Littérature scientifique sur le sujet « IoT, Security IoT, IoT Protocol, 5G »

Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres

Choisissez une source :

Consultez les listes thématiques d’articles de revues, de livres, de thèses, de rapports de conférences et d’autres sources académiques sur le sujet « IoT, Security IoT, IoT Protocol, 5G ».

À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.

Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.

Articles de revues sur le sujet "IoT, Security IoT, IoT Protocol, 5G"

1

Mrabet, Hichem, Sana Belguith, Adeeb Alhomoud et Abderrazak Jemai. « A Survey of IoT Security Based on a Layered Architecture of Sensing and Data Analysis ». Sensors 20, no 13 (28 juin 2020) : 3625. http://dx.doi.org/10.3390/s20133625.

Texte intégral
Résumé :
The Internet of Things (IoT) is leading today’s digital transformation. Relying on a combination of technologies, protocols, and devices such as wireless sensors and newly developed wearable and implanted sensors, IoT is changing every aspect of daily life, especially recent applications in digital healthcare. IoT incorporates various kinds of hardware, communication protocols, and services. This IoT diversity can be viewed as a double-edged sword that provides comfort to users but can lead also to a large number of security threats and attacks. In this survey paper, a new compacted and optimized architecture for IoT is proposed based on five layers. Likewise, we propose a new classification of security threats and attacks based on new IoT architecture. The IoT architecture involves a physical perception layer, a network and protocol layer, a transport layer, an application layer, and a data and cloud services layer. First, the physical sensing layer incorporates the basic hardware used by IoT. Second, we highlight the various network and protocol technologies employed by IoT, and review the security threats and solutions. Transport protocols are exhibited and the security threats against them are discussed while providing common solutions. Then, the application layer involves application protocols and lightweight encryption algorithms for IoT. Finally, in the data and cloud services layer, the main important security features of IoT cloud platforms are addressed, involving confidentiality, integrity, authorization, authentication, and encryption protocols. The paper is concluded by presenting the open research issues and future directions towards securing IoT, including the lack of standardized lightweight encryption algorithms, the use of machine-learning algorithms to enhance security and the related challenges, the use of Blockchain to address security challenges in IoT, and the implications of IoT deployment in 5G and beyond.
Styles APA, Harvard, Vancouver, ISO, etc.
2

Sanchez-Gomez, Jesus, Dan Garcia-Carrillo, Rafael Marin-Perez et Antonio Skarmeta. « Secure Authentication and Credential Establishment in Narrowband IoT and 5G ». Sensors 20, no 3 (7 février 2020) : 882. http://dx.doi.org/10.3390/s20030882.

Texte intégral
Résumé :
Security is critical in the deployment and maintenance of novel IoT and 5G networks. The process of bootstrapping is required to establish a secure data exchange between IoT devices and data-driven platforms. It entails, among other steps, authentication, authorization, and credential management. Nevertheless, there are few efforts dedicated to providing service access authentication in the area of constrained IoT devices connected to recent wireless networks such as narrowband IoT (NB-IoT) and 5G. Therefore, this paper presents the adaptation of bootstrapping protocols to be compliant with the 3GPP specifications in order to enable the 5G feature of secondary authentication for constrained IoT devices. To allow the secondary authentication and key establishment in NB-IoT and 4G/5G environments, we have adapted two Extensible Authentication Protocol (EAP) lower layers, i.e., PANATIKI and LO-CoAP-EAP. In fact, this approach presents the evaluation of both aforementioned EAP lower layers, showing the contrast between a current EAP lower layer standard, i.e., PANA, and one specifically designed with the constraints of IoT, thus providing high flexibility and scalability in the bootstrapping process in 5G networks. The proposed solution is evaluated to prove its efficiency and feasibility, being one of the first efforts to support secure service authentication and key establishment for constrained IoT devices in 5G environments.
Styles APA, Harvard, Vancouver, ISO, etc.
3

Park, Kisung, et Youngho Park. « On the Security of a Lightweight and Secure Access Authentication Scheme for Both UE and mMTC Devices in 5G Networks ». Applied Sciences 12, no 9 (23 avril 2022) : 4265. http://dx.doi.org/10.3390/app12094265.

Texte intégral
Résumé :
The Internet of Things (IoT) and 5G networks play important roles in the latest systems for managing and monitoring various types of data. These 5G based IoT environments collect various data in real-time using micro-sensors as IoT things devices and sends the collected data to a server for further processing. In this scenario, a secure authentication and key agreement scheme is needed to ensure privacy when exchanging data between IoT nodes and the server. Recently, Cao et al. in “LSAA: A lightweight and secure access authentication scheme for both UE and mMTC devices in 5G networks” presented a new authentication scheme to protect user privacy. They contend that their scheme not only prevents various protocol attacks, but also achieves mutual authentication, session key security, unlinkability, and perfect forward/backward secrecy. This paper demonstrates critical security weaknesses of their scheme using informal and formal (mathemati) analysis: it does not prevent a single point of failure and impersonation attacks. Further, their proposed scheme does not achieve mutual authentication and correctness of security assumptions, and we perform simulation analysis using a formal verification tool to its security flaws. To ensure attack resilience, we put forward some solutions that can assist constructing more secure and efficient access authentication scheme for 5G networks.
Styles APA, Harvard, Vancouver, ISO, etc.
4

Pan, Shin-Hung, et Shu-Ching Wang. « Optimal Consensus with Dual Abnormality Mode of Cellular IoT Based on Edge Computing ». Sensors 21, no 2 (19 janvier 2021) : 671. http://dx.doi.org/10.3390/s21020671.

