Results 21 to 30 of about 189,755 (274)

A lightweight IoT security protocol [PDF]

open access: yes2017 1st Cyber Security in Networking Conference (CSNet), 2017
The IoT is a technology that enables the inter-connection of smart physical and virtual objects and provides advanced services. Objects or things are generally constrained devices which are limited by their energy, computing and storage capacity. A Wireless Sensor Networks (WSN) is a network composed of devices managed by a CPAN (Personal Area Network ...
Hammi, Mohamed   +4 more
openaire   +2 more sources

Сryptocurrency and Internet of Things: Problems of Implementation and Realization [PDF]

open access: yes, 2018
IoT (Internet of Things) requires the implementation of digital encryption of information, transaction support and recording of all events for security. It can provide cryptocurrencies protocols with adding an additional possibility of payments.
Kopytko, Vasyl   +4 more
core   +2 more sources

A Survey of Security Challenges, Attacks Taxonomy and Advanced Countermeasures in the Internet of Things

open access: yesIEEE Access, 2020
Internet of Things (IoT) facilitates the integration between objects and different sensors to provide communication among them without human intervention.
Shapla Khanam   +4 more
doaj   +1 more source

Internet of Things for System Integrity: A Comprehensive Survey on Security, Attacks and Countermeasures for Industrial Applications

open access: yesSensors, 2021
The growth of the Internet of Things (IoT) offers numerous opportunities for developing industrial applications such as smart grids, smart cities, smart manufacturers, etc.
Nasr Abosata   +3 more
doaj   +1 more source

Recent Security Trends in Internet of Things: A Comprehensive Survey

open access: yesIEEE Access, 2021
The Internet of Things (IoT) aims to transform everyday physical objects into an interconnected ecosystem with digital data accessible anywhere and anytime.
Yasmine Harbi   +3 more
doaj   +1 more source

Intelligent intrusion detection in low power IoTs [PDF]

open access: yes, 2016
Security and privacy of data are one of the prime concerns in today’s Internet of Things (IoT). Conventional security techniques like signature-based detection of malware and regular updates of a signature database are not feasible solutions as they ...
Ahmadinia, Ali   +3 more
core   +1 more source

Security Attacks on IoT

open access: yes2017 International Conference on Computer Science and Engineering (UBMK), 2017
This study includes what the concept of IoT (Internet of Objects) expresses conceptually. It is stated that there are three generally accepted layers even though IoT does not have a complete layer structure. These layers are; Object layer, Network layer and Application layer.
Okul, S., Aydin, M. Ali
openaire   +2 more sources

ViotSOC: Controlling Access to Dynamically Virtualized IoT Services using Service Object Capability [PDF]

open access: yes, 2017
Virtualization of Internet of Things(IoT) is a concept of dynamically building customized high-level IoT services which rely on the real time data streams from low-level physical IoT sensors.
Jin, Jiong, Keoh, Sye Loong, Ko, Hajoon
core   +1 more source

Enhancing Security of 5G-Enabled IoT Systems through Advanced Authentication Mechanisms: A Multifaceted Approach

open access: yesUMYU Scientifica Journal, 2023
The Internet of Things (IoT) has revolutionized device communications, offering unprecedented efficiency and convenience. However, the widespread adoption of IoT has raised significant security concerns, emphasizing the need for robust security measures.
Umar Maiwada Danjuma   +3 more
doaj   +1 more source

A survey of security challenges, attacks in IoT [PDF]

open access: yesE3S Web of Conferences
A network of linked devices that can gather, process, and exchange data is known as the Internet of Things (IoT). It delivers several benefits such as convenience, efficiency and automation.
Prakash Ramya   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy