The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
eHealth is a technology that is growing in importance over time, varying from remote access to Medical Records, such as Electronic Health Records (EHR), or Electronic Medical Records (EMR), to real-time data exchange from different on-body sensors coming from different patients. With this huge amount of critical data being exchanged, problems and challenges arise. Privacy and confidentiality of this...
During the development and expansion of Internet of Things (IoT), main challenges needing to be addressed are the heterogeneity, interoperability, scalability, flexibility and security of IoT applications. In this paper, we view IoT as a large-scale distributed cyber-physical-social complex network. From that perspective, the above challenges are analyzed. Then, we propose a distributed multi-agent...
There are billions of Internet of things (IoT) devices connecting to the Internet and the number is increasing. As a still ongoing technology, IoT can be used in different fields, such as agriculture, healthcare, manufacturing, energy, retailing and logistics. IoT has been changing our world and the way we live and think. However, IoT has no uniform architecture and there are different kinds of attacks...
The Internet Of Things (IoT) is poised to make substantial inroads in all aspects of modern life before the end of this decade, including applications in smart grids, smart cities, transportation, crowdsensing, e-health, ambient assisted living, and home automation, to list just a few. Although it is recognized that IoTSec mechanisms and principles are needed across the entire IoT ecosystem, many...
The number of connected Internet of Things (IoT) devices was about 8.9 billion in 2012 and it is statistically estimated to grow up to 50 billion devices in the beginning of 2020. The security of the IoT plays an important role in the correct and advantageous functionality of the interconnected devices. For efficiency considerations, some of the IoT data processing is optimal to be implemented in...
The paper presents an example Sensor-cloud architecture that integrates security as its native ingredient. It is based on the multi-layer client-server model with separation of physical and virtual instances of sensors, gateways, application servers and data storage. It proposes the application of virtualised sensor nodes as a prerequisite for increasing security, privacy, reliability and data protection...
Smart Internet of Things (IoT) applications will rely on advanced IoT platforms that not only provide access to IoT sensors and actuators, but also provide access to cloud services and data analytics. Future IoT platforms should thus provide connectivity and intelligence. One approach to connecting IoT devices, IoT networks to cloud networks and services is to use network federation mechanisms over...
The explosive proliferation of smart devices and cloud computing has ushered the era of Cyberphysical Systems (CPS), a congruence of physical dynamical systems with the cyberspace. The success of deploying an Internet of Things (IoT) interconnecting billions of devices relies heavily upon making the right choices in revisiting traditional architectures for networked control and information processing...
As an enabler of sustainable and innovative progress in wide range of applications from automotive to IoT, embedded non-volatile memory (eNVM) including embedded Flash (eFlash) has been and will be playing key roles. To meet more stringent and/or diversified requirements while overcoming many challenges along with memory cell scaling, hierarchical optimization in eNVM design from memory cell to hard...
This article looks at some of the challenges related to the deployment of the Internet Of Things (IoT), specifically to ascertain that security becomes an integral part of the technology rather than a bolted-on wrapper of limited efficacy. IoT security (IoTSec) is needed at all ‘layers’ of the IoT environment and may be specific to the IoT ‘layer’ in question.
Cognitive radio (CR) technologies provide the required infrastructure to achieve dynamic spectrum access (DSA) which is a promising approach to increase spectral utilization in next generation (xG) wireless network. DSA allows CR to operate on the best available channel. This paper focuses on spectrum management in next generation wireless networks that employ DSA. In particular, this paper presents...
Cloud computing and big data analysis are gaining lots of interest across a range of applications including disaster management. These two technologies together provide the capability of real-time data analysis not only to detect emergencies in disaster areas, but also to rescue the affected people. This paper presents a framework that supports emergency event detection and alert generation by analyzing...
Cloud computing is gaining more and more popularity due to the wide use of the Internet. It can now be integrated into vehicle applications to enhance mobility, preventing accidents, improve safety, and improve driving comfort. In this paper, we propose a secure architecture of inter-vehicle communication which is obtained from a cloud services, including architecture level, communication level and...
The paper proposes a distributed architecture to monitor spectrum occupancy status through the use of Software Defined Radios (SDRs). Such a monitoring process is useful in order to fulfill a geolocation database, whose consultation is a mandatory task for license-exempt devices operating under the IEEE 802.22 standard rules. Moreover, the system is thought for a dual use scenarios: it can be enforced...
To support emerging applications in autonomous and semi-autonomous driving, next-generation automotive systems will be equipped with an increasing number of heterogeneous components (sensors, actuators and computation units connected through various buses), and have to process a high volume of data to percept the environment accurately and efficiently. Challenges for such systems include system integration,...
The overabundance of attacks reported on in-vehicle networks triggered reactions from both the academic research communities and industry professionals. However, designing security for in-vehicle networks is a challenging task and it is yet unclear to what extent current proposals are suitable for real world vehicles. In this work, we advocate the use of a top-down approach in which we analyze the...
Network centric warfare has been serving the defence mechanism since last few decades. Contemporary network oriented solutions exhibit vertical silos which lack in inefficient connected approach. Internet of Things holds the key potential to interconnect the battlefield with the digital world in ways that promise to fundamentally change military operations. This study proposes a novel architectural...
WoT (Web of Things) integrates smart devices into Web by reusing and extending Web standards. While Web technology makes the developers’ job easier, it faces security, management and efficiency challenges. We propose WoT/SDN, the architecture of resource oriented WoT built on SDN (Software Defined Network), in which applications could be developed through resource subscription and Mashup with the...
Managing a home server within individual house is a major obstacle to practical use of home network system (HNS). Delegating the home server to a cloud is a promising approach. However, the conventional multitenant SaaS-based solution has the following risks among different households: security/privacy violation, failure propagation and insufficient resource demand. In this paper, we propose a novel...
Applying of network security situation awareness in smart substations provides a high level view to understand the security situation of substations. After analyzing security threats faced by smart substations, this paper not only proposes a security situation awareness framework from aspects of physical security, network security, system security, protocol security and data security, but also puts...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.