Academic literature on the topic 'Security of IoT'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security of IoT.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Security of IoT"

1

Jogdand, Gopal, Shubham Kadam, Kiran Patil, and Gaurav Mate. "Iot Transaction Security." Journal of Advances and Scholarly Researches in Allied Education 15, no. 2 (2018): 711–16. http://dx.doi.org/10.29070/15/57056.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Abosata, Nasr, Saba Al-Rubaye, Gokhan Inalhan, and Christos Emmanouilidis. "Internet of Things for System Integrity: A Comprehensive Survey on Security, Attacks and Countermeasures for Industrial Applications." Sensors 21, no. 11 (2021): 3654. http://dx.doi.org/10.3390/s21113654.

Full text
Abstract:
The growth of the Internet of Things (IoT) offers numerous opportunities for developing industrial applications such as smart grids, smart cities, smart manufacturers, etc. By utilising these opportunities, businesses engage in creating the Industrial Internet of Things (IIoT). IoT is vulnerable to hacks and, therefore, requires various techniques to achieve the level of security required. Furthermore, the wider implementation of IIoT causes an even greater security risk than its benefits. To provide a roadmap for researchers, this survey discusses the integrity of industrial IoT systems and h
APA, Harvard, Vancouver, ISO, and other styles
3

Kotaiah, Dharavath, and Chitti Ravi Kiran. "Network Security Key Areas of IoT and IIOT- with Connected Devices Privacy and Security." International Journal for Research in Applied Science and Engineering Technology 11, no. 3 (2023): 2076–82. http://dx.doi.org/10.22214/ijraset.2023.49873.

Full text
Abstract:
Abstract: With the accelerating pace of technological advancement, demand for IoT app development is at an all-time high. Statistic predicts that $1.1 trillion will be spent globally on IoT. (approx.).Modern IoT apps and solutions will unquestionably become more popular as a result of this. Who will get the newest item into consumers' hands first among manufacturers is still a point of contention. Companies can profit much from IoT app development, but one of the key considerations is security. This post focused on IoT security issues and solutions. IoT solutions can be implemented by business
APA, Harvard, Vancouver, ISO, and other styles
4

Toka, K. O., Y. Dikilitaş, T. Oktay, and A. Sayar. "SECURING IOT WITH BLOCKCHAIN." International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLVI-4/W5-2021 (December 23, 2021): 529–32. http://dx.doi.org/10.5194/isprs-archives-xlvi-4-w5-2021-529-2021.

Full text
Abstract:
Abstract. IoT is becoming ubiquitous in industry, homes, cities, literally in every aspect of our daily lives. Securing IoT-based systems is difficult because of deficiencies in the very nature of IoT devices such as limited battery power, processing, and storage, etc. Blockchain is a new approach used to securely record transactions and offers potential solutions to computer and internet security issues such as confidentiality, integrity, availability, authentication, authorization, and accountability. Blockchain, as a decentralized ledger consisting of interconnected blocks, can remedy most
APA, Harvard, Vancouver, ISO, and other styles
5

Dorage, Sachin Vasant. "Cybersecurity in Industrial Management within the Internet of Things." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 008 (2024): 1–16. http://dx.doi.org/10.55041/ijsrem37081.

Full text
Abstract:
Recently, it has become important to integrate cybersecurity threat management policies in the management of any organization that uses information systems, whether large, medium or even small organizations. People live in the center of the field of smart homes, business opportunities of smart industrial cities and healthcare. Even as IoT security issues become increasingly ubiquitousin the industrial realm, they face the added challenge of evolving networks. Architecture towards the integration of information technology (IT) and operational technology (OT) networks. This article analyzes the
APA, Harvard, Vancouver, ISO, and other styles
6

M. S. Minu. "Enhancing IoT Security with Lightweight Cryptographic Operations Using Temporal Spatial Hyperdimensional Computing." Journal of Information Systems Engineering and Management 10, no. 13s (2025): 138–49. https://doi.org/10.52783/jisem.v10i13s.2013.

