The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the next future, IoT systems will be “ubiquitous” and “pervasive”, bringing several benefits to mankind and also many issues about interoperability, security and privacy. The intrinsic vulnerabilities of IoT devices, with limited resources and heterogeneous technologies, together with the lack of specifically designed IoT standards, represent a fertile ground for the expansion of specific cyber...
There are billions of Internet of things (IoT) devices connecting to the Internet and the number is increasing. As a still ongoing technology, IoT can be used in different fields, such as agriculture, healthcare, manufacturing, energy, retailing and logistics. IoT has been changing our world and the way we live and think. However, IoT has no uniform architecture and there are different kinds of attacks...
Internet of Things (IoT) is made up of various technologies, which supports advanced services in various application domains. Security and privacy are a very important aspect for IoT application domains. These applications require data confidentiality, authenticity, integrity and access control within the IoT network. For users and things, security is achieved by enforcing the security and privacy...
The purpose of building automation systems is to support all house functions, such as controlling lighting, air conditioning, heating, shading, access, and hence, increase comfort, save energy and provide easier administration. Those systems are highly complex and ubiquitous as they have interfaces to many other networks and systems in a building. This increases the risk that attackers use security...
Cooperative spectrum sensing, despite its effectiveness in enabling dynamic spectrum access, suffers from location privacy threats, merely because secondary users (SUs)' sensing reports that need to be shared with a fusion center to make spectrum availability decisions are highly correlated to the users' locations. It is therefore important that cooperative spectrum sensing schemes be empowered with...
With the proliferation of sensor-embedded mobile computing devices, participatory sensing is becoming popular to collect information from and outsource tasks to participating users. These applications deal with a lot of personal information, e.g., users' identities and locations at a specific time. Therefore, we need to pay a deeper attention to privacy and anonymity. However, from a data consumer's...
In most of today's healthcare and AAL scenarios a multitude of data is recorded by different sensors for various purposes. By definition, this data is mostly personal and can be assigned to certain persons, which again makes it interesting for shady data miners, hackers, or even health insurance companies. Thus, this data needs special care regarding privacy and security. On the other hand, if the...
As the technology of mobile sensors advances, mobility control becomes a viable option that can be utilized to minimize energy consumption in wireless sensor networks (WSNs). A mobility control protocol re-deploys mobile sensors to optimal positions to minimize energy consumption for communication. We identify a unique privacy issue in mobility control protocols that discloses the physical location...
The following topics are dealt with: tag circuits; measurement method; simulation method; health care; protocol; sensors; open source RFID software; privacy; security; reader design; antenna; propagation; near-field electromagnetic ranging.
The seamless combining with context-aware sensors and numerous devices and e-home server will soon become a part of our home environment in the near future. We name it as a context-aware home based on ubiquitous computing concept. This context-aware home reduces participations of users in order to realize a ubiquitous computing and automates various services. Therefore, the risk of privacy violation...
Sensor networks pledge to solve many monitoring problems: thousands of small inexpensive devices can be easily deployed in any environment and can provide measurements about diverse phenomenons, such as temperature, pollution, birds migration, etc. As sensors are low-capabilities, battery powered devices, several protocols have been proposed to maximize their lifetime, but only recently research has...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.