, Laksh; Breza, Michael J.; Marfievici, Ramona; McCann, Julie A.: LoED: The LoRaWAN at the edge dataset. In: DATA '20: Proceedings of the Third Workshop on Data: Acquisition To Analysis, ACM, 2020. (Type: Inproceedings | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-bhatia_loed_2020,
title = {LoED: The LoRaWAN at the edge dataset},
author = {Laksh Bhatia and Michael J. Breza and Ramona Marfievici and Julie A. McCann},
url = {https://doi.org/10.1145%2F3419016.3431491},
doi = {10.1145/3419016.3431491},
year = {2020},
date = {2020-11-16},
booktitle = {DATA '20: Proceedings of the Third Workshop on Data: Acquisition To Analysis},
publisher = {ACM},
abstract = {This paper presents the LoRaWAN at the Edge Dataset (LoED), an open LoRaWAN packet dataset collected at gateways. Real-world LoRaWAN datasets are important for repeatable sensor-network and communications research and evaluation as, if carefully collected, they provide realistic working assumptions. LoED data is collected from nine gateways over a four month period in a dense urban environment. The dataset contains packet header information and all physical layer properties reported by gateways such as the CRC, RSSI, SNR and spreading factor. Files are provided to analyse the data and get aggregated statistics. The dataset is available at: doi.org/10.5281/zenodo.4121430},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
54. Racovita, Monica; Wijnbladh, Caroline: COVID-19: The Internet of Things and Infrastructure. 2020. (Type: report | Abstract | Links | BibTeX) @report{racovita_covid_2020a,
title = {COVID-19: The Internet of Things and Infrastructure},
author = {Monica Racovita and Caroline Wijnbladh},
url = {https://petras-iot.org/wp-content/uploads/2020/04/CRITICALINFRASTRUCTURE_COVID-19_IoT_PETRAS_09112020__PDF.pdf},
year = {2020},
date = {2020-11-11},
institution = {PETRAS National Centre of Excellence for IoT Systems Cybersecurity},
abstract = {Critical infrastructure benefited from the use of IoT in all sectors during the pandemic with examples provided here from health, energy and finance. The pandemic saw the emergence of a new generation of critical infrastructure, including vaccine research labs, clinical trial administrators, manufacturers of components for ventilators or food retailers. Cybersecurity is a major issue as COVID-19 saw an increase in cyberattacks on critical infrastructure facilities. The purpose of these attacks can be to gather intelligence on COVID-19, scientific information, treatment or government response strategies (cyberespionage), money (cybercrime), or to threaten national security. IoT devices can be vulnerable to attacks through internal vulnerabilities such as 'Ripple20', or wider ecosystem vulnerabilities, such as counterfeit hardware and vulnerable local networks. Cybersecurity recommendations include a decentralisation approach to security, like isolating the IoT devices on a separate network segment, security by design, but also strengthening local networks.},
keywords = {},
pubstate = {published},
tppubtype = {report}
}
55. Junejo, Aisha Kanwal; Komninos, Nikos; McCann, Julie A.: A Secure Integrated Framework for Fog-Assisted Internet-of-Things Systems. In: vol. 8, no. 8, pp. 6840–6852, 2020. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-junejo_secure_2021,
title = {A Secure Integrated Framework for Fog-Assisted Internet-of-Things Systems},
author = {Aisha Kanwal Junejo and Nikos Komninos and Julie A. McCann},
url = {https://doi.org/10.1109%2Fjiot.2020.3035474},
doi = {10.1109/jiot.2020.3035474},
year = {2020},
date = {2020-11-03},
volume = {8},
number = {8},
pages = {6840--6852},
publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
abstract = {Fog-assisted Internet-of-Things (Fog-IoT) systems are deployed in remote and unprotected environments, making them vulnerable to security, privacy, and trust challenges. Existing studies propose security schemes and trust models for these systems. However, mitigation of insider attacks, namely, blackhole, sinkhole, sybil, collusion, self-promotion, and privilege escalation, has always been a challenge and mostly carried out by the legitimate nodes. Compared to other studies, this article proposes a framework featuring attribute-based access control and trust-based behavioral monitoring to address the challenges mentioned above. The proposed framework consists of two components, the security component (SC) and the trust management component (TMC). SC ensures data confidentiality, integrity, authentication, and authorization. TMC evaluates Fog-IoT entities' performance using a trust model based on a set of Quality of Service (QoS) and network communication features. Subsequently, trust is embedded as an attribute within SC's access control policies, ensuring that only trusted entities are granted access to fog resources. Several attacking scenarios, namely, Denial of Service (DoS), Distributed DoS, probing, and data theft are designed to elaborate on how the change in trust triggers the change in access rights and, therefore, validates the proposed integrated framework's design principles. The framework is evaluated on a Raspberry Pi 3 Model B+ to benchmark its performance in terms of time and memory complexity. Our results show that both SC and TMC are lightweight and suitable for resource-constrained devices.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
56. Zakhary, Sameh; Sunil, Neelima; McAuley, Derek: Review of Networking and Tangible Security Techniques for Domestic IoT Devices and Initial Ideas. 2020. (Type: Miscellaneous | Abstract | Links | BibTeX | Altmetric) @misc{misc-zakhary_review_2020,
title = {Review of Networking and Tangible Security Techniques for Domestic IoT Devices and Initial Ideas},
author = {Sameh Zakhary and Neelima Sunil and Derek McAuley},
url = {https://nottingham-repository.worktribe.com/OutputFile/4978755},
doi = {10.17639/25QK-BX48},
year = {2020},
date = {2020-11-02},
publisher = {University of Nottingham},
abstract = {The number of connected devices including Internet of Things (IoTs) on the Internet is growing fast. According to recent Gartner research, the estimated number of IoT devices is 5.8 billion in 2020 (Gartner, 2019). The countries that are leading the way to IoT deployment include North America, Western Europe and China (Kandaswamy and Furlonger, 2018). By 2024, the number of Machine-2-Machine (M2M) connections between these devices are expected to reach 27 billion in 2024 (Kandaswamy and Furlonger, 2018). This growth in M2M connectivity is expected to result from wide range of application areas such as smart cities, smart infrastructure, smart energy among many others (Hassija et al., 2019).
This wide spread of IoTs has sparked significant research interest to understand various implications (Airehrour et al., 2016; Neshenko et al., 2019; Hassija et al., 2019). IoTs enable the integration between many objects in our daily life (Aazam et al., 2016; Alaba et al., 2017) such as sensors, objects, wearable devices and other types of machines. IoT devices are capable of communicating directly with one another and sharing data without direct human intervention (Crabtree et al., 2018). These "things" could be any traditional objects such as home appliance (e.g. microwave, fridge) or tiny sensor (e.g. humidity or health sensors). The devices are capable of constant collections of various sensitive and personal data about many aspect of our lives due to its pervasive deployment (Ren et al., 2019).
This paper provides an overview of the literature relating to securing IoT with an emphasis on usability from a user perspective as well as approaches to securing access to these devices over the Internet. Although IoT deployment occurs in various settings, i.e. industrial IoT deployment, we mainly focus in this paper on private residential home deployment (i.e. consumer IoTs). We assume that in such settings, users are mostly not experts in security IoT or the underlying networking principles.
This paper is organized as follows: section II discusses various protocols and networking security tools (e.g. firewall and Virtual Private Network (VPN)). Section II-D discusses various approaches to simplify cyber-security by using user-centred approaches. In section III, we present a number of existing including enterprise-grade solutions that could be adopted to secure remote access to IoT devices in domestic settings.},
keywords = {},
pubstate = {published},
tppubtype = {misc}
}
This wide spread of IoTs has sparked significant research interest to understand various implications (Airehrour et al., 2016; Neshenko et al., 2019; Hassija et al., 2019). IoTs enable the integration between many objects in our daily life (Aazam et al., 2016; Alaba et al., 2017) such as sensors, objects, wearable devices and other types of machines. IoT devices are capable of communicating directly with one another and sharing data without direct human intervention (Crabtree et al., 2018). These "things" could be any traditional objects such as home appliance (e.g. microwave, fridge) or tiny sensor (e.g. humidity or health sensors). The devices are capable of constant collections of various sensitive and personal data about many aspect of our lives due to its pervasive deployment (Ren et al., 2019).
This paper provides an overview of the literature relating to securing IoT with an emphasis on usability from a user perspective as well as approaches to securing access to these devices over the Internet. Although IoT deployment occurs in various settings, i.e. industrial IoT deployment, we mainly focus in this paper on private residential home deployment (i.e. consumer IoTs). We assume that in such settings, users are mostly not experts in security IoT or the underlying networking principles.
