Filters
total: 3166
-
Catalog
- Publications 2214 available results
- Journals 157 available results
- Conferences 90 available results
- Publishing Houses 5 available results
- People 95 available results
- Projects 24 available results
- Research Teams 1 available results
- Research Equipment 1 available results
- e-Learning Courses 310 available results
- Events 19 available results
- Open Research Data 250 available results
displaying 1000 best results Help
Search results for: IOT SECURITY
-
Security and Human Rights
Journals -
Science & Global Security
Journals -
Social Security Bulletin
Journals -
Water Biology and Security
Journals -
Critical Studies on Security
Journals -
Aviation and Security Issues
Journals -
Journal of Cyber Security
Journals -
Journal of Baltic Security
Journals -
Security and Communication Networks
Journals -
Wirelessly Interfacing Objects and Subjects of Healthcare System – IoT Approach
PublicationWireless sensor networks, WSN, for which development has begun by military applications, are nowadays applied to all human activities; e.g. in medicine for patience monitoring or to reduce the effects of disasters. Therefore, the WSNs area has been also one of the emerging and fast growing scientific fields. Increasing interest of WSNs is even caused by equally intense growth of interest in the Internet of Things domain, IoT, in...
-
Eventual Convergence of the Reputation-Based Algorithm in IoT Sensor Networks
PublicationUncertainty in dense heterogeneous IoT sensor networks can be decreased by applying reputation-inspired algorithms, such as the EWMA (Exponentially Weighted Moving Average) algorithm, which is widely used in social networks. Despite its popularity, the eventual convergence of this algorithm for the purpose of IoT networks has not been widely studied, and results of simulations are often taken in lieu of the more rigorous proof....
-
Selective jamming of OFDM transmission in NB-IoT radio interface
PublicationThe paper presents the concept of smart jamming, which involves selective interference aimed at critical components of the OFDM signal. Research verifying the feasibility of this type of electronic attack are described. A realized testbed for jamming real NB-IoT signals in a downlink is presented. The test results demonstrate the feasibility of realizing selective jamming and its greater effectiveness compared to barrage interference.
-
An IoT-Based Computational Framework for Healthcare Monitoring in Mobile Environments
PublicationThe new Internet of Things paradigm allows for small devices with sensing, processing and communication capabilities to be designed, which enable the development of sensors, embedded devices and other ‘things’ ready to understand the environment. In this paper, a distributed framework based on the internet of things paradigm is proposed for monitoring human biomedical signals in activities involving physical exertion. The main...
-
Lokalizowanie terminala użytkownika z użyciem interfejsu NB-IoT
PublicationW artykule przedstawiono metodę estymacji położenia terminala użytkownika korzystając z sygnałów okazjonalnych nadawanych w łączu w dół w interfejsie NB-IoT. Zweryfikowano praktyczną zdolność estymacji położenia na testowym obszarze korzystając z sygnałów wzorcowych o zmiennej wartości stosunku sygnału do szumu oraz z różnym emulowanym profilem kanału radiowego. Dodatkowo przedstawiono metodę umożliwiającą zwięk-szenie dokładności...
-
Path Loss Analysis for the IoT Applications in the Urban and Indoor Environments
PublicationThe Internet of Things (IoT) networks concept implies their presence in a various and untypical locations, usually with a disturbed radio signals propagation. In the presented paper an investigation of an additional path loss observed in an underground environment was described. The proposed measurement locations correspond to the operation areas of rapidly growing narrowband IoT (NBIoT) networks, the ones using the Long Term Evolution...
-
Guaranteeing Threshold Attendance of W/WSAN nodes in a reverted security paradigm
PublicationWe consider a Wireline/Wireless Sensor and Actor Network composed of sensor/actor nodes and a data sink/command center (DSCC). Each node controls a generic device that can be in- or out-of-service, corresponding to the ENABLED or DISABLED node state. The node senses the device's intention to change state, and notifies and/or requests the DSCC for authorization to act upon the device. Motivated by requirements for critical infrastructures...
