Autoadd: a Study of Bootstrapping of an Iot Device on a Network

Total Page:16

File Type:pdf, Size:1020Kb

Autoadd: a Study of Bootstrapping of an Iot Device on a Network AutoAdd: A Study of Bootstrapping of an IoT Device on a Network Anoop Kumar Pandey, Balaji Rajendran, Kumari Roshni V S Centre for Development of Advanced Computing 68, Electronics City Bangalore, India {anoop, balaji, roshnivs}@cdac.in a smart home system designed to control lights and other Abstract electrical devices from an app, started giving error messages leading to disruption of services lasting 12 hours. IoT devices are fast getting embedded into our lives, and Owners were not able to control their devices with the when put together they have the potential to generate a Wink app, and any scheduled or other automated processes precise and detailed history of our lives and store them didn’t work. While the problem, according to the company, forever. Their networking and communicational power can was “misconfiguration” of a “security measure”; Engadget be unleashed for malicious and sabotage purposes, by a reported [4] that the blame should be put on an expired motivated attacker sitting in the far corner of the world. security certificate. Attacks on Industrial IoT systems can cause greater disasters. It is therefore essential to inculcate the security 2. Introduction aspect, right from design to development to operations. The Let’s put together all the smart devices, home appliances, first operation of an IoT device is to bootstrap itself, and vehicles, sensors and similar electronic gadgets on a due importance should be placed to ensure that this network and we get Internet of Things (IoT). Kevin Ashton operation is carried out securely and with due diligence. coined the term "Internet of Things (IoT)" and defined it as However, it’s easier said than done, and this paper outlines a system where the internet is connected to the physical several approaches for secure automated bootstrapping world via ubiquitous sensors. It creates a method for and also proposes a new method, which is compared transformation of the physical world into computer-based against the existing mechanisms for several qualitative factors. systems, resulting in performance and efficiency enhancement, financial gains, and reduces human involvement. The number of IoT devices increased 31% 1. Prologue year-over-year to 8.4 billion in 2017 [5] and it is estimated to have 30 billion IoT devices by 2020 [6]. Many more Amazon launched “Amazon Alexa” [1] in November 2014. devices are/will be connected through serial link. While, Alexa is a virtual assistant which comes with Echo line of the scale of IoT is going pretty bigger day by day, the task smart speakers. It is capable of voice interaction, control of of adding new devices and bootstrapping it at such a large smart home devices, music playback, setting alarms, scale, remains at large. However IoT is turning from making calls, checking weather and news and much more. Internet of Things to Internet of Hackable Things [7]. Google Home [2] series smart speakers were launched in Classic information security has been all about November 2016. Google Assistant can be used to control confidentiality, integrity and availability. Someone thousands of smart-home products from several brands like shouldn’t steal my data (confidentiality), or modify it LG, GE, Whirlpool, Nest etc... Google Home can be asked (integrity), or prevent us from obtaining it (availability). to change the temperature, dim the lights, turn on a Confidentiality attacks have been targeting internet world microwave or kettle, and also start Roomba (robotic for most of the instances. They are expensive, embarrassing vacuum cleaners). It can also turn the TV on/off using and harmful. In August 2014, a large collection of private Chromecast. pictures of celebrities (largely women) was posts on The concept of smart home and devices is taking off very imageboards like 4chan and later disseminated to other fast. It appears to make our lives quite easy and websites and social media. The images were initially comfortable. But turning your home into a computer means believed to have been obtained through a vulnerability of facing computer-like problems. The security and Apple's cloud services suite iCloud, but later it was performance issues associated are much scary. Let’s go revealed that access was gained through targeted phishing back to 2015 [3], when smart hubs from Wink, the maker of attacks [8]. In July 2015, "The Impact Team" group stole the user data n*(n-1)/2 interactions, so 100 systems mean 5000 of a commercial website ‘Ashley Madison’ known for interactions and apparently 5,000 potential vulnerable enabling extramarital affairs. The group made copies of the points resulting from those interactions. It can increase to website’s user database and all their personal information 45K interactions with just 300 systems and half a million and threatened to release it if the website would not stop with 1K systems. their operations. Later in August 2015, they released more than 25 GBs of company data and user details [9]. 