scispace - formally typeset
Search or ask a question
Author

Freddy K Santoso

Bio: Freddy K Santoso is an academic researcher from Nanyang Technological University. The author has contributed to research in topics: Elliptic curve cryptography & Mobile device. The author has an hindex of 1, co-authored 1 publications receiving 138 citations.

Papers
More filters
Proceedings ArticleDOI
24 Jun 2015
TL;DR: This paper presents an approach to incorporate strong security in deploying Internet of Things (IoT) for smart home system, together with due consideration given to user convenience in operating the system.
Abstract: This paper presents an approach to incorporate strong security in deploying Internet of Things (IoT) for smart home system, together with due consideration given to user convenience in operating the system. The IoT smart home system runs on conventional wifi network implemented based on the AllJoyn framework, using an asymmetric Elliptic Curve Cryptography to perform the authentications during system operation. A wifi gateway is used as the center node of the system to perform the system initial configuration. It is then responsible for authenticating the communication between the IoT devices as well as providing a mean for the user to setup, access and control the system through an Android based mobile device running appropriate application program.

153 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: A comprehensive survey of ML methods and recent advances in DL methods that can be used to develop enhanced security methods for IoT systems and presents the opportunities, advantages and shortcomings of each method.
Abstract: The Internet of Things (IoT) integrates billions of smart devices that can communicate with one another with minimal human intervention. IoT is one of the fastest developing fields in the history of computing, with an estimated 50 billion devices by the end of 2020. However, the crosscutting nature of IoT systems and the multidisciplinary components involved in the deployment of such systems have introduced new security challenges. Implementing security measures, such as encryption, authentication, access control, network and application security for IoT devices and their inherent vulnerabilities is ineffective. Therefore, existing security methods should be enhanced to effectively secure the IoT ecosystem. Machine learning and deep learning (ML/DL) have advanced considerably over the last few years, and machine intelligence has transitioned from laboratory novelty to practical machinery in several important applications. Consequently, ML/DL methods are important in transforming the security of IoT systems from merely facilitating secure communication between devices to security-based intelligence systems. The goal of this work is to provide a comprehensive survey of ML methods and recent advances in DL methods that can be used to develop enhanced security methods for IoT systems. IoT security threats that are related to inherent or newly introduced threats are presented, and various potential IoT system attack surfaces and the possible threats related to each surface are discussed. We then thoroughly review ML/DL methods for IoT security and present the opportunities, advantages and shortcomings of each method. We discuss the opportunities and challenges involved in applying ML/DL to IoT security. These opportunities and challenges can serve as potential future research directions.

543 citations

Journal ArticleDOI
TL;DR: A review is conducted to map the research landscape of smart home based on Internet of Things into a coherent taxonomy and identifies the basic characteristics of this emerging field in the following aspects: motivation of using IoT in smart home applications, open challenges hindering utilization, and recommendations to improve the acceptance and use of smartHome IoT applications in literature.

413 citations

Journal ArticleDOI
TL;DR: This paper comprehensively survey the body of existing research on I-IoT, and proposes a three-dimensional framework to explore the existing research space and investigate the adoption of some representative networking technologies, including 5G, machine-to-machine communication, and software-defined networking.
Abstract: The vision of Industry 4.0, otherwise known as the fourth industrial revolution, is the integration of massively deployed smart computing and network technologies in industrial production and manufacturing settings for the purposes of automation, reliability, and control, implicating the development of an Industrial Internet of Things (I-IoT). Specifically, I-IoT is devoted to adopting the IoT to enable the interconnection of anything, anywhere, and at any time in the manufacturing system context to improve the productivity, efficiency, safety, and intelligence. As an emerging technology, I-IoT has distinct properties and requirements that distinguish it from consumer IoT, including the unique types of smart devices incorporated, network technologies and quality-of-service requirements, and strict needs of command and control. To more clearly understand the complexities of I-IoT and its distinct needs and to present a unified assessment of the technology from a systems’ perspective, in this paper, we comprehensively survey the body of existing research on I-IoT. Particularly, we first present the I-IoT architecture, I-IoT applications (i.e., factory automation and process automation), and their characteristics. We then consider existing research efforts from the three key system aspects of control, networking, and computing. Regarding control, we first categorize industrial control systems and then present recent and relevant research efforts. Next, considering networking, we propose a three-dimensional framework to explore the existing research space and investigate the adoption of some representative networking technologies, including 5G, machine-to-machine communication, and software-defined networking. Similarly, concerning computing, we again propose a second three-dimensional framework that explores the problem space of computing in I-IoT and investigate the cloud, edge, and hybrid cloud and edge computing platforms. Finally, we outline particular challenges and future research needs in control, networking, and computing systems, as well as for the adoption of machine learning in an I-IoT context.

371 citations

Journal ArticleDOI
TL;DR: HOHC via video conferencing was effective in delivering online treatment and was well-accepted by patients, as it simulated in-person, face-to-face consultation.
Abstract: Background: Health care providers are adopting information and communication technologies (ICTs) to enhance their services. Telemedicine is one of the services that rely heavily on ICTs to enable remote patients to communicate with health care professionals; in this case, the patient communicates with the health care professional for a follow-up or for a consultation about his or her health condition. This communication process is referred to as an e-consultation. In this paper, telemedicine services refer to health care services that use ICTs, which enable patients to share, transfer, and communicate data or information in real time (ie, synchronous) from their home with a care provider—normally a physician—at a clinical site. However, the use of e-consultation services can be positively or negatively influenced by external or internal factors. External factors refer to the environment surrounding the system as well as the system itself, while internal factors refer to user behavior and motivation. Objective: This review aims to investigate the barriers and the facilitators that influence the use of home consultation systems in the health care context. This review also aims to identify the effectiveness of Home Online Health Consultation (HOHC) systems in improving patients’ health as well as their satisfaction with the systems. Methods: We conducted a systematic literature review to search for articles—empirical studies—about online health consultation in four digital libraries: Scopus, Association for Computing Machinery, PubMed, and Web of Science. The database search yielded 2518 articles; after applying the inclusion and exclusion criteria, the number of included articles for the final review was 45. A qualitative content analysis was performed to identify barriers and facilitators to HOHC systems, their effectiveness, and patients’ satisfaction with them. Results: The systematic literature review identified several external and internal facilitators and barriers to HOHC systems that were used in the creation of a HOHC framework. The framework consists of four requirements; the framework also consists of 17 facilitators and eight barriers, which were further categorized as internal and external influencers on HOHC. Conclusions: Patients from different age groups and with different health conditions benefited from remote health services. HOHC via video conferencing was effective in delivering online treatment and was well-accepted by patients, as it simulated in-person, face-to-face consultation. Acceptance by patients increased as a result of online consultation facilitators that promoted effective and convenient remote treatment. However, some patients preferred face-to-face consultation and showed resistance to online consultation. Resistance to online consultation was influenced by some of the identified barriers. Overall, the framework identified the facilitators and barriers that positively and negatively influenced the uptake of HOHC systems, respectively.

368 citations

Journal ArticleDOI
TL;DR: The Blockchain technologies which can potentially address the critical challenges arising from the IoT and hence suit the IoT applications are identified with potential adaptations and enhancements elaborated on the Blockchain consensus protocols and data structures.

355 citations