Privacy and security in internet of things and wearable devices
Enter the nascent era of Internet of Things (IoT) and wearable devices, where small
embedded devices loaded with sensors collect information from its surroundings, process it …
embedded devices loaded with sensors collect information from its surroundings, process it …
Systematically evaluating security and privacy for consumer IoT devices
F Loi, A Sivanathan, HH Gharakheili… - Proceedings of the …, 2017 - dl.acm.org
Internet-of-Things (IoT) devices such as smart bulbs, cameras, and health monitors are
being enthusiastically adopted by consumers, with numbers projected to rise to the billions …
being enthusiastically adopted by consumers, with numbers projected to rise to the billions …
Privacy in internet of things: From principles to technologies
C Li, B Palanisamy - IEEE Internet of Things Journal, 2018 - ieeexplore.ieee.org
Ubiquitous deployment of low-cost smart devices and widespread use of high-speed
wireless networks have led to the rapid development of the Internet of Things (IoT). IoT …
wireless networks have led to the rapid development of the Internet of Things (IoT). IoT …
Internet of things security research: A rehash of old ideas or new intellectual challenges?
The Internet of Things (IoT) is a new computing paradigm that spans wearable devices,
homes, hospitals, cities, transportation, and critical infrastructure. Building security into this …
homes, hospitals, cities, transportation, and critical infrastructure. Building security into this …
Smart IoT devices in the home: Security and privacy implications
V Sivaraman, HH Gharakheili… - IEEE Technology …, 2018 - ieeexplore.ieee.org
Internet of Things (IoT) devices possess network capabilities and contain at least a part of
the application logic, ie, they have the ability to perform Transmission Control …
the application logic, ie, they have the ability to perform Transmission Control …
SIFT: building an internet of safe things
As the number of connected devices explodes, the use scenarios of these devices and data
have multiplied. Many of these scenarios, eg, home automation, require tools beyond data …
have multiplied. Many of these scenarios, eg, home automation, require tools beyond data …
Hardware and embedded security in the context of internet of things
Internet of Things (IoT) is the interconnection of a large number of resource-constrained
devices such as sensors, actuators, and nodes that generate large volumes of data which …
devices such as sensors, actuators, and nodes that generate large volumes of data which …
All things considered: An analysis of {IoT} devices on home networks
D Kumar, K Shen, B Case, D Garg… - 28th USENIX security …, 2019 - usenix.org
In this paper, we provide the first large-scale empirical analysis of IoT devices in real-world
homes by leveraging data collected from user-initiated network scans of 83M devices in 16M …
homes by leveraging data collected from user-initiated network scans of 83M devices in 16M …
[HTML][HTML] Security requirements for the internet of things: A systematic approach
S Pal, M Hitchens, T Rabehaja, S Mukhopadhyay - Sensors, 2020 - mdpi.com
There has been a tremendous growth in the number of smart devices and their applications
(eg, smart sensors, wearable devices, smart phones, smart cars, etc.) in use in our everyday …
(eg, smart sensors, wearable devices, smart phones, smart cars, etc.) in use in our everyday …
Security and privacy challenges in industrial internet of things
Today, embedded, mobile, and cyberphysical systems are ubiquitous and used in many
applications, from industrial control systems, modern vehicles, to critical infrastructure …
applications, from industrial control systems, modern vehicles, to critical infrastructure …
相关搜索
- internet of things wearable devices
- internet of things privacy and security
- smart home internet of things
- industrial internet of things
- privacy and security wearable devices
- internet of things embedded security
- internet of things security requirements
- security and privacy implications
- security and privacy challenges