Communication technology improvements have inspired the idea of connecting almost every things to the Internet: from home appliances, medical devices, and cars, to large infrastructures. A unified and secure network of these things is almost a dream because the Internet has not had this goal from the beginning; protocols have been implemented and then secured, and then extended to new domains. This has been the cause of many vulnerabilities so far. In this paper, we take a fundamental look at the inherited architectural security issues of Internet of Things (IoT) which have raised serious security concerns due to its overwhelming number of nodes. Then, we investigate Recursive InterNetwork Architecture (RINA), a very promising network architecture, as a design solution; we demonstrate how RINA can specifically address security challenges of IoT networks, and how it mitigates their common attacks. Moreover, we will show how RINA can provide other features which are now mentioned as the future trend in IoT.
The privacy by design principle has been applied in system engineering. In this paper, we follow this principle, by integrating necessary safeguards into the program system design. These safeguards are then used in the processing of personal information. In particular, we use a formal language-based approach with static analysis to enforce privacy requirements. To make a general solution, we consider a high-level modeling language for distributed service-oriented systems, building on the paradigm of active objects. The language is then extended to support specification of policies on program constructs and policy enforcement. For this we develop i) language constructs to formally specify privacy restrictions, thereby obtaining a policy definition language, ii) a formal notion of policy compliance, and iii) a type and effect system for enforcing and analyzing a program's compliance with the stated polices.
Previously, we have proposed a computational model for decision-making in crisis situations called C-RPD (Computational Recognition Primed Decision). In this paper, a software development process customized for Crisis Situations Decision-Making Systems (CSDMSs) is proposed. Agile processes can skillfully manage uncertainty in software requirements and some of their features like incremental development can solve some problems in developing CSDMSs. However, these processes do not provide comprehensive solutions for issues like the lack of enough knowledge about CSDMSs, very rapid changes, urgent need to overcome security challenges, high development unpredictability, and the performance test. Extreme Programming (XP) is one of the best and most widely-used agile processes. In this article, a customized version of XP called Crisis Situations Decision-Making Systems Software Development Process (CSDP) is proposed. Standing first and second in five national and international RoboCup rescue agent simulation tournaments from 2006 to 2010 bear witness to the efficiency of the developed software using CSDP. Relying on its characteristics, CSDP has been able to practically tackle the challenges of developing CSDMSs such as the lack of crisis-related knowledge and cumulative nature of crisis-related knowledge, difficulty of extracting knowledge, long development cycle, and sudden and frequent changes in system requirements. INDEX TERMS Agile software development process, crisis management, crisis situations decision-making system, naturalistic decision making, recognition primed decision model, RoboCup rescue simulation agent benchmark.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.