A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
Security and privacy issues of physical objects in the IoT: challenges and opportunities
2020
Digital Communications and Networks
Considering the development of IoT technologies, potential security and privacy challenges that IoT objects may face in the pervasive computing environment are summarized. ...
In order to clarify the complicated security and privacy issues, the life cycle of a physical object is divided into three stages of pre-working, in-working, and post-working. ...
In addition, Hong Liu et al. put forward the cooperative privacy preservation in authentication and access control for the wearable devices in hybrid (edge and cloud) computing environment [70] . ...
doi:10.1016/j.dcan.2020.09.001
fatcat:ho7hiqfwwfb55f4j5uejaa36y4
Architecting Adaptable Security Infrastructures for Pervasive Networks through Components
[chapter]
2009
Communications in Computer and Information Science
The dynamic and heterogeneous character of these environments requires a security infrastructure which can be tailored to different operating conditions, at variable levels of granularity, during phases ...
We illustrate the benefits of this approach by presenting AMISEC, an integrated authentication and authorization middleware. ...
Flexibility in privacy management is also a major enabler of pervasive computing, often at odds with trust management: the user should control disclosure of his personal information, and yet let the infrastructure ...
doi:10.1007/978-3-642-10844-0_34
fatcat:2g3trfavdffyhbmh4iiuw7yoh4
Study of Security Threats and Challenges in Internet of Things Systems
2021
Turkish Journal of Computer and Mathematics Education
The low energy and bandwidth cannot effort computational overhead and compromised with security threats. ...
The process of key generation and authentication provides the authorization and authentication of data over the internet of things. ...
because they specifically target the problem of lightweight cyphering in pervasive environments. • A problem common to ACLs (Access Control Lists), RBAC and ABAC is that in these systems it is hard to ...
doi:10.17762/turcomat.v12i2.1137
fatcat:4b76bsbfn5eqnl4kyjtidninri
Pervasive User Data Collection from Cyberspace: Privacy Concerns and Countermeasures
2024
Cryptography
Interconnecting devices and networks provides convenient platforms for information exchange and facilitates pervasive user data collection. This new environment presents serious privacy challenges. ...
This paper discerns three novel categories of privacy concerns relating to pervasive user data collection: privacy and user activity in cyberspace, privacy in personal cyber–physical systems, and privacy ...
transportation sector in a secure and privacy-preserving manner. ...
doi:10.3390/cryptography8010005
fatcat:xo3mmrddvfhkrpzn4mcknv2p6q
Conditional privacy-preserving authentication with access likability for roaming service over internet of things
2018
International Journal of Engineering & Technology
In order to provide universal roaming service which is secure and privacy preserving at the multilevel, this paper proposes a privacy-preserving validation which is conditional with access likability called ...
Future work would include the extension of CPAL scheme to effectively withstand internal attackers and design the lightweight secure and privacy-preserving scheme that will support IoT devices of large ...
The privacy-preserving validation which is conditional with access likability called CPAL for roaming service provides secure universal roaming service. ...
doi:10.14419/ijet.v7i1.9.9731
fatcat:evwffv6jdvdrzknq46dhybpgym
Design of Authentication Model Preserving Intimacy and Trust in Intelligent Environments
2015
Network Protocols and Algorithms
With the recent advances in communication technologies for low-power devices, pervasive computing environments (PCE) spread as new domains beyond legacy enterprise and personal computing. ...
In this paper, we propose an anonymous authentication and access control scheme to secure the interaction between mobile users handling smart devices and smart services in PCEs. ...
In this context, being particularly interested by strengthening security and preserving www.macrothink.org/npa Network Protocols and Algorithms ISSN 1943 -3581 2015 privacy into pervasive computing environments ...
doi:10.5296/npa.v7i1.7208
fatcat:e6e7cgyrafd6bpieam4syubimq
Cloud-based RFID authentication
2013
2013 IEEE International Conference on RFID (RFID)
Comparing with classical schemes, the proposed scheme has advantages in deployment cost saving, pervasiveness of authentication, scalability of O(1) complexity to verify a tag, mobile reader holders' privacy ...
Classical RFID authentication schemes fail to meet the special security and privacy requirements of cloud-based RFID. ...
We propose the first RFID authentication protocol which preserves tags and readers privacy against the database keeper. ...
doi:10.1109/rfid.2013.6548151
fatcat:sjitqb7cqjdyllz3wcllikdoeq
The computer for the 21st century: present security & privacy challenges
2018
Journal of Internet Services and Applications
Privacy Implications: sensitivity data identification and regulation. 7. Forensics: trustworthy evidence from the synergy of digital and physical world. ...
Cryptography Engineering: lightweight cryptosystems and their secure implementation. 4. Resilience: issues related to service availability and the paramount role of resilience. 5. ...
