A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
Revisiting IoT Device Identification
[article]
2021
arXiv
pre-print
Internet-of-Things (IoT) devices are known to be the source of many security problems, and as such, they would greatly benefit from automated management. ...
We compare the accuracy of four different previously proposed machine learning models (tree-based and neural network-based) for identifying IoT devices. ...
CONCLUSION In this paper we revisited four different approaches to IoT device identification based on the network traffic. ...
arXiv:2107.07818v1
fatcat:jyzd7gwl4fdl7jdkiiufvidn5y
IoT Roadmap: Support for Internet of Things Software Systems Engineering
[article]
2021
arXiv
pre-print
IoT application. ...
The Roadmap resulted from an investigation on the particularities of IoT applications. It is the concrete organization of the concepts and evidence gathered from different experimental studies. ...
IoT ROADMAP -SECTION 4. Implement components identity. From our IoT definition, the object should be uniquely identified, addressable. It should provide all the device identity information. ...
arXiv:2103.04969v3
fatcat:6yhpl6swkvamvi5leca77dngma
Emerging Security Threats and Countermeasures in IoT
2015
Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security - ASIA CCS '15
To cope with these new challenges, the conventional security architecture will be revisited. ...
IoT (Internet of Things) diversifies the future Internet, and has drawn much attention. As more and more gadgets (i.e. ...
For this reason, privacy preservation in IoT security needs to be revisited. ...
doi:10.1145/2714576.2737091
dblp:conf/ccs/ZhangCS15
fatcat:3dyhfotkmzbobdeqrsi6p5jb7u
Liberalising Deployment of Internet of Things Devices and Services in Large Scale Environments
2016
Wireless personal communications
This paper explains possibilities for revolutionary changes needed towards liberalising deployment and visibility of IoT services and data associated with them. ...
There is an ongoing enormous expansion of Internet of Things devices and services in everyday life, notably in novel large scale urban environments called Smart Cities. ...
existing identification meta-data, embracing new models of IoT devices and their identities (e.g. via QR codes, NFC tags etc.), use of compression algorithms for IoT identification meta-data etc. ...
doi:10.1007/s11277-016-3837-0
fatcat:5ngugb4bffgcdijnkrttfl2eo4
Table of contents
2020
IEEE Internet of Things Journal
Liu 2235 Cross-Interface Scheduling Toward Energy-Efficient Device-to-Gateway Communications in IoT . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ...
Zhang 2152 Revisit of Certificateless Signature Scheme Used to Remote Authentication Schemes for Wireless Body Area Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ...
doi:10.1109/jiot.2020.2977444
fatcat:zrsdjrwoi5b2bourvbpjoiibfe
Normative Challenges of Identification in the Internet of Things: Privacy, Profiling, Discrimination, and the GDPR
2017
Social Science Research Network
In the Internet of Things (IoT), identification and access control technologies provide essential infrastructure to link data between a user's devices with unique identities, and provide seamless and linked ...
A balance must be struck between identification and access control required for the IoT to function and user rights to privacy and identity. ...
Funding This article is a deliverable of the Privacy-Enhancing and Identification-Enabling Solutions for IoT (PEIESI) project, part of the PETRAS Internet of Things research hub. ...
doi:10.2139/ssrn.3083554
fatcat:4iunn3i52nhhpdebakrhxd73qy
Internet of Things and Blockchain Technology in Apparel Manufacturing Supply Chain Data Management
2020
Procedia Computer Science
cloth manufacturing value chain by using Radio Frequency Identification (RFID) tags and sensors-based data communication networks. ...
cloth manufacturing value chain by using Radio Frequency Identification (RFID) tags and sensors-based data communication networks. ...
Finally, the paper presents research proposition outlining how blockchain technology can impact important aspects of the IoT system and thus provide the foundation for future research challenges. ...
doi:10.1016/j.procs.2020.03.088
fatcat:jqzydlovyffyfeg5lnurn55uq4
A Road Map : Analysis of Internet of Things (IoT) to Smart Telecommunication Industries
2019
International Journal of Scientific Research in Science and Technology
A consistent service across different devices would be the key to success in the connected world. ...
Moreover, the service providers would also monetize their data and boost profitability by providing data services that would provide full support for the upcoming new devices. ...
