Search results for: IOT SECURITY FEATURES - Bridge of Knowledge

Search

Search results for: IOT SECURITY FEATURES

Filters

total: 2699
filtered: 1596

clear all filters


Chosen catalog filters

  • Category

  • Year

  • Options

clear Chosen catalog filters disabled

Search results for: IOT SECURITY FEATURES

  • Some Security Features of Selected IoT Platforms

    Publication

    - TASK Quarterly - Year 2020

    IoT (Internet of Things) is certainly one of the leading current and future trends for processing in the current distributed world. It is changing our life and society. IoT allows new ubiquitous applications and processing, but, on the other hand, it introduces potentially serious security threats. Nowadays researchers in IoT areas should, without a doubt, consider and focus on security aspects. This paper is aimed at a high-level...

    Full text available to download

  • Benchmarking Scalability and Security Configuration Impact for A Distributed Sensors-Server IOT Use Case

    Publication

    - Year 2021

    Internet of Things has been getting more and more attention and found numerous practical applications. Especially important in this context are performance, security and ability to cope with failures. Especially crucial is to find good trade-off between these. In this article we present results of practical tests with multiple clients representing sensors sending notifications to an IoT middleware – DeviceHive. We investigate performance...

    Full text available to download

  • Overview of current communication systems for security forces. Features, limitations and potential solutions

    Publication

    - Year 2009

  • OOA-modified Bi-LSTM network: An effective intrusion detection framework for IoT systems

    Publication
    • S. S. Narayana Chintapalli
    • S. Prakash Singh
    • J. Frnda
    • B. P. Divakarachar
    • V. L. Sarraju
    • P. Falkowski-Gilski

    - Heliyon - Year 2024

    Currently, the Internet of Things (IoT) generates a huge amount of traffic data in communication and information technology. The diversification and integration of IoT applications and terminals make IoT vulnerable to intrusion attacks. Therefore, it is necessary to develop an efficient Intrusion Detection System (IDS) that guarantees the reliability, integrity, and security of IoT systems. The detection of intrusion is considered...

    Full text available to download

  • Modelling the malware propagation in mobile computer devices

    Publication

    - COMPUTERS & SECURITY - Year 2018

    Nowadays malware is a major threat to the security of cyber activities. The rapid develop- ment of the Internet and the progressive implementation of the Internet of Things (IoT) increase the security needs of networks. This research presents a theoretical model of malware propagation for mobile computer devices. It is based on the susceptible-exposed- infected-recovered-susceptible (SEIRS) epidemic model. The scheme is based on...

    Full text to download in external service

  • LTE and NB-IoT Performance Estimation Based on Indicators Measured by the Radio Module

    Monitoring the operating parameters of power grids is extremely important for their proper functioning as well as for ensuring the security of the entire infrastructure. As the idea of the Internet of Things becomes more ubiquitous, there are tools for monitoring the state of the complex electrical grid and means to control it. There are also developed new measuring devices and transmission technologies allowing for the transfer...

    Full text available to download

  • Improved RSS-Based DoA Estimation Accuracy in Low-Profile ESPAR Antenna Using SVM Approach

    In this paper, we have shown how the overall performance of direction-of-arrival (DoA) estimation using lowprofile electronically steerable parasitic array radiator (ESPAR) antenna, which has been proposed for Internet of Things (IoT) applications, can significantly be improved when support vector machine (SVM) approach is applied. Because the SVM-based DoA estimation method used herein relies solely on received signal strength...

    Full text available to download

  • Privacy-Preserving, Scalable Blockchain-Based Solution for Monitoring Industrial Infrastructure in the Near Real-Time

    This paper proposes an improved monitoring and measuring system dedicated to industrial infrastructure. Our model achieves security of data by incorporating cryptographical methods and near real-time access by the use of virtual tree structure over records. The currently available blockchain networks are not very well adapted to tasks related to the continuous monitoring of the parameters of industrial installations. In the database...

    Full text available to download

  • Improved RSS-Based DoA Estimation Accuracy in Low-Profile ESPAR Antenna Using SVM Approach

    In this paper, we have shown how the overall performance of direction-of-arrival (DoA) estimation using lowprofile electronically steerable parasitic array radiator (ESPAR) antenna, which has been proposed for Internet of Things (IoT) applications, can significantly be improved when support vector machine (SVM) approach is applied. Because the SVM-based DoA estimation method used herein relies solely...

