top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Advances in IoT and Security with Computational Intelligence . Volume 1. : Proceedings of ICAISA 2023 / / Anurag Mishra, Deepak Gupta, and Girija Chetty, editors
Advances in IoT and Security with Computational Intelligence . Volume 1. : Proceedings of ICAISA 2023 / / Anurag Mishra, Deepak Gupta, and Girija Chetty, editors
Edizione [First edition.]
Pubbl/distr/stampa Singapore : , : Springer, , [2023]
Descrizione fisica 1 online resource (411 pages)
Disciplina 004.678
Collana Lecture Notes in Networks and Systems Series
Soggetto topico Artificial intelligence
Computer security
Internet of things
Internet of things - Security measures
ISBN 981-9950-85-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto An Automatic Decision Support System for Assessing SDG Contributions -- Removing Stegomalware from Digital Image Files -- Entropic Analysis of Reservation Policy of Government of India -- Cybersecurity in the Supply Chain and Logistics Industry: A Concept-Centric Review -- Machine Learning Methodology for the Recognition of Unsolicited Mail Communications -- IoT-Based Automated Hydroponic Cultivation System: A Step Toward Smart Agriculture for Sustainable Environment.
Record Nr. UNINA-9910746291903321
Singapore : , : Springer, , [2023]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
AI-enabled threat detection and security analysis for industrial IoT / / Hadis Karimipour, Farnaz Derakhshan, editors
AI-enabled threat detection and security analysis for industrial IoT / / Hadis Karimipour, Farnaz Derakhshan, editors
Edizione [1st ed. 2021.]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2021]
Descrizione fisica 1 online resource (VIII, 250 p. 94 illus., 82 illus. in color.)
Disciplina 005.8
Soggetto topico Internet of things - Security measures
Computer security
Artificial intelligence
ISBN 3-030-76613-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Artificial Intelligence for Threat Detection and Analysis in Industrial IoT: Applications and Challenges -- Complementing IIoT Services through AI: Feasibility and Suitability -- Data Security and Privacy in Industrial IoT -- Blockchain Applications in the Industrial Internet of Things -- Application of Deep Learning on IoT-enabled Smart Grid Monitoring -- Cyber Security of Smart Manufacturing Execution Systems: A Bibliometric Analysis -- The Role of Machine Learning in IIoT Through FPGAs -- Deep Representation Learning for Cyber-Attack Detection in Industrial IoT -- Classification and Intelligent Mining of Anomalies in Industrial IoT -- A Snapshot Ensemble Deep Neural Network Model for Attack Detection in Industrial Internet of Things -- Privacy Preserving Federated Learning Solution for Security of Industrial Cyber Physical Systems -- A Multi-Stage Machine Learning Model for Security Analysis in Industrial Control System -- A Recurrent Attention Model for Cyber Attack Classification.
Record Nr. UNINA-9910495232403321
Cham, Switzerland : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
AI-enabled threat detection and security analysis for industrial IoT / / Hadis Karimipour, Farnaz Derakhshan, editors
AI-enabled threat detection and security analysis for industrial IoT / / Hadis Karimipour, Farnaz Derakhshan, editors
Edizione [1st ed. 2021.]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2021]
Descrizione fisica 1 online resource (VIII, 250 p. 94 illus., 82 illus. in color.)
Disciplina 005.8
Soggetto topico Internet of things - Security measures
Computer security
Artificial intelligence
ISBN 3-030-76613-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Artificial Intelligence for Threat Detection and Analysis in Industrial IoT: Applications and Challenges -- Complementing IIoT Services through AI: Feasibility and Suitability -- Data Security and Privacy in Industrial IoT -- Blockchain Applications in the Industrial Internet of Things -- Application of Deep Learning on IoT-enabled Smart Grid Monitoring -- Cyber Security of Smart Manufacturing Execution Systems: A Bibliometric Analysis -- The Role of Machine Learning in IIoT Through FPGAs -- Deep Representation Learning for Cyber-Attack Detection in Industrial IoT -- Classification and Intelligent Mining of Anomalies in Industrial IoT -- A Snapshot Ensemble Deep Neural Network Model for Attack Detection in Industrial Internet of Things -- Privacy Preserving Federated Learning Solution for Security of Industrial Cyber Physical Systems -- A Multi-Stage Machine Learning Model for Security Analysis in Industrial Control System -- A Recurrent Attention Model for Cyber Attack Classification.
