Smart Campus : trends in cybersecurity and future development

dc.contributor.authorSánchez Torres, Brayan
dc.contributor.authorRodríguez Rodríguez, Jesús Alberto
dc.contributor.authorRico Bautista, Dewar Willmer
dc.contributor.authorGuerrero Santander, Cesar Darío
dc.date.accessioned2018-09-07T19:31:32Z
dc.date.available2018-09-07T19:31:32Z
dc.date.issued2018-01-15
dc.description1 recurso en línea (páginas 93-101).spa
dc.description.abstractSmart Campus is an entity of any kind that uses technology and infrastructure to support and improve its processes, so people can use them better. This paper reviews the literature to contextualize the Internet of Things and its vital importance for the Smart Campus, as well as its relationship with the concepts of cybersecurity and wireless sensor network. We describe the various interrelationships, tendencies, and future development of a Smart Campus, as well as the differences and similarities with the emerging concept of Smart University. This review revealed that the Internet of Things is involved in all fields and can influence and improve the university’s processes to contribute to decision-making, technological development, and academic learning. To conclude, Smart University focuses on improving the infrastructure of universities through technology, with the main purpose of enhancing the quality of the education provided by institutions.eng
dc.description.abstractUm Smart Campus é uma entidade de qualquer tipo que utiliza a tecnologia para apoiar sua infraestrutura e seus processos, com o fim de melhorá-los para o uso das pessoas. O propósito deste trabalho é apresentar uma revisão de literatura, onde contextualiza-se a internet das coisas e sua vital importância para o Smart Campus e sua relação com os conceitos de cibersegurança e rede sem fio de sensores. Apresentam-se as diferentes interrelações,tendências e desenvolvimento futuro do Smart Campus, assim como as diferenças e semelhanças com o conceito emergente de Smart University. Esta revisão revelou que a Internet das coisas se envolveu em todos os campos e pode influir nos processos de uma universidade para melhorá-los, ajudar na tomada de decisões e apoiar a aprendizagem acadêmica e o desenvolvimento tecnológico. Conclui-se que Smart University não se limita a melhorar a infraestrutura das universidades através da tecnologia, pois seu fim principal é melhorar a qualidade da educação ministrada pelas instituições.por
dc.description.abstractUn Smart Campus es una entidad de cualquier tipo que utiliza la tecnología para apoyar su infraestructura y sus procesos, con el fin de mejorarlos para el uso de las personas. El propósito de este trabajo es presentar una revisión de literatura, en donde se contextualiza el internet de las cosas y su vital importancia para el Smart Campus y su relación con los conceptos de ciberseguridad y red inalámbrica de sensores. Se presentan las diferentes interrelaciones, tendencias y desarrollo futuro del Smart Campus, así como las diferencias y similitudes con el concepto emergente de Smart University. Esta revisión reveló que el Internet de las cosas se involucra en todos los campos y puede influir en los procesos de una universidad para mejorarlos, ayudar en la toma de decisiones y apoyar el aprendizaje académico y el desarrollo tecnológico. Se concluye que Smart University no se queda en mejorar la infraestructura de las universidades a través de la tecnología, pues su fin principal es mejorar la calidad de la educación impartida por las instituciones.spa
