2,201 Hits in 4.3 sec

Openness and Security Thinking Characteristics for IoT Ecosystems

Bahtijar Vogel, Miranda Kajtazi, Joseph Bugeja, Rimpu Varshney
2020 Information  
point of view (awareness, assessment and challenges) that highlight the need to develop an IoT security mindset.  ...  We present the state-of-the-art and an empirical study with IoT practitioners.  ...  Security Thinking Awareness Our conceptualized model emphasizes the human in the loop concept that would help to easily understand the emerging needs as design principles for IoT ecosystems in a more  ... 
doi:10.3390/info11120564 fatcat:h5auqvejvzfsxfnobjnih5zztq

Cyber-physical-social-thinking space based science and technology framework for the Internet of Things

HuanSheng Ning, Hong Liu
2015 Science China Information Sciences  
In this paper, we aim to explore an updated science and technology framework for the IoT.  ...  , session management, security and privacy, loop control, space-time consistency, nanotechnology, and quantum technology.  ...  In the IoT, security and privacy should be studied considering the following aspects: • Physical security and privacy considers external contexts and inherent infrastructures, in which human-like immune  ... 
doi:10.1007/s11432-014-5209-2 fatcat:qkbir3lns5a6ppypsx6av7o7q4

Towards a model of privacy and security for smart homes

Andreas Jacobsson, Paul Davidsson
2015 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT)  
Based on the results of a risk analysis of a smart home automation system developed in collaboration with leading industrial actors, we outline the first steps towards a general model of privacy and security  ...  At the same time, enforcing privacy in IoT environments has been identified as one of the main barriers for realizing the vision of the smart home.  ...  The authors would also like to thank all the members of the research profile project "Intelligent Support for Privacy Management in Smart Homes".  ... 
doi:10.1109/wf-iot.2015.7389144 dblp:conf/wf-iot/JacobssonD15 fatcat:rm2yjvmepne6zcgbd7shzoupbm

PyFF: A Fog-Based Flexible Architecture for Enabling Privacy-by-Design IoT-Based Communal Smart Environments

Fatima Zohra Benhamida, Joan Navarro, Oihane Gómez-Carmona, Diego Casado-Mansilla, Diego López-de-Ipiña, Agustín Zaballos
2021 Sensors  
In this regard, this paper proposes an architecture to enable privacy-by-design with human-in-the-loop IoT environments.  ...  channels in accordance with human-in-the-loop principles.  ...  Informed Consent Statement: Informed consent was obtained from all subjects involved in the study. Conflicts of Interest: The authors declare no conflict of interest. Sensors 2021, 21, 3640  ... 
doi:10.3390/s21113640 pmid:34073751 fatcat:3amjivqhyraztlxiible635fnm

Autonomic Trust Management in Cloud-Based and Highly Dynamic IOT Applications

Suneth Namal, Hasindu Gamaarachchi, Gyu Myoung Lee, Tai-Won Um
2016 Journal of International Business Research and Marketing  
IoT is creating a world where physical objects are seamlessly integrated in order to provide advanced and intelligent services for humanbeings in their day-to-day life style.  ...  Therefore, trust on IoT devices plays an important role in IoT based services and applications. Cloud computing has been changing the way how provides are looking into these issues.  ...  In this framework, we adopt MAPE-K feedback control loop to evaluate the level of trust in an IoT cloud ecosystem. To evaluate the framework, we have developed a simulation framework.  ... 
doi:10.18775/jibrm.1849-8558.2015.15.3004 fatcat:zwmntbz5xrcmtp2fcjt3d6b7ky

Front Matter: Volume 9842

2016 Signal Processing, Sensor/Information Fusion, and Target Recognition XXV  
using a Base 36 numbering system employing both numerals and letters.  ...  SPIE uses a six-digit CID article numbering system structured as follows:  The first four digits correspond to the SPIE volume number.  The last two digits indicate publication order within the volume  ...  Human performance is the idea of how in a human-in-the-loop system you measure the effectiveness (accuracy, error) of the human involved.  ... 
doi:10.1117/12.2246519 fatcat:o7i6ebo6o5hftlqmo7rqhrjony

A Systemic Approach for IoT Security

Arbia Riahi, Yacine Challal, Enrico Natalizio, Zied Chtourou, Abdelmadjid Bouabdallah
2013 2013 IEEE International Conference on Distributed Computing in Sensor Systems  
In this paper, we propose a systemic approach to security in IoT and explore the role of each actor and its interactions with the other main actors of the proposed scheme.  ...  In this paper we want to explore a new approach for security mechanisms design and deployment in the context of Internet of Things (IoT).  ...  In their work, they consider three main axes: effective security for tiny embedded networks, context-aware and user-centric privacy, and the systemic and cognitive approach for IoT security.  ... 
doi:10.1109/dcoss.2013.78 dblp:conf/dcoss/RiahiCNCB13 fatcat:i3quoymyhzfirgr5y4mjtmck2u

A Survey on Social-Physical Sensing [article]