    Full text available to download

  • IoT protocols, architectures, and applications

    Publication
    • C. Buratti
    • E. G. Ström
    • L. Feltrin
    • L. Clavier
    • G. Gardašević
    • T. Blazek
    • L. Berbakov
    • T. C. Balan
    • L. Orozco-Barbosa
    • C. Anton-Haro... and 2 others

    - Year 2021

    The proliferation of embedded systems, wireless technologies, and Internet protocols have enabled the IoT to bridge the gap between the virtual and physical world enabling the monitoring and control of the environment by data processing systems. IoT refers to the inter-networking of everyday objects that are equipped with sensing, computation, and communication capabilities. These networks can collaboratively interact and perform...

    Full text to download in external service

  • Selektywne zakłócanie transmisji OFDM w interfejsie radiowym NB-IoT

    W artykule przedstawiono zagadnienie tzw. inteligentnego zagłuszania, polegającego na selektywnym zakłócaniu krytycznych składowych sygnału OFDM. Opisane zostały badania weryfikujące możliwość przeprowadzenia tego rodzaju ataku elektronicznego. Przedstawiono zrealizowane stanowisko badawcze, umożliwiające zakłócanie rzeczywistych sygnałów NB-IoT w łączu w dół. Wyniki badań wykazują możliwość realizacji selektywnego zagłuszania...

    Full text to download in external service

  • Cost assessment of computer security activities

    Publication

    Comprehensive cost-benefit analysis plays a crucial role in the decision-making process when it comes to investments in information security solutions. The cost of breaches needs to be analysed in the context of spending on protection measures. However, no methods exist that facilitate the quick and rough prediction of true expenditures on security protection systems. Rafal Leszczyna of Gdansk University of Technology presents...

    Full text to download in external service

  • IoT for healthcare applications

    Publication
    • K. Sayrafian
    • S. J. Ambroziak
    • D. Bajic
    • L. Berbakov
    • L. M. Correia
    • K. Cwalina
    • C. Garcia-pardo
    • G. Gardašević
    • K. Katzis
    • P. Kulakowski
    • K. Turbic

    - Year 2021

    This chapter summarizes IRACON contributions related to the application of IoT in healthcare. It consists of the following three sections. Section 8.1 presents the measurement campaigns and the related statistical analysis to obtain various channel models for wearable and implantable devices. In addition, the importance of physical human-body phantoms used for channel, Specific Absorption Rate (SAR), and Electromagnetic (EM) exposure...

    Full text available to download

  • Practical Evaluation of Internet Systems' Security Mechanisms

    Publication

    A proposed Internet systems security layer with context-oriented security mechanisms reduces the risk associated with possible vulnerabilities. A metric of the system trust level is proposed, and then evaluated according to a university Internet system.

    Full text available to download

  • Approach to security assessment of critical infrastructures' information systems

    Publication

    - IET Information Security - Year 2011

    This study presents an approach to the security assessment of the information systems of critical infrastructures. The approach is based on the faithful reconstruction of the evaluated information system in a computer security laboratory followed by simulations of possible threats against the system. The evidence collected during the experiments, stored and organised using a proprietary system InSAW, may later be used for the creation...

    Full text available to download

  • Application of Smart IoT Technology in Project Management Scenarios

    Publication
    • K. Rasheed
    • S. Ammad
    • A. Y. Said
    • M. Balbehaith
    • V. K. Oad
    • A. Khan

    - Year 2023

    The report presents a low-cost and flexible solution to control and monitor home and industrial appliances. The popularity of automation devices has increased greatly in recent years due to higher affordability and simplicity through IoT phone and tablet connectivity. For this purpose, we have developed the IoT Outlet: a stand-alone communication unit, used to connect outlets to the internet. The IoT Plug is a power switch which...

    Full text to download in external service

  • The effect of environmental turbulence on cyber security risk management and organizational resilience

    Publication

    - COMPUTERS & SECURITY - Year 2024

    Even though there is a plethora of research on the role of environmental turbulence in organizational performance in general, little attention has been paid to the effect of environmental turbulence on cyber security risk management and further - organizational resilience. Drawing on the resource-based view and contingency theory, this study investigates how technological and market turbulence influence organizational cyber security...

    Full text available to download

  • ANALIZA METOD SYNCHRONIZACJI W SIECI NB-IOT

    W artykule zaprezentowano przegląd i analizę metod synchronizacji odbiornika w sieci NB-IoT. Zaimplementowano trzy metody synchronizacji, a ich porównania dokonano na bazie rzeczywistych sygnałów NB-IoT wygenerowanych przy użyciu testera radiokomunikacyjnego w wyizolowanym i emulowanym środowisku propagacyjnym.