Texte intégral
Résumé :
The continuous development of fifth-generation (5G) networks is the main driving force for the growth of Internet of Things (IoT) applications. It is expected that the 5G network will greatly expand the applications of the IoT, thereby promoting the operation of cellular networks, the security and network challenges of the IoT, and pushing the future of the Internet to the edge. Because the IoT can make anything in anyplace be connected together at any time, it can provide ubiquitous services. With the establishment and use of 5G wireless networks, the cellular IoT (CIoT) will be developed and applied. In order to provide more reliable CIoT applications, a reliable network topology is very important. Reaching a consensus is one of the most important issues in providing a highly reliable CIoT design. Therefore, it is necessary to reach a consensus so that even if some components in the system is abnormal, the application in the system can still execute correctly in CIoT. In this study, a protocol of consensus is discussed in CIoT with dual abnormality mode that combines dormant abnormality and malicious abnormality. The protocol proposed in this research not only allows all normal components in CIoT to reach a consensus with the minimum times of data exchange, but also allows the maximum number of dormant and malicious abnormal components in CIoT. In the meantime, the protocol can make all normal components in CIoT satisfy the constraints of reaching consensus: Termination, Agreement, and Integrity.
Styles APA, Harvard, Vancouver, ISO, etc.
5

Brooks, Tyson. « Authenticating Devices in Fog-mobile Edge Computing Environments through a Wireless Grid Resource Sharing Protocol ». International Journal of UbiComp 13, no 2 (30 avril 2022) : 1–17. http://dx.doi.org/10.5121/iju.2022.13201.

Texte intégral
Résumé :
The rapid growth of the Internet of Things (IoT), cloud computing, Fog computing, mobile edge computing and wireless grids has resulted in the widespread deployment of relatively immature technology. These technologies, which will primarily use 5G wireless communication networks, are becoming popular because they can be deployed quickly with little infrastructure and lends themselves to environments utilizing numerous internet connected devices (ICD). There are, however, many significant challenges faced by security designers, engineers and implementers of these networks in ensuring that the level of security afforded is appropriate. Because of the threat of exploitation, these networks have to be protected by a robust security architecture due to these technologies being plagued with security problems. The authentication of smart ICDs to IoT networks is a critical mechanism for achieving security on these new information system platforms. This article identifies an authentication process required for these ICDs, which will need to prove their identity to authenticate to an IoT fog-mobile edge computing (FMEC) cloud network through a wireless grid authentication process. The purpose of this article is to begin to hypothesize a generic authentication methodology for these FMEC clouds uses in an IoT architecture. The proposed methodology, called wg-IoT, must include the integration of Fog computing, wireless grids and mobile edge computing clouds to create this new IoT architecture. An authentication process developed from the resource sharing protocol (RSP) from a wireless grid is first developed and proposed for the authentication of ICDs. The wireless grid core components must be embedded in IoT devices or sensors depending on their capability to handle five primary functions: management of identification [ID] and presence, permissions management, data transferability, application-programming interface [API] and security.
Styles APA, Harvard, Vancouver, ISO, etc.
6

Gupta, Sunita, Meenakshi Nawal, Neha Janu et Dinesh Goyal. « IoT, Enabling Technologies, and Sensor Node Deployment Pattern in WSN ». ECS Transactions 107, no 1 (24 avril 2022) : 7441–55. http://dx.doi.org/10.1149/10701.7441ecst.

Texte intégral
Résumé :
In Internet of Things (IoT), various computing devices and mechanical and digital machines are interconnected. These devices have unique identifiers (UIDs) and transmit the information on the network with no human interaction. Sensors are the integrated part in IoT as these are used to collect the data. The IoT technologies have a lot of issues like addressing problems, scalability problems, security, and standardization issues that required to be solved. In this paper, the authors facilitate the reader to have necessary understanding of IoT, importance on protocols, technologies, application related issues, various types of sensors used in IoT, new generation of alternative sensors for IoT, and the issues which needs to resolved for the future. A depth overview of 5G IoT systems is also given. The five layers in 5G IoT systems and empowering technologies associated with it are discussed. A comparative analysis of QC-PC-MCSC for strip based deployment pattern and for random deployment is given. This paper provides a support to academician about the working of diverse protocols, relation between IoT and other emergent technologies together with big data and cloud, energy efficiency based on sensor node deployment pattern, etc.
Styles APA, Harvard, Vancouver, ISO, etc.
7

Wu, Tsuyang, Xinglan Guo, Yehcheng Chen, Saru Kumari et Chienming Chen. « Amassing the Security : An Enhanced Authentication Protocol for Drone Communications over 5G Networks ». Drones 6, no 1 (31 décembre 2021) : 10. http://dx.doi.org/10.3390/drones6010010.

Texte intégral
Résumé :
At present, the great progress made by the Internet of Things (IoT) has led to the emergence of the Internet of Drones (IoD). IoD is an extension of the IoT, which is used to control and manipulate drones entering the flight area. Now, the fifth-generation mobile communication technology (5G) has been introduced into the IoD; it can transmit ultra-high-definition data, make the drones respond to ground commands faster and provide more secure data transmission in the IoD. However, because the drones communicate on the public channel, they are vulnerable to security attacks; furthermore, drones can be easily captured by attackers. Therefore, to solve the security problem of the IoD, Hussain et al. recently proposed a three-party authentication protocol in an IoD environment. The protocol is applied to the supervision of smart cities and collects real-time data about the smart city through drones. However, we find that the protocol is vulnerable to drone capture attacks, privileged insider attacks and session key disclosure attacks. Based on the security of the above protocol, we designed an improved protocol. Through informal analysis, we proved that the protocol could resist known security attacks. In addition, we used the real-oracle random model and ProVerif tool to prove the security and effectiveness of the protocol. Finally, through comparison, we conclude that the protocol is secure compared with recent protocols.
Styles APA, Harvard, Vancouver, ISO, etc.
8

Khalid, Madiha, Umar Mujahid et Najam-ul-Islam Muhammad. « Ultralightweight RFID Authentication Protocols for Low-Cost Passive RFID Tags ». Security and Communication Networks 2019 (21 juillet 2019) : 1–25. http://dx.doi.org/10.1155/2019/3295616.

