A Detailed Review of the IoT with Detection of Sinkhole Attacks in RPL based network
J Rani, A Dhingra, V Sindhu - 2022 International conference on …, 2022 - ieeexplore.ieee.org
The “Internet of Things”(IoT) is internetworking of physical devices known as' things',
algorithms, equipment and techniques that allow communication with another device …
algorithms, equipment and techniques that allow communication with another device …
Towards behavioral profiling based anomaly detection for smart homes
M Dilraj, K Nimmy, S Sankaran - TENCON 2019-2019 IEEE …, 2019 - ieeexplore.ieee.org
Embedded devices in smart homes have become increasingly vulnerable to numerous
security and privacy threats. Over the past few years, devices such as Smart Cameras have …
security and privacy threats. Over the past few years, devices such as Smart Cameras have …
Intelligent energy meter with home automation
RT Mathew, S Thattat, KV Anirudh… - … for Convergence in …, 2018 - ieeexplore.ieee.org
While electricity authorities are trying to meet the power demand on one side, much of
energy is getting wasted on other end. At some points in a day, especially during peak …
energy is getting wasted on other end. At some points in a day, especially during peak …
A cybersecurity guide for using fitness devices
M Bada, B von Solms - The Fifth International Conference on Safety and …, 2022 - Springer
The popularity of wearable devices is growing exponentially, with consumers using these for
a variety of services. Fitness devices are currently offering new services such as shopping or …
a variety of services. Fitness devices are currently offering new services such as shopping or …
A tool to extract onion links from Tor hidden services and identify illegal activities
V Nair, JM Kannimoola - Inventive Computation and Information …, 2022 - Springer
The dark web is a covered segment of the Internet that provides privacy-protected network
access. Tor is a volunteer run prominent dark web network that becomes heaven for …
access. Tor is a volunteer run prominent dark web network that becomes heaven for …
A formal modeling approach for QoS in MQTT protocol
E Archana, A Rajeev, A Kuruvila… - … Proceedings of GUCON …, 2020 - Springer
With the rising demand for IoT devices, communication protocols like MQTT, CoAP, and
many more, have become an integral part of the system to ensure safe and reliable data …
many more, have become an integral part of the system to ensure safe and reliable data …
Enhancement of QoS in Internet of Things Wearable Devices Dependent on 5G Technology
In general, the malicious hackers can infiltrate tens of thousands or millions of insecure
computers, disable infrastructure, shut down networks, and access personal information …
computers, disable infrastructure, shut down networks, and access personal information …
Intelligent Vehicle Collision Detection and Traffic Control
The rate of road accidents is increasing day by day. People engaged in traffic accidents may
suffer physical, mental, and financial consequences. It can also create impact on people …
suffer physical, mental, and financial consequences. It can also create impact on people …
[PDF][PDF] IoT Privacy in 5G Networks.
E Catania, A La Corte - IoTBDS, 2018 - iris.unict.it
In the Internet of Things (IoT), objects, equipped with sensing, processing, storage and
decision-making capabilities, actively interact with one another and with humans. Even if …
decision-making capabilities, actively interact with one another and with humans. Even if …
Study of hardware attacks on smart system design lab
N Ramasubramanian, J Kokila - Security of internet of things …, 2021 - api.taylorfrancis.com
This chapter illustrates elaborately the use of technology to design a hardware platform to
handle IoT edge-computing requirements to secure against physical attacks, along with …
handle IoT edge-computing requirements to secure against physical attacks, along with …