2.3. Autonomous Systems While confidentiality attack seems more pertinent, integrity We are moving towards autonomous systems. and availability attacks pose graver risks. While threats like Autonomous network, driverless cars, self-regulating manipulated counts in EVM (Electronic Voting Machine), electricity grids, automatic payment systems, auto breaking into a house or house arresting someone by selling/buying of stocks are few, setting early examples. hacking smart door lock, remote murder through hacked Autonomy might be great, however it also implies that the medical devices, denying someone access of his own car or impact of attacks can also run automatically, immediately allowing stranger access to the car, freezing water pipes and ubiquitously. The less human in loop of an attack, the through hacked thermostat, shutting down electric grid faster will it propagate. remotely, releasing toxic chemicals or gas in air through hacked robots or machinery, crashing an aeroplane and While security experts and engineers are toiling hard to many more, may seem overhyped, they may turn as real as mitigate these risks, we propose a system AutoAdd (work they can be. in progress), which ensures automatic addition and initial These increases risks or threats may be attributed to bootstrapping of an IoT device while it is put on the following factors [13]: network. While manual bootstrapping requires a human to add a device to a network (network discovery), connect to 2.1. Turning everything into computer and registrar (system where device can be registered), setting allowing software control up the key for future secure communication and finally all configuration of the device for its functioning in the As time is passing, more devices are undergoing network domain; AutoAdd will automate all of these software control thereby making them prone to be processes. vulnerable to all the attacks we witness against computers. There are billions of devices and at least thousands of Though it gives us lots of flexibility and ease of use, but it manufacturers. So how do we identify and trust a device? also brings insecurities and vulnerabilities with it. Consider Similarly there are many networks, how does the device the example of mobiles: while new mobile device models know that I am working only with my owner and not with are getting released every few days from one or the other some imposter network? OEM, the monthly security patch updated are limited, leave Remember, there are hostile devices on the network, and apart major updates. Also because many of these devices there are hostile networks that might attempt to take over are expensive and lasts long, we don’t replace them as the device. Basically, we need to establish the frequent as we can replace a feature phone. Even though identity/authenticity of the device; Check if device is some devices get their updates for lifetime, their compromised or not; establish the identity of the performance decrease as they become older and we need to network/domain; and finally check if the domain is the make a choice between performance and a new update [19]. correct one? A recent Princeton survey [18] found more than 500,000 insecure devices on the internet. 3. Study of Current Approaches 2.2. Connectivity 3.1. TOFU (Trust on First Use) As systems become interconnected, vulnerabilities in TOFU (Trust on First Use) [14] calls for accepting and one system, lead to attacks against others. The recent storing a public key or credential associated with an WannaCry [10] ransomware attack in May 2017 might asserted identity, without authenticating that assertion. open eyes of enterprises, which included a "transport" Subsequent communication that is authenticated using the mechanism to automatically spread itself. This transport cached key or credential is secure against an MiTM attack, code scans for vulnerable systems, then uses the if such an attack did not succeed during the vulnerable EternalBlue [11] exploit to gain access, and the initial communication. DoublePulsar [12] tool to install and execute a copy of itself. With the Internet of Things exploitable 3.2. Resurrecting Duckling vulnerabilities will be exploited more often. Quantitatively, if n systems are all interacting with each other, that's about In ‘resurrecting duckling’ [17], a device recognises as its owner the first entity that sends it a secret key and will stay manufacturers during bootstrapping. Moreover BRSKI is a loyal to its owner for the rest of the life. It may come to EoL one-time process. It is not automatically restarted when the (end of life), or may be reset. The ownership of the device pledge detects change in ownership or network which may also be transferred. It is analogous to imprinting in should be mandatory, given that device may get stolen and ducks, where duckling emerging from its egg will put in some other network after initial bootstrapping.