An IoT architecture based on OpenID, which treats authentication and access control in a federated environment was proposed in [156] . ...
doi:10.1186/s13174-018-0095-2
fatcat:ictrcm6ahng4hccfqeqh7surti
Security of IoT in 5G Cellular Networks: A Review of Current Status, Challenges and Future Directions
2022
International Journal of Communication Networks and Information Security
In a pervasive computing environment, thousands of smart devices, that are constrained in storage, battery backup and computational capability, are connected with each other. ...
Off late, several schemes and protocols have been proposed to handle these issues. This paper performs a comprehensive review of such schemes and protocols proposed in recent times. ...
Acknowledgement The work presented in this paper is sponsored by Cyber Security R&D Division, Ministry of Electronics and Information Technology (MeitY), Govt. of India. ...
doi:10.17762/ijcnis.v13i2.4955
fatcat:smvwvwibsnbffc5hyb6ivj2giu
An inter-domain authentication scheme for pervasive computing environment
2010
Computers and Mathematics with Applications
In a pervasive computing environment, mobile users often roam into foreign domains. ...
In this paper, a fast and secure inter-domain authentication and key establishment scheme, namely IDAS, is proposed. ...
In this paper, a fast and secure inter-domain authentication and key establishment scheme for pervasive computing environment is proposed -namely IDAS (Inter-Domain Authentication Scheme) -which involves ...
doi:10.1016/j.camwa.2010.01.010
fatcat:k3bmo3f6d5cyneq2xvhvcml3qy
Security in product lifecycle of IoT devices: A survey
2020
Journal of Network and Computer Applications
In that regard, we provide a comprehensive comparison of state-of-the-art surveys in an initial phase which concentrate on distinct parameters required for IoT security. ...
In this context, the contributions of this article are: (a) IoT product lifecycle security, (b) security taxonomy in IoT product lifecycle, (c) security solutions for each lifecycle phase in product lifecycle ...
Acknowledgment The research leading to this publication is supported by the European Union's Horizon 2020 research and innovation program (bIoTope; grant 688203 and FINEST TWINS; grant 856602) and Academy ...
doi:10.1016/j.jnca.2020.102779
fatcat:junhktapajc75px3n2x6j7tzou
Study of Security Issues in Pervasive Environment of Next Generation Internet of Things
[chapter]
2013
Lecture Notes in Computer Science
Therefore need arises for a review of security threats for a new area having huge demand. Here a study of security issues in this domain is briefly presented. ...
This environment is one where the boundary between virtual and physical world is eliminated. As the network gets loaded with hitherto unknown applications, security threats also become rampant. ...
But user privacy preservation and proper access control of health data are growing concern. A contextual patient-centric access policy may be adopted to classify the roles. ...
doi:10.1007/978-3-642-40925-7_20
fatcat:ff2ekqchvvf5xi5ctwk5z24fxe
Study of Security Issues in Pervasive Environment of Next Generation Internet of Things
[article]
2014
arXiv
pre-print
Therefore need arises for a review of security threats for a new area having huge demand. Here a study of security issues in this domain is briefly presented. ...
This environment is one where the boundary between virtual and physical world is eliminated. As the network gets loaded with hitherto unknown applications, security threats also become rampant. ...
But user privacy preservation and proper access control of health data are growing concern. A contextual patient-centric access policy may be adopted to classify the roles. ...
arXiv:1406.4941v1
fatcat:a3oydi4od5cildrsqzkgdriogi
Privacy Concerns Raised by Pervasive User Data Collection From Cyberspace and Their Countermeasures
[article]
2022
arXiv
pre-print
Now it offers advanced services and connected experiences with the developing pervasive computing technologies that digitise, collect, and analyse users' activity data. ...
To complete the perspectives, three complex open problems, namely trajectory privacy, privacy in smart metering, and involuntary privacy leakage with ambient intelligence, are briefly discussed for future ...
control enforcement for wearable equipment
Table 3 : 3 Comparison Among Suitable Lightweight Encryption Schemes Block Ciphers Name Ref. ...
arXiv:2202.04313v1
fatcat:6yz6bt73wzeapadd5el6zrsvli
A Study of Security Vulnerabilities in Mobile environment
2015
The International Journal of Advanced Culture Technology
However, security and privacy issues and risks are introduced by pervasiveness of RFID systems. In RFID systems, communication between tag and reader usually takes place via wireless communication. ...
The computational resources in RFID tag are constrained and it is a big limitation that forces researcher to apply different mitigations compared to common security solutions. ...
ACKNOWLEDGEMENTS This work (Grants No: 1401001175) was supported by Business for Academic-industrial Cooperative establishments funded Korea Small and Medium Business Administration in 2015. ...
doi:10.17703/ijact.2015.3.2.149
fatcat:dbf3vgagajf7va4pdxxbkqy4le
« Previous
Showing results 1 — 15 out of 1,098 results