Internet of Things (IoT): A vision, architectural elements, and future directions
|
|
|
- Osborn Crawford
- 9 years ago
- Views:
Transcription
1 SeoulTech UCS Lab st Internet of Things (IoT): A vision, architectural elements, and future directions Won Min Kang [email protected]
2 Table of contents Open challenges and future directions Architecture Energy efficient sensing Secure reprogrammable networks and privacy Quality of service New protocols Participatory sensing Data mining GIS based visualization Cloud computing International activities 2
3 Open challenges and future directions Open challenges : privacy, participatory sensing, data analytics, GIS based visualization and Cloud computing apart from the standard WSN challenges including architecture, energy efficiency, security, protocols, and Quality of Service. The end goal is to have Plug n Play smart objects and blend with other smart objects 3
4 Architecture Most of the works relating to IoT architecture have been from the wireless sensor networks The user is at the center and will enable the use of data and infrastructure to develop new applications Sometime, An architecture based on cloud computing is changed 4
5 Energy efficient sensing Efficient heterogeneous sensing of the urban environment needs to simultaneously meet competing demands of multiple sensing modalities A generalized framework is required for data collection and modeling that effectively exploits spatial and temporal characteristics of the data Compressive sensing enables reduced signal measurements without impacting accurate reconstruction of the signal 5
6 Secure reprogrammable networks and privacy There can be many ways the system could be attacked disabling the network availability (e.g. DoS, DDoS) pushing erroneous data into the network (injection attacks) accessing personal information(steal information) The three physical components of IoT RFID, WSN and cloud are vulnerable to such attacks RFID (particularly passive) seems to be the most vulnerable as it allows person tracking as well as the objects that can be provided using cryptographic methods Against outsider attackers, encryption ensures data confidentiality, whereas message authentication codes ensure data integrity and authenticity 6
7 Secure reprogrammable networks and privacy But, Encryption, however, does not protect against insider malicious attacks to address which non-cryptographic means are needed in WSNs, new sensor applications need to be installed, or existing ones need to be updated Traditional network reprogramming consists solely of a data dissemination protocol(자료수집 프로토콜) that distributes code to all the nodes in the network without authentication This is security threat But, A secure reprogramming protocol allows the nodes to authenticate every code update and prevent malicious installation. 7
8 Secure reprogrammable networks and privacy Many privacy issues as the data collected in cloud and WSN Digital forgetting(= Right to be Forgotten) could emerge as one of the key areas of research to address the concerns and the development of an appropriate framework to protect personal data Right to be Forgotten is Human right to demand the removal of involved information myself on website and SNS 8
9 New protocols The protocols form the backbone for the data tunnel between sensors and the outer world Efficient MAC protocol and appropriate routing protocol are critical the network must be self-adapting and allow for multipath routing Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs In the case of IoT, the number of hops in the multi-hop scenario will be limited. 9
10 Participatory sensing People centric sensing offers the possibility of low cost sensing of the environment localized to the user It can therefore give the closest indication of environmental parameters experienced by the user It is the opportunity for the user to provide feedback on their experience of a given environmental parameter that offers valuable information in the form of context associated with a given event Smart phones become critical IoT nodes which are connected to the cloud on one end and several sensors at the other end 10
11 Data mining Extracting useful information from a complex sensing environment at different spatial and temporal resolutions is a challenging research problem in artificial intelligence An emerging focus in machine learning research has been the field of deep learning, which aims to learn multiple layers of abstraction that can be used to interpret given data 11
12 GIS based visualization The evolution from CRT to Plasma, LCD, LED, and AMOLED displays has given rise to highly efficient data representation (using touch interface) with the user being able to navigate the data better than ever before With emerging 3D displays, the data that comes out of ubiquitous computing is not always ready for direct consumption using visualization platforms and requires further processing New visualization schemes for the representation of heterogeneous sensors in a 3D landscape that varies temporally have to be developed 12
