Gotowa bibliografia na temat „Security of IoT”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Spis treści
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Security of IoT”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Security of IoT"
Jogdand, Gopal, Shubham Kadam, Kiran Patil i Gaurav Mate. "Iot Transaction Security". Journal of Advances and Scholarly Researches in Allied Education 15, nr 2 (1.04.2018): 711–16. http://dx.doi.org/10.29070/15/57056.
Pełny tekst źródłaAbosata, Nasr, Saba Al-Rubaye, Gokhan Inalhan i Christos Emmanouilidis. "Internet of Things for System Integrity: A Comprehensive Survey on Security, Attacks and Countermeasures for Industrial Applications". Sensors 21, nr 11 (24.05.2021): 3654. http://dx.doi.org/10.3390/s21113654.
Pełny tekst źródłaToka, K. O., Y. Dikilitaş, T. Oktay i A. Sayar. "SECURING IOT WITH BLOCKCHAIN". International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLVI-4/W5-2021 (23.12.2021): 529–32. http://dx.doi.org/10.5194/isprs-archives-xlvi-4-w5-2021-529-2021.
Pełny tekst źródłaKotaiah, Dharavath, i Chitti Ravi Kiran. "Network Security Key Areas of IoT and IIOT- with Connected Devices Privacy and Security". International Journal for Research in Applied Science and Engineering Technology 11, nr 3 (31.03.2023): 2076–82. http://dx.doi.org/10.22214/ijraset.2023.49873.
Pełny tekst źródłaRaimundo, Ricardo Jorge, i Albérico Travassos Rosário. "Cybersecurity in the Internet of Things in Industrial Management". Applied Sciences 12, nr 3 (2.02.2022): 1598. http://dx.doi.org/10.3390/app12031598.
Pełny tekst źródłaAlkunidry, Dona, Shahad Alhuwaysi i Rawan Alharbi. "Security Threads and IoT Security". Journal of Computer and Communications 11, nr 09 (2023): 76–83. http://dx.doi.org/10.4236/jcc.2023.119005.
Pełny tekst źródłaAlasmary, Hisham. "RDAF-IIoT: Reliable Device-Access Framework for the Industrial Internet of Things". Mathematics 11, nr 12 (15.06.2023): 2710. http://dx.doi.org/10.3390/math11122710.
Pełny tekst źródłaMa, Jinnan, Xuekui Shangguan i Ying Zhang. "IoT Security Review: A Case Study of IIoT, IoV, and Smart Home". Wireless Communications and Mobile Computing 2022 (21.08.2022): 1–10. http://dx.doi.org/10.1155/2022/6360553.
Pełny tekst źródłaSaidkulovich, Sanjar Muminov, Husanboy Shoraimov Uktamboyevich i Umarbek Akramov Farkhodugli. "Internet-of-things security and vulnerabilities: Iot security, iot taxonomy". ACADEMICIA: An International Multidisciplinary Research Journal 11, nr 3 (2021): 620–24. http://dx.doi.org/10.5958/2249-7137.2021.00676.5.
Pełny tekst źródłaUsman, Sahnius, Shahnurin Khanam Sanchi, Muhammad Idris i Sadiq Abubakar Zagga. "SECURING IOT HEALTHCARE APPLICATIONS AND BLOCKCHAIN: ADDRESSING SECURITY ATTACKS". International Journal of Software Engineering and Computer Systems 9, nr 2 (29.07.2023): 119–28. http://dx.doi.org/10.15282/ijsecs.9.2.2023.5.0116.
Pełny tekst źródłaRozprawy doktorskie na temat "Security of IoT"
Laaboudi, Younes. "Reactive security of IoT communications". Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-249633.
Pełny tekst źródłaIoT-nätverks sårbarheter kan skyddas genom intrångsdetektering och svarsystem (IDRS). Anomalibaserad intrångsdetektering erbjuder flera fördelar: det kan upptäcka okända attacker och det kan anpassa sig till flera typer av protokoll. Inbrottssvaret är svårare att genomföra i kombination med ett anomalibaserat detekteringssystem, delvis på grund av möjligheten till falska positiva varningar. Det här exjobbet söker sätt att förbättra anomalibaserad detektering och svar genom två implementeringar av IDRS i två distinkta IoT-nätverk. Resultaten visar att anomalibaserad detektering kan användas vid ett ZigBee IoT- nätverk för att upptäcka olika typer av attacker utan tidigare kunskaper om den här attackerna. Dessutom kan mjuka svarmetoder användas för att förbättrar detekteringskvaliteten med låg inverkan på IoT- nätverksbeteendet.
