6,098 Hits in 5.8 sec

Management platform of threats information in IoT environment

Eunhye Ko, Taeeun Kim, Hwankuk Kim
2017 Journal of Ambient Intelligence and Humanized Computing  
Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (, which permits unrestricted use, distribution  ...  , and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.  ...  Conclusion Recently, the rapid spread of IoT services has caused an increase in the number of devices connected to the Internet.  ... 
doi:10.1007/s12652-017-0581-6 fatcat:zdpvjvu2h5by5ngrtv57zaezcm

Internet of Things as Key Enabler for Sustainable Healthcare Delivery

Cristina Elena Turcu, Cornel Octavian Turcu
2013 Procedia - Social and Behavioral Sciences  
The current widespread deployment of cell phones, laptops, Wi-Fi, Bluetooth, personal digital assistants (PDAs), and various forms of sensing devices based on digital and radio frequency identification  ...  This paper aims to show how radio frequency identification, multi-agent and Internet of Things technologies can be used to improve people's access to quality and affordable healthcare services, to reduce  ...  Jara et al. present a pharmaceutical intelligent information system to detect allergies and adverse drug reactions based on Internet of Things [18] and an Internet of Things-based personal device for  ... 
doi:10.1016/j.sbspro.2013.02.049 fatcat:l6gm6gm5jrhrfcr27vocqbqfnu

TTEO (Things Talk to Each Other): Programming Smart Spaces Based on IoT Systems

Jaeseok Yun, Il-Yeup Ahn, Sung-Chan Choi, Jaeho Kim
2016 Sensors  
This article demonstrates a prototype service based on the Internet of Things, TTEO (Things Talk to Each Other).  ...  , oneM2M, a unique identification scheme for a huge number of IoT devices, and service scenarios with an intuitive smartphone app.  ...  The device software platform is the foundation of smart objects on which various applications run and provides Internet connectivity to server platforms via common interfaces.  ... 
doi:10.3390/s16040467 pmid:27043578 pmcid:PMC4850981 fatcat:qc3dp7hg25bpbbirq5usvluyxy

The Internet-Connected Device Vulnerability Information Management System in IoT Environment

Kim Taeeun, Dept. of Computer Science, Soong-Sil University
2019 International Journal of Internet of Things and Big Data  
As these technologies and environments change, there is a growing number of services that utilize various types of IoT devices.  ...  Devices such as small sensors and CCTVs that were used offline are being connected to the Internet. However, a large number of IoT devices use an open-source with no security function.  ...  Using those technologies, this paper emphasizes the importance of advance prevention based on the identification -rather than on the updating of vulnerable devices.  ... 
doi:10.21742/ijitbd.2019.4.1.03 fatcat:q2vcmmkphbhmjfwo2lnm4dsnle

A Design of Automated Vulnerability Information Management System for Secure Use of Internet-Connected Devices Based on Internet-Wide Scanning Methods

Taeeun KIM, Hwankuk KIM
2021 IEICE transactions on information and systems  
Any Internet-connected device is vulnerable to being hacked and misused.  ...  Instead of access to applying security functions on IoT devices, Internet-wide scanning (e.g., Shodan) studies have been attempted to quickly discover and take security measures massive IoT devices with  ...  The vulnerability information collected by the Vulnerability Information Management Module was based on Common Platform Enumeration (CPE), Common Fragment Enumeration (CWE), and Common Vulnerability Scoring  ... 
doi:10.1587/transinf.2021ngp0004 fatcat:rt7thm5rfrhedllb5nnaozurbm

Contextualized Ubiquity: A new opportunity for rendering business information and services

Carlos R. Cunha, Emanuel Peres, Raul Morais, Maximino Bessa, Manuel Cabral Reis
2010 Journal of Theoretical and Applied Electronic Commerce Research  
, as Internet access tools, increasingly common and attractive.  ...  to static tag-embedded information as well as web-based information and services.  ...  As stated earlier, the service platform operation is based on web services, which are considered as a mean to improve interoperability among heterogeneous applications, over internet protocols [4] and  ... 
doi:10.4067/s0718-18762010000300006 fatcat:yi6kbgc63jfphhqjdc4yvnybu4

SD-WAN Internet Census [article]

Sergey Gordeychik, Denis Kolegov, Antony Nikolaev
2018 arXiv   pre-print
By definition, these systems form network perimeter and connect Internet, WAN, extranet, and branches that makes them crucial from cybersecurity point of view.  ...  We explore Internet-based and cloud-based publicly available SD-WAN systems using well-known Shodan and Censys search engines and custom developed automation tools and show that most of the SD-WAN systems  ...  Our Approach The common approach to SD-WAN system enumeration is based on obtaining complete and exhaustive information about a specific SD-WAN solution from each related vendor that is in scope.  ... 
arXiv:1808.09027v2 fatcat:wanfriqsongmjj5v7oeeow7y3a

Orchestration of distributed hetero-geneous sensor networks and Internet of Things