Texte intégral
Résumé :
The field of pervasive computing especially the Internet of Things (IoT) network is evolving due to high network speed and increased capacity offered by the 5G communication system. The IoT network identifies each device before giving it access to the network. The RFID system is one of the most prominent enabling technologies for the node identification. Since the communication between the node and the network takes place over an insecure wireless channel, an authentication mechanism is required to avoid the malicious devices from entering the network. This paper presents a brief survey on the authentication protocols along with the prominent cryptanalysis models for the EPC C1G2 RFID systems. A comparative analysis is provided to highlight the common weaknesses of the existing authentication algorithms and to emphasize on the lack of security standardization for the resource constraint IoT network perception layer. This paper is concluded by proposing an ultralightweight protocol that provides Extremely Good Privacy (EGP). The proposed EGP protocol avoids all the pitfalls highlighted by the cryptanalysis of the existing authentication protocols. The incorporation of the novel ultralightweight primitives, Per-XOR (Px) and Inverse Per-XOR (Px-1), makes the protocol messages more robust and irreversible for all types of adversaries. A comprehensive security analysis illustrates that the proposed protocol proves to be highly resistive against all possible attack scenarios and ensures the security optimally.
Styles APA, Harvard, Vancouver, ISO, etc.
9

Mathas, Christos-Minas, Costas Vassilakis, Nicholas Kolokotronis, Charilaos C. Zarakovitis et Michail-Alexandros Kourtis. « On the Design of IoT Security : Analysis of Software Vulnerabilities for Smart Grids ». Energies 14, no 10 (14 mai 2021) : 2818. http://dx.doi.org/10.3390/en14102818.

Texte intégral
Résumé :
The 5G communication network will underpin a vast number of new and emerging services, paving the way for unprecedented performance and capabilities in mobile networks. In this setting, the Internet of Things (IoT) will proliferate, and IoT devices will be included in many 5G application contexts, including the Smart Grid. Even though 5G technology has been designed by taking security into account, design provisions may be undermined by software-rooted vulnerabilities in IoT devices that allow threat actors to compromise the devices, demote confidentiality, integrity and availability, and even pose risks for the operation of the power grid critical infrastructures. In this paper, we assess the current state of the vulnerabilities in IoT software utilized in smart grid applications from a source code point of view. To that end, we identified and analyzed open-source software that is used in the power grid and the IoT domain that varies in characteristics and functionality, ranging from operating systems to communication protocols, allowing us to obtain a more complete view of the vulnerability landscape. The results of this study can be used in the domain of software development, to enhance the security of produced software, as well as in the domain of automated software testing, targeting improvements to vulnerability detection mechanisms, especially with a focus on the reduction of false positives.
Styles APA, Harvard, Vancouver, ISO, etc.
10

Chen, Chien-Ming, Zhen Li, Shehzad Ashraf Chaudhry et Long Li. « Attacks and Solutions for a Two-Factor Authentication Protocol for Wireless Body Area Networks ». Security and Communication Networks 2021 (21 octobre 2021) : 1–12. http://dx.doi.org/10.1155/2021/3116593.

Texte intégral
Résumé :
As an extension of the 4G system, 5G is a new generation of broadband mobile communication with high speed, low latency, and large connection characteristics. It solves the problem of human-to-thing and thing-to-thing communication to meet the needs of intelligent medical devices, automotive networking, smart homes, industrial control, environmental monitoring, and other IoT application needs. This has resulted in new research topics related to wireless body area networks. However, such networks are still subject to significant security and privacy threats. Recently, Fotouhi et al. proposed a lightweight and secure two-factor authentication protocol for wireless body area networks in medical IoT. However, in this study, we demonstrate that their proposed protocol is still vulnerable to sensor-capture attacks and the lack of authentication between users and mobile devices. In addition, we propose a new protocol to overcome the limitations mentioned above. A detailed comparison shows that our proposed protocol is better than the previous protocols in terms of security and performance.
Styles APA, Harvard, Vancouver, ISO, etc.

Thèses sur le sujet "IoT, Security IoT, IoT Protocol, 5G"

1

Centenaro, Marco. « On the Support of Massive Machine-to-Machine Traffic in Heterogeneous Networks and Fifth-Generation Cellular Networks ». Doctoral thesis, Università degli studi di Padova, 2018. http://hdl.handle.net/11577/3426783.

Texte intégral
Résumé :
The widespread availability of many emerging services enabled by the Internet of Things (IoT) paradigm passes through the capability to provide long-range connectivity to a massive number of things, overcoming the well-known issues of ad-hoc, short-range networks. This scenario entails a lot of challenges, ranging from the concerns about the radio access network efficiency to the threats about the security of IoT networks. In this thesis, we will focus on wireless communication standards for long-range IoT as well as on fundamental research outcomes about IoT networks. After investigating how Machine-Type Communication (MTC) is supported nowadays, we will provide innovative solutions that i) satisfy the requirements in terms of scalability and latency, ii) employ a combination of licensed and license-free frequency bands, and iii) assure energy-efficiency and security.
La diffusione capillare di molti servizi emergenti grazie all’Internet of Things (IoT) passa attraverso la capacità di fornire connettività senza fili a lungo raggio ad un numero massivo di cose, superando le note criticità delle reti ad hoc a corto raggio. Questa visione comporta grandi sfide, a partire dalle preoccupazioni riguardo l’efficienza delle rete di accesso fino alle minacce alla sicurezza delle reti IoT. In questa tesi, ci concentreremo sia sugli standard di comunicazione a lungo raggio per l’IoT sia sulla ricerca di base per le reti IoT. Dopo aver analizzato come vengono supportate le comunicazioni Machine-to-Machine (M2M) oggi, forniremo soluzioni innovative le quali i) soddisfano i requisiti in termini di scalabilità e latenza, ii) utilizzano una combinazione di bande di frequenza licenziate e libere e iii) assicurano efficienza energetica e sicurezza.
Styles APA, Harvard, Vancouver, ISO, etc.
2

Makkar, Ankush. « Enhancing IoT Security Using 5G Capabilities ». Thesis, Luleå tekniska universitet, Digitala tjänster och system, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-85109.

