Advances in IoT and Security with Computational Intelligence . Volume 1. : Proceedings of ICAISA 2023 / / Anurag Mishra, Deepak Gupta, and Girija Chetty, editors |
Edizione | [First edition.] |
Pubbl/distr/stampa | Singapore : , : Springer, , [2023] |
Descrizione fisica | 1 online resource (411 pages) |
Disciplina | 004.678 |
Collana | Lecture Notes in Networks and Systems Series |
Soggetto topico |
Artificial intelligence
Computer security Internet of things Internet of things - Security measures |
ISBN | 981-9950-85-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | An Automatic Decision Support System for Assessing SDG Contributions -- Removing Stegomalware from Digital Image Files -- Entropic Analysis of Reservation Policy of Government of India -- Cybersecurity in the Supply Chain and Logistics Industry: A Concept-Centric Review -- Machine Learning Methodology for the Recognition of Unsolicited Mail Communications -- IoT-Based Automated Hydroponic Cultivation System: A Step Toward Smart Agriculture for Sustainable Environment. |
Record Nr. | UNINA-9910746291903321 |
Singapore : , : Springer, , [2023] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
AI-enabled threat detection and security analysis for industrial IoT / / Hadis Karimipour, Farnaz Derakhshan, editors |
Edizione | [1st ed. 2021.] |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2021] |
Descrizione fisica | 1 online resource (VIII, 250 p. 94 illus., 82 illus. in color.) |
Disciplina | 005.8 |
Soggetto topico |
Internet of things - Security measures
Computer security Artificial intelligence |
ISBN | 3-030-76613-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Artificial Intelligence for Threat Detection and Analysis in Industrial IoT: Applications and Challenges -- Complementing IIoT Services through AI: Feasibility and Suitability -- Data Security and Privacy in Industrial IoT -- Blockchain Applications in the Industrial Internet of Things -- Application of Deep Learning on IoT-enabled Smart Grid Monitoring -- Cyber Security of Smart Manufacturing Execution Systems: A Bibliometric Analysis -- The Role of Machine Learning in IIoT Through FPGAs -- Deep Representation Learning for Cyber-Attack Detection in Industrial IoT -- Classification and Intelligent Mining of Anomalies in Industrial IoT -- A Snapshot Ensemble Deep Neural Network Model for Attack Detection in Industrial Internet of Things -- Privacy Preserving Federated Learning Solution for Security of Industrial Cyber Physical Systems -- A Multi-Stage Machine Learning Model for Security Analysis in Industrial Control System -- A Recurrent Attention Model for Cyber Attack Classification. |
Record Nr. | UNINA-9910495232403321 |
Cham, Switzerland : , : Springer, , [2021] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
AI-enabled threat detection and security analysis for industrial IoT / / Hadis Karimipour, Farnaz Derakhshan, editors |
Edizione | [1st ed. 2021.] |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2021] |
Descrizione fisica | 1 online resource (VIII, 250 p. 94 illus., 82 illus. in color.) |
Disciplina | 005.8 |
Soggetto topico |
Internet of things - Security measures
Computer security Artificial intelligence |
ISBN | 3-030-76613-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Artificial Intelligence for Threat Detection and Analysis in Industrial IoT: Applications and Challenges -- Complementing IIoT Services through AI: Feasibility and Suitability -- Data Security and Privacy in Industrial IoT -- Blockchain Applications in the Industrial Internet of Things -- Application of Deep Learning on IoT-enabled Smart Grid Monitoring -- Cyber Security of Smart Manufacturing Execution Systems: A Bibliometric Analysis -- The Role of Machine Learning in IIoT Through FPGAs -- Deep Representation Learning for Cyber-Attack Detection in Industrial IoT -- Classification and Intelligent Mining of Anomalies in Industrial IoT -- A Snapshot Ensemble Deep Neural Network Model for Attack Detection in Industrial Internet of Things -- Privacy Preserving Federated Learning Solution for Security of Industrial Cyber Physical Systems -- A Multi-Stage Machine Learning Model for Security Analysis in Industrial Control System -- A Recurrent Attention Model for Cyber Attack Classification. |