dc.description.notesBibliografía: páginas 99-101.spa
dc.format.mimetypeapplication/pdfspa
dc.identifier.citationSánchez Torres, B. y otros. (2018). Smart Campus: Trends in cybersecurity and future development. Revista Facultad de Ingeniería, 27(47), 93-101. https://doi.org/10.19053/01211129.v27.n47.2018.7807.. http://repositorio.uptc.edu.co/handle/001/2161spa
dc.identifier.doi10.19053/01211129.v27.n47.2018.7807
dc.identifier.issn2357-5328
dc.identifier.urihttp://repositorio.uptc.edu.co/handle/001/2161
dc.language.isoengspa
dc.publisherUniversidad Pedagógica y Tecnológica de Colombiaspa
dc.relation.ispartofjournalRevista Facultad de Ingeniería;Volumen 27, número 47 (Enero-Abril 2018)spa
dc.relation.referencesY. Medina-Cárdenas, and D. Rico-Bautista. “Modelo de gestión de servicios para la universidad de pamplona: ITIL,” Scientia et technica, vol. 2 (39), pp. 314-319, 2008spa
dc.relation.referencesY. Medina-Cárdenas, D. Rico-Bautista, and Y. Areniz. Modelo estratégico para la gestión tecnológica en la organización: plan táctico de la calidad (ITIL & ISO 20000), I. T. Metropolitano, Ed., Medellín: Fondo Editorial ITM, 2016, p. 90. DOI: http://doi. org/10.22430/9789585414006.spa
dc.relation.referencesA. Liñán Colina, A. Vives, A. Bagula, M. Zennaro, and E. Pietrosemoli. Internet de las cosas, W. S. Science, Ed., 2015.spa
dc.relation.referencesC. Restrepo, O. Salcedo-Parra, and J. Sánchez- Céspedes. “Traffic model for the interconnection of networks and operators using MPLS-TE,” Revista Facultad de Ingeniería, vol. 26 (44), pp. 87-96, 2017. DOI: http://doi.org/10.19053/01211129.v26. n44.2017.5774.spa
dc.relation.referencesL. Atzori, A. Lera, and G. Morabito, “Understanding the Internet of Things: definition, potentials, and societal role of a fast evolving paradigm,” Ad Hoc Networks, vol. 56, pp. 122-140, Mar. 2017. DOI: http://doi.org/10.1016/j.adhoc.2016.12.00spa
dc.relation.referencesA. Tejero López. “Seguridad en el Internet de las cosas,” Master Thesis, Universidad Politécnica de Madrid, 2014.spa
dc.relation.referencesL. Rueda, and D. Rico-Bautista. “Modelamiento inicial de ciudades de países en vía de desarrollo, utilizando dinámica de sistemas,” Scientia et technica, vol. 1 (34), pp. 421-426, 2007.spa
dc.relation.referencesV. Almeida, D. Doneda, and M. Montero. “Governance Challenges for the Internet of Things,” IEEE Internet Computing, vol. 19 (4), pp. 56-59, Jul. 2015. DOI: http://doi.org/10.1109/MIC.2015.86spa
dc.relation.referencesQ. Jing, A. Vasilakos, J. Wan, J. Lu, and D. Qiu, “Security of the Internet of Things: perspectives and challenges,” Wireless Networks, vol. 20 (8), pp. 2481-2501, Nov. 2014. DOI: http://doi.org/10.1007/ s11276-014-0761-7.spa
dc.relation.referencesK. Kobara. “Cyber physical security for Industrial Control Systems and IoT,” IEICE Transactions on Information and Systems, vol. E99.D (4), pp. 787-795, 2016. DOI: http://doi.org/10.1587/ transinf.2015ICI0001.spa
dc.relation.referencesS. Thiel, J. Mitchell, and J. Williams, “Coordination or Collision? the Intersection of Diabetes Care, Cybersecurity, and Cloud-Based Computing,” Journal of Diabetes Science and Technology, vol. 11 (2), pp. 195-197, Mar. 2017. DOI: http://doi. org/10.1177/1932296816676189.spa
dc.relation.referencesM. Callejas-Cuervo, L. Martínez-Tejada, and A. Alarcón-Aldana. “Emotion recognition techniques using physiological signals and video games –Systematic review–,” Revista Facultad de Ingeniería, vol. 26 (46), pp. 19-28, 2017. DOI: http:// doi.org/10.19053/01211129.v26.n46.2017.7310.spa