This paper is organized as follows: section II discusses various protocols and networking security tools (e.g. firewall and Virtual Private Network (VPN)). Section II-D discusses various approaches to simplify cyber-security by using user-centred approaches. In section III, we present a number of existing including enterprise-grade solutions that could be adopted to secure remote access to IoT devices in domestic settings.57. Mace, John C.; Czekster, Ricardo Melo; Morisset, Charles; Maple, Carsten: Smart Building Risk Assessment Case Study: Challenges, Deficiencies and Recommendations. In: 2020 16th European Dependable Computing Conference (EDCC), IEEE, 2020, ISBN: 978-1-7281-8936-9. (Type: Inproceedings | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-mace_smart_2020,
title = {Smart Building Risk Assessment Case Study: Challenges, Deficiencies and Recommendations},
author = {John C. Mace and Ricardo Melo Czekster and Charles Morisset and Carsten Maple},
url = {https://doi.org/10.1109%2Fedcc51268.2020.00019},
doi = {10.1109/edcc51268.2020.00019},
isbn = {978-1-7281-8936-9},
year = {2020},
date = {2020-10-23},
booktitle = {2020 16th European Dependable Computing Conference (EDCC)},
publisher = {IEEE},
abstract = {Inter-networked control systems make smart buildings increasingly efficient but can lead to severe operational disruptions and infrastructure damage. It is vital the security state of smart buildings is properly assessed so that thorough and cost effective risk management can be established. This paper uniquely reports on an actual risk assessment performed in 2018 on one of the world's most densely monitored, state-of-the-art, smart buildings. From our observations, we suggest that current practice may be inadequate due to a number of challenges and deficiencies, including the lack of a recognised smart building risk assessment methodology. As a result, the security posture of many smart buildings may not be as robust as their risk assessments suggest. Crucially, we highlight a number of key recommendations for a more comprehensive risk assessment process for smart buildings. As a whole, we believe this practical experience report will be of interest to a range of smart building stakeholders.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
58. Jain, Shreya: COVID-19: The Internet of Things and Agritech. 2020. (Type: report | Abstract | Links | BibTeX) @report{jain_covid_2020,
title = {COVID-19: The Internet of Things and Agritech},
author = {Shreya Jain},
url = {https://petras-iot.org/wp-content/uploads/2020/04/AGRITECH_COVID-19_IoT_PETRAS_21092020_PDF.pdf},
year = {2020},
date = {2020-09-21},
institution = {PETRAS National Centre of Excellence for IoT Systems Cybersecurity},
abstract = {Traditional farming practices are rapidly being replaced by the emerging technologies. Agritech companies are helping in streamlining processes by offering innovative solutions, using technologies like robotics, remote sensing and data analytics. The coronavirus pandemic has led to a shortage of agriculture workers globally. Border restrictions have further intensified the shortage. This has in turn accelerated the use of automation and robotics in farming, such as 'vertical farming'. COVID-19 has also led to post harvest losses, with fruits and vegetables left unharvested. Scientific Warehousing and Blockchain technology are being set forth to help reduce these losses and introduce high-end solutions for farmers. Governments and public bodies are responding to the pandemic by offering relief packages and launching technology and research centres for Agritech stakeholders. As COVID-19 has accelerated the use of technology in Agriculture, Agritech startup firms are raising capital by catching investors' attention from all over the world. Globally, there is a much greater push for sustainable farming and nutrition given the threat of COVID-19 co-morbidity conditions. Several companies around the world are developing innovative chemical reduction technologies using AI, deep learning etc. COVID-19 has boosted many food trends such as a shift to online food stores and opening of direct-to-consumer channels along with decentralisation of food systems.},
keywords = {},
pubstate = {published},
tppubtype = {report}
}
59. Racovita, Monica: COVID-19: The Internet of Things and Health. 2020. (Type: report | Abstract | Links | BibTeX) @report{racovita_covid_2020b,
title = {COVID-19: The Internet of Things and Health},
author = {Monica Racovita},
url = {https://petras-iot.org/wp-content/uploads/2020/04/HEALTH_AI_COVID-19_IoT_PETRAS_21092020.pdf},
year = {2020},
date = {2020-09-21},
institution = {PETRAS National Centre of Excellence for IoT Systems Cybersecurity},
abstract = {AI can increase the pace of: drug repurposing, designing new drugs, finding new vaccines, offering new or faster ways to diagnose COVID-19, and help mining the COVID-19 literature. The speed and efficiency of AI depends greatly on the quality and amount of data being fed into AI algorithms. The quality of data is not just about accuracy but also about biases, replicable results and burden of evidence},
keywords = {},
pubstate = {published},
tppubtype = {report}
}
60. Akmal, Haider Ali; Coulton, Paul: A Tarot of Things: a supernatural approach to designing for IoT. In: Synergy - DRS International Conference 2020, Design Research Society, 2020. (Type: Inproceedings | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-akmal_tarot_2020,
title = {A Tarot of Things: a supernatural approach to designing for IoT},
author = {Haider Ali Akmal and Paul Coulton},
url = {https://doi.org/10.21606%2Fdrs.2020.188},
doi = {10.21606/drs.2020.188},
year = {2020},
date = {2020-09-18},
booktitle = {Synergy - DRS International Conference 2020},
publisher = {Design Research Society},
abstract = {This paper looks at an alternative approach to design research for IoT, through a practical engagement with philosophy; based on the concept of Carpentry, introduced by design philosopher Ian Bogost. It presents this exploration through the design of a bespoke digital Tarot deck, rooted in Object-Oriented Ontology. This branch of philosophical inquiry withdraws from conventional perceptions of objects and people. Viewing them as equally important 'things', operating with a range of independent and interdependent perspectives; which have been described as "constellations". Through our philosophical carpentry we present a Tarot of Things, which acts as boundary object, for understanding how taking constellation perspectives of networked IoT devices can produce new design approaches.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
61. Pilling, Franziska Louise; Coulton, Paul: What's it like to be Alexa? An exploration of Artificial Intelligence as a Material for Design.. In: Synergy - DRS International Conference 2020, Design Research Society, 2020. (Type: Inproceedings | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-pilling_whats_2020,
title = {What's it like to be Alexa? An exploration of Artificial Intelligence as a Material for Design.},
author = {Franziska Louise Pilling and Paul Coulton},
url = {https://doi.org/10.21606%2Fdrs.2020.218},
doi = {10.21606/drs.2020.218},
year = {2020},
date = {2020-09-18},
booktitle = {Synergy - DRS International Conference 2020},
publisher = {Design Research Society},
abstract = {Technology is a material, though we don't often perceive it as something we can easily manipulate with sensuous knowledge. In particular, we don't consider digital algorithms within Artificial-Intelligence (AI) as a material we can design with as we generally lack the intimate knowledge a carpenter has of the grain of wood and the chisel in hand. Despite this lack of understanding, designers are contributing to the rapid implementation of AI in diverse areas, having a profound effect on the lives of millions. If designers lack a material knowledge of AI, how are they to adequately consider the desirability of its use? How do we pierce the veil of something that is perceived as intangible, where the interplay between materials and forces are obscured? In this paper, we present a design approach that utilises philosophical lenses to help designers adopt a material perspective of AI aiming towards a more considered use.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
62. Lindley, Joseph Galen; Coulton, Paul; Akmal, Haider Ali; Pilling, Franziska Louise: Signs of the Time: Making AI Legible. In: Synergy - DRS International Conference 2020, Design Research Society, 2020. (Type: Inproceedings | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-lindley_signs_2020,
title = {Signs of the Time: Making AI Legible},
author = {Joseph Galen Lindley and Paul Coulton and Haider Ali Akmal and Franziska Louise Pilling},
url = {https://doi.org/10.21606%2Fdrs.2020.237},
doi = {10.21606/drs.2020.237},
year = {2020},
date = {2020-09-18},
booktitle = {Synergy - DRS International Conference 2020},
publisher = {Design Research Society},
abstract = {Artificial Intelligence (AI) is becoming widespread. There are many benefits associated with AI, but it's adoption brings challenges relating to fairness, bias, and transparency. Such issues are particularly hard to address because conventions that highlight when an AI is present, how it works, and the consequences of using are not yet established: AI has a legibility problem. Design-led research can play a key role in exploring this challenge. Applying Research through Design (RtD) this paper explores AI legibility in three ways: (1) explaining why it makes sense to address AI legibility with design; (2) the presentation of prototypical icons designed to enhance AI legibility; (3) experimenting with how the icons may be used in the context of signage relating to potential applications of AI. Via these three lenses the paper argues that design's role in improving AI legibility is critical.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
63. Carr, Madeline; Lesniewska, Feja: Internet of Things, Cybersecurity and Governing Wicked Problems: Learning from Climate Change Governance. In: vol. 34, no. 3, pp. 391–412, 2020. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-carr_internet_2020,
title = {Internet of Things, Cybersecurity and Governing Wicked Problems: Learning from Climate Change Governance},
author = {Madeline Carr and Feja Lesniewska},
doi = {10.1177/0047117820948247},
year = {2020},
date = {2020-09-17},
volume = {34},
number = {3},
pages = {391--412},
publisher = {SAGE Publications},
abstract = {The implementation of the Internet of Things (IoT) is central to what the World Economic Forum has coined the `Fourth Industrial Revolution'; a technological revolution built upon cyber-physical systems that will blur the lines between the physical, digital and biological spheres. Novel interconnections will emerge as a result, challenging traditional relations and modes of governance. However, a central feature of the IoT is that the implications of cyber (in)security are no longer abstract. The IoT also returns us to the world of kinetic effects in international relations; more familiar territory for IR. The resulting cooperation and coordination challenges are transboundary in nature, occur at multiple levels across sectors, between institutions, and will impact all actors, both public and private, in complex, often highly politicised ways. In this article we argue that advances in global climate governance appear to be offering an early model of a consensual rules-based approach within the existing international order that provides space for advancing agility, flexibility, and polycentrism to meet the demands of `wicked problems' like the cybersecurity of the IoT. Perhaps one of the most important lessons to be drawn across from climate governance is the role of robust mechanisms for knowledge exchange --- specifically between the technical and policy communities.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
64. Xin, Xin; Keoh, Sye Loong; Sevegnani, Michele; Saerbeck, Martin: Dynamic Probabilistic Model Checking for Sensor Validation in Industry 4.0 Applications. In: 2020 IEEE International Conference on Smart Internet of Things (SmartIoT), IEEE, 2020. (Type: Inproceedings | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-xin_dynamic_2020,
title = {Dynamic Probabilistic Model Checking for Sensor Validation in Industry 4.0 Applications},
author = {Xin Xin and Sye Loong Keoh and Michele Sevegnani and Martin Saerbeck},
url = {https://doi.org/10.1109%2Fsmartiot49966.2020.00016},
doi = {10.1109/smartiot49966.2020.00016},
year = {2020},
date = {2020-09-10},
booktitle = {2020 IEEE International Conference on Smart Internet of Things (SmartIoT)},
publisher = {IEEE},
abstract = {Industry 4.0 adopts Internet of Things (IoT) and service-oriented architectures to integrate Cyber-Physical Systems and Enterprise Planning into manufacturing operations. This kind of integration consists of a combination of connected sensors and run-time control algorithms. Consequential control decisions are driven by sensor-generated data. Hence, the trustworthiness of the sensor network readings is increasingly crucial to guarantee the performance and the quality of a manufacturing task. However, existing methodologies to test such systems often do not scale to the complexity and dynamic nature of today's sensor networks. This paper proposes a novel run-time verification framework combining sensor-level fault detection and system-level probabilistic model checking. This framework can rigorously quantify the trustworthiness of sensor readings, hence enabling formal reasoning for system failure prediction. We evaluated our approach on an industrial turn-mill machine equipped with a sensor network to monitor its main components continuously. The results indicate that the proposed verification framework involving the quantified sensor's trustworthiness enhances the accuracy of the system failure prediction.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
65. Chen, Jiahong; Edwards, Lilian; Urquhart, Lachlan; McAuley, Derek: Who is responsible for data processing in smart homes? Reconsidering joint controllership and the household exemption. In: vol. 10, no. 4, pp. 279–293, 2020. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-chen_who_2020,
title = {Who is responsible for data processing in smart homes? Reconsidering joint controllership and the household exemption},
author = {Jiahong Chen and Lilian Edwards and Lachlan Urquhart and Derek McAuley},
url = {https://doi.org/10.1093%2Fidpl%2Fipaa011},
doi = {10.1093/idpl/ipaa011},
year = {2020},
date = {2020-09-02},
volume = {10},
number = {4},
pages = {279--293},
publisher = {Oxford University Press (OUP)},
abstract = {The growing industrial and research interest in protecting privacy and fighting cyberattacks for smart homes has sparked various innovations in security- and privacy-enhancing technologies (S/PETs) powered by edge computing. The complex technical set-up has however raised a whole series of legal issues surrounding the regulation of smart home with data protection law.
