The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
During the development and expansion of Internet of Things (IoT), main challenges needing to be addressed are the heterogeneity, interoperability, scalability, flexibility and security of IoT applications. In this paper, we view IoT as a large-scale distributed cyber-physical-social complex network. From that perspective, the above challenges are analyzed. Then, we propose a distributed multi-agent...
There are billions of Internet of things (IoT) devices connecting to the Internet and the number is increasing. As a still ongoing technology, IoT can be used in different fields, such as agriculture, healthcare, manufacturing, energy, retailing and logistics. IoT has been changing our world and the way we live and think. However, IoT has no uniform architecture and there are different kinds of attacks...
The number of connected Internet of Things (IoT) devices was about 8.9 billion in 2012 and it is statistically estimated to grow up to 50 billion devices in the beginning of 2020. The security of the IoT plays an important role in the correct and advantageous functionality of the interconnected devices. For efficiency considerations, some of the IoT data processing is optimal to be implemented in...
The paper presents an example Sensor-cloud architecture that integrates security as its native ingredient. It is based on the multi-layer client-server model with separation of physical and virtual instances of sensors, gateways, application servers and data storage. It proposes the application of virtualised sensor nodes as a prerequisite for increasing security, privacy, reliability and data protection...
Network centric warfare has been serving the defence mechanism since last few decades. Contemporary network oriented solutions exhibit vertical silos which lack in inefficient connected approach. Internet of Things holds the key potential to interconnect the battlefield with the digital world in ways that promise to fundamentally change military operations. This study proposes a novel architectural...
Applying of network security situation awareness in smart substations provides a high level view to understand the security situation of substations. After analyzing security threats faced by smart substations, this paper not only proposes a security situation awareness framework from aspects of physical security, network security, system security, protocol security and data security, but also puts...
The Internet of Things (IOT) is a network of networks where massively large numbers of objects or things are interconnected to each other through the network. The Internet of Things brings along many new possibilities of applications to improve human comfort and quality of life. Complex systems such as the Internet of Things are difficult to manage because of the emergent behaviours that arise from...
Wireless sensor networks are a new type of networked systems, characterized by severely constrained computational and energy resources, and an ad hoc operational environment. Wireless sensor networks(WSNs) have been increasingly available for large-scale applications in which energy efficiency &, security is an important performance measure. Driven by the energy &, security limitation...
Home Security Systems have existed for many years. There are security devices such as digital cameras or sensors deployed in the home or office. We present an OSGi based security architecture for a home security system. This system consists of Service Location Protocol (SLP), Session Initiation Protocol (SIP) and Open Service Gateway initiative (OSGi) to achieve automated services, device discovery...
In this paper, we discuss the framework of cognitive radio network, analysis motivations for cross-layer design and security in cognitive radio network (CRN) first. Secondly, we proposed a novel architecture in which the dynamic channel access is achieved by a cross-layer design between the PHY and MAC layers for cognitive radio network. Moreover the resolution of cross-layer security problem is proposed...
Considerable research has been done on different aspects of sensor networks. However management issues for these devices are still little explored. Nonetheless, with the increasing number of heterogeneous distributed sensors in various application domains, their management gains more and more importance, in particular for domains where requirements in terms of quality service, reliability, security...
In this paper we propose a lightweight encryption mechanism based on rabbit stream cipher referred to as LRSA for providing confidentiality in wireless sensor networks (WSNs). LRSA fulfils both requirements of security as well as energy efficiency. Our proposed security protocol is an idea for resource constrained WSNs, and can be widely used in the applications of secure communication where the communication...
With the development of Micro Electro-Mechanical System technologies, wireless communication technologies and embedding computing technologies, wireless sensor network becomes a hot study around the world. But there is little formulation description to sensor network and this will limit the theory study on it. We present a formulation model for wireless sensor network in this paper at first. And then...
It is becoming increasingly difficult to implement effective systems for preventing network attacks, due to the combination of (1) the rising sophistication of attacks requiring more complex analysis to detect, (2) the relentless growth in the volume of network traffic that we must analyze, and, critically, (3) the failure in recent years for uniprocessor performance to sustain the exponential gains...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.