2016 Third International Conference on Mathematics and Computers in Sciences and in Industry (MCSI) 2016
DOI: 10.1109/mcsi.2016.064
|View full text |Cite
|
Sign up to set email alerts
|

Reliability and Security Issues for IoT-based Smart Business Center: Architecture and Markov Model

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 22 publications
(10 citation statements)
references
References 1 publication
0
8
0
Order By: Relevance
“…In order to present a true reflection of reliability, it is necessary to have a mechanism which can alert the user to failures in the system before critical actuations are made. Kharchenko et al (2017) proposed the use of a Markov model to predict the reliability requirements of an IoT system. The Markov model considered that the application could be in a range of 15 states, from normal condition to complete failure.…”
Section: System Reliabilitymentioning
confidence: 99%
“…In order to present a true reflection of reliability, it is necessary to have a mechanism which can alert the user to failures in the system before critical actuations are made. Kharchenko et al (2017) proposed the use of a Markov model to predict the reliability requirements of an IoT system. The Markov model considered that the application could be in a range of 15 states, from normal condition to complete failure.…”
Section: System Reliabilitymentioning
confidence: 99%
“…Another aspect of IoT as contributing to security issues is its complexity, which makes it hard to identify security gaps. These gaps have been realized by researchers, as they have concluded that the connected world has many hidden risks that require intensive research to find suitable solutions [18], [19], [20]. Many devices through various channels can connect to IoT, and as yet no mechanism has been put forward to alert device users of security threats and the way they can prevent attacks from bash-like bugs.…”
Section: Securitymentioning
confidence: 99%
“…Using power saving mode (PSM) and infrequently developed receive (extended discontinuous receive [e-DRX]) Longer standby time can be observed in NB-IoT. In this context, PSM technology has been added lately to ReL12, in which terminal power-saving mode is still being recorded online, but it cannot achieve to saving energy by sending a signal to put the terminal in a deep sleep for a longer time [20], [21].…”
Section: Low Energy Consumptionmentioning
confidence: 99%
See 1 more Smart Citation
“…Markov model are used by many researcher for network security and assessment based on the activities of the current users [7]- [9]. Hidden markov models can be used to predict the probability of occurrence of malicious edge device in fog computing environment based on the activity of the device [10]. In proposed cybersecurity framework, two stage hidden markov model has been used to find the malicious device and shift it to Virtual Honeypot Cloud (VHD) based on its recent activities.…”
Section: Introductionmentioning
confidence: 99%