Md Tahmid Rashid, Na Wei, Dong Wang
2021 arXiv   pre-print
While a good amount of interesting SPS applications has been explored, several important unsolved challenges and open research questions prevail in the way of developing dependable SPS systems, which require  ...  This paper intends to bridge the knowledge gap in current literature by thoroughly examining the various aspects of SPS crucial for building potent SPS systems.  ...  Given this basis, developing a closed-loop system that seamlessly integrates the social and physical sensing paradigm is crucial.  ... 
arXiv:2104.01360v1 fatcat:b6sag5objzhezcfhscb3ctf2ca

New Frontiers in IoT: Networking, Systems, Reliability, and Security Challenges [article]

Saurabh Bagchi, Tarek F. Abdelzaher, Ramesh Govindan, Prashant Shenoy, Akanksha Atrey, Pradipta Ghosh, Ran Xu
2020 arXiv   pre-print
We again show how the open research challenges benefit from reliability, security, and privacy advancements in other areas. We conclude by providing a vision for a desirable end state for IoT systems.  ...  In this paper, we bring out the unique challenges this field poses to research in computer systems and networking.  ...  A key distinguishing feature of IoT systems is the human in the loop.  ... 
arXiv:2005.07338v1 fatcat:a6hb5dpk7fgwreua5x2n7vlw7y

Next Generation Internet of Things [chapter]

Ovidiu Vermesan, Joël Bacquet
2018 Next Generation Internet of Things  
The chapter presents an overview of the eight that are part of the European IoT Security and Privacy Projects initiative (IoT-ESP) addressing advanced concepts for end-to-end security in highly distributed  ...  The projects present architectures, concepts, methods and tools for open IoT platforms integrating evolving sensing, actuating, energy harvesting, networking and interface technologies.  ...  humans in a logistics domain.  ... 
doi:10.13052/rp-9788770220071 fatcat:bnyyfkhdzbghxetcwhisrqsapq

The intelligent industry of the future: A survey on emerging trends, research challenges and opportunities in Industry 4.0

Davy Preuveneers, Elisabeth Ilie-Zudor, Davy Preuveneers, Elisabeth Ilie-Zudor
2017 Journal of Ambient Intelligence and Smart Environments  
Strongly rooted in the Internet of Things and Cyber-Physical Systems-enabled manufacturing, disruptive paradigms like the Factory of the Future and Industry 4.0 envision knowledge-intensive industrial  ...  This survey provides insights into the latest developments in these domains, and identifies relevant research challenges and opportunities to shape the future of intelligent manufacturing environments.  ...  Acknowledgements This research is partially funded by the Research Fund KU Leuven and by the European Commission through the H2020 project EXCELL (http:// under grant No. 691829.  ... 
doi:10.3233/ais-170432 fatcat:okho72mkrrbfhjc5cyzdhpbrtu

Major requirements for building Smart Homes in Smart Cities based on Internet of Things technologies

Terence K.L. Hui, R. Simon Sherratt, Daniel Díaz Sánchez
2017 Future generations computer systems  
The recent boom in the Internet of Things (IoT) will turn Smart Cities and Smart Homes (SH) from hype to reality.  ...  From the result of a recent research survey on SH and IoT technologies, this paper defines the major requirements for building SH.  ...  Human-in-the-loop demand is higher than any other IoT applications since humans are the ultimate owners of all Things in the home space.  ... 
doi:10.1016/j.future.2016.10.026 fatcat:pyoiacst75hsxj7te3h2ucrq2q

Emerging IoT domains, current standings and open research challenges: a review

Omer Ali, Mohamad Khairi Ishak, Muhammad Kamran Liaquat Bhatti
2021 PeerJ Computer Science  
In this context, several emerging IoT domains necessitate a complete re-modeling, design, and standardisation from the ground up in order to achieve seamless IoT ecosystem integration.  ...  Finally, the paper summarises the integration of these ecosystems with current IoT domains and suggests future directions for overcoming the challenges.  ...  The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript.  ... 
doi:10.7717/peerj-cs.659 pmid:34541307 pmcid:PMC8409334 fatcat:k5u66cvvmbg4reswpcczhklbn4

Internet of Things in Industry: A Survey of Technology, Applications and Future Directions

Venkataraman Balaji
2019 International Journal for Research in Applied Science and Engineering Technology  
Internet of Things (IoT) is a congregation of interconnected physical objects that are linked with unique identifiers and transfer data in the appropriate network without human intervention.  ...  Future research areas are gathered from various literatures and discussed in this paper. The key contribution of this work is to summarize the current contemporary of IoT in industries systematically.  ...  The data privacy should be decided based on the application. 7) Human in the Loop: Humans in the loop will involve humans and operate synergistically.  ... 
doi:10.22214/ijraset.2019.1009 fatcat:mvjvqj2oqjhitp3b2xgtoxraru

Features and Potential Security Challenges for IoT Enabled Devices in Smart City Environment

Gasim Alandjani
2018 International Journal of Advanced Computer Science and Applications  
In this paper, we discuss various security issues that haunt the secure IoT deployments and propose a layered solution model that prevents breach of security during transmission of data.  ...  The risk of potential eavesdropping is always a major concern of data owners.  ...  .  Privacy: To solve the privacy problems of IoT the privacy policies of the each system must be specified and enforced accordingly.  Humans in the Loop: Many IoT applications involve humans in the process  ... 
doi:10.14569/ijacsa.2018.090830 fatcat:k3g4dl22ojag5hhulhtkzjcjta
« Previous Showing results 1 — 15 out of 2,201 results