Full text
Abstract:
Introduction: Network-based security challenges related to the Internet of Things (IoT) are rising, network-based security challenges have become more prominent, raising concerns about the vulnerability of systems to severe security threats. Cyberattacks such as command injection, denial of service, surveillance, and backdoors exploit abnormal patterns in network behavior. Traditional machine learning techniques, including logistic regression and feature-based support vector machines, have been integrated with end-to-end deep neural networks to enhance intrusion detection. However, these appro
APA, Harvard, Vancouver, ISO, and other styles
7

Raimundo, Ricardo Jorge, and Albérico Travassos Rosário. "Cybersecurity in the Internet of Things in Industrial Management." Applied Sciences 12, no. 3 (2022): 1598. http://dx.doi.org/10.3390/app12031598.

Full text
Abstract:
Nowadays, people live amidst the smart home domain, while there are business opportunities in industrial smart cities and healthcare. However, there are concerns about security. Security is central for IoT systems to protect sensitive data and infrastructure, whilst security issues have become increasingly expensive, in particular in Industrial Internet of Things (IIoT) domains. Nonetheless, there are some key challenges for dealing with those security issues in IoT domains: Applications operate in distributed environments such as Blockchain, varied smart objects are used, and sensors are limi
APA, Harvard, Vancouver, ISO, and other styles
8

Rajakumaran, Gayathri, and Shola Usharani. "RFID Security in IoT." International Journal of Science and Research (IJSR) 11, no. 7 (2022): 1420–24. http://dx.doi.org/10.21275/sr22713162252.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Alkunidry, Dona, Shahad Alhuwaysi, and Rawan Alharbi. "Security Threads and IoT Security." Journal of Computer and Communications 11, no. 09 (2023): 76–83. http://dx.doi.org/10.4236/jcc.2023.119005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Alasmary, Hisham. "RDAF-IIoT: Reliable Device-Access Framework for the Industrial Internet of Things." Mathematics 11, no. 12 (2023): 2710. http://dx.doi.org/10.3390/math11122710.

Full text
Abstract:
The Internet of Things (IoT) has experienced significant growth and is now a fundamental part of the next-generation Internet. Alongside improving daily life, IoT devices generate and collect vast amounts of data that can be leveraged by AI-enabled big data analytics for diverse applications. However, due to the machine-to-machine communication inherent in IoT, ensuring data security and privacy is crucial to mitigate various malicious cyber attacks, including man-in-the-middle, impersonation, and data poisoning attacks. Nevertheless, designing an efficient and adaptable IoT security framework
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Security of IoT"

1

Laaboudi, Younes. "Reactive security of IoT communications." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-249633.

Full text
Abstract:
IoT networks’ intrinsic vulnerabilities can be protected through intru- sion detection and response systems (IDRS). Anomaly-based intrusion detection offers multiple advantages: it can detect unknown attacks and it can adapt to multiple types of protocols. However, intrusion response is harder to carry out in combination with an anomaly-based detection system in part due to the possibility of false positive alerts. Through two implementations of IDRS in two distinct IoT networks, this thesis will highlight ways to improve anomaly-based detection and allow for appropriate response when possible
APA, Harvard, Vancouver, ISO, and other styles
2

Shakra, Mohamed, and Ahmad Jabali. "Evaluating Security For An IoT Device." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-289631.

Full text
Abstract:
IoT systems usage is rapidly growing, and is involved in many industries causing more potential security flaws to a freshly new field. Even light bulbs, have a new generation called smart light bulbs have taken a step into the IoT world. In this project an affordable and available light bulb has it’s security evaluated by using a well known attacks to test the device security. It was concluded that the studied light bulb was found to be secured by the array of penetration tests carried in this project. However, the methods used for evaluating the device can be applicable to any other IoT for a
APA, Harvard, Vancouver, ISO, and other styles
3

Makkar, Ankush. "Enhancing IoT Security Using 5G Capabilities." Thesis, Luleå tekniska universitet, Digitala tjänster och system, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-85109.

Full text
Abstract:
Internet of Things (IoT) is an ecosystem comprises CT (Communication Technology),IT (Information Technology) and sometime OT (Operational Technologies) wheredifferent machines and devices can interact with each other and exchange useful datawhich can be processed using different IoT applications to take decisions and performrequired actions. Number of IoT devices and IoT networks are growing exponentially.Security is of utmost importance and without proper security implementation, IoTNetworks with billions of devices will be hacked and used as botnets which can createdisaster. The new IoT use
APA, Harvard, Vancouver, ISO, and other styles
4

Haenel, Arié. "Hybrid security solutions for IoT devices." Electronic Thesis or Diss., Institut polytechnique de Paris, 2024. http://www.theses.fr/2024IPPAS022.