Record Nr. UNISA-996464508903316
Cham, Switzerland : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Applied cryptography in computer and communications : first EAI International Conference, AC3 2021, virtual event, May 15-16, 2021, proceedings / / Bo Chen, Xinyi Huang (editors)
Applied cryptography in computer and communications : first EAI International Conference, AC3 2021, virtual event, May 15-16, 2021, proceedings / / Bo Chen, Xinyi Huang (editors)
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2021]
Descrizione fisica 1 online resource (216 pages)
Disciplina 005.82
Collana Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Soggetto topico Data encryption (Computer science)
Telecommunication systems - Security measures
Internet of things - Security measures
Huang, Xinyi
ISBN 3-030-80851-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- Blockchain -- Anchor: An NDN-Based Blockchain Network -- 1 Introduction -- 2 Our Design -- 2.1 Random Anchor Selection -- 2.2 Two-Layer Cascaded NDN Design -- 2.3 Elimination of Duplicated Transmissions from Multiple Anchors -- 3 Performance Evaluation -- 4 Conclusion -- References -- An Identity-Based Blind Signature and Its Application for Privacy Preservation in Bitcoin -- 1 Introduction -- 2 Preliminaries -- 2.1 Tate Bilinear Pairings -- 2.2 Computational Diffie-Hellman Assumption -- 2.3 System Model -- 3 Review of Sarde et al.' Blind Signature Scheme -- 4 Attack on Sarde et al.' Blind Signature Scheme -- 5 Unlinkable ID-Based Blind Signature Scheme -- 6 Unlinkable ID-Based Proxy Blind Signature Scheme -- 7 Security Analysis -- 7.1 Analysis of Blind Signature -- 7.2 Analysis of Proxy Blind Signature -- 8 Performance Analysis and Comparison -- 9 Application for Privacy Preservation in Bitcoin -- References -- Blockchain-Based Sealed-Bid Domain Name Auction Protocol -- 1 Introduction -- 2 Models and Design Goals -- 2.1 System Model -- 2.2 Security Model -- 2.3 Design Goal -- 3 Preliminaries -- 3.1 Account-Based Consortium Blockchain -- 3.2 Auction Types -- 3.3 Pedersen Commitment -- 3.4 Zero-Knowledge Proof -- 4 Our Proposal -- 4.1 Create the Auction -- 4.2 Commit the Bid -- 4.3 Reveal the Bid -- 4.4 Close the Auction -- 5 Analysis of Our Proposal -- 5.1 Security Analysis -- 5.2 Performance Evaluation -- 6 Related Work -- 6.1 Blockchain-Based DNS -- 6.2 Blockchain-Based Auction -- 7 Conclusion -- References -- Authentication -- A Security Enhanced Key Management Service for ARM Pointer Authentication -- 1 Introduction -- 2 Background -- 2.1 Privilege and Exception Levels -- 2.2 Pointer Authentication -- 3 Threat Model -- 3.1 Attacks -- 3.2 Assumptions -- 4 Design -- 4.1 Architecture.
4.2 Algorithm -- 5 Implementation -- 5.1 EL3 Runtime Service -- 5.2 EL1 Kernel Module -- 5.3 EL0 Calling Convention -- 6 Evaluation -- 6.1 Security Analysis -- 6.2 Performance Analysis -- 7 Related Works -- 8 Conclusion -- References -- Privacy-Preserving ECC-Based Three-Factor Authentication Protocol for Smart Remote Vehicle Control System -- 1 Introduction -- 1.1 Threat Model -- 1.2 Related Works -- 1.3 Motivation and Contribution -- 1.4 Notations -- 1.5 Paper Organization -- 2 Review of Chatterjee et al.'s Scheme -- 2.1 System Initialization and Registration Phase -- 2.2 Authentication and Key Agreement Phase -- 3 Cryptanalysis of Chatterjee et al.'s Scheme -- 4 The Proposed Scheme -- 4.1 Pre-deployment Phase -- 4.2 User Registration Phase -- 4.3 Login and Authentication Phase -- 5 Security Analysis -- 5.1 BAN-Logic Based Proof of Authentication -- 5.2 Further Security Analysis -- 6 Performance Evaluation -- 6.1 Security Features -- 6.2 Computational Overhead -- 7 Conclusion and Future Work -- References -- Secure Computation -- Efficient and Private Divisible Double Auction in Trusted Execution Environment -- 1 Introduction -- 2 Divisible Double Auction -- 2.1 Models -- 2.2 Auction Properties -- 3 Mechanism Design -- 4 ETA System Design -- 4.1 SGX Formalization -- 4.2 ETA System -- 4.3 ETA Execution Program -- 4.4 Threat Model -- 4.5 Security Analysis -- 5 Experiments -- 5.1 ETA Performance Evaluation -- 5.2 Case Study -- 6 Related Work -- 7 Conclusion -- References -- Parallel Implementation and Optimization of SM4 Based on CUDA -- 1 Introduction -- 2 Preliminaries -- 2.1 CUDA -- 2.2 A Brief Description of SM4 -- 3 Parallel Design of SM4 -- 4 Experiment and Discussion -- 4.1 Basic Experiment -- 4.2 Performance Optimization -- 4.3 Analysis of Results -- 5 Conclusion -- References -- Another Algebraic Decomposition Method for Masked Implementation.
