Searched for: +
(1 - 20 of 37)

Pages

document
Narayana, S. (author)
The Internet of Things (IoT), a recent technology that has enabled many innovative applications, has dominated the world by creating smart systems and applications. It is predicted that the number of connected gadgets in IoT will double by 2030 compared to 2020. Thus, it is essential to address the key challenges, such as scalability, ubiquitous...
doctoral thesis 2023
document
Shao, Deo (author), Ishengoma, Fredrick R. (author), Alexopoulos, Charalampos (author), Saxena, Stuti (author), Nikiforova, Anastasija (author), Matheus, R. (author)
Purpose: The purpose of this paper is to highlight the drivers, barriers, benefits and risks affecting the integration of Internet of Things (IoT) into the e-government and to provide a future research agenda. Design/methodology/approach: Existing literature examining the relationships between e-government and IoT is scanned and evaluated by...
journal article 2023
document
Giovanardi, Matteo (author), Konstantinou, T. (author), Pollo, Riccardo (author), Klein, T. (author)
In the façade sector, the ecological and circular transition requires the adoption of new business models that exploit the value of the material as much as possible. In this context, the Internet of Things (IoT) is identified as a potential innovation driver for the widespread use of circular approaches. The aim of the paper is to clarify the...
journal article 2023
document
Giovanardi, M. (author), Konstantinou, T. (author), Pollo, Riccardo (author), Klein, T. (author)
Traceability is considered a crucial requirement to enable Circular Economy (CE). Product and process life-cycle data can facilitate circular asset management preserving the asset's value over time and reducing resource consumption. Many scholars point out how the loss of traceability data, lacking information reliability, and unstructured...
journal article 2023
document
Saidi, Said Jawad (author), Gasser, Oliver (author), Smaragdakis, G. (author)
IPv6 is being more and more adopted, in part to facilitate the millions of smart devices that have already been installed at home. Unfortunately, we find that the privacy of a substantial fraction of end-users is still at risk, despite the efforts by ISPs and electronic vendors to improve end-user security, e.g., by adopting prefix rotation...
journal article 2022
document
Mhaisen, N. (author), Allahham, Mhd Saria (author), Mohamed, Amr (author), Erbad, Aiman (author), Guizani, Mohsen (author)
Service provisioning systems assign users to service providers according to allocation criteria that strike an optimal trade-off between users' Quality of Experience (QoE) and the operation cost endured by providers. These systems have been leveraging Smart Contracts (SCs) to add trust and transparency to their criteria. However, deploying...
journal article 2022
document
Kumar, Gulshan (author), Saha, Rahul (author), Conti, M. (author), Thomas, Reji (author), Devgun, Tannishtha (author), Rodrigues, Joel J.P.C. (author)
Internet-of-Thing (IoT) faces various security attacks. Different solutions exist to mitigate the intrusion problems. However, the existing solutions lack behind in dealing with heterogeneity of attack sources and features. The future anticipated demand of devices' connections also urge the need of new solutions addressing the concerns of...
journal article 2022
document
Köylü, T.C. (author), Caetano Garaffa, L. (author), Reinbrecht, Cezar (author), Zahedi, M.Z. (author), Hamdioui, S. (author), Taouil, M. (author)
The massive deployment of Internet of Things (IoT) devices makes them vulnerable against physical tampering attacks, such as fault injection. These kind of hardware attacks are very popular as they typically do not require complex equipment or high expertise. Hence, it is important that IoT devices are protected against them. In this work, we...
conference paper 2022
document
Shariq, Mohd (author), Singh, Karan (author), Lal, C. (author), Conti, M. (author), Khan, Tayyab (author)
Internet of Things (IoT) technologies rapidly evolve and are used in many real-life applications. One of the core technologies used in various IoT applications is Radio Frequency IDentification (RFID) technology. RFID wirelessly and uniquely identifies the tagged objects without a direct line of sight. However, the research community had...
journal article 2022
document
Michailidis, Panagiotis (author), Pelitaris, Paschalis (author), Korkas, Christos (author), Michailidis, Iakovos (author), Baldi, S. (author), Kosmatopoulos, Elias (author)
The existing literature on energy saving focuses on large-scale buildings, wherein the energy-saving potential is substantially larger than smaller-scale buildings. However, the research intensity is significantly less for small-scale deployments and their capacities to regulate energy use individually, directly and without depreciating users’...