Full text
Abstract:
Il y a quelques années, un incident de cybersécurité aurait pu facilement être le scénario d'un film hollywoodien : des attaquants ont exploité un point d'entrée inattendu : un thermomètre intelligent dans l'aquarium du hall d'un casino. Cet objet connecté avait accès au réseau du casino, et les pirates ont réussi à le compromettre. Ils ont ensuite utilisé ce point d'entrée initial pour accéder à d'autres parties du réseau et ont finalement exfiltré 20 Go de données sensibles, y compris des informations sur les clients ”gros joueurs”.Cet exploit audacieux met en évidence la vulnérabilité des a
APA, Harvard, Vancouver, ISO, and other styles
5

Söderquist, Mårten. "Tiny Security : Evaluating energy use for security in an IoT application." Thesis, Mittuniversitetet, Institutionen för data- och systemvetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-36860.

Full text
Abstract:
IoT devices are   increasingly used in the process of gathering scientific data. In   environmental monitoring IoT devices can be used as remote sensing devices to   collect information about e.g. temperature. To keep data reliable, various   security aspects have to be considered. Constrained devices are limited by   memory size and battery life, a security solution has to be developed with   this in mind. In this study an IoT security solution was developed in collaboration   with a research group in environmental science at Umeå University. We   selected commonly used algorithms and compare
APA, Harvard, Vancouver, ISO, and other styles
6

Mansouri, Mohamad. "Performance and Verifiability of IoT Security Protocols." Electronic Thesis or Diss., Sorbonne université, 2023. http://www.theses.fr/2023SORUS065.

Full text
Abstract:
L'internet des objets (IoT) est l'une des technologies les plus importantes de notre monde actuel. Il est composé d'appareils connectés dotés de capteurs et de capacités de traitement, tous reliés à une plateforme unique qui les orchestre. L'intégration de ces dispositifs IoT dans de nombreuses applications de la vie réelle (par exemple, le transport, les soins de santé, les industries, ...) a impliqué des améliorations significatives de la performance et de l'efficacité. En conséquence, nous avons assisté à un boom du nombre de dispositifs IoT déployés et de leurs plateformes correspondantes.
APA, Harvard, Vancouver, ISO, and other styles
7

Tjäder, Hampus. "End-to-end Security Enhancement of an IoT Platform Using Object Security." Thesis, Linköpings universitet, Informationskodning, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-138838.

Full text
Abstract:
The Internet of Things (IoT) is seen as one of the next Internet revolutions. In a near future the majority of all connected devices to the Internet will be IoT devices. These devices will connect previously offline constrained systems, thus it is essential to ensure end-to-end security for such devices. Object Security is a concept where the actual packet or sensitive parts of the packet are encrypted instead of the radio channel. A compromised node in the network will with this mechanism still have the data encrypted ensuring full end-to-end security. This paper proposes an architecture for
APA, Harvard, Vancouver, ISO, and other styles
8

Shahidi, Hamed. "Security Challenges of Communication Protocols in IoT : Comparing security features of ZigBee and Z-Wave communication protocols in IoT devices." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-40113.

Full text
Abstract:
This research studies the security challenges in IoT devices. At first, security challenges have been described and then specifically the security of communication protocols in the IoT has been addressed. Finally, among different communication protocols, ZigBee and Z-Wave protocols have been chosen for this study. The criterion for choosing these two protocols is the level of security they provide for IoT devices to protect them against unauthorized access and hacking. Security, frequency, power consumption and data rate are the characteristics that have been discussed in the review of these t
APA, Harvard, Vancouver, ISO, and other styles
9

Blázquez, Rodríguez Alberto. "Security and AAA Architectures in an IoT Marketplace." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-234660.

