14,381 Hits in 7.5 sec

Security and Performance in IoT: A Balancing Act

Luke Kane, Jiaming James Chen, Rebecca Thomas, Vicky Liu, Matthew McKague
2020 IEEE Access  
This balance of security versus performance forms the motivation of this research.  ...  Overall the STM32F103C8T6 device seemed to strike the better balance between performance and speed and would be a suitable choice for many IoT deployments.  ...  .: Security and Performance in IoT: A Balancing Act JIAMING JAMES CHEN received the bachelor's degree (Honours) in Information Technology from Queensland University of Technology (QUT), Australia.  ... 
doi:10.1109/access.2020.3007536 fatcat:gsb32ai4j5h3xajxwz733kvc3e

Secure-Stor: A Novel Hybrid Storage System Architecture to Enhance Security and Performance in Edge Computing

M. Nijim, Hisham Albataineh
2021 IEEE Access  
ACKNOWLEDGMENT This work is supported by the Department of Homeland Security, grant number 21STSLA00011-01-00  ...  Kotz and Ellis [17] suggested a parallel access approach that performs load balancing dynamically across every disk depending on each disk load volume.  ...  In edge computing, generous support is given for IoT devices to perform difficult tasks in the best way. It avoids large threats occurring in the factor of security platforms and applications.  ... 
doi:10.1109/access.2021.3092732 fatcat:kwvkevlgonbq7ght2h3hwf7ul4

A Survey on Challenges and Progresses in Blockchain Technologies: A Performance and Security Perspective

Xiaoying Zheng, Yongxin Zhu, Xueming Si
2019 Applied Sciences  
In this paper, we investigate the state-of-the-art progress of blockchain, mainly from a performance and security perspective.  ...  We next summarize the performance and security concerns raised in the investigation.  ...  Conflicts of Interest: The funders had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript, or in the decision to publish the results  ... 
doi:10.3390/app9224731 fatcat:ccijixyhpje3xjjxgwowsamew4


Mircea Constantin ŞCHEAU
2018 Annals: Series on Military Sciences  
In this context, the European Union Agency for Network and Information Security (ENISA) defines the Internet of Things (IoT) as "a cyber-physical ecosystem of sensors and interconnected action elements  ...  However, IP protocols are no longer a sine qua non requirement of the IoT ecosystem, and therefore the word "Internet" in the meaning of IoT should be viewed as a generalization involving the notion of  ...  The establishment of a normal (or not) behavior is one of the biggest challenges in managing endpoints in a distributed IoT network, and this is not only important from a security perspective but also  ... 
doaj:dafbe0227092452289c46cd5a8addbc7 fatcat:iu7r5ur3abdijgdjurqginm7r4

A novel IoT platform for the era of connected cars

Attila Csaba Marosi, Robert Lovas, Adam Kisari, Erno Simonyi
2018 2018 IEEE International Conference on Future IoT Technologies (Future IoT)  
In our paper we detail the evolution of a cloud-based, scalable IoT back-end framework and services built on top for handling and processing vehicular data in various use case scenarios: CAN data collection  ...  The cloud may act as a kind of central hub or as an Internet of Things (IoT) back-end where the sensor and the other available data can be gathered while also offering an elastic platform where the vast  ...  HAProxy is a lightweight high-performance TCP/HTTP load balancer.  ... 
doi:10.1109/fiot.2018.8325597 fatcat:hjsakekcenfftbg7ybsgng4uaq

IoT Reference Architecture [chapter]

Martin Bauer, Mathieu Boussard, Nicola Bui, Jourik De Loof, Carsten Magerkurth, Stefan Meissner, Andreas Nettsträter, Julinda Stefa, Matthias Thoma, Joachim W. Walewski
2013 Enabling Things to Talk  
Consider the impact of security/performance trade-offs on privacy Enable the user to control the privacy (and thus security and trust) settings Balance privacy vs. non-repudiation (accountability) Table  ...  Security Security is an essential quality of an IoT system and it is tightly related to specific security features which are often a basic prerequisite for enabling Trust and Privacy qualities in a system  ...  Trust, Security and Privacy This chapter addresses fundamental properties of IoT systems for what concerns their relation to the user.  ... 
doi:10.1007/978-3-642-40403-0_8 fatcat:etqnj2svvbc4topznrahkrgeze

IoT and its Issues

Yanish Sahu, Lalit Kumar, Shabnam Sharma
2018 International Journal of Computer Applications  
It also discusses the hardware required by a basic IoT system, privacy concerns, security issues and data handling issues. It also includes problems faced due to the hardware.  ...  Nowadays with increased need for surveillance, monitoring and data collection IoT has become more important. This paper describes about internet of things and its issues.  ...   Processor and memory storage: Processor are most necessary for configuration of software, for right balance of performance and power, processor is very necessary.  ... 
doi:10.5120/ijca2018918287 fatcat:uehsaf54w5dbdcs4vrakfsmeva

Edge IoT Networking

Majed Mohaia Alhaisoni
2020 International Journal of Advanced Computer Science and Applications  
Therefore, this paper presents a new model of combining network science and computer network in order to enhance the edge IoT efficiency.  ...  Simulation results have shown a clear evidence in improving the efficiency, communicability, degree, and overall closeness.  ...  In addition to previous studies, authors in [20] have proposed a mobile edge IoT where Base station is connected to a fog node which act locally by handling the data without the need to connect remotely  ... 
doi:10.14569/ijacsa.2020.0110115 fatcat:5tqiixls2ffyxnhq6qz3momlsy


