2017 IEEE 26th International Symposium on Industrial Electronics (ISIE) 2017
DOI: 10.1109/isie.2017.8001447
|View full text |Cite
|
Sign up to set email alerts
|

Architecture for security monitoring in IoT environments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
10
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 31 publications
(13 citation statements)
references
References 14 publications
0
10
0
Order By: Relevance
“…Connected things produce large volumes of data, which need to be securely transmitted and protected from cyber-criminals. The cyber-criminals can get the access to the "brain" of the whole IoT system and take control of it [17]. To stop such issue, it makes sense to log and analyze the commands sent by control applications to things, monitor the actions of users and store all these data in the cloud and it's possible to cognize the patterns of suspicious behavior, store these samples and compare them with the logs generated by an IoT systems to stop potential penetrations and reduce their influence on an IoT system.…”
Section: 8security Monitoringmentioning
confidence: 99%
See 1 more Smart Citation
“…Connected things produce large volumes of data, which need to be securely transmitted and protected from cyber-criminals. The cyber-criminals can get the access to the "brain" of the whole IoT system and take control of it [17]. To stop such issue, it makes sense to log and analyze the commands sent by control applications to things, monitor the actions of users and store all these data in the cloud and it's possible to cognize the patterns of suspicious behavior, store these samples and compare them with the logs generated by an IoT systems to stop potential penetrations and reduce their influence on an IoT system.…”
Section: 8security Monitoringmentioning
confidence: 99%
“…It is answerable only for allocation of resources to executing applications. The scheduling in [17] Yarn is a pluggable framework to allocate cluster resources in a lot of the user environment. Be conditional on the use case and user requirement, administrators may prefer either a simple FIFO scheduler, capacity scheduler, or fair scheduler [16].…”
Section: Applications Of Internet Of Things (Iot)mentioning
confidence: 99%
“…IoT is a technology in the sector of telecommunications [3]. It describes the networking and communication between physical and virtual objects [4].…”
Section: Introductionmentioning
confidence: 99%
“…Eventually, in case of an infringement, according to Art. 64 (3), any infringement of a European patent shall be dealt with by national law in each Contracting State in respect of which the patent is granted.…”
Section: Introductionmentioning
confidence: 99%
“…Furthermore, the adaptive fusion strategy involves selecting the best candidate tampering probability individually for each location in the image. Additionally, the experimental results prove that the proposed scheme can achieve much better detection results and robustness compared with the existing state-of-the-art PRNUbased methods.Today's advanced media technology, such as digital image processing, video coding [38], highefficiency video coding (HEVC) [24,35], Internet of Things (IoT) [36,45], and cloud computing (CC) [39], represents a fascinating time that will considerably affect daily life. In particular, digital images are being used in many applications such as the military, medical diagnosis, art pieces, and photography.…”
mentioning
confidence: 99%