13 Cloud computing Integrated IoT and Cloud computing applications enabling the creation of smart environments They need to be able operate in both wired and wireless network environments and deal with constraints such as access devices or data sources with limited power and unreliable connectivity. The Cloud resource management and scheduling system should be able to dynamically prioritize requests and provision resources 13
14 International activities In Europe, to consolidate the cross-domain activities of research groups and organizations, spanning M2M, WSN and RFID into a unified IoT framework European Commission 7th Framework program (EU-FP7): to establish a cooperation platform and research vision for IoT activities in Europe and become a contact point for IoT research around the world Internet of Things European Research Cluster (IERC): Internet of Things Architecture (IoT-A) project established to determine an architectural reference model for the interoperability of Internet-of-Things systems and key building blocks to achieve this 14
15 International activities in Japan, Korea, the USA and Australia, smart city initiatives, smart grid programs incorporating smart metering technologies and roll-out of high speed broadband infrastructure A continuing development of RFID related technologies by industry : Auto-ID lab - dedicated to creating the Internet of Things using RFID and Wireless Sensor Networks are being pursued Specifying IoT investment and development to be focused on: smart grid; intelligent transportation; smart logistics; smart home; environment and safety testing; industrial control and automation; 15
16 Summary and conclusions IoT is an ideal emerging technology to influence this domain by providing new evolving data and the required computational resources for creating revolutionary apps we propose a framework - allows networking, computation, storage and visualization themes separate thereby allowing independent growth in every sector but complementing each other in a shared environment 16
17 Reference Jayavardhana Gubbi, Rajkumar Buyya, Slaven Marusic, Marimuthu Palaniswami, Internet of Things (IoT): A vision, architectural elements, and future directions, Future Generation Computer Systems, Vol. 29, pp ,
18 Q & A 18
19 Thank You! 19
A Framework of Smart Internet of Things based Cloud Computing
A Framework of Smart Internet of Things based Cloud Computing Mauricio Alejandro Gomez Morales, Aymen Abdullah Alsaffar, Seung-Jin Lee and Eui-Nam Huh Innovative Cloud and Security (ICNS) Laboratory Dept.
On the features and challenges of security and privacy in distributed internet of things. C. Anurag Varma [email protected] CpE 6510 3/24/2016
On the features and challenges of security and privacy in distributed internet of things C. Anurag Varma [email protected] CpE 6510 3/24/2016 Outline Introduction IoT (Internet of Things) A distributed IoT
Horizontal IoT Application Development using Semantic Web Technologies
Horizontal IoT Application Development using Semantic Web Technologies Soumya Kanti Datta Research Engineer Communication Systems Department Email: [email protected] Roadmap Introduction Challenges
Internet of Things (IoT): A vision, architectural elements, and future directions
Internet of Things (IoT): A vision, architectural elements, and future directions By IOT Group Salah Amean Ahmmed Saeed Authors: Gubbi, Jayavardhana Buyya, RajkumarMarusic, Slaven Palaniswami, Marimuthu
IoT-03-2017 R&I on IoT integration and platforms INTERNET OF THINGS FOCUS AREA
HORIZON 2020 WP 2016-17 IoT-03-2017 R&I on IoT integration and platforms INTERNET OF THINGS DG CONNECT European Commission Internet of Things As enabler of a future hyper-connected society, the Internet
Siemens Future Forum @ HANNOVER MESSE 2014. Internet of Things and Services Guido Stephan
Siemens Future Forum @ HANNOVER MESSE 2014 Internet of Things and Services Siemens AG 2014. All rights reserved. Hannover Messe 2014 From the Internet to a Web of Things thesis Internet Research Networks
Internet of Things: Architecture and Security
Internet of Things: Architecture and Security Mr. Ravi Uttarkar, Prof. Raj Kulkarni, #1 Nagesh Karajagi Orchid College of Engineering and Tecnhonogy,9766144807 #2 Walchand Institute of Technonology,9822002072
A Systems of Systems. The Internet of Things. perspective on. Johan Lukkien. Eindhoven University
A Systems of Systems perspective on The Internet of Things Johan Lukkien Eindhoven University System applications platform In-vehicle network network Local Control Local Control Local Control Reservations,
Smart City Australia
Smart City Australia Slaven Marusic Department of Electrical and Electronic Engineering The University of Melbourne, Australia ARC Research Network on Intelligent Sensors, Sensor Networks and Information
An Information Framework for Creation Smart City through Internet of Things
An Information Framework for Creation Smart City through Internet of Things Karimunnisa Begum 1, Sunanda Dixit 2 M.Tech Student, Department of Information Science and Engineering, Dayananda Sagar College
Index Terms: Internet of Things (IoT), IPv6, IPv4, RFID, Machine to Machine Communication, WSN Network.
Internet of Things (IoT): IPv6 Implementation for Smart Vision of the World Aditya Bhardwaj 1, Pawan Kumar 2, Amit Doegar. 3 Department of Computer Science & Engineering, NITTTR Chandigarh-160019, INDIA.
Performance Evaluation of Large-Scale Wireless Sensor Networks Communication Protocols that can be Integrated in a Smart City
Performance Evaluation of Large-Scale Wireless Sensor Networks Communication Protocols that can be Integrated in a Smart City A. Lavric 1, V. Popa 2 PhD.,Computers, Department of Electronics and Automation,
The 5G Infrastructure Public-Private Partnership
The 5G Infrastructure Public-Private Partnership NetFutures 2015 5G PPP Vision 25/03/2015 19/06/2015 1 5G new service capabilities User experience continuity in challenging situations such as high mobility
Participatory Cloud Computing and the Privacy and Security of Medical Information Applied to A Wireless Smart Board Network
Participatory Cloud Computing and the Privacy and Security of Medical Information Applied to A Wireless Smart Board Network Lutando Ngqakaza [email protected] UCT Department of Computer Science Abstract:
AT&T. ip vpn portfolio. integrated. IP VPN solutions. for the enterprise. Communication Systems International Incorporated
AT&T ip vpn portfolio integrated IP VPN solutions for the enterprise Communication Systems International Incorporated Applications of IP VPN Technology Applications of IP VPN Technology Sales Force Automation
Security for Ad Hoc Networks. Hang Zhao
Security for Ad Hoc Networks Hang Zhao 1 Ad Hoc Networks Ad hoc -- a Latin phrase which means "for this [purpose]". An autonomous system of mobile hosts connected by wireless links, often called Mobile
Service Engineering for the Internet of Things
Software & Services Priorities for WP 2009-10 Workshop, March 4, 2008 Service Engineering for the Internet of Things Mikhail Simonov, [email protected] Service engineering in the IoT and IoS Actual real
INTERNET OF THINGS EUROPE
INTERNET OF THINGS EUROPE www.internet-of-things.eu Internet of Things 2010 Conference 29-1 Nov/Dez 2010, Tokyo Workshop Session: From the INTRAnet of Things to the INTERnet of Things Establishing a common
Internet of Things 2015/2016
Internet of Things 2015/2016 The Things Johan Lukkien John Carpenter, 1982 1 What makes up the IoT? IoT versus WSN What are examples? Guiding questions 2 Some definitions of IoT (march 2015) Whatis.com:
Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen
Mobile Security Wireless Mesh Network Security Sascha Alexander Jopen Overview Introduction Wireless Ad-hoc Networks Wireless Mesh Networks Security in Wireless Networks Attacks on Wireless Mesh Networks
( Increased usage of IP addresses )
IPv6 Applications IPv6: Make Possible Internet of Things More Devices than people Smart phones Smart Tablets Traditional Internet desktops Data-enabled mobile phones Consumer appliances Embedded systems
Overview of the Internet of things
Overview of the Internet of things Tatiana Kurakova, International Telecommunication Union Place des Nations CH-1211 Geneva, Switzerland Abstract. This article provides an overview of the Internet of things
IoT Prospects of Worldwide Development and Current Global Circumstances
IoT Prospects of Worldwide Development and Current Global Circumstances Dr. Bilel Jamoussi Chief Study Groups Department Telecommunication Standardization Bureau, ITU www.itu.int/itu-t/go/iot 1 IoT in
Wireless Sensor Network: Challenges, Issues and Research
ISBN 978-93-84468-20-0 Proceedings of 2015 International Conference on Future Computational Technologies (ICFCT'2015) Singapore, March 29-30, 2015, pp. 224-228 Wireless Sensor Network: Challenges, Issues
Security Infrastructure for Trusted Offloading in Mobile Cloud Computing
Security Infrastructure for Trusted Offloading in Mobile Cloud Computing Professor Kai Hwang University of Southern California Presentation at Huawei Forum, Santa Clara, Nov. 8, 2014 Mobile Cloud Security
IEEE Standards Activities in the Smart Grid Space (ICT Focus)
This document contains supplemental information referenced by the European Rolling Plan for ICT Standardisation IEEE Standards Activities in the Smart Grid Space (ICT Focus) Overview IEEE, through the
How To Understand The Power Of The Internet Of Things
Next Internet Evolution: Getting Big Data insights from the Internet of Things Internet of things are fast becoming broadly accepted in the world of computing and they should be. Advances in Cloud computing,
How can the Future Internet enable Smart Energy?