Texte intégral
Résumé :
Internet of Things (IoT) is an ecosystem comprises CT (Communication Technology),IT (Information Technology) and sometime OT (Operational Technologies) wheredifferent machines and devices can interact with each other and exchange useful datawhich can be processed using different IoT applications to take decisions and performrequired actions. Number of IoT devices and IoT networks are growing exponentially.Security is of utmost importance and without proper security implementation, IoTNetworks with billions of devices will be hacked and used as botnets which can createdisaster. The new IoT use cases cannot be realized using the current communicationtechnologies due to the QoS (Quality of Service) and business requirements. 5Gnetwork are designed keeping IoT use cases in mind and with the development of 5Gnetwork, it will be easier to implement more secured IoT network and enable differentIoT use cases which are not feasible today.To build the future IoT networks with 5G, it’s important to study and understand 5Gsecurity features. Security is perceived as one of the most important considerationwhile building IoT solutions and to implement 5G network for IoT solutions require anoverall understanding of 5G security features. In the thesis, work have been done toidentify the gap in the current research with respect to 5G security features anddescribe 5G features that will enhance IoT security. After identifying key 5G securityfeatures, the implementation of the identified 5G security features will be describedwith the 5G based smart grid and smart factory use cases. The key finding is howdifferent 5G security capabilities secure IoT communication and another importantfinding is that not all security capabilities are applicable to all IoT use cases. Hence,security capabilities to be used based on the 5G use case requirement.
Styles APA, Harvard, Vancouver, ISO, etc.
3

Lindh, André. « 5G, IoT och dess säkerhetsutmaningar : En litteraturstudie ». Thesis, Uppsala universitet, Institutionen för informatik och media, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-413640.

Texte intégral
Résumé :
This literature review aims to identify the security challenges facing 5G and Internet of Things. The literature review uses a systematic method for reviewing written by Okoli (2015). During the review, 60 articles were initially selected. These were screened from a number of quality criteria until 19 articles remained. Furthermore, the security challenges presented in these 19 articles are divided into their respective subject areas and based on whether the article writes about security threats or security control. The results give an overview of which of these subjects are most commonly written about in relation to security, 5G and Internet of Things. The review sheds light on the absence of certain threats and their respective controls. The review also sheds light on the absence of a holistic perspective when regarding security in the context of 5G and Internet of Things.
Denna litteraturstudie identifierar de säkerhetsutmaningar som finns i relation till 5G och Internet of Things. Litteraturstudien använder en systematisk metod för litteratursökning som är författad av Okoli (2015). I samband med litteratursökningen görs ett urval på 60 artiklar som mot kvalitetskriterier avgränsas till 19 artiklar. Säkerhetsutmaningarna som presenteras i dessa 19 artiklar delas vidare upp delvis efter vilket område av säkerhet de behandlar samt om de presenterar en säkerhetsrisk eller säkerhetsåtgärd. Resultatet ger en överblick av vilka av dessa områden inom säkerhet relaterade till 5G och Internet of Things som är vanligast förekommande. Undersökningen belyser avsaknaden av vissa typer av säkerhetsrisker och åtgärder som svarar för dessa. Undersökningen belyser också en avsaknad av ett mer holistiskt perspektiv i synen på säkerhet relaterat till 5G och framtidens Internet of Things.
Styles APA, Harvard, Vancouver, ISO, etc.
4

Shahidi, Hamed. « Security Challenges of Communication Protocols in IoT : Comparing security features of ZigBee and Z-Wave communication protocols in IoT devices ». Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-40113.

Texte intégral
Résumé :
This research studies the security challenges in IoT devices. At first, security challenges have been described and then specifically the security of communication protocols in the IoT has been addressed. Finally, among different communication protocols, ZigBee and Z-Wave protocols have been chosen for this study. The criterion for choosing these two protocols is the level of security they provide for IoT devices to protect them against unauthorized access and hacking. Security, frequency, power consumption and data rate are the characteristics that have been discussed in the review of these two protocols. In the end, a comparison of the various features of these two protocols clarified that the security of IoT devices in each of these protocols depends on the type of the IoT device, the required range and other requirements, however, in most cases the ZigBee protocol showed more security than Z-Wave.
Styles APA, Harvard, Vancouver, ISO, etc.
5

van, Leeuwen Daniel, et Leonel Taku Ayuk. « Security testing of the Zigbee communication protocol in consumer grade IoT devices ». Thesis, Högskolan i Halmstad, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-40189.

Texte intégral
Résumé :
With the ever increasing number of Internet of Things devices going out on the market for consumers that are Zigbee certified there is a need for security testing. This is to make sure that security standards are upheld and improved upon in order to make sure networks are protected from unauthorized users. Even though a lot of research and testing has been done on the Zigbee key exchange mechanism, called Zigbee commissioning, improvements have still not been enough with severe vulnerabilities in consumer grade devices still existing today. The devices tested in this study use EZ-mode commissioning in order to exchange the network key between a Zigbee coordinator and a Zigbee end device in order to encrypt later communication after being paired.  By using a simple radio receiver and a packet capturing program such as Wireshark an eavesdropping attack was conducted in order to capture the network key. The experiment demonstrates that this is still a weak point as the network key was successfully captured using eavesdropping. The analysis of the results show that previous criticisms of Zigbee commissioning have still not fully been addressed and can be a potential weak point in networks that use Zigbee certified IoT products.
Styles APA, Harvard, Vancouver, ISO, etc.
6

Parvez, Imtiaz. « Spectrum Sharing, Latency, and Security in 5G Networks with Application to IoT and Smart Grid ». FIU Digital Commons, 2018. https://digitalcommons.fiu.edu/etd/3879.

