Results 31 to 40 of about 189,755 (274)

Securing IoT Apps

open access: yesIEEE Security & Privacy, 2019
Users increasingly rely on Internet of Things (IoT) apps to manage their digital lives through the overwhelming diversity of IoT services and devices. Are the IoT app platforms doing enough to protect the privacy and security of their users? By securing IoT apps, how can we help users reclaim control over their data?
Musard Balliu   +2 more
openaire   +2 more sources

Towards a Security, Privacy, Dependability, Interoperability Framework for the Internet of Things [PDF]

open access: yes, 2018
A popular application of ambient intelligence systems constitutes of assisting living services on smart buildings. As intelligence is imported in embedded equipment, the system becomes able to provide smart services (e.g. control lights, airconditioning,
Alexandris, G.   +6 more
core   +1 more source

A Brief Survey on the Internet of Things (IoT) Security [PDF]

open access: yesJournal of Systemics, Cybernetics and Informatics, 2023
The Internet of Things (IoT) is considered one of the world's fastest-growing technologies, and it has a tremendous impact on people's lives in many different ways.
Abdulelah Al Hanif, Mohammad Ilyas
doaj  

Reconfigurable Security: Edge Computing-based Framework for IoT

open access: yes, 2017
In various scenarios, achieving security between IoT devices is challenging since the devices may have different dedicated communication standards, resource constraints as well as various applications.
Chen, Jyh-Cheng   +3 more
core   +1 more source

IoT Privacy and Security: Challenges and Solutions

open access: yesApplied Sciences, 2020
Privacy and security are among the significant challenges of the Internet of Things (IoT). Improper device updates, lack of efficient and robust security protocols, user unawareness, and famous active device monitoring are among the challenges that IoT ...
Lo’ai Tawalbeh   +3 more
doaj   +1 more source

Internet of things security evaluation mechanism based on meta attribute fluctuation.

open access: yesPLoS ONE, 2023
In the field of Internet of Things (IoT), terminal security has always been an extremely important independent research topic. In the terminal security research, in addition to the security enhancement of terminal entities, the security status evaluation
Zhe Liu   +3 more
doaj   +1 more source

RADIS: Remote Attestation of Distributed IoT Services [PDF]

open access: yes, 2019
Remote attestation is a security technique through which a remote trusted party (i.e., Verifier) checks the trustworthiness of a potentially untrusted device (i.e., Prover).
Conti, Mauro   +2 more
core   +2 more sources

Addressing the Security Gap in IoT: Towards an IoT Cyber Range

open access: yesSensors, 2020
The paradigm of Internet of Things has now reached a maturity level where the pertinent research goal is the successful application of IoT technologies in systems of high technological readiness level. However, while basic aspects of IoT connectivity and
Oliver Nock   +2 more
doaj   +1 more source

Internet of Things: Survey on Security and Privacy

open access: yes, 2017
The Internet of Things (IoT) is intended for ubiquitous connectivity among different entities or "things". While its purpose is to provide effective and efficient solutions, security of the devices and network is a challenging issue.
Mendez, Diego M.   +2 more
core   +1 more source

A Practical Approach to Protect IoT Devices against Attacks and Compile Security Incident Datasets [PDF]

open access: yes, 2019
open access articleThe Internet of Things (IoT) introduced the opportunity of remotely manipulating home appliances (such as heating systems, ovens, blinds, etc.) using computers and mobile devices.
Cruz, Bruno   +5 more
core   +1 more source

Home - About - Disclaimer - Privacy