Shakra, Mohamed, i Ahmad Jabali. "Evaluating Security For An IoT Device". Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-289631.
Pełny tekst źródłaIoT-systemanvändningen växer snabbt och är involverad i många branscher som orsakar fler potentiella säkerhetsbrister i ett nyligen nytt fält. Även glödlampor, har en ny generation som heter textit smarta glödlampor har tagit ett steg in i IoT- världen. I det här dokumentet utvärderas en prisvärd och tillgänglig glödlampa genom att använda en välkänd attack för att testa enhetens säkerhet. Det drogs slutsatsen att den studerade glödlampan befanns vara säkrad genom den mängd penetrationstester som utfördes i detta dokument. Metoderna som används för att utvärdera enheten kan dock tillämpas på vilken annan IoT som helst för framtida säkerhetsutvärdering.
Makkar, Ankush. "Enhancing IoT Security Using 5G Capabilities". Thesis, Luleå tekniska universitet, Digitala tjänster och system, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-85109.
Pełny tekst źródłaSöderquist, Mårten. "Tiny Security : Evaluating energy use for security in an IoT application". Thesis, Mittuniversitetet, Institutionen för data- och systemvetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-36860.
Pełny tekst źródłaMansouri, Mohamad. "Performance and Verifiability of IoT Security Protocols". Electronic Thesis or Diss., Sorbonne université, 2023. http://www.theses.fr/2023SORUS065.
Pełny tekst źródłaThe Internet of Things (IoT) is one of the most important technologies in our current world. It is composed of connected devices with sensors and processing abilities, all connected to a single platform that orchestrates them. The integration of these IoT devices into many real-life applications (eg., transportation, industries, ...) implies significant performance and efficiency improvements. As a consequence, we have seen a boom in the number of IoT devices deployed and their corresponding platforms. These IoT devices use real-time data from their deployment environment and send them to the platform. The collected data by these devices often consist of sensitive information belonging to the individual who uses this technology. Hence, the privacy of users' data is one of the important concerns in IoT. Moreover, IoT applications rely on automating frequent tasks to achieve better efficiency. Unfortunately, moving control of usually human-controlled operations to the IoT presents some non-negligible risks to the safety of IoT users. This thesis deals with the privacy and safety concerns raised by IoT. We propose security protocols that preserve the privacy of the users' data. In addition to privacy, we design verifiable solutions that guarantee the correctness of the computations performed by the IoT devices and the platform and hence increase trust toward this technology. We design these solutions while focusing on their performance. More precisely, we propose protocols that are scalable to cope with the increasing number of IoT devices. We also consider protocols that are fault-tolerant to cope with the frequent dropouts of IoT devices. We particularly focus on two security protocols: Secure Aggregation and Remote Attestation. Secure aggregation is a protocol where an aggregator computes the sum of the private inputs of a set of users. In this thesis, we propose the first verifiable secure aggregation protocol (VSA) that gives formal guarantees of security in the malicious model. Our solution preserves the privacy of users' inputs and the correctness of the aggregation result. Moreover, we propose a novel fault-tolerant secure aggregation protocol (FTSA) based on additively-homomorphic encryption. The scheme allows users in secure aggregation to drop from the protocol and offers a mechanism to recover the aggregate without affecting the privacy of the data. We show that FTSA outperforms the state-of-the-art solutions in terms of scalability with respect to the number of users. On the other hand, a remote attestation protocol is a protocol that allows an IoT device (acting as a prover) to prove its software integrity to the IoT platform (acting as the verifier). We propose a new collaborative remote attestation protocol (FADIA) in which devices collect attestations from each other and aggregate them. FADIA deals with the heterogeneity and dynamic nature of IoT by considering fairness in its design. The evaluation of FADIA shows an increase in the lifetime of the overall network
Tjäder, Hampus. "End-to-end Security Enhancement of an IoT Platform Using Object Security". Thesis, Linköpings universitet, Informationskodning, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-138838.
