10,626 Hits in 9.4 sec

Dynamic Network Security Mechanism Based on Trust Management in Wireless Sensor Networks

Guiping Zheng, Bei Gong, Yu Zhang
2021 Wireless Communications and Mobile Computing  
Wireless sensor network is a key technology in Internet of Things. However, due to the large number of sensor nodes and limited security capability, aging nodes and malicious nodes increase.  ...  In order to detect the untrusted nodes in the network quickly and effectively and ensure the reliable operation of the network, this paper proposes a dynamic network security mechanism.  ...  network security measures A dynamic trust evaluation method for Internet of Things nodes [13] Effectively reduce the influence of malicious recommendation behavior on trust evaluation Complex implementation  ... 
doi:10.1155/2021/6667100 doaj:42682f081e5e4fd6b425ca09d7a58bdc fatcat:yfoxa7frufaipjx5vhsjglcsz4

Security and Privacy in the Medical Internet of Things: A Review

Wencheng Sun, Zhiping Cai, Yangyang Li, Fang Liu, Shengqun Fang, Guoyan Wang
2018 Security and Communication Networks  
Medical Internet of Things, also well known as MIoT, is playing a more and more important role in improving the health, safety, and care of billions of people after its showing up.  ...  Instead of going to the hospital for help, patients' health-related parameters can be monitored remotely, continuously, and in real time, then processed, and transferred to medical data center, such as  ...  Acknowledgments The authors would like to acknowledge the financial support from the National Natural Science Foundation of China (no. 61379145) and the Joint Funds of CETC (Grant no. 20166141B08020101  ... 
doi:10.1155/2018/5978636 fatcat:odfuofjixnf25cdi7haxinhyny

2020 Index IEEE Internet of Things Journal Vol. 7

2020 IEEE Internet of Things Journal  
., Rateless-Code-Based Secure Cooperative Transmission Scheme for Industrial IoT; JIoT July 2020 6550-6565 Jamalipour, A., see Murali, S., JIoT Jan. 2020 379-388 James, L.A., see Wanasinghe, T.R.,  ...  ., +, JIoT Feb. 2020 1140-1153 Secure and Trust-Oriented Edge Storage for Internet of Things. Xia, J., +, Age and Energy Analysis for LDPC Coded Status Update With and Without ARQ.  ...  ., +, JIoT Feb. 2020 1140-1153 Secure and Trust-Oriented Edge Storage for Internet of Things.  ... 
doi:10.1109/jiot.2020.3046055 fatcat:wpyblbhkrbcyxpnajhiz5pj74a

2021 Index IEEE Internet of Things Journal Vol. 8

2021 IEEE Internet of Things Journal  
The Author Index contains the primary entry for each item, listed under the first author's name.  ...  -that appeared in this periodical during 2021, and items from previous years that were commented upon or corrected in 2021.  ...  ., +, JIoT Dec. 15, 2021 17436-17448 Adaptation models A Trusted Attestation Scheme for Data Source of Internet of Things in Smart City Based on Dynamic Trust Classification. Gong, B., +, JIoT Nov.  ... 
doi:10.1109/jiot.2022.3141840 fatcat:42a2qzt4jnbwxihxp6rzosha3y

IEEE Access Special Section Editorial: Security and Privacy in Emerging Decentralized Communication Environments

Xiaochun Cheng, Zheli Liu, Xiaojiang Du, Shui Yu, Leonardo Mostarda
2021 IEEE Access  
The invited article "Covert channels in the MQTT-based Internet of Things," by Velinov et al., presents the first comprehensive study of covert channels in the Internet of Things (IoT) environments by  ...  and privacy protection. 5G/6G mobile applications, the smart Internet of Things (IoT) devices, big data applications, and cloud systems are developing to better meet new requirements.  ...  The article ''Secure identity authentication of community medical Internet of Things,'' by Cheng et al., reports an efficient community medical IoT node secure two-way identity authentication method and  ... 
doi:10.1109/access.2021.3075818 fatcat:7t3tgqarsndc5dq2gulr7hapzi

2020 Index IEEE Transactions on Information Forensics and Security Vol. 15

2020 IEEE Transactions on Information Forensics and Security  
Dai, W., +, TIFS 2020 725-737 Trust Management in Industrial Internet of Things.  ...  Papadamou, K., +, TIFS 2020 2183-2193 Trust Management in Industrial Internet of Things.  ...  G Gait analysis Deep Learning-Based Gait Recognition Using Smartphones in the Wild.  ... 
doi:10.1109/tifs.2021.3053735 fatcat:eforexmnczeqzdj3sc2j4yoige

Trust-based recommendation systems in Internet of Things: a systematic literature review

Venus Mohammadi, Amir Masoud Rahmani, Aso Mohammed Darwesh, Amir Sahafi
2019 Human-Centric Computing and Information Sciences  
Taking into account the dynamic-heterogeneous characteristic of interconnected devices in IoT, demand for a trust model to guarantee security, authentication, authorization, and confidentiality of connected  ...  Introduction During the past decades, in the era of wireless communications and embedded system, the concept of the Internet of Things (IoT) was first presented by Kevin Ashton in the year 1999 [1].  ...  They aimed to study how internet of things can assist for inclusion of remote isolated vehicles into IoV society.  ... 
doi:10.1186/s13673-019-0183-8 fatcat:ckozm3ixungbvpc37agoxc5arm

