67 Hits in 8.3 sec

The 8th IEEE Workshop on the Internet of Things - Smart Objects and Services (IoT-SoS)

2019 2019 IEEE 20th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM)  
on the concepts of virtualized components and functions within dense and heterogeneous environments. • Security, privacy and trust in IoT applications, for ensuring that the provided services will protect  ...  The Internet of Things (IoT) is shaping the evolution of the future Internet.  ...  on the concepts of virtualized components and functions within dense and heterogeneous environments. • Security, privacy and trust in IoT applications, for ensuring that the provided services will protect  ... 
doi:10.1109/wowmom.2019.8792995 fatcat:y2p4ohesn5dxnlgki2wkeyao2i

IoT promises, perils and perspectives: Closing statement

Kemal A. Delic
2016 ACM Ubiquity  
Ubiquity Symposium The Internet of Things IoT Promises, Perils and Perspectives: Closing statement by Kemal A.  ...  and Security in the Industrial IoT" • "On Resilience of IoT Systems" § Energy • "Internet of Things in Energy Efficiency" • "Standards for Tomorrow" • "A Case for Interoperable IoT Sensor Data and Meta-data  ...  He serves as an adjunct professor at PMF University in Grenoble, advisor to the European Commission FET 2007-2013 Programme, and expert evaluator for Horizon 2020.  ... 
doi:10.1145/2822889 fatcat:qdvjpbxdgrhxxddoqmoeaa7x3a

On Resilience of IoT Systems

Kemal A. Delic
2016 ACM Ubiquity  
About the Author  ...  Exploration of this domain is highly promising avenue for many aspiring Ph.D. and M.Sc. students. Ubiquity Symposium The Internet of Things On Resilience of IoT Systems by Kemal A.  ...  We are now experiencing the rise of Internet-of-Things (IoT), as the third wave of the global Internet spreads, which will culminate in 30-50 billion always-connected devices [1] .  ... 
doi:10.1145/2822885 fatcat:3qneg73l6ja5ndkv2lfyiqmw6i

[Front cover]

2020 2020 IEEE 6th World Forum on Internet of Things (WF-IoT)  
Talk Title: "Privacy Management in the Internet of Things" Abstract: Data Security and Privacy concerns are the two big concerns in the Internet of Things.  ...  The Internet of Things (IoT) can be likened to a "child node" of a "parent node," in that IoT is an extension of the Internet.  ... 
doi:10.1109/wf-iot48130.2020.9221244 fatcat:nfrea7jitzh4tpn5k4sg3bsnmq

SoK: Security Evaluation of Home-Based IoT Deployments

Omar Alrawi, Chaz Lever, Manos Antonakakis, Fabian Monrose
2019 2019 IEEE Symposium on Security and Privacy (SP)  
We systematize the literature for homebased IoT using this methodology in order to understand attack techniques, mitigations, and stakeholders.  ...  : The work is unique and among the first to explore a given security predicament.  ...  INTRODUCTION Security problems involving Internet of Things (IoT) continue to cause severe operational issues with high-profile attacks [1] , mass exploitation of devices [2] , and eye-catching headlines  ... 
doi:10.1109/sp.2019.00013 dblp:conf/sp/AlrawiLAM19 fatcat:rk4xe56rjfewpkw3vi2uebomde

On Challenges in Engineering IoT Software Systems

Rebeca Campos Motta, Káthia Marçal De Oliveira, Guilherme Horta Travassos
2019 Journal of Software Engineering Research and Development  
Contemporary software systems, such as the Internet of Things (IoT), Industry 4.0, and Smart Cities represent a technology changing that offer challenges for their construction since they are calling into  ...  facets emerged from IoT data analysis, that together represent the engineering challenges to be faced both by researchers and practitioners towards the advancement of IoT in practice.  ...  Issues like encryption, trust, privacy, and any security-related concerns are of utmost importance since IoT are inserted in someone's personal life or into the industry.  ... 
doi:10.5753/jserd.2019.15 fatcat:bszcr3h3xvganpqwm3icz6vpl4

IoT Relation and Impact on 5G [chapter]

John Davies
2018 Zenodo  
This report highlights several IoT vertical domain use cases collected by AIOTI (Alliance for IoT Innovation) and determines the specific requirements they impose on the underlying network infrastructure  ...  These use cases and requirements can be used by SDOs (Standards Developing Organizations), such as 3GPP (3rd Generation Partnership Project) as requirements for automation in vertical domains focusing  ...  Integrating LP-WAN Communications within the Vehicular Ecosystem. The 2017 International Symposium on Mobile Internet Security (Mobisec 2017).  ... 
doi:10.5281/zenodo.2600423 fatcat:db5adge235dndkcy55yr3jripq

Freedom to Hack

Ido Kilovaty
2017 Social Science Research Network  
The proliferation of Internet-connected smart devices (the "Internet of Things") has become a major threat to privacy, user security, Internet security, and even national security.  ...  These threats are manifestations of externalities primarily resulting from a market failure in the Internet of Things industry, in which vendors do not have an incentive to implement reasonable security  ...  Broad interpretation of these "anti-hacking" laws is resulting in a less secure Internet, and the stakes are constantly increasing given the ubiquity of sensors and physicality of the IoT ecosystem.  ... 
doi:10.2139/ssrn.3035518 fatcat:ehta5rnuzfdl5o376vt6y2gb6a