To determine how responsibility and accountability should be fairly assumed by stakeholders, there is a pressing need to first clarify the roles of these parties within the existing data protection legal framework. This article focuses on two legal concepts under the General Data Protection Regulation (GDPR) as the mechanisms to (dis)assign responsibilities to various categories of entities in a domestic Internet of Things (IoT) context: joint controllership and the household exemption.
A close examination of the relevant provisions and case-law shows a widening notion of joint controllership and a narrowing scope for the household exemption. While this interpretative approach may prevent evasion of accountability in specific cases, it may lead to the unintended consequence of imposing disproportionate compliance burdens on developers, contributors, and users of smart home safety technologies. By discouraging users to adopt S/PETs, data protection law may likely lead to a lower level of privacy and security protection.
The differential responsibilities among joint controllers as envisaged in case-law may reconcile the tensions to some degree, but certain limitations remain. The regulatory dilemma in this regard highlights some underlying assumptions of data protection law that are no longer valid with regard to a smart home, and thus calls for further conceptual and empirical studies on fair reassignment of responsibility and accountability in a domestic IoT setting.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
To determine how responsibility and accountability should be fairly assumed by stakeholders, there is a pressing need to first clarify the roles of these parties within the existing data protection legal framework. This article focuses on two legal concepts under the General Data Protection Regulation (GDPR) as the mechanisms to (dis)assign responsibilities to various categories of entities in a domestic Internet of Things (IoT) context: joint controllership and the household exemption.
A close examination of the relevant provisions and case-law shows a widening notion of joint controllership and a narrowing scope for the household exemption. While this interpretative approach may prevent evasion of accountability in specific cases, it may lead to the unintended consequence of imposing disproportionate compliance burdens on developers, contributors, and users of smart home safety technologies. By discouraging users to adopt S/PETs, data protection law may likely lead to a lower level of privacy and security protection.
The differential responsibilities among joint controllers as envisaged in case-law may reconcile the tensions to some degree, but certain limitations remain. The regulatory dilemma in this regard highlights some underlying assumptions of data protection law that are no longer valid with regard to a smart home, and thus calls for further conceptual and empirical studies on fair reassignment of responsibility and accountability in a domestic IoT setting.66. Radanliev, Petar; Roure, David Charles De; Kleek, Max Goodwin Van; Santos, Omar; Ani, Uchenna P. Daniel: Artificial intelligence in cyber physical systems. In: vol. 36, no. 3, pp. 783–796, 2020. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-radanliev_artificial_2020,
title = {Artificial intelligence in cyber physical systems},
author = {Petar Radanliev and David Charles De Roure and Max Goodwin Van Kleek and Omar Santos and Uchenna P. Daniel Ani},
url = {https://doi.org/10.1007%2Fs00146-020-01049-0},
doi = {10.1007/s00146-020-01049-0},
year = {2020},
date = {2020-08-27},
volume = {36},
number = {3},
pages = {783--796},
publisher = {Springer Science and Business Media LLC},
abstract = {This article conducts a literature review of current and future challenges in the use of artificial intelligence (AI) in cyber physical systems. The literature review is focused on identifying a conceptual framework for increasing resilience with AI through automation supporting both, a technical and human level. The methodology applied resembled a literature review and taxonomic analysis of complex internet of things (IoT) interconnected and coupled cyber physical systems. There is an increased attention on propositions on models, infrastructures and frameworks of IoT in both academic and technical papers. These reports and publications frequently represent a juxtaposition of other related systems and technologies (e.g. Industrial Internet of Things, Cyber Physical Systems, Industry 4.0 etc.). We review academic and industry papers published between 2010 and 2020. The results determine a new hierarchical cascading conceptual framework for analysing the evolution of AI decision-making in cyber physical systems. We argue that such evolution is
keywords = {},
pubstate = {published},
tppubtype = {article}
}
67. Linker, Sven; Papacchini, Fabio; Sevegnani, Michele: Analysing Spatial Properties on Neighbourhood Spaces. In: Esparza, Javier; Kráľ, Daniel (Ed.): 45th International Symposium on Mathematical Foundations of Computer Science (MFCS 2020), pp. 66:1–66:14, Schloss Dagstuhl--Leibniz-Zentrum für Informatik, Dagstuhl, Germany, 2020, ISSN: 1868-8969. (Type: Inproceedings | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-linker_analysing_2020,
title = {Analysing Spatial Properties on Neighbourhood Spaces},
author = {Sven Linker and Fabio Papacchini and Michele Sevegnani},
editor = {Javier Esparza and Daniel Kr\'{a}\v{l}},
url = {https://drops.dagstuhl.de/opus/volltexte/2020/12735},
doi = {10.4230/LIPIcs.MFCS.2020.66},
issn = {1868-8969},
year = {2020},
date = {2020-08-18},
booktitle = {45th International Symposium on Mathematical Foundations of Computer Science (MFCS 2020)},
volume = {170},
pages = {66:1--66:14},
publisher = {Schloss Dagstuhl--Leibniz-Zentrum f\"{u}r Informatik},
address = {Dagstuhl, Germany},
series = {Leibniz International Proceedings in Informatics (LIPIcs)},
abstract = {We present a bisimulation relation for neighbourhood spaces, a generalisation of topological spaces. We show that this notion, path preserving bisimulation, preserves formulas of the spatial logic SLCS. We then use this preservation result to show that SLCS cannot express standard topological properties such as separation and connectedness. Furthermore, we compare the bisimulation relation with standard modal bisimulation and modal bisimulation with converse on graphs and prove it coincides with the latter.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
68. Racovita, Monica: COVID-19: The Internet of Things and Health. 2020. (Type: report | Abstract | Links | BibTeX) @report{racovita_covid_2020d,
title = {COVID-19: The Internet of Things and Health},
author = {Monica Racovita},
url = {https://petras-iot.org/wp-content/uploads/2020/04/Health_COVID-19_IoT_PETRAS_AssistedLiving_18082020_PDF.pdf},
year = {2020},
date = {2020-08-18},
institution = {PETRAS National Centre of Excellence for IoT Systems Cybersecurity},
abstract = {Assisted living facilities have seen the highest levels of COVID-19 morbidity and mortality in this pandemic. The lack of special surveillance systems was indicated by the European Centre for Disease Prevention and Control as one of the causes for underestimating the disease burden and mortality in assisted living facilities. Technologies that can help monitor viral transmissions and assist with social distancing can address fall detection and prevention, location and contact tracking and tracing, temperature monitoring, fighting isolation, telehealth, and visitor management},
keywords = {},
pubstate = {published},
tppubtype = {report}
}
69. Jain, Shreya: COVID-19: The Internet of Things and Transport. 2020. (Type: report | Abstract | Links | BibTeX) @report{jain_covid_2020c,
title = {COVID-19: The Internet of Things and Transport},
author = {Shreya Jain},
url = {https://petras-iot.org/wp-content/uploads/2020/04/Transport_COVID-19_IoT_PETRAS_18082020_PDF.pdf},
year = {2020},
date = {2020-08-18},
institution = {PETRAS National Centre of Excellence for IoT Systems Cybersecurity},
abstract = {Reports suggest that micromobility will emerge stronger in the post-pandemic world. In the UK, the Department of Transport began national e-scooter trials in June. Public transport operators are adapting innovative technologies to control the spread of the virus and enable social distancing measures• Transport for London (TfL) installed machines to beam UV light onto handrails at stations to stop virus spread. Transport for Greater Manchester (TfGM) are using behavioural AI to understand social distancing at the transport hubs and to assess how passenger behaviour is affected by the pandemic. Uber introduced boat services in London this month, in partnership with Thames Clipper. Highway England staff are using devices tied to their waists that set off a buzzer in their safety helmets if someone gets close to 2m},
keywords = {},
pubstate = {published},
tppubtype = {report}
}
70. Radanliev, Petar; Roure, David Charles De; Walton, Rob; Kleek, Max Goodwin Van; Montalvo, Rafael Mantilla; Santos, Omar; Maddox, La'Treall; Cannady, Stacy: COVID-19 what have we learned? The rise of social machines and connected devices in pandemic management following the concepts of predictive, preventive and personalized medicine. In: vol. 11, no. 3, pp. 311–332, 2020. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-radanliev_covid_2020,
title = {COVID-19 what have we learned? The rise of social machines and connected devices in pandemic management following the concepts of predictive, preventive and personalized medicine},
author = {Petar Radanliev and David Charles De Roure and Rob Walton and Max Goodwin Van Kleek and Rafael Mantilla Montalvo and Omar Santos and La'Treall Maddox and Stacy Cannady},
url = {https://doi.org/10.1007%2Fs13167-020-00218-x},
doi = {10.1007/s13167-020-00218-x},
year = {2020},
date = {2020-07-30},
volume = {11},
number = {3},
pages = {311--332},
publisher = {Springer Science and Business Media LLC},
abstract = {Objectives
Review, compare and critically assess digital technology responses to the COVID-19 pandemic around the world. The specific point of interest in this research is on predictive, preventive and personalized interoperable digital healthcare solutions. This point is supported by failures from the past, where the separate design of digital health solutions has led to lack of interoperability. Hence, this review paper investigates the integration of predictive, preventive and personalized interoperable digital healthcare systems. The second point of interest is the use of new mass surveillance technologies to feed personal data from health professionals to governments, without any comprehensive studies that determine if such new technologies and data policies would address the pandemic crisis.
Method
This is a review paper. Two approaches were used: A comprehensive bibliographic review with R statistical methods of the COVID-19 pandemic in PubMed literature and Web of Science Core Collection, supported with Google Scholar search. In addition, a case study review of emerging new approaches in different regions, using medical literature, academic literature, news articles and other reliable data sources.
