139 Hits in 7.3 sec

Privacy Matters – Issues within Mechatronics

Steve Watt, Chris Milne, David Bradley, David Russell, Peter Hehenberger, Jorge Azorin-Lopez
2016 IFAC-PapersOnLine  
SECURITY v PRIVACY Though issues of security and privacy are closely linked, and indeed sometimes seem to be considered as the same, in the context of the paper, security is considered as being conventionally  ...  IoT devices that become everyday objects present a new distributed target Security risks: security versus efficiency It may be difficult to implement many security measures on IoT devices such as  ... 
doi:10.1016/j.ifacol.2016.10.641 fatcat:rbff3vnci5g2hjzjpktasrqasi

Efficient Blockchain-Empowered Data Sharing Incentive Scheme for Internet of Things

Ting Cai, School of Data and Computer Science, Sun Yat-Sen University, Guangzhou 510006, China; National Engineering Research Center of Digital Life (Sun Yat-Sen University), Guangzhou 510006, China, Hui Lin, Wuhui Chen, Zibin Zheng, Yang Yu
2021 International Journal of Software and Informatics  
However, the users are reluctant to participate in data sharing due to security concerns and lacking incentive mechanisms in the current IoT.  ...  Finally, the experimental results show that the proposed scheme is economically efficient, incentive-compatible, and real-time, with scalability, low cost, and good practicability.  ...  the IoT data sharing incentive framework, is economically feasible.  ... 
doi:10.21655/ijsi.1673-7288.00264 fatcat:t7hexxrscjdgbf3nxeypvg2zsi

Sensing Technologies for Crowd Management,Adaptation, and Information Dissemination inPublic Transportation Systems: A Review [article]

Donatella Darsena, Giacinto Gelli, Ivan Iudice, Francesco Verde
2022 arXiv   pre-print
This paper presents a taxonomy and review of sensing technologies based on Internet of Things (IoT) for real-time crowd analysis, which can be adopted in the different segments of the PT system (buses/  ...  users of the crowding status of the PT system, by means of electronic displays installed inside vehicles or at bus stops/stations, and/or by mobile transport applications.  ...  ACKNOWLEDGMENT The authors would like to thank the IEEE ComSoc/VTS Italian Chapter for supporting this work, by awarding the first prize to the SALUTARY (Safe and Reliable Public Transportation System)  ... 
arXiv:2009.12619v4 fatcat:fzst7hbunfgz7ajhrgkywdakjq

Blockchain-empowered Data-driven Networks: A Survey and Outlook [article]

Xi Li, Zehua Wang, Victor C.M. Leung, Hong Ji, Yiming Liu, Heli Zhang
2021 arXiv   pre-print
These paths are also hampered by significant challenges in terms of security, privacy, services provisioning, and network management.  ...  For future data-driven networks (DDNs), blockchain is considered as a promising solution to enable the secure storage, sharing, and analytics of data, privacy protection for users, robust, trustworthy  ...  . • Incentive layer: The incentive layer, which integrates economic rewards into a blockchain system, mainly appears in public blockchains.  ... 
arXiv:2101.12375v1 fatcat:7f6udfdxajczxc6bjqdyzb3hyi

Accountability and Insurance in IoT Supply Chain [article]

Yunfei Ge, Quanyan Zhu
2022 arXiv   pre-print
Supply chain security has become a growing concern in security risk analysis of the Internet of Things (IoT) systems.  ...  This chapter presents a system-scientific framework to study the accountability in IoT supply chains and provides a holistic risk analysis technologically and socio-economically.  ...  If the component in the home security system is taken controlled by the attacker, the enduser may face serious economic loss and privacy leakage.  ... 
arXiv:2201.11855v1 fatcat:tgag2mcp2vcj7gxestbkqzafs4

Sweden in the digital transformation: Opportunities and challenges [chapter]

2018 OECD Reviews of Digital Transformation: Going Digital in Sweden  
Security and privacy also become more urgent issues to address as the IoT and intelligent connected objects, such as self-driving cars, become deployed.  ...  to digital security and privacy.  ...  The resources of the PTS have also considerably increased, from SEK 29 million to SEK 4 million (EUR 2.8 million to EUR 4.1 million) to enhance digital security in communication infrastructure. 1.  ... 
doi:10.1787/9789264302259-3-en fatcat:ezetcowaffaupcur76ksakj66y

Collective Intelligence using 5G: Concepts, Applications, and Challenges in Sociotechnical Environments

Arun Narayanan, Mohamed Korium, Dick Carrillo Melgarejo, Hafiz Majid Hussain, Arthur Sousa De Sena, Pedro Goria, Daniel Gutierrez-Rojas, Mehar Ullah, Ali Esmaeelnezhad, Mehdi Rasti, Evangelos Pournaras, Pedro H. J. Nardelli
2022 IEEE Access  
) n.339541, and by Jane and Aatos Erkko Foundation via STREAM project.  ...  This paper is partly supported by Academy of Finland via (a) FIREMAN consortium n.326270 as part of CHIST-ERA grant CHIST-ERA-17-BDSI-003, and (b) EnergyNet Research Fellowship n.321265/n.328869 and (c  ...  ., privacy). Nevertheless, any transmission of information automatically implies the possibilities of privacy and security breaches.  ... 
doi:10.1109/access.2022.3184035 fatcat:e3dmazzmlnawzj2x4pudldca7y

A Survey on Federated Learning and its Applications for Accelerating Industrial Internet of Things [article]