1 Introduction -- 2 Preliminaries -- 2.1 Functions over Finite Fields -- 3 Algebraic Decomposition -- 3.1 Algebraic Decomposition Using GM Polynomials -- 3.2 Experimental Result -- 4 Application to Masking -- 5 Conclusion -- A Masking for Quadratic Polynomial -- References -- Practical Crypto Application -- Concealed Communication in Online Social Networks -- 1 Introduction -- 2 Related Work -- 2.1 Privacy Analysis in Online Social Networks -- 2.2 Privacy Leakages -- 2.3 Privacy-Preserving Online Social Networks -- 2.4 Mix Networks -- 3 Proposed Protocols -- 3.1 A Concealed Secure Channel -- 3.2 User Information and Postings -- 3.3 Personal Messages and Group Messages -- 3.4 Groups -- 3.5 Finding and Verifying Participants, Exchanging Keys -- 3.6 Key Revocation -- 3.7 User Registration -- 4 Privacy Analysis -- 4.1 Attacker Model -- 4.2 Structure of Network (NS) -- 4.3 Structure of Data (DS) -- 4.4 Timing (T) -- 4.5 Control Information (CI) -- 5 Performance Analysis -- 6 Conclusions -- References -- MobiWear: A Plausibly Deniable Encryption System for Wearable Mobile Devices -- 1 Introduction -- 2 Background -- 2.1 Wearable Mobile Devices -- 2.2 Plausibly Deniable Encryption -- 2.3 Image Steganography -- 2.4 Digital Watermarking -- 2.5 Peak Signal-to-Noise Ratio (PSNR) -- 3 Model and Assumptions -- 3.1 System Model -- 3.2 Adversarial Model -- 4 Design -- 4.1 Design Rationale -- 4.2 Design Details -- 5 Implementation and Evaluation -- 5.1 Implementation -- 5.2 Evaluation -- 6 Security Analysis and Discussion -- 6.1 Security Analysis -- 6.2 Discussion -- 7 Related Work -- 7.1 Plausibly Deniable Encryption Systems -- 7.2 Image Steganograyphy -- 8 Conclusion -- References -- Recent Advances in the Web PKI and the Technical Challenges in SCMS -- 1 Introduction -- 2 Recent Advances in the Web PKI -- 2.1 Certificate Transparency.
2.2 Push-Based Certificate Revocation -- 3 The Technical Challenges in SCMS -- 3.1 The Expected Properties of V2V PKI Systems -- 3.2 SCMS -- 3.3 Technical Challenge #1: Certificate Transparency vs. Pseudonym Certificate -- 3.4 Technical Challenge #2: Push-Based Certificate Revocation vs. the Great Volume of Pseudonym Certificates -- 4 Conclusions -- References -- The First International Workshop on Security for Internet of Things (IOTS 2021) -- A Novel Approach for Code Smells Detection Based on Deep Leaning -- 1 Introduction -- 2 Code Smells Detection Based on Convolutional Networks -- 3 High Level Design -- 3.1 Experiments Results -- 4 Conclusion -- References -- A Thieves Identification Scheme for Prepaid Systems in Smart Grids -- 1 Introduction -- 2 Related Work -- 3 The Framework -- 3.1 Network Model -- 3.2 Security Requirements -- 4 Our Proposed Approach -- 4.1 Setup -- 4.2 Joining -- 4.3 Power Purchasing -- 4.4 Power Requesting -- 4.5 Identification -- 5 Conclusion -- References -- Using Smart Contracts to Improve Searchable Symmetric Encryption -- 1 Introduction -- 2 Notations -- 3 Preliminaries -- 3.1 Scheme of Searchable Symmetric Encryption -- 3.2 Smart Contract -- 4 Scheme of the Integrity Verification of Search Results -- 4.1 Merkle Tree -- 4.2 Proof of Integrity Verification of Search Results -- 5 Smart Contract Based Searchable Symmetric Encryption -- 5.1 Scheme of Smart Contract Based SSE -- 5.2 Details of Smart Contract Based SSE Scheme -- 6 Security and Performance Analyses -- 6.1 Security Analysis -- 6.2 Performance Analysis -- 6.3 Experimental Analysis -- 7 Conclusion -- References -- Towards the Adaptability of Traffic-Based IoT Security Management Systems to the Device Behavior Evolutions -- 1 Introduction -- 2 IoT Security Management Systems -- 3 IoT Device Behavior Evolutions -- 4 Possible Solutions -- 5 Conclusion.
References -- Author Index.