dc.relation.referencesP. Alves, S. da Silva Santos, and J. Abreu de Faria, “Proposta de modelo explicativo das perceções sobre gestão e políticas públicas em matéria de cibersegurança e cibercrime,” Sociologia: Revista da Faculdade de Letras da Universidade do Porto, vol. 23, pp. 95-113, 2017.spa
dc.relation.referencesM. Sastoque-Caro, G. Puerto-Leguizamón, and C. Suárez-Fajardo. “Oportunidades para la implementación de radio definida por software en redes de sensores,” Revista Facultad de Ingeniería, vol. 26 (45), pp. 137-148, 2017. DOI: http://doi. org/10.19053/01211129.v26.n45.2017.6422.spa
dc.relation.referencesP. Alves, S. da Silva, and J. de Faria. “Clusters de Percepções sobre cibersegurança e cibercriminalidade em Portugal e as suas implicações para a implementação de políticas públicas nesse domínio,” Revista da FAE, vol. 19 (2), pp. 22-37, 2016.spa
dc.relation.referencesBITAG. Internet of Things (IoT) Security and Privacy Recommendations, Broadband Internet Technical Advisory Group Technical Working Group Report, BITAG, 2016spa
dc.relation.referencesH. Ning, H. Liu, and L. T. Yang. “Cyberentity Security in the Internet of Things,” Computer, vol. 46 (4), pp. 46-53, Apr. 2013. DOI: http://doi. org/10.1109/MC.2013.74.spa
dc.relation.referencesK. Rose, S. Eldridge, and L. Chapin. La internet de las cosas—una breve reseña, I. Society, Ed., 2015.spa
dc.relation.referencesE. Borgia, “The Internet of Things vision: Key features, applications and open issues,” Computer Communications, vol. 54, pp. 1-31, Dec. 2014. DOI: http://doi.org/10.1016/j.comcom.2014.09.008.spa
dc.relation.referencesJ. Lobo, and D. Rico-Bautista. “Implementación de la seguridad del protocolo de internet Versión 6,” Revista GTI, vol. 11 (29), pp. 35 - 46, 2012.spa
dc.relation.referencesI. Robles, and A. Acosta. “IPv6 y el Internet de las Cosas (IoT),” in Cisco Support Community Expert Series Webcast, 2016.spa
dc.relation.referencesL.-O. Vargas, G. Romaniello, M. Vučinić, M. Favre, A. Banciu, R. Guizzetti, C. Planat, P. Urard, M. Heusse, F. Rousseau, O. Alphand, É. Dublé, and A. Duda. “GreenNet: An Energy-Harvesting IP-Enabled Wireless Sensor Network,” IEEE Internet of Things Journal, vol. 2 (5), pp. 412 - 426, 2015. DOI: http:// doi.org/10.1109/JIOT.2015.2425431.spa
dc.relation.referencesJ. Soldatos, and N. Kefalakis, “Design principles for utility-driven services and cloud-based computing modelling for the Internet of Things,” International Journal of Web and Grid Services, vol. 10 (2-3), pp. 139-167, 2014. DOI: http://doi.org/10.1504/ IJWGS.2014.060254.spa
dc.relation.referencesS. Sicari, A. Rizzardi, L. A. Grieco, and A. Coen Porisini. “Security, privacy and trust in the Internet of Things: The road ahead,” Computer Networks, vol. 76, pp. 146-164, Jun. 2015. DOI: http://doi. org/10.1016/j.comnet.2014.11.008.spa
dc.relation.referencesN. A. Alrajeh, S. Khan, and B. Shams, “Intrusion Detection Systems in Wireless Sensor Networks: A Review,” International Journal of Distributed Sensor Networks, vol. 9 (5), pp. 1-7, May. 2013. DOI: http:// doi.org/10.1155/2013/167575.spa
dc.relation.referencesT. Cao Minh, A self-organizing management platform for wireless sensor networks, Universitat Pompeu Fabra, 2014.spa
dc.relation.referencesN. Cong Luong, D. Thai Hoang, P. Wang, D. Niyato, D. In Kim, and Z. Han, “Data Collection and Wireless Communication in Internet of Things (IoT) Using Economic Analysis and Pricing Models: A Survey,” IEEE Communications Surveys & Tutorials, vol. 18 (4), pp. 2546 - 2590, 2016. DOI: http://doi. org/10.1109/COMST.2016.2582841.spa
