Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








1,098 Hits in 5.3 sec

Security and privacy issues of physical objects in the IoT: challenges and opportunities

Xuanxia Yao, Fadi Farha, Rongyang Li, Ismini Psychoula, Liming Chen, Huansheng Ning
2020 Digital Communications and Networks  
Considering the development of IoT technologies, potential security and privacy challenges that IoT objects may face in the pervasive computing environment are summarized.  ...  In order to clarify the complicated security and privacy issues, the life cycle of a physical object is divided into three stages of pre-working, in-working, and post-working.  ...  In addition, Hong Liu et al. put forward the cooperative privacy preservation in authentication and access control for the wearable devices in hybrid (edge and cloud) computing environment [70] .  ... 
doi:10.1016/j.dcan.2020.09.001 fatcat:ho7hiqfwwfb55f4j5uejaa36y4

Architecting Adaptable Security Infrastructures for Pervasive Networks through Components [chapter]

Marc Lacoste
2009 Communications in Computer and Information Science  
The dynamic and heterogeneous character of these environments requires a security infrastructure which can be tailored to different operating conditions, at variable levels of granularity, during phases  ...  We illustrate the benefits of this approach by presenting AMISEC, an integrated authentication and authorization middleware.  ...  Flexibility in privacy management is also a major enabler of pervasive computing, often at odds with trust management: the user should control disclosure of his personal information, and yet let the infrastructure  ... 
doi:10.1007/978-3-642-10844-0_34 fatcat:2g3trfavdffyhbmh4iiuw7yoh4

Study of Security Threats and Challenges in Internet of Things Systems

Rohit Chawla, Et. al.
2021 Turkish Journal of Computer and Mathematics Education  
The low energy and bandwidth cannot effort computational overhead and compromised with security threats.  ...  The process of key generation and authentication provides the authorization and authentication of data over the internet of things.  ...  because they specifically target the problem of lightweight cyphering in pervasive environments. • A problem common to ACLs (Access Control Lists), RBAC and ABAC is that in these systems it is hard to  ... 
doi:10.17762/turcomat.v12i2.1137 fatcat:4b76bsbfn5eqnl4kyjtidninri

Pervasive User Data Collection from Cyberspace: Privacy Concerns and Countermeasures

Yinhao Jiang, Mir Ali Rezazadeh Baee, Leonie Ruth Simpson, Praveen Gauravaram, Josef Pieprzyk, Tanveer Zia, Zhen Zhao, Zung Le
2024 Cryptography  
Interconnecting devices and networks provides convenient platforms for information exchange and facilitates pervasive user data collection. This new environment presents serious privacy challenges.  ...  This paper discerns three novel categories of privacy concerns relating to pervasive user data collection: privacy and user activity in cyberspace, privacy in personal cyber–physical systems, and privacy  ...  transportation sector in a secure and privacy-preserving manner.  ... 
doi:10.3390/cryptography8010005 fatcat:xo3mmrddvfhkrpzn4mcknv2p6q

Conditional privacy-preserving authentication with access likability for roaming service over internet of things

P S Uma Priyadarsini, P Sriramya
2018 International Journal of Engineering & Technology  
In order to provide universal roaming service which is secure and privacy preserving at the multilevel, this paper proposes a privacy-preserving validation which is conditional with access likability called  ...  Future work would include the extension of CPAL scheme to effectively withstand internal attackers and design the lightweight secure and privacy-preserving scheme that will support IoT devices of large  ...  The privacy-preserving validation which is conditional with access likability called CPAL for roaming service provides secure universal roaming service.  ... 
doi:10.14419/ijet.v7i1.9.9731 fatcat:evwffv6jdvdrzknq46dhybpgym

Design of Authentication Model Preserving Intimacy and Trust in Intelligent Environments

Benchaa Djellali, Abdallah Chouarfia, Kheira Belarbi, Pascal Lorenz
2015 Network Protocols and Algorithms  
With the recent advances in communication technologies for low-power devices, pervasive computing environments (PCE) spread as new domains beyond legacy enterprise and personal computing.  ...  In this paper, we propose an anonymous authentication and access control scheme to secure the interaction between mobile users handling smart devices and smart services in PCEs.  ...  In this context, being particularly interested by strengthening security and preserving www.macrothink.org/npa Network Protocols and Algorithms ISSN 1943 -3581 2015 privacy into pervasive computing environments  ... 
doi:10.5296/npa.v7i1.7208 fatcat:e6e7cgyrafd6bpieam4syubimq

Cloud-based RFID authentication

Wei Xie, Lei Xie, Chen Zhang, Quan Zhang, Chaojing Tang
2013 2013 IEEE International Conference on RFID (RFID)  
Comparing with classical schemes, the proposed scheme has advantages in deployment cost saving, pervasiveness of authentication, scalability of O(1) complexity to verify a tag, mobile reader holders' privacy  ...  Classical RFID authentication schemes fail to meet the special security and privacy requirements of cloud-based RFID.  ...  We propose the first RFID authentication protocol which preserves tags and readers privacy against the database keeper.  ... 
doi:10.1109/rfid.2013.6548151 fatcat:sjitqb7cqjdyllz3wcllikdoeq

The computer for the 21st century: present security & privacy challenges

Leonardo B. Oliveira, Fernando Magno Quintão Pereira, Rafael Misoczki, Diego F. Aranha, Fábio Borges, Michele Nogueira, Michelle Wangham, Min Wu, Jie Liu
2018 Journal of Internet Services and Applications  
Privacy Implications: sensitivity data identification and regulation. 7. Forensics: trustworthy evidence from the synergy of digital and physical world.  ...  Cryptography Engineering: lightweight cryptosystems and their secure implementation. 4. Resilience: issues related to service availability and the paramount role of resilience. 5.  ...  An IoT architecture based on OpenID, which treats authentication and access control in a federated environment was proposed in [156] .  ... 
doi:10.1186/s13174-018-0095-2 fatcat:ictrcm6ahng4hccfqeqh7surti

