Results 41 to 50 of about 189,755 (274)
Community-Based Security for the Internet of Things
With more and more devices becoming connectable to the internet, the number of services but also a lot of threats increases dramatically. Security is often a secondary matter behind functionality and comfort, but the problem has already been recognized ...
Börgers +12 more
core +1 more source
Quantitative Analysis of DoS Attacks and Client Puzzles in IoT Systems
Denial of Service (DoS) attacks constitute a major security threat to today's Internet. This challenge is especially pertinent to the Internet of Things (IoT) as devices have less computing power, memory and security mechanisms to mitigate DoS attacks ...
B Aziz +6 more
core +1 more source
Secure Cloud-Edge Deployments, with Trust [PDF]
Assessing the security level of IoT applications to be deployed to heterogeneous Cloud-Edge infrastructures operated by different providers is a non-trivial task. In this article, we present a methodology that permits to express security requirements for
Brogi, Antonio +2 more
core +2 more sources
Modeling and verifying based on timed automata of Internet of things gateway security system
The Internet of things (IoT) is a multiple heterogeneous network,and its perception layer is often faced with various security threats.As the bridge between the perception layer and the network layer,the IoT gateway should have the security management ...
Guoqing WANG +4 more
doaj +2 more sources
A blockchain future for internet of things security: a position paper
Internet of Things (IoT) devices are increasingly being found in civilian and military contexts, ranging from smart cities and smart grids to Internet-of-Medical-Things, Internet-of-Vehicles, Internet-of-Military-Things, Internet-of-Battlefield-Things ...
Mandrita Banerjee +2 more
doaj +1 more source
This review highlights recent advances in smart face masks that actively monitor breathing. By integrating humidity, gas, temperature, pressure, strain, and triboelectric sensors, these masks track key respiratory parameters in real time. The article summarizes sensor mechanisms, compares performance across studies, and discusses challenges and future ...
Negin Faramarzi +7 more
wiley +1 more source
Comprehensive Review of Security Requirements for Mitigating Threats and Attacks on IoT Assets
Machine learning and artificial intelligence are increasingly being utilized to automate identifying and defining security requirements (SR) and addressing diverse IoT security issues.
Aftab Alam Janisar +4 more
doaj +1 more source
Implementation of Sensing and Actuation Capabilities for IoT Devices Using oneM2M Platforms
In this paper, we present an implementation work of sensing and actuation capabilities for IoT devices using the oneM2M standard-based platforms. We mainly focus on the heterogeneity of the hardware interfaces employed in IoT devices.
Jaeseok Yun +3 more
doaj +1 more source
A Systemic Approach for IoT Security [PDF]
In this paper we want to explore a new approach for security mechanisms design and deployment in the context of Internet of Things (IoT). We claim that the usual approach to security issues, typical of more classical systems and networks, does not grab all the aspects related to this new paradigm of communication, sharing and actuation.
Arbia Riahi +4 more
openaire +1 more source
Bioinspired Adaptive Sensors: A Review on Current Developments in Theory and Application
This review comprehensively summarizes the recent progress in the design and fabrication of sensory‐adaptation‐inspired devices and highlights their valuable applications in electronic skin, wearable electronics, and machine vision. The existing challenges and future directions are addressed in aspects such as device performance optimization ...
Guodong Gong +12 more
wiley +1 more source