dc.relation.referencesP. Bellavista, G. Cardone, A. Corradi, and L. Foschini. “Convergence of MANET and WSN in IoT Urban Scenarios,” IEEE Sensors Journal, vol. 13 (10), pp. 3558-3567, Oct. 2013. DOI: http://doi.org/10.1109/ JSEN.2013.2272099.spa
dc.relation.referencesM. Barceló Lladó, Wireless Sensor Networks in the Future Internet of Things: Density, Mobility, Heterogeneity and Integration, Universitat Autònoma de Barcelona, 2015.spa
dc.relation.referencesC. C. Chang, W. Y. Hsueh, and T. F. Cheng, “A Dynamic User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Networks,” Wireless Personal Communications, vol. 89 (2), pp. 447-465, Jul. 2016. DOI: http://doi. org/10.1007/s11277-016-3281-1.spa
dc.relation.referencesF. Ishmanov, and Y. Bin Zikria, “Trust Mechanisms to Secure Routing in Wireless Sensor Networks: Current State of the Research and Open Research Issues,” Journal of Sensors, vol. 2017, Article ID 4724852, Feb. 2017. DOI: http://doi. org/10.1155/2017/4724852.spa
dc.relation.referencesJ. Hing Fong Chen Gallardo. Un middleware fiable para el desarrollo de aplicaciones sobre redes inalámbricas de sensores y actores, Universidad de Málaga, 2014.spa
dc.relation.referencesM. Guizani, D. He, K. Ren, J. Rodrigues, S. Chan, and Y. Zhang, “Security and privacy in emerging networks: Part 1,” IEEE Communications Magazine, vol. 53 (4), pp. 18-19, 2015. DOI: http://doi. org/10.1109/MCOM.2015.7081098.spa
dc.relation.referencesF. Alama, R. Mehmoodb, I. Katiba, and A. Albeshria, “Analysis of Eight Data Mining Algorithms for Smarter Internet of Things (IoT),” Procedia Computer Science, vol. 98, pp. 437-442, 2016. DOI: http://doi.org/10.1016/j.procs.2016.09.068.spa
dc.relation.referencesT. Tsai, S. Huang, and Y. Tseng, “SIBSC: Separable Identity-Based Signcryption for Resource- Constrained Devices,” Informatica (Netherlands), vol. 28 (1), pp. 193-214, 2017. DOI: http://doi. org/10.15388/Informatica.2017.126.spa
dc.relation.referencesY. Li, K. Gai, L. Qiu, M. Qiu, and H. Zhao, “Intelligent cryptography approach for secure distributed big data storage in cloud computing,” Information Sciences, vol. 387, pp. 103-115, 2017. DOI: http://doi.org/10.1016/j.ins.2016.09.005.spa
dc.relation.referencesI. Weber, S. Nepal, and L. Zhu, “Developing Dependable and Secure Cloud Applications,” IEEE Internet Computing, vol. 20 (3), pp. 74-79, 2016. DOI: http://doi.org/10.1109/MIC.2016.67.spa
dc.relation.referencesM. A. AL-Zoube, and Y. Alqudah, “Mobile Cloud Computing Framework For Patients’ Health Data Analysis,” Biomedical Engineering - Applications, Basis and Communications, vol. 26 (2), Article ID 1450020, 2014. DOI: http://doi.org/10.4015/ S1016237214500203.spa
dc.relation.referencesT. Sanislav, S. Zeadally, and G. D. Mois, “A Cloud- Integrated, Multilayered, Agent-Based Cyber- Physical System Architecture,” Computer, vol. 50 (4), pp. 27-37, 2017. DOI: http://doi.org/10.1109/ MC.2017.113.spa
dc.relation.referencesF. Wu, L. Xu, S. Kumari, and X. Li, “A privacypreserving and provable user authentication scheme for wireless sensor networks based on Internet of Things security,” Journal of Ambient Intelligence and Humanized Computing, vol. 8 (1), pp. 101-116, Feb. 2017. DOI: http://doi.org/10.1007/s12652-016- 0345-8.spa
dc.relation.referencesQ. M. Ashraf, and M. H. Habaebi, “Autonomic schemes for threat mitigation in Internet of Things,” Journal of Network and Computer Applications, vol. 49, pp. 112-127, 2015. DOI: http://doi.org/10.1016/j. jnca.2014.11.011.spa