How can the Future Internet enable Smart Energy? FINSENY overview presentation on achieved results Prepared by the FINSENY PMT April 2013 Outline Motivation and basic requirements FI-PPP approach FINSENY
MAX DOLGICER THE INTERNET OF THINGS NAVIGATING THE FUTURE OF INFORMATION TECHNOLOGY
LA TECHNOLOGY TRANSFER PRESENTS PRESENTA MAX DOLGICER THE INTERNET OF THINGS NAVIGATING THE FUTURE OF INFORMATION TECHNOLOGY DECEMBER 14-15, 2015 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY)
Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257
Wireless Sensor Network Security Seth A. Hellbusch CMPE 257 Wireless Sensor Networks (WSN) 2 The main characteristics of a WSN include: Power consumption constrains for nodes using batteries or energy
RIOT CONTROL The Art of Managing Risk for Internet of Things
RIOT CONTROL The Art of Managing Risk for Internet of Things Kim Singletary McAfee Session ID: Session Classification: Advanced Intro What is IoT and why is it different? What are the risks? What are the
End-to-End Security in Wireless Sensor Networks (WSNs) Talk by Claudio Anliker Supervised by Dr. Corinna Schmitt CSG@IFI, University of Zurich
End-to-End Security in Wireless Sensor (WSNs) Talk by Supervised by Dr. Corinna Schmitt CSG@IFI, University of Zurich Content 1. Motivation 2. Security Issues and Principles 3. Internet-of-Things and Wireless
CHAPTER 1 INTRODUCTION
21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless
An Advanced Performance Architecture for Salesforce Native Applications
An Advanced Performance Architecture for Salesforce Native Applications TABLE OF CONTENTS Introduction............................................... 3 Salesforce in the Digital Transformation Landscape...............
Growth through partnerships and licensing technologies
Growth through partnerships and licensing technologies Standards support Innovation Jens N. Albers, CEO AIM-D board member International Conference on Standardization and Innovation @ CERN, Geneva Overview
Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure
Home Secure digital transformation SMACT Advise, Protect & Monitor Why Capgemini & Sogeti? In safe hands Capgemini & Sogeti Cybersecurity Services Guiding enterprises and government through digital transformation
The Internet of Things... Hype or not?
The Internet of Things... Hype or not? Filip De Maeyer Philip Leenders 2013 global revenues of USD 5.8 billion Client-centric, services-focused business 73% of Global Fortune 100 and 59% of Global Fortune
Current and Future Research into Network Security Prof. Madjid Merabti
Current and Future Research into Network Security Prof. Madjid Merabti School of Computing & Mathematical Sciences Liverpool John Moores University UK Overview Introduction Secure component composition
Workprogramme 2013 objective 1.2. Sandro D Elia. Software & Service Architectures and Infrastructures
Workprogramme 2013 objective 1.2 Sandro D Elia Software & Service Architectures and Infrastructures Target Outcomes Delivering services in an effective, efficient and reliable manner across the future
Principle Elements and Framework of Internet of Things
Research Inventy: International Journal Of Engineering And Science Vol.3, Issue 5(July 2013), PP 24-29 Issn(e): 2278-4721, Issn(p):2319-6483, Www.Researchinventy.Com Principle Elements and Framework of
BYOzzzz: Focusing on the Unsolved Challenges of Mobility, An Industry Perspective
BYOzzzz: Focusing on the Unsolved Challenges of Mobility, An Industry Perspective Kit Colbert CTO, End-User Computing 2014 VMware Inc. All rights reserved. VMware: Addressing the Market From Data Center
Internet of Things Value Proposition for Europe
Internet of Things Value Proposition for Europe European Commission - DG CONNECT Dr Florent Frederix, (Online) Trust and Cybersecurity unit 7 th European Conference on ICT for Transport Logistics 5 th
Vortex White Paper. Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems
Vortex White Paper Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems Version 1.0 February 2015 Andrew Foster, Product Marketing Manager, PrismTech Vortex
Internet of Things. Reply Platform
Internet of Things Reply Platform Internet of Things: Concept Reply vision An ecosystem of connected people, objects and services; enabled by pervasive and transparent technology built to improve our quality
IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper
IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper CAST-2015 provides an opportunity for researchers, academicians, scientists and
The SIA Standards Roadmap describes the strategies for achieving the mission and enhancing stakeholder participation.