Security of IoT in 5G Cellular Networks: A Review of Current Status, Challenges and Future Directions

Hemangi Goswami, Hiten Choudhury
2022 International Journal of Communication Networks and Information Security  
In a pervasive computing environment, thousands of smart devices, that are constrained in storage, battery backup and computational capability, are connected with each other.  ...  Off late, several schemes and protocols have been proposed to handle these issues. This paper performs a comprehensive review of such schemes and protocols proposed in recent times.  ...  Acknowledgement The work presented in this paper is sponsored by Cyber Security R&D Division, Ministry of Electronics and Information Technology (MeitY), Govt. of India.  ... 
doi:10.17762/ijcnis.v13i2.4955 fatcat:smvwvwibsnbffc5hyb6ivj2giu

An inter-domain authentication scheme for pervasive computing environment

Lin Yao, Lei Wang, Xiangwei Kong, Guowei Wu, Feng Xia
2010 Computers and Mathematics with Applications  
In a pervasive computing environment, mobile users often roam into foreign domains.  ...  In this paper, a fast and secure inter-domain authentication and key establishment scheme, namely IDAS, is proposed.  ...  In this paper, a fast and secure inter-domain authentication and key establishment scheme for pervasive computing environment is proposed -namely IDAS (Inter-Domain Authentication Scheme) -which involves  ... 
doi:10.1016/j.camwa.2010.01.010 fatcat:k3bmo3f6d5cyneq2xvhvcml3qy

Security in product lifecycle of IoT devices: A survey

Narges Yousefnezhad, Avleen Malhi, Kary Främling
2020 Journal of Network and Computer Applications  
In that regard, we provide a comprehensive comparison of state-of-the-art surveys in an initial phase which concentrate on distinct parameters required for IoT security.  ...  In this context, the contributions of this article are: (a) IoT product lifecycle security, (b) security taxonomy in IoT product lifecycle, (c) security solutions for each lifecycle phase in product lifecycle  ...  Acknowledgment The research leading to this publication is supported by the European Union's Horizon 2020 research and innovation program (bIoTope; grant 688203 and FINEST TWINS; grant 856602) and Academy  ... 
doi:10.1016/j.jnca.2020.102779 fatcat:junhktapajc75px3n2x6j7tzou

Study of Security Issues in Pervasive Environment of Next Generation Internet of Things [chapter]

Tapalina Bhattasali, Rituparna Chaki, Nabendu Chaki
2013 Lecture Notes in Computer Science  
Therefore need arises for a review of security threats for a new area having huge demand. Here a study of security issues in this domain is briefly presented.  ...  This environment is one where the boundary between virtual and physical world is eliminated. As the network gets loaded with hitherto unknown applications, security threats also become rampant.  ...  But user privacy preservation and proper access control of health data are growing concern. A contextual patient-centric access policy may be adopted to classify the roles.  ... 
doi:10.1007/978-3-642-40925-7_20 fatcat:ff2ekqchvvf5xi5ctwk5z24fxe

Study of Security Issues in Pervasive Environment of Next Generation Internet of Things [article]

Tapalina Bhattasali, Rituparna Chaki, Nabendu Chaki
2014 arXiv   pre-print
Therefore need arises for a review of security threats for a new area having huge demand. Here a study of security issues in this domain is briefly presented.  ...  This environment is one where the boundary between virtual and physical world is eliminated. As the network gets loaded with hitherto unknown applications, security threats also become rampant.  ...  But user privacy preservation and proper access control of health data are growing concern. A contextual patient-centric access policy may be adopted to classify the roles.  ... 
arXiv:1406.4941v1 fatcat:a3oydi4od5cildrsqzkgdriogi

Privacy Concerns Raised by Pervasive User Data Collection From Cyberspace and Their Countermeasures [article]

Yinhao Jiang, Ba Dung Le, Tanveer Zia, Praveen Gauravaram
2022 arXiv   pre-print
Now it offers advanced services and connected experiences with the developing pervasive computing technologies that digitise, collect, and analyse users' activity data.  ...  To complete the perspectives, three complex open problems, namely trajectory privacy, privacy in smart metering, and involuntary privacy leakage with ambient intelligence, are briefly discussed for future  ...  control enforcement for wearable equipment Table 3 : 3 Comparison Among Suitable Lightweight Encryption Schemes Block Ciphers Name Ref.  ... 
arXiv:2202.04313v1 fatcat:6yz6bt73wzeapadd5el6zrsvli

A Study of Security Vulnerabilities in Mobile environment

Suk-jin Kim, Hyangran Lee, Malrey Lee
2015 The International Journal of Advanced Culture Technology  
However, security and privacy issues and risks are introduced by pervasiveness of RFID systems. In RFID systems, communication between tag and reader usually takes place via wireless communication.  ...  The computational resources in RFID tag are constrained and it is a big limitation that forces researcher to apply different mitigations compared to common security solutions.  ...  ACKNOWLEDGEMENTS This work (Grants No: 1401001175) was supported by Business for Academic-industrial Cooperative establishments funded Korea Small and Medium Business Administration in 2015.  ... 
doi:10.17703/ijact.2015.3.2.149 fatcat:dbf3vgagajf7va4pdxxbkqy4le
« Previous Showing results 1 — 15 out of 1,098 results