• No results found

Vid arbete i vidare sammanhang så hade det varit intressant att se vilka typer av tjänster som skulle kunna utvecklas beroende på olika anonymitetsnivåer.

Att undersöka och implementera en säker databas för datainsamling hade också kunnat vara en intressant frågeställning, där frågeställningarna hade varit att hur mycket data går att lagra för att inte kunna hitta olika mönster men samtidigt lagra användbar data. Software Defined Radio (SDR) hade varit intressant för att samla in data. SDR gör det möjligt att bevaka olika typer av signaler. SDR fungerar att köra på allt från vanliga datorer till mindre kraftfulla inbyggda system. Det hade därför varit intressant att testa möjligheterna om vad som går att samla in. Dock med SDR måste det finnas en analys av vilka datapaket det är som skickas, så det går att sortera ut paket från mobila enheter som bärs av individer från datapaket som är irrelevanta (till exempel datatrafik från flygplan).

En annan intressant problemställning är att hur ett det skulle vara att samla in data från en större plats genom att ha flera insamlingsenheter. Genom att ha flera insamlingsenheter så är det möjligt att se åt vilken riktning samt hastighet som individerna rör sig. Som till exempel BLIP Systems A/S (se kapitel 1.5) fast i detta fall så blir det med individer istället för bilar.

Referenser

[1] P. Suresh, J.V. Daniel, V. Parthasarathy, and R.H. Aswathy. A state of the art review on the Internet of Things (IoT) history, technology and fields of deployment. In Science Engineering and Management Research (ICSEMR), 2014 International Conference on, pages 1–8, Nov 2014.

[2] T. Nicolai and H. Kenn. About the Relationship Between People and Discoverable Bluetooth Devices in Urban Environments. In Proceedings of the 4th International Conference on Mobile Technology, Applications, and Systems and the 1st Internatio- nal Symposium on Computer Human Interaction in Mobile Technology, Mobility ’07, pages 72–78. ACM, 2007.

[3] Y. Yoshimura, S. Sobolevsky, and C. Ratti. An analysis of visitors’ behavior in The Louvre Museum: a study using Bluetooth data. In Environment and Planning B: Planning and Design, 41, pages 1113–1131, 2014.

[4] Y. H. Hwang. IoT Security #38; Privacy: Threats and Challenges. In Proceedings of the 1st ACM Workshop on IoT Privacy, Trust, and Security, IoTPTS ’15, pages 1–1, New York, NY, USA, 2015. ACM.

[5] H. Kikuchi and T. Yokomizo. Location Privacy Vulnerable from Bluetooth Devices. In Network-Based Information Systems (NBiS), 2013 16th International Conference on, pages 534–538, Sept 2013.

[6] D. Evans and R.H. Warren. Anonymity Properties of Stored or Transmitted Data Taken from Bluetooth Scans. In Computational Science and Engineering, 2009. CSE ’09. International Conference on, volume 3, pages 133–138, Aug 2009.

[7] J. Miller. City of London calls halt to smartphone tracking bins, August 12, 2013 (accessed March 31, 2015). http://www.bbc.com/news/technology-23665490/. [8] S. Datoo. This recycling bin is following you, August 12, 2013 (accessed March 31,

2015). http://qz.com/112873/this-recycling-bin-is-following-you/.

[9] V. Gillberg. Den nya mätbara staden, December 15, 2014 (accessed May 04, 2015. http://www.fastighetstidningen.se/den-nya%E2%80%A8-matbara-staden/. [10] BLIP Systems A/S. Blip Systems, 2015 (accessed April 02, 2015). http://

www.blipsystems.com/.

[11] BLIP Systems A/S. Swedish City Uses BlipTrack Technology To Ease Traffic, De- cember 13, 2013 (accessed April 02, 2015). http://www.blipsystems.com/swedish- city-uses-bliptrack-technology-to-ease-traffic/.

[12] H. Lin, W. Chu, T. Gong, Y. Ti, Y. Sun, J.H. Nielsen, and A. Naseem. Integra- ting BLIP into Location-Aware System: A Service-Oriented Method. In Computer Sciences and Convergence Information Technology, 2009. ICCIT ’09. Fourth Inter- national Conference on, pages 144–148, Nov 2009.

[13] Datainspektionen. Strukturerat eller ostrukturerat?, (accessed May 06, 2015). http://www.datainspektionen.se/lagar-och-regler/personuppgiftslagen/ strukturerat-eller-ostrukturerat/.

[14] Datainspektionen. Vad är en personuppgift?, (accessed May 06, 2015). http://www.datainspektionen.se/fragor-och-svar/personuppgiftslagen/ vad-ar-en-personuppgift/.

[15] K. Lagerwall. Datainspektionen ska granska övervakning via mobilen, Janu- ary 23, 2015 (accessed May 04, 2015). http://www.dn.se/nyheter/sverige/ datainspektionen-ska-granska-overvakning-via-mobilen/.

[16] Datainspektionen. Vad menas med samtycke enligt personuppgiftslagen och hur ska det se ut?, (accessed May 06, 2015). http://www.datainspektionen.se/ fragor-och-svar/personuppgiftslagen/vad-menas-med-samtycke-enligt- personuppgiftslagen-och-hur-ska-det-se-ut-1/.

[17] J. Ryberg. Svenska tekniken som spårar dig på stan, January 28, 2015 (accessed May 04, 2015). http://www.idg.se/2.1085/1.606293/svenska-tekniken-som-sparar- dig-pa-stan.

[18] J. W. Creswell. Research Design: Qualitative, Quantitative and Mixed Methods. SAGE Publications, 2014.

[19] A. Leff and J.T. Rayfield. Web-application development using the Model/View/Con- troller design pattern. In Enterprise Distributed Object Computing Conference, 2001. EDOC ’01. Proceedings. Fifth IEEE International, pages 118–127, 2001.

[20] Bluetooth SIG. Welcome to Bluetooth Technology 101 - A brief tutorial on Blue- tooth wireless technology, 2015 (accessed May 05, 2015). http://www.bluetooth.com/ Pages/Fast-Facts.aspx.

[21] Bluetooth SIG. Bluetooth Basics, 2015 (accessed April 01, 2015). http://http: //www.bluetooth.com/Pages/Basics.aspx.

[22] J.I.N. Hipolito, N.C. Arballo, J.A. Michel-Macarty, and E.J. Garcia. Bluetooth Per- formance Analysis in Wireless Personal Area Networks. In Electronics, Robotics and Automotive Mechanics Conference, 2009. CERMA ’09., pages 38–43, Sept 2009. [23] E. Firmansyah, L. Grezelda, and Iswandi. RSSI based analysis of Bluetooth imple-

mentation for intra-car sensor monitoring. In Information Technology and Electrical Engineering (ICITEE), 2014 6th International Conference on, pages 1–5, Oct 2014. [24] R. Bouhenguel, I. Mahgoub, and M. Ilyas. Bluetooth Security in Wearable Computing

Applications. In High Capacity Optical Networks and Enabling Technologies, 2008. HONET 2008. International Symposium on, pages 182–186, Nov 2008.

[25] A. Vaha-Sipila and T. Virtanen. BT-Crowds: Crowds-Style Anonymity with Blue- tooth and Java. In System Sciences, 2005. HICSS ’05. Proceedings of the 38th Annual Hawaii International Conference on, pages 320a–320a, Jan 2005.

[26] M. Johansson. Restidsuppskattningar med hjälp av Bluetoothdata. Bachelor thesis, Linköpings universitet, Linköping, 2014.

[27] Bluetooth SIG. Baseband, 2015 (accessed April 01, 2015). https:// www.bluetooth.org/en-us/specification/assigned-numbers/baseband/.

[28] W. Stallings. Wireless Communications & Networks, Second Edition. Pearson Pren- tice Hall, 2004.

[29] Bluetooth SIG. Bluetooth Core Specification 4.2, 2014.R

[30] E Bhaskar, A Chung. Fundamental understanding on the use of Bluetooth scanner as a complementary transport data. Transportation Research Part C : Emerging Technology, (37):42–72, 2013.