Jiehan Zhou, Shouhua Zhang, Qinghua Lu, Wenbin Dai, Min Chen, Xin Liu, Susanna Pirttikangas, Yang Shi, Weishan Zhang, Enrique Herrera-Viedma
2021 arXiv   pre-print
for accommodating various scenarios; 2) discuss the state-of-the-art of FL on fundamental researches including data partitioning, privacy preservation, model optimization, local model transportation,  ...  personalization, motivation mechanism, platform & tools, and benchmark; 3) discuss the impacts of FL from the economic perspective.  ...  , incentive mechanism, personalization, etc.  Security.  ... 
arXiv:2104.10501v1 fatcat:7xgpcscaq5hnrkvqc4kcohfgya

Part 3: Practical Implementation of Data Protection Environment [chapter]

Rolf H. Weber, Dominic Staiger
2017 Transatlantic Data Protection in Practice  
These often larger providers have a certain degree of sophistication and thus are able implement measures to satisfy their ongoing compliance obligations.  ...  . pt. 46, 32 C.F.R. pt. 219, 34 C.F.R. pt. 97, 38 C.F.R. pt.16, 40 C.F.R. pt.26, 45 C.F.R. pt. 46, 45 C.F.R. pt. 690, 49 C.F.R. pt. 11 (2015). 221 See e.g.  ...  Facebook collects informationFederal Policy for the Protection of Human Subjects, 7 C.F.R. pt. 1c, 10 C.F.R. pt. 745, 14 C.F.R. pt. 1230, 15 C.F.R. pt. 27, 16 C.F.R. pt. 1028, 24 C.F.R. pt. 60, 28 C.F.R  ... 
doi:10.1007/978-3-662-55430-2_3 fatcat:4nbtcqivjrgt5cx2ifsunkj2ya

Success factors influencing citizens' adoption of IoT service orchestration for public value creation in smart government

Sohail Raza Chohan, Guangwei Hu
2020 IEEE Access  
This research is limited to privacy and user trust; however, IoT devices' security and trust need to be studied to increase public trust.  ...  data privacy in IoT [137] , [138] .  ... 
doi:10.1109/access.2020.3036054 fatcat:ks3lhr43w5gxtkeoikhf3znrb4

The Visual Design of Network Data to Enhance Cyber Security Awareness of the Everyday Internet User

Fiona Carroll, Phil Legg, Bastian Bonkel
2020 2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)  
Cyber-security research by ISPs: A NetFlow and DNS Anonymization Policy Martin Fejrskov, Jens Myrup Pedersen and Emmanouil Vasilomanolakis  ...  China Blaise Cossi Avoussoukpo 1 , Chunxiang Xu 2 , Marius Tchenagnon 2 and Eltayieb Nabeil 2 1 College of International Education, Southwest University of Finance and Economics, P.R.  ...  As cyber insurance is still new in practice and research, there are many unanswered questions regarding the data and economic models that drive it, the coverage options and pricing of premiums, and its  ... 
doi:10.1109/cybersa49311.2020.9139668 dblp:conf/cybersa/CarrollLB20 fatcat:mtrvk2uvknadrosalvit4xz67i

Patching security governance: an empirical view of emergent governance mechanisms for cybersecurity

Michel van Eeten
2017 Digital Policy Regulation and Governance  
Such shifts in governance are actually happening, security governance is being patched left and right, but these arrangements bear little resemblance to either the national security model of states or  ...  Purpose -The issue of cybersecurity has been cast as the focal point of a fight between two conflicting governance models: the nation-state model of national security and the global governance model of  ...  This is not without benefits in terms of innovation ("go fast and break things"), but the downside is that time-to-market and other economic incentives have often trumped security.  ... 
doi:10.1108/dprg-05-2017-0029 fatcat:d5chjhz6j5fw5hrjhtvgf37neu

Power systems automation, communication, and information technologies for smart grid: A technical aspects review

Vikram Kulkarni, Sarat Kumar Sahoo, Sudhakar Babu Thanikanti, Srikanth Velpula, Dharmesh Ishwerlal Rathod
2021 TELKOMNIKA (Telecommunication Computing Electronics and Control)  
In short energy and utilities IoT 'to do' list: 1) focus on security [82] , 2) implement cloud computing and big data and analytics pilot projects [83] , 3) re-invent the end-user experience (customer  ...  Communication technologies employed should be economic, should have better transmission ranges, with standard security features, and should provide the required bandwidth [71] .  ...  real-time data from CT/PT (current transformer and potential transformer).  ... 
doi:10.12928/telkomnika.v19i3.16428 fatcat:al6onz2twvbelpqginjbiyltra

On the Differential Private Data Market: Endogenous Evolution, Dynamic Pricing, and Incentive Compatibility [article]

Tao Zhang, Quanyan Zhu
2021 arXiv   pre-print
We characterize the dynamic incentive compatibility and provide a design principle to construct the payment rules in terms of the privacy allocation rule.  ...  This work uses a mechanism design approach to study the optimal market model to economize the value of privacy of personal data, using differential privacy.  ...  providing payment pt ≡ (pi,t )i∈I to compensate privacy loss.  ... 
arXiv:2101.04357v2 fatcat:womp4nuzwzfnhkqcl4o25gagxa

D1.1 - State of the Art Analysis

Danilo Ardagna
2021 Zenodo  
), providing resource efficiency, performance, data privacy, and security guarantees.  ...  In the last part of the deliverable, we report an overview of the performance modelling solutions, security, and privacy problems for AI applications in edge environments.  ...  The economic incentive calculation module determines how to reward contributions made by FML users, e.g., data owners.  ... 
doi:10.5281/zenodo.6372377 fatcat:f6ldfuwivbcltew4smiiwphfty
« Previous Showing results 1 — 15 out of 139 results