Recommended publications
  • USER GUIDE FEATURES • Remotely Operate Individual Lights Or Groups • Automate Lighting to Fit Your Schedule • Dim Or Highlight for the Perfect Setting
    USER GUIDE FEATURES • Remotely operate individual lights or groups • Automate lighting to fit your schedule • Dim or highlight for the perfect setting WHAT’S INCLUDED (in the box) • 2 GE Link LED A19 light bulbs • 1 Link Hub (required to connect GE Link bulbs) REQUIRED FOR USE (not in the box) • Apple iPhone®, iPod touch®, or Android™ phone • The Wink app downloaded to your mobile device from the iTunes® App Store or Google Play™ • A Wi-Fi® network with 2.4GHz router (5GHz is not supported) Supported wireless security: WEP (40-bit, 128-bit), WPA-PSK (TKIP/AES), or WPA2-PSK (TKIP/AES) GETTING STARTED 1 Install the included GE Link light bulb(s) 3 Open the Wink app and log in or sign up. and leave on. 4 Tap “Add a product,” then tap “Hubs,” 2 Plug your Link Hub into an AC outlet in a then tap “Link Hub.” central location device. 5 Carefully follow the steps in the Wink app. Note: On first connection, the LED light on the hub will be blinking RED as it downloads the latest firmware. Do not unplug during this process. You will be prompted to restart the pairing process after the firmware is installed. 6 Once Link Hub setup is complete, tap “Add a product,” then tap “Lights,” then tap “Link Light Bulb.” 7 Follow the steps in the Wink app to connect and control your Link bulbs. Radiation Exposure Statement: This equipment COPYRIGHT AND TRADEMARK NOTICES complies with FCC radiation exposure limits set forth for © 2015 Quirky, Inc. All rights reserved.
    [Show full text]
  • Schlage Electronics Brochure
    Safer. Smarter. More stylish. SCHLAGE KEYLESS LOCKS Deliver quality and innovation with reliable access control systems from Schlage. PROVIDE YOUR CUSTOMERS WITH SIMPLE, KEYLESS SECURITY. HUB HUB HUB CONNECTION CONNECTION CONNECTION HUB HUB HUB CONNECTION CONNECTION CONNECTION FREE FREE FREE APP APP APP BUILT-IN BUILT-IN BUILT-IN WIFI WIFI WIFI SMART WIFI DEADBOLT HANDS-FREE HANDS-FREE HANDS-FREE VOICE CONTROL VOICE CONTROL VOICE CONTROL A smarter way in. The built-in WiFi of the Schlage EncodeTM Smart WiFi Deadbolt provides secure remote access from anywhere – no hubs or adapters required – making integration with smart home technology seamless and simple. LIFETIME LIFETIME LIFETIME GUARANTEE GUARANTEE GUARANTEE SMART LOCK. SMART INVESTMENT. ● Works with Schlage Home app, Key by Amazon and Ring Video Doorbell ● Use the Schlage Home app to update the lock to the latest features SECURITY AND DURABILITY EASY EASY EASY INSTALLATION INSTALLATION INSTALLATION ● Built-in alarm technology senses potential door attacks ● Highest industry ratings for residential Security, Durability and Finish ACCESS CODES ● Schedule access codes so guests can only enter when you want them to ● Lock holds up to 100 access codes The Schlage Home app provides simple setup, remote connectivity and future compatibility exclusively for the Schlage Encode Smart WiFi Deadbolt and Schlage Sense Smart Deadbolt. 3 SMART DEADBOLT Smart made easy. The Schlage Sense® Smart Deadbolt makes it easy to set up and share access with the Schlage Home app for iOS and Android™ smartphones.