Pełny tekst źródłaShahidi, Hamed. "Security Challenges of Communication Protocols in IoT : Comparing security features of ZigBee and Z-Wave communication protocols in IoT devices". Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-40113.
Pełny tekst źródłaBlázquez, Rodríguez Alberto. "Security and AAA Architectures in an IoT Marketplace". Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-234660.
Pełny tekst źródłaBeaulaton, Delphine. "Security Analysis of IoT Systems using Attack Trees". Thesis, Lorient, 2019. http://www.theses.fr/2019LORIS548.
Pełny tekst źródłaLoT is a rapidly emerging paradigm that provides a way to the user to instrument and control a large variety of objects interacting between each other over the Internet. In IoT systems, the security risks are multiplied as they involve hetero- geneous devices that are connected to a shared network and that carry critical tasks, and hence, are targets for malicious users. In this thesis, we propose a security-based framework for modeling IoT systems where attack trees are defined alongside the model to detect and prevent security risks in the system. The language we implemented aims to model the IoT paradigm in a simple way. The IoT systems are composed of entities having some communication capabilities between each other. Two entities can communicate if (i) they are connected through a communication protocol and (ii) they satisfy some constraints imposed by the protocol. In order to identify and analyze attacks on the security of a system we use attack trees which are an intuitive and practical formal method to do so. A successful attack can be a rare event in the execution of a well-designed system. When rare, such attacks are hard to detect with usual model checking techniques. Hence, we use importance splitting as a statistical model checking technique for rare events
Szreder, Mikael. "IoT Security in Practice : A Computer Security Analysis of the IKEA “TRÅDFRI” Platform". Thesis, Linköpings universitet, Informationskodning, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-161042.
Pełny tekst źródłaKsiążki na temat "Security of IoT"
Chaki, Rituparna, i Debdutta Barman Roy. Security in IoT. Boca Raton: CRC Press, 2022. http://dx.doi.org/10.1201/9781003149507.
Pełny tekst źródłaNayak, Padmalaya, Niranjan Ray i P. Ravichandran. IoT Applications, Security Threats, and Countermeasures. Boca Raton: CRC Press, 2021. http://dx.doi.org/10.1201/9781003124252.
Pełny tekst źródłaHancke, Gerhard P., i Konstantinos Markantonakis, red. Radio Frequency Identification and IoT Security. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-62024-4.
Pełny tekst źródłaMitton, Nathalie, Hakima Chaouchi, Thomas Noel, Thomas Watteyne, Alban Gabillon i Patrick Capolsini, red. Interoperability, Safety and Security in IoT. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-52727-7.
Pełny tekst źródłaFortino, Giancarlo, Carlos E. Palau, Antonio Guerrieri, Nora Cuppens, Frédéric Cuppens, Hakima Chaouchi i Alban Gabillon, red. Interoperability, Safety and Security in IoT. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-93797-7.
Pełny tekst źródłaDehghantanha, Ali, i Kim-Kwang Raymond Choo, red. Handbook of Big Data and IoT Security. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-10543-3.
Pełny tekst źródłaJeyanthi, N., Ajith Abraham i Hamid Mcheick, red. Ubiquitous Computing and Computing Security of IoT. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-01566-4.
Pełny tekst źródłaAzrour, Mourade, Jamal Mabrouki, Azidine Guezzaz i Said Benkirane. Blockchain and Machine Learning for IoT Security. New York: Chapman and Hall/CRC, 2023. http://dx.doi.org/10.1201/9781003438779.
Pełny tekst źródłaPrasad, Ajay, Thipendra P. Singh i Samidha Dwivedi Sharma, red. Communication Technologies and Security Challenges in IoT. Singapore: Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-97-0052-3.
Pełny tekst źródłaJiang, Hongbo, Hongyi Wu i Fanzi Zeng, red. Edge Computing and IoT: Systems, Management and Security. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-73429-9.
