2022
DOI: 10.1007/978-3-031-15160-6_5
|View full text |Cite
|
Sign up to set email alerts
|

Real Case Studies Toward IoT-Based Cognitive Environments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 18 publications
0
2
0
Order By: Relevance
“…Instead, the articles [3,6] examine the influence of the TLS protocol on the security and performance of the MQTT protocol. The security assessment delves into authentication, data privacy, and data integrity.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Instead, the articles [3,6] examine the influence of the TLS protocol on the security and performance of the MQTT protocol. The security assessment delves into authentication, data privacy, and data integrity.…”
Section: Related Workmentioning
confidence: 99%
“…With the proliferation of Internet of Things (IoT) devices, safeguarding sensitive data has become paramount. As highlighted by the recent literature [1], many of these data are measurements, and the IoT paradigm is the basis of modern distributed measurement systems (DMSs), used for the monitoring of many heterogeneous physical quantities, crucial for wellness [2,3], industrial automation, education, power generation and distribution, smart agriculture, and farming [4,5], but also for the safety of people [6][7][8] and structures [9]. The cyber security company Check Point Research has reported a significant surge in cyber attacks targeting IoT devices during the current calendar year.…”
Section: Introductionmentioning
confidence: 99%