Record Nr. | UNISA-996464508903316 |
Cham, Switzerland : , : Springer, , [2021] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Applied cryptography in computer and communications : first EAI International Conference, AC3 2021, virtual event, May 15-16, 2021, proceedings / / Bo Chen, Xinyi Huang (editors) |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2021] |
Descrizione fisica | 1 online resource (216 pages) |
Disciplina | 005.82 |
Collana | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |
Soggetto topico |
Data encryption (Computer science)
Telecommunication systems - Security measures Internet of things - Security measures Huang, Xinyi |
ISBN | 3-030-80851-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Organization -- Contents -- Blockchain -- Anchor: An NDN-Based Blockchain Network -- 1 Introduction -- 2 Our Design -- 2.1 Random Anchor Selection -- 2.2 Two-Layer Cascaded NDN Design -- 2.3 Elimination of Duplicated Transmissions from Multiple Anchors -- 3 Performance Evaluation -- 4 Conclusion -- References -- An Identity-Based Blind Signature and Its Application for Privacy Preservation in Bitcoin -- 1 Introduction -- 2 Preliminaries -- 2.1 Tate Bilinear Pairings -- 2.2 Computational Diffie-Hellman Assumption -- 2.3 System Model -- 3 Review of Sarde et al.' Blind Signature Scheme -- 4 Attack on Sarde et al.' Blind Signature Scheme -- 5 Unlinkable ID-Based Blind Signature Scheme -- 6 Unlinkable ID-Based Proxy Blind Signature Scheme -- 7 Security Analysis -- 7.1 Analysis of Blind Signature -- 7.2 Analysis of Proxy Blind Signature -- 8 Performance Analysis and Comparison -- 9 Application for Privacy Preservation in Bitcoin -- References -- Blockchain-Based Sealed-Bid Domain Name Auction Protocol -- 1 Introduction -- 2 Models and Design Goals -- 2.1 System Model -- 2.2 Security Model -- 2.3 Design Goal -- 3 Preliminaries -- 3.1 Account-Based Consortium Blockchain -- 3.2 Auction Types -- 3.3 Pedersen Commitment -- 3.4 Zero-Knowledge Proof -- 4 Our Proposal -- 4.1 Create the Auction -- 4.2 Commit the Bid -- 4.3 Reveal the Bid -- 4.4 Close the Auction -- 5 Analysis of Our Proposal -- 5.1 Security Analysis -- 5.2 Performance Evaluation -- 6 Related Work -- 6.1 Blockchain-Based DNS -- 6.2 Blockchain-Based Auction -- 7 Conclusion -- References -- Authentication -- A Security Enhanced Key Management Service for ARM Pointer Authentication -- 1 Introduction -- 2 Background -- 2.1 Privilege and Exception Levels -- 2.2 Pointer Authentication -- 3 Threat Model -- 3.1 Attacks -- 3.2 Assumptions -- 4 Design -- 4.1 Architecture.
4.2 Algorithm -- 5 Implementation -- 5.1 EL3 Runtime Service -- 5.2 EL1 Kernel Module -- 5.3 EL0 Calling Convention -- 6 Evaluation -- 6.1 Security Analysis -- 6.2 Performance Analysis -- 7 Related Works -- 8 Conclusion -- References -- Privacy-Preserving ECC-Based Three-Factor Authentication Protocol for Smart Remote Vehicle Control System -- 1 Introduction -- 1.1 Threat Model -- 1.2 Related Works -- 1.3 Motivation and Contribution -- 1.4 Notations -- 1.5 Paper Organization -- 2 Review of Chatterjee et al.'s Scheme -- 2.1 System Initialization and Registration Phase -- 2.2 Authentication and Key Agreement Phase -- 3 Cryptanalysis of Chatterjee et al.'s Scheme -- 4 The Proposed Scheme -- 4.1 Pre-deployment Phase -- 4.2 User Registration Phase -- 4.3 Login and Authentication Phase -- 5 Security Analysis -- 5.1 BAN-Logic Based Proof of Authentication -- 5.2 Further Security Analysis -- 6 Performance Evaluation -- 6.1 Security Features -- 6.2 Computational Overhead -- 7 Conclusion and Future Work -- References -- Secure Computation -- Efficient and Private Divisible Double Auction in Trusted Execution Environment -- 1 Introduction -- 2 Divisible Double Auction -- 2.1 Models -- 2.2 Auction Properties -- 3 Mechanism Design -- 4 ETA System Design -- 4.1 SGX Formalization -- 4.2 ETA System -- 4.3 ETA Execution Program -- 4.4 Threat Model -- 4.5 Security Analysis -- 5 Experiments -- 5.1 ETA Performance Evaluation -- 5.2 Case Study -- 6 Related Work -- 7 Conclusion -- References -- Parallel Implementation and Optimization of SM4 Based on CUDA -- 1 Introduction -- 2 Preliminaries -- 2.1 CUDA -- 2.2 A Brief Description of SM4 -- 3 Parallel Design of SM4 -- 4 Experiment and Discussion -- 4.1 Basic Experiment -- 4.2 Performance Optimization -- 4.3 Analysis of Results -- 5 Conclusion -- References -- Another Algebraic Decomposition Method for Masked Implementation. 