Pełny tekst źródłaCzęści książek na temat "Security of IoT"
Monshizadeh, Mehrnoosh, i Vikramajeet Khatri. "IoT Security". W A Comprehensive Guide to 5G Security, 245–66. Chichester, UK: John Wiley & Sons, Ltd, 2018. http://dx.doi.org/10.1002/9781119293071.ch11.
Pełny tekst źródłaJabraeil Jamali, Mohammad Ali, Bahareh Bahrami, Arash Heidari, Parisa Allahverdizadeh i Farhad Norouzi. "IoT Security". W Towards the Internet of Things, 33–83. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-18468-1_3.
Pełny tekst źródłaLedwaba, Lehlogonolo P. I., i Gerhard P. Hancke. "IoT Security". W Encyclopedia of Wireless Networks, 681–85. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-319-78262-1_291.
Pełny tekst źródłaLedwaba, Lehlogonolo P. I., i Gerhard P. Hancke. "IoT Security". W Encyclopedia of Wireless Networks, 1–4. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-32903-1_291-1.
Pełny tekst źródłaKalaga, Gunneswara Rao VSSS. "IoT Security". W Design of Internet of Things, 121–28. Boca Raton: CRC Press, 2022. http://dx.doi.org/10.1201/9781003303206-15.
Pełny tekst źródłaChakravarthi, Veena S. "IoT Security". W Internet of Things and M2M Communication Technologies, 123–36. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-79272-5_8.
Pełny tekst źródłaSniatala, Pawel, S. S. Iyengar i Sanjeev Kaushik Ramani. "IoT Security". W Evolution of Smart Sensing Ecosystems with Tamper Evident Security, 17–24. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-77764-7_3.
Pełny tekst źródłaUpadhyay, Nidhi. "IoT Security". W Internet of Things, 101–17. New York: Apple Academic Press, 2023. http://dx.doi.org/10.1201/9781003304609-6.
Pełny tekst źródłaRussell, Brian. "IoT Cyber Security". W Intelligent Internet of Things, 473–512. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-30367-9_10.
Pełny tekst źródłaGolani, Neha, i Rajkumar Rajasekaran. "IoT Challenges: Security". W Internet of Things (IoT), 211–34. Boca Raton : Taylor & Francis, CRC Press, 2018.: CRC Press, 2017. http://dx.doi.org/10.1201/9781315269849-11.
Pełny tekst źródłaStreszczenia konferencji na temat "Security of IoT"
Barrie, Glenn, Andrew Whyte i Joyce Bell. "IoT security". W ICC '17: Second International Conference on Internet of Things, Data and Cloud Computing. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3018896.3018933.
Pełny tekst źródłaKovatcheva, Eugenia, Milena Koleva, Jose Luis Del Val Roman i Jose Antonio Campos Granados. "IOT SECURITY NUGGETS". W 13th International Conference on Education and New Learning Technologies. IATED, 2021. http://dx.doi.org/10.21125/edulearn.2021.1969.
Pełny tekst źródłaGokalp, Erem, i Muhammed Ali Aydin. "Security of IoT". W 2018 3rd International Conference on Computer Science and Engineering (UBMK). IEEE, 2018. http://dx.doi.org/10.1109/ubmk.2018.8566345.
Pełny tekst źródłaNaik, Swapnil, i Vikas Maral. "Cyber security — IoT". W 2017 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT). IEEE, 2017. http://dx.doi.org/10.1109/rteict.2017.8256700.
Pełny tekst źródłaRamesh Kumar, M., i Pradeep Sudhakaran. "Comprehensive Survey on Detecting Security Attacks of IoT Intrusion Detection Systems". W International Research Conference on IOT, Cloud and Data Science. Switzerland: Trans Tech Publications Ltd, 2023. http://dx.doi.org/10.4028/p-270t9z.
Pełny tekst źródła"T1C: IoT Security: - Threats, Security Challenges and IoT Security Research and Technology Trends". W 2018 31st IEEE International System-on-Chip Conference (SOCC). IEEE, 2018. http://dx.doi.org/10.1109/socc.2018.8618571.