    [Show full text]
  • A Survey of Smartwatch Platforms from a Developer's Perspective
    Grand Valley State University ScholarWorks@GVSU Technical Library School of Computing and Information Systems 2015 A Survey of Smartwatch Platforms from a Developer’s Perspective Ehsan Valizadeh Grand Valley State University Follow this and additional works at: https://scholarworks.gvsu.edu/cistechlib ScholarWorks Citation Valizadeh, Ehsan, "A Survey of Smartwatch Platforms from a Developer’s Perspective" (2015). Technical Library. 207. https://scholarworks.gvsu.edu/cistechlib/207 This Project is brought to you for free and open access by the School of Computing and Information Systems at ScholarWorks@GVSU. It has been accepted for inclusion in Technical Library by an authorized administrator of ScholarWorks@GVSU. For more information, please contact [email protected]. A Survey of Smartwatch Platforms from a Developer’s Perspective By Ehsan Valizadeh April, 2015 A Survey of Smartwatch Platforms from a Developer’s Perspective By Ehsan Valizadeh A project submitted in partial fulfillment of the requirements for the degree of Master of Science in Computer Information Systems At Grand Valley State University April, 2015 ________________________________________________________________ Dr. Jonathan Engelsma April 23, 2015 ABSTRACT ................................................................................................................................................ 5 INTRODUCTION ...................................................................................................................................... 6 WHAT IS A SMARTWATCH
    [Show full text]
  • Veracode White Paper—The Internet of Things: Security Research Study
    Veracode White Paper – The Internet of Things: Security Research Study The Internet of Things: Security Research Study Veracode White Paper – The Internet of Things: Security Research Study Introduction As the Internet of Things (IoT) continues to gain traction and more connected devices come to market, security becomes a major concern. Businesses are increasingly being breached by attackers via vulnerable web-facing assets1; what is there to keep the same from happening to consumers? The short answer is nothing. Already, broad-reaching hacks of connected devices have been recorded2 and will continue to happen if manufacturers do not bolster their security efforts now. In this light, Veracode’s research team examined six Internet-connected consumer devices and found unsettling results. We investigated a selection of always-on consumer IoT devices to understand the security posture of each product. The result: product manufacturers weren’t focused enough on security and privacy, as a design priority, putting consumers at risk for an attack or physical intrusion. Our team performed a set of uniform tests across all devices and organized the findings into four different domains: user-facing cloud services, back-end cloud services, mobile application interface, and device debugging interfaces. The results showed that all but one device exhibited vulnerabilities across most categories. It’s clear there is a need to perform security reviews of device architecture and accompanying applications to minimize the risk to users. Further, the study
    [Show full text]
  • Install Guide
    CONNECTED link LED BULBS INSTALL GUIDE CONTENTS What You’ll Need 1 Controlling 3 Connecting 2 Link Light Bulbs the Wink HUB FAQs 4 Connecting the 2 Specifications 6 Link Light Bulb Support 8 WHAT YOU’LL NEED 1. A GE Link light bulb. 2. A Wink HUB (or other Wink-compatible or ZigBee-compatible hub.) 3. A mobile device using Android mobile, Android Wear or iOS. Tablets and desktops are not supported at this time. 4. The Wink app downloaded to your mobile device from the iTunes App Store or Google Play. If you already have a Wink app installed, please download the latest version to ensure you have the most updated support. 5. A Wi-Fi network connection with a router using WPA-PSK security. WEP security is not supported. Please refer to your router’s manual for instructions on converting to WPA security. GE LINK INSTALL GUIDE 1 CONNECTING THE WINK HUB TO YOUR WI-FI NETWORK 1. Plug the Wink HUB into an AC outlet. It will automatically turn on. Once the light on the Wink HUB is flashing purple, it is ready to connect. 2. Turn on Bluetooth for your mobile device. 3. Open the Wink app on your mobile device and log in. 4. Tap Add a product. 5. From the product list, tap Wink HUB. 6. A series of steps will follow onscreen. Step 1 is a short video about connecting the Wink HUB. Tap Next. 7. Step 2 instructs you to plug in your Wink HUB. Tap Next. 8. Step 3 instructs you to SHARE WIFI.