Full text
Abstract:
Nowadays, the concept of Internet of Things has revolutionized the industry, making possible the existence of billions of devices worldwide that constantly produce vast amounts of data. This valuable information may only be processed and filtered by complex applications that will eventually sell the information as products. As a consequence, protection of this data and secure, authorized access turn out to be key priorities in this field. A study about authentication protocols has been carried out, according to certain security factors, giving as outcome that OpenID Connect might be the best s
APA, Harvard, Vancouver, ISO, and other styles
10

Beaulaton, Delphine. "Security Analysis of IoT Systems using Attack Trees." Thesis, Lorient, 2019. http://www.theses.fr/2019LORIS548.

Full text
Abstract:
L’Internet des Objects (IoT) est un modèle qui évolue rapidement et qui permet à des utilisateursd’utiliser et contrôler une large variété d’objets connectés entre eux. Ces environnementsconnectés augmentent la surface d’attaque d’un système puisque les risques sont multipliés parle nombre d’appareils connectés. Ces appareils sont responsables de tâches plus ou moinscritiques, et peuvent donc être la cible d’utilisateurs malveillants. Dans ce travail de thèse nousprésentons une méthodologie pour évaluer la sécurité de systèmes IoT. Nous proposons unemanière de représenter les systèmes IoT, cou
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Security of IoT"

1

Chaki, Rituparna, and Debdutta Barman Roy. Security in IoT. CRC Press, 2022. http://dx.doi.org/10.1201/9781003149507.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Nayak, Padmalaya, Niranjan Ray, and P. Ravichandran. IoT Applications, Security Threats, and Countermeasures. CRC Press, 2021. http://dx.doi.org/10.1201/9781003124252.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hancke, Gerhard P., and Konstantinos Markantonakis, eds. Radio Frequency Identification and IoT Security. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-62024-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Mitton, Nathalie, Hakima Chaouchi, Thomas Noel, Thomas Watteyne, Alban Gabillon, and Patrick Capolsini, eds. Interoperability, Safety and Security in IoT. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-52727-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Fortino, Giancarlo, Carlos E. Palau, Antonio Guerrieri, et al., eds. Interoperability, Safety and Security in IoT. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-93797-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Dehghantanha, Ali, and Kim-Kwang Raymond Choo, eds. Handbook of Big Data and IoT Security. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-10543-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Jeyanthi, N., Ajith Abraham, and Hamid Mcheick, eds. Ubiquitous Computing and Computing Security of IoT. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-01566-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Prasad, Ajay, Thipendra P. Singh, and Samidha Dwivedi Sharma, eds. Communication Technologies and Security Challenges in IoT. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-97-0052-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Azrour, Mourade, Jamal Mabrouki, Azidine Guezzaz, and Said Benkirane. Blockchain and Machine Learning for IoT Security. Chapman and Hall/CRC, 2023. http://dx.doi.org/10.1201/9781003438779.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Jiang, Hongbo, Hongyi Wu, and Fanzi Zeng, eds. Edge Computing and IoT: Systems, Management and Security. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-73429-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Security of IoT"

1

Monshizadeh, Mehrnoosh, and Vikramajeet Khatri. "IoT Security." In A Comprehensive Guide to 5G Security. John Wiley & Sons, Ltd, 2018. http://dx.doi.org/10.1002/9781119293071.ch11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Jabraeil Jamali, Mohammad Ali, Bahareh Bahrami, Arash Heidari, Parisa Allahverdizadeh, and Farhad Norouzi. "IoT Security." In Towards the Internet of Things. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-18468-1_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ledwaba, Lehlogonolo P. I., and Gerhard P. Hancke. "IoT Security." In Encyclopedia of Wireless Networks. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-319-78262-1_291.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ledwaba, Lehlogonolo P. I., and Gerhard P. Hancke. "IoT Security." In Encyclopedia of Wireless Networks. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-32903-1_291-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kalaga, Gunneswara Rao VSSS. "IoT Security." In Design of Internet of Things. CRC Press, 2022. http://dx.doi.org/10.1201/9781003303206-15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Upadhyay, Nidhi. "IoT Security." In Internet of Things. Apple Academic Press, 2023. http://dx.doi.org/10.1201/9781003304609-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Chakravarthi, Veena S. "IoT Security." In Internet of Things and M2M Communication Technologies. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-79272-5_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Sniatala, Pawel, S. S. Iyengar, and Sanjeev Kaushik Ramani. "IoT Security." In Evolution of Smart Sensing Ecosystems with Tamper Evident Security. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-77764-7_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Russell, Brian. "IoT Cyber Security." In Intelligent Internet of Things. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-30367-9_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Golani, Neha, and Rajkumar Rajasekaran. "IoT Challenges: Security." In Internet of Things (IoT). CRC Press, 2017. http://dx.doi.org/10.1201/9781315269849-11.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Security of IoT"

