Vai al contenuto principale della pagina

Internet of things - ICIOT 2022 : 7th international conference, held as part of the Services Conference Federation, SCF 2022, Honolulu, HI, USA, December 10-14, 2022, proceedings / / edited by Bedir Tekinerdogan, Yingwei Wang, Liang-Jie Zhang



(Visualizza in formato marc)    (Visualizza in BIBFRAME)

Titolo: Internet of things - ICIOT 2022 : 7th international conference, held as part of the Services Conference Federation, SCF 2022, Honolulu, HI, USA, December 10-14, 2022, proceedings / / edited by Bedir Tekinerdogan, Yingwei Wang, Liang-Jie Zhang Visualizza cluster
Pubblicazione: Cham, Switzerland : , : Springer, , [2023]
©2023
Descrizione fisica: 1 online resource (146 pages)
Disciplina: 354.81150006
Soggetto topico: Internet of things
Persona (resp. second.): TekinerdoganBedir
WangYingwei
ZhangLiang-Jie
Nota di bibliografia: Includes bibliographical references and index.
Nota di contenuto: Intro -- Preface -- Organization -- Services Society -- Services Conference Federation (SCF) -- Contents -- Network Risk Assessment Method Based on Residual Risk Analysis -- 1 Introduction -- 2 Related work -- 3 Model -- 3.1 Formation Definition of Attack Graphs -- 3.2 Construction of Attack Graph Structure -- 3.3 Attack Maps to the Ring Algorithm -- 3.4 Attack Figure Parameters Construction -- 4 Experiment -- 5 Summary -- References -- EIMDC: A New Model for Designing Digital Twin Applications -- 1 Introduction -- 2 Related Works -- 3 EIMDC Model for Digital Twin Applications -- 3.1 Entity -- 3.2 Infrastructure -- 3.3 Data -- 3.4 Model -- 3.5 Context -- 4 Case Study -- 4.1 Entity -- 4.2 Infrastructure -- 4.3 Data -- 4.4 Model -- 4.5 Context -- 5 Conclusions -- References -- Penetration Testing: Smart Home IoT Devices -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 Experiments and Results -- 4.1 Network Scan Result -- 4.2 Exploit Attempt -- 5 Conclusion -- References -- A Comparative Analysis of User's Concerns and Government Policies on Autonomous Vehicles -- 1 Introduction -- 2 Literature Review -- 3 Data Acquisition and Pre-processing -- 3.1 Social Media Scraping -- 3.2 Government Policies Scraping -- 3.3 Data Pre-processing -- 3.4 Data Categorization -- 4 Data Analysis: Methods and Results -- 4.1 Tri-gram and Word Frequency Analysis -- 4.2 Sentiment Analysis -- 4.3 Topic Modeling -- 4.4 Comparative Analysis: User Concerns VS Government Policies -- 5 Future Directions -- 6 Conclusion -- References -- Design of Multi-data Sources Based Forest Fire Monitoring and Early Warning System -- 1 Introduction -- 2 Related Works -- 3 Top-Level Design -- 3.1 Data Source -- 3.2 System Design Process -- 3.3 Functional Design -- 4 Algorithm Design -- 4.1 Forest Fire Point Satellite Monitoring -- 4.2 Forest Fire Point Video Monitoring.
4.3 Inspectors Report Monitoring and Early Warning -- 5 Implementation and Discussion -- References -- An IoT Simulator Tool for Provisioning Secure and Dynamic User-centric Services -- 1 Introduction -- 2 Related Works -- 3 Background -- 4 Performance Analysis of Cryptography Protocols -- 4.1 Protocol Selection Criteria -- 4.2 Performance Analysis -- 5 CupCarbon Tool Setup -- 6 Simulation Parameters -- 7 Simulation Results and Observations -- 7.1 No Encryption Vs. Blowfish Encryption -- 7.2 No Encryption Vs. NtruEncrypt Encryption -- 7.3 Blowfish vs NtruEncrypt Encryption -- 8 Conclusion -- References -- Exploration of Thermoelectric Energy Harvesting for Secure, TLS-Based Industrial IoT Nodes -- 1 Introduction -- 2 Related Work and Background -- 2.1 ULP Secure Wireless IoT Edge Devices -- 2.2 Thermoelectric Energy Harvesting -- 2.3 Energy Storage for Thermoelectric Energy Harvester -- 3 Setup -- 3.1 ULP Secure IoT Application -- 3.2 Energy Harvesting Module -- 3.3 Energy Storage Technologies -- 4 Analysis and Results -- 4.1 ULP Secure IoT Application -- 4.2 Energy Harvesting Module -- 4.3 Energy Storage Technologies -- 4.4 Entire IoT System -- 5 Conclusion -- 6 Future Work -- References -- Lightweight Authentication Encryption to Improve DTLS, Quark Combined with Overhearing to Prevent DoS and MITM on Low-Resource IoT Devices -- 1 Introduction -- 2 Methodology -- 2.1 Solution that Integrates DTLS Protocol and Overhearing Mechanism -- 2.2 Solution Integrating Quark into DTLS with Overhearing -- 3 Results -- 4 Discussion -- 5 Conclusion -- References -- Comparison of Blynk IoT and ESP Rainmaker on ESP32 as Beginner-Friendly IoT Solutions -- 1 Introduction -- 2 IoT Platforms -- 2.1 Blynk IoT -- 2.2 ESP Rainmaker -- 3 Implementation -- 3.1 Hardware Implementation -- 3.2 Implementation of Blynk IoT -- 3.3 Implementation of ESP Rainmaker -- 4 Results.
5 Conclusion -- References -- Author Index.
Titolo autorizzato: Internet of things - ICIOT 2022  Visualizza cluster
ISBN: 3-031-23582-7
Formato: Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione: Inglese
Record Nr.: 9910639898303321
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Serie: Lecture Notes in Computer Science