Filters








1,462 Hits in 1.6 sec

Revisiting IoT Device Identification [article]

Roman Kolcun, Diana Andreea Popescu, Vadim Safronov, Poonam Yadav, Anna Maria Mandalari, Richard Mortier, Hamed Haddadi
2021 arXiv   pre-print
Internet-of-Things (IoT) devices are known to be the source of many security problems, and as such, they would greatly benefit from automated management.  ...  We compare the accuracy of four different previously proposed machine learning models (tree-based and neural network-based) for identifying IoT devices.  ...  CONCLUSION In this paper we revisited four different approaches to IoT device identification based on the network traffic.  ... 
arXiv:2107.07818v1 fatcat:jyzd7gwl4fdl7jdkiiufvidn5y

IoT Roadmap: Support for Internet of Things Software Systems Engineering [article]

Rebeca Motta, Káthia Oliveira, Guilherme Travassos
2021 arXiv   pre-print
IoT application.  ...  The Roadmap resulted from an investigation on the particularities of IoT applications. It is the concrete organization of the concepts and evidence gathered from different experimental studies.  ...  IoT ROADMAP -SECTION 4. Implement components identity. From our IoT definition, the object should be uniquely identified, addressable. It should provide all the device identity information.  ... 
arXiv:2103.04969v3 fatcat:6yhpl6swkvamvi5leca77dngma

Emerging Security Threats and Countermeasures in IoT

Zhi-Kai Zhang, Michael Cheng Yi Cho, Shiuhpyng Shieh
2015 Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security - ASIA CCS '15  
To cope with these new challenges, the conventional security architecture will be revisited.  ...  IoT (Internet of Things) diversifies the future Internet, and has drawn much attention. As more and more gadgets (i.e.  ...  For this reason, privacy preservation in IoT security needs to be revisited.  ... 
doi:10.1145/2714576.2737091 dblp:conf/ccs/ZhangCS15 fatcat:3dyhfotkmzbobdeqrsi6p5jb7u

Liberalising Deployment of Internet of Things Devices and Services in Large Scale Environments

Andrej Mihailovic
2016 Wireless personal communications  
This paper explains possibilities for revolutionary changes needed towards liberalising deployment and visibility of IoT services and data associated with them.  ...  There is an ongoing enormous expansion of Internet of Things devices and services in everyday life, notably in novel large scale urban environments called Smart Cities.  ...  existing identification meta-data, embracing new models of IoT devices and their identities (e.g. via QR codes, NFC tags etc.), use of compression algorithms for IoT identification meta-data etc.  ... 
doi:10.1007/s11277-016-3837-0 fatcat:5ngugb4bffgcdijnkrttfl2eo4

Table of contents

2020 IEEE Internet of Things Journal  
Liu 2235 Cross-Interface Scheduling Toward Energy-Efficient Device-to-Gateway Communications in IoT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  ...  Zhang 2152 Revisit of Certificateless Signature Scheme Used to Remote Authentication Schemes for Wireless Body Area Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  ... 
doi:10.1109/jiot.2020.2977444 fatcat:zrsdjrwoi5b2bourvbpjoiibfe

Normative Challenges of Identification in the Internet of Things: Privacy, Profiling, Discrimination, and the GDPR

Sandra Wachter
2017 Social Science Research Network  
In the Internet of Things (IoT), identification and access control technologies provide essential infrastructure to link data between a user's devices with unique identities, and provide seamless and linked  ...  A balance must be struck between identification and access control required for the IoT to function and user rights to privacy and identity.  ...  Funding This article is a deliverable of the Privacy-Enhancing and Identification-Enabling Solutions for IoT (PEIESI) project, part of the PETRAS Internet of Things research hub.  ... 
doi:10.2139/ssrn.3083554 fatcat:4iunn3i52nhhpdebakrhxd73qy

Internet of Things and Blockchain Technology in Apparel Manufacturing Supply Chain Data Management

Kamalendu Pal, Ansar-Ul-Haque Yasar
2020 Procedia Computer Science  
cloth manufacturing value chain by using Radio Frequency Identification (RFID) tags and sensors-based data communication networks.  ...  cloth manufacturing value chain by using Radio Frequency Identification (RFID) tags and sensors-based data communication networks.  ...  Finally, the paper presents research proposition outlining how blockchain technology can impact important aspects of the IoT system and thus provide the foundation for future research challenges.  ... 
doi:10.1016/j.procs.2020.03.088 fatcat:jqzydlovyffyfeg5lnurn55uq4

A Road Map : Analysis of Internet of Things (IoT) to Smart Telecommunication Industries

Ribhu Shadwal, Trilok Singh Randhawa
2019 International Journal of Scientific Research in Science and Technology  
A consistent service across different devices would be the key to success in the connected world.  ...  Moreover, the service providers would also monetize their data and boost profitability by providing data services that would provide full support for the upcoming new devices.  ...  Not just that, the network providers are also revisiting their infrastructure, partnerships and business models to stay a step ahead of the competitors in the next generation of smart devices.  ... 
doi:10.32628/ijsrst18401111 fatcat:2ptaboqhujhfnivvfrcippcoxa