1

Pradana, Aditya, Fahmi Candra Permana, Kusprasapta Mutijarsa, and Yoanes Bandung. "Enhancing IoT Security: A Comprehensive Review of Lightweight Security Mechanisms for IoT." In 2024 International Conference on Information Technology Systems and Innovation (ICITSI). IEEE, 2024. https://doi.org/10.1109/icitsi65188.2024.10929437.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Tiwari, Rajni, Debasmita Mishra, Nidhi Sinha, and Biswaranjan Acharya. "Securing IoT: Emphasizing Requirements for Enhanced Device Security." In 2024 International Conference on Artificial Intelligence and Quantum Computation-Based Sensor Application (ICAIQSA). IEEE, 2024. https://doi.org/10.1109/icaiqsa64000.2024.10882398.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Khan, Mansoor, Muhammad Ilyas, and Oguz Bayat. "Enhancing IoT Security Through Hardware Security Modules (HSMs)." In 2024 International Conference on Intelligent Computing, Communication, Networking and Services (ICCNS). IEEE, 2024. https://doi.org/10.1109/iccns62192.2024.10776375.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Savithri, C. N., S. Lakshman Arun, B. S. Pradyumna Bhat, N. Udhaya Kiran, and S. Sriharan. "CRYPTOGUARD – IoT Biometric Home Security." In 2024 International Conference on Power, Energy, Control and Transmission Systems (ICPECTS). IEEE, 2024. https://doi.org/10.1109/icpects62210.2024.10780420.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Tatarka, Slavomír, Michal Janovec, and Jozef Papán. "IoT Security Threats and Solutions." In 2024 International Conference on Emerging eLearning Technologies and Applications (ICETA). IEEE, 2024. https://doi.org/10.1109/iceta63795.2024.10850844.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Abinaya, A. Backia, K. Preethi, S. Janani, and S. G. Hymlin Rose. "Secure IoT: Fortifying IoT Security with Support Vector Machines." In 2024 IEEE North Karnataka Subsection Flagship International Conference (NKCon). IEEE, 2024. https://doi.org/10.1109/nkcon62728.2024.10774774.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ajaj, Mohamad, and Saeddin Kalash. "Securing the Future of IoT: Exploring the Role of Blockchain Technology in IoT Security." In 2025 5th IEEE Middle East and North Africa Communications Conference (MENACOMM). IEEE, 2025. https://doi.org/10.1109/menacomm62946.2025.10911025.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Sharma, Anshika, and Himanshi Babbar. "Understanding IoT-23 Dataset: A Benchmark for IoT Security Analysis." In 2024 4th International Conference on Intelligent Technologies (CONIT). IEEE, 2024. http://dx.doi.org/10.1109/conit61985.2024.10627334.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Abuserrieh, Lobna, and Manar H. Alalfi. "IoT-SafeMod: Model-Driven Security and Safety for IoT Applications." In 2025 IEEE/ACM 7th International Workshop on Software Engineering Research & Practices for the IoT (SERP4IoT). IEEE, 2025. https://doi.org/10.1109/serp4iot66600.2025.00013.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Rawat, Daksh, Prashant Kumar Mavi, Anupam Kumar Saini, Deeksha Verma, Purushottam Das, and Manika Manwal. "Securing IoT Face Recognition: Using Steganography Integration for Enhanced Security." In 2024 International Conference on Communication, Computing and Energy Efficient Technologies (I3CEET). IEEE, 2024. https://doi.org/10.1109/i3ceet61722.2024.10994164.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Security of IoT"