1 Introduction -- 2 Preliminaries -- 2.1 Functions over Finite Fields -- 3 Algebraic Decomposition -- 3.1 Algebraic Decomposition Using GM Polynomials -- 3.2 Experimental Result -- 4 Application to Masking -- 5 Conclusion -- A Masking for Quadratic Polynomial -- References -- Practical Crypto Application -- Concealed Communication in Online Social Networks -- 1 Introduction -- 2 Related Work -- 2.1 Privacy Analysis in Online Social Networks -- 2.2 Privacy Leakages -- 2.3 Privacy-Preserving Online Social Networks -- 2.4 Mix Networks -- 3 Proposed Protocols -- 3.1 A Concealed Secure Channel -- 3.2 User Information and Postings -- 3.3 Personal Messages and Group Messages -- 3.4 Groups -- 3.5 Finding and Verifying Participants, Exchanging Keys -- 3.6 Key Revocation -- 3.7 User Registration -- 4 Privacy Analysis -- 4.1 Attacker Model -- 4.2 Structure of Network (NS) -- 4.3 Structure of Data (DS) -- 4.4 Timing (T) -- 4.5 Control Information (CI) -- 5 Performance Analysis -- 6 Conclusions -- References -- MobiWear: A Plausibly Deniable Encryption System for Wearable Mobile Devices -- 1 Introduction -- 2 Background -- 2.1 Wearable Mobile Devices -- 2.2 Plausibly Deniable Encryption -- 2.3 Image Steganography -- 2.4 Digital Watermarking -- 2.5 Peak Signal-to-Noise Ratio (PSNR) -- 3 Model and Assumptions -- 3.1 System Model -- 3.2 Adversarial Model -- 4 Design -- 4.1 Design Rationale -- 4.2 Design Details -- 5 Implementation and Evaluation -- 5.1 Implementation -- 5.2 Evaluation -- 6 Security Analysis and Discussion -- 6.1 Security Analysis -- 6.2 Discussion -- 7 Related Work -- 7.1 Plausibly Deniable Encryption Systems -- 7.2 Image Steganograyphy -- 8 Conclusion -- References -- Recent Advances in the Web PKI and the Technical Challenges in SCMS -- 1 Introduction -- 2 Recent Advances in the Web PKI -- 2.1 Certificate Transparency. 2.2 Push-Based Certificate Revocation -- 3 The Technical Challenges in SCMS -- 3.1 The Expected Properties of V2V PKI Systems -- 3.2 SCMS -- 3.3 Technical Challenge #1: Certificate Transparency vs. Pseudonym Certificate -- 3.4 Technical Challenge #2: Push-Based Certificate Revocation vs. the Great Volume of Pseudonym Certificates -- 4 Conclusions -- References -- The First International Workshop on Security for Internet of Things (IOTS 2021) -- A Novel Approach for Code Smells Detection Based on Deep Leaning -- 1 Introduction -- 2 Code Smells Detection Based on Convolutional Networks -- 3 High Level Design -- 3.1 Experiments Results -- 4 Conclusion -- References -- A Thieves Identification Scheme for Prepaid Systems in Smart Grids -- 1 Introduction -- 2 Related Work -- 3 The Framework -- 3.1 Network Model -- 3.2 Security Requirements -- 4 Our Proposed Approach -- 4.1 Setup -- 4.2 Joining -- 4.3 Power Purchasing -- 4.4 Power Requesting -- 4.5 Identification -- 5 Conclusion -- References -- Using Smart Contracts to Improve Searchable Symmetric Encryption -- 1 Introduction -- 2 Notations -- 3 Preliminaries -- 3.1 Scheme of Searchable Symmetric Encryption -- 3.2 Smart Contract -- 4 Scheme of the Integrity Verification of Search Results -- 4.1 Merkle Tree -- 4.2 Proof of Integrity Verification of Search Results -- 5 Smart Contract Based Searchable Symmetric Encryption -- 5.1 Scheme of Smart Contract Based SSE -- 5.2 Details of Smart Contract Based SSE Scheme -- 6 Security and Performance Analyses -- 6.1 Security Analysis -- 6.2 Performance Analysis -- 6.3 Experimental Analysis -- 7 Conclusion -- References -- Towards the Adaptability of Traffic-Based IoT Security Management Systems to the Device Behavior Evolutions -- 1 Introduction -- 2 IoT Security Management Systems -- 3 IoT Device Behavior Evolutions -- 4 Possible Solutions -- 5 Conclusion. References -- Author Index. |
Record Nr. | UNISA-996464420203316 |
Cham, Switzerland : , : Springer, , [2021] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Applied cryptography in computer and communications : first EAI International Conference, AC3 2021, virtual event, May 15-16, 2021, proceedings / / Bo Chen, Xinyi Huang (editors) |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2021] |
