Filters








3,013 Hits in 5.7 sec

Perils of Zero-Interaction Security in the Internet of Things

Mikhail Fomichev, Max Maass, Lars Almon, Alejandro Molina, Matthias Hollick
2019 Proceedings of the ACM on Interactive Mobile Wearable and Ubiquitous Technologies  
The Internet of Things (IoT) demands authentication systems which can provide both security and usability.  ...  Recent research utilizes the rich sensing capabilities of smart devices to build security schemes operating without human interaction, such as zero-interaction pairing (ZIP) and zero-interaction authentication  ...  Publication date: March 2019.Perils of Zero Interaction Security in the Internet of Things • 10:9  ... 
doi:10.1145/3314397 fatcat:qlejytfh5jgkvlmiroc6yo3uhq

The Challenge of Achieving Zero Trust Remote Access in Multi-Cloud Environment

Venkata Naga Satya Surendra Chimakurthi
2020 ABC Journal of Advanced Research  
in the Internet of Things (IoT).  ...  Zero-trust security models and architectures have recently increased in adoption due to several variables, such as the widespread use of off-premises cloud technologies, variety in IT devices, and diffusion  ...  As a result of multi-cloud and federated Cloud, adoption security remains a major barrier to cloud adoption, particularly for apps and data that reside in the Cloud. The world is perilous.  ... 
doi:10.18034/abcjar.v9i2.608 fatcat:pmehdazrrrfa7peqisal3iny7y

Optimizing the Sustainability of Renewable Energy: A Review on the Impart of Internet of Things

C. Mazi Chukwuemeka, M. Ihedioha Uchechi, C. Onyedeke Obinna, Ezema Modesta, Uzo Blessing Chimezie, A. Idoko Nnamdi
2020 Asian Journal of Research in Computer Science  
The world has become a global village and tending toward the transformational use of technology assets and materials to optimize the usage of renewable energy; in this case the Internet of things.  ...  The modern technology such as the internet of things is to help harness and improve in management by switching between renewable energy sources alongside the enhancement in making effective energy source  ...  And just in the interaction with these distribution networks, a new quantification of the physical energy demand of buildings is outlined, expressed by the term zero-energy building in relation to the  ... 
doi:10.9734/ajrcos/2020/v5i430147 fatcat:jdj25cndrrcutkmezjpgga4fxq

A Systemic Security and Privacy Review: Attacks and Prevention Mechanisms over IOT Layers

Muhammad Shoaib Akhtar, Tao Feng
2022 EAI Endorsed Transactions on Security and Safety  
In this contemporary era internet of things are used in every realm of life.  ...  The number of devices connected in conjunction with the ad-hoc nature of the system any exacerbates the case. Therefore, security and privacy has emerged as a big challenge for the IoT.  ...  Introduction Internet of things has a combination of various devices; the things which are connected through the internet are sensors and actuators.  ... 
doi:10.4108/eetss.v8i30.590 fatcat:o3wysf4ha5f4rawekaxl4hu3he

SOFT POWER CONTEXT OF CHINESE INVESTMENTS TO THE EUROPEAN UNION: CHALLENGES VS. OPPORTUNITIES

Daniela Cvetanovska
2020 Journal of Liberty and International Affairs  
The issues presented here have profound implications for future studies on soft power and the political economy of Chinese investments in the EU.  ...  The contextual analysis shows which constraining and stimulating (internal and external) factors condition COFDI in leveraging soft power for China.  ...  the context of US-China high technology rivalry (which includes 5G, Artificial Intelligence, semiconductors, the Internet of Things and quantum computing) where the EU was propelled to take the middle  ... 
doi:10.47305/jlia2020089c fatcat:svzufvykrjfyrgqb5ie4zmqthq

Smart Factories, Dumb Policy?: Managing Cybersecurity and Data Privacy Risks in the Industrial Internet of Things

Scott J. Shackelford
2018 Social Science Research Network  
Interest is booming in the so-called Internet of Things (IoT).  ...  The Industrial Internet of Things (IIoT) is one application of this trend and involves the use of smart technologies in a manufacturing context.  ...  Contracting in the Age of the Internet of Things: Article 2 of the UCC and Beyond, 44 HOFSTRA L.  ... 
doi:10.2139/ssrn.3252498 fatcat:umnhhkfxj5difltukdg6w455k4

"Digital Currencies " an unsecure and unclear economic window, need to regulate or to ban in India

Shamim Ahmad Farooqui
2022 RESEARCH REVIEW International Journal of Multidisciplinary  
A developing group of financial examination illuminates these exercises, frequently zeroing in on the "saves for all" part of CBDC's for retail use.  ...  In any case, CBDC's ought to be considered in the full setting of the computerized economy and the centrality of information, which raises worries around contest, installment framework honesty and security  ...  Here, we evaluate market peril, the shallow market issue, counterparty risk, trade peril, useful risk, security related risk, and legal and authoritative risks.  ... 
doi:10.31305/rrijm.2022.v07.i01.008 fatcat:rxmbiisgfrdaxecyfyybcbim5q

Perils of Internet fraud: an empirical investigation of deception and trust with experienced Internet consumers

S. Grazioli, S.L. Jarvenpaa
2000 IEEE transactions on systems, man and cybernetics. Part A. Systems and humans  
How well can experienced Internet shoppers detect new forms of seller deception on the Internet?  ...  Past research is augmented by showing that perceived risk and trust interact in their effects on consumer attitudes, by distinguishing between the notions of assurance and trust, and by identifying the  ...  First, they point at the need to better educate the public about the perils of the Internet.  ... 
doi:10.1109/3468.852434 fatcat:4trhgjk3n5bdzfm6ljxqlf4my4

Industry 4.0 and the digitalisation of society: Curse or cure?

