Filters








115 Hits in 6.3 sec

Secure Information Sharing in an Industrial Internet of Things [article]

Nils Ulltveit-Moe, Henrik Nergaard, László Erdödi, Terje Gjøsæter, Erland Kolstad, Pål Berg
2016 arXiv   pre-print
This paper investigates how secure information sharing with external vendors can be achieved in an Industrial Internet of Things (IIoT).  ...  The paper also outlines a long term solution for protecting IIoT devices with fine-grained access control for sharing data between external entities that would support cloud-based data storage.  ...  Also thanks to the regional industry clusters Digin and Future Robotics for initiating this research.  ... 
arXiv:1601.04301v1 fatcat:fcgpyzm3trf2lpn4av6cnb46ly

Privacy in Sensor-Driven Human Data Collection: A Guide for Practitioners [article]

Arkadiusz Stopczynski, Riccardo Pietri, Alex Pentland, David Lazer, Sune Lehmann
2014 arXiv   pre-print
Much of the data collected is sensitive. It is private in the sense that most individuals would feel uncomfortable sharing their collected personal data publicly.  ...  This paper provides a survey of the work related to addressing privacy issues in research studies that collect detailed sensor data on human behavior.  ...  These locations and values are determined on the basis of a secret key, chosen by the owner of the data, allowing detection of the watermark with high probability.  ... 
arXiv:1403.5299v1 fatcat:4l5pk7l66jcobdmxjb7a3hpdtu

An exploration of the Wearable Internet of Things (WIoT) Users" Privacy Concerns in healthcare domain

2020 International journal of recent technology and engineering  
Internet of things (IoT) is earning a significant role in the health care domain.  ...  The aim of this paper is to survey the end-user concerns of the privacy issues related to WIoT then we review conducted on current solutions that are worked toward preserving privacy in the healthcare  ...  Data analysis and information on medical issues detection might expose personal private information.  ... 
doi:10.35940/ijrte.a2811.079220 fatcat:obcwo5ewm5cyljh3agfbgy2pb4

Security and privacy for mobile healthcare networks: from a quality of protection perspective

Kuan Zhang, Kan Yang, Xiaohui Liang, Zhou Su, Xuemin Shen, Henry H. Luo
2015 IEEE wireless communications  
Figure 4 . 4 Priority-based health data aggregation for MHNs: a) cloud assisted WBAN model; b) priority-based health data aggregation. For Figure 5 . 5 Sybil detection for MHNs.  ...  Toward different levels of Sybil attacks, MHNs are able to adjust the tunable detection strategies from the perspective of QoP.  ... 
doi:10.1109/mwc.2015.7224734 fatcat:emp56s7jf5eqljipg5wjjf2jmi

BigMM 2020 TOC

2020 2020 IEEE Sixth International Conference on Multimedia Big Data (BigMM)  
and Evaluation of an AI System for Early Detection of Covid-19 Pneumonia using Towards a Safer Conversation Space: Detection of Toxic Content in Social Media (Student Consortium) 297 Sahana B S (Sir M  ...  (Indian Institute of Information Technology) and Saisree Miriyala (Adobe Inc) DP-ANN: A New Differential Private Artificial Neural Network with Application on Health RDWT-SVD-Firefly based Dual Watermarking  ... 
doi:10.1109/bigmm50055.2020.00004 fatcat:qvqwme47ezaeth2gnjhsbwkdoi

The Internet of Things: Vision, Architecture and Applications

Prajakta Deshpande, Anuja Damkonde, Vaibhav Chavan
2017 International Journal of Computer Applications  
The domain of the Internet has extended from computers to different types of heterogeneous and homogeneous sensors leading to connectivity of almost everything and making it smart.  ...  This paper attempts to give a brief description of the IoT system, its general architecture, the different layers of IoT architecture and the technologies used for the development of an IoT System.  ...  ACKNOWLEDGMENTS We are thankful to The Head, Department of Computer Science and Information Technology for providing facilities and support for this research. We are also thankful to Dr. S. C.  ... 
doi:10.5120/ijca2017915722 fatcat:gqsj52mlmzh3nkjxufuoxzt4c4

Privacy Preservation for Wireless Sensor Networks in Healthcare: State of the Art, and Open Research Challenges [article]

Yasmine N. M. Saleh, Claude C. Chibelushi, Ayman A. Abdel-Hamid, Abdel-Hamid Soliman
2020 arXiv   pre-print
However, an important barrier is that acceptance by healthcare stakeholders is influenced by the effectiveness of privacy safeguards for personal and intimate information which is collected and transmitted  ...  of directions for future research towards unlocking the door onto privacy protection which is appropriate for healthcare in the twenty-first century.  ...  Machine-to-machine communication PAN Personal Area Network PET Privacy Enhancing Technology PHR Personal Health Record PHI Personal Health Information PII Personally Identifiable Information  ... 
arXiv:2012.12958v1 fatcat:6bqeb3htibaypmbfckveiizxpm

Research Communities in cyber security: A Comprehensive Literature Review [article]

Sotirios Katsikeas, Pontus Johnson, Mathias Ekstedt, Robert Lagerström
2021 arXiv   pre-print
cryptography, sensor networks, and usable security.  ...  The analysis discovered twelve top-level communities: access control, authentication, biometrics, cryptography (I & II), cyber-physical systems, information hiding, intrusion detection, malwares, quantum  ...  The term watermarking relates to a paper-making technique for keeping track of provenance. Watermarking is similar to steganography in that it embeds and hides information in a source data file.  ... 
arXiv:2104.13196v1 fatcat:napenkh4nna4vamt3jmpieyvuq

Smart Cities at Risk!

