1,722 research outputs found

    Editorial: Security and privacy in Internet of Things

    Get PDF
    J. M. de Fuentes, L. Gonzalez-Manzano and P. Peris-Lopez have been partially supported by MINECO grants TIN2013-46469-R and TIN2016-79095-C2-2-R, and CAM grant S2013/ICE-3095

    Security, Trust and Privacy in Cyber (STPCyber): Future trends and challenges

    Full text link
    © 2020 Today's world experiences massively interconnected devices to share information across variety of platforms between traditional computers (machines), Smart IoT devices used across smart homes, smart interconnected vehicles etc. and of course the social networks apps such as Facebook, Linkdn, twitter etc. We experience the growth has been skyrocketing and the trend will continue exponentially to the future. At one end, we find life becomes easier with such developments and at the other end; we experience more and more cyber threats on our privacy, security and trustworthiness with organizations holding our data. In this special issue, we summarize contributions by authors in advanced topics related to security, trust and privacy based on a range of applications and present a selection of the most recent research efforts in these areas

    Software Defined Networks based Smart Grid Communication: A Comprehensive Survey

    Get PDF
    The current power grid is no longer a feasible solution due to ever-increasing user demand of electricity, old infrastructure, and reliability issues and thus require transformation to a better grid a.k.a., smart grid (SG). The key features that distinguish SG from the conventional electrical power grid are its capability to perform two-way communication, demand side management, and real time pricing. Despite all these advantages that SG will bring, there are certain issues which are specific to SG communication system. For instance, network management of current SG systems is complex, time consuming, and done manually. Moreover, SG communication (SGC) system is built on different vendor specific devices and protocols. Therefore, the current SG systems are not protocol independent, thus leading to interoperability issue. Software defined network (SDN) has been proposed to monitor and manage the communication networks globally. This article serves as a comprehensive survey on SDN-based SGC. In this article, we first discuss taxonomy of advantages of SDNbased SGC.We then discuss SDN-based SGC architectures, along with case studies. Our article provides an in-depth discussion on routing schemes for SDN-based SGC. We also provide detailed survey of security and privacy schemes applied to SDN-based SGC. We furthermore present challenges, open issues, and future research directions related to SDN-based SGC.Comment: Accepte

    IEEE Access Special Section Editorial: Data Mining for Internet of Things

    Get PDF
    It is an irrefutable fact that the Internet of Things (IoT) will eventually change our daily lives because its applications and relevant technologies have been or will be penetrating our daily lives. Also, the IoT is aimed to connect all the things (e.g., devices and systems) together via the Internet, thus making it easy to collect the data of users or environments and to find out useful information from the gathered data by using data mining technologies. As a consequence, how intelligent systems are developed for the IoT has become a critical research topic today. This means that artificial intelligence (AI) technologies (e.g., supervised learning, unsupervised learning, and semi-supervised learning) were used in the development of intelligent systems for analyzing the data captured from IoT devices or making decisions for IoT systems. It can be easily seen that AI can make an IoT system more intelligent and thus more accurate. For example, various sensors can be used for a smart home system to pinpoint the location and analyze the behavior of a human; however, with AI technologies, a more accurate prediction can be provided on the two pieces of information of a human. One of the most important uses for AI technologies is to make IoT systems more intelligent in order to provide a more convenient environment for users; thus, how to use existing AI technologies or develop new AI technologies to construct a better IoT system has attracted the attention of researchers from different disciplines in recent years. That is why, besides using existing supervised, unsupervised, semi-supervised learning algorithms, data mining algorithms, and machine learning algorithms, several recent studies have also attempted to develop new intelligent methods for the devices or systems for the IoT. All these approaches for making an IoT system more intelligent can also be found in the articles of this Special Section

    Blockchain enabled industrial Internet of Things technology

    Get PDF
    The emerging blockchain technology shows promising potential to enhance industrial systems and the Internet of things (IoT) by providing applications with redundancy, immutable storage, and encryption. In the past a few years, many more applications in industrial IoT (IIoT) have emerged and the blockchain technologies have attracted huge amounts of attention from both industrial and academic researchers. In this paper we address the integration of blockchain and IIoT from the industrial prospective. A blockchain enabled IIoT framework is introduced and involved fundamental techniques are presented. Moreover, main applications and key challenges are addressed. A comprehensive analysis for the most recent research trends and open issues is provided associated with the blockchain enabled IIoT

    ACUTA Journal of Telecommunications in Higher Education

    Get PDF
    In This Issue President\u27s Message From the ACUTA CEO Wireless Challenges on Campus Snapshot: And Then There\u27s Mass Notification Time to Deploy Wireless Security Cameras? Five Steps to Simplify and Secure BYOD Where Wireless Rules Coming Soon to Your Campus: Wireless loT The Federal Reserve Research Grant and FISMA Compliance Managing Privacy and Security in the Age of loT 2014 Institutional Excellence Awar

    Enhancing GDPR compliance through data sensitivity and data hiding tools

    Get PDF
    Since the emergence of GDPR, several industries and sectors are setting informatics solutions for fulfilling these rules. The Health sector is considered a critical sector within the Industry 4.0 because it manages sensitive data, and National Health Services are responsible for managing patients’ data. European NHS are converging to a connected system allowing the exchange of sensitive information cross different countries. This paper defines and implements a set of tools for extending the reference architectural model industry 4.0 for the healthcare sector, which are used for enhancing GDPR compliance. These tools are dealing with data sensitivity and data hiding tools A case study illustrates the use of these tools and how they are integrated with the reference architectural model

    Bio-inspired network security for 5G-enabled IoT applications

    Get PDF
    Every IPv6-enabled device connected and communicating over the Internet forms the Internet of things (IoT) that is prevalent in society and is used in daily life. This IoT platform will quickly grow to be populated with billions or more objects by making every electrical appliance, car, and even items of furniture smart and connected. The 5th generation (5G) and beyond networks will further boost these IoT systems. The massive utilization of these systems over gigabits per second generates numerous issues. Owing to the huge complexity in large-scale deployment of IoT, data privacy and security are the most prominent challenges, especially for critical applications such as Industry 4.0, e-healthcare, and military. Threat agents persistently strive to find new vulnerabilities and exploit them. Therefore, including promising security measures to support the running systems, not to harm or collapse them, is essential. Nature-inspired algorithms have the capability to provide autonomous and sustainable defense and healing mechanisms. This paper first surveys the 5G network layer security for IoT applications and lists the network layer security vulnerabilities and requirements in wireless sensor networks, IoT, and 5G-enabled IoT. Second, a detailed literature review is conducted with the current network layer security methods and the bio-inspired techniques for IoT applications exchanging data packets over 5G. Finally, the bio-inspired algorithms are analyzed in the context of providing a secure network layer for IoT applications connected over 5G and beyond networks
    corecore