Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








23,567 Hits in 5.2 sec

Anonymous Secure Framework in Connected Smart Home Environments

Pardeep Kumar, An Braeken, Andrei Gurtov, Jari Iinatti, Phuong Hoai Ha
2017 IEEE Transactions on Information Forensics and Security  
ANONYMOUS SECURE FRAMEWORK (ASF) This section proposes an anonymous secure framework for connected smart home.  ...  This paper therefore defined a set of desirable properties for securing the smart home environments and presented an anonymous secure framework (ASF) for the connected smart homes.  ... 
doi:10.1109/tifs.2016.2647225 fatcat:uqtsgytqtjeyhbzd5punogv65m

ATLAS: An IoT Architecture and Secure Open-source Networking Stack for Anonymous Localization and Tracking Using Smartphones and Bluetooth Beacons [article]

Bharath Srinivas Prabakaran, Felix Fasching, Juri Schreib, Andreas Steininger, Muhammad Shafique
2022 arXiv   pre-print
One of the most important sub-domains of Internet-of-Things (IoT) specializes in the usage of BT technologies to develop smart homes and environments, which include hospitals, buildings, shopping facilities  ...  Towards this, we propose the ATLAS framework, which is composed of our novel IoT architecture and secure networking stack that can be used to anonymously localize and track smartphones and wearables by  ...  homes, building, and environments.  ... 
arXiv:2212.10289v1 fatcat:oaxw7pf2n5aqtpnf7zv4epag6q

Towards Privacy Preserving IoT Environments: A Survey

Mohamed Seliem, Khalid Elgazzar, Kasem Khalil
2018 Wireless Communications and Mobile Computing  
The Internet of Things (IoT) is a network of Internet-enabled devices that can sense, communicate, and react to changes in their environment.  ...  IoT promises to enable a plethora of smart services in almost every aspect of our daily interactions and improve the overall quality of life.  ...  [72] introduce a privacy preserving framework for smart homes (Sentry@HOME).  ... 
doi:10.1155/2018/1032761 fatcat:j76yhuc5rjhvbifkk5foq3klzq

Implementation of Secure Smart Butler Control APP System*

Jianrong Zhang, Xiaomin Li, Yiming Shi, Sining Pan, Hongwei Zhao
2019 IOP Conference Series: Earth and Environment  
Since the birth of smart homes, people have a more comfortable, safe and intelligent living environment.  ...  Therefore, the smart home APP platform has become an important part of a smart home system. This paper proposes a secure smart butler APP with security monitoring.  ...  The authors are grateful to the anonymous reviewers for their insightful comments which have certainly improved this paper. This  ... 
doi:10.1088/1755-1315/252/4/042102 fatcat:yz2ohoi455fgpdxthnydzt5i2y

Dynamic Context-Aware Scalable and Trust-based IoT Security, Privacy Framework [chapter]

Ricardo Neisse, Gary Steri, Gianmarco Baldini, Elias Tragos, Igor Nai Fovino, Maarten Botterman
2022 Internet of Things Applications - From Research and Innovation to Market Deployment  
Acknowledgments This work is partially funded by the EU FP7 Projects REliable, Resilient and secUre IoT for sMart city applications (RERUM) grant agreement n°609094, and Internet Connected Objects for  ...  Deployment in a Scenario The scenario in which we want to show the deployment of the framework is made of three different smart environments: a smart home, a smart office and a smart vehicle.  ...  The third environment, the smart vehicle, can be a car able to connect to all the IoT devices carried by the owner or installed at home and in the office.  ... 
doi:10.1201/9781003338628-5 fatcat:g6tm3f36x5cvtisb7vzg65dov4

Design and Implementation of Reliable Content Transaction System in Smartphone Environment

Seng-Phil Hong, Sungmin Kang, Jaejung Kim
2013 International Journal of Smart Home  
We examine the security issues of smartphone and smart work environment in terms of describing the threats and problems with respect to privacy information protection.  ...  In addition, this anonymous authentication technology between user and service provider also allows possible security threats to be traceable by using traceable anonymous technology.  ...  For this, we also conduct a simulation of our security framework to prove its effectiveness in resolving the security problems related to smartphone and smart work environment [7] .  ... 
doi:10.14257/ijsh.2013.7.6.32 fatcat:prhlv665fzdl7e7eep6w4vt2tq

On Privacy and Security Challenges in Smart Connected Homes

Joseph Bugeja, Andreas Jacobsson, Paul Davidsson
2016 2016 European Intelligence and Security Informatics Conference (EISIC)  
In this paper, we present an overview of the privacy and security challenges directed towards the smart home domain.  ...  This accessibility alongside with the rising risks of data security and privacy breaches, makes smart home security a critical topic that deserves scrutiny.  ...  The authors would also like to thank all the members of the research profile project "Intelligent Support for Privacy Management in Smart Homes".  ... 
doi:10.1109/eisic.2016.044 dblp:conf/eisic/BugejaJD16 fatcat:yzbdk7zvmbckvfgqc7xmeqtkme

Privacy-Preserving Internet of Things: Techniques and Applications

2019 International Journal of Engineering and Advanced Technology  
The techniques like k-anonymity, secure multiparty computation, attribute based encryption and homomorphic encryption are analyzed.  ...  In this paper, we present a detailed investigation of the existing approaches to preserve the privacy of data in IoT applications.  ...  SECURITY MANDATE IOT APPLICATIONS A. IoT in Home Automation Smart Homes (SH) are equipped with different types of sensors and RFID to monitor and efficiently use the resources.  ... 
doi:10.35940/ijeat.f8830.088619 fatcat:onkuoapbkzhdtggza6ib7jj5ka