journal article 2021
document
Mondal, Md Ashifuddin (author), Rehena, Zeenat (author), Janssen, M.F.W.H.A. (author)
Smart parking is becoming more and more an integral part of smart city initiatives. Utilizing and managing parking areas is a challenging task as space is often limited, finding empty spaces are hard and citizens want to park their vehicles close to their preferred places. This becomes worse in important/posh areas of major metropolitan cities...
journal article 2021
document
Amiri Ara, Rashid (author), Paardenkooper, Klara (author), van Duin, Ron (author)
Purpose: This paper aims to propose a new blockchain system design to improve engineering, procurement and construction (EPC) companies’ supply chain for constructing oil and gas infrastructure, by mitigating cost and time inefficiencies. Design/methodology/approach: A case study analyses the supply chain of a sample EPC company. First, a...
journal article 2021
document
Ho-Sam-Sooi, Nick (author), Pieters, W. (author), Kroesen, M. (author)
Given the significant privacy and security risks of Internet-of-Things (IoT) devices, it seems desirable to nudge consumers towards buying more secure devices and taking privacy into account in the purchase decision. In order to support this goal, this study examines the effect of security and privacy on IoT device purchase behaviour and...
journal article 2021
document
Liyanage, Madhusanka (author), Porambage, Pawani (author), Ding, Aaron Yi (author), Kalla, Anshuman (author)
The emergence of Multi-Access Edge Computing (MEC) technology aims to extend cloud computing capabilities to the edge of the wireless access networks, i.e., closer to the end-users. Thus, MEC-enabled 5G wireless systems are envisaged to offer real-time, low-latency, and high-bandwidth access to the radio network resources. Thus, MEC allows...
journal article 2021
document
Noroozian, A. (author), Turcios Rodriguez, E.R. (author), Lastdrager, Elmer (author), Kasama, Takahiro (author), van Eeten, M.J.G. (author), Hernandez Ganan, C. (author)
For the mitigation of compromised Internet of Things (IoT) devices we rely on Internet Service Providers (ISPs) and their users. Given that devices are in the hands of their subscribers, what can ISPs realistically do? This study examines the effects of ISP countermeasures on infections caused by variants of the notorious Mirai family of IoT...
conference paper 2021
document
Kumar, Gulshan (author), Saha, Rahul (author), Lal, C. (author), Conti, M. (author)
Digital forensic in Internet-of-Thing (IoT) paradigm is critical due to its heterogeneity and lack of transparency of evidence processing. Moreover, cross-border legalization makes a hindrance in such process pertaining to the cloud forensic issues. This urges a forensic framework for IoT which provides distributed computing, decentralization...
journal article 2021
document
Köylü, T.C. (author), Okkerman, Hans (author), Reinbrecht, Cezar (author), Hamdioui, S. (author), Taouil, M. (author)
Internet of things (IoT) devices are appearing in all aspects of our digital life. As such, they have become prime targets for attackers and hackers. An adequate protection against attacks is only possible when the confidentiality and integrity of the data and applications of these devices are secured. State-of-the-art solutions mostly address...
conference paper 2021
document
Ding, Aaron Yi (author), Janssen, M.F.W.H.A. (author), Crowcroft, Jon (author)
As a fast evolving domain that merges edge computing, data analytics and AI/ML, commonly referred as Edge AI, the community of Edge AI is establishing and gradually finds its way to connect with mainstream research communities of distributed systems, IoT, and embedded machine learning. Meanwhile, despite of its well-claimed potential to...
conference paper 2021
document
Feng, Y. (author), Duives, D.C. (author), Daamen, W. (author), Hoogendoorn, S.P. (author)
Collecting pedestrian behaviour data is vital to understand pedestrian behaviour. This systematic review of 145 studies aims to determine the capability of contemporary data collection methods in collecting different pedestrian behavioural data, identify research gaps and discuss the possibilities of using new technologies to study pedestrian...
review 2021
document
Shiferaw, Yonatan (author), Arora, Apoorva (author), Kuipers, F.A. (author)
LoRaWAN has emerged as a popular IoT commu- nications technology. It comes with three classes of operation: A, B, and C. Although many IoT use-cases, like Firmware-over- the-Air updates, require multicast, Class A cannot be used for that purpose. Class C can, but consumes a lot of energy. This leaves Class B. In this paper, we investigate Class...
conference paper 2020
Searched for: +
(1 - 20 of 37)

Pages