Charalambos Tsekeris
2018 Homo Virtualis  
This assessment attempts to comprehensively overcome relevant analytical dualisms and the one-sided "either-or" logic, in favor of a synthetic, open and creative "both-and" framework of interdisciplinary  ...  The central aim of this article is to sketch and outline a brief and critical presentation, overview and assessment of the (radically ambivalent) dynamics of the large family of technological developments  ...  Especially now that the "post-Internet", or the "Next Internet", is emerging (from the dynamic convergence of Cloud Computing, Big Data Analytics, and the Internet of Things), new ambivalences, risks and  ... 
doi:10.12681/homvir.18622 fatcat:clpipzqz5zdufhyx2bxt6ttjqe

The New Media and Digital Divide: Knowledge Gap Exacerbated

Sunny .E. Udeze Oko
2013 Review of Public Administration and Management  
commerce, health, environment, education and even in securing jobs among other things.  ...  The Information Age driven by the internet has widened the gulf in knowledge obtained by different groups of people from the media.  ...  One of the most palpable differences between the old and the new media is in new media's interactive or participatory nature.  ... 
doi:10.4172/2315-7844.1000132 fatcat:l3uxkzbjcvbgzbzciwlwk3wnp4

Network Intrusion Detection Techniques and Network Attack Types

2019 International journal of recent technology and engineering  
With the huge improvement in innovation and with the big utilization of internet, massive increment in internet dangers has been seeing which activates contriving of latest strategies in device protection  ...  In NAD, the device is unendingly decided for event of anomalous activities or unexpected assaults. by way of utilising this NAD techniques, it is plausible to select out in the occasion that all and sundry  ...   Dynamic: With the huge improvement in innovation and with the big utilization of internet, massive increment in internet dangers has been seeing which activates contriving of latest strategies in device  ... 
doi:10.35940/ijrte.b1178.0882s819 fatcat:l4f6r4fograedfumwy7vdwzcjm

DDOS and Compilation of Mitigation Techniques

Ayush Goyal, Palak Baid
2018 International Journal of Computer Applications  
In network communication, attackers often breach the security. Therefore, keeping the data and servers secure is a very crucial task.  ...  There exists a tremendous pressure on security experts to mitigate the annihilating effects of this attack.  ...  When the DOS attacks lost their effectiveness due to security measures taken by companies, the hackers came up with yet another more destructive and perilous attack, known as DDOS or Distributed Denial-of-service  ... 
doi:10.5120/ijca2018916883 fatcat:tflkae2d4bdprhytqfy5pkfuzi

Internet of Things (IoT) Enabled Wireless Sensor Networks Security Challenges and Current Solutions

2019 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
Nowadays Internet of Things (IoT) is emerging and effective technology along with Wireless Sensor Networks (WSNs) in a few constant applications in which the human intervention significantly reduced along  ...  The challenges of IoT enabled WSNs single layered security solutions presented and then the various cross-layer solutions reviewed in this paper.  ...  Finally, a secured cross layer protocol which enhances the security of communication in Internet of things is required for both authentication as well as authorization. VI.  ... 
doi:10.35940/ijitee.a4023.119119 fatcat:jn4mfulxmfgnhh5k7ebtjvna2y

ANALYSIS OF SOFTWARE THREATS TO THE AUTOMATIC IDENTIFICATION SYSTEM

Ive Botunac, Marijan Gržan
2017 Brodogradnja  
Automatic Identification System (AIS) represents an important improvement in the fields of maritime security and vessel tracking.  ...  The threat itself is analysed in detail in order to provide insight into the very process from the creation of a program to its implementation.  ...  The last thing we have to do is introduce the data into one of the providers using the UDP Internet protocol.  ... 
doi:10.21278/brod68106 fatcat:vkbtnky5mzd6zaanijlcvql4em

Challenges of Information Security in the Contemporary Cyber Threat Perception

2019 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
In other words, it encompasses security of both data at rest and data in transmission.  ...  Information security spreads complex strategies to safeguard not only data during transmission, but also data stored in the system even when the system is not connected to the internet.  ...  Kingshuk Srivastava, Assistant Professor (SG), School of Computer Science (SCS), University of Petroleum and Energy Studies (UPES), Dehradun for his assistance in writing this paper.  ... 
doi:10.35940/ijitee.j1060.08810s19 fatcat:e3x623gbxzhfba7w5p3vfjiuse
« Previous Showing results 1 — 15 out of 3,013 results