Filters








41 Hits in 5.2 sec

Multi-Layer IoT Security Framework for Ambient Intelligence Environments

Ion Bica, Bogdan-Cosmin Chifor, Ștefan-Ciprian Arseni, Ioana Matei
2019 Sensors  
Our framework was designed to easily integrate with different health and social care applications, separating security tasks from functional ones and being designed with independent modules for each layer  ...  An IoT security framework is meant to offer the versatility and modularization needed to sustain such applications.  ...  Acknowledgments: The authors would like to thank the reviewers for all useful and helpful comments on our manuscript. Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/s19184038 fatcat:2wcbql5adzhmlgbewi4sdvix5e

Internet of robotic things: Design and develop the quality of service framework for the healthcare sector using CoAP

Arun Kumar, Sharad Sharma
2021 IAES International Journal of Robotics and Automation  
It will boost connectivity performance, less power consumption due to data aggregation, and enhanced security features with DTLS security features for various applications for the internet of things.  ...  The constrained application protocol (CoAP), for the management and control of a community of homogeneous sensor modules, has recently endorsed multicast communications in IoRT.  ...  IoRT is a concept where IoT data helps machines interact with each other and take required actions.  ... 
doi:10.11591/ijra.v10i4.pp289-295 fatcat:j7o3axz5hjajfh26cvzfsd4uj4

Prototyping a Web-of-Energy Architecture for Smart Integration of Sensor Networks in Smart Grids Domain

Víctor Caballero, David Vernet, Agustín Zaballos, Guiomar Corral
2018 Sensors  
The use of the concept of the Web of Things is proposed in this work to tackle this problem.  ...  Smart Grid designers can use the Actor Model as a design model for an infrastructure that supports the intelligent functions demanded and is capable of grouping and converting the heterogeneity of traditional  ...  Author Contributions: V.C. and D.V. conceived the idea and decided the technology involved in the experiments; V.C. developed the prototype; D.V. and A.Z. supervised the work, and A.Z. contributed with  ... 
doi:10.3390/s18020400 pmid:29385748 pmcid:PMC5855060 fatcat:osk4ae2hmrggdazyogbu4n7vhq

Understanding Security Requirements and Challenges in Internet of Things (IoT): A Review

Sufian Hameed, Faraz Idris Khan, Bilal Hameed
2019 Journal of Computer Networks and Communications  
On the contrary, IoT has various security and privacy concerns for the end users that limit its proliferation.  ...  In this paper, we have identified, categorized, and discussed various security challenges and state-of-the-art efforts to resolve these challenges.  ...  Lightweight Cryptographic Framework for IoT Motivation. IoT introduces new challenges in terms of energy and power consumption.  ... 
doi:10.1155/2019/9629381 fatcat:vivpgu4qz5c2to52msl3ydbpaq

Understanding Security Requirements and Challenges in Internet of Things (IoTs): A Review [article]

Faraz Idris Khan, Sufian Hameed
2018 arXiv   pre-print
On the other hand, IoT have various security and privacy concerns for the end users that limit its proliferation.  ...  In this paper we have identified, categorized and discussed various security challenges and state of the art efforts to resolve these challenges.  ...  The authors in [16] have presented security architecture for IP enabled IoT based on HIP (Host Identity Protocol) and DTLS ((Datagram Transport Layer Security) adapted to resource constrained devices  ... 
arXiv:1808.10529v1 fatcat:pmrn4vimyffo7don2yxlkh3moe

S3K: Scalable Security With Symmetric Keys—DTLS Key Establishment for the Internet of Things

Shahid Raza, Ludwig Seitz, Denis Sitenkov, Goran Selander
2016 IEEE Transactions on Automation Science and Engineering  
The default method of key establishment requires X.509 certificates and a Public Key Infrastructure, an approach which is often too resource consuming for small IoT devices.  ...  We implement S3K in the Contiki OS and evaluate it on real IoT hardware.  ...  Pereira et al. introduce a framework for authentication and access control for CoAP-based Internet of Things [25] .  ... 
doi:10.1109/tase.2015.2511301 fatcat:bsx6vdqu7jgpphtf6tlvbcrkze

Open IoT Ecosystem for Enhanced Interoperability in Smart Cities—Example of Métropole De Lyon

Jérémy Robert, Sylvain Kubler, Niklas Kolbe, Alessandro Cerioni, Emmanuel Gastaud, Kary Främling
2017 Sensors  
for which the proposed ecosystem significantly contributes to improving interoperability between a number of system components, and reducing regulatory barriers for joint service co-creation practices.  ...  the technological building blocks underlying an IoT ecosystem developed in the framework of the EU Horizon 2020 programme, (iii) present a smart city pilot (Heat Wave Mitigation in Métropole de Lyon)  ...  Acknowledgments: The research leading to this publication is supported by the EU's H2020 Programme for research, technological development and demonstration (grant 688203).  ... 
doi:10.3390/s17122849 pmid:29292719 pmcid:PMC5751623 fatcat:kn5vxvougrc2bbxpefjar55cky

D1.2 System Architecture Definition

Srdjan Skrbic
2021 Zenodo  
The COLLABS project aims at developing, demonstrating and supporting a comprehensive cyberintelligence framework for collaborative manufacturing, which enables the secure data exchange across the digital  ...  These goals will be achieved using state-of-the-art technologies and making significant scientific and technological advances in several key relevant domains, including secure multi-party computations  ...  These high-level objectives are detailed with KPIs that can be found in section 1.1.2 of the proposal and will be formalized for real success measurement in WP6.  ... 
doi:10.5281/zenodo.5347678 fatcat:4jr4tibrurasfnbl23huny3xkq