Record Nr. UNISA-996464420203316
Cham, Switzerland : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Applied cryptography in computer and communications : first EAI International Conference, AC3 2021, virtual event, May 15-16, 2021, proceedings / / Bo Chen, Xinyi Huang (editors)
Applied cryptography in computer and communications : first EAI International Conference, AC3 2021, virtual event, May 15-16, 2021, proceedings / / Bo Chen, Xinyi Huang (editors)
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2021]
Descrizione fisica 1 online resource (216 pages)
Disciplina 005.82
Collana Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Soggetto topico Data encryption (Computer science)
Telecommunication systems - Security measures
Internet of things - Security measures
Huang, Xinyi
ISBN 3-030-80851-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- Blockchain -- Anchor: An NDN-Based Blockchain Network -- 1 Introduction -- 2 Our Design -- 2.1 Random Anchor Selection -- 2.2 Two-Layer Cascaded NDN Design -- 2.3 Elimination of Duplicated Transmissions from Multiple Anchors -- 3 Performance Evaluation -- 4 Conclusion -- References -- An Identity-Based Blind Signature and Its Application for Privacy Preservation in Bitcoin -- 1 Introduction -- 2 Preliminaries -- 2.1 Tate Bilinear Pairings -- 2.2 Computational Diffie-Hellman Assumption -- 2.3 System Model -- 3 Review of Sarde et al.' Blind Signature Scheme -- 4 Attack on Sarde et al.' Blind Signature Scheme -- 5 Unlinkable ID-Based Blind Signature Scheme -- 6 Unlinkable ID-Based Proxy Blind Signature Scheme -- 7 Security Analysis -- 7.1 Analysis of Blind Signature -- 7.2 Analysis of Proxy Blind Signature -- 8 Performance Analysis and Comparison -- 9 Application for Privacy Preservation in Bitcoin -- References -- Blockchain-Based Sealed-Bid Domain Name Auction Protocol -- 1 Introduction -- 2 Models and Design Goals -- 2.1 System Model -- 2.2 Security Model -- 2.3 Design Goal -- 3 Preliminaries -- 3.1 Account-Based Consortium Blockchain -- 3.2 Auction Types -- 3.3 Pedersen Commitment -- 3.4 Zero-Knowledge Proof -- 4 Our Proposal -- 4.1 Create the Auction -- 4.2 Commit the Bid -- 4.3 Reveal the Bid -- 4.4 Close the Auction -- 5 Analysis of Our Proposal -- 5.1 Security Analysis -- 5.2 Performance Evaluation -- 6 Related Work -- 6.1 Blockchain-Based DNS -- 6.2 Blockchain-Based Auction -- 7 Conclusion -- References -- Authentication -- A Security Enhanced Key Management Service for ARM Pointer Authentication -- 1 Introduction -- 2 Background -- 2.1 Privilege and Exception Levels -- 2.2 Pointer Authentication -- 3 Threat Model -- 3.1 Attacks -- 3.2 Assumptions -- 4 Design -- 4.1 Architecture.
4.2 Algorithm -- 5 Implementation -- 5.1 EL3 Runtime Service -- 5.2 EL1 Kernel Module -- 5.3 EL0 Calling Convention -- 6 Evaluation -- 6.1 Security Analysis -- 6.2 Performance Analysis -- 7 Related Works -- 8 Conclusion -- References -- Privacy-Preserving ECC-Based Three-Factor Authentication Protocol for Smart Remote Vehicle Control System -- 1 Introduction -- 1.1 Threat Model -- 1.2 Related Works -- 1.3 Motivation and Contribution -- 1.4 Notations -- 1.5 Paper Organization -- 2 Review of Chatterjee et al.'s Scheme -- 2.1 System Initialization and Registration Phase -- 2.2 Authentication and Key Agreement Phase -- 3 Cryptanalysis of Chatterjee et al.'s Scheme -- 4 The Proposed Scheme -- 4.1 Pre-deployment Phase -- 4.2 User Registration Phase -- 4.3 Login and Authentication Phase -- 5 Security Analysis -- 5.1 BAN-Logic Based Proof of Authentication -- 5.2 Further Security Analysis -- 6 Performance Evaluation -- 6.1 Security Features -- 6.2 Computational Overhead -- 7 Conclusion and Future Work -- References -- Secure Computation -- Efficient and Private Divisible Double Auction in Trusted Execution Environment -- 1 Introduction -- 2 Divisible Double Auction -- 2.1 Models -- 2.2 Auction Properties -- 3 Mechanism Design -- 4 ETA System Design -- 4.1 SGX Formalization -- 4.2 ETA System -- 4.3 ETA Execution Program -- 4.4 Threat Model -- 4.5 Security Analysis -- 5 Experiments -- 5.1 ETA Performance Evaluation -- 5.2 Case Study -- 6 Related Work -- 7 Conclusion -- References -- Parallel Implementation and Optimization of SM4 Based on CUDA -- 1 Introduction -- 2 Preliminaries -- 2.1 CUDA -- 2.2 A Brief Description of SM4 -- 3 Parallel Design of SM4 -- 4 Experiment and Discussion -- 4.1 Basic Experiment -- 4.2 Performance Optimization -- 4.3 Analysis of Results -- 5 Conclusion -- References -- Another Algebraic Decomposition Method for Masked Implementation.