Results
Most countries' digital responses involve big data analytics, integration of national health insurance databases, tracing travel history from individual's location databases, code scanning and individual's online reporting. Public responses of mistrust about privacy data misuse differ across countries, depending on the chosen public communication strategy. We propose predictive, preventive and personalized solutions for pandemic management, based on social machines and connected devices.
Solutions
The proposed predictive, preventive and personalized solutions are based on the integration of IoT data, wearable device data, mobile apps data and individual data inputs from registered users, operating as a social machine with strong security and privacy protocols. We present solutions that would enable much greater speed in future responses. These solutions are enabled by the social aspect of human-computer interactions (social machines) and the increased connectivity of humans and devices (Internet of Things).
Conclusion
Inadequate data for risk assessment on speed and urgency of COVID-19, combined with increased globalization of human society, led to the rapid spread of COVID-19. Despite an abundance of digital methods that could be used in slowing or stopping COVID-19 and future pandemics, the world remains unprepared, and lessons have not been learned from previous cases of pandemics. We present a summary of predictive, preventive and personalized digital methods that could be deployed fast to help with the COVID-19 and future pandemics.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Review, compare and critically assess digital technology responses to the COVID-19 pandemic around the world. The specific point of interest in this research is on predictive, preventive and personalized interoperable digital healthcare solutions. This point is supported by failures from the past, where the separate design of digital health solutions has led to lack of interoperability. Hence, this review paper investigates the integration of predictive, preventive and personalized interoperable digital healthcare systems. The second point of interest is the use of new mass surveillance technologies to feed personal data from health professionals to governments, without any comprehensive studies that determine if such new technologies and data policies would address the pandemic crisis.
Method
This is a review paper. Two approaches were used: A comprehensive bibliographic review with R statistical methods of the COVID-19 pandemic in PubMed literature and Web of Science Core Collection, supported with Google Scholar search. In addition, a case study review of emerging new approaches in different regions, using medical literature, academic literature, news articles and other reliable data sources.
Results
Most countries' digital responses involve big data analytics, integration of national health insurance databases, tracing travel history from individual's location databases, code scanning and individual's online reporting. Public responses of mistrust about privacy data misuse differ across countries, depending on the chosen public communication strategy. We propose predictive, preventive and personalized solutions for pandemic management, based on social machines and connected devices.
Solutions
The proposed predictive, preventive and personalized solutions are based on the integration of IoT data, wearable device data, mobile apps data and individual data inputs from registered users, operating as a social machine with strong security and privacy protocols. We present solutions that would enable much greater speed in future responses. These solutions are enabled by the social aspect of human-computer interactions (social machines) and the increased connectivity of humans and devices (Internet of Things).
Conclusion
Inadequate data for risk assessment on speed and urgency of COVID-19, combined with increased globalization of human society, led to the rapid spread of COVID-19. Despite an abundance of digital methods that could be used in slowing or stopping COVID-19 and future pandemics, the world remains unprepared, and lessons have not been learned from previous cases of pandemics. We present a summary of predictive, preventive and personalized digital methods that could be deployed fast to help with the COVID-19 and future pandemics.71. Jain, Shreya: COVID-19: The Internet of Things and Transport. 2020. (Type: report | Abstract | Links | BibTeX) @report{jain_covid_2020a,
title = {COVID-19: The Internet of Things and Transport},
author = {Shreya Jain},
url = {https://petras-iot.org/wp-content/uploads/2020/04/TRANSPORT_COVID-19_IoT_PETRAS_14072020_PDF.pdf},
year = {2020},
date = {2020-07-14},
institution = {PETRAS National Centre of Excellence for IoT Systems Cybersecurity},
abstract = {COVID-19 is leading the transport and mobility sector to new breakthroughs through repurposing technologies to minimise the impact of the pandemic. Cameras (including on drones) equipped with face mask identification software can detect mask wearers in real-time, raising privacy concerns. As lockdown measures start to ease, governments across the world have been increasingly using Artificial Intelligence and Big Data for tracking mobility patterns on public transportation. Mobility applications are being updated with new features to keep users informed about the new rules and help with social distancing. There has been a significant increase in the use of e-bikes and e-scooters across the world, leading to new legislation and changes to infrastructure. Europe is seeing a rapid shift to fully electric vehicles for both public and private transport, seeking to adopt zero emission technologies that provide sustainable travel. In the UK, there has been a significant rise in the number of cyclists leading local authorities to expand the cycle schemes and invest in storage spaces to keep up with the unprecedented demand},
keywords = {},
pubstate = {published},
tppubtype = {report}
}
72. Racovita, Monica; Jain, Shreya: COVID-19: The Internet of Things and Agritech. 2020. (Type: report | Abstract | Links | BibTeX) @report{racovita_covid_2020,
title = {COVID-19: The Internet of Things and Agritech},
author = {Monica Racovita and Shreya Jain},
url = {https://petras-iot.org/wp-content/uploads/2020/04/AGRITECH_Robots_COVID-19_IoT_PETRAS_07072020_PDF.pdf},
year = {2020},
date = {2020-07-07},
institution = {PETRAS National Centre of Excellence for IoT Systems Cybersecurity},
abstract = {COVID-19 has brought severe labour shortages to the agriculture sector; automation has been indicated as a possible solution to the current, and similar future, labour shortages. Recent automation innovations in agriculture include drones, picking and harvesting robots, autonomous tractors, weeding robots, robotic milking, and shepherding and herding robots. Although promising, automation in agriculture is still very expensive for most farmers even in developed countries. A webinar with UK industry representatives, conducted in April 2020, identified main opportunities for automation in agriculture, as well as limiting factors and potential solutions},
keywords = {},
pubstate = {published},
tppubtype = {report}
}
73. Racovita, Monica: COVID-19: The Internet of Things and Health. 2020. (Type: report | Abstract | Links | BibTeX) @report{racovita_covid_2020e,
title = {COVID-19: The Internet of Things and Health},
author = {Monica Racovita},
url = {https://petras-iot.org/wp-content/uploads/2020/04/HEALTH_Robots_COVID-19_IoT_PETRAS_07072020_PDF.pdf},
year = {2020},
date = {2020-07-07},
institution = {PETRAS National Centre of Excellence for IoT Systems Cybersecurity},
abstract = {Hospitals, official authorities and companies around the world have deployed robots in the fight against COVID-19 to monitor patients, disinfect patient rooms and operating theatres, help with social distancing measures, process virus tests or produce masks. As part of the efforts to increase security for hospital robots, the Spanish company Alias Robotics developed the first 'vaccine' for robots. An increased use of robots is not currently considered to significantly threaten livelihoods in healthcare. Bias and privacy issues would need to be considered before further reliance on robots for healthcare purposes during the pandemic and afterwards},
keywords = {},
pubstate = {published},
tppubtype = {report}
}
74. Archibald, Blair; Calder, Muffy; Sevegnani, Michele: Conditional Bigraphs. In: Graph Transformation, pp. 3–19, Springer International Publishing, 2020. (Type: Incollection | Abstract | Links | BibTeX | Altmetric) @incollection{col-in-archibald_conditional_2020,
title = {Conditional Bigraphs},
author = {Blair Archibald and Muffy Calder and Michele Sevegnani},
url = {https://doi.org/10.1007%2F978-3-030-51372-6_1},
doi = {10.1007/978-3-030-51372-6_1},
year = {2020},
date = {2020-06-23},
booktitle = {Graph Transformation},
pages = {3--19},
publisher = {Springer International Publishing},
abstract = {Bigraphs are a universal graph based model, designed for analysing reactive systems that include spatial and non-spatial (e.g. communication) relationships. Bigraphs evolve over time using a rewriting framework that finds instances of a (sub)-bigraph, and substitutes a new bigraph. In standard bigraphs, the applicability of a rewrite rule is determined completely by a local match and does not allow any non-local reasoning, i.e. contextual conditions. We introduce conditional bigraphs that add conditions to rules and show how these fit into the matching framework for standard bigraphs. An implementation is provided, along with a set of examples. Finally, we discuss the limits of application conditions within the existing matching framework and present ways to extend the range of conditions that may be expressed.},
keywords = {},
pubstate = {published},
tppubtype = {incollection}
}
75. Racovita, Monica: COVID-19: The Internet of Things and Health. 2020. (Type: report | Abstract | Links | BibTeX) @report{racovita_covid_2020c,
title = {COVID-19: The Internet of Things and Health},
author = {Monica Racovita},
url = {https://petras-iot.org/wp-content/uploads/2020/04/HEALTH_COVID-19_IoT_PETRAS_16062020_PDF.pdf},
year = {2020},
date = {2020-06-16},
institution = {PETRAS National Centre of Excellence for IoT Systems Cybersecurity},
abstract = {IoT devices such as commercial wearables could track essential parameters for monitoring COVID-19 patients or detecting new cases. Electronic health records (EHRs) are the systematised collection of patients' health data in digital form. Using EHRs data, UK researchers have found that people from Asian and Black ethnic backgrounds are at higher risk of in-hospital death from COVID-19. US Epic's EHRs software received an update in January 2020 to help doctors spot COVID-19 patients by standardising a new travel screening questionnaire. At Northwick Park and Ealing Hospitals in London, software is being developed as an auxiliary to EHR to help emergency rooms track the progress of COVID-19 patients and make the data immediately available to medical staff at the change of shifts. Hospitals in Germany and Czech Republic experienced cyberattacks in May and March. Experts call for cybersecurity provisions for NHS to be considered critical and that the private cybersecurity sector should be called in for assistance. In March the US Department of Health and Human Services (HHS) finalised the interoperability and patient access rules, hailed as a victory for patient rights. Duke University researchers propose 5 steps for a better resilience of EHRs in the COVID-19 era.},
