Ir al menú de navegación principal Ir al contenido principal Ir al pie de página del sitio

Campus inteligente: Tendencias en ciberseguridad y desarrollo futuro

Resumen

Un Smart Campus es una entidad de cualquier tipo que utiliza la tecnología para apoyar su infraestructura y sus procesos, con el fin mejorarlos para el uso de las personas. El propósito de este trabajo es presentar una revisión de literatura, en donde se contextualiza el internet de las cosas y su vital importancia para el Smart Campus y su relación con los conceptos de ciberseguridad y red inalámbrica de sensores. Se presentan las diferentes interrelaciones, tendencias y desarrollo futuro del Smart Campus, así como las diferencias y similitudes con el concepto emergente de Smart University. Esta revisión reveló que el Internet de las cosas se involucra en todos los campos y puede influir en los procesos de una universidad para mejorarlos, ayudar en la toma de decisiones y apoyar el aprendizaje académico y el desarrollo tecnológico. Se concluye que Smart University no se queda en mejorar la infraestructura de las universidades a través de la tecnología, pues su fin principal es mejorar la calidad de la educación impartida por las instituciones.

Palabras clave

campus inteligente, comunicación inalámbrica, Internet de las cosas, seguridad de los datos, seguridad del sistema de comunicación

PDF (English) XML (English)