1 Introduction -- 2 Preliminaries -- 2.1 Functions over Finite Fields -- 3 Algebraic Decomposition -- 3.1 Algebraic Decomposition Using GM Polynomials -- 3.2 Experimental Result -- 4 Application to Masking -- 5 Conclusion -- A Masking for Quadratic Polynomial -- References -- Practical Crypto Application -- Concealed Communication in Online Social Networks -- 1 Introduction -- 2 Related Work -- 2.1 Privacy Analysis in Online Social Networks -- 2.2 Privacy Leakages -- 2.3 Privacy-Preserving Online Social Networks -- 2.4 Mix Networks -- 3 Proposed Protocols -- 3.1 A Concealed Secure Channel -- 3.2 User Information and Postings -- 3.3 Personal Messages and Group Messages -- 3.4 Groups -- 3.5 Finding and Verifying Participants, Exchanging Keys -- 3.6 Key Revocation -- 3.7 User Registration -- 4 Privacy Analysis -- 4.1 Attacker Model -- 4.2 Structure of Network (NS) -- 4.3 Structure of Data (DS) -- 4.4 Timing (T) -- 4.5 Control Information (CI) -- 5 Performance Analysis -- 6 Conclusions -- References -- MobiWear: A Plausibly Deniable Encryption System for Wearable Mobile Devices -- 1 Introduction -- 2 Background -- 2.1 Wearable Mobile Devices -- 2.2 Plausibly Deniable Encryption -- 2.3 Image Steganography -- 2.4 Digital Watermarking -- 2.5 Peak Signal-to-Noise Ratio (PSNR) -- 3 Model and Assumptions -- 3.1 System Model -- 3.2 Adversarial Model -- 4 Design -- 4.1 Design Rationale -- 4.2 Design Details -- 5 Implementation and Evaluation -- 5.1 Implementation -- 5.2 Evaluation -- 6 Security Analysis and Discussion -- 6.1 Security Analysis -- 6.2 Discussion -- 7 Related Work -- 7.1 Plausibly Deniable Encryption Systems -- 7.2 Image Steganograyphy -- 8 Conclusion -- References -- Recent Advances in the Web PKI and the Technical Challenges in SCMS -- 1 Introduction -- 2 Recent Advances in the Web PKI -- 2.1 Certificate Transparency.
2.2 Push-Based Certificate Revocation -- 3 The Technical Challenges in SCMS -- 3.1 The Expected Properties of V2V PKI Systems -- 3.2 SCMS -- 3.3 Technical Challenge #1: Certificate Transparency vs. Pseudonym Certificate -- 3.4 Technical Challenge #2: Push-Based Certificate Revocation vs. the Great Volume of Pseudonym Certificates -- 4 Conclusions -- References -- The First International Workshop on Security for Internet of Things (IOTS 2021) -- A Novel Approach for Code Smells Detection Based on Deep Leaning -- 1 Introduction -- 2 Code Smells Detection Based on Convolutional Networks -- 3 High Level Design -- 3.1 Experiments Results -- 4 Conclusion -- References -- A Thieves Identification Scheme for Prepaid Systems in Smart Grids -- 1 Introduction -- 2 Related Work -- 3 The Framework -- 3.1 Network Model -- 3.2 Security Requirements -- 4 Our Proposed Approach -- 4.1 Setup -- 4.2 Joining -- 4.3 Power Purchasing -- 4.4 Power Requesting -- 4.5 Identification -- 5 Conclusion -- References -- Using Smart Contracts to Improve Searchable Symmetric Encryption -- 1 Introduction -- 2 Notations -- 3 Preliminaries -- 3.1 Scheme of Searchable Symmetric Encryption -- 3.2 Smart Contract -- 4 Scheme of the Integrity Verification of Search Results -- 4.1 Merkle Tree -- 4.2 Proof of Integrity Verification of Search Results -- 5 Smart Contract Based Searchable Symmetric Encryption -- 5.1 Scheme of Smart Contract Based SSE -- 5.2 Details of Smart Contract Based SSE Scheme -- 6 Security and Performance Analyses -- 6.1 Security Analysis -- 6.2 Performance Analysis -- 6.3 Experimental Analysis -- 7 Conclusion -- References -- Towards the Adaptability of Traffic-Based IoT Security Management Systems to the Device Behavior Evolutions -- 1 Introduction -- 2 IoT Security Management Systems -- 3 IoT Device Behavior Evolutions -- 4 Possible Solutions -- 5 Conclusion.
References -- Author Index.
