A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Anonymous Secure Framework in Connected Smart Home Environments
2017
IEEE Transactions on Information Forensics and Security
ANONYMOUS SECURE FRAMEWORK (ASF) This section proposes an anonymous secure framework for connected smart home. ...
This paper therefore defined a set of desirable properties for securing the smart home environments and presented an anonymous secure framework (ASF) for the connected smart homes. ...
doi:10.1109/tifs.2016.2647225
fatcat:uqtsgytqtjeyhbzd5punogv65m
ATLAS: An IoT Architecture and Secure Open-source Networking Stack for Anonymous Localization and Tracking Using Smartphones and Bluetooth Beacons
[article]
2022
arXiv
pre-print
One of the most important sub-domains of Internet-of-Things (IoT) specializes in the usage of BT technologies to develop smart homes and environments, which include hospitals, buildings, shopping facilities ...
Towards this, we propose the ATLAS framework, which is composed of our novel IoT architecture and secure networking stack that can be used to anonymously localize and track smartphones and wearables by ...
homes, building, and environments. ...
arXiv:2212.10289v1
fatcat:oaxw7pf2n5aqtpnf7zv4epag6q
Towards Privacy Preserving IoT Environments: A Survey
2018
Wireless Communications and Mobile Computing
The Internet of Things (IoT) is a network of Internet-enabled devices that can sense, communicate, and react to changes in their environment. ...
IoT promises to enable a plethora of smart services in almost every aspect of our daily interactions and improve the overall quality of life. ...
[72] introduce a privacy preserving framework for smart homes (Sentry@HOME). ...
doi:10.1155/2018/1032761
fatcat:j76yhuc5rjhvbifkk5foq3klzq
Implementation of Secure Smart Butler Control APP System*
2019
IOP Conference Series: Earth and Environment
Since the birth of smart homes, people have a more comfortable, safe and intelligent living environment. ...
Therefore, the smart home APP platform has become an important part of a smart home system. This paper proposes a secure smart butler APP with security monitoring. ...
The authors are grateful to the anonymous reviewers for their insightful comments which have certainly improved this paper. This ...
doi:10.1088/1755-1315/252/4/042102
fatcat:yz2ohoi455fgpdxthnydzt5i2y
Dynamic Context-Aware Scalable and Trust-based IoT Security, Privacy Framework
[chapter]
2022
Internet of Things Applications - From Research and Innovation to Market Deployment
Acknowledgments This work is partially funded by the EU FP7 Projects REliable, Resilient and secUre IoT for sMart city applications (RERUM) grant agreement n°609094, and Internet Connected Objects for ...
Deployment in a Scenario The scenario in which we want to show the deployment of the framework is made of three different smart environments: a smart home, a smart office and a smart vehicle. ...
The third environment, the smart vehicle, can be a car able to connect to all the IoT devices carried by the owner or installed at home and in the office. ...
doi:10.1201/9781003338628-5
fatcat:g6tm3f36x5cvtisb7vzg65dov4
Design and Implementation of Reliable Content Transaction System in Smartphone Environment
2013
International Journal of Smart Home
We examine the security issues of smartphone and smart work environment in terms of describing the threats and problems with respect to privacy information protection. ...
In addition, this anonymous authentication technology between user and service provider also allows possible security threats to be traceable by using traceable anonymous technology. ...
For this, we also conduct a simulation of our security framework to prove its effectiveness in resolving the security problems related to smartphone and smart work environment [7] . ...
doi:10.14257/ijsh.2013.7.6.32
fatcat:prhlv665fzdl7e7eep6w4vt2tq
On Privacy and Security Challenges in Smart Connected Homes
2016
2016 European Intelligence and Security Informatics Conference (EISIC)
In this paper, we present an overview of the privacy and security challenges directed towards the smart home domain. ...
This accessibility alongside with the rising risks of data security and privacy breaches, makes smart home security a critical topic that deserves scrutiny. ...
The authors would also like to thank all the members of the research profile project "Intelligent Support for Privacy Management in Smart Homes". ...
doi:10.1109/eisic.2016.044
dblp:conf/eisic/BugejaJD16
fatcat:yzbdk7zvmbckvfgqc7xmeqtkme
Privacy-Preserving Internet of Things: Techniques and Applications
2019
International Journal of Engineering and Advanced Technology
The techniques like k-anonymity, secure multiparty computation, attribute based encryption and homomorphic encryption are analyzed. ...
In this paper, we present a detailed investigation of the existing approaches to preserve the privacy of data in IoT applications. ...