Citas

  1. Y. Medina-Cárdenas, and D. Rico-Bautista, "Modelo de gestión de servicios para la universidad de pamplona: ITIL," Scientia et technica, vol. 2 (39), pp. 314-319, 2008.
  2. Y. Medina-Cárdenas, D. Rico-Bautista, and Y. Areniz, Modelo estratégico para la gestión tecnológica en la organización: plan táctico de la calidad (ITIL & ISO 20000), I. T. Metropolitano, Ed., Medellín: Fondo Editorial ITM, 2016, p. 90. DOI: http://doi.org/10.22430/9789585414006.
  3. A. Liñán Colina, A. Vives, A. Bagula, M. Zennaro, and E. Pietrosemoli, Internet de las cosas, W. S. Science, Ed., 2015.
  4. C. Restrepo, O. Salcedo-Parra, and J. Sánchez-Céspedes, “Traffic model for the interconnection of networks and operators using MPLS-TE,” Revista Facultad de Ingeniería, vol. 26 (44), pp. 87-96, 2017. DOI: http://doi.org/10.19053/01211129.v26.n44.2017.5774.
  5. L. Atzori, A. Lera, and G. Morabito, “Understanding the Internet of Things: definition, potentials, and societal role of a fast evolving paradigm,” Ad Hoc Networks, vol. 56, pp. 122-140, Mar. 2017. DOI: http://doi.org/10.1016/j.adhoc.2016.12.004.
  6. A. Tejero López, “Seguridad en el Internet de las cosas,” Master Thesis, Universidad Politécnica de Madrid, 2014.
  7. L. Rueda, and D. Rico-Bautista, “Modelamiento inicial de ciudades de países en vía de desarrollo, utilizando dinámica de sistemas,” Scientia et technica, vol. 1 (34), pp. 421-426, 2007.
  8. V. Almeida, D. Doneda, and M. Montero, “Governance Challenges for the Internet of Things,” IEEE Internet Computing, vol. 19 (4), pp. 56-59, Jul. 2015. DOI: http://doi.org/10.1109/MIC.2015.86.
  9. Q. Jing, A. Vasilakos, J. Wan, J. Lu, and D. Qiu, “Security of the Internet of Things: perspectives and challenges,” Wireless Networks, vol. 20 (8), pp. 2481-2501, Nov. 2014. DOI: http://doi.org/10.1007/s11276-014-0761-7.
  10. K. Kobara, “Cyber physical security for Industrial Control Systems and IoT,” IEICE Transactions on Information and Systems, vol. E99.D (4), pp. 787-795, 2016. DOI: http://doi.org/10.1587/transinf.2015ICI0001.
  11. S. Thiel, J. Mitchell, and J. Williams, “Coordination or Collision? the Intersection of Diabetes Care, Cybersecurity, and Cloud-Based Computing,” Journal of Diabetes Science and Technology, vol. 11 (2), pp. 195-197, Mar. 2017. DOI: http://doi.org/10.1177/1932296816676189.
  12. M. Callejas-Cuervo, L. Martínez-Tejada, and A. Alarcón-Aldana, “Emotion recognition techniques using physiological signals and video games –Systematic review–,” Revista Facultad de Ingeniería, vol. 26 (46), pp. 19-28, 2017. DOI: http://doi.org/10.19053/01211129.v26.n46.2017.7310.
  13. P. Alves, S. da Silva Santos, and J. Abreu de Faria, “Proposta de modelo explicativo das perceções sobre gestão e políticas públicas em matéria de cibersegurança e cibercrime,” Sociologia: Revista da Faculdade de Letras da Universidade do Porto, vol. 23, pp. 95-113, 2017.
  14. M. Sastoque-Caro, G. Puerto-Leguizamón, and C. Suárez-Fajardo, «Oportunidades para la implementación de radio definida por software en redes de sensores,” Revista Facultad de Ingeniería, vol. 26 (45), pp. 137-148, 2017. DOI: http://doi.org/10.19053/01211129.v26.n45.2017.6422.
  15. P. Alves, S. da Silva, and J. de Faria, “Clusters de Percepções sobre cibersegurança e cibercriminalidade em Portugal e as suas implicações para a implementação de políticas públicas nesse domínio,” Revista da FAE, vol. 19 (2), pp. 22-37, 2016.
  16. BITAG, Internet of Things (IoT) Security and Privacy Recommendations, Broadband Internet Technical Advisory Group Technical Working Group Report, BITAG, 2016.
  17. H. Ning, H. Liu, and L. T. Yang, “Cyberentity Security in the Internet of Things,” Computer, vol. 46 (4), pp. 46-53, Apr. 2013. DOI: http://doi.org/10.1109/MC.2013.74.
  18. K. Rose, S. Eldridge, and L. Chapin, La internet de las cosas—una breve reseña, I. Society, Ed., 2015.
  19. E. Borgia, “The Internet of Things vision: Key features, applications and open issues,” Computer Communications, vol. 54, pp. 1-31, Dec. 2014. DOI: http://doi.org/10.1016/j.comcom.2014.09.008.
  20. J. Lobo, and D. Rico-Bautista, “Implementación de la seguridad del protocolo de internet Versión 6,” Revista GTI, vol. 11 (29), pp. 35 - 46, 2012.
  21. I. Robles, and A. Acosta, “IPv6 y el Internet de las Cosas (IoT),” in Cisco Support Community Expert Series Webcast, 2016.
  22. L.-O. Vargas, G. Romaniello, M. Vučinić, M. Favre, A. Banciu, R. Guizzetti, C. Planat, P. Urard, M. Heusse, F. Rousseau, O. Alphand, É. Dublé, and A. Duda, “GreenNet: An Energy-Harvesting IP-Enabled Wireless Sensor Network,” IEEE Internet of Things Journal, vol. 2 (5), pp. 412 - 426, 2015. DOI: http://doi.org/10.1109/JIOT.2015.2425431.
