Using provenance and CoAP to track requests/responses in IoT
Until recently, not much attention has been drawn to the need to provide documentary
evidence for ensuring reliability, transparency and, most importantly, tracing the source of …
evidence for ensuring reliability, transparency and, most importantly, tracing the source of …
[HTML][HTML] Security implications for ultra-low power configurable SoC FPAA embedded systems
J Hasler, S Shah - Journal of Low Power Electronics and Applications, 2018 - mdpi.com
We discuss the impact of physical computing techniques to classifying network security
issues for ultra-low power networked IoT devices. Physical computing approaches enable at …
issues for ultra-low power networked IoT devices. Physical computing approaches enable at …
Post-quantum cryptography for embedded systems
CA Lara-Nino, A Diaz-Perez… - 2022 IEEE Mexican …, 2022 - ieeexplore.ieee.org
Over the years, important breakthroughs have been made in protecting data at rest or in-
transit. The emergence of the Internet of Things (IoT) and Cyber Physical Systems (CPS) has …
transit. The emergence of the Internet of Things (IoT) and Cyber Physical Systems (CPS) has …
Privacy improvement architecture for IoT
E Kak, R Orji, J Pry, K Sofranko… - … Congress on Internet …, 2018 - ieeexplore.ieee.org
The Internet of Things (IoT) is inspired by network interconnectedness of humans, objects,
and cloud services to facilitate new use cases and new business models across multiple …
and cloud services to facilitate new use cases and new business models across multiple …
[PDF][PDF] Securing publish-subscribe services with dynamic security protocol in MQTT enabled internet of things
A Bashir, AH Mir - Int. J. Secur. Appl, 2017 - academia.edu
Rapid developments in the field of embedded system, sensor technology, IP addressing and
wireless communication are driving the growth of Internet of Things (IoT) in a variety of …
wireless communication are driving the growth of Internet of Things (IoT) in a variety of …
A systematic literature review on the security challenges of Internet of Things and their classification
K Fazal, H Shehzad, A Tasneem… - … of Technology and …, 2017 - search.proquest.com
Internet of things (IoT) is an emerging technology. IoT aims at interconnecting devices and
people to the internet, but in meanwhile there are some security and privacy threats as …
people to the internet, but in meanwhile there are some security and privacy threats as …
Network security protocol for constrained resource devices in Internet of things
S Mishra - 2015 Annual IEEE India Conference (INDICON), 2015 - ieeexplore.ieee.org
Security protocols built on strong cryptographic algorithms to defeat attempts of pattern
analysis are popular nowadays, but these algorithms consume a lot of processor's efficiency …
analysis are popular nowadays, but these algorithms consume a lot of processor's efficiency …
Smart grid security applied to the brazilian scenario: A visual approach
M Rogozinski, RF Calili - IEEE Latin America Transactions, 2021 - ieeexplore.ieee.org
Many countries are experiencing a transformation from the traditional generation power
system into a smart grid which incorporates communication and data processing …
system into a smart grid which incorporates communication and data processing …
Comprehensive threat analysis and activity modelling of physical layer attacks in internet of things
MB Salunke, PN Mahalle… - Handbook on ICT in …, 2022 - api.taylorfrancis.com
The term 'Internet of Things' was first coined by Kevin Ashtonin 1999, which is a
technological revolution that represents the future of computing and communications (Rose …
technological revolution that represents the future of computing and communications (Rose …
Enhancing Security in Industrial IoT: A Taxonomy-driven Approach to Risk Assessment
M Al-Hawawreh, R Doss - … on Trust, Security and Privacy in …, 2023 - ieeexplore.ieee.org
The Industrial Internet of Things (IIoT) embodies the emerging fourth revolution, which
strongly focuses on Machine-to-Machine (M2M) communications, big data, and predictive …
strongly focuses on Machine-to-Machine (M2M) communications, big data, and predictive …