A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Communications for AnyPLACE: A smart metering platform with management and control functionalities
2016
2016 IEEE 21st International Conference on Emerging Technologies and Factory Automation (ETFA)
The paper also incorporates the security and privacy requirements in different domains and sketches a solution and architecture to fulfill these by incorporating existing open source implementations as ...
Smart metering and energy management are developments that transform the yet passive energy consumer to a participant that is actively involved in the energy market by using variable energy tariffs or ...
ACKNOWLEDGMENT This project has received funding from the European Union's Horizon 2020 research and innovation programme under grant agreement No 646580. ...
doi:10.1109/etfa.2016.7733496
dblp:conf/etfa/HennekeFKRWJ16
fatcat:6tazdsyt6rbljelf5sv3xbxlre
A systemic and cognitive vision for IoT security: A case study of military live simulation and security challenges
2017
2017 International Conference on Smart, Monitored and Controlled Cities (SM2C)
In addition, new solutions can be developed to help people managing their own privacy settings and mechanisms instead of expecting the IoT system to implement their requirements. ...
One possible solution is the use of game theory to model privacy management by data owners. Identification in IoT context can be improved at different levels. ...
doi:10.1109/sm2c.2017.8071828
fatcat:5h2imodxbzcftfht2hkym25yfy
An Analytical Survey on Data Access Control Mechanism in Cloud using Blockchain
2019
Zenodo
However, to overcome this data stored in encrypted form, this security measure is not enough to handle the issue of data privacy. ...
As the bit towards this paper also proposed to handle data integrity effectively by the usage of block chain and bilinear pairing mechanism together to provide the best solution for data access control ...
to the information from anyplace. ...
doi:10.5281/zenodo.3609753
fatcat:js4qqyk3cvftnosafaxc6vpgiq
Middleware Solutions for the Internet of Things: A Survey
[chapter]
2021
Middleware Architecture [Working Title]
In this chapter, an overview of IoT technologies, architecture, and main applications is given first and then followed by a comprehensive survey on the most recently used and proposed middleware solutions ...
as part of the Internet of the future and ubiquitous computing allowing the communication among billions of smart devices and objects, and have recently drawn a very significant research attention. ...
within the IoT should be considered when implementing a middleware solution. ...
doi:10.5772/intechopen.100348
fatcat:r3qdif5yxrdqrbha567vtmqh4q
Wireless Body Area Network Security and Privacy Issue in E-Healthcare
2018
International Journal of Advanced Computer Science and Applications
network layer in a WBAN and we finally talk about various cryptographic algorithms and laws for providing solution of security and privacy in WBAN. 215 | P a g e www.ijacsa.thesai.org authentication, ...
These devices represent various security and privacy protection of touchy and private patient medical data. ...
The conveyed idea of information in WBANs makes implementing security and privacy troublesome. It is imperative to manage these issues notwithstanding when the node is compromised or falls flat. ...
doi:10.14569/ijacsa.2018.090433
fatcat:q7owkmcf2nfonatbfo5bz67fje
Design and Development of Security Mechanism for IoT Devices
2018
International Journal for Research in Applied Science and Engineering Technology
security solutions, such as the Datagram Transport Layer Security (DTLS). ...
High energy consumption and long delays of current implementation slim it their effective usage in real-life deployments. ...
Mikael Asplund [10] aims to identify the security requirements in various sectors like health management, energy, etc. ...
doi:10.22214/ijraset.2018.4777
fatcat:a5myhp3vtfgslowltkzq4jyuyi
Internet Of Things (Iot) - Applications And Challenges
2016
Zenodo
Internet of things is expected to have massive impact on the customer of electric equipment's, business which will all be integrated and synchronized and also the fact is these are the early days. ...
The internet of things (IoT) as the new influence to the human world and machine world is emerging as a new high tide wave in the development of internet. ...
Another central issue of the Internet of Things will be related to trust, privacy and security. Here there is also a concern regarding the ownership of data and mechanisms of managing it dynamically. ...
doi:10.5281/zenodo.198812
fatcat:sa25z4g7ire6zckl6eroozjjt4
Recent Advances in Evolving Computing Paradigms: Cloud, Edge, and Fog Technologies
2021
Sensors
the security and management of resources. ...
There is a need for rigorous research efforts oriented towards developing and implementing machine learning algorithms that deliver the best results in terms of speed, accuracy, storage, and security, ...
• Security and privacy-The existing cybersecurity solutions prove to be unsatisfactory to manage IoT applications due to the evolving security challenges [52, 53] . ...
doi:10.3390/s22010196
pmid:35009740
pmcid:PMC8749780
fatcat:syxfgjxg45hkvbgny4hxlxas4e
Improved Health Care System in Fog Computing and WSN
2019
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE
To improve the performance the task scheduling algorithm is implemented. To overcome this, in this paper, the novel healthcare system with fog computing and WSN is implemented. ...
Fog is considered as another layer that is a distributed network and is similarly having an association with cloud computing and the internet of things (IoT). ...
This will provide a better medical signal process, energy-efficient computing, and privacy and security [1] . IoT is also part of this to get better results for the patients [2] . ...
doi:10.35940/ijitee.a4791.119119
fatcat:ankttekmwjg3xkjwefgxvv6cvu
Internet of Things Security: Challenges and Opportunities
2018
International Journal for Research in Applied Science and Engineering Technology
IoT devices are more vulnerable to attacks because it is simple and some security measures cannot be implemented. The paper analyses security challenges and opportunities in the IoT. ...
In the next future, there are billions of IoT devices connecting to the Internet and this dynamically increasing number has focused attention on the IoT security. ...
Thus, the developments of IoT as an intelligent system can be proceeding with interoperability, energy sustainability, privacy, and security.
V. ACKNOWLEDGMENT The Authors would like to thank Prof. ...
doi:10.22214/ijraset.2018.5356
fatcat:ctruryhmoneffjhmzrap35pp4a
COMPREHENSIVE STUDY ON VARIOUS APPLICATIONS USING INTERNET OF THINGS (IOT) FOR SMART CITY
2017
International Journal of Advanced Research
Smart Homes:- Home automation or smart homes can be described as introduction of technology within the home environment to provide convenience, comfort, security and energy efficiency to its occupants. ...
For instance, the traditional approach to the management of transportation systems, waste management, healthcare, energy management and infrastructure in the cities must be fundamentally reworked in order ...
doi:10.21474/ijar01/5878
fatcat:zd3qvwqrwvcvteal5mxka25v4a
Blockchain for Future Smart Grid: A Comprehensive Survey
[article]
2019
arXiv
pre-print
The concept of smart grid has been introduced as a new vision of the conventional power grid to figure out an efficient way of integrating green and renewable energy technologies. ...
Finally, we discuss essential research challenges and future directions of applying blockchain to smart grid security issues. ...
energy management and trading solutions. ...
arXiv:1911.03298v1
fatcat:wzjcufoqhnbuxjmn24yggh5f2e
Privacy-Aware in the IoT Applications: A Systematic Literature Review
[chapter]
2017
Lecture Notes in Computer Science
We analyze the proposed solutions in terms of the techniques they deployed and the privacy principles they covered according to the ISO standard and the data privacy laws and regulations of the European ...
Finally, we identifies recommendations to involve privacy principle coverage and security requirement fulfillment in the IoT applications. ...
Security involves the application and management of appropriate measures that involve consideration of a wide range of threats. ...
doi:10.1007/978-3-319-69462-7_35
fatcat:cxv3yxkjdjande7qyha4jqtexe
Middleware for Internet of Things: A Survey
2016
IEEE Internet of Things Journal
In general, middleware can ease the development process by integrating heterogeneous computing and communications devices, and supporting interoperability within the diverse applications and services. ...
Taking a holistic view, in this article, we outline a set of requirements for IoT middleware, and present a comprehensive review of the existing middleware solutions against those requirements. ...
Its security and privacy solution uses virtualisation and an implementation of WS-based mechanisms enriched by semantic resolution [97] . ...
doi:10.1109/jiot.2015.2498900
fatcat:skqtj45vqzdx3n54nydezv4yde
Systematic Review of Existing IoT Architectures Security and Privacy Issues and Concerns
2019
International Journal of Advanced Computer Science and Applications
, extensibility, management, etc. with lack consideration of security solutions. ...
Therefore, there is an inevitable need to consider security and privacy solutions when designing IoT architecture. ...
Are security and privacy aspects implemented in IoT architectures? What are the open research questions related to the IoT architectures, as well as the security and privacy aspects?
B. ...
doi:10.14569/ijacsa.2019.0100733
fatcat:xatujd6dqfhitczjm6wzugipyq
« Previous
Showing results 1 — 15 out of 305 results