dc.relation.referencesF. Luo, J. Zhao, Z. Y. Dong, Y. Chen, Y. Xu, X. Zhang, and P. K. Wong, “Cloud-Based Information Infrastructure for Next-Generation Power Grid: Conception, Architecture, and Applications,” IEEE Transactions on Smart Grid, vol. 7 (4), pp. 1896 - 1912, 2016. DOI: http://doi.org/10.1109/ TSG.2015.2452293.spa
dc.relation.referencesC. Kolias, A. Stavrou, J. Voas, I. Bojanova, and R. Kuhn, “Learning Internet-of-Things Security “Hands-On”,” IEEE Security and Privacy, vol. 14 (6), pp. 37-46, Nov. 2016. DOI: http://doi. org/10.1109/MSP.2016.118.spa
dc.relation.referencesJ. L. Hernández Ramos, Development of a security and privacy framework for the internet of things, Universidad de Murcia, 2016.spa
dc.relation.referencesG. Yongan, Z. Hongbo, and Y. Longxian, “Smart Service System(SSS): A Novel Architecture Enabling Coordination of Heterogeneous Networking Technologies and Devices for Internet of Things,” China Communications, vol. 14 (3), pp. 130-144, Mar. 2017. DOI: http://doi.org/10.1109/ CC.2017.7897329.spa
dc.relation.referencesY. Ding, X. W. Zhou, Z. M. Cheng, and F. H. Ling, “A Security Differential Game Model for Sensor Networks in Context of the Internet of Things,” Wireless Personal Communications, vol. 72 (1), pp. 375-388, Sep. 2013. DOI: http://doi.org/10.1007/ s11277-013-1018-y.spa
dc.relation.referencesA. Saeed, A. Ahmadinia, A. Javed, and H. Larijani, “Intelligent Intrusion Detection in Low-Power IoTs,” ACM Transactions on Internet Technology, vol. 16 (4), Art. 27, Dec. 2016. DOI: http://doi. org/10.1145/2990499.spa
dc.relation.referencesD. Díaz-Sánchez, R. S. Sherratt, P. Arias, F. Almenárez Mendoza, and A. Marín, “Secure store and forward proxy for dynamic IoT applications over M2M networks,” IEEE Transactions on Consumer Electronics, vol. 62 (4), pp. 389-397, Nov. 2016. DOI: http://doi.org/10.1109/TCE.2016.7838091.spa
dc.relation.referencesK. Salah, M. Hammoud, and S. Zeadally, “Teaching Cybersecurity Using the Cloud,” IEEE Transactions on Learning Technologies, vol. 8 (4), pp. 383 - 392, Oct. 2015. DOI: http://doi.org/10.1109/ TLT.2015.2424692.spa
dc.relation.referencesM. Coccoli, P. Maresca, L. Stanganelli, and A. Guercio, “An experience of collaboration using a PaaS for the smarter university model,” Journal of Visual Languages and Computing, vol. 31, pp. 275-282, 2015. DOI: http://doi.org/10.1016/j. jvlc.2015.10.014.spa
dc.relation.referencesA. Furfaro, L. Argento, A. Parise, and A. Piccolo, “Using virtual environments for the assessment of cybersecurity issues in IoT scenarios,” Simulation Modelling Practice and Theory, vol. 73, pp. 43-54, 2017. DOI: http://doi.org/10.1016/j. simpat.2016.09.007.spa
dc.relation.referencesS. Cass, “A chip to protect the internet of things [Resources_Beyond the datasheet],” IEEE Spectrum, vol. 54 (1), pp. 20-21, 2017. DOI: http://doi. org/10.1109/MSPEC.2017.7802735.spa
dc.relation.referencesD. Minoli, K. Sohraby, and B. Occhiogrosso, “IoT Considerations, Requirements, and Architectures for Smart Buildings-Energy Optimization and Next-Generation Building Management Systems,” IEEE Internet of Things Journal, vol. 4 (1), pp. 269-283, 2017. DOI: http://doi.org/10.1109/ JIOT.2017.2647881.spa
dc.relation.referencesY. Simmhan, S. Aman, A. Kumbhare, R. Liu, S. Stevens, Q. Zhou, and V. Prasanna, “Cloud-Based Software Platform for Big Data Analytics in Smart Grids,” Computing in Science and Engineering, vol. 15 (4), pp. 38-47, 2013. DOI: http://doi.org/10.1109/ MCSE.2013.39.spa
