12,819 Hits in 3.4 sec

Privacy, Discovery, and Authentication for the Internet of Things [article]

David J. Wu and Ankur Taly and Asim Shankar and Dan Boneh
2017 arXiv   pre-print
Automatic service discovery is essential to realizing the full potential of the Internet of Things (IoT).  ...  To address the need for better privacy in both the IoT and the mobile landscape, we develop two protocols for private service discovery and private mutual authentication.  ...  We thank Bruno Blanchet for his help in verifying the unlinkability property of our modified private mutual authentication protocol in Section 4.  ... 
arXiv:1604.06959v3 fatcat:45marxb3xzekflyu35yx2b3uay

ARMY: architecture for a secure and privacy-aware lifecycle of smart objects in the internet of my things

Jose L. Hernandez-Ramos, Jorge Bernal Bernabe, Antonio Skarmeta
2016 IEEE Communications Magazine  
The resulting architecture has been designed, instantiated, and implemented within the scope of different European IoT initiatives, in order to promote the design and development of secure and privacy-aware  ...  The authors propose a comprehensive architectural design to capture the main security and privacy requirements during the lifecycle of a smart object.  ...  -R) granted by the Ministry of Economy and Competitiveness of Spain (including ERDF support).  ... 
doi:10.1109/mcom.2016.7565269 fatcat:q57krciawbcefd5wj6z4ahxqdm

Lightweight Security Protocols for Internet of Things: A Review

Deepti Rani, Maharshi Dayanand University, Rohtak, Haryana (India)
2019 International Journal of Advanced Trends in Computer Science and Engineering  
But in recent years, ubiquitous deployment of some tools and technologies has raised several concerns related to the privacy and security in IoT enabled smart environment.  ...  The paper also presents a comparative study of various lightweight security protocols for IoT, proposed by many researchers in recent years.  ...  encryption scheme for the Internet of Things [14] that is much efficient and having low cost.  ... 
doi:10.30534/ijatcse/2019/58832019 fatcat:7wtxzomxcnfu7latkr3bl443e4

Guest Editorial: Security and Privacy

Maryam Mehrnezhad, Thyla van der Merwe, Chris Mitchell
2021 IEEE Communications Standards Magazine  
The process of enabling Internet access on IoT devices includes network discovery and selection, access authentication, and confi guration of necessary credentials and parameters.  ...  With the popularization of the Internet of Things (IoT) in the home environment, security incidents have become more recurrent with end users.  ... 
doi:10.1109/mcomstd.2021.9579395 fatcat:7a6jfczgvfdlrguw5xszqynkzy

Privacy-Preserving Internet of Things: Techniques and Applications

2019 International Journal of Engineering and Advanced Technology  
The expeditious development of IoT applications have raised the concern about the privacy of the IoT systems.  ...  Hence, it is necessary to preserve the privacy of data collected by IoT devices.  ...  INTRODUCTION Internet of Things (IoT) has risen as an predominant technology in the recent decade.  ... 
doi:10.35940/ijeat.f8830.088619 fatcat:onkuoapbkzhdtggza6ib7jj5ka

Study of Security Threats and Challenges in Internet of Things Systems

Rohit Chawla, Et. al.
2021 Turkish Journal of Computer and Mathematics Education  
The process of key generation and authentication provides the authorization and authentication of data over the internet of things.  ...  The interpretability and secured communication are major challenge in internet of things. The embedding of wireless device has low energy and bandwidth.  ...  Perspective of privacy- preserving techniques in internet of things • Many authentications and cryptographic schemes are based on hash functions.  ... 
doi:10.17762/turcomat.v12i2.1137 fatcat:4b76bsbfn5eqnl4kyjtidninri

Security & Privacy Threats, Attacks and Countermeasures in Internet of Things

Faheem Masoodi, Shadab Alam, Shams Tabrez Siddiqui
2019 International journal of network security and its applications  
The idea to connect everything to anything and at any point of time is what vaguely defines the concept of the Internet of Things (IoT).  ...  One of the most significant concerns of IoT is to provide security assurance for the data exchange because data is vulnerable to some attacks by the attackers at each layer of IoT.  ...  FUTURE WORK The IoT is developing at a very rapid pace, and successful growth of IoT is only possible ifwe address the security and privacy challenges related to the internet of things.  ... 
doi:10.5121/ijnsa.2019.11205 fatcat:fcttl5vvqjdahbb76cray3wove

Table of contents

2021 IEEE Internet of Things Journal  
Curry 10367 REVIEW PAPERS Fuzzing the Internet of Things: A Review on the Techniques and Challenges for Efficient Vulnerability Discovery in Embedded Systems . . . . . . . . . . . . . . . . . . . . . .  ...  Hu 10356 VID-WIN: Fast Video Event Matching With Query-Aware Windowing at the Edge for the Internet of Multimedia Things . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  ... 
doi:10.1109/jiot.2021.3077780 fatcat:oi46xvj6efgtvefe3jrmkc4dwq

