Results 21 to 30 of about 186,858 (181)

Secure Cloud-Edge Deployments, with Trust [PDF]

open access: yes, 2019
Assessing the security level of IoT applications to be deployed to heterogeneous Cloud-Edge infrastructures operated by different providers is a non-trivial task. In this article, we present a methodology that permits to express security requirements for
Brogi, Antonio   +2 more
core   +2 more sources

Internet of Things for System Integrity: A Comprehensive Survey on Security, Attacks and Countermeasures for Industrial Applications

open access: yesSensors, 2021
The growth of the Internet of Things (IoT) offers numerous opportunities for developing industrial applications such as smart grids, smart cities, smart manufacturers, etc.
Nasr Abosata   +3 more
doaj   +1 more source

A Survey of Security Challenges, Attacks Taxonomy and Advanced Countermeasures in the Internet of Things

open access: yesIEEE Access, 2020
Internet of Things (IoT) facilitates the integration between objects and different sensors to provide communication among them without human intervention.
Shapla Khanam   +4 more
doaj   +1 more source

Recent Security Trends in Internet of Things: A Comprehensive Survey

open access: yesIEEE Access, 2021
The Internet of Things (IoT) aims to transform everyday physical objects into an interconnected ecosystem with digital data accessible anywhere and anytime.
Yasmine Harbi   +3 more
doaj   +1 more source

Intelligent intrusion detection in low power IoTs [PDF]

open access: yes, 2016
Security and privacy of data are one of the prime concerns in today’s Internet of Things (IoT). Conventional security techniques like signature-based detection of malware and regular updates of a signature database are not feasible solutions as they ...
Ahmadinia, Ali   +3 more
core   +1 more source

Over-the-air software updates in the internet of things : an overview of key principles [PDF]

open access: yes, 2020
Due to the fast pace at which IoT is evolving, there is an increasing need to support over-theair software updates for security updates, bug fixes, and software extensions. To this end, multiple over-the-air techniques have been proposed, each covering a
Bauwens, Jan   +4 more
core   +1 more source

A survey of security challenges, attacks in IoT [PDF]

open access: yesE3S Web of Conferences
A network of linked devices that can gather, process, and exchange data is known as the Internet of Things (IoT). It delivers several benefits such as convenience, efficiency and automation.
Prakash Ramya   +2 more
doaj   +1 more source

Towards a Security, Privacy, Dependability, Interoperability Framework for the Internet of Things [PDF]

open access: yes, 2018
A popular application of ambient intelligence systems constitutes of assisting living services on smart buildings. As intelligence is imported in embedded equipment, the system becomes able to provide smart services (e.g. control lights, airconditioning,
Alexandris, G.   +6 more
core   +1 more source

A Brief Survey on the Internet of Things (IoT) Security [PDF]

open access: yesJournal of Systemics, Cybernetics and Informatics, 2023
The Internet of Things (IoT) is considered one of the world's fastest-growing technologies, and it has a tremendous impact on people's lives in many different ways.
Abdulelah Al Hanif, Mohammad Ilyas
doaj  

IoT Privacy and Security: Challenges and Solutions

open access: yesApplied Sciences, 2020
Privacy and security are among the significant challenges of the Internet of Things (IoT). Improper device updates, lack of efficient and robust security protocols, user unawareness, and famous active device monitoring are among the challenges that IoT ...
Lo’ai Tawalbeh   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy