2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA) 2018
DOI: 10.1109/aina.2018.00104
|View full text |Cite
|
Sign up to set email alerts
|

Improving Security on IoT Applications Based on the FIWARE Platform

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 10 publications
0
5
0
Order By: Relevance
“…7. As this is crossvalidation, for each K, we obtained average accuracies for ten (10) different executions, and according to Fig. 7 with K = 4, we obtained the best accuracy of the model, with an average of 0.895.…”
Section: ) Datasetmentioning
confidence: 97%
See 2 more Smart Citations
“…7. As this is crossvalidation, for each K, we obtained average accuracies for ten (10) different executions, and according to Fig. 7 with K = 4, we obtained the best accuracy of the model, with an average of 0.895.…”
Section: ) Datasetmentioning
confidence: 97%
“…These resources are currently available on specialized and independent experimental networks, and SFI2 groups them in a structured way. At this point, it is important to remark that the SFI2 deployment focus is the set of experimental networks currently available in Brazil: FIBRE-NG [7], CloudNEXT [9], FUTEBOL [8], FIWARE [10], 5GINFIRE [11], and NECOS [12].…”
Section: The Sfi2 Network Slicing Architecturementioning
confidence: 99%
See 1 more Smart Citation
“…Furthermore, the TLS/DTLS handshake to establish secure communications and encrypting data transmission consumes several resources that are not supported in most of the constrained devices. Some works aim to solve this issue by using a gateway for delegating the initial handshake [41,42] or for performing a unique handshake and maintain the secured socket open [43]. The latter is feasible if deployed on trusted networks or if lightweight and secure encryption are implemented between devices and gateways [21,25].…”
Section: Oauth20 Over Iot Protocolsmentioning
confidence: 99%
“…The gateway source code is written in Node.js and relies on https, node-coap and node-dtls libraries to provide either CoAPs and HTTPs requests. Particularly, for the CoAPs case, the secured DTLS socket used in the communication remains open similarly to [43].…”
Section: Gatewaymentioning
confidence: 99%