White Noise from the White Goods? Conceptual and Empirical Perspectives on Ambient Domestic Computing [article]

Lachlan Urquhart
2018 arXiv   pre-print
We critically assess visions of post-desktop computing, paying particular attention to one contemporary trend: the internet of things (IoT).  ...  We present findings that document the practical experiences and viewpoints of leading experts in technology law and design.  ...  However, this requires systematic consideration of IoT security risks in design, and this needs to be framed current state of the IoT industry.  ... 
arXiv:1801.07185v1 fatcat:2y6ahntairdtfjzvhlba6gf2e4

IEEE Access Special Section Editorial: Survivability Strategies for Emerging Wireless Networks

Muhammad Imran, Joel J. P. C. Rodrigues, Ahmed E. Kamal, Ejaz Ahmed, Feng Xia, Irfan Awan
2020 IEEE Access  
network routing strategies in green Internet of Things.''  ...  His areas of research interests include mobile cloud computing, mobile edge computing, the Internet of Things, cognitive radio networks, big data, and the Internet of Things.  ... 
doi:10.1109/access.2020.3042585 fatcat:wjd7kkdtszcj3lwnotjxgdae5m

Towards a Strategy for Supporting the Engineering of Contemporary Software Systems [article]

Rebeca C. Motta
2019 arXiv   pre-print
Contemporary software systems, such as the Internet of Things, Industry 4.0 and Intelligent Cities, present challenges for their engineering, since they question our traditional form of software development  ...  This thesis aims to investigate the particularities of these new types of applications to support the definition of a framework to support decision-making in the engineering of this kind of applications  ...  different things.  Security -Issues related to several aspects to ensure data security in the IoT system.  ... 
arXiv:1904.11741v1 fatcat:qv7wljp44rfabnrwkmxebg2s5y

The Impact of Context Awareness and Ubiquity on Mobile Government Service Adoption

Isaac Kofi Mensah, Deborah Simon Mwakapesa, Antonio Garcia-Cabot
2022 Mobile Information Systems  
The understanding of the context and ubiquity in the development and diffusion of mobile government can influence the delivery of efficient public services.  ...  Context is vital in interactive applications particularly when the context of users changes frequently and rapidly in the environment of handheld-mobile and ubiquitous technology systems.  ...  The ubiquity and rapid development vertising [35], and the Internet of things (IoT) [36, 37] have in mobile and wireless technology present an opportunity to demonstrated how context awareness and  ... 
doi:10.1155/2022/5918826 fatcat:xwji2say7vdezob7eaardesf74

The computer for the 21st century: present security & privacy challenges

Leonardo B. Oliveira, Fernando Magno Quintão Pereira, Rafael Misoczki, Diego F. Aranha, Fábio Borges, Michele Nogueira, Michelle Wangham, Min Wu, Jie Liu
2018 Journal of Internet Services and Applications  
Over the years, some of the UbiComp features presented in that paper have been gradually adopted by industry players in the technology market.  ...  Long-term Security: recent advances in cryptanalysis and quantum attacks. 3. Cryptography Engineering: lightweight cryptosystems and their secure implementation. 4.  ...  Leonardo served as General Chair and TPC Chair of the Brazilian Symposium on Security (SBSeg) in 2014 and 2016, respectively, and as a member in the Advisory Board of the Special Interest Group on Information  ... 
doi:10.1186/s13174-018-0095-2 fatcat:ictrcm6ahng4hccfqeqh7surti

Fog Computing: Survey of Trends, Architectures, Requirements, and Research Directions [article]

Ranesh Kumar Naha, Saurabh Garg, Dimitrios Georgakopoulos, Prem Prakash Jayaraman, Longxiang Gao, Yong Xiang, Rajiv Ranjan
2018 arXiv   pre-print
Emerging technologies like the Internet of Things (IoT) require latency-aware computation for real-time application processing.  ...  In IoT environments, connected things generate a huge amount of data, which are generally referred to as big data.  ...  His research areas of interest include, Internet of Things, cloud computing, mobile computing, sensor network middleware and semantic internet of things.  ... 
arXiv:1807.00976v1 fatcat:tbgtjxn7kratpcg46hvmkqzm34

Software Engineering for Intelligent and Autonomous Systems: Report from the GI Dagstuhl Seminar 18343 [article]

Simos Gerasimou, Thomas Vogel, Ada Diaconescu
2019 arXiv   pre-print
of security, safety, loss of comfort or revenue.  ...  the research communities of SEAMS, ICAC/ICCAC, SASO, Self-Aware Computing and AAMAS.  ...  ECo-IoT: an Architectural Approach for Realizing Emergent Configurations in the Internet of Things Romina Spalazzese (Malmö University, SE) The rapid proliferation of the Internet of Things (IoT) is  ... 
arXiv:1904.01518v2 fatcat:inddhdemafdyljubjjq7fv6xvu
« Previous Showing results 1 — 15 out of 67 results