نتایج جستجو برای: iot devices

تعداد نتایج: 214508  

2016
Jaeseok Yun Il-Yeup Ahn Sung-Chan Choi Jaeho Kim

The Internet of Things allows things in the world to be connected to each other and enables them to automate daily tasks without human intervention, eventually building smart spaces. This article demonstrates a prototype service based on the Internet of Things, TTEO (Things Talk to Each Other). We present the full details on the system architecture and the software platforms for IoT servers and...

2011
Sarfraz Alam Mohammad M. R. Chowdhury Josef Noll

The Internet of things (IoT) is a network of smart objects that bridges the gap between the physical and the digital world. The prevalence of IoT leads towards a new digital ecosystem for building novel applications and services. However, heterogeneity in devices, technologies and standards are causing to impede the widespread adoption of IoT. Advances in embedded service oriented architecture ...

Journal: :Informatica (Slovenia) 2016
James King Ali Ismail Awad

Internet of Things (IoT) devices have developed to comprise embedded systems and sensors with the ability to connect, collect, and transmit data over the Internet. Although solutions to secure IoT systems exist, Class-0 IoT devices with insufficient resources to support such solutions are considered a resourceconstrained in terms of secure communication. This paper provides a distributed securi...

2016
Konstantinos Kotis George A. Vouros

Semantics for the IoT domain have been already introduced in several semantic interoperability approaches, towards supporting the (semi-)automated deployment of generic IoT applications in environments where heterogeneous third-party IoT devices are deployed. Depending on the level of interoperability, an application may have to ‘decide’ which IoT devices in that environment are trustworthy for...

2018
Francesco Restuccia Salvatore D'Oro Tommaso Melodia

The Internet of Things (IoT) realizes a vision where billions of interconnected devices are deployed just about everywhere, from inside our bodies to the most remote areas of the globe. As the IoT will soon pervade every aspect of our lives and will be accessible from anywhere, addressing critical IoT security threats is now more important than ever. Traditional approaches where security is app...

2016
Michael Vögler Johannes M. Schleicher Christian Inzinger Schahram Dustdar

Internet of Things (IoT) devices are usually considered as external application dependencies that only provide data, or process and execute simple instructions. The recent emergence of IoT devices with embedded execution environments allows practitioners to deploy and execute custom application logic directly on the device. This approach fundamentally changes the overall process of designing, d...

Journal: :IEICE Transactions 2014
Yuichi Kawamoto Hiroki Nishiyama Nei Kato Naoko Yoshimura Shinichi Yamamoto

The recent development of communication devices and wireless network technologies continues to advance the new era of the Internet and telecommunications. The various “things”, which include not only communication devices but also every other physical object on the planet, are also going to be connected to the Internet, and controlled through wireless networks. This concept, which is referred t...

2015
Dong Hee Kim Ji Yeon Cho Sungjun Kim Jongin Lim

IoT service provides interconnection between ‘Things’ in many industry areas (home appliance, traffic, medical services, etc.). However, because of the IoT environment is consisted of various devices, network protocols, platforms, there are many security risks such as IoT device hacking, privacy infringement, information leakage, etc. Therefore, to make a secure and safe IoT environment, identi...

Journal: :CoRR 2016
Redowan Mahmud Rajkumar Buyya

In recent years, the number of Internet of Things (IoT) devices/sensors has increased to a great extent. To support the computational demand of real-time latency-sensitive applications of largely geo-distributed IoT devices/sensors, a new computing paradigm named ”Fog computing” has been introduced. Generally, Fog computing resides closer to the IoT devices/sensors and extends the Cloud-based c...

2017
Calvin Hendriks

For the last couple of years, the Internet of Things (IoT) has grown rapidly. Often, the objects connected to the IoT contain security vulnerabilities, which can be exploited to perform Distributed Denial of Service (DDoS) attacks. The problem is that most of these devices are owned by non-technical skilled users which do not know their devices are comprised and, if known, do not know how to ac...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید