• Aucun résultat trouvé

[PDF] Top 20 Collaborative security for the internet of things

Has 10000 "Collaborative security for the internet of things" found on our website. Below are the top 20 most common "Collaborative security for the internet of things".

Collaborative security for the internet of things

Collaborative security for the internet of things

... need for hardware implementation; however, it induces an extra communication overhead in the network due to the large number of reported ...securing the payment packet routing process ... Voir le document complet

122

Chaos-based security under real-time and energy constraints for the Internet of Things

Chaos-based security under real-time and energy constraints for the Internet of Things

... to the notion of ubiquitous computing. The vision of Mark Weiser in his article "The Computer of the 21 st Century", according to which "the most ... Voir le document complet

181

IoTChain: A Blockchain Security Architecture for the Internet of Things

IoTChain: A Blockchain Security Architecture for the Internet of Things

... Recently, the Internet Engineering Task Force (IETF) ACE [2] working group has proposed a generic framework for authentication and authorization in constrained ...tracking the temperature. ... Voir le document complet

7

Dead reckoning : where we stand on privacy and security controls for the Internet of Things

Dead reckoning : where we stand on privacy and security controls for the Internet of Things

... and the Con- sumer Technology Association [106], a lack of command and control regulation has been shown to lead to consumer harms like economic and racial discrimination in the healthcare and ... Voir le document complet

218

OSCAR: Object Security Architecture for the Internet of Things

OSCAR: Object Security Architecture for the Internet of Things

... that the connection-oriented trust model is not the best fit for the actual needs of ...sorts of connection time tweaking and keep-alive messages we could squeeze in ... Voir le document complet

11

Monitoring the Internet of Things (IoT) Networks

Monitoring the Internet of Things (IoT) Networks

... periods. The first phase is responsible for compu- ting several subsets of potential monitors by solving a minimal Vertex Cover Problem ; by proposing a Constraint Generation ...algorithm. The ... Voir le document complet

120

Towards a Context-Aware Security and Privacy as a Service in the Internet of Things

Towards a Context-Aware Security and Privacy as a Service in the Internet of Things

... and the hospitals healthcare system prior to any data ...Finally, the architecture should be virtualized and deployed as a ...denial of service). The role of Security Management ... Voir le document complet

13

Securing the Internet of Things (IoT)

Securing the Internet of Things (IoT)

... Abstract— Internet of Things is a large network of interconnected ...to the exchange of data and information from real world devices to the ...only the ... Voir le document complet

6

A Cognitive Protection System for the Internet of Things

A Cognitive Protection System for the Internet of Things

... methodology for industrial control systems based upon computing and physical plant behavior and using deductive synthesis to enforce functional, security and safety ...is the concept of a ... Voir le document complet

18

Lightweight certificateless and provably-secure signcryptosystem for the internet of things

Lightweight certificateless and provably-secure signcryptosystem for the internet of things

... in the signcryption schemes based on the Diffie-Hellman ...Most of the signcryption schemes are derived from popular signature ...validate the non-repudiation and does not provide ... Voir le document complet

9

Cryptographic mechanisms for device authentication and attestation in the internet of things

Cryptographic mechanisms for device authentication and attestation in the internet of things

... in Internet of Things (IoT) applications are increasingly becoming the targets of attacks due to their limited resources and ...and the secure authentication of the ... Voir le document complet

190

Towards Model-Based Communication Control for the Internet of Things

Towards Model-Based Communication Control for the Internet of Things

... enforces the policy at various points of the network ...in the broker and things’ internal behavior may be ...formalize the model transformations of ThingML models using ... Voir le document complet

13

A semantic-based discovery service for the Internet of Things

A semantic-based discovery service for the Internet of Things

... that the strategy of distributing repositories and providing asynchronous search process can be promising to resource discovery in ...to the ones observed in IoT, with low bandwidth, high laten- ... Voir le document complet

15

Comparison of the Device Lifetime in Wireless Networks for the Internet of Things

Comparison of the Device Lifetime in Wireless Networks for the Internet of Things

... validate the analyzer for long range technologies, we have compared its output with the values measured by Martinez ...[17] for transmission of a single 12-byte data packet (i.e. ... Voir le document complet

19

Hybrid Wireless Protocols for the Internet Of Things

Hybrid Wireless Protocols for the Internet Of Things

... extension of Bluetooth for the WPAN. The BLE allows to have lower consumption to the detriment of the bit rate and to the detriment of the ...However ... Voir le document complet

6

Security in internet of things

Security in internet of things

... Formal security verification using AVISPA In this section, we formally verify our proposed scheme using automated validation of Internet security protocols and applications (AVISPA) ... Voir le document complet

138

Lightweight serverless protocols for the internet of things

Lightweight serverless protocols for the internet of things

... Basically, the security protocols must meet the resource requirements for pervasive devices they are running ...different security protocols for pervasive systems with varying ... Voir le document complet

171

Harmonic Reflection Amplifier for Widespread Backscatter Internet-of-Things

Harmonic Reflection Amplifier for Widespread Backscatter Internet-of-Things

... work of the proposed design is carried out in the Advance Design System (ADS) by building the Symbolically Defined Device (SDD) model of tunnel diode from its IV ...characteristics. ... Voir le document complet

13

A Dynamic Visual Simulation Environment for Internet of Things

A Dynamic Visual Simulation Environment for Internet of Things

... located. The realism and the quality of the simulation are mainly driven by parameters like graphics quality, real time computing , physics engine integration, etc… In the context ... Voir le document complet

11

Appliance Recognition on Internet-of-Things Devices

Appliance Recognition on Internet-of-Things Devices

... following the Internet-of- Things (IoT) paradigm by relying on well known IP tech- ...spite of increasing capabilities, those devices are still performing simple tasks such as sense and ... Voir le document complet

3

Show all 10000 documents...