keywords = {},
pubstate = {published},
tppubtype = {report}
}
76. Jain, Shreya: COVID-19: The Internet of Things and Transport. 2020. (Type: report | Abstract | Links | BibTeX) @report{jain_covid_2020b,
title = {COVID-19: The Internet of Things and Transport},
author = {Shreya Jain},
url = {https://petras-iot.org/wp-content/uploads/2020/04/TRANSPORT_COVID-19_IoT_PETRAS_16062020_PDF.pdf},
year = {2020},
date = {2020-06-16},
institution = {PETRAS National Centre of Excellence for IoT Systems Cybersecurity},
abstract = {Self-driving cars are being used to transport supplies and coronavirus tests at Mayo Clinic in Florida, USA. Electric Vehicles are gaining popularity globally. Denmark is creating e-bike routes to link its cities to towns and villages. Fully Charged, an electric bike retailer, is providing e-bikes to NHS workers in London for a free three-month loan. The world's largest all-electric commercial plane, took its first successful flight, creating an ambitious roadmap for electric air taxis. Ford is disinfecting its police SUVs with a newly developed software that heats the car interiors to 133 degrees Fahrenheit, which reduces the footprint of the COVID-19 virus to almost 100%. Shared-vehicles and public-transport operators are deploying robots and other technologies to minimize the spread of coronavirus. There has been a significant rise in applications and platforms that support the technological advancements in vehicles. Drones have become a go-to technology for most countries to combat COVID-19.},
keywords = {},
pubstate = {published},
tppubtype = {report}
}
77. Radanliev, Petar; Roure, David Charles De; Page, Kevin R.; Nurse, Jason R. C.; Montalvo, Rafael Mantilla; Santos, Omar; Maddox, La'Treall; Burnap, Peter: Cyber risk at the edge: current and future trends on cyber risk analytics and artificial intelligence in the industrial internet of things and industry 4.0 supply chains. In: vol. 3, no. 1, 2020. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-radanliev_cyber_2020,
title = {Cyber risk at the edge: current and future trends on cyber risk analytics and artificial intelligence in the industrial internet of things and industry 4.0 supply chains},
author = {Petar Radanliev and David Charles De Roure and Kevin R. Page and Jason R. C. Nurse and Rafael Mantilla Montalvo and Omar Santos and La'Treall Maddox and Peter Burnap},
url = {https://doi.org/10.1186%2Fs42400-020-00052-8},
doi = {10.1186/s42400-020-00052-8},
year = {2020},
date = {2020-06-02},
volume = {3},
number = {1},
publisher = {Springer Science and Business Media LLC},
abstract = {Digital technologies have changed the way supply chain operations are structured. In this article, we conduct systematic syntheses of literature on the impact of new technologies on supply chains and the related cyber risks. A taxonomic/cladistic approach is used for the evaluations of progress in the area of supply chain integration in the Industrial Internet of Things and Industry 4.0, with a specific focus on the mitigation of cyber risks. An analytical framework is presented, based on a critical assessment with respect to issues related to new types of cyber risk and the integration of supply chains with new technologies. This paper identifies a dynamic and self-adapting supply chain system supported with Artificial Intelligence and Machine Learning (AI/ML) and real-time intelligence for predictive cyber risk analytics. The system is integrated into a cognition engine that enables predictive cyber risk analytics with real-time intelligence from IoT networks at the edge. This enhances capacities and assist in the creation of a comprehensive understanding of the opportunities and threats that arise when edge computing nodes are deployed, and when AI/ML technologies are migrated to the periphery of IoT networks.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
78. Almutairi, Asma; Davies, Nigel; Mikusz, Mateusz; Langheinrich, Marc; Clinch, Sarah: Designing for Conflict: A Design Space for Multi-viewer Support in Future Display Networks. In: Proceedings of the 9TH ACM International Symposium on Pervasive Displays, ACM, 2020. (Type: Inproceedings | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-almutairi_designing_2020,
title = {Designing for Conflict: A Design Space for Multi-viewer Support in Future Display Networks},
author = {Asma Almutairi and Nigel Davies and Mateusz Mikusz and Marc Langheinrich and Sarah Clinch},
doi = {10.1145/3393712.3395336},
year = {2020},
date = {2020-06-01},
booktitle = {Proceedings of the 9TH ACM International Symposium on Pervasive Displays},
publisher = {ACM},
abstract = {Public display networks are increasingly seeking to provide personalised content to viewers. A key challenge in this area is to how to support conflicting personalisation requirements from multiple concurrent viewers. In this paper we present a four dimensional design space that describes a wide range of approaches to addressing this issue. This design space can be used by developers and researchers to understand how systems can be engineered to deliver an increase in the effective communications bandwidth to viewers while meeting their conflicting content requirements. This is the first attempt at systematically examining the challenges and design choices in this important emerging area.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
79. Cannizzaro, Sara; Procter, Rob; Ma, Sinong; Maple, Carsten: Trust in the smart home: Findings from a nationally representative survey in the UK. In: vol. 15, no. 5, 2020. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-cannizzaro_trust_2020,
title = {Trust in the smart home: Findings from a nationally representative survey in the UK},
author = {Sara Cannizzaro and Rob Procter and Sinong Ma and Carsten Maple},
doi = {10.1371/journal.pone.0231615},
year = {2020},
date = {2020-05-29},
volume = {15},
number = {5},
abstract = {Businesses in the smart home sector are actively promoting the benefits of smart home technologies for consumers, such as convenience, economy and home security. To better understand meanings of and trust in the smart home, we carried out a nationally representative survey of UK consumers designed to measure adoption and acceptability, focusing on awareness, ownership, experience, trust, satisfaction and intention to use. We analysed the results using theories of meanings and acceptability of technologies including semiotics, social construction of technology (SCOT) and sociotechnical affordance. Our findings suggest that the meaning and value proposition of the smart home have not yet achieved closure for consumers, but is already foregrounding risks to privacy and security amongst the other meaning-making possibilities it could afford. Anxiety about the likelihood of a security incident emerges as a prominent factor influencing adoption of smart home technology. This factor negatively impacts adoption. These findings underline how businesses and policymakers will need to work together to act on the sociotechnical affordances of smart home technology in order to increase consumers' trust. This intervention is necessary if barriers to adoption and acceptability of the smart home are to be addressed now and in the future.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
80. Radanliev, Petar; Roure, David Charles De; Kleek, Max Goodwin Van: Digitalization of COVID-19 Pandemic Management and Cyber Risk from Connected Systems. In: 2020. (Type: Journal Article | Abstract | Links | BibTeX) @article{art-radanliev_digitalization_2020,
title = {Digitalization of COVID-19 Pandemic Management and Cyber Risk from Connected Systems},
author = {Petar Radanliev and David Charles De Roure and Max Goodwin Van Kleek},
url = {https://iot.ieee.org/newsletter/may-2020/digitalization-of-covid-19-pandemic-management-and-cyber-risk-from-connected-systems},
year = {2020},
date = {2020-05-14},
abstract = {What makes cyber risks arising from connected systems challenging during the management of a pandemic? Assuming that a variety of cyber-physical systems are already operational-collecting, analyzing, and acting on data autonomously-what risks might arise in their application to pandemic management? We already have these systems operational, collecting, and analyzing data autonomously, so how would a pandemic monitoring app be different or riskier?
Perhaps unsurprisingly, the answer to these questions depends on specific aspects of the design and deployment of the connected systems in question. If established security design rules are followed, and focus is placed on what is required for pandemic management, this risk will be minimized. If, however, due to time and resource pressure such as from an unfolding pandemic, security is ignored for practicality and speed, new systems could be more easily compromised, leading to the potential for later system failures at crucial times. If such systems are designed and operated in the first wave of a global pandemic such as COVID-19, during the second and subsequent waves of system failure could lead to unnecessary loss of lives. We outline the security design principles that would minimize the potential risk scenarios.
Since the COVID-19 pandemic, the focus on stringent personal data protection for preserving individual privacy has been made more complicated by the need to support public health efforts that necessitate some degree of global surveillance assisted with new digital technologies. This brings into attention Internet of Things (IoT) technologies for their ability to operate autonomously to collect, analyze, and share data about the physical environment, which makes them essential elements in the digitalization of pandemic management. The IoT represents technologies that can use sensors for detection, gather and analyze information, create meaningful insights and act. The action usually represents a tailored product or service or improves the efficiency of operational processes. One difference between the IoT and the Internet is that the IoT can be completely automated and autonomous; in contrast, the Internet is fundamentally designed for an application that connects people. With IoT technologies, the role of humans as actors in the network is arguably diminished. Automated and autonomous IoT technologies trigger questions on the potential cyber risk arising from the integration of artificial intelligence and machine learning in the IoT network. We review how artificial intelligence and machine learning can enable pandemic management, while ethically assessing the cyber risk from increased deregulation of data standards in IoT devices and networks.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Perhaps unsurprisingly, the answer to these questions depends on specific aspects of the design and deployment of the connected systems in question. If established security design rules are followed, and focus is placed on what is required for pandemic management, this risk will be minimized. If, however, due to time and resource pressure such as from an unfolding pandemic, security is ignored for practicality and speed, new systems could be more easily compromised, leading to the potential for later system failures at crucial times. If such systems are designed and operated in the first wave of a global pandemic such as COVID-19, during the second and subsequent waves of system failure could lead to unnecessary loss of lives. We outline the security design principles that would minimize the potential risk scenarios.