-
Enhancing Security of Advanced Metering Infrastructure by Introducing Threshold Attendance Protocol
PublicationThe industry pushes towards smart grid systems in order to resolve current limitations of the unidirectional legacy power grid infrastructure. By introducing Advanced Metering Infrastructure (AMI) as an integral part of the smart grid solution, the utility company obtains an invaluable tool to optimize its network, lower the operational costs, and improve quality of service. Unfortunately, introducing two-way communication poses...
-
Security Requirements and Controls for Incident Information Sharing in the Polish Power System
PublicationAmong the strategies of protecting information assets of the power system, sharing of information about current cybersecurity incidents between energy operators appears to be a prerequisite. Exchange of information leads to the effective detection of attacks and exploited vulnerabilities as well as the identification of countermeasures. This paper presents the results of continuation of our works on developing a secure and efficient...
-
Experiment with small objects floating under water in the harbor security aspect.
PublicationObservation of the underwater area is the element of general trend which primary purpose is to protect and enhance the safety of the selected region. The aim of the paper is to present the acoustic characteristics of typical objects floating on the surface or under the water, which constitute some knowledge on how to detect these objects. Create a catalog of acoustic signatures and acoustic images of objects mostly floating under...
-
Quality Model for Integrated Security Monitoring and Control in Water Distribution Systems
PublicationThis article addresses the problem of drinking water distribution system (DWDS) security in the terms of water quality which in the era of terrorist threat is of high importance to the public. The contribution of this paper is the development of the so called security module to extend a multi-species water quality model. This gives an insight to the situation in DWDS not only under normal operational conditions but also in case...
-
Security information sharing for smart grids: Developing the right data model
PublicationThe smart grid raises new security concerns which require novel solutions. It is commonly agreed that to protect the grid the effective collaboration and information sharing between the relevant stakeholders is prerequisite. Developing a security information sharing platform for the smart grid is a new research direction which poses several challenges related to the highly distributed and heterogeneous character of the grid. In...
-
Integrated safety and security analysis of hazardous plants and systems of critical infrastructure
PublicationThis article addresses an integrated safety and security analysis approach of hazardous industrial plants and systems of critical infrastructure. Nowadays due to new hazards that emerge there are opinions among experts that these issues require an integrated approach in life cycle, from the design concept, through the design and operation of the plant, to its decommissioning. It is proposed to start from an interesting methodology...
-
EU's Energy Policy and Assessing Europe's Spiraling Energy Security Crises
Publication -
INDO–FRENCH DEFENCE PARTNERSHIP AND REGIONAL SECURITY BALANCE IN SOUTH ASIA
Publication -
Topology improvements in scale-free networks when assuring security and survivability
PublicationW artykule zaproponowano heurystyczny algorytm iteracyjny (NEA) kontrolowanego rozrostu sieci, zmniejszający stopień jej bezskalowości. Pokazano, że odpowiednia kontrola rozrostu sieci, prowadzi do uzyskania sieci o topologii zbliżonej do regularnej, a więc w duzym stopniu odpornej na celowe działania niszczące - ataki. Właściwości algorytmu zostały przebadane przy pomocy dedykowanego symulatora dla reprezentatywnej próby inicjalnych...
-
The effect of environmental turbulence on cyber security risk management and organizational resilience
PublicationEven though there is a plethora of research on the role of environmental turbulence in organizational performance in general, little attention has been paid to the effect of environmental turbulence on cyber security risk management and further - organizational resilience. Drawing on the resource-based view and contingency theory, this study investigates how technological and market turbulence influence organizational cyber security...
-
Safety integrity level verification for safety-related functions with security aspects
PublicationThe article is devoted some important issues of the functional safety analysis, in particular the safetyintegrity level (SIL) verification of safety functions to be implemented within the distributed controland protection systems with regard to cyber security aspects. The procedure for functional safety man-agement includes hazard identification, risk analysis and assessment, specification of overall safetyrequirements and definition...
