Results 31 to 40 of about 186,858 (181)

Internet of things security evaluation mechanism based on meta attribute fluctuation.

open access: yesPLoS ONE, 2023
In the field of Internet of Things (IoT), terminal security has always been an extremely important independent research topic. In the terminal security research, in addition to the security enhancement of terminal entities, the security status evaluation
Zhe Liu   +3 more
doaj   +1 more source

Reconfigurable Security: Edge Computing-based Framework for IoT

open access: yes, 2017
In various scenarios, achieving security between IoT devices is challenging since the devices may have different dedicated communication standards, resource constraints as well as various applications.
Chen, Jyh-Cheng   +3 more
core   +1 more source

A Practical Approach to Protect IoT Devices against Attacks and Compile Security Incident Datasets [PDF]

open access: yes, 2019
open access articleThe Internet of Things (IoT) introduced the opportunity of remotely manipulating home appliances (such as heating systems, ovens, blinds, etc.) using computers and mobile devices.
Cruz, Bruno   +5 more
core   +1 more source

Addressing the Security Gap in IoT: Towards an IoT Cyber Range

open access: yesSensors, 2020
The paradigm of Internet of Things has now reached a maturity level where the pertinent research goal is the successful application of IoT technologies in systems of high technological readiness level. However, while basic aspects of IoT connectivity and
Oliver Nock   +2 more
doaj   +1 more source

IoT Sentinel: Automated Device-Type Identification for Security Enforcement in IoT

open access: yes, 2016
With the rapid growth of the Internet-of-Things (IoT), concerns about the security of IoT devices have become prominent. Several vendors are producing IP-connected devices for home and small office networks that often suffer from flawed security designs ...
Asokan, N.   +6 more
core   +1 more source

Security Attacks on IoT

open access: yes2017 International Conference on Computer Science and Engineering (UBMK), 2017
This study includes what the concept of IoT (Internet of Objects) expresses conceptually. It is stated that there are three generally accepted layers even though IoT does not have a complete layer structure. These layers are; Object layer, Network layer and Application layer.
Okul, S., Aydin, M. Ali
openaire   +2 more sources

MagicPairing: Apple's Take on Securing Bluetooth Peripherals

open access: yes, 2020
Device pairing in large Internet of Things (IoT) deployments is a challenge for device manufacturers and users. Bluetooth offers a comparably smooth trust on first use pairing experience. Bluetooth, though, is well-known for security flaws in the pairing
Antonioli Daniele   +4 more
core   +1 more source

Modeling and verifying based on timed automata of Internet of things gateway security system

open access: yesTongxin xuebao, 2018
The Internet of things (IoT) is a multiple heterogeneous network,and its perception layer is often faced with various security threats.As the bridge between the perception layer and the network layer,the IoT gateway should have the security management ...
Guoqing WANG   +4 more
doaj   +2 more sources

A blockchain future for internet of things security: a position paper

open access: yesDigital Communications and Networks, 2018
Internet of Things (IoT) devices are increasingly being found in civilian and military contexts, ranging from smart cities and smart grids to Internet-of-Medical-Things, Internet-of-Vehicles, Internet-of-Military-Things, Internet-of-Battlefield-Things ...
Mandrita Banerjee   +2 more
doaj   +1 more source

Analysis of research results of different aspects of network security and Internet of Things under the background of big data

open access: yesOpen Computer Science, 2023
With the continuous development of big data (BD) and Internet of Things (IoT) technology, research in the fields of network security and IoT is also deepening. Big data provides more data support for network security and the IoT, while also bringing more
Lu Yinglun   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy