• Aucun résultat trouvé

[PDF] Top 20 Security in internet of things

Has 10000 "Security in internet of things" found on our website. Below are the top 20 most common "Security in internet of things".

Security in internet of things

Security in internet of things

... The Internet of Things (IoT) is an emerging wave of Internet that has drawn a lot of attention in recent ...change of community life where things in ... Voir le document complet

138

Towards a Context-Aware Security and Privacy as a Service in the Internet of Things

Towards a Context-Aware Security and Privacy as a Service in the Internet of Things

... one of the most known Internet of Things (IoT) ...However, security and privacy issues are slowing down their adoption. In addition, the characteristics of IoT devices, ... Voir le document complet

13

Authenticated and Privacy-Preserving Consent Management in the Internet of Things

Authenticated and Privacy-Preserving Consent Management in the Internet of Things

... autonomy in self-managing its security with regard to several service providers and to secure consent proof generation, we selected the hierarchical identity-based cryptography (HIBC) [ 7 ...(PKG) in ... Voir le document complet

9

Lightweight serverless protocols for the internet of things

Lightweight serverless protocols for the internet of things

... the security protocols must meet the resource requirements for pervasive devices they are running ...different security protocols for pervasive systems with varying implementation choices suiting different ... Voir le document complet

171

Securing the Internet of Things (IoT)

Securing the Internet of Things (IoT)

... publisher of computer security software, is a trusted partner in this ecosystem of cybersecurity solutions by protecting datacenters and virtual machines hosted by cloud service providers with ... Voir le document complet

6

Monitoring the Internet of Things (IoT) Networks

Monitoring the Internet of Things (IoT) Networks

... propose in a se- cond contribution a three-phase centralized monitoring placement and scheduling approach ; to optimally assign Vertex Covers to time ...subsets of potential monitors by solving a minimal ... Voir le document complet

120

Trust Management in Social Internet of Things: A Survey

Trust Management in Social Internet of Things: A Survey

... Social Internet of Things is a new paradigm where Internet of Things merges with Social Networks, allowing people and devices to interact, facilitating information sharing and ... Voir le document complet

13

Industrial Internet of Things: Specificities and Challenges

Industrial Internet of Things: Specificities and Challenges

... Atlantique in Rennes, ...University of Bristol. He received his Ph.D. from University of Strasbourg, in 2015 with ...involved in the organization committee of many international ... Voir le document complet

7

A Cognitive Protection System for the Internet of Things

A Cognitive Protection System for the Internet of Things

... functional, security and safety ...specification in realtime in order to detect computational attacks modifying application or system code or data ...concept of a Runtime Security ... Voir le document complet

18

Cryptographic mechanisms for device authentication and attestation in the internet of things

Cryptographic mechanisms for device authentication and attestation in the internet of things

... the Internet of Things (IoT) ecosystem requires developing new security mechanisms and frameworks, adapted to this new decentralized ...architecture. Internet of Things ... Voir le document complet

190

Comparison of the Device Lifetime in Wireless Networks for the Internet of Things

Comparison of the Device Lifetime in Wireless Networks for the Internet of Things

... transmission of a single 12-byte data packet ...ogy). In the previous section, we have assumed data packets without security for all technologies, but to set up a fair comparison, we have added an ... Voir le document complet

19

Towards Model-Based Communication Control for the Internet of Things

Towards Model-Based Communication Control for the Internet of Things

... inconsistent security specifica- ...as in model-driven security [1,20]. MDE can help in designing correct communica- tions and secure systems by abstracting network and security ... Voir le document complet

13

A semantic-based discovery service for the Internet of Things

A semantic-based discovery service for the Internet of Things

... strategy of distributing repositories and providing asynchronous search process can be promising to resource discovery in ...observed in IoT, with low bandwidth, high laten- cies, lossy network ... Voir le document complet

15

Collaborative security for the internet of things

Collaborative security for the internet of things

... values. In the first-hand information based models, the system relies only on its direct observations and own experiences to update nodes trust values as in ...trustworthiness of relay ... Voir le document complet

122

IoTChain: A Blockchain Security Architecture for the Internet of Things

IoTChain: A Blockchain Security Architecture for the Internet of Things

... copy of at least the last n blocks. In our architecture, the authorization servers, key servers, and clients act as nodes, although not all of them necessarily store the whole blockchain and par- ... Voir le document complet

7

OSCAR: Object Security Architecture for the Internet of Things

OSCAR: Object Security Architecture for the Internet of Things

... subset of those supported by a resource rich ...as in the IoT case, the motivation for the attack fades away. One of our goals is to offload the burden of authentication from constrained ... Voir le document complet

11

Dead reckoning : where we stand on privacy and security controls for the Internet of Things

Dead reckoning : where we stand on privacy and security controls for the Internet of Things

... lack of command and control regulation has been shown to lead to consumer harms like economic and racial discrimination in the healthcare and insurance ...domains.[74][150][171] In 2013, The Privacy ... Voir le document complet

218

Chaos-based security under real-time and energy constraints for the Internet of Things

Chaos-based security under real-time and energy constraints for the Internet of Things

... Progress in mobile and wireless technologies, coupled with embedded devices, has led to giving rise to the notion of ubiquitous ...vision of Mark Weiser in his article "The Computer ... Voir le document complet

181

Harmonic Reflection Amplifier for Widespread Backscatter Internet-of-Things

Harmonic Reflection Amplifier for Widespread Backscatter Internet-of-Things

... TRANSACTIONS OF MICROWAVE THEORY AND TECHNIQUES 1 Abstract— The highly power-efficient Backscattering communication scheme holds solid potentials to lead the Internet of Things ... Voir le document complet

13

Enabling the Social Internet of Things and Social Cloud

Enabling the Social Internet of Things and Social Cloud

... Abstract—Social Internet of Things are changing what social patterns can be, and will bring unprecedented online and offline social ...network in order to cooperatively provide computing ... Voir le document complet

5

Show all 10000 documents...