Descrizione fisica | 1 online resource (216 pages) |
Disciplina | 005.82 |
Collana | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |
Soggetto topico |
Data encryption (Computer science)
Telecommunication systems - Security measures Internet of things - Security measures Huang, Xinyi |
ISBN | 3-030-80851-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Organization -- Contents -- Blockchain -- Anchor: An NDN-Based Blockchain Network -- 1 Introduction -- 2 Our Design -- 2.1 Random Anchor Selection -- 2.2 Two-Layer Cascaded NDN Design -- 2.3 Elimination of Duplicated Transmissions from Multiple Anchors -- 3 Performance Evaluation -- 4 Conclusion -- References -- An Identity-Based Blind Signature and Its Application for Privacy Preservation in Bitcoin -- 1 Introduction -- 2 Preliminaries -- 2.1 Tate Bilinear Pairings -- 2.2 Computational Diffie-Hellman Assumption -- 2.3 System Model -- 3 Review of Sarde et al.' Blind Signature Scheme -- 4 Attack on Sarde et al.' Blind Signature Scheme -- 5 Unlinkable ID-Based Blind Signature Scheme -- 6 Unlinkable ID-Based Proxy Blind Signature Scheme -- 7 Security Analysis -- 7.1 Analysis of Blind Signature -- 7.2 Analysis of Proxy Blind Signature -- 8 Performance Analysis and Comparison -- 9 Application for Privacy Preservation in Bitcoin -- References -- Blockchain-Based Sealed-Bid Domain Name Auction Protocol -- 1 Introduction -- 2 Models and Design Goals -- 2.1 System Model -- 2.2 Security Model -- 2.3 Design Goal -- 3 Preliminaries -- 3.1 Account-Based Consortium Blockchain -- 3.2 Auction Types -- 3.3 Pedersen Commitment -- 3.4 Zero-Knowledge Proof -- 4 Our Proposal -- 4.1 Create the Auction -- 4.2 Commit the Bid -- 4.3 Reveal the Bid -- 4.4 Close the Auction -- 5 Analysis of Our Proposal -- 5.1 Security Analysis -- 5.2 Performance Evaluation -- 6 Related Work -- 6.1 Blockchain-Based DNS -- 6.2 Blockchain-Based Auction -- 7 Conclusion -- References -- Authentication -- A Security Enhanced Key Management Service for ARM Pointer Authentication -- 1 Introduction -- 2 Background -- 2.1 Privilege and Exception Levels -- 2.2 Pointer Authentication -- 3 Threat Model -- 3.1 Attacks -- 3.2 Assumptions -- 4 Design -- 4.1 Architecture.
4.2 Algorithm -- 5 Implementation -- 5.1 EL3 Runtime Service -- 5.2 EL1 Kernel Module -- 5.3 EL0 Calling Convention -- 6 Evaluation -- 6.1 Security Analysis -- 6.2 Performance Analysis -- 7 Related Works -- 8 Conclusion -- References -- Privacy-Preserving ECC-Based Three-Factor Authentication Protocol for Smart Remote Vehicle Control System -- 1 Introduction -- 1.1 Threat Model -- 1.2 Related Works -- 1.3 Motivation and Contribution -- 1.4 Notations -- 1.5 Paper Organization -- 2 Review of Chatterjee et al.'s Scheme -- 2.1 System Initialization and Registration Phase -- 2.2 Authentication and Key Agreement Phase -- 3 Cryptanalysis of Chatterjee et al.'s Scheme -- 4 The Proposed Scheme -- 4.1 Pre-deployment Phase -- 4.2 User Registration Phase -- 4.3 Login and Authentication Phase -- 5 Security Analysis -- 5.1 BAN-Logic Based Proof of Authentication -- 5.2 Further Security Analysis -- 6 Performance Evaluation -- 6.1 Security Features -- 6.2 Computational Overhead -- 7 Conclusion and Future Work -- References -- Secure Computation -- Efficient and Private Divisible Double Auction in Trusted Execution Environment -- 1 Introduction -- 2 Divisible Double Auction -- 2.1 Models -- 2.2 Auction Properties -- 3 Mechanism Design -- 4 ETA System Design -- 4.1 SGX Formalization -- 4.2 ETA System -- 4.3 ETA Execution Program -- 4.4 Threat Model -- 4.5 Security Analysis -- 5 Experiments -- 5.1 ETA Performance Evaluation -- 5.2 Case Study -- 6 Related Work -- 7 Conclusion -- References -- Parallel Implementation and Optimization of SM4 Based on CUDA -- 1 Introduction -- 2 Preliminaries -- 2.1 CUDA -- 2.2 A Brief Description of SM4 -- 3 Parallel Design of SM4 -- 4 Experiment and Discussion -- 4.1 Basic Experiment -- 4.2 Performance Optimization -- 4.3 Analysis of Results -- 5 Conclusion -- References -- Another Algebraic Decomposition Method for Masked Implementation. 