[31] Bluetooth SIG. The Low Energy Technology Behind Bluetooth Smart, 2015 (accessed April 01, 2015). http://www.bluetooth.com/Pages/low-energy-tech-info.aspx/. [32] Android. Android, the world’s most popular mobile platform, 2015 (accessed May 07,

2015). http://developer.android.com/about/index.html/.

[33] A.A. Putri Ratna, P. Dewi Purnamasari, A. Shaugi, and M. Salman. Analysis and comparison of MD5 and SHA-1 algorithm implementation in Simple-O authentication based security system. In QiR (Quality in Research), 2013 International Conference on, pages 99–104, June 2013.

[34] M. Rouse. What is brute force cracking?, (accessed April 15, 2015). http:// searchsecurity.techtarget.com/definition/brute-force-cracking/.

[35] W. Penard och T. van Werkhoven. On the Secure Hash Algorithm, (accessed May 08, 2015). http://www.staff.science.uu.nl/~werkh108/docs/study/Y5_07_08/ infocry/project/Cryp08.pdf/.

[36] S. Chandra, S. Paira, S.S. Alam, and G. Sanyal. A comparative survey of Symmetric and Asymmetric Key Cryptography. In Electronics,Communication and Computa- tional Engineering (ICECCE), 2014 International Conference on, pages 83–93, Nov 2014.

[37] Oracle. What is MySQL, (accessed April 08, 2015). https://dev.mysql.com/doc/ refman/4.1/en/what-is-mysql.html/.

[38] The PHP Group. What is PHP, (accessed May 08, 2015). http://php.net/manual/ en/intro-whatis.php/.

[39] The Linux Foundation. What is Linux, (accessed April 08, 2015). http:// www.linuxfoundation.org/what-is-linux/.

[40] Raspberry Pi Foundation. What is a Raspberry Pi?, (accessed April 08, 2015). http: //www.raspberrypi.org/help/what-is-a-raspberry-pi/.

[41] Raspberry Pi Foundation. Setting up an Apache web server on a Raspberry Pi, (accessed April 08, 2015). http://www.raspberrypi.org/documentation/remote- access/web-server/apache.md/.

[42] Android. Bluetooth Low Energy, (accessed May 07, 2015). https:// developer.android.com/guide/topics/connectivity/bluetooth-le.html/. [43] SQLite. Appropriate Uses For SQLite, (accessed May 07, 2015). https://

www.sqlite.org/whentouse.html/.

[44] SQLite. SQLite Is Serverless, (accessed May 07, 2015). https://www.sqlite.org/ serverless.html/.

[45] M. Rouse. What is HTTPS (HTTP over SSL or HTTP Secure), August, 2008(acces- sed May 18, 2015). http://searchsoftwarequality.techtarget.com/definition/ HTTPS/.

[46] S. Venom. HIOB: WebSite Hacking Series Part 1: Hacking WebSites Using SQL Injection, (accessed May 18, 2015). http://null-byte.wonderhowto.com/ forum/hiob-website-hacking-series-part-1-hacking-websites-using-sql- injection-error-based-0158949/.

[47] hashcat. hashcat, (accessed May 06, 2015). http://hashcat.net/wiki/doku.php?id= frequently_asked_questions/.

[48] S. Music. Grafikkort till parallella beräkningar. Bachelor thesis, Malmö högskola, Malmö, 2012.

[49] T-Mobile. Tech specs: Google Nexus 4, December 31, 2014 (accessed June 13, 2015). https://support.t-mobile.com/docs/DOC-5032/.

[50] Malmö högskola. This is IOTAP, (accessed March 26, 2015). http://iotap.mah.se/ about/.

[51] Malmö högskola. Cooperative, Self-aware and Intelligent Surveillance Systems – Co- SIS, (accessed March 26, 2015). http://iotap.mah.se/cosis/.

Bilagor

A

Avnämare

A.1 Internet of Things and People

IOTAP är ett forskningscenter som drivs av Malmö högskola. IOTAPs fokus ligger på forskning kring hur användare kan interagera med anslutna enheter, hur användare kan bli involverade i IoT tjänster och produkter samt hur intelligens i enheter kan öka använ- dandet och funktionaliteten för IoT-tjänster och produkter [50].

Related documents