A Software Architecture for the Industrial Internet of Things—A Conceptual Model

Ioan Ungurean, Nicoleta Cristina Gaitan
2020 Sensors  
The economic impact of IoT becoming very important, and it began to be used in the industrial environment under the name of the Industrial Internet of Things (IIoT) concept, which is a sub-domain of IoT  ...  The Internet of Things (IoT) is an emerging concept that has revolutionized the use of new technologies in everyday life.  ...  Acknowledgments: The infrastructure used for this work was partially supported by the project "Integrated Center for research, development and innovation in Advanced Materials, Nanotechnologies, and Distributed  ... 
doi:10.3390/s20195603 pmid:33007860 fatcat:wwzcjqbif5a6ddzbqe5l62fxni

Addressless: Enhancing IoT Server Security Using IPv6

Renjie Liu, Zhe Weng, Shanshan Hao, Deliang Chang, Congxiao Bao, Xing Li
2020 IEEE Access  
Nowadays more and more IoT devices, including a large number of IoT servers, have been deployed on the Internet. The security of IoT servers has always been a challenge.  ...  The prototype is implemented and an extensive set of experiments are conducted in this paper. The results demonstrate that the model can better protect server security.  ...  [11] propose a network access security framework that can be used to control the nodes which have access to the network to enhance the security for 6LowPAN.  ... 
doi:10.1109/access.2020.2993700 fatcat:yh4aaxfgqbb6zifothcdywsvwi

Improving smart grid security through 5G enabled IoT and edge computing

Ravishankar Borgaonkar, Inger Anne Tøndel, Merkebu Zenebe Degefa, Martin Gilje Jaatun
2021 Concurrency and Computation  
Thus, an understanding of what 5G can bring in terms of cyber security in IoT-based smart grids is important for design decisions and future risk analysis efforts.  ...  This article investigates and analyzes the security aspects of 5G specifications from the perspective of IoT-based smart grids.  ...  Security standard compliance: Compared to other non-cellular wireless technologies, 5G networks use 3GPP/ETSI standard compliant security protocols (such as AKA, IPsec, TLS, DTLS, etc.) and architectures  ... 
doi:10.1002/cpe.6466 fatcat:qvcb52pjtraknhvuf63qefa36e

Security in product lifecycle of IoT devices: A survey

Narges Yousefnezhad, Avleen Malhi, Kary Främling
2020 Journal of Network and Computer Applications  
Further, we present prominent solutions for addressing product lifecycle security in IoT.  ...  Accordingly, certain reviews and surveys have been presented, focusing on disparate IoT-related domains, including IoT security, intrusion detection systems, and emerging technologies.  ...  Acknowledgment The research leading to this publication is supported by the European Union's Horizon 2020 research and innovation program (bIoTope; grant 688203 and FINEST TWINS; grant 856602) and Academy  ... 
doi:10.1016/j.jnca.2020.102779 fatcat:junhktapajc75px3n2x6j7tzou

Internet of Things Architectures, Technologies, Applications, Challenges, and Future Directions for Enhanced Living Environments and Healthcare Systems: A Review

Gonçalo Marques, Rui Pitarma, Nuno M. Garcia, Nuno Pombo
2019 Electronics  
Despite all the advantages, there are still several open issues that represent the main challenges for IoT, e.g., accessibility, portability, interoperability, information security, and privacy.  ...  Successive technological enhancements make the development of intelligent systems with a high capacity for communication and data collection possible, providing several opportunities for numerous IoT applications  ...  in various experiments by [109] .  ... 
doi:10.3390/electronics8101081 fatcat:hhvkh6elbfghbm3aadddodhipq

Connectivity Technologies for IoT [chapter]

Sunil Cheruvu, Anil Kumar, Ned Smith, David M. Wheeler
2019 Demystifying Internet of Things Security  
network and enterprise/information technology network -a concept that is at the heart of the Industrial Internet of Things (IIoT).  ...  When people think of IoT, they often think of home or personal IoT.  ...  small area. • No limiting regulatory regulations, so you can transmit up to 23 dBm and negotiate for as much airtime as you need. • Standard TLS/DTLS security for end-to-end security is supported on top  ... 
doi:10.1007/978-1-4842-2896-8_5 fatcat:h2qsa6ofuveqxcl2bfijrxjc3y

Smart Grid: Cyber Attacks, Critical Defense Approaches, and Digital Twin [article]

Tianming Zheng, Ming Liu, Deepak Puthal, Ping Yi, Yue Wu, Xiangjian He
2022 arXiv   pre-print
of DT, including its basic concepts, applications in the smart grid, and how DT enhances the security.  ...  The survey is expected to help developers break knowledge barriers among smart grid, cybersecurity, and DT, and provide guidelines for future security design of DT-based smart grid.  ...  ACKNOWLEDGMENT We appreciate the support of the National Key R&D Program of China under Grants No. 2020YFB1807500, No. 2020YFB1807504, and National Science Foundation of China Key Project under Grants  ... 
arXiv:2205.11783v1 fatcat:fz43u2e6g5gyfepqz44tezelba
« Previous Showing results 1 — 15 out of 41 results