![](images/graphics/blank.gif)
Security IoT
-
In recent years, we have experienced rapid and beneficial development of IoT solutions throughout all aspects of life. In addition to the apparent advantages, the increased number and variety of devices have resulted in more security issues.
13p
viamancio
04-06-2024
0
0
Download
-
The research paper delves into the intricate realm of IoT device security, unravelling the multifaceted risks and presenting a nuanced exploration of mitigation strategies. A comprehensive literature review unveils common security threads and the current state of IoT security measures. The subsequent analysis identifies security risks, including unauthorized access, encryption lapses, authentication weaknesses, physical vulnerabilities, and privacy concerns.
6p
visergey
02-04-2024
7
0
Download
-
The advent of digital transformation within supply chains heralds a new era of efficiency, innovation, and resilience. This paper explores the multifaceted impact of digital technologies—such as the Internet of Things (IoT), artificial intelligence (AI), blockchain, and cloud computing—on supply chain management.
9p
longtimenosee06
27-03-2024
9
3
Download
-
Continued part 1, part 2 of ebook "Demystifying Internet of Things security: Successful IoT device/edge and platform security deployment" provides readers with contents including: chapter 4 - IoT software security building blocks; chapter 5 - connectivity technologies for IoT; chapter 6 - IoT vertical applications and associated security requirements;...
275p
tieulangtran
28-09-2023
5
3
Download
-
Part 1 of ebook "Demystifying Internet of Things security: Successful IoT device/edge and platform security deployment" provides readers with contents including: chapter 1 - conceptualizing the secure Internet of Things; chapter 2 - IoT frameworks and complexity; chapter 3 - base platform security hardware building blocks;...
240p
tieulangtran
28-09-2023
5
2
Download
-
The present contribution proposes introduction of DevOps, an agile methodology for the development and instantiation of software platforms, with minimal impact in any kind of operations environment, for the Next Generation IoT deployments.
17p
vimulcahy
18-09-2023
6
4
Download
-
This paper aims to provide a thorough insight into Deep learning (DL) algorithms’ contributions for IoT security, especially on the ways they operate, the benefits and drawbacks and possible applications in IoT security systems as well as illustrates how they are applied to enhance IoT security.
9p
vifriedrich
06-09-2023
5
3
Download
-
Continued part 1, part 2 of ebook "Internet of things: Architectures, protocols and standards" provides readers with contents including: chapter 5 - security and privacy in the IoT; chapter 6 - cloud and fog computing for the IoT; chapter 7 - the IoT in practice;...
194p
hanlinhchi
29-08-2023
9
4
Download
-
Food safety is a scientific field that involves various practices and analyses at every stage of the food chain. As we have faced several food crises that heavily impacted human health, food safety should be widely adopted to prevent dangerous wellness risks. With the help of the Internet of Things (IoT) and web applications, food quality can be monitored at any point in the supply chain.
7p
viannee
02-08-2023
7
4
Download
-
An embedded device is becoming popular in daily life thanks to their low power consumption and multiprocessing capability. In particular, the security of embedded devices has been a big issue of concern to academic and industrial communities. This study aims at the Grain 128- AEAD authenticated encryption with associated data algorithm embedded on low-power and resourceconstrained devices.
12p
viaudi
29-08-2022
10
3
Download
-
With the rise of the Internet of Things (IoT), the risk of information security is increasing. There have been many proposals for IoT security, however, so far, there is not truly effective and comprehensive solution. The study aims at lightweight encryption, with the basic goal of reducing the loops of encryption algorithms, reducing the computing requirements, and energy consumption of the system while ensuring safety, and integrating into new Protocols of IoT networks and weak resource devices.
8p
vimelindagates
18-07-2022
50
5
Download
-
While there has been designs for security devices that are accessible on the internet, few of them are combined with Internet of Things – one of the hot topics regarding to IT. This paper aims to guide people with a some IT background knowledge to build a sensor that detects people before sending the information to a phone, alerting the owner of the sensor. Moreover, this paper will explain some key details about the making of the device, and would be serve as a reference for future projects in creating IoT devices.
11p
huyetthienthan
23-11-2021
17
1
Download
-
With the advancement of technology, the Internet of Things has become a major part in our daily life. It brought up unbelievable influences, potential and growth to human’s society. IoT allows wearable devices, home appliances and software to share and communicate throughout a network using the Internet. Due to the fact that all of a user's private data will be uploaded on the Internet, we must keep an eye on security problems caused by IoT.
9p
huyetthienthan
23-11-2021
34
2
Download
-
This paper proposes a security framework for Internet of Things (IoT) based on blockchain. The solution provides the two features: (1) Access control for IoT devices, which allows users to pay a fee to the device’s owner to access the device for a certain period of time.
9p
viaespa2711
31-07-2021
26
3
Download
-
Security Evaluation Schemes:
+ ETSI 303 645 & Cybersecurity Labelling Scheme
+ Eurosmart Scheme
+ GSMA IoT Security Assessment
+ Case-study (steps & feedbacks): Vulnerability analysis of an IP Camera
Reference: Cyber Security
32p
trinhthamhodang1217
06-04-2020
1303
2
Download
-
The results obtained indicate that the attackers can overwhelm the server resources even when legitimate access was denied to MQTT brokers and resources have been restricted. In addition, the MQTT features we have identified showed high attack detection accuracy. The field size and length-based features drastically reduced the false-positive rates and are suitable in detecting IoT based attacks.
23p
nguaconbaynhay10
22-01-2021
30
3
Download
-
This paper discusses how to ensure security, i.e., confidentiality and integrity properties, for data in IoT applications. While confidentiality could be assessed via information flow analysis, integrity is ensured by error-correcting codes. In addition to errors, many communication channels also cause erasures, i.e., the demodulator cannot decide which symbol the received waveform represents. The paper proposes a method that might correct both errors and erasures together. Our method is efficient in reducing memory storage as well as decoding complexity.
7p
trinhthamhodang9
10-12-2020
16
3
Download
-
This article addresses two important IoT considerations for Ho Chi Minh City’s Smart city initiative: The need for an IoT platform and End-to-end security requirements for the IoT network. To provide context, the article will also provide background on the smart city initiative.
6p
vititan2711
13-08-2019
25
1
Download
-
Architecture of an ISO/IEC 17025 Quality Management System (QMS) for IT Security
Evaluation Labs: RASIC and Processes, General structure of the QMS documentation, Setting-up, Operating and Maintaining the QMS.
Reference: IoT security standards
9p
tradaviahe12
23-04-2019
2505
2
Download
-
This offers the capability to measure and understand environmental indicators. Building or home automation, social smart communication for enhancement of quality of life that could be considered as one of the application of IoT where the sensors, actuators and controllers can be connected to internet. IoT can be represented as a main enabling factor of promising paradigm for integration and comprehension of several technologies for communication solution, Identification and integration for tracking of technologies as wireless sensor and actuators.
5p
byphasse043256
23-03-2019
60
8
Download
CHỦ ĐỀ BẠN MUỐN TÌM
![](images/graphics/blank.gif)