    Full text to download in external service

  • A Simplistic Downlink Channel Estimation Method for NB-IoT

    Publication

    This paper presents a downlink channel estimation method intended for a Narrowband Internet of Things (NB-IoT) access link. Due to its low computational complexity, this method is well suited for energy-efficient IoT devices, still providing acceptable reception quality in terms of signal-to-noise (SNR) performance. This paper describes the physical layer of NB-IoT within the scope of channel estimation, and also reviews existing...

    Full text available to download

  • Towards truly sustainable IoT systems: the SUPERIOT project

    Publication
    • M. Katz
    • T. Paso
    • K. Mikhaylov
    • L. Pessoa
    • H. Fontes
    • L. Hakola
    • J. Leppäniemi
    • E. Carlos
    • G. Dolmans
    • J. Rufo... and 5 others

    - Journal of Physics-Photonics - Year 2024

    This paper provides an overview of the SUPERIOT project, an EU SNS JU (Smart Networks and Services Joint Undertaking) initiative focused on developing truly sustainable IoT systems. The SUPERIOT concept is based on a unique holistic approach to sustainability, proactively developing sustainable solutions considering the design, implementation, usage and disposal/reuse stages. The concept exploits radio and optical technologies...

    Full text available to download

  • Data Model Development for Security Information Sharing in Smart Grids

    The smart grid raises new security concerns which require novel solutions. It is commonly agreed that to protect the grid, the effective collaboration and information sharing between the relevant stakeholders is prerequisite. Developing a security information sharing platform for the smart grid is a new research direction which poses several challenges related to the highly distributed and heterogeneous character of the grid. In...

    Full text available to download

  • Eventual Convergence of the Reputation-Based Algorithm in IoT Sensor Networks

    Publication

    - SENSORS - Year 2021

    Uncertainty in dense heterogeneous IoT sensor networks can be decreased by applying reputation-inspired algorithms, such as the EWMA (Exponentially Weighted Moving Average) algorithm, which is widely used in social networks. Despite its popularity, the eventual convergence of this algorithm for the purpose of IoT networks has not been widely studied, and results of simulations are often taken in lieu of the more rigorous proof....

    Full text available to download

  • EVALUATION OF THE ENERGY SECURITY AS A COMPONENT OF NATIONAL SECURITY OF THE COUNTRY

    Publication
    • H. Dźwigoł
    • M. Dźwigoł–Barosz
    • Z. Zhyvko
    • R. Miśkiewicz
    • H. Pushak
    • R. Miskiewicz

    - Journal of Security and Sustainability Issues - Year 2019

    Full text to download in external service

  • Operating system security by integrity checking and recovery using write-protected storage

    The paper presents an Integrity Checking and Recovery (ICAR) system which protects file system integrity and automatically restores modified files. The system enables files cryptographic hashes generation and verification, as well as configuration of security constraints. All of the crucial data, including ICAR system binaries, file backups and hashes database are stored in a physically write protected storage to eliminate the...

    Full text available to download

  • EVALUATION OF THE USE OF M2M-TYPE NB-IoT AND LTE TECHNOLOGIES FOR MARITIME COMMUNICATION SYSTEMS

    The development of IoT (the Internet of Things) wireless transmission opens a new era in communication systems. In the next years, the development and implementation of IoT systems will be very dynamic. It can be seen that the solutions of LTE – NB-IoT (Long Term Evolution – Narrowband IoT) transmission devices are implemented in a wide range of terrestrial solutions, e.g. smart grids. This paper aims to analyse the possibility...

    Full text available to download

  • External Security Strategies of Belarus

    Under President Lukashenko, three Belarusian national security strategies have been announced: the first in 1995, the second in 2001 and the third in 2011. The first proposal, formulated after Lukashenko’s victory in the presidential elections in 1994, outlined Belarus as a neutral state, unbound to any military block in the absence of external enemies. The direction of the foreign policy pursued by the president of Belarus was...

    Full text available to download

  • Propagacja fal radiowych w sieciach 5G/IoT

    Publication

    - Year 2020

    W książce przedstawiono metody analizy mechanizmów rozchodzenia się fal radiowych oraz metodykę oceny i obliczania tłumienia w różnych środowiskach propagacyjnych. Uwzględniono odpowiednie zalecenia ITU-R oraz ETSI, mające duże znaczenie praktyczne przy projektowaniu systemów radiokomunikacyjnych 5G/6G oraz tzw. Internetu Rzeczy (IoT). W części końcowej opisano trendy rozwojowe w tej dziedzinie.

    Full text to download in external service

  • Path Loss Analysis for the IoT Applications in the Urban and Indoor Environments

    The Internet of Things (IoT) networks concept implies their presence in a various and untypical locations, usually with a disturbed radio signals propagation. In the presented paper an investigation of an additional path loss observed in an underground environment was described. The proposed measurement locations correspond to the operation areas of rapidly growing narrowband IoT (NBIoT) networks, the ones using the Long Term Evolution...