Texte intégral
Résumé :
The surge of mobile devices, such as smartphones, and tables, demands additional capacity. On the other hand, Internet-of-Things (IoT) and smart grid, which connects numerous sensors, devices, and machines require ubiquitous connectivity and data security. Additionally, some use cases, such as automated manufacturing process, automated transportation, and smart grid, require latency as low as 1 ms, and reliability as high as 99.99\%. To enhance throughput and support massive connectivity, sharing of the unlicensed spectrum (3.5 GHz, 5GHz, and mmWave) is a potential solution. On the other hand, to address the latency, drastic changes in the network architecture is required. The fifth generation (5G) cellular networks will embrace the spectrum sharing and network architecture modifications to address the throughput enhancement, massive connectivity, and low latency. To utilize the unlicensed spectrum, we propose a fixed duty cycle based coexistence of LTE and WiFi, in which the duty cycle of LTE transmission can be adjusted based on the amount of data. In the second approach, a multi-arm bandit learning based coexistence of LTE and WiFi has been developed. The duty cycle of transmission and downlink power are adapted through the exploration and exploitation. This approach improves the aggregated capacity by 33\%, along with cell edge and energy efficiency enhancement. We also investigate the performance of LTE and ZigBee coexistence using smart grid as a scenario. In case of low latency, we summarize the existing works into three domains in the context of 5G networks: core, radio and caching networks. Along with this, fundamental constraints for achieving low latency are identified followed by a general overview of exemplary 5G networks. Besides that, a loop-free, low latency and local-decision based routing protocol is derived in the context of smart grid. This approach ensures low latency and reliable data communication for stationary devices. To address data security in wireless communication, we introduce a geo-location based data encryption, along with node authentication by k-nearest neighbor algorithm. In the second approach, node authentication by the support vector machine, along with public-private key management, is proposed. Both approaches ensure data security without increasing the packet overhead compared to the existing approaches.
Styles APA, Harvard, Vancouver, ISO, etc.
7

Conceicao, Filipe. « Network survival with energy harvesting : secure cooperation and device assisted networking ». Thesis, Université Paris-Saclay (ComUE), 2019. http://www.theses.fr/2019SACLL020/document.

Texte intégral
Résumé :
La technologie de réseau cellulaire de 5ème génération (5G) sera le réseau supportant l'Internet des objets (IoT). Elle a introduit une fonctionnalité majeure, communications appareil-à-appareil (D2D), que permettent communications sans fil à consommation d'énergie restreinte en interagissant à proximité et à puissance d'émission plus faible. La coopération entre appareils suscit donc un intérêt considérable pour l'énergie, et peut être utilisé en conjonction avec la récupération d'énergie pour prolonger la durée de vie des appareils. Les programmes de coopération renforcent la mise en réseau d'un appareil à l'autre, ce qui accroît la nécessité d'exécuter des mécanismes de sécurité pour assurer la protection des données et les relations de confiance entre les nœuds du réseau.Ces mécanismes sont fondamentaux pour la protection contre les attaques malveillantes mais elles représentent aussi une importante consommation d'énergie, souvent négligée en raison de l'importance de la protection des données. L'établissement d'un canal securisé peut être coûteux en termes d'utilisation du CPU, la mémoire et la consommation d'énergie, surtout si les appareils sont limités en ressources. La confidentialité et l’intégrité des données ont un faible coût énergétique, mais sont utilisées en permanence. Il est donc nécessaire de quantifier la consommation d'énergie engendrée par la sécurité d'un appareil. Un modèle énergétique basé sur la sécurité est proposé pour répondre à cet objectif.Dans les réseaux composés d'équipements d'utilisateurs (UE), la mobilité est une caractéristique clé. Elle peut agir sur la connexion à proximité d'objets IoT, étendant la couverture 5G vers l'IoT via les UEs. Une solution d'authentification légère est présentée qui permet par l'authentification directe et des communications UE-IoT, d'étendre la couverture et réaliser des économies d'énergie potentielles importantes. Cette approche peut être particulièrement utile en cas de catastrophe où l'infrastructure réseau peut ne pas être disponible.La condentialité et l'authentification des données sont une source de consommation d'énergie importante. Les appareils équipés avec équipements de collecte d'énergie (EH) peuvent avoir un excédent ou un déficit d'énergie. La sécurité appliquée peut donc être ajustée en fonction de l'énergie disponible d'un appareil, en introduisant l'établissement de canal sécurisé qui tient compte de la consommation d'énergie. Après avoir étudié en profondeur les normes 5G, il a été constaté que les réseaux d'UE D2D utilisant ce type de norme dépenseraient une quantité importante d'énergie et seraient généralement moins sûr. Un mécanisme léger de recléage est donc proposé pour réduire les coûts liés cette adaptation. Pour compléter le concept de canal sécurisé prenant en compte l'énergie et le mécanisme de recléage, une méthode de bootstrapping des paramètres de sécurité est également présentée. Le méthode désigne le cœur du réseau (CN) comme responsable de la politique de sécurité, rend l'ensemble du réseau plus sûr et aide à prévenir les pannes de communication. L'adaptation susvisé requiert l'étude du compromis entre l’énergie et sécurité. À cette fin, un processus décisionnel de Markov (MDP) modélisant un canal de communication est présenté lorsqu'un agent choisit les éléments de sécurité à appliquer aux paquets transmis. Ce problème d'optimisation du contrôle stochastique est résolu par plusieurs algorithmes de programmation dynamique et d’apprentissage par le renforcement (RL). Les résultats montrent que l'adaptation susvisé peut prolonger de manière significative la durée de vie de l'équipement et de la batterie, et améliore la fiabilité des données tout en offrant des fonctions de sécurité. Une étude comparative est présentée pour les différents algorithmes RL. Puis une approche d'apprentissage Q-profond (DQL) est proposé que améliore la vitesse d'apprentissage de l'agent et la fiabilité des données
The 5th Generation Cellular Network Technology (5G) will be the network supporting the Internet of Things (IoT) and it introduced a major feature, Device-to-Device (D2D) communications. D2D allows energy-constrained wireless devices to save energy by interacting in proximity at a lower transmission power. Cooperation and device-assisted networking therefore raise signicant interest with respect to energy saving, and can be used in conjunction with energy harvesting to prolong the lifetime of battery-powered devices. However, cooperation schemes increase networking between devices, increasing the need for security mechanisms to be executed to assure data protection and trust relations between network nodes. This leads to the use of cryptographic primitives and security mechanisms with a much higher frequency.Security mechanisms are fundamental for protection against malicious actions but they also represent an important source of energy consumption, often neglected due to the importance of data protection. Authentication procedures for secure channel establishment can be computationally and energetically expensive, especially if the devices are resource constrained. Security features such as condentiality and data authentication have a low energetic cost but are used constantly in a device engaged in data exchanges. It is therefore necessary to properly quantify the energy consumption due to security in a device. A security based energy model is proposed to achieve this goal.In User Equipment (UE) D2D networks, mobility is a key characteristic. It can be explored for connecting directly in proximity with IoT objects. A lightweight authentication solution is presented that allows direct UE-IoT communications, extending coverage and potentially saving signicant energy amounts. This approach can be particularly useful in Public Protection and Disaster Relief (PPDR) scenarios where the network infrastructure may not be available.Security features such as condentiality or data authentication are a significant source of consumption. Devices equipped with Energy Harvesting (EH) hardware can have a surplus or a deficit of energy. The applied security can therefore be adjusted to the available energy of a device, introducing an energy aware secure channel. After in depth analysis of 5G standards, it was found that D2D UE networks using this type of channel would spend a signicant amount of energy and be generally less secure. A lightweight rekeying mechanism is therefore proposed to reduce the security overhead of adapting security to energy. To complete the proposed rekeying mechanism, a security parameter bootstrapping method is also presented. The method denes the Core Network (CN) as the security policy maker, makes the overall network more secure and helps preventing communication outages.Adapting security features to energy levels raises the need for the study of the energy/security tradeoff. To this goal, an Markov Decision Process (MDP) modeling a communication channel is presented where an agent chooses the security features to apply to transmitted packets. This stochastic control optimization problem is solved via several dynamic programming and Reinforcement Learning (RL) algorithms. Results show that adapting security features to the available energy can signicantly prolong battery lifetime, improve data reliability while still providing security features. A comparative study is also presented for the different RL learning algorithms. Then a Deep Q-Learning (DQL) approach is presented and tested to improve the learning speed of the agent. Results confirm the faster learning speed. The approach is then tested under difficult EH hardware stability. Results show robust learning properties and excellent security decision making from the agent with a direct impact on data reliability. Finally, a memory footprint comparison is made to demonstrate the feasibility of the presented system even on resource constrained devices
Styles APA, Harvard, Vancouver, ISO, etc.
8