Mission Statement The mission of the Security Industry Association (SIA) Standards Committee is to develop and promote the use of technology and application standards for the security industry; provide
MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY
MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY HTTP://SCIENCE.HAMPTONU.EDU/COMPSCI/ The Master of Science in Information Assurance focuses on providing
IoT/M2M standardization activities in ITU T. Yoshinori Goto, NTT ([email protected])
IoT/M2M standardization activities in ITU T Yoshinori Goto, NTT ([email protected]) Background ITU T has a long history of IoT discussion over many years. JCA NID played the coordination role
Connect for new business opportunities
Connect for new business opportunities The world of connected objects How do we monitor the carbon footprint of a vehicle? How can we track and trace cargo on the move? How do we know when a vending machine
Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.
Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control
Internet of Things (IoT): A Vision, Architectural Elements, and Future Directions
Internet of Things (IoT): A Vision, Architectural Elements, and Future Directions Jayavardhana Gubbi, a Rajkumar Buyya, b* Slaven Marusic, a Marimuthu Palaniswami a a Department of Electrical and Electronic
Learning Management Redefined. Acadox Infrastructure & Architecture
Learning Management Redefined Acadox Infrastructure & Architecture w w w. a c a d o x. c o m Outline Overview Application Servers Databases Storage Network Content Delivery Network (CDN) & Caching Queuing
Internet of Things: Consumerisation of Technology. www.avasant.com
: Consumerisation of Technology Technology democratization has weaved an ecosystem powered by intelligent systems, connectivity services, analytics, and technology infrastructure to deliver services. With
This Conference brought to you by www.ttcus.com
This Conference brought to you by www.ttcus.com Linkedin/Group: Technology Training Corporation @Techtrain Technology Training Corporation www.ttcus.com U.S. Army Intelligence and Security Command Army
M2M Communications and Internet of Things for Smart Cities. Soumya Kanti Datta Mobile Communications Dept. Email: Soumya-Kanti.Datta@eurecom.
M2M Communications and Internet of Things for Smart Cities Soumya Kanti Datta Mobile Communications Dept. Email: [email protected] WHAT IS EURECOM A graduate school & research centre in communication
Marko Hännikäinen Tampere University of Technology IoT week 17.6.2013 CLOUD-BASED SERVICE PLATFORM FOR WIRELESS SENSOR NETWORKS
Marko Hännikäinen Tampere University of Technology IoT week 17.6.2013 CLOUD-BASED SERVICE PLATFORM FOR WIRELESS SENSOR NETWORKS Outline The WAPS project Development steps 1. Low-power wireless sensor networks
Introduction Chapter 1. Uses of Computer Networks
Introduction Chapter 1 Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization Metric Units Revised: August 2011 Uses of Computer Networks
Development and Outlook of Internet of Things in China. CATR of MIIT June 5, 2012
Development and Outlook of Internet of Things in China CATR of MIIT June 5, 2012 Contents I. Development of Internet of Things in China Main Contents II. Outlook of Internet of Things in China 2 IoT for
Master of Science in Information Systems & Security Management. Courses Descriptions
Master of Science in Information Systems & Security Management Security Related Courses Courses Descriptions ISSM 530. Information Security. 1 st Semester. Lect. 3, 3 credits. This is an introductory course
Seminar: Security Metrics in Cloud Computing (20-00-0577-se)
Technische Universität Darmstadt Dependable, Embedded Systems and Software Group (DEEDS) Hochschulstr. 10 64289 Darmstadt Seminar: Security Metrics in Cloud Computing (20-00-0577-se) Topics Descriptions
Standard for an Architectural Framework for the Internet of Things IEEE P2413. IEEE GlobeCom Austin, Texas December, 2014
Standard for an Architectural Framework for the Internet of Things IEEE P2413 Chuck Adams Past-President IEEE Standards Association Distinguished Standards Strategist Huawei Technologies IEEE GlobeCom
A Cloud-Assisted Internet of Things Framework for Pervasive Healthcare in Smart City Environment
A Cloud-Assisted Internet of Things Framework for Pervasive Healthcare in Smart City Environment Mohammad Mehedi Hassan, Hanouf Saad Albakr and Hmood Al-Dossari College of Computer and Information Sciences
The Internet of Things (IoT) is one of the most important technological trends of recent years.
