Internet of Things connects the physical and cybernetic world. As such, security issues of IoT devices are especially damaging and need to be addressed. In this treatise, we overview current security issues of IoT with the perspective of future threats. We identify three main trends that need to be specifically addressed: security issues of the integration of IoT with cloud and blockchains, the rapid changes in cryptography due to quantum computing, and finally the rise of artificial intelligence and evolution methods in the scope of security of IoT. We give an overview of the identified threats and propose solutions for securing the IoT in the future.
The purpose of this paper is to highlight the best practices in development of telemedicine services for selfmanagement of patients with diabetes. Target group consisted of type 1 patients of age 27-38. These practices are derived from authors experience, patients and physicians involvement, literature and existing solutions review. Developed mHealth telemedicine system is introduced. Results on usability and acceptability of the proposed solution are described from field testing and patients' feedback. Discussion on elements influencing the adoption of telemedicine solutions is introduced.
Direct memory access is one of the techniques used in forensic analysis and rootkit detection. Unfortunately, it can also be misused in various attacks. E.g., the firewire attack enabled bypassing of Windows authorization by reading the user password stored in memory. Thus, for security reasons, firewire port is usually disabled in many computers. This motivates a search for a new ways of enabling direct memory access. Another potential avenue for DMA enabled memory access seems to be the network card.We designed a new solution for direct memory access, based on a custom NDIS protocol driver that can send (on request of the local executable program) the contents of the computer memory over the network. Our new method allows an unexpected type of the direct memory access, which is independent of the processor, and its control capabilities. This is a strong advantage in rootkit detection, because the rootkit cannot take any action to hide itself while the memory is scanned.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.