1 Introduction -- 2 Preliminaries -- 2.1 Functions over Finite Fields -- 3 Algebraic Decomposition -- 3.1 Algebraic Decomposition Using GM Polynomials -- 3.2 Experimental Result -- 4 Application to Masking -- 5 Conclusion -- A Masking for Quadratic Polynomial -- References -- Practical Crypto Application -- Concealed Communication in Online Social Networks -- 1 Introduction -- 2 Related Work -- 2.1 Privacy Analysis in Online Social Networks -- 2.2 Privacy Leakages -- 2.3 Privacy-Preserving Online Social Networks -- 2.4 Mix Networks -- 3 Proposed Protocols -- 3.1 A Concealed Secure Channel -- 3.2 User Information and Postings -- 3.3 Personal Messages and Group Messages -- 3.4 Groups -- 3.5 Finding and Verifying Participants, Exchanging Keys -- 3.6 Key Revocation -- 3.7 User Registration -- 4 Privacy Analysis -- 4.1 Attacker Model -- 4.2 Structure of Network (NS) -- 4.3 Structure of Data (DS) -- 4.4 Timing (T) -- 4.5 Control Information (CI) -- 5 Performance Analysis -- 6 Conclusions -- References -- MobiWear: A Plausibly Deniable Encryption System for Wearable Mobile Devices -- 1 Introduction -- 2 Background -- 2.1 Wearable Mobile Devices -- 2.2 Plausibly Deniable Encryption -- 2.3 Image Steganography -- 2.4 Digital Watermarking -- 2.5 Peak Signal-to-Noise Ratio (PSNR) -- 3 Model and Assumptions -- 3.1 System Model -- 3.2 Adversarial Model -- 4 Design -- 4.1 Design Rationale -- 4.2 Design Details -- 5 Implementation and Evaluation -- 5.1 Implementation -- 5.2 Evaluation -- 6 Security Analysis and Discussion -- 6.1 Security Analysis -- 6.2 Discussion -- 7 Related Work -- 7.1 Plausibly Deniable Encryption Systems -- 7.2 Image Steganograyphy -- 8 Conclusion -- References -- Recent Advances in the Web PKI and the Technical Challenges in SCMS -- 1 Introduction -- 2 Recent Advances in the Web PKI -- 2.1 Certificate Transparency. 2.2 Push-Based Certificate Revocation -- 3 The Technical Challenges in SCMS -- 3.1 The Expected Properties of V2V PKI Systems -- 3.2 SCMS -- 3.3 Technical Challenge #1: Certificate Transparency vs. Pseudonym Certificate -- 3.4 Technical Challenge #2: Push-Based Certificate Revocation vs. the Great Volume of Pseudonym Certificates -- 4 Conclusions -- References -- The First International Workshop on Security for Internet of Things (IOTS 2021) -- A Novel Approach for Code Smells Detection Based on Deep Leaning -- 1 Introduction -- 2 Code Smells Detection Based on Convolutional Networks -- 3 High Level Design -- 3.1 Experiments Results -- 4 Conclusion -- References -- A Thieves Identification Scheme for Prepaid Systems in Smart Grids -- 1 Introduction -- 2 Related Work -- 3 The Framework -- 3.1 Network Model -- 3.2 Security Requirements -- 4 Our Proposed Approach -- 4.1 Setup -- 4.2 Joining -- 4.3 Power Purchasing -- 4.4 Power Requesting -- 4.5 Identification -- 5 Conclusion -- References -- Using Smart Contracts to Improve Searchable Symmetric Encryption -- 1 Introduction -- 2 Notations -- 3 Preliminaries -- 3.1 Scheme of Searchable Symmetric Encryption -- 3.2 Smart Contract -- 4 Scheme of the Integrity Verification of Search Results -- 4.1 Merkle Tree -- 4.2 Proof of Integrity Verification of Search Results -- 5 Smart Contract Based Searchable Symmetric Encryption -- 5.1 Scheme of Smart Contract Based SSE -- 5.2 Details of Smart Contract Based SSE Scheme -- 6 Security and Performance Analyses -- 6.1 Security Analysis -- 6.2 Performance Analysis -- 6.3 Experimental Analysis -- 7 Conclusion -- References -- Towards the Adaptability of Traffic-Based IoT Security Management Systems to the Device Behavior Evolutions -- 1 Introduction -- 2 IoT Security Management Systems -- 3 IoT Device Behavior Evolutions -- 4 Possible Solutions -- 5 Conclusion. References -- Author Index. |
Record Nr. | UNINA-9910490025803321 |
Cham, Switzerland : , : Springer, , [2021] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
CPSIoTSec '21 : proceedings of the 2th Workshop on CPS&IoT Security and Privacy : November 15, 2021, virtual event, Republic of Korea / / Association for Computing Machinery |
Pubbl/distr/stampa | New York, NY : , : The Association for Computing Machinery, , [2021] |
Descrizione fisica | 1 online resource : illustrations (some color) |
Disciplina | 005.8 |
Soggetto topico |
Computer security
Cooperating objects (Computer systems) Internet of things Internet of things - Security measures |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910510445803321 |
