The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Advances in computation, sensing, and networking have led to interest in the Internet of Things (IoT) and cyber-physical systems (CPS). Developments concerning the IoT and CPS will improve critical infrastructure, vehicle networks, and personal health products. Unfortunately, these systems are vulnerable to attack. Advanced persistent threats (APTs) are a class of long-term attacks in which well-resourced...
In the field of health, networked medical devices are closely intertwined in the structure of the Internet of things. A healthcare IoT infrastructure with a brief description of each component is presented. These components are a device with a reader, Cloud, healthcare provider and communication channel. As the title implies the paper presents simple cases with a few models of healthcare IoT system...
Internet of Things (IoT) can be perceived as enabling user-specific interoperable communication services by integration of sensing and actuation technologies with other leading technologies, such as telecommunication, networking, security and cloud computing etc. Application of the ubiquitous IoT technologies to augment healthcare systems inadvertently exposes the latter to unpredictable, disruptive...
Network-based deployments within the Internet of Things increasingly rely on the cloud-controlled federation of individual networks to configure, authorize, and manage devices across network borders. While this approach allows the convenient and reliable interconnection of networks, it raises severe security and safety concerns. These concerns range from a curious cloud provider accessing confidential...
A new era of automated services has permeated user's daily lives thanks to paradigms such as Smart City and the Internet of Things. This shift from traditional applications is possible due to the massive amount of heterogeneous devices that constitute the Internet of Things. To provide newly improved characteristics to these services, such as mobility support, high resilience, and low latency, an...
Internet of Things (IoT) as a service is the ultimate goal of employing cloud computing paradigm for initiating IoT application scenarios. Due to the nature of IoT ecosystems, an IoT application should be distributed, programmable and autonomic; also, it requires to support heterogeneity, security and privacy by following design patterns involved in creating IoT systems. A multi-layer cloud architecture...
Smart IoT applications require connecting multiple IoT devices and networks with multiple services running in fog and cloud computing platforms. One approach to connecting IoT devices with cloud and fog services is to create a federated virtual network. The main benefit of this approach is that IoT devices can then interact with multiple remote services using an application specific federated network...
The Internet of Things (IoT) is the ever-growing network of physical devices with IP addresses for Internet connectivity. Due to its ubiquitous nature and distributed architecture which includes devices, applications and humans, it presents a complex structure for security. Also, the incorporation of thousands of heterogeneous IoT devices with different characteristics into a single network creates...
Recently, IoT (Internet of Things) security is a critical issue while IoT is a big trend where a huge number of devices would be connected to the Internet. We focus on protecting physical devices from illegal access by intruders and give basic analysis for fundamental gaps between physical devices and embedded IoT softwares. We clarify that the critical difficulty in IoT security is implementing both...
Ubiquitous learning environments have an increasing trend considering the huge number of connected smart devices dedicated to educational services. Ubiquitous learning (U-learning) provides to students the possibility to learn at anyplace and anytime within the collaborative environment using interactive multimedia system that enables effective communication among teacher and learners. The architecture...
Internet ofThings (IoT) is flourishing and has penetrated deeply into people’s daily life. With the seamless connection to the physical world, IoT provides tremendous opportunities to a wide range of applications. However, potential risks exist when the IoT system collects sensor data and uploads it to the cloud.The leakage of private data can be severe with curious database administrator or malicious...
The Internet of Vehicles (IoV) is a complex and dynamic mobile network system that enables information sharing between vehicles, their surrounding sensors, and clouds. While IoV opens new opportunities in various applications and services to provide safety on the road, it introduces new challenges in the field of digital forensics investigations. The existing tools and procedures of digital forensics...
This paper presents a multi-layer secure IoT network model based on blockchain technology. The model reduces the difficulty of actual deployment of the blockchain technology by dividing the Internet of Things into a multi-level de-centric network and adopting the technology of block chain technology at all levels of the network, with the high security and credibility assurance of the blockchain technology...
We propose a new method of controlling IoT devices based on data transmission using available cloud storage services. Besides avoiding technical difficulties like NAT (Network Address Translation) traversal, this method has significant advantages including minimum economic cost, security services, general applicability, and convenient user experience. We demonstrate this method in a prototype experiment...
Applications integrating software with a large number of physical objects and devices in a large-scale Internet of Things (IoT) networks are on the rise. Some examples of these applications are smart grids and water networks and intelligent transportation systems. As they operate in and control a large heterogeneous environment, these applications need real-time controls, powerful and scalable data...
The organization of monitoring of an aromosecurity of space with the help the aromosensory of systems and networks of terminals of smells. Approach which allows to create effective systems for safety of vital space, protection from technogenic, productions, social interactions, etc. factors is offered.
Cloud computing has been pointed out as one of the pillars of the Internet of Things, providing this emerging infrastructure with unlimited resources and easing its deployment. However, cloud computing relies on remote, mainly centralized resource provisioning, which poses substantial problems in the support of time-critical and location-aware IoT applications. Fog computing, on the other hand, recently...
The main objective of this paper is to compare and document low cost open source SCADA options available for remote controlling and monitoring of inverters. To achieve this objective from the client side, interface between inverter and the SCADA has been developed. Three low cost options are being tested and tabulated the paper comparing inherent advantages and disadvantages. From the server side...
Internet of Things (IoT) security and privacy remain a major challenge, mainly due to the massive scale and distributed nature of IoT networks. Blockchain-based approaches provide decentralized security and privacy, yet they involve significant energy, delay, and computational overhead that is not suitable for most resource-constrained IoT devices. In our previous work, we presented a lightweight...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.