Results 11 to 20 of about 489,142 (204)

IoT Expunge [PDF]

open access: yesProceedings of the Tenth ACM Conference on Data and Application Security and Privacy, 2020
This paper has been accepted in 10th ACM Conference on Data and Application Security and Privacy (CODASPY ...
Panwar, Nisha   +5 more
openaire   +2 more sources

IoT

open access: yes, 2022
IoT has become a popular term in technology industries, which defines the network of different objects with any kind of sensors, software, and other technologies. Through IOT, things or object can exchange generated data over the internet. Cohesive Objects generates massive volume of data.
Ricardo Correia   +2 more
  +5 more sources

IoT Mashups [PDF]

open access: yesProceedings of the International Conference on Future Networks and Distributed Systems, 2017
Internet of Things (IoT) addresses the challenge to provide a transparent access to a huge number of IoT resources that can be either physical devices or just data resources. Moreover, because of the large number of resource-constrained devices and the dynamic nature of IoT environments, integrating the resulted data becomes a non trivial task.
Boulakbech, Marwa   +4 more
openaire   +3 more sources

Security and Privacy for Green IoT-based Agriculture: Review, Blockchain solutions, and Challenges [PDF]

open access: yes, 2020
open access articleThis paper presents research challenges on security and privacy issues in the field of green IoT-based agriculture. We start by describing a four-tier green IoT-based agriculture architecture and summarizing the existing surveys that ...
Derhab, Abdelouahid   +4 more
core   +1 more source

IoT Security Vulnerabilities and Predictive Signal Jamming Attack Analysis in LoRaWAN [PDF]

open access: yes, 2020
Internet of Things (IoT) gains popularity in recent times due to its flexibility, usability, diverse applicability and ease of deployment. However, the issues related to security is less explored. The IoT devices are light weight in nature and have low
Bhowmik, Deepayan   +2 more
core   +3 more sources

Dynamic real-time risk analytics of uncontrollable states in complex internet of things systems, cyber risk at the edge [PDF]

open access: yes, 2020
The Internet of Things (IoT) triggers new types of cyber risks. Therefore, the integration of new IoT devices and services requires a self-assessment of IoT cyber security posture.
Ani, Uchenna   +9 more
core   +3 more sources

Enabling IoT ecosystems through platform interoperability [PDF]

open access: yes, 2017
Today, the Internet of Things (IoT) comprises vertically oriented platforms for things. Developers who want to use them need to negotiate access individually and adapt to the platform-specific API and information models.
Anicic, Darko   +9 more
core   +2 more sources

Improve the Sustainability of Internet of Things Through Trading-based Value Creation [PDF]

open access: yes, 2014
Internet of Things (IoT) has been widely discussed over the past few years in technology point of view. However, the social aspects of IoT are seldom studied to date. In this paper, we discuss the IoT in social point of view. Specifically, we examine the
Perera, Charith, Zaslavsky, Arkady
core   +4 more sources

On the feasibility of attribute-based encryption on Internet of Things devices [PDF]

open access: yes, 2016
Attribute-based encryption (ABE) could be an effective cryptographic tool for the secure management of Internet of Things (IoT) devices, but its feasibility in the IoT has been under-investigated thus far.
AMbrosin, M   +6 more
core   +3 more sources

Integration of heterogeneous devices and communication models via the cloud in the constrained internet of things [PDF]

open access: yes, 2015
As the Internet of Things continues to expand in the coming years, the need for services that span multiple IoT application domains will continue to increase in order to realize the efficiency gains promised by the IoT. Today, however, service developers
Demeester, Piet   +3 more
core   +3 more sources

Home - About - Disclaimer - Privacy