Record Nr. UNINA-9910490025803321
Cham, Switzerland : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
CPSIoTSec '21 : proceedings of the 2th Workshop on CPS&IoT Security and Privacy : November 15, 2021, virtual event, Republic of Korea / / Association for Computing Machinery
CPSIoTSec '21 : proceedings of the 2th Workshop on CPS&IoT Security and Privacy : November 15, 2021, virtual event, Republic of Korea / / Association for Computing Machinery
Pubbl/distr/stampa New York, NY : , : The Association for Computing Machinery, , [2021]
Descrizione fisica 1 online resource : illustrations (some color)
Disciplina 005.8
Soggetto topico Computer security
Cooperating objects (Computer systems)
Internet of things
Internet of things - Security measures
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910510445803321
New York, NY : , : The Association for Computing Machinery, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Intelligent security management and control in the Iot / / edited by Mohamed-Aymen Chalouf
Intelligent security management and control in the Iot / / edited by Mohamed-Aymen Chalouf
Pubbl/distr/stampa Hoboken, New Jersey : , : John Wiley & Sons, Incorporated, , [2022]
Descrizione fisica 1 online resource (314 pages)
Disciplina 004
Collana Sciences. Networks and communications. Network management and control
Soggetto topico Internet of things - Security measures
Internet of things - Control
ISBN 1-394-15603-0
1-394-15601-4
1-394-15602-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover -- Half-Title Page -- Title Page -- Copyright Page -- Contents -- 1. Multicriteria Selection of Transmission Parameters in the IoT -- 1.2. Changing access network in the IoT -- 1.3. Spectrum handoff in the IoT -- 1.4. Multicriteria decision-making module for an effective spectrum handoff in the IoT -- 1.4.1. General architecture -- 1.4.2. Decision-making flowchart -- 1.4.3. Performances evaluation -- 1.5. Conclusion -- 1.6. References -- 2. Using Reinforcement Learning to Manage Massive Access in NB-IoT Networks -- 2.1. Introduction -- 2.2. Fundamentals of the NB-IoT standard -- 2.2.1. Deployment and instances of use -- 2.2.2. Transmission principles -- 2.2.3. Radio resource random access procedure -- 2.3. State of the art -- 2.4. Model for accessing IoT terminals -- 2.5. Access controller for IoT terminals based on reinforcement learning -- 2.5.1. Formulating the problem -- 2.5.2. Regulation system for arrivals -- 2.6. Performance evaluation -- 2.7. Conclusion -- 2.8. References -- 3. Optimizing Performances in the IoT: An Approach Based on Intelligent Radio -- 3.1. Introduction -- 3.2. Internet of Things (IoT) -- 3.2.1. Definition of the IoT -- 3.2.2. Applications of the IoT -- 3.2.3. IoT challenges -- 3.2.4. Enabling technologies in the IoT -- 3.3. Intelligent radio -- 3.3.1. Definition of intelligent radio -- 3.3.2. Motivations for using intelligent radio in the IoT -- 3.3.3. Challenges in using intelligent radio in the IoT -- 3.4. Conclusion -- 3.5. References -- 4. Optimizing the Energy Consumption of IoT Devices -- 4.1. Introduction -- 4.2. Energy optimization -- 4.2.1. Definitions -- 4.3. Optimization techniques for energy consumption -- 4.3.1. The A* algorithm -- 4.3.2. Fuzzy logic -- 4.4. Energy optimization in the IoT -- 4.4.1. Characteristics of the IoT -- 4.4.2. Challenges in energy optimization.
4.4.3. Research on energy optimization in the IoT -- 4.5. Autonomous energy optimization framework in the IoT -- 4.5.1. Autonomous computing -- 4.5.2. Framework specification -- 4.6. Proposition of a self-optimization method for energy consumption in the IoT -- 4.6.1. Fuzzy logic model -- 4.6.2. Decision-making algorithm -- 4.6.3. Evaluating energy self-optimization in the IoT -- 4.7. Conclusion -- 4.8. References -- 5. Toward Intelligent Management of Service Quality in the IoT: The Case of a Low Rate WPAN -- 5.1. Introduction -- 5.2. Quick overview of the IoT -- 5.2.2. Technologies for the IoT -- 5.2.3. IoT and quality of service -- 5.3. IEEE 802.15.4 TSCH approach -- 5.4. Transmission scheduling -- 5.4.1. General considerations -- 5.4.2. Scheduling in the literature -- 5.5. Routing and RPL -- 5.5.1. Routing -- 5.5.2. RPL -- 5.5.3. Multipath -- 5.6. Combined approach based on 802.15.4 TSCH and multipath RPL -- 5.6.1. Automatic Repeat reQuest -- 5.6.2. Replication and Elimination -- 5.6.3. Overhearing -- 5.7. Conclusion -- 5.8. References -- 6. Adapting Quality of Service of Energy-Harvesting IoT Devices -- 6.1. Toward the energy autonomy of sensor networks -- 6.1.1. Energy harvesting and management -- 6.1.2. State-of-the-art energy managers -- 6.2. Fuzzyman: use of fuzzy logic -- 6.2.1. Design of Fuzzyman -- 6.2.2. Evaluating Fuzzyman -- 6.2.3. Conclusion -- 6.3. RLMan: using reinforcement learning -- 6.3.1. Formulating the problem of managing the harvested energy -- 6.3.2. RLMan algorithm -- 6.3.3. Evaluation of RLMan -- 6.3.4. Conclusion -- 6.4. Toward energy autonomous LoRa nodes -- 6.4.1. Multisource energy-harvesting architecture -- 6.4.2. Applying energy management to LoRa nodes -- 6.5. Conclusion -- 6.6. References -- 7. Adapting Access Control for IoT Security -- 7.1. Introduction -- 7.2. Defining security services in the IoT.