A Research Trend on Anonymous Signature and Authentication Methods for Privacy Invasion Preventability on Smart Grid and Power Plant Environments

Seung-Mo Je, Hanchul Woo, Jaehyeon Choi, Se-Hoon Jung, Jun-Ho Huh
2022 Energies  
Smart grid security requires the development of encrypted anonymous authentication that is applicable to power plant security, including nuclear power plants as well as expandable test beds.  ...  In the environment, smart devices can be media in the exposure of various and specific pieces of information as well as energy consumption.  ...  A smart meter is directly connected to home appliances and smart devices, offering various additional functions including the control of connected devices [37] .  ... 
doi:10.3390/en15124363 fatcat:urrqt2lixzd4lnghmgt77kuo4m

Cybersecurity and Cyber Forensics for Smart Cities: A Comprehensive Literature Review and Survey

Kyounggon Kim, Istabraq Mohammed Alshenaifi, Sundaresan Ramachandran, Jisu Kim, Tanveer Zia, Abdulrazaq Almorjan
2023 Sensors  
We identified four major areas and eleven sub-areas for smart cities. We found that smart homes and the IoT were the most active research areas within the cybersecurity field.  ...  Due to the transmission of large-scale data through IoT devices in smart cities, ML and DL are expected to continue playing critical roles in smart city research.  ...  [79] presented a framework to address this issue by using blockchain technology to ensure the integrity of smart home devices and block malicious IPs from accessing smart home environments.  ... 
doi:10.3390/s23073681 fatcat:utlyztdof5elxalltqx7fmroua

Secure Supervised Learning-Based Smart Home Authentication Framework [article]

K. Swapna Sudha, N. Jeyanthi, Celestine Iwendi
2024 arXiv   pre-print
In this paper, Secure Supervised Learning-based Smart Home Authentication Framework (SSL-SHAF) is proposed as are liable mutual authentication that can be contextually imposed for better security.  ...  A secure authentication protocol needs to be established between the smart devices and the user, such that a situation for device authentication can be made feasible in smart home environments.  ...  RELATED WORK A secure smart home mutual authentication framework using multi-factor was proposed for utilizing transitory identities towards better security provision in smart home environments [11] .  ... 
arXiv:2402.00568v1 fatcat:65jdmi6ttrbelnffnm5e6s25k4

Internet of Things (IoT) of Smart Home: Privacy and Security

Zaied Shouran, Ahmad Ashari, Tri Kuntoro
2019 International Journal of Computer Applications  
The smart home is an environment, where heterogeneous electronic devices and appliances are networked together to provide smart services in a ubiquitous manner to the individuals. organization and people  ...  Since among smart homes, sensitive and personal data are managed, security and privacy solutions should be put in place, to protect users/businesses' data against violation try still on guarantee the supply  ...  All smart home devices are connected to the internet in a smart home environment.  ... 
doi:10.5120/ijca2019918450 fatcat:gbaya6pfejeibh3bqxn57z4j4y

Towards a model of privacy and security for smart homes

Andreas Jacobsson, Paul Davidsson
2015 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT)  
As such, it is envisioned as support for enforcing system security and enhancing user privacy, and it can thus help to further realize the potential in smart home environments.  ...  The domain of smart home environments is viewed as a key element of the future Internet, and many homes are becoming "smarter" by using Internet of Things (IoT) technology to improve home security, energy  ...  The authors would also like to thank all the members of the research profile project "Intelligent Support for Privacy Management in Smart Homes".  ... 
doi:10.1109/wf-iot.2015.7389144 dblp:conf/wf-iot/JacobssonD15 fatcat:rm2yjvmepne6zcgbd7shzoupbm

Smart Quarantine Environment Privacy through IoT Gadgets Using Blockchain

Nitish Pathak, Shams Tabrez Siddiqui, Anjani Kumar Singha, Heba G Mohamed, Shabana Urooj, Abhinandan R Patil
2023 Intelligent Automation and Soft Computing  
Thousands of sensors were connected to IoT (Internet of Things) devices to monitor the catastrophic eruption with billions of connected devices that use these novel tools and apps, privacy and security  ...  In this study, we suggest a blockchain-based methodology for safeguarding data in the billions of devices and sensors connected over the internet.  ...  Architecture Proposal In Fig. 2 , the home is outfitted with smart devices for example security system, smart magnetic doors, and infrared sensors which will connect through the outside world internet  ... 
doi:10.32604/iasc.2023.029053 fatcat:m6up4oi6kbc4hh47qy7yfcsbyq

Lightweight And Seamless Distributed Scheme For The Smart Home

Muhammad Mehran Arshad Khan, Chengliang Wang, Zou Minhui, Danyal Badar Soomro
2018 Zenodo  
Security of the smart home in terms of behavior activity pattern recognition is a totally dissimilar and unique issue as compared to the security issues of other scenarios.  ...  In this scenario, a group of common instruction processes may get involved to generate deadlock. Therefore, an effective suitable security solution is required for smart home architecture.  ...  The authors of [11] proposed an anonymous secure framework (ASF), and they also covered the anonymity, unlinkbility, and authentication and integrity of devices in the smart home.  ... 
doi:10.5281/zenodo.1316807 fatcat:ulmxoiku6beltj2qrsjr5j7aqu
« Previous Showing results 1 — 15 out of 23,567 results