1

Wendzel, Steffen, and Saffija Kasem-Madani. IoT Security: The Improvement-Decelerating 'Cycle of Blame'. River Publishers, 2016. http://dx.doi.org/10.13052/popcas010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Howell, Gema. Security Analysis of IoT Management Solutions for First Responders. National Institute of Standards and Technology, 2022. http://dx.doi.org/10.6028/nist.tn.2223.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Michael, Fagan. Towards Automating IoT Security: Implementing Trusted Network-Layer Onboarding. National Institute of Standards and Technology, 2025. https://doi.org/10.6028/nist.cswp.42.ipd.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Gunathilake, Nilupulee, Ahmed Al-Dubai, and William Buchanan. Recent advances and trends in lightweight cryptography for IoT security. Peeref, 2023. http://dx.doi.org/10.54985/peeref.2303p1883219.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Garcia-Morchon, O., S. Kumar, and M. Sethi. Internet of Things (IoT) Security: State of the Art and Challenges. RFC Editor, 2019. http://dx.doi.org/10.17487/rfc8576.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Khalafalla, Aya, Adam Summers, Ifeoma Onunkwo, and Adrian Chavez. Cyber and Physical Security Analysis of GSI and Noventum Application for IoT Communications. Office of Scientific and Technical Information (OSTI), 2022. http://dx.doi.org/10.2172/2004898.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Latorre, Lucia, Eduardo Rego, and Lorenzo De Leo. Tech Report: Internet of Things. Inter-American Development Bank, 2025. https://doi.org/10.18235/0013422.

Full text
Abstract:
The following report delves into the essential components that make up IoT systems, illustrative examples of the IoT in action, and its broad spectrum of applications spanning multiple industries, highlighting the tangible benefits it delivers. Furthermore, it addresses the burgeoning IoT landscape in Latin America and the Caribbean, underscoring the unique opportunities and challenges faced in the region. The discussion also covers critical considerations surrounding IoT security, ethics, and the challenges and risks inherent to its deployment. Best practices for implementing IoT solutions ar
APA, Harvard, Vancouver, ISO, and other styles
8

Phillips, Paul. The Application of Satellite-based Internet of Things for New Mobility. SAE International, 2024. http://dx.doi.org/10.4271/epr2024001.

Full text
Abstract:
<div class="section abstract"><div class="htmlview paragraph">With the increased use of devices requiring the Internet of Things (IoT) to enable “New Mobility,” the demand for satellite-enabled IoT is growing steadily, owing to the extensive coverage provided by satellites (over existing ground-based infrastructure). Satellite-based IoT provides precise and real-time vehicle location and tracking services, large-scale geographical vehicle and/or infrastructure monitoring, and increased coverage for remote locations where it may not be possible to install ground-based solutions.<
APA, Harvard, Vancouver, ISO, and other styles
9

Sonmez Turan, Meltem. Ascon-Based Lightweight Cryptography Standards for Constrained Devices. National Institute of Standards and Technology, 2025. https://doi.org/10.6028/nist.sp.800-232.

Full text
Abstract:
In 2023, the National Institute of Standards and Technology (NIST) announced the selection of the Ascon family of algorithms designed by Dobraunig, Eichlseder, Mendel, and Schläffer to provide efficient cryptographic solutions for resource-constrained devices. This decision emerged from a rigorous, multi-round lightweight cryptography standardization process. The Ascon family includes a suite of cryptographic primitives that provide Authenticated Encryption with Associated Data (AEAD), hash function, and eXtendable Output Function (XOF) capabilities. The Ascon family is characterized by lightw
APA, Harvard, Vancouver, ISO, and other styles
10

Latorre, Lucia, Valeria Lovaisa, Lorenzo De Leo, Alexander Riobó, Eduardo Riego, and Mariana Gutierrez. Tech Report: Edge Computing. Inter-American Development Bank, 2024. https://doi.org/10.18235/0013021.

Full text
Abstract:
The adoption of edge computing in Latin America and the Caribbean (LAC) underscores its ability to address the regions unique challenges, including limited connectivity and the need to process data in remote locations. Innovative projects in smart public lighting, urban security, and sustainable resource management highlight the transformative impact of edge computing in improving quality of life and operational efficiency. Looking ahead, edge computing stands at the forefront of technological innovation. Deeper integration with artificial intelligence and the rise of 5G will unlock fresh oppo
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!