Since the COVID-19 pandemic, the focus on stringent personal data protection for preserving individual privacy has been made more complicated by the need to support public health efforts that necessitate some degree of global surveillance assisted with new digital technologies. This brings into attention Internet of Things (IoT) technologies for their ability to operate autonomously to collect, analyze, and share data about the physical environment, which makes them essential elements in the digitalization of pandemic management. The IoT represents technologies that can use sensors for detection, gather and analyze information, create meaningful insights and act. The action usually represents a tailored product or service or improves the efficiency of operational processes. One difference between the IoT and the Internet is that the IoT can be completely automated and autonomous; in contrast, the Internet is fundamentally designed for an application that connects people. With IoT technologies, the role of humans as actors in the network is arguably diminished. Automated and autonomous IoT technologies trigger questions on the potential cyber risk arising from the integration of artificial intelligence and machine learning in the IoT network. We review how artificial intelligence and machine learning can enable pandemic management, while ethically assessing the cyber risk from increased deregulation of data standards in IoT devices and networks.81. Lindley, Joseph Galen; Akmal, Haider Ali; Pilling, Franziska Louise; Coulton, Paul: Researching AI Legibility through Design. In: CHI '20: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, ACM, 2020. (Type: Inproceedings | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-lindley_researching_2020,
title = {Researching AI Legibility through Design},
author = {Joseph Galen Lindley and Haider Ali Akmal and Franziska Louise Pilling and Paul Coulton},
url = {https://doi.org/10.1145%2F3313831.3376792},
doi = {10.1145/3313831.3376792},
year = {2020},
date = {2020-04-21},
booktitle = {CHI '20: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems},
publisher = {ACM},
abstract = {Everyday interactions with computers are increasingly likely to involve elements of Artificial Intelligence (AI). Encompassing a broad spectrum of technologies and applications, AI poses many challenges for HCI and design. One such challenge is the need to make AI's role in a given system legible to the user in a meaningful way. In this paper we employ a Research through Design (RtD) approach to explore how this might be achieved. Building on contemporary concerns and a thorough exploration of related research, our RtD process reflects on designing imagery intended to help increase AI legibility for users. The paper makes three contributions. First, we thoroughly explore prior research in order to critically unpack the AI legibility problem space. Second, we respond with design proposals whose aim is to enhance the legibility, to users, of systems using AI. Third, we explore the role of design-led enquiry as a tool for critically exploring the intersection between HCI and AI research.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
82. Javed, Amir; Lakoju, Mike; Burnap, Peter; Rana, Omer: Security analytics for real-time forecasting of cyberattacks. In: 2020. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-javed_security_2020,
title = {Security analytics for real-time forecasting of cyberattacks},
author = {Amir Javed and Mike Lakoju and Peter Burnap and Omer Rana},
url = {https://doi.org/10.1002%2Fspe.2822},
doi = {10.1002/spe.2822},
year = {2020},
date = {2020-04-02},
publisher = {Wiley},
abstract = {Protection of networked computing infrastructures (such as Internet of Things, Industrial Control Systems, and Edge computing) is dependent on the continuous monitoring of interaction between such devices and network/Cloud-based hosts (especially in Industry 4.0 environments). This real-time monitoring enables an analyst to quantify evolving and emerging threats to such network infrastructures. A framework for identifying patterns in observed cyberthreats and the use of these patterns for forecasting the growth of an emerging threat to network infrastructure is proposed. This framework enables predicting the maximum threat intensity and the time period over which this maximum intensity is likely to occur. The proposed framework integrates: (a) continuous monitoring of device/network activity, (b) forecasting behavior using exponentially weighted moving averages, (c) utilizing Fibonacci retracement for estimating the potential intensity of a cyberattack, and (d) linear regression for predicting response time for high risk thresholds and a machine learning strategy to predict potential risk over a pre-defined time window. Using this approach, we can produce time intervals between the forecast and the actual attacks using real-world network activity data. Our results show an average lead time of around 1.75 hours, providing a window of opportunity to limit the impact of an attack and counter it.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
83. Seymour, William; Kleek, Max Goodwin Van: Does Siri Have a Soul? Exploring Voice Assistants Through Shinto Design Fictions. In: CHI '20: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, ACM, 2020. (Type: Inproceedings | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-seymour_does_2020,
title = {Does Siri Have a Soul? Exploring Voice Assistants Through Shinto Design Fictions},
author = {William Seymour and Max Goodwin Van Kleek},
url = {https://doi.org/10.1145%2F3334480.3381809},
doi = {10.1145/3334480.3381809},
year = {2020},
date = {2020-03-06},
booktitle = {CHI '20: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems},
publisher = {ACM},
abstract = {It can be difficult to critically reflect on technology that has become part of everyday rituals and routines. To combat this, speculative and fictional approaches have previously been used by HCI to decontextualise the familiar and imagine alternatives. In this work we turn to Japanese Shinto narratives as a way to defamiliarise voice assistants, inspired by the similarities between how assistants appear to 'inhabit' objects similarly to kami. Describing an alternate future where assistant presences live inside objects, this approach foregrounds some of the phenomenological quirks that can otherwise easily become lost. Divorced from the reality of daily life, this approach allows us to reevaluate some of the common interactions and design patterns that are common in the virtual assistants of the present.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
84. Spina, A.; Breza, Michael J.; Dulay, N.; McCann, Julie A.: XPC: fast and reliable synchronous transmission protocols for 2-phase commit and 3-phase commit. In: The 2020 International Conference on Embedded Wireless Systems and Networks, 2020. (Type: Inproceedings | Abstract | Links | BibTeX) @inproceedings{proc-in-spina_xpc_2020,
title = {XPC: fast and reliable synchronous transmission protocols for 2-phase commit and 3-phase commit},
author = {A. Spina and Michael J. Breza and N. Dulay and Julie A. McCann},
url = {http://hdl.handle.net/10044/1/77591},
year = {2020},
date = {2020-02-17},
booktitle = {The 2020 International Conference on Embedded Wireless Systems and Networks},
abstract = {The improvement of software abstractions and frame-works for programmers is one of the major challenges forthe engineering of reliable and efficient wireless sensing sys-tems. We address this challenge with X Process Commit(XPC), an atomic commit protocol framework, andHybrid,a Synchronous Transmission (ST) communication approach.Hybridexploits the reliability of Glossy and the speed ofChaos, two Synchronous Transmission primitives, to getlower latency and higher reliability than either on their own.Hybridis a general approach that can provide reliable com-munication for any round based protocol. We use XPC andHybridto build the classical 2-phase and 3-phase commitprotocols. Through extensive experimentation, we comparethe performance of the 2-phase and 3-phase commit proto-cols when they useHybrid, Glossy, and Chaos for commu-nication. Our results show thatHybridis more robust thanChaos to radio interference, with almost 100% reliability in anetwork of nodes suffering from moderate radio interference,13% to 50% faster than Glossy, and has comparable over-heads to other state of the art ST atomic commit approachesA2/Synchrotron.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
85. Lindley, Joseph Galen; Akmal, Haider Ali; Coulton, Paul: Design Research and Object-Oriented Ontology. In: vol. 3, no. 1, pp. 11–41, 2020. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-lindley_design_2020,
title = {Design Research and Object-Oriented Ontology},
author = {Joseph Galen Lindley and Haider Ali Akmal and Paul Coulton},
url = {https://doi.org/10.1515%2Fopphil-2020-0002},
doi = {10.1515/opphil-2020-0002},
year = {2020},
date = {2020-01-24},
volume = {3},
number = {1},
pages = {11--41},
publisher = {Walter de Gruyter GmbH},
abstract = {In this paper we recount several research projects conducted at ImaginationLancaster (http://imagination.lancs.ac.uk) a Design-led research laboratory, all of which consider Object-Oriented Ontology (OOO). The role OOO plays in these projects is varied: as a generative mechanism contributing to ideation; as a framework for analysis; and as a constituent in developing new design theory. Each project's focus is quite unique\textemdashan app, a board game, a set of Tarot cards, a kettle and a living room\textemdashhowever they are all concerned with developing new understandings relating to the ubiquitous, networked, 'smart' technologies which are often referred to as the Internet of Things (IoT). Through our reflexive account of these research projects the aim of this paper is to provide insights into, and promote new discussion about, the relevance and scope for OOO in socio-technical Design Research, and beyond.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
86. Johnson, Shane D.; Blythe, John M.; Manning, Matthew; Wong, Gabriel T. W.: The impact of IoT security labelling on consumer product choice and willingness to pay. In: vol. 15, no. 1, pp. e0227800, 2020. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-johnson_impact_2020,
title = {The impact of IoT security labelling on consumer product choice and willingness to pay},
author = {Shane D. Johnson and John M. Blythe and Matthew Manning and Gabriel T. W. Wong},
editor = {Muhammad Khurram Khan},
doi = {10.1371/journal.pone.0227800},
year = {2020},
date = {2020-01-24},
volume = {15},
number = {1},
pages = {e0227800},
publisher = {Public Library of Science (PLoS)},
abstract = {The Internet of Things (IoT) brings internet connectivity to everyday electronic devices (e.g. security cameras and smart TVs) to improve their functionality and efficiency. However, serious security and privacy concerns have been raised about the IoT which impact upon consumer trust and purchasing. Moreover, devices vary considerably in terms of the security they provide, and it is difficult for consumers to differentiate between more and less secure devices. One proposal to address this is for devices to carry a security label to help consumers navigate the market and know which devices to trust, and to encourage manufacturers to improve security. Using a discrete choice experiment, we estimate the potential impact of such labels on participant's purchase decision making, along with device functionality and price. With the exception of a label that implied weak security, participants were significantly more likely to select a device that carried a label than one that did not. While they were generally willing to pay the most for premium functionality, for two of the labels tested, they were prepared to pay the same for security and functionality. Qualitative responses suggested that participants would use a label to inform purchasing decisions, and that the labels did not generate a false sense of security. Our findings suggest that the use of a security label represents a policy option that could influence behaviour and that should be seriously considered.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
87. Newmarch, Georgia; Knowles, Brandin Hanson; Beck, Sophie; Finney, Joe: Accounting for Dynamic Diversity Among Child Users of IoT. In: vol. 19, no. 1, pp. 43–51, 2020. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-newmarch_accounting_2020,