  23. J. Soldatos, and N. Kefalakis, “Design principles for utility-driven services and cloud-based computing modelling for the Internet of Things,” International Journal of Web and Grid Services, vol. 10 (2-3), pp. 139-167, 2014. DOI: http://doi.org/10.1504/IJWGS.2014.060254.
  24. S. Sicari, A. Rizzardi, L. A. Grieco, and A. Coen Porisini, “Security, privacy and trust in the Internet of Things: The road ahead,” Computer Networks, vol. 76, pp. 146-164, Jun. 2015. DOI: http://doi.org/10.1016/j.comnet.2014.11.008.
  25. N. A. Alrajeh, S. Khan, and B. Shams, “Intrusion Detection Systems in Wireless Sensor Networks: A Review,” International Journal of Distributed Sensor Networks, vol. 9 (5), pp. 1-7, May. 2013. DOI: http://doi.org/10.1155/2013/167575.
  26. T. Cao Minh, A self-organizing management platform for wireless sensor networks, Universitat Pompeu Fabra, 2014.
  27. N. Cong Luong, D. Thai Hoang, P. Wang, D. Niyato, D. In Kim, and Z. Han, “Data Collection and Wireless Communication in Internet of Things (IoT) Using Economic Analysis and Pricing Models: A Survey,” IEEE Communications Surveys & Tutorials, vol. 18 (4), pp. 2546 - 2590, 2016. DOI: http://doi.org/10.1109/COMST.2016.2582841.
  28. P. Bellavista, G. Cardone, A. Corradi, and L. Foschini, “Convergence of MANET and WSN in IoT Urban Scenarios,” IEEE Sensors Journal, vol. 13 (10), pp. 3558-3567, Oct. 2013. DOI: http://doi.org/10.1109/JSEN.2013.2272099.
  29. M. Barceló Lladó, Wireless Sensor Networks in the Future Internet of Things: Density, Mobility, Heterogeneity and Integration, Universitat Autònoma de Barcelona, 2015.
  30. C. C. Chang, W. Y. Hsueh, and T. F. Cheng, “A Dynamic User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Networks,” Wireless Personal Communications, vol. 89 (2), pp. 447-465, Jul. 2016. DOI: http://doi.org/10.1007/s11277-016-3281-1.
  31. F. Ishmanov, and Y. Bin Zikria, “Trust Mechanisms to Secure Routing in Wireless Sensor Networks: Current State of the Research and Open Research Issues,” Journal of Sensors, vol. 2017, Article ID 4724852, Feb. 2017. DOI: http://doi.org/10.1155/2017/4724852.
  32. J. Hing Fong Chen Gallardo, Un middleware fiable para el desarrollo de aplicaciones sobre redes inalámbricas de sensores y actores, Universidad de Málaga, 2014.
  33. M. Guizani, D. He, K. Ren, J. Rodrigues, S. Chan, and Y. Zhang, “Security and privacy in emerging networks: Part 1,” IEEE Communications Magazine, vol. 53 (4), pp. 18-19, 2015. DOI: http://doi.org/10.1109/MCOM.2015.7081098.
  34. F. Alama, R. Mehmoodb, I. Katiba, and A. Albeshria, “Analysis of Eight Data Mining Algorithms for Smarter Internet of Things (IoT),” Procedia Computer Science, vol. 98, pp. 437-442, 2016. DOI: http://doi.org/10.1016/j.procs.2016.09.068.
  35. T. Tsai, S. Huang, and Y. Tseng, “SIBSC: Separable Identity-Based Signcryption for Resource-Constrained Devices,” Informatica (Netherlands), vol. 28 (1), pp. 193-214, 2017. DOI: http://doi.org/10.15388/Informatica.2017.126.
  36. Y. Li, K. Gai, L. Qiu, M. Qiu, and H. Zhao, “Intelligent cryptography approach for secure distributed big data storage in cloud computing,” Information Sciences, vol. 387, pp. 103-115, 2017. DOI: http://doi.org/10.1016/j.ins.2016.09.005.
  37. I. Weber, S. Nepal, and L. Zhu, “Developing Dependable and Secure Cloud Applications,” IEEE Internet Computing, vol. 20 (3), pp. 74-79, 2016. DOI: http://doi.org/10.1109/MIC.2016.67.
  38. M. A. AL-Zoube, and Y. Alqudah, “Mobile Cloud Computing Framework For Patients' Health Data Analysis,” Biomedical Engineering - Applications, Basis and Communications, vol. 26 (2), Article ID 1450020, 2014. DOI: http://doi.org/10.4015/S1016237214500203.
  39. T. Sanislav, S. Zeadally, and G. D. Mois, “A Cloud-Integrated, Multilayered, Agent-Based Cyber-Physical System Architecture,” Computer, vol. 50 (4), pp. 27-37, 2017. DOI: http://doi.org/10.1109/MC.2017.113.
  40. F. Wu, L. Xu, S. Kumari, and X. Li, “A privacy-preserving and provable user authentication scheme for wireless sensor networks based on Internet of Things security,” Journal of Ambient Intelligence and Humanized Computing, vol. 8 (1), pp. 101-116, Feb. 2017. DOI: http://doi.org/10.1007/s12652-016-0345-8.
  41. Q. M. Ashraf, and M. H. Habaebi, “Autonomic schemes for threat mitigation in Internet of Things,” Journal of Network and Computer Applications, vol. 49, pp. 112-127, 2015. DOI: http://doi.org/10.1016/j.jnca.2014.11.011.
  42. F. Luo, J. Zhao, Z. Y. Dong, Y. Chen, Y. Xu, X. Zhang, and P. K. Wong, “Cloud-Based Information Infrastructure for Next-Generation Power Grid: Conception, Architecture, and Applications,” IEEE Transactions on Smart Grid, vol. 7 (4), pp. 1896 - 1912, 2016. DOI: http://doi.org/10.1109/TSG.2015.2452293.
