Tytuł artykułu
Treść / Zawartość
Pełne teksty:
Identyfikatory
Warianty tytułu
Języki publikacji
Abstrakty
The publication presents potential places of conscious or unconscious interference or degradation of data collected using a distributed system of sensors and/or other IoT devices. Places of possible interference in the measurement data are indicated from the very beginning of the measurement chain – from a single measurement element, through data conversion, transmission, processing, storage, analysis to interpretation. Threats are indicated not only of technical but also economic nature. Examples are presented that are intended to show how the flow of data can affect decision-making and how the lack of knowledge about the measurement context can affect their interpretation. Possible anomaly detection mechanisms are also indicated, considering new, developing techniques.
Wydawca
Rocznik
Tom
Strony
415--426
Opis fizyczny
Bibliogr. 12 poz., fig., tab.
Twórcy
autor
- Under Ant sp. z o. o. sp. k., Łączyny 4, 02-820 Warsaw, Poland
autor
- Heavy Ion Laboratory, University of Warsaw, ul. Pasteura 5A, 02-093, Warszawa, Poland
autor
- Department of the Foundations of Computer Science, Faculty of Philosophy, The John Paul II Catholic University of Lublin, Aleje Racławickie 14, 20-950 Lublin, Poland
- WSEI University, Projektowa 4, 20-209 Lublin, Poland
Bibliografia
- 1. Sagan C., Salzman Sagan L., Drake F. A message from Earth. Science, 1972, 175(4024), 881–884. https://doi.org/10.1126/science.175.4024.881.
- 2. Ren J., Dubois D.J., Choffnes D., Mandalari A.M., Kolcun R., Haddadi H. Information exposure for consumer IoT devices: A multidimensional, network-informed measurement approach. In: Proceedings of the Internet Measurement Conference, 2019. https://doi.org/10.1145/3355369.335557.
- 3. Bella G., Biondi P., Bognanni S., Esposito S. PET-IoT: Penetration testing the Internet of Things. Internet of Things, 2023, 22, 100707. https://doi.org/10.1016/j.iot.2023.100707.
- 4. Kombate Y., Hounge P., Ouya S. Securing MQTT: Unveiling vulnerabilities and innovating cyber range solutions. Procedia Computer Science, 2024, 241, 69–76. https://doi.org/10.1016/j.procs.2024.08.012.
- 5. Kribus A., Vishnevetsky I., Rotenberg E., Yakir D. Systematic errors in the measurement of emissivity caused by directional effects. Applied Optics, 2003, 42(10), 1839–1846. https://doi.org/10.1364/AO.42.001839.
- 6. Hazucha P. Background radiation and soft errors in CMOS circuits [dissertation]. Linköping University; 2000.
- 7. Hultquist C., Oravecz Z., Cervone G. A Bayesian approach to estimate the spatial distribution of crowdsourced radiation measurements around Fukushima. ISPRS International Journal of Geo-Information, 2021, 10(12), 822. https://doi.org/10.3390/ijgi10120822.
- 8. Instytut Meteorologii i Gospodarki Wodnej. Monitoring wiarygodności pomiarów temperatury [in Polish]. IMGW; 2019 [cited: 2025 Apr 7]. https://www.imgw.pl/sites/default/files/2019-12/monitoring-wiarygodnosci-pomiarow-temperatury.
- 9. Mitchell R. 33 critical vulnerabilities found in popular IoT protocol MQTT. Electropages, 2022 Feb [cited: 2025 Apr 7]. https://www.electropages.com/blog/2022/02/researchers-find-mqtt-have-33-vulnerabilities.
- 10. Paolone M., Tamburri D.A. Serverless computing: A systematic mapping study. ACM Computing Surveys, 2021, 54(8), 1–32. https://doi.org/10.1145/3465481.3470049.
- 11. Syaiful A., Rahardjo B., Hanindhito B. Attack scenarios and security analysis of MQTT communication protocol in IoT system. In: 4th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI); 2017. https://doi.org/10.1109/EECSI.2017.8239179.
- 12. Zhang G., Mariano B., Shen X., Dillig I. Automated translation of functional big data queries to SQL. Proceedings of the ACM on Programming Languages, 2023, 7(OOPSLA1), 580–608. https://doi.org/10.1145/3622825.
Uwagi
Opracowanie rekordu ze środków MNiSW, umowa nr POPUL/SP/0154/2024/02 w ramach programu "Społeczna odpowiedzialność nauki II" - moduł: Popularyzacja nauki (2025).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-c09449d5-030c-4a16-b200-87b1d897e31c
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.