7.2.1. Identification and authentication in the IoT -- 7.2.2. Access control in the IoT -- 7.2.3. Confidentiality in the IoT -- 7.2.4. Integrity in the IoT -- 7.2.5. Non-repudiation in the IoT -- 7.2.6. Availability in the IoT -- 7.3. Access control technologies -- 7.4. Access control in the IoT -- 7.4.1. Research on the extension of access control models for the IoT -- 7.4.2. Research on adapting access control systems and technologies for -- 7.5. Access control framework in the IoT -- 7.5.1. IoT architecture -- 7.5.2. IoT-MAAC access control specification -- 7.6. Conclusion -- 7.7. References -- 8. The Contributions of Biometrics and Artificial Intelligence in Securing the IoT -- 8.1. Introduction -- 8.2. Security and privacy in the IoT -- 8.3. Authentication based on biometrics -- 8.3.1. Biometrics -- 8.3.2. Biometric techniques -- 8.3.3. The different properties of biometrics -- 8.3.4. Operating a biometric system -- 8.3.5. System performances -- 8.4. Multifactor authentication techniques based on biometrics -- 8.4.1. Multifactor authentication -- 8.4.2. Examples of multifactor authentication approaches for securing -- 8.4.3. Presentation of the approach of Sammoud et al. (2020c) -- 8.5. Authentication techniques based on biometrics and machine learning -- 8.5.1. Machine learning algorithms -- 8.5.2. Examples of authentication approaches based on biometrics and -- 8.5.3. Authentication approaches based on ECG and machine learning -- 8.6. Challenges and limits -- 8.6.1. Quality of biometric data -- 8.6.2. Non-revocability of biometric data -- 8.6.3. Security of biometric systems -- 8.7. Conclusion -- 8.8. References -- 9. Dynamic Identity and Access Management in the IoT: Blockchain-based Approach -- 9.1. Introduction -- 9.2. Context -- 9.2.1. Intelligent identity and access management -- 9.2.2. Blockchain.
9.3. Blockchain for intelligent identity and access management -- 9.3.1. A new architecture integrating blockchain -- 9.3.2. The different benefits -- 9.4. Challenges -- 9.4.1. Scaling up -- 9.4.2. Blockchain security -- 9.4.3. Energy consumption -- 9.4.4. Definition of consensus algorithms based on artificial -- 9.5. Conclusion -- 9.6. References -- 10. Adapting the Security Level of IoT Applications -- 10.1. Introduction -- 10.2. Definitions and characteristics -- 10.2.1. Definitions -- 10.2.2. Characteristics -- 10.3. IoT applications -- 10.4. IoT architectures -- 10.5. Security, trust and privacy protection in IoT applications -- 10.5.1. General remarks -- 10.5.2. Security services -- 10.5.3. Communication security -- 10.5.4. Trust -- 10.5.5. Privacy -- 10.6. Adapting the security level in the IoT -- 10.6.1. Context-awareness -- 10.6.2. Context-aware security -- 10.6.3. Context-aware security architecture and privacy protection -- 10.7. Conclusion -- 10.8. References -- 11. Moving Target Defense Techniques for the IoT -- 11.1. Introduction -- 11.2. Background -- 11.2.1. Brief chronology of Moving Target Defense -- 11.2.2. Fundamental technical and taxonomic principles of MTD -- 11.3. Related works -- 11.3.1. Surveys on MTD techniques -- 11.3.2. Frameworks for IoT systems linked to the concept of MTD -- 11.4. LMTD for the IoT: a qualitative survey -- 11.4.1. Data: MTD mechanism against side-channel channel attacks -- 11.4.2. Software -- 11.4.3. Runtime environment -- 11.4.4. Platform: diversifying by reconfiguring the IoT node firmware -- 11.4.5. Networks -- 11.4.6. Section summary -- 11.5. Network components in the IoT: a vast domain for MTD -- 11.5.1. Physical layer -- 11.5.2. Link layer -- 11.5.3. OSI network layer -- 11.5.4. Transport layer -- 11.5.5. Application layer -- 11.5.6. Section summary -- 11.6. An MTD framework for the IoT.
