intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Security IoT

Xem 1-20 trên 21 kết quả Security IoT
  • In recent years, we have experienced rapid and beneficial development of IoT solutions throughout all aspects of life. In addition to the apparent advantages, the increased number and variety of devices have resulted in more security issues.

    pdf13p viamancio 04-06-2024 0 0   Download

  • The research paper delves into the intricate realm of IoT device security, unravelling the multifaceted risks and presenting a nuanced exploration of mitigation strategies. A comprehensive literature review unveils common security threads and the current state of IoT security measures. The subsequent analysis identifies security risks, including unauthorized access, encryption lapses, authentication weaknesses, physical vulnerabilities, and privacy concerns.

    pdf6p visergey 02-04-2024 7 0   Download

  • The advent of digital transformation within supply chains heralds a new era of efficiency, innovation, and resilience. This paper explores the multifaceted impact of digital technologies—such as the Internet of Things (IoT), artificial intelligence (AI), blockchain, and cloud computing—on supply chain management.

    pdf9p longtimenosee06 27-03-2024 9 3   Download

  • Continued part 1, part 2 of ebook "Demystifying Internet of Things security: Successful IoT device/edge and platform security deployment" provides readers with contents including: chapter 4 - IoT software security building blocks; chapter 5 - connectivity technologies for IoT; chapter 6 - IoT vertical applications and associated security requirements;...

    pdf275p tieulangtran 28-09-2023 5 3   Download

  • Part 1 of ebook "Demystifying Internet of Things security: Successful IoT device/edge and platform security deployment" provides readers with contents including: chapter 1 - conceptualizing the secure Internet of Things; chapter 2 - IoT frameworks and complexity; chapter 3 - base platform security hardware building blocks;...

    pdf240p tieulangtran 28-09-2023 5 2   Download

  • The present contribution proposes introduction of DevOps, an agile methodology for the development and instantiation of software platforms, with minimal impact in any kind of operations environment, for the Next Generation IoT deployments.

    pdf17p vimulcahy 18-09-2023 6 4   Download

  • This paper aims to provide a thorough insight into Deep learning (DL) algorithms’ contributions for IoT security, especially on the ways they operate, the benefits and drawbacks and possible applications in IoT security systems as well as illustrates how they are applied to enhance IoT security.

    pdf9p vifriedrich 06-09-2023 5 3   Download

  • Continued part 1, part 2 of ebook "Internet of things: Architectures, protocols and standards" provides readers with contents including: chapter 5 - security and privacy in the IoT; chapter 6 - cloud and fog computing for the IoT; chapter 7 - the IoT in practice;...

    pdf194p hanlinhchi 29-08-2023 9 4   Download

  • Food safety is a scientific field that involves various practices and analyses at every stage of the food chain. As we have faced several food crises that heavily impacted human health, food safety should be widely adopted to prevent dangerous wellness risks. With the help of the Internet of Things (IoT) and web applications, food quality can be monitored at any point in the supply chain.

    pdf7p viannee 02-08-2023 7 4   Download

  • An embedded device is becoming popular in daily life thanks to their low power consumption and multiprocessing capability. In particular, the security of embedded devices has been a big issue of concern to academic and industrial communities. This study aims at the Grain 128- AEAD authenticated encryption with associated data algorithm embedded on low-power and resourceconstrained devices.

    pdf12p viaudi 29-08-2022 10 3   Download

  • With the rise of the Internet of Things (IoT), the risk of information security is increasing. There have been many proposals for IoT security, however, so far, there is not truly effective and comprehensive solution. The study aims at lightweight encryption, with the basic goal of reducing the loops of encryption algorithms, reducing the computing requirements, and energy consumption of the system while ensuring safety, and integrating into new Protocols of IoT networks and weak resource devices.

    pdf8p vimelindagates 18-07-2022 50 5   Download

  • While there has been designs for security devices that are accessible on the internet, few of them are combined with Internet of Things – one of the hot topics regarding to IT. This paper aims to guide people with a some IT background knowledge to build a sensor that detects people before sending the information to a phone, alerting the owner of the sensor. Moreover, this paper will explain some key details about the making of the device, and would be serve as a reference for future projects in creating IoT devices.

    pdf11p huyetthienthan 23-11-2021 17 1   Download

  • With the advancement of technology, the Internet of Things has become a major part in our daily life. It brought up unbelievable influences, potential and growth to human’s society. IoT allows wearable devices, home appliances and software to share and communicate throughout a network using the Internet. Due to the fact that all of a user's private data will be uploaded on the Internet, we must keep an eye on security problems caused by IoT.

    pdf9p huyetthienthan 23-11-2021 34 2   Download

  • This paper proposes a security framework for Internet of Things (IoT) based on blockchain. The solution provides the two features: (1) Access control for IoT devices, which allows users to pay a fee to the device’s owner to access the device for a certain period of time.

    pdf9p viaespa2711 31-07-2021 26 3   Download

  • Security Evaluation Schemes:

    + ETSI 303 645 & Cybersecurity Labelling Scheme

    + Eurosmart Scheme

    + GSMA IoT Security Assessment

    + Case-study (steps & feedbacks): Vulnerability analysis of an IP Camera

    Reference: Cyber Security

    pdf32p trinhthamhodang1217 06-04-2020 1303 2   Download

  • The results obtained indicate that the attackers can overwhelm the server resources even when legitimate access was denied to MQTT brokers and resources have been restricted. In addition, the MQTT features we have identified showed high attack detection accuracy. The field size and length-based features drastically reduced the false-positive rates and are suitable in detecting IoT based attacks.

    pdf23p nguaconbaynhay10 22-01-2021 30 3   Download

  • This paper discusses how to ensure security, i.e., confidentiality and integrity properties, for data in IoT applications. While confidentiality could be assessed via information flow analysis, integrity is ensured by error-correcting codes. In addition to errors, many communication channels also cause erasures, i.e., the demodulator cannot decide which symbol the received waveform represents. The paper proposes a method that might correct both errors and erasures together. Our method is efficient in reducing memory storage as well as decoding complexity.

    pdf7p trinhthamhodang9 10-12-2020 16 3   Download

  • This article addresses two important IoT considerations for Ho Chi Minh City’s Smart city initiative: The need for an IoT platform and End-to-end security requirements for the IoT network. To provide context, the article will also provide background on the smart city initiative.

    pdf6p vititan2711 13-08-2019 25 1   Download

  • Architecture of an ISO/IEC 17025 Quality Management System (QMS) for IT Security

    Evaluation Labs: RASIC and Processes, General structure of the QMS documentation, Setting-up, Operating and Maintaining the QMS.

    Reference: IoT security standards

    pdf9p tradaviahe12 23-04-2019 2505 2   Download

  • This offers the capability to measure and understand environmental indicators. Building or home automation, social smart communication for enhancement of quality of life that could be considered as one of the application of IoT where the sensors, actuators and controllers can be connected to internet. IoT can be represented as a main enabling factor of promising paradigm for integration and comprehension of several technologies for communication solution, Identification and integration for tracking of technologies as wireless sensor and actuators.

    pdf5p byphasse043256 23-03-2019 60 8   Download

CHỦ ĐỀ BẠN MUỐN TÌM

ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2