-
Redesign of the Research Platform for Monitoring, Control and Security of Critical Infrastructure Systems
PublicationCritical Infrastructure Systems (CISs) play a key role in modern societies. Their sustainable operation depends heavily on the performance of dedicated structures and algorithms targeting monitoring, control and security aspects. In previous work a Research Platform (RP) for the design and simulation of such systems was presented. This works updates the information on the RP through the description of major hardware and software...
-
SDN testbed for validation of cross-layer data-centric security policies
PublicationSoftware-defined networks offer a promising framework for the implementation of cross-layer data-centric security policies in military systems. An important aspect of the design process for such advanced security solutions is the thorough experimental assessment and validation of proposed technical concepts prior to their deployment in operational military systems. In this paper, we describe an OpenFlow-based testbed, which was...
-
A Set of Experience-Based Smart Synergy Security Mechanism in Internet of Vehicles
PublicationIn this article, we introduce a novel security mechanism, the Smart Synergy Security (3S). The mechanism uses the Set of Experience Knowledge Structure (SOEKS) and the synergy of security methods in different domains to provide the global optimal security strategy. The proposed strategy is taking into account the characteristics of information security (i.e. confidentiality, integrity, availability, controllability, and reviewability)...
-
IoT-Based Smart Monitoring System Using Automatic Shape Identification
Publication -
Routing Method for Interplanetary Satellite Communication in IoT Networks Based on IPv6
PublicationThe matter of interplanetary network (IPN) connection is a complex and sophisticated topic. Space missions are aimed inter alia at studying the outer planets of our solar system. Data transmission itself, as well as receiving data from satellites located on the borders of the solar system, was only possible thanks to the use of powerful deep space network (DSN) receivers, located in various places on the surface of the Earth. In...
-
Metoda lokalizowania sensorów IoT przy użyciu mobilnej stacji bazowej
PublicationW artykule opisano innowacyjną metodę lokalizowania obiektów dla potrzeb Internetu rzeczy (IoT). Przedstawiono matematyczną analizę metody. Opisano również wyniki kompleksowych badań symulacyjnych efektywności pracy zaproponowanej metody dla wybranych parametrów radiowej sieci sensorowej.
-
Trust-Based Model for the Assessment of the Uncertainty of Measurements in Hybrid IoT Networks
PublicationThe aim of this paper is to introduce a NUT model (NUT: network-uncertainty-trust) that aids the decrease of the uncertainty of measurements in autonomous hybrid Internet of Things sensor networks. The problem of uncertainty in such networks is a consequence of various operating conditions and varied quality of measurement nodes, making statistical approach less successful. This paper presents a model for decreasing the uncertainty...
-
Selektywne zakłócanie transmisji OFDM w interfejsie radiowym NB-IoT
PublicationW artykule przedstawiono zagadnienie tzw. inteligentnego zagłuszania, polegającego na selektywnym zakłócaniu krytycznych składowych sygnału OFDM. Opisane zostały badania weryfikujące możliwość przeprowadzenia tego rodzaju ataku elektronicznego. Przedstawiono zrealizowane stanowisko badawcze, umożliwiające zakłócanie rzeczywistych sygnałów NB-IoT w łączu w dół. Wyniki badań wykazują możliwość realizacji selektywnego zagłuszania...
-
Estymacja parametrów kanału NB-IoT w łączu w dół.
PublicationArtykuł dotyczy doboru metody estymacji parametrów kanału, odpowiedniej do zastosowania w terminalu wąskopasmowego Internetu Rzeczy. Przedstawiono strukturę sygnału pilotowego NRS, używanego do wyznaczenia współczynników kanału w LTE-NB. Zaproponowano cztery warianty metody wyznaczenia współczynników kanału dla całej ramki transmisyjnej. Dokonano oceny tych wariantów w oparciu o dwa wskaźniki jakościowe skojarzone z błędem odtworzonych...
