IoT-security Approach Analysis for the Novel Nutrition-Based Vegetable Production and Distribution System

The new Internet of Things (IoT) paradigm is giving to the scientific community the possibility to create integrated environments where information could be exchanged among heterogeneous characteristic networks in an automated way, in order to provide a richer experience to the user and to give specific relevant information regarding the particular environment in which the user is interacting with. Those characteristic are highly valuable for the novel nutrition-based vegetable production and distribution system, in which the multiple benefits of Big Data where used in order to generate a healthy food recommendation to the end user and to feed to the system different analytics to improve the system efficiency. Moreover, the different IoT capabilities, specifically automation and heterogeneous network communication are valuable to improve the information matrix of our project. This paper discusses the different IoT available technologies, their security capabilities and assessment, and how could be useful for our project.

[1]  Patrick Gage Kelley,et al.  IWantPrivacy : Widespread Violation of Privacy Settings in the Twitter Social Network , 2010 .

[2]  Krish Krishnan,et al.  Introduction to Big Data , 2013 .

[3]  Gabriel Montenegro,et al.  IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem Statement, and Goals , 2007, RFC.

[4]  D. Boyd,et al.  Six Provocations for Big Data , 2011 .

[5]  P. Balamuralidhar,et al.  Towards a Light Weight Internet ofThings Platform Architecture , 2013 .

[6]  L. Manovich,et al.  Trending: The Promises and the Challenges of Big Social Data , 2012 .

[7]  Habtamu Abie,et al.  Metrics-driven security objective decomposition for an e-health application with adaptive security management , 2013, ASPI '13.

[8]  Rahul Bhattacharyya,et al.  Beyond the ID in RFID , 2010 .

[9]  Atsushi Hashimoto,et al.  Advanced application of ICT to the sustainable production of excellent Japanese Mandarin , 2010 .

[10]  James H. Aylor,et al.  Computer for the 21st Century , 1999, Computer.

[11]  Alexandros Labrinidis,et al.  Challenges and Opportunities with Big Data , 2012, Proc. VLDB Endow..

[12]  Alireza Ahrary,et al.  Big Data approach in an ICT Agriculture project , 2013, 2013 International Joint Conference on Awareness Science and Technology & Ubi-Media Computing (iCAST 2013 & UMEDIA 2013).

[13]  Bruno Latour,et al.  Tarde's idea of quantification , 2010 .

[14]  James Mussell Raw Data is an Oxymoron , 2014 .

[15]  Yoshinori Yaginuma,et al.  Approaches to Creating Human-Centric Solutions , 2012 .

[16]  Hong Liu,et al.  Cyber-Physical-Social Based Security Architecture for Future Internet of Things , 2012, IOT 2012.

[17]  Alireza Ahrary,et al.  A Big Data Approach for a New ICT Agriculture Application Development , 2013, 2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery.

[18]  Luca Veltri,et al.  Enforcing Security Mechanisms in the IP-Based Internet of Things: An Algorithmic Overview , 2013, Algorithms.

[19]  Sean D Dessureault,et al.  Understanding big data , 2016 .

[20]  Alireza Ahrary,et al.  Big data approach to a novel nutrition-based vegetable production and distribution system , 2013, 2013 IEEE International Conference on Computational Intelligence and Cybernetics (CYBERNETICSCOM).

[21]  Ari Juels,et al.  RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.

[22]  Mark Weiser,et al.  The computer for the 21st Century , 1991, IEEE Pervasive Computing.

[23]  Adam Jacobs,et al.  The pathologies of big data , 2009, Commun. ACM.

[24]  Rolf H. Weber,et al.  Internet of Things - New security and privacy challenges , 2010, Comput. Law Secur. Rev..

[25]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[26]  Emily Troshynski,et al.  Accountabilities of presence: reframing location-based systems , 2008, CHI.

[27]  Rathanakar Acharya,et al.  Data integrity and intrusion detection in Wireless Sensor Networks , 2008, 2008 16th IEEE International Conference on Networks.

[28]  P. Balamuralidhar,et al.  Towards a LightWeight Internet of Things Platform Architecture , 2013, J. ICT Stand..

[29]  Daeyoung Kim,et al.  The EPC Sensor Network for RFID and WSN Integration Infrastructure , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07).