11.6.1. Proposition: components -- 11.6.2. Instantiation: UDP port hopping -- 11.7. Discussion and avenues for future research -- 11.8. Conclusion -- 11.9. References -- List of Authors -- Index -- EULA.
Record Nr. UNINA-9910830981303321
Hoboken, New Jersey : , : John Wiley & Sons, Incorporated, , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Internet of Things : new trends, challenges and hurdles / / Manuel Domínguez-Morales, Ángel Jesús Varela Vaca, Lourdes Miró Amarante (editors)
Internet of Things : new trends, challenges and hurdles / / Manuel Domínguez-Morales, Ángel Jesús Varela Vaca, Lourdes Miró Amarante (editors)
Pubbl/distr/stampa London : , : IntechOpen, , 2023
Descrizione fisica 1 online resource (138 pages)
Disciplina 004.678
Soggetto topico Internet of things - Social aspects
Internet of things - Security measures
ISBN 1-80356-036-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910678590703321
London : , : IntechOpen, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The internet of things : breakthroughs in research and practice / / Information Resources Management Association, USA [editor]
The internet of things : breakthroughs in research and practice / / Information Resources Management Association, USA [editor]
Pubbl/distr/stampa Hershey, Pennsylvania : , : Information Science Reference, , [2017]
Descrizione fisica 1 online resource (x, 530 pages) : color illustrations
Disciplina 004.67/8
Collana Critical explorations
Gale eBooks
Soggetto topico Internet of things
Internet of things - Security measures
Soggetto non controllato Data analysis and collection
Mobile devices
Regulatory standards
Secure computing
Social media
Trust management
Ubiquitous interactive spaces
Web of things
ISBN 9781522518334
9781522518327
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Exploring the educational potential of internet of things (IoT) in seamless learning / Veysel Demirer, Betül Aydın, Seyma Betül Çelik -- Establishing governance for hybrid cloud and the internet of things / Martin Wolfe -- User-centric social interaction for digital cities / Kåre Synnes [and 3 others] -- Factors influencing consumer acceptance of internet of things technology / Chung Sim Liew [and 5 others] -- Social internet of things in healthcare: from things to social things in internet of things / Cristina Elena Turcu, Corneliu Octavian Turcu -- An internet of things governance architecture with applications in healthcare / Adrian Copie [and 3 others] -- Citizen science, air quality, and the internet of things / Ilze Black, Graham White -- The internet of things and assistive technologies for people with disabilities: applications, trends, and issues / Hwa Lee -- Security issues and challenges in internet of things / Sudhosil Panda -- A study on M2M (machine to machine) system and communication: its security, threats, and intrusion detection system / Rami Haidar Ahmad, Al-Sakib Khan Pathan -- Internet of things: the argument for smart forensics / Edewede Oriwoh, Geraint Williams -- Internet of things research challenges / Mahmoud Elkhodr, Seyed Shahrestani, Hon Cheung -- SONATA: social network assisted trustworthiness assurance in smart city crowdsensing / Burak Kantarci, Kevin G. Carr, Connor D. Pearsall --
A key to 5G networks of tomorrow / Aqeel ur Rehman [and 3 others] -- Internet of things applications: current and future development / Mahmoud Elkhodr, Seyed Shahrestani, Hon Cheung -- The internet of things and beyond: rise of the non-human actors / Arthur Tatnall, Bill Davey -- Data management in internet of things / Ashok V. Sutagundar, Daneshwari Hatti -- Big data analysis in IoT / Aqeel-ur Rehman, Rafi Ullah, Faisal Abdullah -- City data fusion: sensor data fusion in the internet of things / Meisong Wang [and 6 others] -- An exploratory study of the impact of the internet of things (IoT) on business model innovation: building smart enterprises at Fortune 500 companies / In Lee -- Energy-efficient computing solutions for internet of things with ZigBee reconfigurable devices / Grzegorz Chmaj, Henry Selvaraj -- Sensing as a service in cloud-centric internet of things architecture / Burak Kantarci, Hussein T. Mouftah -- Internet of things services, applications, issues, and challenges / Padmalaya Nayak -- The access of things: spatial access control for the internet of things / Peter J. Hawrylak [and 3 others].
Record Nr. UNINA-9910164875603321
Hershey, Pennsylvania : , : Information Science Reference, , [2017]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Internet of things and access control : sensing, monitoring and controlling access in IoT-enabled healthcare systems / / Shantanu Pal
Internet of things and access control : sensing, monitoring and controlling access in IoT-enabled healthcare systems / / Shantanu Pal
Autore Pal Shantanu
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2021]
Descrizione fisica 1 online resource (215 pages)
Disciplina 005.8
Soggetto topico Internet of things - Security measures
ISBN 3-030-64998-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910484557003321
Pal Shantanu  
Cham, Switzerland : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui