LEADER 05425nam 2200481 450 001 996503466803316 005 20231110221249.0 010 $a3-031-23582-7 035 $a(MiAaPQ)EBC7166074 035 $a(Au-PeEL)EBL7166074 035 $a(CKB)25913961900041 035 $a(PPN)267813260 035 $a(EXLCZ)9925913961900041 100 $a20230504d2023 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aInternet of things - ICIOT 2022 $e7th international conference, held as part of the Services Conference Federation, SCF 2022, Honolulu, HI, USA, December 10-14, 2022, proceedings /$fedited by Bedir Tekinerdogan, Yingwei Wang, Liang-Jie Zhang 210 1$aCham, Switzerland :$cSpringer,$d[2023] 210 4$d©2023 215 $a1 online resource (146 pages) 225 1 $aLecture Notes in Computer Science ;$vv.13735 311 08$aPrint version: Tekinerdogan, Bedir Internet of Things - ICIOT 2022 Cham : Springer,c2023 9783031235818 320 $aIncludes bibliographical references and index. 327 $aIntro -- Preface -- Organization -- Services Society -- Services Conference Federation (SCF) -- Contents -- Network Risk Assessment Method Based on Residual Risk Analysis -- 1 Introduction -- 2 Related work -- 3 Model -- 3.1 Formation Definition of Attack Graphs -- 3.2 Construction of Attack Graph Structure -- 3.3 Attack Maps to the Ring Algorithm -- 3.4 Attack Figure Parameters Construction -- 4 Experiment -- 5 Summary -- References -- EIMDC: A New Model for Designing Digital Twin Applications -- 1 Introduction -- 2 Related Works -- 3 EIMDC Model for Digital Twin Applications -- 3.1 Entity -- 3.2 Infrastructure -- 3.3 Data -- 3.4 Model -- 3.5 Context -- 4 Case Study -- 4.1 Entity -- 4.2 Infrastructure -- 4.3 Data -- 4.4 Model -- 4.5 Context -- 5 Conclusions -- References -- Penetration Testing: Smart Home IoT Devices -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 Experiments and Results -- 4.1 Network Scan Result -- 4.2 Exploit Attempt -- 5 Conclusion -- References -- A Comparative Analysis of User's Concerns and Government Policies on Autonomous Vehicles -- 1 Introduction -- 2 Literature Review -- 3 Data Acquisition and Pre-processing -- 3.1 Social Media Scraping -- 3.2 Government Policies Scraping -- 3.3 Data Pre-processing -- 3.4 Data Categorization -- 4 Data Analysis: Methods and Results -- 4.1 Tri-gram and Word Frequency Analysis -- 4.2 Sentiment Analysis -- 4.3 Topic Modeling -- 4.4 Comparative Analysis: User Concerns VS Government Policies -- 5 Future Directions -- 6 Conclusion -- References -- Design of Multi-data Sources Based Forest Fire Monitoring and Early Warning System -- 1 Introduction -- 2 Related Works -- 3 Top-Level Design -- 3.1 Data Source -- 3.2 System Design Process -- 3.3 Functional Design -- 4 Algorithm Design -- 4.1 Forest Fire Point Satellite Monitoring -- 4.2 Forest Fire Point Video Monitoring. 327 $a4.3 Inspectors Report Monitoring and Early Warning -- 5 Implementation and Discussion -- References -- An IoT Simulator Tool for Provisioning Secure and Dynamic User-centric Services -- 1 Introduction -- 2 Related Works -- 3 Background -- 4 Performance Analysis of Cryptography Protocols -- 4.1 Protocol Selection Criteria -- 4.2 Performance Analysis -- 5 CupCarbon Tool Setup -- 6 Simulation Parameters -- 7 Simulation Results and Observations -- 7.1 No Encryption Vs. Blowfish Encryption -- 7.2 No Encryption Vs. NtruEncrypt Encryption -- 7.3 Blowfish vs NtruEncrypt Encryption -- 8 Conclusion -- References -- Exploration of Thermoelectric Energy Harvesting for Secure, TLS-Based Industrial IoT Nodes -- 1 Introduction -- 2 Related Work and Background -- 2.1 ULP Secure Wireless IoT Edge Devices -- 2.2 Thermoelectric Energy Harvesting -- 2.3 Energy Storage for Thermoelectric Energy Harvester -- 3 Setup -- 3.1 ULP Secure IoT Application -- 3.2 Energy Harvesting Module -- 3.3 Energy Storage Technologies -- 4 Analysis and Results -- 4.1 ULP Secure IoT Application -- 4.2 Energy Harvesting Module -- 4.3 Energy Storage Technologies -- 4.4 Entire IoT System -- 5 Conclusion -- 6 Future Work -- References -- Lightweight Authentication Encryption to Improve DTLS, Quark Combined with Overhearing to Prevent DoS and MITM on Low-Resource IoT Devices -- 1 Introduction -- 2 Methodology -- 2.1 Solution that Integrates DTLS Protocol and Overhearing Mechanism -- 2.2 Solution Integrating Quark into DTLS with Overhearing -- 3 Results -- 4 Discussion -- 5 Conclusion -- References -- Comparison of Blynk IoT and ESP Rainmaker on ESP32 as Beginner-Friendly IoT Solutions -- 1 Introduction -- 2 IoT Platforms -- 2.1 Blynk IoT -- 2.2 ESP Rainmaker -- 3 Implementation -- 3.1 Hardware Implementation -- 3.2 Implementation of Blynk IoT -- 3.3 Implementation of ESP Rainmaker -- 4 Results. 327 $a5 Conclusion -- References -- Author Index. 410 0$aLecture Notes in Computer Science 606 $aInternet of things 615 0$aInternet of things. 676 $a354.81150006 702 $aTekinerdogan$b Bedir 702 $aWang$b Yingwei 702 $aZhang$b Liang-Jie 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996503466803316 996 $aInternet of things - ICIOT 2022$93363114 997 $aUNISA