title = {Accounting for Dynamic Diversity Among Child Users of IoT},
author = {Georgia Newmarch and Brandin Hanson Knowles and Sophie Beck and Joe Finney},
url = {https://doi.org/10.1109%2Fmprv.2019.2923402},
doi = {10.1109/mprv.2019.2923402},
year = {2020},
date = {2020-01-17},
volume = {19},
number = {1},
pages = {43--51},
publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
abstract = {As IoT becomes increasingly pervasive, children are more regularly encountering IoT. The recent GDPR legislation in Europe goes some way toward protecting children as they make use of these IoT and other technologies, but there remain significant challenges in ensuring that the IoT that pervades children's world is socially responsible. This paper explores some of the reasons why the ethical implications of IoT for children is difficult to contain, and suggests several ways that design might make progress toward socially responsible IoT.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
88. Radanliev, Petar; Roure, David Charles De; Nurse, Jason R. C.; Montalvo, Rafael Mantilla; Cannady, Stacy; Santos, Omar; Maddox, La'Treall; Burnap, Peter; Maple, Carsten: Future developments in standardisation of cyber risk in the Internet of Things (IoT). In: vol. 2, no. 169, 2020. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-radanliev_future_2020,
title = {Future developments in standardisation of cyber risk in the Internet of Things (IoT)},
author = {Petar Radanliev and David Charles De Roure and Jason R. C. Nurse and Rafael Mantilla Montalvo and Stacy Cannady and Omar Santos and La'Treall Maddox and Peter Burnap and Carsten Maple},
url = {https://doi.org/10.1007%2Fs42452-019-1931-0},
doi = {10.1007/s42452-019-1931-0},
year = {2020},
date = {2020-01-08},
volume = {2},
number = {169},
publisher = {Springer Science and Business Media LLC},
abstract = {In this research article, we explore the use of a design process for adapting existing cyber risk assessment standards to allow the calculation of economic impact from IoT cyber risk. The paper presents a new model that includes a design process with new risk assessment vectors, specific for IoT cyber risk. To design new risk assessment vectors for IoT, the study applied a range of methodologies, including literature review, empirical study and comparative study, followed by theoretical analysis and grounded theory. An epistemological framework emerges from applying the constructivist grounded theory methodology to draw on knowledge from existing cyber risk frameworks, models and methodologies. This framework presents the current gaps in cyber risk standards and policies, and defines the design principles of future cyber risk impact assessment. The core contribution of the article therefore, being the presentation of a new model for impact assessment of IoT cyber risk.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
89. Blythe, John M.; Johnson, Shane D.; Manning, Matthew: What is security worth to consumers? Investigating willingness to pay for secure Internet of Things devices. In: vol. 9, no. 1, 2020. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-blythe_what_2020,
title = {What is security worth to consumers? Investigating willingness to pay for secure Internet of Things devices},
author = {John M. Blythe and Shane D. Johnson and Matthew Manning},
doi = {10.1186/s40163-019-0110-3},
year = {2020},
date = {2020-01-08},
volume = {9},
number = {1},
publisher = {Springer Science and Business Media LLC},
abstract = {The Internet of Things (IoT) is considered the next technological revolution. IoT devices include once everyday objects that are now internet connected, such as smart locks and smart fridges, but also new types of devices to include home assistants. However, while this increased interconnectivity brings considerable benefits, it can and does increase people's exposure to crime risk. This is particularly the case as most devices are developed without security in mind. One reason for this is that there is little incentive for manufacturers to make devices secure by design, and the costs of so doing do not encourage it. The principle aim of the current paper was to estimate the extent to which consumers are willing to pay for improved security in internet connected products. The second aim was to examine whether this is conditioned by their exposure to security-related information. Using an experimental design, and a contingent valuation method, we find that people are willing to pay for improved security and that for some devices, this increases if they are exposed to information about security prior to stating their willingness to pay. The implications of our findings for industry and the secure by design agenda are discussed.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
90. Davies, Nigel; Lane, Nicholas D.; Musolesi, Mirco: Pervasive Data Science and AI. In: vol. 18, no. 3, pp. 7–8, 2019. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-davies_pervasive_2019,
title = {Pervasive Data Science and AI},
author = {Nigel Davies and Nicholas D. Lane and Mirco Musolesi},
url = {https://doi.org/10.1109%2Fmprv.2019.2944289},
doi = {10.1109/mprv.2019.2944289},
year = {2019},
date = {2019-11-28},
volume = {18},
number = {3},
pages = {7--8},
publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
abstract = {Recent years have seen an explosion in the use of data science and AI as a central tenant in numerous computing applications, products, research, and innovation. Examples of the success of data science abound\textemdashapplying new machine-learning techniques to problems such as vision and speech recognition and translation has achieved commonplace levels of performance that would have seemed impossible a few years ago. In parallel, developments in pervasive computing increasingly enable us to instrument our physical environment with complex sensors and actuators and create an interconnected world that generates huge volumes of data. The importance of these trends can be seen in the growing momentum of exemplars such as the Internet of Things (IoT), smart environments, and augmented cognition. Pervasive data science is characterized by a focus on the collection, analysis (inference), and use of data (actuation) in pursuit of the vision of ubiquitous computing1 and raises multiple new challenges, demanding new approaches to how we capture, process, and use data in pervasive environments. Beyond the hype, it is clear that our world is becoming increasingly data centric, in which both physical and electronic services depend on the collection, analysis, and application of large volumes of heterogeneous data. In this Special Issue, we present a series of articles that cover different aspects of the exciting work that is currently carried out in this area.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
91. Gardiner, Joseph; Craggs, Barnaby; Green, Benjamin; Rashid, Awais: Oops I Did it Again: Further Adventures in the Land of ICS Security Testbeds. In: Proceedings of the ACM Workshop on Cyber-Physical Systems Security &$mathsemicolon$ Privacy - CPS-SPC'19, ACM Press, 2019. (Type: Inproceedings | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-gardiner_oops_2019,
title = {Oops I Did it Again: Further Adventures in the Land of ICS Security Testbeds},
author = {Joseph Gardiner and Barnaby Craggs and Benjamin Green and Awais Rashid},
doi = {10.1145/3338499.3357355},
year = {2019},
date = {2019-11-01},
booktitle = {Proceedings of the ACM Workshop on Cyber-Physical Systems Security \&$mathsemicolon$ Privacy - CPS-SPC'19},
publisher = {ACM Press},
abstract = {Research efforts in the security of Industrial Control Systems (ICS) have dramatically increased over the past few years. However, there is a limiting factor when work cannot be evaluated on real-world systems due to safety and operational reasons. This has led to multiple deployments of ICS testbeds covering multiple sectors including water treatment, power distribution and transportation networks.
Over the last five years, we have designed and constructed ICS testbeds to support cyber security research. Our prior work in building testbeds culminated in a set of design principles and lessons learnt, formulated to support other researchers in designing and building their own ICS testbeds. In the last two years we have taken these lessons and used them to guide our own greenfield large-scale, complex and process-diverse security testbed affording a rare opportunity to design and build from the ground up -- one in which we have been able to look back and validate those past lessons and principles.
In this work we describe the process of building our new ICS and Industrial Internet of Things (IIoT) testbed, and give an overview of its architecture. We then reflect on our past lessons, and contribute five previously unrecognised additional lessons based on this experience.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Over the last five years, we have designed and constructed ICS testbeds to support cyber security research. Our prior work in building testbeds culminated in a set of design principles and lessons learnt, formulated to support other researchers in designing and building their own ICS testbeds. In the last two years we have taken these lessons and used them to guide our own greenfield large-scale, complex and process-diverse security testbed affording a rare opportunity to design and build from the ground up -- one in which we have been able to look back and validate those past lessons and principles.
In this work we describe the process of building our new ICS and Industrial Internet of Things (IIoT) testbed, and give an overview of its architecture. We then reflect on our past lessons, and contribute five previously unrecognised additional lessons based on this experience.92. Blythe, John M.; Johnson, Shane D.: A systematic review of crime facilitated by the~consumer Internet of Things. In: vol. 34, no. 1, pp. 97–125, 2019. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-blythe_systematic_2019,
title = {A systematic review of crime facilitated by the~consumer Internet of Things},
author = {John M. Blythe and Shane D. Johnson},
doi = {10.1057/s41284-019-00211-8},
year = {2019},
date = {2019-10-01},
volume = {34},
number = {1},
pages = {97--125},
publisher = {Springer Science and Business Media LLC},
abstract = {The nature of crime is changing\textemdashestimates suggest that at least half of all crime is now committed online. Once everyday objects (e.g. televisions, baby monitors, door locks) that are now internet connected, collectively referred to as the Internet of Things (IoT), have the potential to transform society, but this increase in connectivity may generate new crime opportunities. Here, we conducted a systematic review to inform understanding of these risks. We identify a number of high-level mechanisms through which offenders may exploit the consumer IoT including profiling, physical access control and the control of device audio/visual outputs. The types of crimes identified that could be facilitated by the IoT were wide ranging and included burglary, stalking, and sex crimes through to state level crimes including political subjugation. Our review suggests that the IoT presents substantial new opportunities for offending and intervention is needed now to prevent an IoT crime harvest.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
93. Zhang, Bingsheng; Zhou, Hong-Sheng: Statement Voting. In: FC 2019: Financial Cryptography and Data Security, pp. 667–685, Springer International Publishing, 2019. (Type: Incollection | Abstract | Links | BibTeX | Altmetric) @incollection{col-in-zhang_statement_2019,
title = {Statement Voting},
author = {Bingsheng Zhang and Hong-Sheng Zhou},
url = {https://doi.org/10.1007%2F978-3-030-32101-7_38},
doi = {10.1007/978-3-030-32101-7_38},
year = {2019},
date = {2019-09-30},
booktitle = {FC 2019: Financial Cryptography and Data Security},
pages = {667--685},
publisher = {Springer International Publishing},
abstract = {The conventional (election) voting systems, e.g., representative democracy, have many limitations and often fail to serve the best interest of the people in a collective decision-making process. To address this issue, the concept of liquid democracy has been emerging as an alternative decision-making model to make better use of "the wisdom of crowds". However, there is no known cryptographically secure e-voting implementation that supports liquid democracy.