    Full text to download in external service

  • Software-Defined NB-IoT Uplink Framework - The Design, Implementation and Use Cases

    In the radiocommunication area, we may observe a rapid growth of new technology, such as 5G. Moreover, all the newly introduced radio interfaces, e.g., narrowband Internet of Things (NB-IoT), are strongly dependent on the software. Hence, the radiocommunication software development and optimization, as well as the 3GPP technical specification, should be introduced at the academic level of education. In this paper, a software-defined...

    Full text available to download

  • Ukraine’s Energy Security in Strategies

    During the independence period, the Ukrainian government has published two energy security strategies. The first strategy was adopted in 2006 and the second one in 2016. Both documents provided a similar definition of energy security. The aims of the first strategy, covering the period 2006–2030, were the restructuring of the fuel and energy complex using new technologies, increase of energy efficiency and ensuring market prices...

    Full text available to download

  • Threats to Armenia’s Security in the National Strategy and Practice with Special Emphasis on External Security,

    The national security strategy adopted in 2007 provided a detailed definition of security and identified its threats. The key threat to the Armenian state was considered to be the Nagorno-Karabakh conflict. The document indicated the Collective Security Treaty Organisation main guarantor of security, with Russia being Armenia’s main partner in bilateral relations. The second position in the strategy was assigned to cooperation...

    Full text available to download

  • Service-based Resilience for Embedded IoT Networks

    Publication

    - Year 2020

    Embedded IoT networks are the backbone of safety-critical systems like smart factories, autonomous vehicles, and airplanes. Therefore, resilience against failures and attacks should be a prior concern already in their design stage. In this study, we introduce a service-based network model as an MILP optimization problem for the efficient deployment of a service overlay to the embedded network by meeting QoS and resilience requirements....

    Full text to download in external service

  • Security Mechanisms in the Comcute System

    Publication

    - Year 2012

    The aim of this paper is pointing out the basic security problems and mechanisms in the Comcute system - maintenance system of large computing power in the face of critical crisis. Moreover security mechanism and tools useful to apply in laboratory model as well as target version of the Comcute system are presented.

  • Evaluating Security and Resilience of Critical Networked Infrastructures after Stuxnet

    Publication

    - Year 2013

    The chapter presents the current configuration of the simulation environment for the evaluations of the security and resilience of critical networked infrastructures, which enables simulations of Stuxnet-like attacks. The configuration includes new features added to the MAlSim - Mobile Agent Malware Simulator after the advent of Stuxnet in reference to the experiments aiming at the security evaluation of a power plant which we...

    Full text to download in external service

  • Design of an Autonomous IoT Node Powered by a Perovskite-Based Wave Energy Converter

    This paper presents the results of experimental research focused on wave energy harvesting and its conversion to power Internet of Things (IoT) devices. The harvesting and conversion process was performed using a wave energy converter (WEC) consisting of a lead zirconate titanate piezoelectric ceramic perovskite material and a prototype power electronic circuit. The designed WEC was considered as a power supply for an end node...

    Full text available to download

  • Selective jamming of OFDM transmission in NB-IoT radio interface

    Publication

    - Year 2023

    The paper presents the concept of smart jamming, which involves selective interference aimed at critical components of the OFDM signal. Research verifying the feasibility of this type of electronic attack are described. A realized testbed for jamming real NB-IoT signals in a downlink is presented. The test results demonstrate the feasibility of realizing selective jamming and its greater effectiveness compared to barrage interference.

    Full text to download in external service

  • Graph security testing

    Set S ⊂ V is called secure set iff ∀ X ⊂ S | N [ X ] ∩ S | ≥ | N ( X ) \ S | [3]. That means that every subset of a secure set has at least as many friends (neighbour vertices in S) as enemies (neighbour vertices outside S) and will be defended in case of attack. Problem of determining if given set is secure is co −NP -complete, there is no efficient algorithm solving it [3]. Property testers are algorithms that distinguish inputs...

    Full text to download in external service

  • Wirelessly Interfacing Objects and Subjects of Healthcare System – IoT Approach

    Publication

    Wireless sensor networks, WSN, for which development has begun by military applications, are nowadays applied to all human activities; e.g. in medicine for patience monitoring or to reduce the effects of disasters. Therefore, the WSNs area has been also one of the emerging and fast growing scientific fields. Increasing interest of WSNs is even caused by equally intense growth of interest in the Internet of Things domain, IoT, in...