New York, NY : , : The Association for Computing Machinery, , [2021] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Intelligent security management and control in the Iot / / edited by Mohamed-Aymen Chalouf |
Pubbl/distr/stampa | Hoboken, New Jersey : , : John Wiley & Sons, Incorporated, , [2022] |
Descrizione fisica | 1 online resource (314 pages) |
Disciplina | 004 |
Collana | Sciences. Networks and communications. Network management and control |
Soggetto topico |
Internet of things - Security measures
Internet of things - Control |
ISBN |
1-394-15603-0
1-394-15601-4 1-394-15602-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover -- Half-Title Page -- Title Page -- Copyright Page -- Contents -- 1. Multicriteria Selection of Transmission Parameters in the IoT -- 1.2. Changing access network in the IoT -- 1.3. Spectrum handoff in the IoT -- 1.4. Multicriteria decision-making module for an effective spectrum handoff in the IoT -- 1.4.1. General architecture -- 1.4.2. Decision-making flowchart -- 1.4.3. Performances evaluation -- 1.5. Conclusion -- 1.6. References -- 2. Using Reinforcement Learning to Manage Massive Access in NB-IoT Networks -- 2.1. Introduction -- 2.2. Fundamentals of the NB-IoT standard -- 2.2.1. Deployment and instances of use -- 2.2.2. Transmission principles -- 2.2.3. Radio resource random access procedure -- 2.3. State of the art -- 2.4. Model for accessing IoT terminals -- 2.5. Access controller for IoT terminals based on reinforcement learning -- 2.5.1. Formulating the problem -- 2.5.2. Regulation system for arrivals -- 2.6. Performance evaluation -- 2.7. Conclusion -- 2.8. References -- 3. Optimizing Performances in the IoT: An Approach Based on Intelligent Radio -- 3.1. Introduction -- 3.2. Internet of Things (IoT) -- 3.2.1. Definition of the IoT -- 3.2.2. Applications of the IoT -- 3.2.3. IoT challenges -- 3.2.4. Enabling technologies in the IoT -- 3.3. Intelligent radio -- 3.3.1. Definition of intelligent radio -- 3.3.2. Motivations for using intelligent radio in the IoT -- 3.3.3. Challenges in using intelligent radio in the IoT -- 3.4. Conclusion -- 3.5. References -- 4. Optimizing the Energy Consumption of IoT Devices -- 4.1. Introduction -- 4.2. Energy optimization -- 4.2.1. Definitions -- 4.3. Optimization techniques for energy consumption -- 4.3.1. The A* algorithm -- 4.3.2. Fuzzy logic -- 4.4. Energy optimization in the IoT -- 4.4.1. Characteristics of the IoT -- 4.4.2. Challenges in energy optimization.
4.4.3. Research on energy optimization in the IoT -- 4.5. Autonomous energy optimization framework in the IoT -- 4.5.1. Autonomous computing -- 4.5.2. Framework specification -- 4.6. Proposition of a self-optimization method for energy consumption in the IoT -- 4.6.1. Fuzzy logic model -- 4.6.2. Decision-making algorithm -- 4.6.3. Evaluating energy self-optimization in the IoT -- 4.7. Conclusion -- 4.8. References -- 5. Toward Intelligent Management of Service Quality in the IoT: The Case of a Low Rate WPAN -- 5.1. Introduction -- 5.2. Quick overview of the IoT -- 5.2.2. Technologies for the IoT -- 5.2.3. IoT and quality of service -- 5.3. IEEE 802.15.4 TSCH approach -- 5.4. Transmission scheduling -- 5.4.1. General considerations -- 5.4.2. Scheduling in the literature -- 5.5. Routing and RPL -- 5.5.1. Routing -- 5.5.2. RPL -- 5.5.3. Multipath -- 5.6. Combined approach based on 802.15.4 TSCH and multipath RPL -- 5.6.1. Automatic Repeat reQuest -- 5.6.2. Replication and Elimination -- 5.6.3. Overhearing -- 5.7. Conclusion -- 5.8. References -- 6. Adapting Quality of Service of Energy-Harvesting IoT Devices -- 6.1. Toward the energy autonomy of sensor networks -- 6.1.1. Energy harvesting and management -- 6.1.2. State-of-the-art energy managers -- 6.2. Fuzzyman: use of fuzzy logic -- 6.2.1. Design of Fuzzyman -- 6.2.2. Evaluating Fuzzyman -- 6.2.3. Conclusion -- 6.3. RLMan: using reinforcement learning -- 6.3.1. Formulating the problem of managing the harvested energy -- 6.3.2. RLMan algorithm -- 6.3.3. Evaluation of RLMan -- 6.3.4. Conclusion -- 6.4. Toward energy autonomous LoRa nodes -- 6.4.1. Multisource energy-harvesting architecture -- 6.4.2. Applying energy management to LoRa nodes -- 6.5. Conclusion -- 6.6. References -- 7. Adapting Access Control for IoT Security -- 7.1. Introduction -- 7.2. Defining security services in the IoT. 7.2.1. Identification