Brochure Overview The Internet of Things (IoT) is one of the most important technological trends of recent years. It is the network of billions of intelligent objects and scenarios derived from it in terms
Autonomic computing system for selfmanagement of Machine-to-Machine networks
Self-IoT 2012, September 17th 2012, San Jose, California, USA in conjunction with ICAC 2012 Autonomic computing system for selfmanagement of Machine-to-Machine networks Mahdi BEN ALAYA, Salma MATOUSSI,Thierry
CONDIS. IT Service Management and CMDB
CONDIS IT Service and CMDB 2/17 Table of contents 1. Executive Summary... 3 2. ITIL Overview... 4 2.1 How CONDIS supports ITIL processes... 5 2.1.1 Incident... 5 2.1.2 Problem... 5 2.1.3 Configuration...
Architectural Reference Model (ARM) Presenter: Martin Bauer (NEC Europe)
Architectural Reference Model (ARM) Presenter: Martin Bauer (NEC Europe) Overview Motivation Architectural Reference Model Reference Model Reference Architecture Best Practice / Guidelines Summary and
Short range low power wireless devices and Internet of Things (IoT)
Short range low power wireless devices and Internet of Things (IoT) White paper Author Mats Andersson Senior Director Technology, Product Center Short Range Radio, u-blox Abstract This paper discusses
1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis, [email protected]
Proposed PhD Research Areas I am looking for strong PhD candidates to work on the projects listed below. The ideal candidate would have a mix of theoretical and practical skills, achieved a distinction
Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security
Boeing Defense, Space & Security Ventures Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security Tristan Glenwright - Boeing BOEING is a trademark of Boeing Management Company. The
Security Threats on National Defense ICT based on IoT
, pp.94-98 http://dx.doi.org/10.14257/astl.205.97.16 Security Threats on National Defense ICT based on IoT Jin-Seok Yang 1, Ho-Jae Lee 1, Min-Woo Park 1 and Jung-ho Eom 2 1 Department of Computer Engineering,
Wireless Sensor Networks Chapter 14: Security in WSNs
Wireless Sensor Networks Chapter 14: Security in WSNs António Grilo Courtesy: see reading list Goals of this chapter To give an understanding of the security vulnerabilities of Wireless Sensor Networks
Demystifying Wireless for Real-World Measurement Applications
Proceedings of the IMAC-XXVIII February 1 4, 2010, Jacksonville, Florida USA 2010 Society for Experimental Mechanics Inc. Demystifying Wireless for Real-World Measurement Applications Kurt Veggeberg, Business,
IOT & Applications of Big Data
Slide 1 About 1-Enterprise OneEnterprise Products & Services Private Limited 1-E is a SAP Startup Focus Member, a club of innovators being mentored by SAP, a technology major. High Tech, Automotive, F&B,
Security of smart grid communication protocols
Security of smart grid communication protocols C-DAX is funded by the European Union's Seventh Framework Programme (FP7-ICT-2011-8) under grant agreement n 318708 Erik Poll Radboud University Nijmegen
GOVERNMENT AND THE INTERNET OF THINGS (IOT) FINDINGS AND RECOMMENDATION OF ATARC S INTERNET OF THINGS INNOVATION LAB NOVEMBER, 2015
GOVERNMENT AND THE INTERNET OF THINGS (IOT) FINDINGS AND RECOMMENDATION OF ATARC S INTERNET OF THINGS INNOVATION LAB NOVEMBER, 2015 IoT Innovation Lab Sponsors IoT 101 Defining the Internet s Next Big
Management of Security Information and Events in Future Internet
Management of Security Information and Events in Future Internet Who? Andrew Hutchison 1 Roland Rieke 2 From? 1 T-Systems South Africa 2 Fraunhofer Institute for Secure Information Technology SIT When?