    Full text available to download

  • Metoda lokalizowania sensorów IoT przy użyciu mobilnej stacji bazowej

    W artykule opisano innowacyjną metodę lokalizowania obiektów dla potrzeb Internetu rzeczy (IoT). Przedstawiono matematyczną analizę metody. Opisano również wyniki kompleksowych badań symulacyjnych efektywności pracy zaproponowanej metody dla wybranych parametrów radiowej sieci sensorowej.

  • Extendable Safety and Security Ontology

    Security plays an increasingly important role in our everyday life, and research and users of computer systems point out that the need arises for a common, formalised model capable of integrating different solutions. In this paper we show that an ontology can be designed and created in a way that will make it suitable for interoperability and integration. A security and safety ontology and the methodology for creating a common...

    Full text available to download

  • A simplified channel estimation procedure for NB-IoT downlink

    Publication

    - Year 2024

    This paper presents a low-complexity channel estimation procedure which is suitable for use in energy-efficient NB-IoT user equipment devices. The procedure is based on the well-established least squares scheme, followed by linear interpolation in the time domain and averaging in the frequency domain. The quality of channel estimation vs. signal-to-noise ratio is evaluated for two channel models and compared with the performance...

    Full text available to download

  • Areas of research in maritime security

    Publication

    - Year 2006

    W referacie przedstawiono analizę ważniejszych aspektów dotyczących ochrony żeglugi (maritime security) oraz zaproponowano nowe kierunki rozwoju.

  • An integrated framework for security protocol analysis

    Publication

    - Year 2008

    Assurance of security protocols needs particular attention. Flaws in a protocol can devastate security of the applications that rely on it. Analysis of the protocols is difficult and it is recommended that formal methods are employed to provide for higher levels of assurance. However, the formal methods can cover only a part of the scope of the problem. It is important that the formal models are valid representations of the protocol...

  • Security and Anonymity in Agent Systems

    Publication

    - Year 2012

    Many agent systems have been developed and suggested for commercial application. However, in spite of the significant potential offered by the agent paradigm, the lack of such important properties as security, anonymity and untracebility especially in open dynamical environment, such as the Internet, has blocked the active implementation of agent technologies. Protecting agent systems poses a more demanding challenge comparing...

    Full text to download in external service

  • Mobile Security: Threats and Best Practices

    Publication

    - Mobile Information Systems - Year 2020

    Communicating mobile security threats and best practices has become a central objective due to the ongoing discovery of new vulnerabilities of mobile devices. To cope with this overarching issue, the goal of this paper is to identify and analyze existing threats and best practices in the domain of mobile security. To this extent, we conducted a literature review based on a set of keywords. The obtained results concern recognizable...

    Full text available to download

  • Lokalizowanie terminala użytkownika z użyciem interfejsu NB-IoT

    W artykule przedstawiono metodę estymacji położenia terminala użytkownika korzystając z sygnałów okazjonalnych nadawanych w łączu w dół w interfejsie NB-IoT. Zweryfikowano praktyczną zdolność estymacji położenia na testowym obszarze korzystając z sygnałów wzorcowych o zmiennej wartości stosunku sygnału do szumu oraz z różnym emulowanym profilem kanału radiowego. Dodatkowo przedstawiono metodę umożliwiającą zwięk-szenie dokładności...

  • Security aspects in functional safety analysis

    A security level of distributed control and protection system may have a significant impact on the results of functional safety analysis. However, the issue of integrating the safety and security aspects is difficult and usually is neglected during the functional safety analysis. This article presents a method of functional safety analysis which takes into consideration a concept of integrating these two aspects. It is based on...

    Full text to download in external service

  • Visual Features for Endoscopic Bleeding Detection

    Aims: To define a set of high-level visual features of endoscopic bleeding and evaluate their capabilities for potential use in automatic bleeding detection. Study Design: Experimental study. Place and Duration of Study: Department of Computer Architecture, Faculty of Electronics, Telecommunications and Informatics, Gdansk University of Technology, between March 2014 and May 2014. Methodology: The features have...

    Full text available to download

  • Resilience and Security in Software Defined Networking

    Publication
    • C. Mas Machuca
    • P. Vizarreta
    • R. Durner
    • J. Rak

    - Year 2018

    This paper gives an overview of the most important issues on resilience and security in Software Defined Networking

    Full text to download in external service

  • Energy Security of Polish Consumers in 2004-2021

    Theoretical background: Energy security is one of the most important components of economic security. It is influenced not only by access to energy sources and the economic situation of the state and the individual consumer. The authors adopted the definition of energy security of an individual consumer as included in the UN report. It states that energy security of an individual consumer is guaranteed when the average consumer...

    Full text available to download