Daniel Wilusz, Jarogniew Rykowski
2014 Informatyka Ekonomiczna  
The first is based on OSGi platform supporting dynamic management of modules and providing out-of-the-box service registry.  ...  Section 2 describes essential characteristics of sensor networks and Internet of Things, which allows for identification of basic requirements of these networks.  ... 
doi:10.15611/ie.2014.3.09 fatcat:g324xiknlra2tlnejcfa5a4yne


All ofthis information is then exchanged across the network with other devices, apps, and infrastructures.The Internet of Things (IoT) paradigm is based on this dynamic and ever-changing world.  ...  The number of gadgets linked to the internet has expanded dramatically in recent years.  ...  Social Internet of Things Architecture Objects are listed on a social platform, generating groups and associations (as in a regular social network) in order to provide particular services in a social network-based  ... 
doi:10.6084/m9.figshare.14938434.v1 fatcat:r3zfgbiag5hebalifqryr3eusq

Scalable Oriented-Service Architecture for Heterogeneous and Ubiquitous IoT Domains [article]

Pablo Lopez, David Fernandez, Rafael Marin-Perez, Antonio J. Jara, Antonio F. Gomez-Skarmeta
2013 arXiv   pre-print
Internet of Things (IoT) grows quickly, and 50 billion of IoT devices will be interconnected by 2020.  ...  Moreover, the architecture should provide other transversal functionalities such as a common semantic for describing services and resources, and a service layer for interconnecting with M2M platforms and  ...  DNS and HTTP) to access Internet resources. • Based on existing Internet technologies: The architecture should be based on existing mechanisms in Internet.  ... 
arXiv:1311.4293v1 fatcat:jqmbwnpyv5fprdnywjoybb4iem

Home Access Control And Alarm System Using Labview

Sagar Shilvant, M.R.Pangaonkar
2016 Zenodo  
This system is based on the LABVIEW software and can act as a security guard of the home. Access Control system is set at the door to give access only to family members.  ...  This paper presents the basic purpose of a home access control and alarm system is to keep us and our family safe,and keep our home safe from crime.  ...  Additionally, since connected home security systems use a cloud service, several of the tested systems allowed account enumeration through cloud-based web interfaces and a mobile application interface.  ... 
doi:10.5281/zenodo.1466274 fatcat:ymerf3qnqnfx5exk2vdmujzro4

Design and Implementation of WBEM-based Network Management System for Inter-AS Traffic Engineering

S. Sundaram, Jong-Cheol Seo, A. Abdurakhmanov, Young-Tak Kim
2006 Fourth International Conference on Software Engineering Research, Management and Applications (SERA'06)  
The detailed design and implementation of required WBEM server/provider functions based on OpenPegasus are explained, and the performance is analyzed  ...  In order to provide QoS-guaranteed differentiated service across multiple domain networks, network management with inter-AS (autonomous system) traffic engineering is essential.  ...  and controlling resources from diverse sources (e.g., different types of platforms or different types of resources on the same platform).  ... 
doi:10.1109/sera.2006.26 dblp:conf/sera/SundaramSAK06 fatcat:664rfgxfwrdgtltu3b6vzvhcpm


T Daisy Premila Bai .
2016 International Journal of Research in Engineering and Technology  
The cloud services are integrated and connected through an IP/MPLS (Internet Protocol / Multi-Protocol Label Switching) core System.  ...  Internet of Things (IoT) and Cloud Computing paradigm is a next wave in the era of computing and it has been identified as one of the emerging technologies in the field of Computer Science and Information  ...  European Research Cluster on the Internet of Things states that "Internet of things is a dynamic global network infrastructure with self-configuring capabilities based on standard and interoperable communication  ... 
doi:10.15623/ijret.2016.0505030 fatcat:3ndqczn5yrbnnpnl4pqqsmoyee

A gap analysis of Internet-of-Things platforms

Julien Mineraud, Oleksiy Mazhelis, Xiang Su, Sasu Tarkoma
2016 Computer Communications  
We are experiencing an abundance of Internet-of-Things (IoT) middleware solutions that provide connectivity for sensors and actuators to the Internet.  ...  Based on the results of our analysis and our survey, we conclude this article with a list of recommendations for extending these IoT platforms in order to fill in the gaps.  ...  In this article, we study today's IoT landscape with regard to the distribution of applications and services, as well as the platforms that connect the devices to the Internet.  ... 
doi:10.1016/j.comcom.2016.03.015 fatcat:gaxjyapmi5g3ra3y3oiyy53ria

Secure IoT Devices for the Maintenance of Machine Tools

Stefano Tedeschi, Jörn Mehnen, Nikolaos Tapoglou, Rajkumar Roy
2017 Procedia CIRP  
being undertaken with the EPSRC, grant number EP/I033246/1 and collaboration with the group Kennametal and will be conducted in the EPSRC Centre for Innovative Manufacturing in Through-life Engineering Services  ...  All threats will be enumerated based on the understanding of attackers' goals, IoT structure, and external scenarios.  ...  He called the IoT the set of "all things that are connected with Internet through sensors, such Radio Frequency Identification (RFID), to achieve intelligent identification and management" [3] .  ... 
doi:10.1016/j.procir.2016.10.002 fatcat:aljx73rjqzhy5mrfrljklhsavm
« Previous Showing results 1 — 15 out of 6,098 results