Pełny tekst źródłaRizvi, Syed, Andrew Kurtz, Joseph Pfeffer i Mohammad Rizvi. "Securing the Internet of Things (IoT): A Security Taxonomy for IoT". W 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). IEEE, 2018. http://dx.doi.org/10.1109/trustcom/bigdatase.2018.00034.
Pełny tekst źródłaKumar, Rakesh, Bipin Kandpal i Vasim Ahmad. "Industrial IoT (IIOT): Security Threats and Countermeasures". W 2023 International Conference on Innovative Data Communication Technologies and Application (ICIDCA). IEEE, 2023. http://dx.doi.org/10.1109/icidca56705.2023.10100145.
Pełny tekst źródłaTyou, Iifan, Hiroki Nagayama, Takuya Saeki, Yukio Nagafuchi i Masaki Tanikawa. "Decentralized IoT Security Gateway". W 2018 3rd Cloudification of the Internet of Things (CIoT). IEEE, 2018. http://dx.doi.org/10.1109/ciot.2018.8627128.
Pełny tekst źródłaKodali, Ravi Kishore, Sasweth C. Rajanarayanan, Anvesh Koganti i Lakshmi Boppana. "IoT based security system". W TENCON 2019 - 2019 IEEE Region 10 Conference (TENCON). IEEE, 2019. http://dx.doi.org/10.1109/tencon.2019.8929420.
Pełny tekst źródłaRaporty organizacyjne na temat "Security of IoT"
Wendzel, Steffen, i Saffija Kasem-Madani. IoT Security: The Improvement-Decelerating 'Cycle of Blame'. Denmark: River Publishers, wrzesień 2016. http://dx.doi.org/10.13052/popcas010.
Pełny tekst źródłaHowell, Gema. Security Analysis of IoT Management Solutions for First Responders. Gaithersburg, MD: National Institute of Standards and Technology, 2022. http://dx.doi.org/10.6028/nist.tn.2223.
Pełny tekst źródłaGunathilake, Nilupulee, Ahmed Al-Dubai i William Buchanan. Recent advances and trends in lightweight cryptography for IoT security. Peeref, marzec 2023. http://dx.doi.org/10.54985/peeref.2303p1883219.
Pełny tekst źródłaGarcia-Morchon, O., S. Kumar i M. Sethi. Internet of Things (IoT) Security: State of the Art and Challenges. RFC Editor, kwiecień 2019. http://dx.doi.org/10.17487/rfc8576.
Pełny tekst źródłaKhalafalla, Aya, Adam Summers, Ifeoma Onunkwo i Adrian Chavez. Cyber and Physical Security Analysis of GSI and Noventum Application for IoT Communications. Office of Scientific and Technical Information (OSTI), grudzień 2022. http://dx.doi.org/10.2172/2004898.
Pełny tekst źródłaPhillips, Paul. The Application of Satellite-based Internet of Things for New Mobility. 400 Commonwealth Drive, Warrendale, PA, United States: SAE International, styczeń 2024. http://dx.doi.org/10.4271/epr2024001.
Pełny tekst źródłaSwallow, Brent M. Tenure security: Why it matters. Washington, DC: International Food Policy Research Institute, 2021. http://dx.doi.org/10.2499/p15738coll2.134784.
Pełny tekst źródłaBadger, Lee, Murugiah Souppaya, Mark Trapnell, Eric Trapnell, Dylan Yaga i Karen Scarfone. Guide to securing Apple OS X 10.10 systems for IT professionals: a NIST security configuration checklist. Gaithersburg, MD: National Institute of Standards and Technology, grudzień 2016. http://dx.doi.org/10.6028/nist.sp.800-179.
Pełny tekst źródłaFalco, J., K. Stouffer, A. Wavering i F. Proctor. IT security for industrial control systems. Gaithersburg, MD: National Institute of Standards and Technology, 2002. http://dx.doi.org/10.6028/nist.ir.6859.
Pełny tekst źródłaWilson, Elizabeth F. Homeland Security - Can It be Done? Fort Belvoir, VA: Defense Technical Information Center, kwiecień 2003. http://dx.doi.org/10.21236/ada415743.
Pełny tekst źródła