and authentication in the IoT -- 7.2.2. Access control in the IoT -- 7.2.3. Confidentiality in the IoT -- 7.2.4. Integrity in the IoT -- 7.2.5. Non-repudiation in the IoT -- 7.2.6. Availability in the IoT -- 7.3. Access control technologies -- 7.4. Access control in the IoT -- 7.4.1. Research on the extension of access control models for the IoT -- 7.4.2. Research on adapting access control systems and technologies for -- 7.5. Access control framework in the IoT -- 7.5.1. IoT architecture -- 7.5.2. IoT-MAAC access control specification -- 7.6. Conclusion -- 7.7. References -- 8. The Contributions of Biometrics and Artificial Intelligence in Securing the IoT -- 8.1. Introduction -- 8.2. Security and privacy in the IoT -- 8.3. Authentication based on biometrics -- 8.3.1. Biometrics -- 8.3.2. Biometric techniques -- 8.3.3. The different properties of biometrics -- 8.3.4. Operating a biometric system -- 8.3.5. System performances -- 8.4. Multifactor authentication techniques based on biometrics -- 8.4.1. Multifactor authentication -- 8.4.2. Examples of multifactor authentication approaches for securing -- 8.4.3. Presentation of the approach of Sammoud et al. (2020c) -- 8.5. Authentication techniques based on biometrics and machine learning -- 8.5.1. Machine learning algorithms -- 8.5.2. Examples of authentication approaches based on biometrics and -- 8.5.3. Authentication approaches based on ECG and machine learning -- 8.6. Challenges and limits -- 8.6.1. Quality of biometric data -- 8.6.2. Non-revocability of biometric data -- 8.6.3. Security of biometric systems -- 8.7. Conclusion -- 8.8. References -- 9. Dynamic Identity and Access Management in the IoT: Blockchain-based Approach -- 9.1. Introduction -- 9.2. Context -- 9.2.1. Intelligent identity and access management -- 9.2.2. Blockchain. 9.3. Blockchain for intelligent identity and access management -- 9.3.1. A new architecture integrating blockchain -- 9.3.2. The different benefits -- 9.4. Challenges -- 9.4.1. Scaling up -- 9.4.2. Blockchain security -- 9.4.3. Energy consumption -- 9.4.4. Definition of consensus algorithms based on artificial -- 9.5. Conclusion -- 9.6. References -- 10. Adapting the Security Level of IoT Applications -- 10.1. Introduction -- 10.2. Definitions and characteristics -- 10.2.1. Definitions -- 10.2.2. Characteristics -- 10.3. IoT applications -- 10.4. IoT architectures -- 10.5. Security, trust and privacy protection in IoT applications -- 10.5.1. General remarks -- 10.5.2. Security services -- 10.5.3. Communication security -- 10.5.4. Trust -- 10.5.5. Privacy -- 10.6. Adapting the security level in the IoT -- 10.6.1. Context-awareness -- 10.6.2. Context-aware security -- 10.6.3. Context-aware security architecture and privacy protection -- 10.7. Conclusion -- 10.8. References -- 11. Moving Target Defense Techniques for the IoT -- 11.1. Introduction -- 11.2. Background -- 11.2.1. Brief chronology of Moving Target Defense -- 11.2.2. Fundamental technical and taxonomic principles of MTD -- 11.3. Related works -- 11.3.1. Surveys on MTD techniques -- 11.3.2. Frameworks for IoT systems linked to the concept of MTD -- 11.4. LMTD for the IoT: a qualitative survey -- 11.4.1. Data: MTD mechanism against side-channel channel attacks -- 11.4.2. Software -- 11.4.3. Runtime environment -- 11.4.4. Platform: diversifying by reconfiguring the IoT node firmware -- 11.4.5. Networks -- 11.4.6. Section summary -- 11.5. Network components in the IoT: a vast domain for MTD -- 11.5.1. Physical layer -- 11.5.2. Link layer -- 11.5.3. OSI network layer -- 11.5.4. Transport layer -- 11.5.5. Application layer -- 11.5.6. Section summary -- 11.6. An MTD framework for the IoT. 11.6.1. Proposition: components -- 11.6.2. Instantiation: UDP port hopping -- 11.7. Discussion and avenues for future research -- 11.8. Conclusion -- 11.9. References -- List of Authors -- Index -- EULA. |
Record Nr. | UNINA-9910830981303321 |
Hoboken, New Jersey : , : John Wiley & Sons, Incorporated, , [2022] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Internet of Things : new trends, challenges and hurdles / / Manuel Domínguez-Morales, Ángel Jesús Varela Vaca, Lourdes Miró Amarante (editors) |
Pubbl/distr/stampa | London : , : IntechOpen, , 2023 |
Descrizione fisica | 1 online resource (138 pages) |