Ralambotiana, Miora. « Key management with a trusted third party using LoRaWAN protocol : A study case for E2E security ». Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-230671.

Texte intégral
Résumé :
Nowadays, Internet of Things (IoT) applications are gaining more importance in people’s everyday life. Depending of their usage (for long or short distance communications, using low or high power devices, etc.), several standards exist. In this study, the focus is on Low Power Wide Area Networks (LPWAN) and particularly a protocol which is raising in popularity for long-range low-power communications in IoT: LoRaWAN. LoRaWAN is still at an early stage and has been mainly used in use cases where the network server was managing the keys ensuring confidentiality and integrity of the data. Gemalto has raised the issue of interest conflicts in the case where the network operator and the application provider are two distinct entities: if the end-device and the application server are exchanging sensitive data, the network server should not be able to read them. In order to solve this problem, an architecture using a trusted third party to generate and manage the keys has been implemented during this project. The following research aims at finding security threats and weaknesses on the confidentiality and integrity of the data and devices’ authentication in this study case. The LoRaWAN protocol and key management in general were studied first before describing the studied system and finding the possible attacks exploring its vulnerabilities on the mentioned points via an attack tree. These attacks were simulated in order to define their consequences on the system and according to them, security improvements on the architecture was proposed based on previous work on the topic and exploration on potential countermeasures.
Idag blir Internet av saker (IoT) applikationer allt viktigare i människors vardag. Beroende på användningen (för långeller kortdistanskommunikation, med låga eller höga effektenheter etc.) finns flera standarder. I denna studie ligger fokus på Low Power Wide Area Networks (LPWAN) och i synnerhet ett protokoll som ökar i popularitet för långsiktig lågkapacitetskommunikation i IoT: LoRaWAN. LoRaWAN är fortfarande på ett tidigt stadium och har i huvudsak använts i användarfall där nätverksservern hanterade nycklarna som säkerställer konfidentialitet och integritet av data. Gemalto har tagit upp frågan om intressekonflikter i det fall nätverksoperatören och programleverantören är två separata enheter: Om slutanordningen och applikationsservern utbyter känslig data, ska nätverksservern inte kunna läsa dem. För att lösa detta problem har en arkitektur som använder en betrodd tredje part för att generera och hantera nycklarna implementerats under det här projektet. Följande forskning syftar till att hitta säkerhetshot och svagheter om konfidentialiteten och integriteten hos data och enheternas autentisering i detta studiefall. LoRaWAN-protokollet och nyckelhanteringen i allmänhet kommer att studeras först innan författaren beskriver det studerade systemet och upptäcker de eventuella attacker som undersöker sårbarheten på de nämnda punkterna via ett angreppsträd. Dessa attacker kommer att simuleras för att definiera deras konsekvenser på systemet och enligt dem kommer säkerhetsförbättringar på arkitekturen att föreslås utifrån tidigare arbete med ämnet och undersökning av potentiella motåtgärder
Styles APA, Harvard, Vancouver, ISO, etc.
9

Lindorin, Axel. « Säkerhet i smarta hem : En litteraturanalys på protokollsäkerhet för det smarta hemmet ». Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-18940.