SECURITY MANDATE IOT APPLICATIONS
A. IoT in Home Automation Smart Homes (SH) are equipped with different types of sensors and RFID to monitor and efficiently use the resources. ...
doi:10.35940/ijeat.f8830.088619
fatcat:onkuoapbkzhdtggza6ib7jj5ka
A Research Trend on Anonymous Signature and Authentication Methods for Privacy Invasion Preventability on Smart Grid and Power Plant Environments
2022
Energies
Smart grid security requires the development of encrypted anonymous authentication that is applicable to power plant security, including nuclear power plants as well as expandable test beds. ...
In the environment, smart devices can be media in the exposure of various and specific pieces of information as well as energy consumption. ...
A smart meter is directly connected to home appliances and smart devices, offering various additional functions including the control of connected devices [37] . ...
doi:10.3390/en15124363
fatcat:urrqt2lixzd4lnghmgt77kuo4m
Cybersecurity and Cyber Forensics for Smart Cities: A Comprehensive Literature Review and Survey
2023
Sensors
We identified four major areas and eleven sub-areas for smart cities. We found that smart homes and the IoT were the most active research areas within the cybersecurity field. ...
Due to the transmission of large-scale data through IoT devices in smart cities, ML and DL are expected to continue playing critical roles in smart city research. ...
[79] presented a framework to address this issue by using blockchain technology to ensure the integrity of smart home devices and block malicious IPs from accessing smart home environments. ...
doi:10.3390/s23073681
fatcat:utlyztdof5elxalltqx7fmroua
Secure Supervised Learning-Based Smart Home Authentication Framework
[article]
2024
arXiv
pre-print
In this paper, Secure Supervised Learning-based Smart Home Authentication Framework (SSL-SHAF) is proposed as are liable mutual authentication that can be contextually imposed for better security. ...
A secure authentication protocol needs to be established between the smart devices and the user, such that a situation for device authentication can be made feasible in smart home environments. ...
RELATED WORK A secure smart home mutual authentication framework using multi-factor was proposed for utilizing transitory identities towards better security provision in smart home environments [11] . ...
arXiv:2402.00568v1
fatcat:65jdmi6ttrbelnffnm5e6s25k4
Internet of Things (IoT) of Smart Home: Privacy and Security
2019
International Journal of Computer Applications
The smart home is an environment, where heterogeneous electronic devices and appliances are networked together to provide smart services in a ubiquitous manner to the individuals. organization and people ...
Since among smart homes, sensitive and personal data are managed, security and privacy solutions should be put in place, to protect users/businesses' data against violation try still on guarantee the supply ...
All smart home devices are connected to the internet in a smart home environment. ...
doi:10.5120/ijca2019918450
fatcat:gbaya6pfejeibh3bqxn57z4j4y
Towards a model of privacy and security for smart homes
2015
2015 IEEE 2nd World Forum on Internet of Things (WF-IoT)
As such, it is envisioned as support for enforcing system security and enhancing user privacy, and it can thus help to further realize the potential in smart home environments. ...
The domain of smart home environments is viewed as a key element of the future Internet, and many homes are becoming "smarter" by using Internet of Things (IoT) technology to improve home security, energy ...
The authors would also like to thank all the members of the research profile project "Intelligent Support for Privacy Management in Smart Homes". ...
doi:10.1109/wf-iot.2015.7389144
dblp:conf/wf-iot/JacobssonD15
fatcat:rm2yjvmepne6zcgbd7shzoupbm
Smart Quarantine Environment Privacy through IoT Gadgets Using Blockchain
2023
Intelligent Automation and Soft Computing
Thousands of sensors were connected to IoT (Internet of Things) devices to monitor the catastrophic eruption with billions of connected devices that use these novel tools and apps, privacy and security ...
In this study, we suggest a blockchain-based methodology for safeguarding data in the billions of devices and sensors connected over the internet. ...
Architecture Proposal In Fig. 2 , the home is outfitted with smart devices for example security system, smart magnetic doors, and infrared sensors which will connect through the outside world internet ...
doi:10.32604/iasc.2023.029053
fatcat:m6up4oi6kbc4hh47qy7yfcsbyq
Lightweight And Seamless Distributed Scheme For The Smart Home
2018
Zenodo
Security of the smart home in terms of behavior activity pattern recognition is a totally dissimilar and unique issue as compared to the security issues of other scenarios. ...
In this scenario, a group of common instruction processes may get involved to generate deadlock. Therefore, an effective suitable security solution is required for smart home architecture. ...
The authors of [11] proposed an anonymous secure framework (ASF), and they also covered the anonymity, unlinkbility, and authentication and integrity of devices in the smart home. ...
doi:10.5281/zenodo.1316807
fatcat:ulmxoiku6beltj2qrsjr5j7aqu
« Previous
Showing results 1 — 15 out of 23,567 results