  43. C. Kolias, A. Stavrou, J. Voas, I. Bojanova, and R. Kuhn, “Learning Internet-of-Things Security "Hands-On",” IEEE Security and Privacy, vol. 14 (6), pp. 37-46, Nov. 2016. DOI: http://doi.org/10.1109/MSP.2016.118.
  44. J. L. Hernández Ramos, Development of a security and privacy framework for the internet of things, Universidad de Murcia, 2016.
  45. G. Yongan, Z. Hongbo, and Y. Longxian, “Smart Service System(SSS): A Novel Architecture Enabling Coordination of Heterogeneous Networking Technologies and Devices for Internet of Things,” China Communications, vol. 14 (3), pp. 130-144, Mar. 2017. DOI: http://doi.org/10.1109/CC.2017.7897329.
  46. Y. Ding, X. W. Zhou, Z. M. Cheng, and F. H. Ling, “A Security Differential Game Model for Sensor Networks in Context of the Internet of Things,” Wireless Personal Communications, vol. 72 (1), pp. 375-388, Sep. 2013. DOI: http://doi.org/10.1007/s11277-013-1018-y.
  47. A. Saeed, A. Ahmadinia, A. Javed, and H. Larijani, “Intelligent Intrusion Detection in Low-Power IoTs,” ACM Transactions on Internet Technology, vol. 16 (4), Art. 27, Dec. 2016. DOI: http://doi.org/10.1145/2990499.
  48. D. Díaz-Sánchez, R. S. Sherratt, P. Arias, F. Almenárez Mendoza, and A. Marín, “Secure store and forward proxy for dynamic IoT applications over M2M networks,” IEEE Transactions on Consumer Electronics, vol. 62 (4), pp. 389-397, Nov. 2016. DOI: http://doi.org/10.1109/TCE.2016.7838091.
  49. K. Salah, M. Hammoud, and S. Zeadally, “Teaching Cybersecurity Using the Cloud,” IEEE Transactions on Learning Technologies, vol. 8 (4), pp. 383 - 392, Oct. 2015. DOI: http://doi.org/10.1109/TLT.2015.2424692.
  50. M. Coccoli, P. Maresca, L. Stanganelli, and A. Guercio, “An experience of collaboration using a PaaS for the smarter university model,” Journal of Visual Languages and Computing, vol. 31, pp. 275-282, 2015. DOI: http://doi.org/10.1016/j.jvlc.2015.10.014.
  51. A. Furfaro, L. Argento, A. Parise, and A. Piccolo, “Using virtual environments for the assessment of cybersecurity issues in IoT scenarios,” Simulation Modelling Practice and Theory, vol. 73, pp. 43-54, 2017. DOI: http://doi.org/10.1016/j.simpat.2016.09.007.
  52. S. Cass, “A chip to protect the internet of things [Resources_Beyond the datasheet],” IEEE Spectrum, vol. 54 (1), pp. 20-21, 2017. DOI: http://doi.org/10.1109/MSPEC.2017.7802735.
  53. D. Minoli, K. Sohraby, and B. Occhiogrosso, “IoT Considerations, Requirements, and Architectures for Smart Buildings-Energy Optimization and Next-Generation Building Management Systems,” IEEE Internet of Things Journal, vol. 4 (1), pp. 269-283, 2017. DOI: http://doi.org/10.1109/JIOT.2017.2647881.
  54. Y. Simmhan, S. Aman, A. Kumbhare, R. Liu, S. Stevens, Q. Zhou, and V. Prasanna, “Cloud-Based Software Platform for Big Data Analytics in Smart Grids,” Computing in Science and Engineering, vol. 15 (4), pp. 38-47, 2013. DOI: http://doi.org/10.1109/MCSE.2013.39.
  55. Bankinter, Internet de las cosas en un mundo conectado de objetos, Bakinter, Ed., 2011.
  56. F. Shrouf, Utilizing the Internet of Things to promote energy awareness and efficiency at discrete production processes: Practices and methodology, E.T.S.I. Industriales (UPM), 2015.
  57. D. Rico-Bautista, J. Parra-Valencia, and C. D. Guerrero, “IOT: Una aproximación desde ciudad inteligente a universidad inteligente,” Revista Ingenio UFPSO, vol. 13 (1), pp. 9-20, 2017.
  58. X. Nie, “Constructing Smart Campus Based on the cloud computing and the internet of things,” in 2nd International Conference on Computer Science and Electronics Engineering, 2013. DOI: http://doi.org/10.2991/iccsee.2013.395.
  59. T. Marcos Alves, C. André da Costa, R. da Rosa Righi, and J. L. Victória Barbosa, “Exploring the Social Internet of Things concept in a Univeristy Campus using NFC,” in 41st Latin American Computing Conference, 2015.
  60. M. Cata, “Smart university, a new concept in the internet of things,” in 14th RoEduNet International Conference - Networking in Education and Research, 2015. DOI: http://doi.org/10.1109/RoEduNet.2015.7311993.
  61. H.-I. Wang, “Constructing the green campus within the internet of things architecture,” International Journal of Distributed Sensor Networks, vol. 10 (3), pp. 1-8, Mar. 2014. DOI: http://doi.org/10.1155/2014/804627.
  62. Y. Luo, J. Cao, and J. Qian, “Exploration and construction of smart library based on RFID technology,” Advanced Materials Research, vol. 765-767, pp. 1743-1746, Sep. 2013. DOI: http://doi.org/10.4028/www.scientific.net/AMR.765-767.1743.
  63. M. Benedito-Bordonau, D. Gargallo, J. Avariento, A. Sanchis, M. Gould, and J. Huerta, UJI Smart Campus, Centro Nacional de Información Geográfica, 2013.

Descargas

Los datos de descargas todavía no están disponibles.

Artículos similares

1 2 > >> 

También puede {advancedSearchLink} para este artículo.