Filters








1,426 Hits in 6.6 sec

SECURING INTERNET OF THINGS DATA

Larysa Globa, Julia Yamnenko, Vasyl Kurdecha, Danylo Trokhymenko
2019 Information and Telecommunication Sciences  
The purpose of the paper is creating concept of data securing in the Internet of things networks. Methods. Analysis of publications on data security of the Internet of Things.  ...  That's why mechanisms to provide and guarantee the security and privacy of data are crucial issues in IoT. However, protecting the Internet of Things is a complex and difficult task.  ...  That's why mechanisms to provide and guarantee the security and privacy of data are crucial issues in IoT. However, protecting the Internet of Things is a complex and difficult task.  ... 
doi:10.20535/2411-2976.22019.40-46 fatcat:h7rvf2gg5beanfznxxytu3xsni

Smart Insiders: Exploring the Threat from Insiders Using the Internet-of-Things

Jason R.C. Nurse, Arnau Erola, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese
2015 2015 International Workshop on Secure Internet of Things (SIoT)  
The Internet-of-Things (IoT) is set to be one of the most disruptive technology paradigms since the advent of the Internet itself.  ...  Our specific aim is to explore the extent to which IoT may exacerbate the insider-threat challenge for organisations and overview the range of new and adapted attack vectors.  ...  THE INTERNET-OF-THINGS AND SECURITY AND PRIVACY A.  ... 
doi:10.1109/siot.2015.10 dblp:conf/siot/NurseEAGC15 fatcat:5koktwaejjg5xboxepcu4sgvrm

The embedded framework for securing the Internet of Things

Feroz Khan A.B, Department of MCA, C. Abdul Hakeem College of Engineering and Technology, Melvisharam, India, Anandharaj G, PG and Research Department of Computer Science, Adhiparasakthi College of Arts and Science, Kalavai, India.
2021 Maǧallaẗ al-abḥāṯ al-handasiyyaẗ  
This paper discusses some of the challenges in building IoT applications, a detailed study of the existing security protocols, and its issues, and the potential of the IoT.  ...  The smart devices connected on the internet turn to be the internet of things, which connect other objects or devices through unique identifiers with the capability of transferring and receiving the information  ...  In this paper, we examine the security issues and challenges of the IoT smart home.  ... 
doi:10.36909/jer.v9i2.9823 fatcat:fok4bo5dojdstac62m5yic75ey

Cybersecurity Management for (Industrial) Internet of Things: Challenges and Opportunities

Maximilian L, Markl E, Mohamed A
2018 Journal of Information Technology & Software Engineering  
This review article discusses the state-of-the-art, trends and developments arounds challenges and opportunities in cybersecurity management. to the life of users [1].  ...  The internet of things (IoT) is about an integration between the physical and the cyber worlds in several aspects of peoples' lives, with benefits of convenience and entertainment in the "smart home" domain  ...  IoT suffers from several security issues which are often more challenging than those in other fields because of a complex environment and a huge number of devices, which are resources-constrained [1]  ... 
doi:10.4172/2165-7866.1000250 fatcat:qzdsbz3pbfh4vpccwzoan5rfve

Secure Information Sharing in an Industrial Internet of Things [article]

Nils Ulltveit-Moe, Henrik Nergaard, László Erdödi, Terje Gjøsæter, Erland Kolstad, Pål Berg
2016 arXiv   pre-print
This paper investigates how secure information sharing with external vendors can be achieved in an Industrial Internet of Things (IIoT).  ...  It also identifies necessary security requirements for secure information sharing based on identified security challenges stated by the industry.  ...  Also thanks to the regional industry clusters Digin and Future Robotics for initiating this research.  ... 
arXiv:1601.04301v1 fatcat:fcgpyzm3trf2lpn4av6cnb46ly

Machine Learning Based Network Vulnerability Analysis of Industrial Internet of Things

Maede Zolanvari, Marcio A. Teixeira, Lav Gupta, Khaled M. Khan, Raj Jain
2019 IEEE Internet of Things Journal  
Machine learning (ML) and big data analytics are the two powerful leverages for analyzing and securing the Internet of Things (IoT) technology.  ...  It is critical to secure the Industrial Internet of Things (IIoT) devices because of potentially devastating consequences in case of an attack.  ...  ACKNOWLEDGMENT The statements made herein are solely the responsibility of the authors.  ... 
doi:10.1109/jiot.2019.2912022 fatcat:3j355nmcgrc6vpebupwq5bal4q

Anatomy of Threats to The Internet of Things

Imran Makhdoom, Mehran Abolhasan, Justin Lipman, Ren Ping Liu, Wei Ni
2018 IEEE Communications Surveys and Tutorials  
Index Terms-Threats to the IoT, Internet of Things, malware attacks on the Internet of Things, attack methodology, security and privacy, IoT security framework, security guidelines.  ...  The world is resorting to the Internet of Things (IoT) for ease of control and monitoring of smart devices.  ...  resourceful and the coordinator between things can augment the security of cloud-based IoT systems.  ... 
doi:10.1109/comst.2018.2874978 fatcat:5qkflaozurb4nctkfrwswnbce4

