共查询到20条相似文献,搜索用时 0 毫秒
1.
Hannes Tschofenig 《Datenschutz und Datensicherheit - DuD》2016,40(4):222-224
Over the last few years Internet of Things products have become known for their weak security. News articles regularly describe security vulnerabilities of cars, surveillance cameras, kettles, and other IoT devices. There are, however, recent standardization activities addressing some of these security challenges. This article describes how the work of the IETF and the FIDO Alliance can lead to improved security. 相似文献
2.
Multimedia Tools and Applications - The Internet of Things (IoT) enabled various types of applications in the field of information technology, smart and connected health care is notably a crucial... 相似文献
3.
Abhik Chaudhuri 《EDPACS》2017,56(4):7-18
This article discusses the various dimensions of philosophy of information for the Internet of Things (IoT) technology. The aspects of attention, subjectivity, objectivity, happiness, key ethical concerns, and the need for algorithmic transparency and accountability in autonomous IoT applications that are necessary to build an IoT belief system have been highlighted here. The interplay of smart devices, smart services, and humans has been depicted to highlight trust permeability in human and IoT interfaces. 相似文献
4.
Multimedia Tools and Applications - The Internet of Things (IoT), fast-growing smart equipment and high-speed networks, has become generally embraced and popular. Most IoT devices are nevertheless... 相似文献
5.
6.
7.
Multimedia Tools and Applications - 相似文献
8.
This paper addresses the problem of opportunistic access of secondary users to licensed spectrum in cognitive radio networks. In order to avoid interference to the licensed primary users, efficient spectrum detection methods need to be developed. For this purpose, in recent years several sensing techniques have been proposed to monitor and regulate the spectrum access to the shared spectrum resources. However, spectrum sensing may be affected by errors in the form of missed-detections (i.e., an occupied spectrum is erroneously detected as free) or false-alarms (i.e., a free spectrum is erroneously detected as occupied). These two magnitudes pose a tradeoff on the design of the spectrum sensing mechanisms meaning that low missed-detection can only be achieved at the expense of high false-alarm and vice versa. Thus, the network designers should adaptively tune the sensing techniques such that the highest perceived Quality of Service (QoS) is achieved by both primary and secondary users. In this paper, a framework is introduced for determining the sensing operating points. Also the definition of Grade-of-Service (GoS) metrics is adopted to the case of primary/secondary users spectrum sharing. It is shown that the operating points of the sensing mechanisms can be easily adjusted according to the current traffic load of both primary and secondary users so that the perceived GoS is maximized. In addition, the Erlang Capacity of the spectrum sharing system for both primary and secondary users is also evaluated considering the effects of erroneous sensing. 相似文献
9.
Interacting Socially with the Internet of Things (IoT): Effects of Source Attribution and Specialization in Human–IoT Interaction
下载免费PDF全文

Ki Joon Kim 《Journal of Computer-Mediated Communication》2016,21(6):420-435
This study investigates the theoretical mechanisms by which the variations in source attribution (multiple sources vs. single source) and specialization (multifunctionality vs. single functionality) of Internet of Things (IoT) devices influence the quality of human–IoT interaction. Results from a between‐subjects experiment (N = 100) indicate that IoT devices that elicit the sense of multiple agencies and are specialized in a single function induce greater social presence and perceived expertise, which, in turn, lead individuals to show a more positive attitude toward the devices and to ascribe greater quality to the information transmitted by them. The results also reveal that the effect of multiple source attribution is more pronounced for individuals for whom the content of the information has low personal relevance. 相似文献
10.
Peer-to-Peer Networking and Applications - Sensor nodes play a major role in IoT environment, and each sensor is a peer to peer networking. Due to limited physical size, IoT sensor nodes must have... 相似文献
11.
12.
The Journal of Supercomputing - The Internet has immeasurably changed all aspects of life, from work to social relationships. The Internet of things (IoT) promises to add a new dimension by making... 相似文献
13.
《Information Security Journal: A Global Perspective》2013,22(4-6):197-212
ABSTRACTWith the manifestation of the Internet of Things (IoT) and fog computing, the quantity of edge devices is escalating exponentially all over the world, providing better services to the end user with the help of existing and upcoming communication infrastructures. All of these devices are producing and communicating a huge amount of data and control information around this open IoT environment. A large amount of this information contains personal and important information for the user as well as for the organization. The number of attack vectors for malicious users is high due to the openness, distributed nature, and lack of control over the whole IoT environment. For building the IoT as an effective service platform, end users need to trust the system. For this reason, security and privacy of information in the IoT is a great concern in critical infrastructures such as the smart home, smart city, smart healthcare, smart industry, etc. In this article, we propose three information hiding techniques for protecting communication in critical IoT infrastructure with the help of steganography, where RGB images are used as carriers for the information. We hide the information in the deeper layer of the image channels with minimum distortion in the least significant bit (lsb) to be used as indication of data. We analyze our technique both mathematically and experimentally. Mathematically, we show that the adversary cannot predict the actual information by analysis. The proposed approach achieved better imperceptibility and capacity than the various existing techniques along with better resistance to steganalysis attacks such as histogram analysis and RS analysis, as proven experimentally. 相似文献
14.
Multimedia Tools and Applications - Internet of things (IoT) enables a number of embedded systems to interact for the purpose of various IoT applications such as home security, medical, smart... 相似文献
15.
从信息安全的机密性、完整性和可用性等三个基本属性出发,分析了物联网安全需求和面临的安全问题,提出了物联网安全的系统架构,并对一些安全关键技术进行了深入研究,希望为建立物联网可靠的信息安全体系提供参考依据。 相似文献
16.
The Journal of Supercomputing - With the increase in mining depth and intensity, the threat of rockburst caused by high stress in stope to coal mining (CM) safety production is becoming ever more... 相似文献
17.
18.
Bin Guo Daqing Zhang Zhu Wang Zhiwen Yu Xingshe Zhou 《Journal of Network and Computer Applications》2013,36(6):1531-1539
The traditional view of Internet of Things (IoT) attempts to connect all the physical objects to build a global, infrastructure-based IoT. In this paper, however, we will present opportunistic IoT, which is formed based on the ad hoc, opportunistic networking of devices (e.g., mobile phones and smart vehicles) using short-range radio techniques (e.g., Bluetooth and Wi-Fi). The opportunistic IoT demonstrates inherently the close relationship between human and opportunistic connection of smart things. It enables information forwarding and dissemination within and among the opportunistic communities formed based on the movement and opportunistic contact nature of human. We characterize the bi-directional effects between human and opportunistic IoT, discuss the technical challenges faced by this new research field, and propose a reference architecture for developing opportunistic IoT systems. Some of our ongoing practices, including opportunistic mobile social networking, opportunistic marketing, and community service provision are further presented to demonstrate the potential application areas and technical solutions of opportunistic IoT. 相似文献
19.
Mabodi Kobra Yusefi Mehdi Zandiyan Shahram Irankhah Leili Fotohi Reza 《The Journal of supercomputing》2020,76(9):7081-7106
The Journal of Supercomputing - The internet of things (IoT) is able to provide a prediction of linked, universal, and smart nodes that have autonomous interaction when they present services.... 相似文献