The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Wireless Sensor Networks present several advantages when compared to wired ones, among them, the low consumption and simplicity of installation. In some cases, energy consumption may be so low as to allow the use of energy harvesting techniques, as in the case of EnOcean protocol. In other networks, it is necessary to meet specific requirements, such as in industrial ones, where communication must...
During the development and expansion of Internet of Things (IoT), main challenges needing to be addressed are the heterogeneity, interoperability, scalability, flexibility and security of IoT applications. In this paper, we view IoT as a large-scale distributed cyber-physical-social complex network. From that perspective, the above challenges are analyzed. Then, we propose a distributed multi-agent...
In the next future, IoT systems will be “ubiquitous” and “pervasive”, bringing several benefits to mankind and also many issues about interoperability, security and privacy. The intrinsic vulnerabilities of IoT devices, with limited resources and heterogeneous technologies, together with the lack of specifically designed IoT standards, represent a fertile ground for the expansion of specific cyber...
The Internet of things (IoT) is a rapidly evolving technology capable of transforming numerous areas of our lives. Smart Grid (SG) is one of such areas, which has an immense potential of development, following the advances in IoT technology. The goal of the current survey is to summarize the infrastructure and applications of IoT in SGs. The infrastructure aspect is described from the viewpoints of...
Internet of Things (IoT) can be perceived as enabling user-specific interoperable communication services by integration of sensing and actuation technologies with other leading technologies, such as telecommunication, networking, security and cloud computing etc. Application of the ubiquitous IoT technologies to augment healthcare systems inadvertently exposes the latter to unpredictable, disruptive...
There are billions of Internet of things (IoT) devices connecting to the Internet and the number is increasing. As a still ongoing technology, IoT can be used in different fields, such as agriculture, healthcare, manufacturing, energy, retailing and logistics. IoT has been changing our world and the way we live and think. However, IoT has no uniform architecture and there are different kinds of attacks...
Crowdsensing, as a novel method of data collecting, environment sensing and information providing, has been widely used in place of the traditional wired sensor networks and wireless sensor network to tackle real-world challenges by leveraging mobile devices. Unfortunately, the practicality of crowdsensing can be tampered with antisocial behavior, such as free-riding, false-reporting and whitewashing...
Enormous amounts of data are growing because of the continuous and increasing use of smart devices which connect, collect, exchange and transfer these large amounts of data. With the convergence of new technologies like Internet of Things (IoT), Wireless Sensor Networks (WSNs), and Cloud Computing (CC) many sectors are benefited. Our research has to do with Big Data Delivery over the IoT. Specifically,...
Cyber-Physical Systems (CPS) represent a fundamental link between information technology (IT) systems and the devices that control industrial production and maintain critical infrastructure services that support our modern world. Increasingly, the interconnections among CPS and IT systems have created exploitable security vulnerabilities due to a number of factors, including a legacy of weak information...
The Semantic Web can be used to enable the interoperability of IoT devices and to annotate their functional and nonfunctional properties, including security and privacy. In this paper, we will show how to use the ontology and JSON-LD to annotate connectivity, security and privacy properties of IoT devices. Out of that, we will present our prototype for a lightweight, secure application level protocol...
The number of connected Internet of Things (IoT) devices was about 8.9 billion in 2012 and it is statistically estimated to grow up to 50 billion devices in the beginning of 2020. The security of the IoT plays an important role in the correct and advantageous functionality of the interconnected devices. For efficiency considerations, some of the IoT data processing is optimal to be implemented in...
The paper presents an example Sensor-cloud architecture that integrates security as its native ingredient. It is based on the multi-layer client-server model with separation of physical and virtual instances of sensors, gateways, application servers and data storage. It proposes the application of virtualised sensor nodes as a prerequisite for increasing security, privacy, reliability and data protection...
Internet of Things (IoT) connect different types of devices to control different things or simply read data from then, such as room temperature, location, pressure and others, in a variety of application domains using the World Wide Web. This is a challenge for technology and Information Security (IS). Therefore, this paper surveys advances in IoT-based with an eye towards security, where discusses...
Internet of Things (IoT) is made up of various technologies, which supports advanced services in various application domains. Security and privacy are a very important aspect for IoT application domains. These applications require data confidentiality, authenticity, integrity and access control within the IoT network. For users and things, security is achieved by enforcing the security and privacy...
The future healthcare systems' growth and development have greater dependence on Wireless Body Area Network (WBAN). Notwithstanding, the utilization of untrustworthy methods has made it defenseless against various attacks. These attacks can be kept under check by utilizing different security procedures. For this reason a security protocol named Se-Small is utilized. The procedure includes signing...
This paper addresses the need for standard communication protocols for IoT devices with limited power and computational capabilities. The world is rapidly changing with the proliferation and deployment of IoT devices. This will bring in new communication challenges as these devices are connected to Internet and need to communicate with each other in real time. The paper provides an overview of IoT...
Now a days wireless sensors are attracting strong interest for different monitoring and controlling applications as they are integrated with the function of sensing, processing and wireless communication. The wireless sensor networks have been deployed for agricultural, industrial, remote monitoring and traffic management purposes. As energy shortage is a worldwide problem so that more attention has...
Nowadays, the Internet of Things (IoT) is receiving more attention in commercial and academic research, especially about its security property. However, current protocols cannot satisfy the requirement of various IoT applications and introduce some problems. There are three typical problems: traditional public key infrastructure (PKI) apply in IoT will incur great overhead, wireless sensor network...
Recent research on security aspects of digital microfluidic biochips (DMFBs) has revealed several alarming backdoors in the established DMFB design flow that can lead to unacceptable compromises in assay results, often leading to catastrophic consequences. This has led to a growing concern about vulnerability issues of DMFBs and assay manipulation attacks that are used for clinical diagnostics in...
The aim of internet of things is to connect everything with everything, the special interest given to the subject by researchers, companies and enthusiasts by the idea has led to a real enrichment of the network by entirely new objects that no one has expected them to be part of the internet before. This document aims at first; to illustrate the main technological transformations occurred to things...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.