612 Hits in 8.0 sec

Black-Box IoT: Authentication and Distributed Storage of IoT Data from Constrained Sensors [article]

Panagiotis Chatzigiannis, Foteini Baldimtsi, Constantinos Kolias, Angelos Stavrou
2021 arXiv   pre-print
We propose Black-Box IoT (BBox-IoT), a new ultra-lightweight black-box system for authenticating and storing IoT data.  ...  BBox-IoT is tailored for deployment on IoT devices (including low-Size Weight and Power sensors) which are extremely constrained in terms of computation, storage, and power.  ...  addressing the sensor and data authentication challenge for extremely constrained devices.  ... 
arXiv:2103.04028v1 fatcat:ylowc4xiqjeczivyjnhcdxwouq

IoT Reference Model [chapter]

Martin Bauer, Nicola Bui, Jourik De Loof, Carsten Magerkurth, Andreas Nettsträter, Julinda Stefa, Joachim W. Walewski
2013 Enabling Things to Talk  
The first major contribution of the IoT Architectural Reference Model (IoT ARM) is the IoT Reference Model itself.  ...  Besides models, the IoT Reference Model provides the concepts and definitions on which IoT architectures can be built. This 113 7 IoT Reference Model 115 116 M. Bauer et al. 118 M. Bauer et al.  ...  This can be accomplished storing data provided by on-board sensor hardware or data gathered from other Services and needed for supporting a given Resource.  ... 
doi:10.1007/978-3-642-40403-0_7 fatcat:zq65bgsgyvd4pglthg7zcxur74

Stateless IoT

Augusto Ciuffoletti
2020 Information  
Energy consumption is a relevant matter in the design of IoT applications. Edge units—sensors and actuators—save energy by operating intermittently.  ...  We introduce a basic model for system operation and energy footprint evaluation. To demonstrate its soundness, we study a simple use case, from the design to a prototype.  ...  Conflicts of Interest: The author declares no conflict of interest.  ... 
doi:10.3390/info11020085 fatcat:kzycvf25ufcsbfdbtvzk7ab3e4

IoT based reconfigurable smart city architecture

M Geetha Pratyusha, Yogesh Misra, M Anil Kumar
2018 International Journal of Engineering & Technology  
With the technical support of IoT, using low power Wireless Sensor Networks (WSN) which is connected to transfer the data from M2M applications.  ...  The aim of the article is to enhance a solution to the problems in the smart cities with latest IoT architecture, protocols and services.  ...  Acknowledgement The authors would like to gratefully acknowledge the Department of Electronics and Computer Engineering, Koneru Lakshmaiah Education Foundation, Vaddeswaram, Guntur, India for providing  ... 
doi:10.14419/ijet.v7i2.7.10287 fatcat:fybo73nberaalkzwexsxxzajuu

D1.1: COLLABS Innovations for Industrial IoT Systems1

Miloš Radovanović, Wafa Ben Jaballah, George Bravos, Erwan Le-Disez, Ernesto Gomez Marin, Erwin Moed, Md Masoom Rabbani, Valerio Senni, Fabio Federici, George Spanoudakis, Konstantinos Fysarakis, Martin Wimmer (+2 others)
2021 Zenodo  
Sections 2–8 respectively focus on the SotA in areas of: data protection (Section 2), distributed anomaly detection and remote attestation (Section 3), physical security (Section 4), function as a service  ...  ), encrypted network traffic analysis for various purposes, and (distributed) machine learning in different levels of cybersecurity for IIoT systems.  ...  requirements of resource-constrained IoT devices, thus formally protecting them from advanced code injection and modification attacks.  ... 
doi:10.5281/zenodo.5256842 fatcat:xf4y27mcjvbwvfjxy7lo4kwqw4


It examines Use Cases and benefits of current IoT and Blockchain integrated frameworks for SCM.  ...  data generated automatically through IoT and stored in immutable format in the Blockchain.  ...  (i.e. distributed storage).  ... 
doi:10.34218/jom.6.1.2019.008 fatcat:2yq4ghxmjfcspib676gbbb7jm4

Machine Learning in IoT Security: Current Solutions and Future Challenges [article]

Fatima Hussain, Rasheed Hussain, Syed Ali Hassan, Ekram Hossain
2019 arXiv   pre-print
This is, at least in part, because of the resource constraints, heterogeneity, massive real-time data generated by the IoT devices, and the extensively dynamic behavior of the networks.  ...  The future Internet of Things (IoT) will have a deep economical, commercial and social impact on our lives.  ...  Other challenges stems from the deployment of these models on resource-constrained IoT devices where it is essential to reduce the processing and storage overhead [23] .  ... 
arXiv:1904.05735v1 fatcat:k5v6zad7lfhdrjngjmxgroafz4

Machine Learning Systems for Intelligent Services in the IoT: A Survey [article]

Wiebke Toussaint, Aaron Yi Ding
2020 arXiv   pre-print
It covers the latest developments (up to 2020) on scaling and distributing ML across cloud, edge, and IoT devices.  ...  Machine learning (ML) technologies are emerging in the Internet of Things (IoT) to provision intelligent services.  ...  They are designed to facilitate the flow of data from tags and sensors that collect observations, over local communication networks and the Internet to the processing and storage facilities of the cloud  ... 
arXiv:2006.04950v3 fatcat:xrjcioqkrrhpvgmwmutiajgfbe