    [Show full text]
  • Establishing a Need for a Protocol for the Interoperability of Heterogeneous Iot Home Devices
    Georgia Southern University Digital Commons@Georgia Southern Electronic Theses and Dissertations Graduate Studies, Jack N. Averitt College of Spring 2018 Establishing a Need for a Protocol for the Interoperability of Heterogeneous IoT Home Devices Jenna Bayto Follow this and additional works at: https://digitalcommons.georgiasouthern.edu/etd Part of the Computer Engineering Commons Recommended Citation Bayto, Jenna, "Establishing a Need for a Protocol for the Interoperability of Heterogeneous IoT Home Devices" (2018). Electronic Theses and Dissertations. 1742. https://digitalcommons.georgiasouthern.edu/etd/1742 This thesis (open access) is brought to you for free and open access by the Graduate Studies, Jack N. Averitt College of at Digital Commons@Georgia Southern. It has been accepted for inclusion in Electronic Theses and Dissertations by an authorized administrator of Digital Commons@Georgia Southern. For more information, please contact [email protected]. ESTABLISHING A NEED FOR A PROTOCOL FOR THE INTEROPERABILITY OF HETEROGENEOUS IOT HOME DEVICES by JENNA BAYTO (Under the Direction of Christopher Kadlec) ABSTRACT The Internet of Things (IoT) refers to the field of connecting devices consumers use every day to the internet. As the world relies on more and more internet-driven technological devices to control functions within the home, issues with compatibility of those devices are surfacing. This research was created to establish the need for standardization of IoT devices within the home. INDEX WORDS: Internet of
    [Show full text]
  • Using Consumer Measurement to Bring the Internet of Things Into
    JULY 2016-VOL 1 ISSUE 1 USING CONSUMER MEASUREMENT TO BRING THE INTERNET OF THINGS INTO THE MAINSTREAM By JP Abello, Director, Global Engineering R&D, Nielsen EDITOR-IN-CHIEF The world of measurement is changing. SAUL ROSENBERG Thanks to recent advances in data collection, transfer, storage and analysis, MANAGING EDITOR there’s never been more data available to research organizations. But ‘Big JEROME SAMSON Data’ does not guarantee good data, and robust research methodologies are more important than ever. REVIEW BOARD Measurement Science is at the heart of what we do. Behind every piece of PAUL DONATO data at Nielsen, behind every insight, there’s a world of scientific methods EVP, Chief Research Officer and techniques in constant development. And we’re constantly cooperating Watch R&D on ground-breaking initiatives with other scientists and thought-leaders in the industry. All of this work happens under the hood, but it’s not any less MAINAK MAZUMDAR important. In fact, it’s absolutely fundamental in ensuring that the data our EVP, Chief Research Officer clients receive from us is of the utmost quality. Watch Data Science These developments are very exciting to us, and we created the Nielsen FRANK PIOTROWSKI Journal of Measurement to share them with you. This paper is part of VOL1 EVP, Chief Research Officer ISSUE 1 of the Journal. Buy Data Science ARUN RAMASWAMY WELCOME TO THE NIELSEN JOURNAL Chief Engineer OF MEASUREMENT ERIC SOLOMON SVP, Product Leadership SAUL ROSENBERG The Nielsen Journal of Measurement will explore the following topic areas in 2016: BIG DATA - Articles in this topic area will explore ways in which Big Data may be used to improve research methods and further our understanding of consumer behavior.