Policy and the Internet of Things

Sean S. Costigan, Gustav Lindstrom
2016 Connections The Quarterly Journal  
A confluence of technologies has come together to make this possible under the rubric known as the Internet of Things (IoT).  ...  Using the past as a predictor of future behavior, a vast increase in hackable devices will create equally vast vulnerabilities that will now touch the physical world.  ...  A relatively well-known example from retail industry is the use of radio frequency identification devices (RFID) to track the location of goods and inventory.  ... 
doi:10.11610/connections.15.2.01 fatcat:mvjwl5xvsjgrph5qgsltcm6ndi

Revisiting context-based authentication in IoT

Markus Miettinen, Thien Duc Nguyen, Ahmad-Reza Sadeghi, N. Asokan
2018 Proceedings of the 55th Annual Design Automation Conference on - DAC '18  
The emergence of IoT poses new challenges towards solutions for authenticating numerous very heterogeneous IoT devices to their respective trust domains.  ...  Recent works propose to use contextual information about ambient physical properties of devices' surroundings as a shared secret to mutually authenticate devices that are co-located, e.g., the same room  ...  In this paper, we revisit the schemes that have been proposed for context-based device pairing. We analyze their applicability to IoT scenarios and the security assurance that they provide.  ... 
doi:10.1145/3195970.3196106 dblp:conf/dac/MiettinenNSA18 fatcat:6qjhvgtmfvgxfmkv47arr27fxa

IoT Privacy and Security: Challenges and Solutions

Lo'ai Tawalbeh, Fadi Muheidat, Mais Tawalbeh, Muhannad Quwaider
2020 Applied Sciences  
Improper device updates, lack of efficient and robust security protocols, user unawareness, and famous active device monitoring are among the challenges that IoT is facing.  ...  In this work, we proposed a new IoT layered model: generic and stretched with the privacy and security components and layers identification.  ...  Such security measures need to be revisited to accomplish both security and power constraints.  ... 
doi:10.3390/app10124102 fatcat:cf7lg3b6vrfzllc5fg3e57g5he

Network Privacy Reflection using Internet of Things

K. Thamizhmaran
2021 Zenodo  
This has led to the emergence of "the Internet of Things" (IoT) methodology whose goal is to transform the current IP and related networks to Device-to-Device (D-2-D) basis.  ...  In this paper, we overview both IoT enabled network architecture as well as security for associated objects and devices.  ...  Identification (ID) layer's main function is to carry out resources identification.  ... 
doi:10.5281/zenodo.4477853 fatcat:d3xvg7utuvgqzcrsssaksnlvtm

Development of Access Control Mechanism Based on Fingerprint Biometrics and Mobile Phone Identityfor Industrial Internet of ThingsCritical Infrastructure Protection

Joseph Kalunga, Simon Tembo, Jackson Phiri
2020 International Journal of Advances in Scientific Research and Engineering  
The main objective of this study is to develop a prototype application for authentication and identification of legitimate Industrial IoT human entities/objects based on the mentioned two identities as  ...  development of an access control mechanism based on fingerprint biometrics and mobile phone International Mobile Equipment Identity (IMEI) modalities for the industrial internet of thing (Industrial IoT  ...  But before system development stage, fingerprint biometrics and mobile device identification and authentication were analyzed and modeled.  ... 
doi:10.31695/ijasre.2020.33940 fatcat:psb34rqsjjbhdhths5ysstcluy

Enabling High-Level Application Development in the Internet of Things [chapter]

Pankesh Patel, Animesh Pathak, Damien Cassou, Valérie Issarny
2013 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
However, application development in the IoT still remains challenging, since it involves dealing with several related issues, such as lack of proper identification of roles of various stakeholders, as  ...  The sensor networking field is evolving into the Internet of Things (IoT), owing in large part to the increased availability of consumer sensing devices, including modern smart phones.  ...  network manager in [4] , their clear identification for IoT application is largely missing.  ... 
doi:10.1007/978-3-319-04166-7_8 fatcat:6h56tifycjcald7awqfgkarcvm

A survey on Internet of Things architectures

P.P. Ray
2018 Journal of King Saud University: Computer and Information Sciences  
Internet of Things is a platform where every day devices become smarter, every day processing becomes intelligent, and every day communication becomes informative.  ...  Standard OSI network model is to be revisited for advanced layer based Io<*>.  ...  Further, based on applicability and suitability preferences in several domains the IoT cloud platforms have been revisited. 10 different domains are selected based on which most of IoT cloud platforms  ... 
doi:10.1016/j.jksuci.2016.10.003 fatcat:cwf3kjaddncupb5eqv7fr25y2a
« Previous Showing results 1 — 15 out of 1,462 results