The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Many of the industries such as manufacturing, F&B, transportation have recently shown a growing interest in Industry Internet of things (IIoT) to gain competitive advantage. The IIoT is technology stack of combining internet of things, machines, computers and people enabling intelligent business transformational through advanced big data analytics. With the growing complexity of IIoT in a large-scale...
Research into the security of the Internet of things is increasingly attracting the attention of the scientific community. This study examines three key security requirements, with an emphasis on Internet systems of things: authentication, privacy and access control. Attention is focused on security issues that have not been resolved to date, and also addresses the problems and future trends in the...
With the advent of smart devices and lowering prices of sensing devices, adoption of Internet of Things (IoT) is gaining momentum. These IoT devices come with greater threat of being attacked or compromised that could lead to Denial of Service (DoS) and Distributed Denial of Service (DDoS). The high volume of IoT devices with high level of heterogeneity, magnify the possibility of security threats...
In this paper, we review the main middleware re-quirements applied to Internet of Things and High-Performance Computing combined, here called IoT/HPC. The goal was to describe a unique set of requirements that middleware systems should attempt to guarantee the development of integrated applications. Among many core complex services, the IoT/HPC challenges are related to the support of sensing, actuating,...
The Internet of things (IoT) is the natural evolution of the current Internet. As such, IoT systems do not just handle critical information as passwords, identities, personal information, routines, etc., but they also are able to control a whole variety of systems, for instance a robotic network in the automotive industry, autonomous cars networks, human health care and many systems in other domains...
The trend towards the digitalization of our homes is motivated by the development of hardware and software platforms that have been researched in recent years. As in the Internet of Things, building a single, global platform that enables communication with a myriad of devices for home automation is virtually impossible. The platform proposed in this work deals, in isolation, with the problems in each...
Innovations in technology that have enabled efficient wireless tiny devices propelled the concept of Internet of Things. It is expected that mobile data traffic will experience 8-fold growth between 2015 and 2020 and the number of mobile connected devices will reach 11.6 billion by 2020. Main factors of this exponential growth and wide acceptance are the integration of several technologies and communications...
The revolutionary network that totally changed how the humankind life, the Internet, is now evolving into the Internet of things; which is being achieved by fetching the network connectivity to legacy industrial or commercial devices, as well as everyday objects. This connectivity may be an Internet connection, where the Internet protocol and related technologies are in use. But, there are also many...
Internet of Things (IoT) is slowly but steadily becoming part of different aspects of our lives, with its applications ranging from smart homes, to wearable devices, to healthcare, etc. This wide spectrum of applications results in shared data containing large amount of users' private information. The security of such information becomes a paramount concern. The IoT security requirements include data...
All over the world, objects are increasingly connected in networks such as the Industrial Internet of Things. Interconnections, intercommunications and interactions are driving the development of an entirely new whole in the form of the Industrial Internet of Things. Communication and interaction are the norm both for separate components, such as cyber-physical systems, and for the functioning of...
Security/Safety is managed, mostly, by means of integrated systems which have to consider, more and more, sensors, devices, cameras, mobile terminals, wearable devices, etc. that use wireless networks, to ensure protection of people and/or tangible/intangible assets from voluntary attacks, allowing also the safe management of the related consequent emergency situations that can derive from the above...
During the development and expansion of Internet of Things (IoT), main challenges needing to be addressed are the heterogeneity, interoperability, scalability, flexibility and security of IoT applications. In this paper, we view IoT as a large-scale distributed cyber-physical-social complex network. From that perspective, the above challenges are analyzed. Then, we propose a distributed multi-agent...
The Papal Basilica and the Sacred Convent of St. Francis in Assisi, Italy together represent a unique and specific cultural heritage site where the mortal remains of St. Francis have been housed since 1230 AD. Millions of pilgrims and visitors from all over the world visit this site each year. In 2000 AD, together with other Franciscan sites in the surrounding area, it achieved UNESCO World Heritage...
With the spread of the Internet of Things (IoT) technologies, IoT devices such as sensors, appliances, or robots realize various Cyber-Physical Systems (CPSs) including remote monitoring, health care and home security in various environments. To realize advanced CPS which can adapt its behavior autonomously according to changes in the environment and user's demand, this paper proposes a MultiAgent-based...
The Internet of Things (IoT) will connect not only computers and mobile devices, but it will also interconnect smart buildings, houses, and cities, as well as electrical grids, gas plants, and water networks, automobiles, airplanes, etc. IoT will lead to the development of a wide range of advanced information services that are pervasive, cost-effective, and can be accessed from anywhere and at any...
Framing Internet of Things (IoT) applications as a System of Systems (SoS) can help us make sense of complexity associated with interoperability and emergence. However, assessing the risk of SoSs is a challenge due to the independence of component systems, and their differing degrees of control and emergence. This paper presents three components for SoS risk assessment that integrate with existing...
The integration of resource constrained devices as front nodes in IoT networks is one of the major factors preventing the adoption proven security best practices and techniques. For example, certificate based authentication is still a forlorn quest for ZigBee designers and developers. Although, the capabilities of these devices may improve over time, there is no indication this will happen soon. This...
Conflicts between non-functional requirements (NFRs) mean that achieving one requirement can impact another one. This can happen if a particular procedure (called "operationalizing softgoal" in the literature) favors the first characteristic but creates difficulty for the second one. Currently, the conflict identification uses catalogs to indicate conflicting NFRs. They focus on NFRs that...
In the field of health, networked medical devices are closely intertwined in the structure of the Internet of things. A healthcare IoT infrastructure with a brief description of each component is presented. These components are a device with a reader, Cloud, healthcare provider and communication channel. As the title implies the paper presents simple cases with a few models of healthcare IoT system...
In the next future, IoT systems will be “ubiquitous” and “pervasive”, bringing several benefits to mankind and also many issues about interoperability, security and privacy. The intrinsic vulnerabilities of IoT devices, with limited resources and heterogeneous technologies, together with the lack of specifically designed IoT standards, represent a fertile ground for the expansion of specific cyber...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.