Security and Privacy Functionalities in IoT

Elahe Fazeldehkordi, Olaf Owe, Josef Noll
2019 2019 17th International Conference on Privacy, Security and Trust (PST)  
Such a language can be used to model IoT and distributed systems, and if the language is executable, it can be used for simulation and prototyping of IoT and distributed systems, and if the language is  ...  The active object paradigm provides a natural way of modeling distributed systems in general, and IoT systems in particular, because it covers the fundamental aspects of IoT systems such as distribution  ...  the EU H2020 research and innovation programme.  ... 
doi:10.1109/pst47121.2019.8949054 dblp:conf/pst/FazeldehkordiON19 fatcat:x37vqxe35vdtdlo2xebg7beaoa

An Empirical Study on System Level Aspects of Internet of Things (IoT)

Narasimha Swamy S, Kota Solomon Raju
2020 IEEE Access  
Acknowledgment The authors would like to thank the Indian National Academy of Engineering (INAE), Gurgaon, and R V College of Engineering (RVCE), Bengaluru, for their financial support.  ...  The authors would also like to thank the P C Panchariya, Director, CSIR-CEERI, Pilani, for his encouragement and constant support.  ...  Position Mobile Fixed and Mobile Data Storage Less Storage High Storage No Storage TABLE VIII FEATURES VIII OF IOT CLOUD PLATFORMS Characteristics Application Layer Protocols Sensor  ... 
doi:10.1109/access.2020.3029847 fatcat:5nprx4xtbjfnnkyibk6vbeg47m

Blockchain for 5G and IoT: Opportunities and Challenges

Tharaka Mawanane Hewa, Anshuman Kalla, Avishek Nag, Mika E Ylianttila, Madhusanka Liyanage
2020 2020 IEEE Eighth International Conference on Communications and Networking (ComNet)  
The paper aims to elaborate and emphasize the key aspects of the use of Blockchain for 5G and IoT.  ...  and fields of applicability.  ...  Through transparency of smart contracts, the trust is decentralized without being a "Black Box" in operations.  ... 
doi:10.1109/comnet47917.2020.9306082 fatcat:25d4lg26rnekxazg6vemplwfuy

A Survey on the Integration of Blockchain with IoT to Enhance Performance and Eliminate Challenges

Alia Al Sadawi, Mohamed S. Hassan, Malick Ndiaye
2021 IEEE Access  
Therefore, it is without any doubt that cloud computing contributed to the development of IoT systems [42] . However, it acts as a black box when coming to data transparency.  ...  IOT RESOURCES CONSTRAINTS Many IoT devices such as sensors, RFID tags, and smart meters are resource-constrained.  ...  ALIA AL SADAWI Holds a B.Sc. in Electrical and Electronics Engineering. She Received her M.Sc. in Engineering Systems Management from the American University of Sharjah, U.A.E, in 2016.  ... 
doi:10.1109/access.2021.3070555 fatcat:onginkuq2ffqno4bvs6y3xndsy

A Fast and Scalable Authentication Scheme in IoT for Smart Living [article]

Jianhua Li, Jiong Jin, Lingjuan Lyu, Dong Yuan, Yingying Yang, Longxiang Gao, Chao Shen
2020 arXiv   pre-print
Through which, we can minimize attack surfaces and authentication latency, and result in a fast and scalable scheme in authenticating a large volume of resource-limited devices.  ...  In this paper, we leverage fog computing and microservice to push certificate authority (CA) functions to the proximity of data sources.  ...  Finally, C notices the availability of CA. In this case, C treats CA proxy as S, as it is kept back from nodes out of the secure black box.  ... 
arXiv:2011.06325v1 fatcat:32mfnicbibf65gynvnlcthbvpu

Providing reliability and auditability to the IoT LwM2M protocol through Blockchain [article]

Cristian Martín, Iván Alba, Joaquín Trillo, Enrique Soler, Bartolomé Rubio, Manuel Díaz
2020 arXiv   pre-print
Blockchain has come to provide transparency, reliability as well as to increase the security in computer systems, especially in distributed ones like the Internet of Things (IoT).  ...  A few integrations have been proposed in this context so far; however, most of these solutions do not pay special attention to the interoperability of the IoT, one of the biggest challenges in this field  ...  ACKNOWLEDGMENT This work is funded by the Spanish projects RT2018-099777-B-100 ("rFOG: Improving latency and reliability of offloaded computation to the FOG for critical services") and UMA18FEDERJA-215  ... 
arXiv:2008.06694v1 fatcat:ci44v7nqp5cwjfjsndk3yjq3ie

Towards the Integration between IoT and Cloud Computing: An Approach for the Secure Self-Configuration of Embedded Devices

Antonio Puliafito, Antonio Celesti, Massimo Villari, Maria Fazio
2015 International Journal of Distributed Sensor Networks  
The secure boot-up and setup of Internet of Things (IoT) devices connected over the Cloud represent a challenging open issue.  ...  After a discussion on the limits of current IoT and Cloud solutions in terms of secure self-configuration, we present a Cloud-based architecture that allows IoT devices to interact with several federated  ...  Acknowledgment This research was supported by the European Unions Horizon 2020 Research and Innovation Programme project BEA-CON under Grant Agreement no. 644048.  ... 
doi:10.1155/2015/286860 fatcat:x6q7qjsffzhddikonacsht5azi
« Previous Showing results 1 — 15 out of 612 results