Embedded connected computers are installed in homes in increasing numbers in the form of consumer IoT devices. These devices are often insufficiently protected against cyberattacks. In this research report, we propose several security requirements for consumer IoT devices. These requirements are suitable for enforcement through legislation and will significantly improve consumer IoT cybersecurity when implemented.This research report, commissioned by the Dutch Radiocommunications Agency, describes a threat model and significant security problems, derived from literature research. These assisted in evaluating more than 400 security measures, after which the top measures were summarised into eight essential security requirements. These requirements are easy to implement, easy to test, unambiguous, and greatly improve the cybersecurity of the products. We recommend standardisation agencies to make these requirements mandatory for all consumer IoT devices.
MULTIFILE
This chapter explains the role of authenticity in creative tourism in rural areas and identifies future research needs. Community-based tourism and creative tourism both use the concept of authenticity extensively, but uncritically. To develop creative tourism in rural areas and prevent commodification, the theoretical assumptions and definitions behind authenticity must be considered. The study analyses how different theories of authenticity are applied in creative and community-based tourism literature and suggests a synthetic theory of authenticity applicable to creative tourism development in rural areas. This theory was explored in the context of five Balinese villages using a microethnographic approach with participant observation and expert as well as tourist interviews. Findings extend the discussion in the literature and provide further evidence that the synthesized definition of authenticity is reasonable for creative tourism in rural areas. This definition of authenticity may develop differently in other cultural contexts. More research is also needed to classify expectations of authenticity among different types of creative tourists. Finally, as tourism influences how authenticity changes over time, future research on the carrying capacity of rural areas is essential for the development of creative tourism in rural areas.
LINK
The increasing complexity of digital networks on which society depends on renders these networks increasingly vulnerable to attacks. Focusing on physical layer security, we propose to develop single-spatial-mode optical Physical Unclonable Functions (PUFs) as an authentication solution for quantum and classical communication links. These novel PUFs are read out through standard optical fibers or free-space links. Several implementations of single-mode PUFs are proposed exploiting the time / frequency domain for the encoding challenge / response space. Together with the PUFs, we will develop tools to generate challenge-forming few-photon light pulses and to validate PUF responses at the few-photon level and take specific steps toward wide implementation.