Vaia Moustaka, Zenonas Theodosiou, Athena Vakali, Anastasis Kounoudes
2018 Companion of the The Web Conference 2018 on The Web Conference 2018 - WWW '18  
Online social networks with their enormous momentum are one of the main sources of urban data offering heterogeneous real-time data at a minimal cost.  ...  Registration, acquisition and utilization of data, which will be transformed into smart services, are becoming more necessary than ever.  ...  personal information [9] .  ... 
doi:10.1145/3184558.3191516 dblp:conf/www/MoustakaTVK18 fatcat:7q6g7aeetbggxkcjonrsmot4dq

Internet of things: security requirements, attacks and counter measures

Maria Imdad, Deden Witarsyah Jacob, Hairulnizam Mahdin, Zirawani Baharum, Shazlyn Milleana Shaharudin, Mohd Sanusi Azmi
2020 Indonesian Journal of Electrical Engineering and Computer Science  
Here we have used these requirements for classification and subdivided them on the basis of attacks, followed by degree of their severity, affected system components and respective countermeasures.  ...  This work will not only give guidelines regarding detection and removal of attacks but will also highlight the impact of these attacks on system, which will be a decision point to safeguard system from  ...  ACKNOWLEDGEMENTS This research work is sponsored by Telkom University, Bandung Indonesia under its publication scheme and by Ministry of Education Malaysia under FRGS grant vote no 1611.  ... 
doi:10.11591/ijeecs.v18.i3.pp1520-1530 fatcat:3lvg6divjfbnfcfm6zswrizhii

Deep Learning-aided Brain Tumor Detection: An Initial ‎Experience based Cloud Framework ‎

Safia Abbas, Abeer M Mahmoud
2020 Indonesian Journal of Electrical Engineering and Informatics (IJEEI)  
The contour detection and binary segmentation were applied to extract the region of interest and reduce the unnecessary information before injecting the data into the model for training.  ...  The experimental results show 97.3% for detection accuracy, 96.9% for sensitivity, and 96.1% specificity.  ...  ACKNOWLEDGEMENTS This research was funded by the Deanship of Scientific Research at Princess Nourah bint Abdulrahman University through the Fast-track Research Funding Program.  ... 
doi:10.52549/ijeei.v8i4.2436 fatcat:x6hdow4gbbeynicdomh2v7oolm

Privacy Intelligence: A Survey on Image Privacy in Online Social Networks [article]

Chi Liu, Tianqing Zhu, Jun Zhang, Wanlei Zhou
2021 arXiv   pre-print
The recent image leaks from popular OSN services and the abuse of personal photos using advanced algorithms (e.g.  ...  However, OSN image privacy itself is quite complicated, and solutions currently in place for privacy management in reality are insufficient to provide personalized, accurate and flexible privacy protection  ...  leakage detection: Access to in-device image data by third-party applications can lead to potential information leakages.  ... 
arXiv:2008.12199v2 fatcat:vxv6rsnyavesjiw2bbnc4jzsiy

AACT: Anonymous and Accountable communication topology for Wireless Mesh Networks

M.Narasimha Rao
2012 IOSR Journal of Computer Engineering  
Security and privacy issues are of the major concern in pushing the success of WMNs for their broad deployment and for behind service-oriented applications.  ...  Regardless of the required, partial security research has been conducted towards privacy protection in WMNs.  ...  Inter-region secure communication was achieved by using the concepts of public-key cryptography.This paper can serve as a platform for developing partially distributed system for practical scenarios as  ... 
doi:10.9790/0661-0520112 fatcat:wxrb53grjzdjrmbikh65wzm5iy

The Importance of Internet of Things Security for Smart Cities [chapter]

Mircea Georgescu, Daniela Popescul
2016 Smart Cities Technologies  
The impressive heterogeneity, ubiquity, miniaturization, autonomous and unpredictable behaviour of objects interconnected in Internet of Things, the real data deluges generated by them and, on the other  ...  ., this chapter will serve them as a start point for better decisions in security design and management.  ...  Also, better controls on who has access to software are needed, preventing leakage of information about passwords.  ... 
doi:10.5772/65206 fatcat:7ol3ai2m2vehvkccs4cdgtilwu

Towards Privacy Preserving IoT Environments: A Survey

Mohamed Seliem, Khalid Elgazzar, Kasem Khalil
2018 Wireless Communications and Mobile Computing  
The ultimate source of user discomfort is the lack of control over personal raw data that is directly streamed from sensors to the outside world.  ...  Lastly, we discuss the mechanisms and architectures for protecting IoT data in case of mobility at the device layer, infrastructure/platform layer, and application layer.  ...  Wireless Communications and Mobile Computing Conflicts of Interest The authors declare that there are no conflicts of interest regarding the publication of this paper.  ... 
doi:10.1155/2018/1032761 fatcat:j76yhuc5rjhvbifkk5foq3klzq
« Previous Showing results 1 — 15 out of 115 results