An Implementation of Public Key Infrastructure Using Wireless Communication Networks
, pp.35-42 http://dx.doi.org/10.14257/ijgdc.2015.8.3.04 An Implementation of Public Key Infrastructure Using Wireless Communication Networks Nandhini M 1 and PraveenkumarB 2 1 PG Scholar, Muthayammal Engineering
Enterprise Application Enablement for the Internet of Things
Enterprise Application Enablement for the Internet of Things Prof. Dr. Uwe Kubach VP Internet of Things Platform, P&I Technology, SAP SE Public Internet of Things (IoT) Trends 12 50 bn 40 50 % Devices
PKI: THE SECURITY SOLUTION FOR THE INTERNET OF THINGS
PKI: THE SECURITY SOLUTION FOR THE INTERNET OF THINGS TABLE OF CONTENTS 2 EXECUTIVE SUMMARY 3 THE EMERGENCE OF THE INTERNET OF THINGS 4 SECURITY RISKS IN NETWORKED DEVICES 6 PKI S FOUNDATION OF STRONG
Enabling the SmartGrid through Cloud Computing
Enabling the SmartGrid through Cloud Computing April 2012 Creating Value, Delivering Results 2012 eglobaltech Incorporated. Tech, Inc. All rights reserved. 1 Overall Objective To deliver electricity from
IOT ARCHITECTURE: A SURVEY
IOT ARCHITECTURE: A SURVEY 1 SRINJOY NAG CHOWDHURY, 2 KSHITIJ MANOHAR KUHIKAR, 3 SANIYA DHAWAN 1,2,3 ECE Department, Manipal University, Manipal, Karnataka, India Abstract- The Internet of Things, popularly
IBM QRadar Security Intelligence April 2013
IBM QRadar Security Intelligence April 2013 1 2012 IBM Corporation Today s Challenges 2 Organizations Need an Intelligent View into Their Security Posture 3 What is Security Intelligence? Security Intelligence
An Implementation of Active Data Technology
White Paper by: Mario Morfin, PhD Terri Chu, MEng Stephen Chen, PhD Robby Burko, PhD Riad Hartani, PhD An Implementation of Active Data Technology October 2015 In this paper, we build the rationale for
SECURITY IN THE INTERNET OF THINGS
Lessons from the Past for the Connected Future INNOVATORS START HERE. EXECUTIVE SUMMARY Although it has been with us in some form and under different names for many years, the Internet of Things (IoT)
Short-range Low Power Wireless Devices and Internet of Things (IoT)
Short-range Low Power Wireless Devices and Internet of Things (IoT) Mats Andersson, CTO, connectblue Phone: +46 40 630 71 00 Email: [email protected] Web: www.connectblue.com Version 1.1 February
Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice
Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice Introduction There are numerous statistics published by security vendors, Government
DoS Attack and Its Countermeasure in Energy-Constrained Wireless Networks
DoS Attack and Its Countermeasure in Energy-Constrained Wireless Networks Sunho Lim (Ph.D., Assistant Professor) T 2 WISTOR: TTU Wireless Mobile Networking Laboratory Dept. of Computer Science Texas Tech
addressed. Specifically, a multi-biometric cryptosystem based on the fuzzy commitment scheme, in which a crypto-biometric key is derived from
Preface In the last decade biometrics has emerged as a valuable means to automatically recognize people, on the base is of their either physiological or behavioral characteristics, due to several inherent
Security in Internet of Things using Delegation of Trust to a Provisioning Server
Security in Internet of Things using Delegation of Trust to a Provisioning Server Architecture overview Peter Waher Clayster Laboratorios Chile S.A, Blanco 1623, of. 1402, Valparaíso, Chile [email protected]
1.1.1 Introduction to Cloud Computing
1 CHAPTER 1 INTRODUCTION 1.1 CLOUD COMPUTING 1.1.1 Introduction to Cloud Computing Computing as a service has seen a phenomenal growth in recent years. The primary motivation for this growth has been the