-
Sensor Position Estimation Method for IoT Using Mobile Reference Node
PublicationThe paper proposes an innovative method of locating objects for the Internet of Things (IoT). The proposed method allows the position of a fixed measuring sensor (MS) to be estimated using one mobile base station with a known position moving around the MS. The mathematical analysis of the method, and three algorithms — Newton’s (NA), gradient descent (GD) and genetic (GA) — for solving the system of non-linear positional equations...
-
Operating system security by integrity checking and recovery using write-protected storage
PublicationThe paper presents an Integrity Checking and Recovery (ICAR) system which protects file system integrity and automatically restores modified files. The system enables files cryptographic hashes generation and verification, as well as configuration of security constraints. All of the crucial data, including ICAR system binaries, file backups and hashes database are stored in a physically write protected storage to eliminate the...
-
Overview of current communication systems for security forces. Features, limitations and potential solutions
Publication -
State security and patriotism vs the implementation of obligations and prohibitions related to covid-19
Publication -
The Issue of Operating Security Systems in Terms of the Impact of Electromagnetic Interference Generated Unintentionally
Publication -
Reliability analysis of aerodrome’s electronic security systems taking into account electromagnetic interferences
Publication -
Operational analysis of threats to the security of NATO’s eastern flank. Context of hybrid activities
Publication -
LABOR RESOURCE MANAGEMENT AT THE MACRO LEVEL AS SOCIAL SECURITY IN THE CONTEXT OF EUROPEAN INTEGRATION
Publication -
Security aspects in verification of the safety integrity level of distributed control and protection systems
PublicationPrzedstawiono najważniejsze zagadnienia zwišzane z weryfikacjš poziomu nienaruszalnoci bezpieczeństwa SIL rozproszonych systemów sterowania i zabezpieczeń z uwzględnieniem aspektów ochrony informacji. Przedstawiono ilociowš metodę weryfikacji poziomu SIL z wykorzystaniem wskaników różnicowych oraz dwuparametrowš funkcję kryterialnš łaczšcš wymagania SIL oraz EAL (poziom uzasadnionego zaufania dla ochrony informacji).
-
Indo–French Defence Cooperation in the Light of Regional Security Balance in South Asia
Publication -
DETERMINANTS OF THE PROVISION OF MARITIME TRAVEL IN THE CONTEXT OF A SENSE OF SECURITY OF GENERATION Y REPRESENTATIVES
Publication -
Remote task submission and publishing in BeesyCluster: security and efficiency of Web Service interface
PublicationPrezentujemy nowy system BeesyCluster, który stanowi łatwy w użyciu portal dostępowy do rozszerzalnej sieci usług wdrożonych i opublikowanych na klastrach/komputerach PC z wirtualnymi płatnościami za wykorzystanie usług. Administratorzy/użytkownicy mogą dołączać klastry/komputery PC dostępne poprzez SSH kliknięciem myszy bez konieczności dalszej konfiguracji na klastrze/komputerze PC udostępniającego. Ponadto, użytkownicy mogą...
-
Mini-Cave Automatic Virtual Environment Application in Security, Safety, and Defence Studies
PublicationThe aim of the article is to analyse the use of mini-Cave Automatic Virtual Reality Environment (mini-CAVE) in academic studies on security, safety, and defence. The literature review based on Web of Science database and the case study of the War Studies University research activities indicated the mini-CAVE can be used in two areas as a research infrastructure and as a didactic tool. It can be concluded that due to the development...
-
Systems engineering approach to functional safety and cyber security of industrial critical installations
PublicationThis chapter addresses the systems engineering approach to integrated functional safety and cybersecurity analysis and management regarding selected references, standards and requirements concerning critical installations and their industrial automation and control system (IACS). The objective is to mitigate the vulnerability of industrial installations that include the information technology (IT) and the operational technology...