Building a Simulated Test Activity to Facilitate Online Assessment of IoT Security: A Case Study of IP Camera

Author(s):  
Jun-Ming Su ◽  
Ming-Hua Cheng ◽  
Xin-Jie Wang ◽  
Meng-Jhen Li ◽  
Shian-Shyong Tseng
Sensors ◽  
2019 ◽  
Vol 19 (19) ◽  
pp. 4121 ◽  
Author(s):  
Alberto Giaretta ◽  
Nicola Dragoni ◽  
Fabio Massacci

Cybersecurity is one of the biggest challenges in the Internet of Things (IoT) domain, as well as one of its most embarrassing failures. As a matter of fact, nowadays IoT devices still exhibit various shortcomings. For example, they lack secure default configurations and sufficient security configurability. They also lack rich behavioural descriptions, failing to list provided and required services. To answer this problem, we envision a future where IoT devices carry behavioural contracts and Fog nodes store network policies. One requirement is that contract consistency must be easy to prove. Moreover, contracts must be easy to verify against network policies. In this paper, we propose to combine the security-by-contract (S × C) paradigm with Fog computing to secure IoT devices. Following our previous work, first we formally define the pillars of our proposal. Then, by means of a running case study, we show that we can model communication flows and prevent information leaks. Last, we show that our contribution enables a holistic approach to IoT security, and that it can also prevent unexpected chains of events.


2020 ◽  
Vol 2020 ◽  
pp. 1-13
Author(s):  
Xiali Wang ◽  
Xiang Lu

The Internet of Things (IoT) is rapidly spreading in various application scenarios through its salient features in ubiquitous device connections, ranging from agriculture and industry to transportation and other fields. As the increasing spread of IoT applications, IoT security is gradually becoming one of the most significant issues to guard IoT devices against various cybersecurity threats. Usually, IoT devices are the main components responsible for sensing, computing, and transmitting; in this case, how to efficiently protect the IoT device itself away from cyber attacks, like malware, virus, and worm, becomes the vital point in IoT security. This paper presents a brand new architecture of intrusion detection system (IDS) for IoT devices, which is designed to identify device- or host-oriented attacks in a lightweight manner in consideration of limited computation resources on IoT devices. To this end, in this paper, we propose a stacking model to couple the Extreme Gradient Boosting (XGBoost) model and the Long Short-Term Memory (LSTM) model together for the abnormal state analysis on the IoT devices. More specifically, we adopt the system call sequence as the indicators of abnormal behaviors. The collected system call sequences are firstly processed by the famous n-gram model, which is a common method used for host-based intrusion detections. Then, the proposed stacking model is used to identify abnormal behaviors hidden in the system call sequences. To evaluate the performance of the proposed model, we establish a real-setting IP camera system and place several typical IoT attacks on the victim IP camera. Extensive experimental evaluations show that the stacking model has outperformed other existing anomaly detection solutions, and we are able to achieve a 0.983 AUC score in real-world data. Numerical testing demonstrates that the XGBoost-LSTM stacking model has excellent performance, stability, and the ability of generalization.


1972 ◽  
Vol 3 (4) ◽  
pp. 382-382
Author(s):  
Charles R. Potkay
Keyword(s):  

2020 ◽  
Vol 11 (3) ◽  
pp. 49-65
Author(s):  
Emily Ng K.L.

The resources and time constraints of assessing large classes are always weighed up against the validity, reliability, and learning outcomes of the assessment tasks. With the digital revolution in the 21st Century, educators can benefit from computer technology to carry out a large-scale assessment in higher education more efficiently. In this article, an in-depth case study of a nursing school that has integrated online assessment initiatives into their nursing program. To assess a large class of first-year nursing students, a series of non-proctored multiple-choice online quizzes are administered using a learning management system. Validity and reliability are commonly used to measure the quality of an assessment. The aim of the present article to analyze these non-proctored multiple-choice online assessments in the context of content validity and reliability. We use this case study to examine online assessment in nursing education, exploring the benefits and challenges. We conclude that instructors have to determine how to use the full potential of online assessment as well as ensure validity and reliability.


2011 ◽  
pp. 279-300
Author(s):  
Izaskun Ibabe ◽  
Joana Jauregizar

This chapter provides an introduction to formative assessment, especially applied within an online or e-learning environment. The characteristics of four strategies of online formative assessment currently most widely used—online adaptive assessment, online self-assessment, online collaborative assessment, and portfolio—are described. References are made throughout recent research about the effectiveness of online formative assessment for optimizing students’ learning. A case study in which a computer-assisted assessment tool was used to design and apply self-assessment exercises is presented. The chapter emphasizes the idea that all type of assessment needs to be conceptualized as “assessment for learning.” Practical advices are detailed for the planning, development, implementation, and review of quality formative online assessment.


Author(s):  
Emily Ng K.L.

The resources and time constraints of assessing large classes are always weighed up against the validity, reliability, and learning outcomes of the assessment tasks. With the digital revolution in the 21st Century, educators can benefit from computer technology to carry out a large-scale assessment in higher education more efficiently. In this article, an in-depth case study of a nursing school that has integrated online assessment initiatives into their nursing program. To assess a large class of first-year nursing students, a series of non-proctored multiple-choice online quizzes are administered using a learning management system. Validity and reliability are commonly used to measure the quality of an assessment. The aim of the present article to analyze these non-proctored multiple-choice online assessments in the context of content validity and reliability. We use this case study to examine online assessment in nursing education, exploring the benefits and challenges. We conclude that instructors have to determine how to use the full potential of online assessment as well as ensure validity and reliability.


2019 ◽  
Vol 15 (9) ◽  
pp. 155014771987587 ◽  
Author(s):  
Dominika Cupkova ◽  
Erik Kajati ◽  
Jozef Mocnej ◽  
Peter Papcun ◽  
Jiri Koziorek ◽  
...  

In recent years, the main area of interest in the issue of influencing mental states of people is the impact of lighting on human beings, their wellbeing but also workplace productivity. This work discusses in detail the problem of positively influencing people using intelligent technologies, especially the role of the colors. We describe techniques and technologies needed to implement the case study of an intelligent lighting system. The system proposed can detect humans from an IP camera, find faces, and detect emotion. The main aim is to adjust the lights accordingly to the emotional result to improve the mood of people while taking into consideration the principles of color psychology and daytime. We have evaluated our case study solution in a real-world environment and collected the feedback from participants in the form of a questionnaire. Evaluation of participants’ wellbeing was based on their subjective statements. There were several ideas on further functionality extension which needs to be explored. Among them is including wearable devices to the proposed system, validate the emotional results according to them, but also determine the impact of an increasing number of users interacting with the system at the same time.


Sign in / Sign up

Export Citation Format

Share Document