dc.relation.referencesBankinter, Internet de las cosas en un mundo conectado de objetos, Bakinter, Ed., 2011.spa
dc.relation.referencesF. Shrouf, Utilizing the Internet of Things to promote energy awareness and efficiency at discrete production processes: Practices and methodology, E.T.S.I. Industriales (UPM), 2015.spa
dc.relation.referencesD. Rico-Bautista, J. Parra-Valencia, and C. D. Guerrero, “IOT: Una aproximación desde ciudad inteligente a universidad inteligente,” Revista Ingenio UFPSO, vol. 13 (1), pp. 9-20, 2017spa
dc.relation.referencesX. Nie, “Constructing Smart Campus Based on the cloud computing and the internet of things,” in 2nd International Conference on Computer Science and Electronics Engineering, 2013. DOI: http://doi. org/10.2991/iccsee.2013.395.spa
dc.relation.referencesT. Marcos Alves, C. André da Costa, R. da Rosa Righi, and J. L. Victória Barbosa, “Exploring the Social Internet of Things concept in a Univeristy Campus using NFC,” in 41st Latin American Computing Conference, 2015.spa
dc.relation.referencesM. Cata, “Smart university, a new concept in the internet of things,” in 14th RoEduNet International Conference - Networking in Education and Research, 2015. DOI: http://doi.org/10.1109/ RoEduNet.2015.7311993.spa
dc.relation.referencesH.-I. Wang, “Constructing the green campus within the internet of things architecture,” International Journal of Distributed Sensor Networks, vol. 10 (3), pp. 1-8, Mar. 2014. DOI: http://doi. org/10.1155/2014/804627.spa
dc.relation.referencesY. Luo, J. Cao, and J. Qian, “Exploration and construction of smart library based on RFID technology,” Advanced Materials Research, vol. 765-767, pp. 1743-1746, Sep. 2013. DOI: http:// doi.org/10.4028/www.scientific.net/AMR.765- 767.1743spa
dc.relation.referencesM. Benedito-Bordonau, D. Gargallo, J. Avariento, A. Sanchis, M. Gould, and J. Huerta, UJI Smart Campus, Centro Nacional de Información Geográfica, 2013.spa
dc.rightsCopyright (c) 2018 Universidad Pedagógica y Tecnológica de Colombiaspa
dc.rights.accessrightsinfo:eu-repo/semantics/openAccessspa
dc.rights.coarhttp://purl.org/coar/access_right/c_abf2spa
dc.rights.creativecommonsAtribución-NoComercial 4.0 Internacional (CC BY-NC 4.0)spa
dc.rights.urihttps://creativecommons.org/licenses/by-nc/4.0/spa
dc.sourcehttps://revistas.uptc.edu.co/index.php/ingenieria/article/view/7807/6175spa
dc.subject.proposalCommunication system securityspa
dc.subject.proposalInternet of thingsspa
dc.subject.proposalSecurity dataspa
dc.subject.proposalSmart campusspa
dc.subject.proposalWireless communicationspa
dc.titleSmart Campus : trends in cybersecurity and future developmentspa
dc.title.alternativeCampus inteligente : tendencias en ciberseguridad y desarrollo futuroeng
dc.title.alternativeCampus inteligente : tendências em cibersegurança e desenvolvimento futuroeng
dc.typeArtículo de revistaspa
dc.type.coarhttp://purl.org/coar/resource_type/c_6501spa
dc.type.coarversionhttp://purl.org/coar/version/c_970fb48d4fbd8a85spa
dc.type.contentTextspa
dc.type.driverinfo:eu-repo/semantics/articlespa
dc.type.redcolhttps://purl.org/redcol/resource_type/ARTspa
dc.type.versioninfo:eu-repo/semantics/publishedVersionspa
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
PPS_881_Smart_campus.pdf
Size:
513.92 KB
Format:
Adobe Portable Document Format
Description:
Archivo principal
Descargar
License bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
14.45 KB
Format:
Item-specific license agreed upon to submission
Description:
Descargar