305 Hits in 3.7 sec

Communications for AnyPLACE: A smart metering platform with management and control functionalities

Dominik Henneke, Christian Freudenmann, Markus Kammerstetter, David Rua, Lukasz Wisniewski, Jurgen Jasperneite
2016 2016 IEEE 21st International Conference on Emerging Technologies and Factory Automation (ETFA)  
The paper also incorporates the security and privacy requirements in different domains and sketches a solution and architecture to fulfill these by incorporating existing open source implementations as  ...  Smart metering and energy management are developments that transform the yet passive energy consumer to a participant that is actively involved in the energy market by using variable energy tariffs or  ...  ACKNOWLEDGMENT This project has received funding from the European Union's Horizon 2020 research and innovation programme under grant agreement No 646580.  ... 
doi:10.1109/etfa.2016.7733496 dblp:conf/etfa/HennekeFKRWJ16 fatcat:6tazdsyt6rbljelf5sv3xbxlre

A systemic and cognitive vision for IoT security: A case study of military live simulation and security challenges

Arbia Riahi Sfar, Zied Chtourou, Yacine Challal
2017 2017 International Conference on Smart, Monitored and Controlled Cities (SM2C)  
In addition, new solutions can be developed to help people managing their own privacy settings and mechanisms instead of expecting the IoT system to implement their requirements.  ...  One possible solution is the use of game theory to model privacy management by data owners. Identification in IoT context can be improved at different levels.  ... 
doi:10.1109/sm2c.2017.8071828 fatcat:5h2imodxbzcftfht2hkym25yfy

An Analytical Survey on Data Access Control Mechanism in Cloud using Blockchain

Rushabh Rajendra Desarda, Nishant Ganesh Chavan, Amit Gunaji Chaure, Prof. S. E. Ingale, Pankaj Ramanlal Gandhi
2019 Zenodo  
However, to overcome this data stored in encrypted form, this security measure is not enough to handle the issue of data privacy.  ...  As the bit towards this paper also proposed to handle data integrity effectively by the usage of block chain and bilinear pairing mechanism together to provide the best solution for data access control  ...  to the information from anyplace.  ... 
doi:10.5281/zenodo.3609753 fatcat:js4qqyk3cvftnosafaxc6vpgiq

Middleware Solutions for the Internet of Things: A Survey [chapter]

Mehdia Ajana El Khaddar
2021 Middleware Architecture [Working Title]  
In this chapter, an overview of IoT technologies, architecture, and main applications is given first and then followed by a comprehensive survey on the most recently used and proposed middleware solutions  ...  as part of the Internet of the future and ubiquitous computing allowing the communication among billions of smart devices and objects, and have recently drawn a very significant research attention.  ...  within the IoT should be considered when implementing a middleware solution.  ... 
doi:10.5772/intechopen.100348 fatcat:r3qdif5yxrdqrbha567vtmqh4q

Wireless Body Area Network Security and Privacy Issue in E-Healthcare

Muhammad Sheraz Arshad Malik, Muhammad Ahmed, Tahir Abdullah, Naila Kousar, Mehak Nigar, Muhammad Awais
2018 International Journal of Advanced Computer Science and Applications  
network layer in a WBAN and we finally talk about various cryptographic algorithms and laws for providing solution of security and privacy in WBAN. 215 | P a g e authentication,  ...  These devices represent various security and privacy protection of touchy and private patient medical data.  ...  The conveyed idea of information in WBANs makes implementing security and privacy troublesome. It is imperative to manage these issues notwithstanding when the node is compromised or falls flat.  ... 
doi:10.14569/ijacsa.2018.090433 fatcat:q7owkmcf2nfonatbfo5bz67fje

Design and Development of Security Mechanism for IoT Devices

Subhangi Bhadouria
2018 International Journal for Research in Applied Science and Engineering Technology  
security solutions, such as the Datagram Transport Layer Security (DTLS).  ...  High energy consumption and long delays of current implementation slim it their effective usage in real-life deployments.  ...  Mikael Asplund [10] aims to identify the security requirements in various sectors like health management, energy, etc.  ... 
doi:10.22214/ijraset.2018.4777 fatcat:a5myhp3vtfgslowltkzq4jyuyi

Internet Of Things (Iot) - Applications And Challenges

K. Lathika
2016 Zenodo  
Internet of things is expected to have massive impact on the customer of electric equipment's, business which will all be integrated and synchronized and also the fact is these are the early days.  ...  The internet of things (IoT) as the new influence to the human world and machine world is emerging as a new high tide wave in the development of internet.  ...  Another central issue of the Internet of Things will be related to trust, privacy and security. Here there is also a concern regarding the ownership of data and mechanisms of managing it dynamically.  ... 
doi:10.5281/zenodo.198812 fatcat:sa25z4g7ire6zckl6eroozjjt4

Recent Advances in Evolving Computing Paradigms: Cloud, Edge, and Fog Technologies