    [Show full text]
  • Automated Home Lighting Made Easy
    Automated Home Lighting Made Easy. Available in: The Leader in Smart Home Lighting Home automation allows you to control devices from All products universally support LED, CFL, your smartphone or tablet – sometimes through a incandescent and halogen bulbs, as well as hub with an internet connection and sometimes coordinate with our popular line of Decora devices. directly through an app. The products are backed with an impressive warranty Leviton offers homeowners an exciting selection of and feature the latest technology with scheduling, automated dimmers, switches, outlets and plug-in full range dimming and adjustable fade rates. products for automated control of lights, motor loads, appliances and more. Visit www.leviton.com/decorasmart to learn more. - Three-Way Devices for all technologies: Common Features • Multi-location (3-way) dimming is achieved using up to 4 remote units, DD00R-DLZ. and Benefits • Multi-location (3-way) switching is achieved using DD0SR-1Z coordinating remote (no LED indicator) or Easy to retrofit in existing • DD0SR-DLZ matching remote residential applications. (with LED indicator). - Choose from 6 color options Leviton can help you choose the technology: • Is the installation Residential or Commercial? If Commercial -> Lumina RF • Will you be attaching lighting controls to an automation hub or security system? - Single and multi- Yes -> Z-Wave gang screwless • Want to use Siri® or the Apple Home app? wallplates are Yes -> HomeKit available for • Amazon Alexa/Google Assistant/Android a clean installation enthusiast
    [Show full text]
  • The Value of a Step-Change Increase in Battery Energy Density for Consumer Mobile Device Satisfaction
    WHITE PAPER The Value of a Step-Change Increase in Battery Energy Density for Consumer Mobile Device Satisfaction JUNE 2021 Enovix® Corporation | 3501 W Warren Ave, Fremont, CA 94538 (USA) | www.enovix.com Table of Contents Executive Summary 03 Battery Life 04 User Experience and Functionality 05 Physical Battery Size 07 Battery Energy Density 08 A Battery for the Mobile Future 09 Conclusion 10 References (Endnotes) 10 Figures 1 Battery capacity value equation for consumer mobile device satisfaction 04 2 Conventional Li-ion cell architecture (photomicrograph) 08 3 Enovix 3D cell architecture (photomicrograph) 08 4 Wearable Device Format Enovix 3D Silicon Lithium-ion Battery 09 5 Comparison of Smartwatch Lithium-ion Batteries 09 WHITE PAPER 02 The Value of a Step-Change Increase in Battery Energy Density Executive Summary The first commercial lithium-ion (Li-ion) battery had an energy density just less than twice that of the nickel-cadmium and nickel metal-hydride batteries it replaced. Without this step-change increase in energy density, the brick-size cell phone of the 1980s would never have evolved to today’s sleek, sophisticated smartphones. But since its introduction, the Li- ion battery has only increased its energy density an average of 4.36% annually. Survey after survey has revealed that the number one consumer wish for their mobile devices is better battery life. But despite their displeasure, consumers continue to purchase over a billion mobile devices each year. Closer examination of battery life as a factor in overall consumer satisfaction indicates that it is more nuanced. Battery life is first a threshold and then a graduated factor in overall consumer satisfaction.
    [Show full text]
  • Sensi™ Smart Thermostat
    ™ Sensi Smart Thermostat Best Value Smart 1F87U-42WF Thermostat 2018. Best Value Smart Thermsotat 2017. The award-winning Sensi Smart Thermostat keeps homeowners connected to comfort and keeps you connected to your customers. Our Contractor-On- Call feature puts your company information at your homeowners’ fingertips. PRO 5 YEAR LIMITED WARRANTY SAVE ABOUT 23% ON HVAC ENERGY1 EASY TO CONNECT TO WI-FI Save money without compromising your comfort Easy step-by-step guide in the app to connect to Wi-Fi. with features like geofencing, flexible scheduling and remote access. CONTRACTOR-ON-CALL The Sensi app stores your contact information so when your SMART ALERTS customer needs service, you’re just a tap away. Register at Smart alerts notify homeowners of extreme temperature or sensiregistration.com. humidity levels. MULTIPLE THERMOSTAT CONTROL EASY TO INSTALL Easy management for schools and light commercial No c-wire required for most installations* plus a built-in applications. level for easy mounting. CIRCULATING FAN SMART HOME COMPATIBLE Improves air quality when a custom run time is set. Compatible with smart home platforms Amazon Alexa, the Google Assistant, Apple HomeKit and Wink. DID YOU KNOW? % Up to 85% of Sensi customers 85 replaced a working thermostat** Use of the Works with Apple HomeKit logo means that an electronic accessory has been designed to connect specifically to iPod touch, iPhone, or iPad, respectively, and has been certified by the developer to meet Apple performance standards. Apple is not responsible for the operation of this device or its compliance with safety and regulatory standards. Apple, the Apple logo, iPad, iPad Air, iPhone, and iPod touch are trademarks of Apple Inc., registered in the U.S.
