Results 31 to 40 of about 189,755 (274)
Users increasingly rely on Internet of Things (IoT) apps to manage their digital lives through the overwhelming diversity of IoT services and devices. Are the IoT app platforms doing enough to protect the privacy and security of their users? By securing IoT apps, how can we help users reclaim control over their data?
Musard Balliu +2 more
openaire +2 more sources
Towards a Security, Privacy, Dependability, Interoperability Framework for the Internet of Things [PDF]
A popular application of ambient intelligence systems constitutes of assisting living services on smart buildings. As intelligence is imported in embedded equipment, the system becomes able to provide smart services (e.g. control lights, airconditioning,
Alexandris, G. +6 more
core +1 more source
A Brief Survey on the Internet of Things (IoT) Security [PDF]
The Internet of Things (IoT) is considered one of the world's fastest-growing technologies, and it has a tremendous impact on people's lives in many different ways.
Abdulelah Al Hanif, Mohammad Ilyas
doaj
Reconfigurable Security: Edge Computing-based Framework for IoT
In various scenarios, achieving security between IoT devices is challenging since the devices may have different dedicated communication standards, resource constraints as well as various applications.
Chen, Jyh-Cheng +3 more
core +1 more source
IoT Privacy and Security: Challenges and Solutions
Privacy and security are among the significant challenges of the Internet of Things (IoT). Improper device updates, lack of efficient and robust security protocols, user unawareness, and famous active device monitoring are among the challenges that IoT ...
Lo’ai Tawalbeh +3 more
doaj +1 more source
Internet of things security evaluation mechanism based on meta attribute fluctuation.
In the field of Internet of Things (IoT), terminal security has always been an extremely important independent research topic. In the terminal security research, in addition to the security enhancement of terminal entities, the security status evaluation
Zhe Liu +3 more
doaj +1 more source
RADIS: Remote Attestation of Distributed IoT Services [PDF]
Remote attestation is a security technique through which a remote trusted party (i.e., Verifier) checks the trustworthiness of a potentially untrusted device (i.e., Prover).
Conti, Mauro +2 more
core +2 more sources
Addressing the Security Gap in IoT: Towards an IoT Cyber Range
The paradigm of Internet of Things has now reached a maturity level where the pertinent research goal is the successful application of IoT technologies in systems of high technological readiness level. However, while basic aspects of IoT connectivity and
Oliver Nock +2 more
doaj +1 more source
Internet of Things: Survey on Security and Privacy
The Internet of Things (IoT) is intended for ubiquitous connectivity among different entities or "things". While its purpose is to provide effective and efficient solutions, security of the devices and network is a challenging issue.
Mendez, Diego M. +2 more
core +1 more source
A Practical Approach to Protect IoT Devices against Attacks and Compile Security Incident Datasets [PDF]
open access articleThe Internet of Things (IoT) introduced the opportunity of remotely manipulating home appliances (such as heating systems, ovens, blinds, etc.) using computers and mobile devices.
Cruz, Bruno +5 more
core +1 more source

