Qos-aware fog node placement for intensive iot applications in sdn-fog scenarios

JL Herrera, J Galán-Jiménez, L Foschini… - IEEE Internet of …, 2022 - ieeexplore.ieee.org
The advent of the Internet of Things (IoT) paradigm to intensive domains, such as industry, is
a key enabler for the automation of critical, real-world processes. The strict Quality-of …

SIM-FED: Secure IoT malware detection model with federated learning

M Nobakht, R Javidan, A Pourebrahimi - Computers and Electrical …, 2024 - Elsevier
Many IoT devices are presently in use without sufficient security measures. The vulnerability
of these devices to malware highlights the necessity for effective methods to identify …

Data flow management and compliance in cloud computing

J Singh, J Powles, T Pasquier… - IEEE Cloud …, 2015 - ieeexplore.ieee.org
As cloud computing becomes an increasingly dominant means of providing computing
resources, the legal and regulatory issues associated with data in the cloud become more …

A study on privacy issues in internet of things (IoT)

N Zainuddin, M Daud, S Ahmad… - 2021 IEEE 5th …, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) is an interconnected wireless network where smart nodes (IoT
devices) interact with each other in order to exchange data through the communicating …

Survey on secure search over encrypted data on the cloud

H Pham, J Woodworth… - … : Practice and Experience, 2019 - Wiley Online Library
Cloud computing has become a potential resource for businesses and individuals to
outsource their data to remote but highly accessible servers. However, the potential of cloud …

A toolkit for construction of authorization service infrastructure for the internet of things

H Kim, E Kang, EA Lee, D Broman - … on Internet-of-Things design and …, 2017 - dl.acm.org
The challenges posed by the Internet of Things (IoT) render existing security measures
ineffective against emerging networks and devices. These challenges include …

[图书][B] Internet of Things, for Things, and by Things

A Chaudhuri - 2018 - taylorfrancis.com
This book explains IoT technology, its potential applications, the security and privacy
aspects, the key necessities like governance, risk management, regulatory compliance …

Trust management for software-defined heterogeneous vehicular ad hoc networks

A Mahmood, WE Zhang, QZ Sheng, SA Siddiqui… - Security, privacy and …, 2019 - Springer
Over the past few decades, a considerable amount of interest has been observed (in both
academia and industry) for improving the overall road transportation across the globe …

[PDF][PDF] IoT: application protocols and security

D Johnson, M Ketel - International Journal of Computer Network and …, 2019 - mecs-press.org
The Internet of Things (IoT) commands an ever-growing population of devices across the
nation and abroad. The development of privacy concerns and security goals have not kept …

IoT security: ZWave and thread

I Unwala, Z Taqvi, J Lu - 2018 IEEE Green Technologies …, 2018 - ieeexplore.ieee.org
This paper reviews the security aspects of two Internet-of-Things (IoT) protocols, Z-Wave and
Thread. Z-Wave is one of the oldest and most commercially successful IoT protocol, while …