    [Show full text]
  • Smart Assistive Architecture for the Integration of Iot Devices, Robotic Systems, and Multimodal Interfaces in Healthcare Environments
    sensors Article Smart Assistive Architecture for the Integration of IoT Devices, Robotic Systems, and Multimodal Interfaces in Healthcare Environments Alberto Brunete 1,*,† , Ernesto Gambao 1,† , Miguel Hernando 1,† and Raquel Cedazo 2,† 1 Centre for Automation and Robotics (CAR UPM-CSIC), Universidad Politécnica de Madrid, 28006 Madrid, Spain 2 Department of Electrical, Electronical and Automatic Control Engineering and Applied Physics, Escuela Técnica Superior de Ingeniería y Diseño Industrial, Universidad Politécnica de Madrid, 28012 Madrid, Spain * Correspondence: [email protected] † These authors contributed equally to this work. Abstract: This paper presents a new architecture that integrates Internet of Things (IoT) devices, service robots, and users in a smart assistive environment. A new intuitive and multimodal interac- tion system supporting people with disabilities and bedbound patients is presented. This interaction system allows the user to control service robots and devices inside the room in five different ways: touch control, eye control, gesture control, voice control, and augmented reality control. The interac- tion system is comprised of an assistive robotic arm holding a tablet PC. The robotic arm can place the tablet PC in front of the user. A demonstration of the developed technology, a prototype of a smart room equipped with home automation devices, and the robotic assistive arm are presented. The results obtained from the use of the various interfaces and technologies are presented in the Citation: Brunete,A.; Gambao, E.; article. The results include user preference with regard to eye-base control (performing clicks, and Hernando, M.; Cedazo, R. Smart using winks or gaze) and the use of mobile phones over augmented reality glasses, among others.
    [Show full text]
  • Increase Your Ipad Iq
    Dennis Weishan Technology Solutions Director Robert W. Baird & Co. Version: 8.18.14 1 Welcome Introduction iPad Basics Apps Tips & Tricks Accessories Resources Questions 2 Welcome Introduction iPad Basics Apps Tips & Tricks Accessories Resources Questions 3 4 5 6 7 8 Welcome Introduction iPad Basics Apps Tips & Tricks Accessories Resources Questions 9 10 11 12 “The combination of required code signing, sandboxing, and entitlements in apps provides solid protection against viruses, malware, and other exploits that compromise the security of other platforms.“ 13 Welcome Introduction iPad Basics Apps Tips & Tricks Accessories Resources Questions 14 15 Mail flick through your inbox. Tap to open attachments. Pinch to zoom. And turn iPad to landscape to change your view. iMessage a new service that’s even better than texting. Because it’s between you and anyone using an iPhone, iPad, or iPod touch with iOS 5. And it’s unlimited. FaceTime You can tell them how you’re doing. Or you can show them. FaceTime on iPad lets you have it both ways. From anywhere in the world. Skype built especially for the iPad. Call, video call, or instant message anyone on Skype. ooVoo With ooVoo you can make FREE video calls, voice calls, and send text chats to easily connect with friends and family. Start a free group video chat with up to 12 people on 3G, 4G, LTE and Wifi. 16 17 Safari The web is even more captivating on the new iPad, thanks to the Retina display. Text is sharp and crisp. Colors are vibrant and true to life. And browsing is fast and responsive.
    [Show full text]