Linked e-resources

Details

Introduction; Challenges Beyond the Internet of Things; 1 Context-Aware Systems: Technologies and Challenges in Internet of Everything Environments; Abstract; 1 Introduction; 2 From Internet of Things (IoT) to Internet of Everything (IoE); 2.1 Architecture; 2.2 Characteristics and Environments; 3 Context-Aware Life-Cycle; 3.1 Context Acquisition; 3.2 Context Modeling; 3.3 Context Reasoning; 3.4 Context Distribution; 4 Context-Aware Systems; 4.1 Architecture Overview; 4.2 Systems Features; 5 Related Work; 6 Context-Awareness in IoE; 6.1 Technologies and Challenges; 7 Summary

AcknowledgmentsReferences; Enabling User Context Utilization in the Internet Communication Protocols: Motivation, Architecture and Examples; 1 Introduction; 1.1 Motivation; 1.2 Research Challenges; 1.3 Contributions; 2 User-Context Module Design; 2.1 System Architecture; 2.2 End-User Modeling; 2.3 Key Context Information (KCI); 3 Applications of the User-Context Module; 3.1 Application I: HTTP Case; 3.2 Application II: TCP Case; 4 Resource Distribution Framework for the User-Context Module; 4.1 Motivation; 4.2 Framework Workflow; 4.3 Framework Properties

4.4 Illustrative Case and Experimental Results5 Related Work; 5.1 Internet Protocol Stack Design; 5.2 Context-Aware Computing; 5.3 Quality of Experience (QoE); 6 Summary and Conclusion; References; 3 Security Challenges of the Internet of Things; Abstract; 1 Introduction; 2 Concepts of Security in the Internet of Things; 2.1 A General Overview of Internet of Things Security; 2.2 Security Goals for the Internet of Things; 2.2.1 Confidentiality; 2.2.2 Integrity; 2.2.3 Availability; 2.2.4 Authentication; 2.2.5 Access Control; 2.2.6 Non-repudiation; 2.2.7 Secure Booting

2.2.8 Device Tampering Detection2.3 Where Internet of Things Security Becomes Delicate; 2.3.1 Challenges of Implementing Security for IoT; 2.3.2 Hardware Issues; 2.4 Size and Heterogeneity of Things; 2.4.1 Size of IoT; 2.4.2 Heterogeneity of the IoT; 2.5 Privacy Concerns in the Internet of Things; 3 Fundamental Internet of Things Security Issues; 3.1 Things Are not Designed with Security in Mind; 3.1.1 Testing the Security of IoT Devices; 3.2 Open Debugging Interfaces; 3.3 Inappropriate Network Configuration and Use of Default Passwords by Users

3.4 Lack of Encryption of Critical Information Before Storage3.5 Current and Emerging IoT Cyber Threat Landscape; 3.5.1 Internet of Things Cyber Assets; 3.5.2 Vulnerabilities Associated with IoT Devices; 3.6 Overview of Internet of Things Threat Agents; 4 IoT Security Issues that Need Immediate Attention; 4.1 Efficient Lightweight Authentication Schemes for IoT; 4.2 Robust and Flexible Lightweight Cryptography; 4.3 Need for Efficient Key Revocation Schemes; 4.4 Need for Standardization of Security Solutions; 5 Conclusions; Acknowledgments; References; Technologies for Connecting Everything

Browse Subjects

Show more subjects...

Statistics

from
to
Export