The Internet of Things: a security point of view

Shancang Li, Theo Tryfonas, Honglei Li, Professor Pan Wang, Professor Sohail Chaudhry
2016 Internet Research  
Concerns over the authenticity of software and protection  ...  State-of-the-art The IoT is an extension of the Internet by integrating mobile networks, Internet, social networks, and intelligent things to provide better services or applications to users [68-79].  ...  Introduction The emerging Internet of Things (IoT) is believed the next generation of the Internet and will become an attractive target for hackers [60] , in which billions things are interconnected.  ... 
doi:10.1108/intr-07-2014-0173 fatcat:ctbdsnjz4vherfj4bw3sgyv6ji

Security challenges of the EPCglobal network

Benjamin Fabian, Oliver Günther
2009 Communications of the ACM  
The "Internet of Things," once reality, will have to rely on a global IT infrastructure that provides information about all those "things" in a secure and reliable manner.  ...  The EPCglobal Network is a proposal for a widely distributed information system to offer such services. But it may offer more transparency than was initially anticipated.  ...  Authentication and encryption of the EPCIS connection (3c) could be achieved by using common security protocols. However, EPCIS access involves additional risks for privacy, too.  ... 
doi:10.1145/1538788.1538816 fatcat:2t7qpxsdzzht5kcvl7jpalpmnu

General Survey on Security Issues on Internet of Things

Dolly Das, Bobby Sharma
2016 International Journal of Computer Applications  
The Internet of Things incorporates transparently and impeccably large number of assorted end systems, providing open access to selected data for digital services.  ...  Hence a flexible mechanism can deal with the security threats in the dynamic environment of Internet of Things and continuous researches and new ideas needs to be regulated periodically for various upcoming  ...  The current security services are inadequate for Internet of Things.  ... 
doi:10.5120/ijca2016909113 fatcat:5xdd6azjoramdgeojenh7c2r4q

Guest Editorial Special Issue on Trust, Security, and Privacy in Crowdsourcing

Zheng Yan, Kai Zeng, Yu Xiao, Thomas hou, Pierangela Samarati
2018 IEEE Internet of Things Journal  
Acknowledgment This work is sponsored by the NSFC (grants 61672410 and U1536202), the National Key Research and Development Program of China (grant 2016YFB0800704), the NSFC (grants 61672410 and U1536202  ...  ), the Project Supported by Natural Science Basic Research Plan in Shaanxi Province of  ...  In the paper titled "Chaotic Map-based Anonymous User Authentication Scheme with User Biometrics and Fuzzy Extractor for Crowdsourcing Internet of Things", Roy et al. proposed a secure remote user authentication  ... 
doi:10.1109/jiot.2018.2860302 fatcat:jsi4pc4lerbh3mqz66bmhmxhzy

Internet of Things: Applications and Challenges in Technology and Standardization [article]

Debasis Bandyopadhyay, Jaydip Sen
2011 arXiv   pre-print
The phrase Internet of Things (IoT) heralds a vision of the future Internet where connecting physical things, from banknotes to bicycles, through a network will let them take an active part in the Internet  ...  This paper studies the state-of-the-art of IoT and presents the key technological drivers,potential applications, challenges and future research areas in the domain of IoT.  ...  All discovery services must be based on authentication mechanisms to address privacy or security issues.  ... 
arXiv:1105.1693v1 fatcat:ib6dztvxjrhbzashiqchz3uqym

Securing Sensor to Cloud Ecosystem using Internet of Things (IoT) Security Framework

Abdul Fuad Abdul Rahman, Maslina Daud, Madihah Zulfa Mohamad
2016 Proceedings of the International Conference on Internet of things and Cloud Computing - ICC '16  
The Internet of things (IoT) refers to every object, which is connected over a network with the ability to transfer data. Users perceive this interaction and connection as useful in their daily life.  ...  However any improperly designed and configured technology will exposed to security threats. Therefore an ecosystem for IoT should be designed with security embedded in each layer of its ecosystem.  ...  We also would like to thank the CyberSecurity Malaysia, an Agency under Ministry of Science Technology and Innovation Malaysia (MOSTI) for their contribution.  ... 
doi:10.1145/2896387.2906198 dblp:conf/iotdcc/RahmanDM16 fatcat:rnwtjjtjpffvdna7rzciiatls4

A study on IoT-related security issues, challenges, and solutions

Md. Mohtab Alam, Mohd. Shahnawaz Ansari
2022 International Journal of Smart Sensor and Adhoc Network.  
The Internet of Things is now being developed to be the most cutting-edge and user-centric technology in the works.  ...  In this paper, the vulnerabilities of the underlying Internet of Things network are brought to light, and many security concerns on multiple tiers of the Internet of Things ecosystem have been examined  ...  and privacy of Internet of Things users [13] .  ... 
doi:10.47893/ijssan.2022.1220 fatcat:pkk42a4upbd6njz6knilyhnbre
« Previous Showing results 1 — 15 out of 12,819 results