Younes ABBASSI, Habib Benlahmer
2022 International journal of electrical and computer engineering systems  
In this research, a new architecture for a system combining blockchain and SDN for IoT security is proposed  ...  The Internet of Things (IoT) aims to create a digital world where any information system can expose, discover, understand and consume data and services for analysis, diagnosis, decision support and task  ...  In this section, we provide the distributed secure SDN architecture,BCDSN-IoT architecture, its workflow, and a mechanism for updating high-performance availability flow rule tables play an important role  ... 
doi:10.32985/ijeces.13.2.8 fatcat:ft2j2lannfgtbd2vfzd6pvbhky

5G NB-IoT: Efficient Network Traffic Filtering for Multitenant IoT Cellular Networks

Pablo Salva-Garcia, Jose M. Alcaraz-Calero, Qi Wang, Jorge Bernal Bernabe, Antonio Skarmeta
2018 Security and Communication Networks  
This paper proposes and prototypes a new security framework to achieve the highly desirable self-organizing networking capabilities to secure virtualized, multitenant 5G-based IoT traffic through an autonomic  ...  , and other massive IoT use cases being defined in 5G standards.  ...  The paper is the result of a joint collaboration partially funded by two EU H2020 projects: SLICENET, Grant Agreement H2020-ICT-2016-2/761913 and EU ANASTACIA, Grant Agreement no. 731558.  ... 
doi:10.1155/2018/9291506 fatcat:een4z3mofvhhbk2drs6zrxgu2q

A Novel IoT Architecture based on 5G-IoT and Next Generation Technologies [article]

Hamed Rahimi, Ali Zibaeenejad, Ali Akbar Safavi
2018 arXiv   pre-print
The Internet of Things (IoT) is a crucial component of Industry 4.0.  ...  In this paper, the next generation IoT architecture based on new technologies is proposed in which the requirements of future applications, services, and generated data are addressed.  ...  The IoT system and the information arrives from the previous layers are not useful unless it produces an act. People are empowered by applications performing business logic.  ... 
arXiv:1807.03065v1 fatcat:istiszfs35aztdfkfnnvpfklke

ARCA-IoT: An Attack-Resilient Cloud-Assisted IoT System

Sabeen Javaid, Hammad Afzal, Muhammad Babar, Fahim Arif, Zhiyuan Tan, Mian Ahmad Jan
2019 IEEE Access  
For scalability and interoperability, a cloud-assisted environment is introduced in ARCA-IoT.  ...  Based on our simulation results, ARCA-IoT demonstrates the effectiveness in term of performance metrics such as accuracy, sensitivity, specificity, and precision.  ...  These attributes are described in Table 6 which are stored locally in a service con-VOLUME 4, 2016 sumer's local database and act as a history.  ... 
doi:10.1109/access.2019.2897095 fatcat:75pl6okpwzgzzpu7cq6vouzhwa

IoT Reference Model [chapter]

Martin Bauer, Nicola Bui, Jourik De Loof, Carsten Magerkurth, Andreas Nettsträter, Julinda Stefa, Joachim W. Walewski
2013 Enabling Things to Talk  
Besides models, the IoT Reference Model provides the concepts and definitions on which IoT architectures can be built. This 113 7 IoT Reference Model 115 116 M. Bauer et al. 118 M. Bauer et al.  ...  The first major contribution of the IoT Architectural Reference Model (IoT ARM) is the IoT Reference Model itself.  ...  Therefore, a Communication Security Model must not only consider the heterogeneity of the system, but it also should guarantee a balance between security features, bandwidth, power supply and processing  ... 
doi:10.1007/978-3-642-40403-0_7 fatcat:zq65bgsgyvd4pglthg7zcxur74

The Dichotomy of Cloud and IoT: Cloud-Assisted IoT From a Security Perspective [article]

Behrouz Zolfaghari
2022 arXiv   pre-print
In recent years, the existence of a significant cross-impact between Cloud computing and the Internet of Things (IoT) has to lead to a dichotomy that gives raise to Cloud-Assisted IoT (CAIoT) and IoT-Based  ...  Although it is pertinent to study both technologies, this paper focuses on CAIoT, and especially its security issues, which are inherited from both Cloud computing and IoT.  ...  Cloud-assisted IoT is regarded as an emerging technological trend in the IoT domain, where the cloud acts as a great storage provider for storing a vast amount of data.  ... 
arXiv:2207.01590v1 fatcat:6eqmwy24hjcghb6j4hoq7y5kkm

Energy Conservation in IoT–A Survey

Ambika N
2019 Zenodo  
Internet of things (IoT) is one of the technologies in the boom. The technology aids in communicating with the devices without human intervention. Many methodologies are utilized to make it happen.  ...  The paper details the work proposed by authors and the other cautions to be taken to bring the technology to better heights.  ...  The trust deviation scheme aids in managing overhead and balancing the security in the network. The work is simulated using a risk strategy model.  ... 
doi:10.5281/zenodo.3374307 fatcat:ncuiikbjfrbtpddvjn5wbpeyly
« Previous Showing results 1 — 15 out of 14,381 results