Nancy A Angel, Dakshanamoorthy Ravindran, P M Durai Raj Vincent, Kathiravan Srinivasan, Yuh-Chung Hu
2021 Sensors  
the security and management of resources.  ...  There is a need for rigorous research efforts oriented towards developing and implementing machine learning algorithms that deliver the best results in terms of speed, accuracy, storage, and security,  ...  • Security and privacy-The existing cybersecurity solutions prove to be unsatisfactory to manage IoT applications due to the evolving security challenges [52, 53] .  ... 
doi:10.3390/s22010196 pmid:35009740 pmcid:PMC8749780 fatcat:syxfgjxg45hkvbgny4hxlxas4e

Improved Health Care System in Fog Computing and WSN

To improve the performance the task scheduling algorithm is implemented. To overcome this, in this paper, the novel healthcare system with fog computing and WSN is implemented.  ...  Fog is considered as another layer that is a distributed network and is similarly having an association with cloud computing and the internet of things (IoT).  ...  This will provide a better medical signal process, energy-efficient computing, and privacy and security [1] . IoT is also part of this to get better results for the patients [2] .  ... 
doi:10.35940/ijitee.a4791.119119 fatcat:ankttekmwjg3xkjwefgxvv6cvu

Internet of Things Security: Challenges and Opportunities

Dhananjay M. Kanade
2018 International Journal for Research in Applied Science and Engineering Technology  
IoT devices are more vulnerable to attacks because it is simple and some security measures cannot be implemented. The paper analyses security challenges and opportunities in the IoT.  ...  In the next future, there are billions of IoT devices connecting to the Internet and this dynamically increasing number has focused attention on the IoT security.  ...  Thus, the developments of IoT as an intelligent system can be proceeding with interoperability, energy sustainability, privacy, and security. V. ACKNOWLEDGMENT The Authors would like to thank Prof.  ... 
doi:10.22214/ijraset.2018.5356 fatcat:ctruryhmoneffjhmzrap35pp4a


Nairuti Sheth, Hiteshri Yagnik, MT Savaliya, Manan Shah
2017 International Journal of Advanced Research  
Smart Homes:- Home automation or smart homes can be described as introduction of technology within the home environment to provide convenience, comfort, security and energy efficiency to its occupants.  ...  For instance, the traditional approach to the management of transportation systems, waste management, healthcare, energy management and infrastructure in the cities must be fundamentally reworked in order  ... 
doi:10.21474/ijar01/5878 fatcat:zd3qvwqrwvcvteal5mxka25v4a

Blockchain for Future Smart Grid: A Comprehensive Survey [article]

Muhammad Baqer Mollah, Jun Zhao, Dusit Niyato, Kwok-Yan Lam, Xin Zhang, Amer M.Y.M. Ghias, Leong Hai Koh, Lei Yang
2019 arXiv   pre-print
The concept of smart grid has been introduced as a new vision of the conventional power grid to figure out an efficient way of integrating green and renewable energy technologies.  ...  Finally, we discuss essential research challenges and future directions of applying blockchain to smart grid security issues.  ...  energy management and trading solutions.  ... 
arXiv:1911.03298v1 fatcat:wzjcufoqhnbuxjmn24yggh5f2e

Privacy-Aware in the IoT Applications: A Systematic Literature Review [chapter]

Faiza Loukil, Chirine Ghedira-Guegan, Aïcha Nabila Benharkat, Khouloud Boukadi, Zakaria Maamar
2017 Lecture Notes in Computer Science  
We analyze the proposed solutions in terms of the techniques they deployed and the privacy principles they covered according to the ISO standard and the data privacy laws and regulations of the European  ...  Finally, we identifies recommendations to involve privacy principle coverage and security requirement fulfillment in the IoT applications.  ...  Security involves the application and management of appropriate measures that involve consideration of a wide range of threats.  ... 
doi:10.1007/978-3-319-69462-7_35 fatcat:cxv3yxkjdjande7qyha4jqtexe

Middleware for Internet of Things: A Survey

Mohammad Abdur Razzaque, Marija Milojevic-Jevric, Andrei Palade, Siobhan Clarke
2016 IEEE Internet of Things Journal  
In general, middleware can ease the development process by integrating heterogeneous computing and communications devices, and supporting interoperability within the diverse applications and services.  ...  Taking a holistic view, in this article, we outline a set of requirements for IoT middleware, and present a comprehensive review of the existing middleware solutions against those requirements.  ...  Its security and privacy solution uses virtualisation and an implementation of WS-based mechanisms enriched by semantic resolution [97] .  ... 
doi:10.1109/jiot.2015.2498900 fatcat:skqtj45vqzdx3n54nydezv4yde

Systematic Review of Existing IoT Architectures Security and Privacy Issues and Concerns

Fatma Alshohoumi, Mohammed Sarrab, Abdulla AlHamadani, Dawood Al-Abri
2019 International Journal of Advanced Computer Science and Applications  
, extensibility, management, etc. with lack consideration of security solutions.  ...  Therefore, there is an inevitable need to consider security and privacy solutions when designing IoT architecture.  ...   Are security and privacy aspects implemented in IoT architectures?  What are the open research questions related to the IoT architectures, as well as the security and privacy aspects? B.  ... 
doi:10.14569/ijacsa.2019.0100733 fatcat:xatujd6dqfhitczjm6wzugipyq
« Previous Showing results 1 — 15 out of 305 results