The Internet of Things (IoT) in Information Agencies

Saiful Farik Mat Yatin, Hamima Madona Hussain, Khairul Naimi Khairul Fitri, Khairunnisa Aman, Nurulhazreen Shahidun Jamil
2018 International Journal of Academic Research in Business and Social Sciences  
In this paper, the author has summarized tangible IoT technologies which are helpful to IA to understand IoT business and highlighted the pros and challenges of Internet of Things (IoT).  ...  The overall purpose of the paper is to provide an overview of the Internet of Things (IoT) to the information agencies (IA) such as libraries, archives, museums etc.  ...  CHALLENGES OF INTERNET OF THINGS (IoT) Nowadays, IoT also bring challenges to IA as there are many ways to exploit devices and sources. These issues are still being discussed and debated.  ... 
doi:10.6007/ijarbss/v8-i9/4605 fatcat:4f4aw5nr4nctveldrgf55lhxvy

Internet of things issues related to psychiatry

Scott Monteith, Tasha Glenn, John Geddes, Emanuel Severus, Peter C. Whybrow, Michael Bauer
2021 International Journal of Bipolar Disorders  
Background Internet of Things (IoT) devices for remote monitoring, diagnosis, and treatment are widely viewed as an important future direction for medicine, including for bipolar disorder and other mental  ...  The scale, complexity and passive nature of data collection with IoT devices presents unique challenges related to security, privacy and personal safety.  ...  Methods to increase physician and patient knowledge of the IoT, legal and ethical issues including provider and manufacturer responsibility for errors, and contractual issues were not included.  ... 
doi:10.1186/s40345-020-00216-y pmid:33797634 pmcid:PMC8018992 fatcat:yny3kmmzfnbtxgsvlftsa3rhd4

Internet of Things: Evolution, Concerns and Security Challenges

Parushi Malhotra, Yashwant Singh, Pooja Anand, Deep Kumar Bangotra, Pradeep Kumar Singh, Wei-Chiang Hong
2021 Sensors  
The escalated growth of the Internet of Things (IoT) has started to reform and reshape our lives.  ...  Additionally, a case study of healthcare in IoT is presented. The study depicts the architecture, security, and privacy issues and application of learning paradigms in this sector.  ...  endorsed the concept of the Internet of Things.  ... 
doi:10.3390/s21051809 pmid:33807724 fatcat:5qznjvr665fjpmh7vy5jzp6chy

Industrial Internet of Things (IIoT) of Forensic and Vulnerabilities

2020 International journal of recent technology and engineering  
The Industrial Internet-of-Things (IIoT) have changed the present world and future technology-based Industry 4.0, however the understanding of Industrial Internet of things (IIoT) has turned out to be  ...  big challenge as far as security concern.  ...  Publications and research carried out mainly focusses on the field of water and environmental engineering, green technology and Industrial Internet of Things (IIoT)  ... 
doi:10.35940/ijrte.d8710.018520 fatcat:li33lvps6jag5l7cjtzzg3jxdu

Security Considerations for Internet of Things: A Survey

Anca Jurcut, Tiberiu Niculcea, Pasika Ranaweera, Nhien-An Le-Khac
2020 SN Computer Science  
However, the security of these connected Internet of things (IoT) plays a centric role with no margin for error.  ...  Furthermore, this paper presents solutions for remediation of the compromised security, as well as methods for risk mitigation, with prevention and improvement suggestions.  ...  The IoT security is the area of endeavour concerned with safeguarding connected devices and networks in the Internet of things environment.  ... 
doi:10.1007/s42979-020-00201-3 fatcat:4gkafccu7vgq7olrqdxdpgm2eu

Internet of Things Malware : A Survey

Evanson Mwangi Karanja, Shedden Masupe, Jeffrey Mandu
2017 International Journal of Computer Science & Engineering Survey  
Internet of Things environments poses unique challenges such as device latency, scalability, lack of antimalware tools and heterogeneity of device architectures that makes malware synthesis complex.  ...  In this paper we review literature on internet of things malware categories, support technologies, propagation and tools KEYWORDS Internet of Things (IoT), Malware, Malware synthesis, Machine to Machine  ...  ACKNOWLEDGEMENTS This work was supported by EU-Intra-ACP Mobility under Mobility to Enhance Training of Engineering Graduates in Africa (METEGA) grant.  ... 
doi:10.5121/ijcses.2017.8301 fatcat:dqsotxtph5cm5gmagwdxd6rmju

Federated Learning for Internet of Things: A Comprehensive Survey [article]

Dinh C. Nguyen, Ming Ding, Pubudu N. Pathirana, Aruna Seneviratne, Jun Li, H. Vincent Poor
2021 arXiv   pre-print
The Internet of Things (IoT) is penetrating many facets of our daily life with the proliferation of intelligent services and applications empowered by artificial intelligence (AI).  ...  , and IoT privacy and security.  ...  INTRODUCTION Recent years have witnessed the rapid development of the Internet of Things (IoT) which provides ubiquitous sensing and computing capabilities to connect a broad range of things to the Internet  ... 
arXiv:2104.07914v1 fatcat:b5wsrfcbynel7jqdxpfw4ftwh4

Towards a Safe and Secure Internet of Things Critical Infrastructure

Maha Alqallaf
2021 Zenodo  
Index Terms—Internet of Things, hardware-based security, embedded systems, SoC, FPGA, secure communications  ...  This work has proposed and studied the development of novel and efficient security techniques that can protect IoT devices and enable secure communications over the Internet.  ...  Secure Internet of Things Critical Infrastructure Fig 2: Layered IoT architecture Fig 2 illustrates the layered architecture of networked IoTs.  ... 
doi:10.5281/zenodo.4577525 fatcat:gjhzrn7tszgs5fxdjuwjkzngeq
« Previous Showing results 1 — 15 out of 1,426 results