Not just that, the network providers are also revisiting their infrastructure, partnerships and business models to stay a step ahead of the competitors in the next generation of smart devices. ...
doi:10.32628/ijsrst18401111
fatcat:2ptaboqhujhfnivvfrcippcoxa
Policy and the Internet of Things
2016
Connections The Quarterly Journal
A confluence of technologies has come together to make this possible under the rubric known as the Internet of Things (IoT). ...
Using the past as a predictor of future behavior, a vast increase in hackable devices will create equally vast vulnerabilities that will now touch the physical world. ...
A relatively well-known example from retail industry is the use of radio frequency identification devices (RFID) to track the location of goods and inventory. ...
doi:10.11610/connections.15.2.01
fatcat:mvjwl5xvsjgrph5qgsltcm6ndi
Revisiting context-based authentication in IoT
2018
Proceedings of the 55th Annual Design Automation Conference on - DAC '18
The emergence of IoT poses new challenges towards solutions for authenticating numerous very heterogeneous IoT devices to their respective trust domains. ...
Recent works propose to use contextual information about ambient physical properties of devices' surroundings as a shared secret to mutually authenticate devices that are co-located, e.g., the same room ...
In this paper, we revisit the schemes that have been proposed for context-based device pairing. We analyze their applicability to IoT scenarios and the security assurance that they provide. ...
doi:10.1145/3195970.3196106
dblp:conf/dac/MiettinenNSA18
fatcat:6qjhvgtmfvgxfmkv47arr27fxa
IoT Privacy and Security: Challenges and Solutions
2020
Applied Sciences
Improper device updates, lack of efficient and robust security protocols, user unawareness, and famous active device monitoring are among the challenges that IoT is facing. ...
In this work, we proposed a new IoT layered model: generic and stretched with the privacy and security components and layers identification. ...
Such security measures need to be revisited to accomplish both security and power constraints. ...
doi:10.3390/app10124102
fatcat:cf7lg3b6vrfzllc5fg3e57g5he
Network Privacy Reflection using Internet of Things
2021
Zenodo
This has led to the emergence of "the Internet of Things" (IoT) methodology whose goal is to transform the current IP and related networks to Device-to-Device (D-2-D) basis. ...
In this paper, we overview both IoT enabled network architecture as well as security for associated objects and devices. ...
Identification (ID) layer's main function is to carry out resources identification. ...
doi:10.5281/zenodo.4477853
fatcat:d3xvg7utuvgqzcrsssaksnlvtm
Development of Access Control Mechanism Based on Fingerprint Biometrics and Mobile Phone Identityfor Industrial Internet of ThingsCritical Infrastructure Protection
2020
International Journal of Advances in Scientific Research and Engineering
The main objective of this study is to develop a prototype application for authentication and identification of legitimate Industrial IoT human entities/objects based on the mentioned two identities as ...
development of an access control mechanism based on fingerprint biometrics and mobile phone International Mobile Equipment Identity (IMEI) modalities for the industrial internet of thing (Industrial IoT ...
But before system development stage, fingerprint biometrics and mobile device identification and authentication were analyzed and modeled. ...
doi:10.31695/ijasre.2020.33940
fatcat:psb34rqsjjbhdhths5ysstcluy
Enabling High-Level Application Development in the Internet of Things
[chapter]
2013
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
However, application development in the IoT still remains challenging, since it involves dealing with several related issues, such as lack of proper identification of roles of various stakeholders, as ...
The sensor networking field is evolving into the Internet of Things (IoT), owing in large part to the increased availability of consumer sensing devices, including modern smart phones. ...
network manager in [4] , their clear identification for IoT application is largely missing. ...
doi:10.1007/978-3-319-04166-7_8
fatcat:6h56tifycjcald7awqfgkarcvm
A survey on Internet of Things architectures
2018
Journal of King Saud University: Computer and Information Sciences
Internet of Things is a platform where every day devices become smarter, every day processing becomes intelligent, and every day communication becomes informative. ...
Standard OSI network model is to be revisited for advanced layer based Io<*>. ...
Further, based on applicability and suitability preferences in several domains the IoT cloud platforms have been revisited. 10 different domains are selected based on which most of IoT cloud platforms ...
doi:10.1016/j.jksuci.2016.10.003
fatcat:cwf3kjaddncupb5eqv7fr25y2a
« Previous
Showing results 1 — 15 out of 1,462 results