Texte intégral
Résumé :
Denna undersökning har granskat det problem som uppstår i samband med den snabba utvecklingen utav Internet of Things där de lågenergienheter saknar kraft för att utföra avancerade säkerhetslösningar. På grund av den låga säkerheten och växande användningsområdet så har Internet of Things enheterna blivit ett lockande mål för eventuella attacker. Den systematiska litteraturanalysen har genomförts genom att granska tidigare mer detaljerade analyser av protokollen och dess säkerhet samt utvecklarnas specifikationer. Detta för att bland annat skapa en sammanfattning utav protokollens säkerhet men också för att sedan jämföra protokollen för att kunna ta fram det säkrare protokollet för hemanvändning. Alla protokoll som tas upp har någon form av säkerhet implementerad för att förse med autentisering i form av MAC (i vissa fall HMAC), nyckelhantering, integritet i form av MIC och kommunikationssäkerhet med kryptering. Alla protokoll har stöd för AES-128 kryptering samt användning av IEEE 802.15.4 säkerhetsserie som ytterligare skydd utöver protokollens egna lösningar. Flertalen av protokollen använder sig också av Elleptic Curve för att säkert transportera nycklar. Analysens slutsats visar att Thread och Z-Wave anses som de två säkraste protokollen för hemmaanvändning. Det baserat på hur protokollen hanterar de olika aspekterna med sin märkbara prioritering av säkerhet tillsammans med det få antalet brister som kan skada det smarta hemmet. Bluetooth Low Energy och EnOcean är de två mindre säkra gällande en IoT miljö. Undersökningen tar också med en diskussion kring olika områden som dykt upp under undersökningens gång. Slutligen tas några punkter som dök upp under granskningen som kan vara bra att tänka på vid utveckling av dessa protokoll men säkerhet i tanken.
This study has examined the problems that arise in connection with the rapid development of the Internet of Things, where the low-energy units lack the power to implement advanced security solutions. Due to the low security and growing area of use, the Internet of Things units have become an attractive target for any attacks. The systematic literature analysis has been carried out by reviewing previously more detailed analyzes of the protocols and their security as well as the developers' specifications. This is to create a wide summary of the security of the protocols and then to compare the protocols to select one or more as the safer protocol for home use. All protocols that are included have some form of security implemented to provide authentication in the form of MAC, key management, integrity in the form of MIC and communication security with encryption. All protocols support AES-128 encryption and the use of IEEE 802.15.4 security suit as additional protection in addition to the protocol's own solutions. The majority of protocols also use Elleptic Curve to safely transport keys. The analysis concludes that Thread and Z-Wave are considered the two most secure home use protocols. It is based on how the protocols handle the various aspects with their noticeable prioritization of security along with the few deficiencies that can damage the smart home. Bluetooth Low Energy and EnOcean are thetwo less secure regarding an IoT environment. The survey also includes a discussion of various areas that emerged during the course of the investigation. Finally, some points that emerged during the review that may be good to consider when developing these protocols with security as focus.
Styles APA, Harvard, Vancouver, ISO, etc.
10

Fredriksson, Tony, et Niklas Ljungberg. « Security in low power wireless networks : Evaluating and mitigating routing attacks in a reactive, on demand ad-hoc routing protocol ». Thesis, Linköpings universitet, Institutionen för datavetenskap, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-145362.

Texte intégral
Résumé :
Using low energy devices to communicate over the air presents many challenges to reach security as resources in the world of Internet Of Things (IoT) are limited. Any extra overhead of computing or radio transmissions that extra security might add affects cost of both increased computing time and energy consumption which are all scarce resources in IoT. This thesis details the current state of security mechanisms built into the commercially available protocol stacks Zigbee, Z-wave, and Bluetooth Low Energy, and collects implemented and proposed solutions to common ways of attacking systems built on these protocol stacks. Attacks evaluated are denial of service/sleep, man-in-the-middle, replay, eavesdropping, and in mesh networks, sinkhole, black hole, selective forwarding, sybil, wormhole, and hello flood. An intrusion detection system is proposed to detect sinkhole, selective forwarding, and sybil attacks in the routing protocol present in the communication stack Rime implemented in the operating system Contiki. The Sinkhole and Selective forwarding mitigation works close to perfection in larger lossless networks but suffers an increase in false positives in lossy environments. The Sybil Detection is based on Received Signal Strength and strengthens the blacklist used in the sinkhole and selective forwarding detection, as a node changing its ID to avoid the blacklist will be detected as in the same geographical position as the blacklisted node.
Styles APA, Harvard, Vancouver, ISO, etc.

Livres sur le sujet "IoT, Security IoT, IoT Protocol, 5G"

1

Abd El-Latif, Ahmed A., Bassem Abd-El-Atty, Salvador E. Venegas-Andraca, Wojciech Mazurczyk et Brij B. Gupta, dir. Security and Privacy Preserving for IoT and 5G Networks. Cham : Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-85428-7.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Advanced Security Issues of IoT Based 5G Plus Wireless Communication for Industry 4. 0. Nova Science Publishers, Incorporated, 2019.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Gupta, Brij B., Wojciech Mazurczyk, Salvador E. Venegas-Andraca, Ahmed A. Abd El-Latif et Bassem Abd-El-Atty. Security and Privacy Preserving for IoT and 5G Networks : Techniques, Challenges, and New Directions. Springer International Publishing AG, 2021.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Thayananthan, Vijey. Advanced Security Issues of IoT Based 5G Plus Wireless Communication for Industry 4. 0. Nova Science Publishers, Incorporated, 2019.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Gupta, Brij B., Wojciech Mazurczyk, Salvador E. Venegas-Andraca, Ahmed A. Abd El-Latif et Bassem Abd-El-Atty. Security and Privacy Preserving for IoT and 5G Networks : Techniques, Challenges, and New Directions. Springer International Publishing AG, 2022.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Government, U. S., Senate of the United States of America et U. S. - China Security Review Commission. China, the United States, and Next Generation Connectivity - 5th Generation Wireless Technology (5G), Internet of Things (IOT) Standards and Technology Development, Huawei and ZTE Security Controversy. Independently Published, 2019.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Chapitres de livres sur le sujet "IoT, Security IoT, IoT Protocol, 5G"

