6 results
Search Results
Now showing 1 - 6 of 6
Conference Object Security Requirements in Iot Environments(Springer Science and Business Media Deutschland GmbH, 2022) Binglaw,F.; Koyuncu,M.; Pusatlı,T.The Internet of Things (IoT) is a relatively new concept as it connects things (or objects) that do not have high computational power. The IoT helps these things see, listen, and take action by interoperating with minimal human intervention to make people’s lives easier. However, these systems are vulnerable to attacks and security threats that could potentially undermine consumer confidence in them. For this reason, it is critical to understand the characteristics of IoT security and their requirements before starting to discuss how to protect them. In this scope, the present work reviews the importance of security in IoT applications, factors that restrict the use of traditional security methods to protect IoTs, and the basic requirements necessary to judge them as secure environments. © 2022, ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering.Article Citation - WoS: 1Citation - Scopus: 1Internet of Things (iot) and Artificial Neural Networks Towards Water Pollution Forecasting(Middle Pomeranian Sci Soc Env Prot, 2020) Ibrahim, Thaer; Mishra, Alok; Software EngineeringWater could be some-times a source of danger on people's lives and property. Although it is one of the most important elements of life on this planet. This article define the threat of water pollution in Tigris River in Iraq. by collecting a data that generated by sensors that installed in a water pollution sensing project in Baghdad city, also this article aimed to detect and analyze the behavior of water environment. It is an effort to predict the threat of pollution by using advanced scientific methods like the technology of Internet of Things (IoT) and Machine learning in order to avoid the threat and/or minimize the possible damages. This can be used as a proactive service provided by E-governments towards their own citizens.Conference Object Citation - Scopus: 1Semantic Interoperability and Reusability in Iot: a Systematic Mapping Study(Institute of Electrical and Electronics Engineers Inc., 2024) Alsaeh, A.; Sezen, A.Internet of Things (IoT) enables different devices, sensors, or humans to connect via the Internet. However, various IoT devices generate heterogeneous data in different formats. This hinders IoT devices from integrating and exchanging data between them. Adding semantic web technologies to the Web of Things (WoT) has greatly enabled IoT devices to be semantically interoperable. Moreover, W3C has established a Semantic Sensor Network (SSN) ontology that can be reused in different IoT applications due to difficulties in developing new ontologies. Many systematic mapping reviews in the literature have addressed semantic interoperability in IoT. Although reusability can play a vital role in enhancing semantic interoperability, none of those studies has discussed reusability and semantic interoperability together in the IoT area. In this article, we are seeking to fill this gap in the current literature by conducting a systematic mapping review for 72 articles to point out semantic interoperability as well as reusability in IoT. Five research questions have been identified regarding challenges and possible solutions about both semantic interoperability and reusability. The reviewed articles are classified into four categories. There are 47 articles about semantic interoperability, 2 of which discuss reusability, 18 of which include semantic interoperability with reusability, and the last category includes surveys. Moreover, the research questions are also assigned to the related category that answers the questions. This article highlights important insights about semantic web techniques namely, RDF, ontology, SPARQL, and OWL. Additionally, this article concludes how these techniques are enhanced in diverse domains such as healthcare, smart cities, and the energy domain. On top of that, this systematic mapping shows how reused ontology plays a remarkable role in the IoT domain Finally, results that answer the research questions are figured out and deeply analyzed in the tables and graphs. © 2024 IEEE.Conference Object An Iot Application for Locating Victims Aftermath of an Earthquake(Ieee, 2017) Karakaya, Murat; Sengul, Gokhan; Gokcay, ErhanThis paper presents an Internet of Things (IoT) framework which is specially designed for assisting the research and rescue operations targeted to collapsed buildings aftermath of an earthquake. In general, an IoT network is used to collect and process data from different sources called things. According to the collected data, an IoT system can actuate different mechanisms to react the environment. In the problem at hand, we exploit the IoT capabilities to collect the data about the victims before the building collapses and when it falls down the collected data is processed to generate useful reports which will direct the search and rescue efforts. The proposed framework is tested by a pilot implementation with some simplifications. The initial results and experiences are promising. During the pilot implementation, we observed some issues which are addressed in the proposed IoT framework properly.Conference Object Citation - Scopus: 1An Iot Application for Locating Victims Aftermath of an Earthquake(Institute of Electrical and Electronics Engineers Inc., 2017) Karakaya,M.; Şengül,G.; Gökçay,E.This paper presents an Internet of Things (IoT) framework which is specially designed for assisting the research and rescue operations targeted to collapsed buildings aftermath of an earthquake. In general, an IoT network is used to collect and process data from different sources called things. According to the collected data, an IoT system can actuate different mechanisms to react the environment. In the problem at hand, we exploit the IoT capabilities to collect the data about the victims before the building collapses and when it falls down the collected data is processed to generate useful reports which will direct the search and rescue efforts. The proposed framework is tested by a pilot implementation with some simplifications. The initial results and experiences are promising. During the pilot implementation, we observed some issues which are addressed in the proposed IoT framework properly. © 2017 IEEE.Conference Object Revisiting Shamir's No-key Protocol: Lightweight Key Transport(Ieee Computer Soc, 2017) Kilic, Adnan; Onur, Ertan; Onur, Cansu BetinKey-transport protocols, subclasses of key-establishment protocols, are employed to convey secret keys from a principal to another for establishing a security association. In this paper, we propose a lightweight, practicable, tweakable, energy-efficient, and secure key-transport protocol, suitable for wireless sensor networks (WSN), Internet of Things (IoT) and mobile networks. The proposed protocol is based on the Shamir's no-key protocol. Although Shamir's no-key protocol does not require any pre-shared secret between principals, we show that it is impossible to employ the no-key protocol over public commutative groups. We modify Diffie-Hellman key-agreement protocol to morph it into a key-transport protocol by applying a set of changes on the original protocol and it becomes possible to compare both protocols in terms of memory usage and total time to accomplish a single key transport. The experimental results show that the proposed key transport protocol perform faster than the modified Diffie-Hellman protocol, and the total time to transport a single key by using the modified Diffie-Hellman protocol grows drastically with the increase in key size.