2020 Index IEEE Transactions on Industrial Informatics Vol. 16

2020 IEEE Transactions on Industrial Informatics  
Forests-Based Model for Ultra-Short-Term Prediction of PV Characteristics; TII Jan. 2020 202-214 Imran, A., see Hussain, B., TII Aug. 2020 4986-4996 Imran, M., see Fu, S., TII Sept. 2020 6013-6022  ...  5G Tactile Internet Support in Industrial Environments; 1895-1903., see Xin, J., TII Oct. 2020 6413-6422 Meng, J., see Sun, Q., TII Aug. 2020 5137-5149 Meng, K., see Zhang, Y., TII July 2020 4390  ...  ., +, TII May 2020 2917- 2928 MTES: An Intelligent Trust Evaluation Scheme in Sensor-Cloud-Enabled Industrial Internet of Things.  ... 
doi:10.1109/tii.2021.3053362 fatcat:blfvdtsc3fdstnk6qoaazskd3i

A Survey on Zero Trust Architecture: Challenges and Future Trends

Yuanhang He, Daochao Huang, Lei Chen, Yi Ni, Xiangjie Ma, Yan Huo
2022 Wireless Communications and Mobile Computing  
Our goal is to provide support for the research and application of future zero trust architectures.  ...  Zero trust is a new type of network security model, which is based on the concept of never trust and always verify.  ...  Therefore, the scheme is dynamic and flexible for each device with different trust levels.  ... 
doi:10.1155/2022/6476274 fatcat:s6yy7muhbrgzvlfqebyzsxk5oy

Internet of things security: A top-down survey

Djamel Eddine Kouicem, Abdelmadjid Bouabdallah, Hicham Lakhlef
2018 Computer Networks  
Internet of Things (IoT) is one of the promising technologies that has attracted a lot of attention in both industrial and academic fields these years.  ...  Furthermore, some technologies related to networking and cryptocurrency fields such as Software Defined Networking (SDN) and Blockchain are revolutionizing the world of the Internet of Things thanks to  ...  In [70] , a signcryption scheme has specially designed for WSNs in the context of Internet of Things.  ... 
doi:10.1016/j.comnet.2018.03.012 fatcat:xbczp44t6neqxcfy74q6rsvuci

Frontmatter [chapter]

Nilanjan Dey, Gitanjali Shinde, Parikshit Mahalle, Henning Olesen
2019 The Internet of Everything  
An electronic version of this book is freely available, thanks to the support of libraries working with Knowledge Unlatched.  ...  The proposed system checks for urgent data and give priority to urgent data, and by this the sensitive data will reach destination in time. In many previous systems, normal data was discarded.  ...  Different types of data are generated in WSN and sensor nodes also depend on meant factors.  ... 
doi:10.1515/9783110628517-fm fatcat:3npfgq3o65f5pdbphf6pi4qn3a

Internet of Things: Applications and Challenges in Technology and Standardization [article]

Debasis Bandyopadhyay, Jaydip Sen
2011 arXiv   pre-print
The phrase Internet of Things (IoT) heralds a vision of the future Internet where connecting physical things, from banknotes to bicycles, through a network will let them take an active part in the Internet  ...  This paper studies the state-of-the-art of IoT and presents the key technological drivers,potential applications, challenges and future research areas in the domain of IoT.  ...  Moreover, an efficient key distribution scheme should be in place for using an encryption scheme.  ... 
arXiv:1105.1693v1 fatcat:ib6dztvxjrhbzashiqchz3uqym

Towards Crowdsourcing Internet of Things (Crowd-IoT): Architectures, Security and Applications

Kenneth Li Minn Ang, Jasmine Kah Phooi Seng, Ericmoore Ngharamike
2022 Future Internet  
Crowdsourcing can play an important role in the Internet of Things (IoT) applications for information sensing and gathering where the participants are equipped with geolocated devices.  ...  They can be merged to form a new and essential platform in crowdsourcing IoT paradigm for data collection from different sources and communication mediums.  ...  Sensing tasks are distributed across anonymous participating mobile devices, verified, anonymized, in this participatory sensing mode. Das et al.  ... 
doi:10.3390/fi14020049 fatcat:o62tjaayyvfnjc75irzkpzu5vy

Deep Q-Learning-Based Neural Network with Privacy Preservation Method for Secure Data Transmission in Internet of Things (IoT) Healthcare Application

Nirmala Devi Kathamuthu, Annadurai Chinnamuthu, Nelson Iruthayanathan, Manikandan Ramachandran, Amir H. Gandomi
2022 Electronics  
The healthcare industry is being transformed by the Internet of Things (IoT), as it provides wide connectivity among physicians, medical devices, clinical and nursing staff, and patients to simplify the  ...  Comparatively, the proposed model outperformed some standard approaches, such as thesecure and anonymous biometric based user authentication scheme (SAB-UAS), MSCryptoNet, and privacy-preserving disease  ...  Introduction The Internet of Things (IoT) utilizes IP-based communication for connecting the Internet with sensors and a multitude of devices.  ... 
doi:10.3390/electronics11010157 fatcat:xndfnce5hbcuxfwl63pdu4hk74

IoT Privacy and Security Challenges for Smart Home Environments

Huichen Lin, Neil Bergmann
2016 Information  
Often the Internet of Things (IoT) is considered as a single problem domain, with proposed solutions intended to be applied across a wide range of applications.  ...  After surveying existing solutions for enhancing IoT security, the paper identifies key future requirements for trusted Smart Home systems.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/info7030044 fatcat:rvtv5ocv7bgrnphf3f6quwpu54
« Previous Showing results 1 — 15 out of 10,626 results