Disciplina | 004.678 |
Soggetto topico |
Internet of things - Social aspects
Internet of things - Security measures |
ISBN | 1-80356-036-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910678590703321 |
London : , : IntechOpen, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
The internet of things : breakthroughs in research and practice / / Information Resources Management Association, USA [editor] |
Pubbl/distr/stampa | Hershey, Pennsylvania : , : Information Science Reference, , [2017] |
Descrizione fisica | 1 online resource (x, 530 pages) : color illustrations |
Disciplina | 004.67/8 |
Collana |
Critical explorations
Gale eBooks |
Soggetto topico |
Internet of things
Internet of things - Security measures |
Soggetto non controllato |
Data analysis and collection
Mobile devices Regulatory standards Secure computing Social media Trust management Ubiquitous interactive spaces Web of things |
ISBN |
9781522518334
9781522518327 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Exploring the educational potential of internet of things (IoT) in seamless learning / Veysel Demirer, Betül Aydın, Seyma Betül Çelik -- Establishing governance for hybrid cloud and the internet of things / Martin Wolfe -- User-centric social interaction for digital cities / Kåre Synnes [and 3 others] -- Factors influencing consumer acceptance of internet of things technology / Chung Sim Liew [and 5 others] -- Social internet of things in healthcare: from things to social things in internet of things / Cristina Elena Turcu, Corneliu Octavian Turcu -- An internet of things governance architecture with applications in healthcare / Adrian Copie [and 3 others] -- Citizen science, air quality, and the internet of things / Ilze Black, Graham White -- The internet of things and assistive technologies for people with disabilities: applications, trends, and issues / Hwa Lee -- Security issues and challenges in internet of things / Sudhosil Panda -- A study on M2M (machine to machine) system and communication: its security, threats, and intrusion detection system / Rami Haidar Ahmad, Al-Sakib Khan Pathan -- Internet of things: the argument for smart forensics / Edewede Oriwoh, Geraint Williams -- Internet of things research challenges / Mahmoud Elkhodr, Seyed Shahrestani, Hon Cheung -- SONATA: social network assisted trustworthiness assurance in smart city crowdsensing / Burak Kantarci, Kevin G. Carr, Connor D. Pearsall --
A key to 5G networks of tomorrow / Aqeel ur Rehman [and 3 others] -- Internet of things applications: current and future development / Mahmoud Elkhodr, Seyed Shahrestani, Hon Cheung -- The internet of things and beyond: rise of the non-human actors / Arthur Tatnall, Bill Davey -- Data management in internet of things / Ashok V. Sutagundar, Daneshwari Hatti -- Big data analysis in IoT / Aqeel-ur Rehman, Rafi Ullah, Faisal Abdullah -- City data fusion: sensor data fusion in the internet of things / Meisong Wang [and 6 others] -- An exploratory study of the impact of the internet of things (IoT) on business model innovation: building smart enterprises at Fortune 500 companies / In Lee -- Energy-efficient computing solutions for internet of things with ZigBee reconfigurable devices / Grzegorz Chmaj, Henry Selvaraj -- Sensing as a service in cloud-centric internet of things architecture / Burak Kantarci, Hussein T. Mouftah -- Internet of things services, applications, issues, and challenges / Padmalaya Nayak -- The access of things: spatial access control for the internet of things / Peter J. Hawrylak [and 3 others]. |
Record Nr. | UNINA-9910164875603321 |
Hershey, Pennsylvania : , : Information Science Reference, , [2017] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Internet of things and access control : sensing, monitoring and controlling access in IoT-enabled healthcare systems / / Shantanu Pal |
Autore | Pal Shantanu |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2021] |
Descrizione fisica | 1 online resource (215 pages) |
Disciplina | 005.8 |
Soggetto topico | Internet of things - Security measures |
ISBN | 3-030-64998-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910484557003321 |
Pal Shantanu | ||
Cham, Switzerland : , : Springer, , [2021] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|