1

Prakash, Chandra, et Rakesh Kumar Saini. « A Model on IoT Security Method and Protocols for IoT Security Layers ». Dans Mobile Radio Communications and 5G Networks, 771–80. Singapore : Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-7130-5_63.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Gaur, Vimal, et Rajneesh Kumar. « GDH Key Exchange Protocol for Group Security Among Hypercube Deployed IoT Devices ». Dans Mobile Radio Communications and 5G Networks, 639–47. Singapore : Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-7130-5_50.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Song, Byunghoon, Yoonchae Cheong, Taehyun Lee et Jongpil Jeong. « Design and Security Analysis of Improved Identity Management Protocol for 5G/IoT Networks ». Dans Advances in Intelligent Systems and Computing, 311–20. Cham : Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-56538-5_32.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Monshizadeh, Mehrnoosh, et Vikramajeet Khatri. « IoT Security ». Dans A Comprehensive Guide to 5G Security, 245–66. Chichester, UK : John Wiley & Sons, Ltd, 2018. http://dx.doi.org/10.1002/9781119293071.ch11.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Banerjee, Bannishikha, et Geetali Saha. « Emotion Independent Face Recognition-Based Security Protocol in IoT-Enabled Devices ». Dans Cloud IoT, 199–218. Boca Raton : Chapman and Hall/CRC, 2022. http://dx.doi.org/10.1201/9781003155577-18.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Hamamreh, Jehad M. « Improving the Physical Layer Security of IoT-5G Systems ». Dans Artificial Intelligence in IoT, 25–44. Cham : Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-04110-6_2.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Anand, Darpan, et Vineeta Khemchandani. « Data Security and Privacy in 5G-Enabled IoT ». Dans Blockchain for 5G-Enabled IoT, 279–301. Cham : Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-67490-8_11.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Sandhu, Jasminder Kaur, Prateek Srivastava, Yadunath Pathak et Meena Pundir. « Intelligence and Security in the 5G-Oriented IoT ». Dans 5G and Beyond, 29–43. Boca Raton : Chapman and Hall/CRC, 2022. http://dx.doi.org/10.1201/9781003045809-4.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Mani Sekhar, S. R., G. Nidhi Bhat, S. Vaishnavi et G. M. Siddesh. « Security and Privacy in 5G-Enabled Internet of Things : A Data Analysis Perspective ». Dans Blockchain for 5G-Enabled IoT, 303–22. Cham : Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-67490-8_12.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Chetna, Shikha, Sunil Gupta et Tejinder Kaur. « Integration of IoT for MANET Network Security ». Dans Mobile Radio Communications and 5G Networks, 185–92. Singapore : Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-19-7982-8_16.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Actes de conférences sur le sujet "IoT, Security IoT, IoT Protocol, 5G"

1

Hammi, Mohamed Tahar, Erwan Livolant, Patrick Bellot, Ahmed Serhrouchni et Pascale Minet. « A lightweight IoT security protocol ». Dans 2017 1st Cyber Security in Networking Conference (CSNet). IEEE, 2017. http://dx.doi.org/10.1109/csnet.2017.8242001.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Velastegui, Homero J., et Acurio M. Santiago. « IoT-based Security Alarm Protocol ». Dans 2021 International Conference on Engineering and Emerging Technologies (ICEET). IEEE, 2021. http://dx.doi.org/10.1109/iceet53442.2021.9659560.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Catania, Emanuele, et Aurelio La Corte. « IoT Privacy in 5G Networks ». Dans 3rd International Conference on Internet of Things, Big Data and Security. SCITEPRESS - Science and Technology Publications, 2018. http://dx.doi.org/10.5220/0006710501230131.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Gvozdenovic, Stefan, Johannes K. Becker, John Mikulskis et David Starobinski. « Multi-Protocol IoT Network Reconnaissance ». Dans 2022 IEEE Conference on Communications and Network Security (CNS). IEEE, 2022. http://dx.doi.org/10.1109/cns56114.2022.9947261.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Dey, A., S. Nandi et M. Sarkar. « Security Measures in IOT based 5G Networks ». Dans 2018 3rd International Conference on Inventive Computation Technologies (ICICT). IEEE, 2018. http://dx.doi.org/10.1109/icict43934.2018.9034365.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Sharma, Suraj, Shaswat Satapathy, Shivani Singh, Amiya Kumar Sahu, Mohammad S. Obaidat, Sanjay Saxena et Deepak Puthal. « Secure Authentication Protocol for 5G Enabled IoT Network ». Dans 2018 Fifth International Conference on Parallel, Distributed and Grid Computing (PDGC). IEEE, 2018. http://dx.doi.org/10.1109/pdgc.2018.8745799.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Rahimi, Hamed, Ali Zibaeenejad, Parsa Rajabzadeh et Ali Akbar Safavi. « On the Security of the 5G-IoT Architecture ». Dans the international conference. New York, New York, USA : ACM Press, 2018. http://dx.doi.org/10.1145/3269961.3269968.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Masood, Adeel, et Anurag Gupta. « Enhanced Logistics Security Techniques Using IoT and 5G ». Dans 2020 International Conference on Wireless Communications Signal Processing and Networking (WiSPNET). IEEE, 2020. http://dx.doi.org/10.1109/wispnet48689.2020.9198510.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Salzillo, Giovanni, et Massimiliano Rak. « A (in)Secure-by-Design IoT Protocol ». Dans CCS '20 : 2020 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA : ACM, 2020. http://dx.doi.org/10.1145/3411498.3419965.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Salman, Ola, Ayman Kayssi, Ali Chehab et Imad Elhajj. « Multi-level security for the 5G/IoT ubiquitous network ». Dans 2017 Second International Conference on Fog and Mobile Edge Computing (FMEC). IEEE, 2017. http://dx.doi.org/10.1109/fmec.2017.7946429.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
Nous offrons des réductions sur tous les plans premium pour les auteurs dont les œuvres sont incluses dans des sélections littéraires thématiques. Contactez-nous pour obtenir un code promo unique!

Vers la bibliographie