In this work, we propose a new voting concept called statement voting, which can be viewed as a natural extension of the conventional voting approaches. In the statement voting, instead of defining a concrete election candidate, each voter can define a statement in his/her ballot but leave the vote "undefined" during the voting phase. During the tally phase, the (conditional) actions expressed in the statement will be carried out to determine the final vote. We initiate the study of statement voting under the Universal Composability (UC) framework, and propose several construction frameworks together with their instantiations. As an application, we show how statement voting can be used to realize a UC-secure liquid democracy voting system. We remark that our statement voting can be extended to enable more complex voting and generic ledger-based non-interactive multi-party computation. We believe that the statement voting concept opens a door for constructing a new class of e-voting schemes.},
keywords = {},
pubstate = {published},
tppubtype = {incollection}
}
In this work, we propose a new voting concept called statement voting, which can be viewed as a natural extension of the conventional voting approaches. In the statement voting, instead of defining a concrete election candidate, each voter can define a statement in his/her ballot but leave the vote "undefined" during the voting phase. During the tally phase, the (conditional) actions expressed in the statement will be carried out to determine the final vote. We initiate the study of statement voting under the Universal Composability (UC) framework, and propose several construction frameworks together with their instantiations. As an application, we show how statement voting can be used to realize a UC-secure liquid democracy voting system. We remark that our statement voting can be extended to enable more complex voting and generic ledger-based non-interactive multi-party computation. We believe that the statement voting concept opens a door for constructing a new class of e-voting schemes.94. Yuan, Hu; Bradbury, Matthew; Maple, Carsten; Gu, Chen: Throughput Aware Authentication Prioritisation for Vehicular Communication Networks. In: 2019 IEEE 90th Vehicular Technology Conference (VTC2019-Fall), IEEE, 2019. (Type: Inproceedings | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-yuan_throughput_2019,
title = {Throughput Aware Authentication Prioritisation for Vehicular Communication Networks},
author = {Hu Yuan and Matthew Bradbury and Carsten Maple and Chen Gu},
url = {https://doi.org/10.1109%2Fvtcfall.2019.8891375},
doi = {10.1109/vtcfall.2019.8891375},
year = {2019},
date = {2019-09-22},
booktitle = {2019 IEEE 90th Vehicular Technology Conference (VTC2019-Fall)},
publisher = {IEEE},
abstract = {Connected vehicles will be a prominent feature of future Intelligent Transport Systems. Which means that there will be a very high volume of wireless traffic that vehicles will receive and process. Due to this large quantity of traffic, there will be Quality of Service (QoS) constraints on the system that means messages will need to be prioritised. As vehicles will have a finite buffer to hold messages, the prioritisation scheme must consider network throughput to ensure QoS requirements are met. In our throughput authentication prioritisation technique, a Markov model is used to detect abnormally large data traffic users who are potential attackers performing a Denial of Service (DoS). Our results show that the algorithm can efficiently enhance network throughput.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
95. Lim, Soo Yee; Gardiner, Joseph; Craggs, Barnaby; Rashid, Awais: RESTful HTTPS over Zigbee: Why and how?. In: Electronic Workshops in Computing, BCS Learning & Development, 2019. (Type: Inproceedings | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-lim_restful_2019,
title = {RESTful HTTPS over Zigbee: Why and how?},
author = {Soo Yee Lim and Joseph Gardiner and Barnaby Craggs and Awais Rashid},
doi = {10.14236/ewic/icscsr19.14},
year = {2019},
date = {2019-09-10},
booktitle = {Electronic Workshops in Computing},
publisher = {BCS Learning \& Development},
abstract = {With the advent of the Internet-of-Things (IoT), there has been a wave of wireless protocols aimed at providingcommunication between connected devices. One of the most widely used protocols is Zigbee, a derivativeof the IEEE 802.15.4 protocol for building low power mesh networks. Whilst Zigbee has largely found a use inconsumer grade devices, it has also been explored as a protocol for use in industrial and building automationsystems. A number of vulnerabilities have been found within the Zigbee and IEEE 801.15.4 standard whichcould damage the integrity of the transmitted data. Therefore, we propose a solution wherein a RESTfulHTTPS protocol is transmitted over Zigbee networks, effectively providing a double layer of security. Wedemonstrate that RESTful HTTPS over Zigbee is possible, and evaluate its performance.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
96. Mikusz, Mateusz; Choo, Kenny Tsu Wei; Balan, Rajesh Krishna; Davies, Nigel; Lee, Youngki: New Challenges in Display-Saturated Environments. In: vol. 18, no. 2, pp. 67–75, 2019. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-mikusz_new_2019,
title = {New Challenges in Display-Saturated Environments},
author = {Mateusz Mikusz and Kenny Tsu Wei Choo and Rajesh Krishna Balan and Nigel Davies and Youngki Lee},
url = {https://doi.org/10.1109%2Fmprv.2019.2906992},
doi = {10.1109/mprv.2019.2906992},
year = {2019},
date = {2019-08-12},
volume = {18},
number = {2},
pages = {67--75},
publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
abstract = {We live in a world in which our physical spaces are becoming increasingly enriched with computing technology. Pervasive displays have been at the forefront of this progression and are now commonplace. In this paper, we focus on the natural end-point of this trend and consider the case when displays become truly ubiquitous and saturate our physical environments. We use as motivation a state-of-the-art display deployment in which mobile users navigating the space are simultaneously exposed to many hundreds of displays within their field of view and we highlight a number of new research challenges.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
97. Anthi, Eirini; Williams, Lowri; Slowinska, Malgorzata; Theodorakopoulos, George; Burnap, Peter: A Supervised Intrusion Detection System for Smart Home IoT Devices. In: vol. 6, no. 5, pp. 9042–9053, 2019, ISSN: 2327-4662. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-anthi_supervised_2019,
title = {A Supervised Intrusion Detection System for Smart Home IoT Devices},
author = {Eirini Anthi and Lowri Williams and Malgorzata Slowinska and George Theodorakopoulos and Peter Burnap},
url = {https://doi.org/10.1109%2Fjiot.2019.2926365},
doi = {10.1109/jiot.2019.2926365},
issn = {2327-4662},
year = {2019},
date = {2019-07-02},
volume = {6},
number = {5},
pages = {9042--9053},
publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
abstract = {The proliferation in Internet of Things (IoT) devices, which routinely collect sensitive information, is demonstrated by their prominence in our daily lives. Although such devices simplify and automate every day tasks, they also introduce tremendous security flaws. Current insufficient security measures employed to defend smart devices make IoT the "weakest" link to breaking into a secure infrastructure, and therefore an attractive target to attackers. This paper proposes a three layer intrusion detection system (IDS) that uses a supervised approach to detect a range of popular network based cyber-attacks on IoT networks. The system consists of three main functions: 1) classify the type and profile the normal behavior of each IoT device connected to the network; 2) identifies malicious packets on the network when an attack is occurring; and 3) classifies the type of the attack that has been deployed. The system is evaluated within a smart home testbed consisting of eight popular commercially available devices. The effectiveness of the proposed IDS architecture is evaluated by deploying 12 attacks from 4 main network based attack categories, such as denial of service (DoS), man-in-the-middle (MITM)/spoofing, reconnaissance, and replay. Additionally, the system is also evaluated against four scenarios of multistage attacks with complex chains of events. The performance of the system's three core functions result in an F-measure of: 1) 96.2%; 2) 90.0%; and 3) 98.0%. This demonstrates that the proposed architecture can automatically distinguish between IoT devices on the network, whether network activity is malicious or benign, and detect which attack was deployed on which device connected to the network successfully.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
98. Sun, Yingnan; Lo, Frank P. -W.; Lo, Benny P. L.: EEG-based user identification system using 1D-convolutional long short-term memory neural networks. In: vol. 125, pp. 259–267, 2019. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-sun_eeg_2019,
title = {EEG-based user identification system using 1D-convolutional long short-term memory neural networks},
author = {Yingnan Sun and Frank P. -W. Lo and Benny P. L. Lo},
url = {https://doi.org/10.1016%2Fj.eswa.2019.01.080},
doi = {10.1016/j.eswa.2019.01.080},
year = {2019},
date = {2019-07-01},
volume = {125},
pages = {259--267},
publisher = {Elsevier BV},
abstract = {Electroencephalographic (EEG) signals have been widely used in medical applications, yet the use of EEG signals as user identification systems for healthcare and Internet of Things (IoT) systems has only gained interests in the last few years. The advantages of EEG-based user identification systems lie in its dynamic property and uniqueness among different individuals. However, it is for this reason that manually designed features are not always adapted to the needs. Therefore, a novel approach based on 1D Convolutional Long Short-term Memory Neural Network (1D-Convolutional LSTM) for EEG-based user identification system is proposed in this paper. The performance of the proposed approach was validated with a public database consists of EEG data of 109 subjects. The experimental results showed that the proposed network has a very high averaged accuracy of 99.58%, when using only 16 channels of EEG signals, which outperforms the state-of-the-art EEG-based user identification methods. The combined use of CNNs and LSTMs in the proposed 1D-Convolutional LSTM can greatly improve the accuracy of user identification systems by utilizing the spatiotemporal features of the EEG signals with LSTM, and lowering cost of the systems by reducing the number of EEG electrodes used in the systems.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
99. Shaw, Peter; Mikusz, Mateusz; Davies, Nigel; Clinch, Sarah; Dibak, Christoph: Supporting Transparency and Privacy in Emerging IoT Environments. In: Second UK Mobile, Wearable and Ubiquitous Systems Research Symposium, Oxford, UK, 2019. (Type: Inproceedings | Abstract | BibTeX) @inproceedings{proc-in-shaw_supporting_2019,
title = {Supporting Transparency and Privacy in Emerging IoT Environments},
author = {Peter Shaw and Mateusz Mikusz and Nigel Davies and Sarah Clinch and Christoph Dibak},
year = {2019},
date = {2019-07-01},
booktitle = {Second UK Mobile, Wearable and Ubiquitous Systems Research Symposium},
address = {Oxford, UK},
abstract = {Rapid advances in low-cost sensing, actuation and communication technologies are leading to the widespread deployment of IoT devices in a range of physical spaces, ranging from private domestic dwellings through to public and semi-public spaces, such as transport hubs, city streets, municipal parks, cafes, hotels, office complexes and meeting rooms. These IoT sensing devices and infrastructures can support a wealth of new services including the provisioning of statistics on space usage, detailed insights into the identity, demographics and behaviour of individuals present in the space and enabling the personalisation of shared spaces including workplaces. However, much of the IoT technology that is being deployed is deliberately designed to be an ambient (invisible) feature of the environment \textemdash the technology does not communicate its presence, purpose, practice and analysis to the wider audience it is monitoring. The result is that users of physical spaces are increasingly unaware of the technology that is being used for data capture in the spaces they inhabit, nor are they aware of how such data is exploited to provide new insights, actionable outputs and services that directly affect their lives. Providing insights and control over about data collection and use within the context of the IoT is of growing importance, in particular due to the differing levels of privacy awareness and concern among users [1]. In response to the challenges raised, researchers have proposed new approaches to providing users with appropriate control over the sensitive data gathered about them by IoT sensors. In particular, recent research has suggested the use of privacy mediators [2, 3] to process privacy-compromising sensor streams prior to their use by third parties.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
100. Satyanarayanan, Mahadev; Davies, Nigel: Augmenting Cognition Through Edge Computing. In: vol. 52, no. 7, pp. 37–46, 2019. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-satyanarayanan_augmenting_2019,
title = {Augmenting Cognition Through Edge Computing},
author = {Mahadev Satyanarayanan and Nigel Davies},
url = {https://doi.org/10.1109%2Fmc.2019.2911878},
doi = {10.1109/mc.2019.2911878},
year = {2019},
date = {2019-06-26},
volume = {52},
number = {7},
pages = {37--46},
publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
abstract = {Augmented cognition can transform human capabilities, but delivering its benefits in real time will require low-latency wireless access to powerful infrastructure resources by lightweight wearable devices. Edge computing is the only viable approach to meeting these stringent requirements. We explore the symbiotic relationship between augmented cognition and edge computing.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}