A Study on the Next Generation Security Control Model for Cyber Threat Detection in the Internet of Things (IoT) Environment

Author(s):  
Wonhyung Park ◽  
GwangHyun Ahn
2020 ◽  
Vol 8 (27) ◽  
pp. 13619-13629 ◽  
Author(s):  
Asif Abdullah Khan ◽  
Md Masud Rana ◽  
Guangguang Huang ◽  
Nanqin Mei ◽  
Resul Saritas ◽  
...  

A high-performance perovskite/polymer piezoelectric nanogenerator for next generation self-powered wireless micro/nanodevices.


Sensors ◽  
2016 ◽  
Vol 16 (3) ◽  
pp. 403 ◽  
Author(s):  
Alexander Kotsev ◽  
Sven Schade ◽  
Massimo Craglia ◽  
Michel Gerboles ◽  
Laurent Spinelle ◽  
...  

2020 ◽  
Author(s):  
Tanweer Alam

<p>The fog computing is the emerging technology to compute, store, control and connecting smart devices with each other using cloud computing. The Internet of Things (IoT) is an architecture of uniquely identified interrelated physical things, these physical things are able to communicate with each other and can transmit and receive information. <a>This research presents a framework of the combination of the Internet of Things (IoT) and Fog computing. The blockchain is also the emerging technology that provides a hyper, distributed, public, authentic ledger to record the transactions. Blockchains technology is a secured technology that can be a boon for the next generation computing. The combination of fog, blockchains, and IoT creates a new opportunity in this area. In this research, the author presents a middleware framework based on the blockchain, fog, and IoT. The framework is implemented and tested. The results are found positive. </a></p>


Author(s):  
Matt Zwolenski ◽  
Lee Weatherill

The Digital Universe, which consists of all the data created by PC, Sensor Networks, GPS/WiFi Location, Web Metadata, Web-Sourced Biographical Data, Mobile, Smart-Connected Devices and Next-Generation Applications (to name but a few) is altering the way we consume and measure IT and disrupting proven business models. Unprecedented and exponential data growth is presenting businesses with new and unique opportunities and challenges. As the ‘Internet of Things’ (IoT) and Third Platform continue to grow, the analysis of structured and unstructured data will drive insights that change the way businesses operate, create distinctive value, and deliver services and applications to the consumer and to each other. As enterprises and IT grapple to take advantage of these trends in order to gain share and drive revenue, they must be mindful of the Information Security and Data Protection pitfalls that lay in wait ─ hurdles that have already tripped up market leaders and minnows alike.


2014 ◽  
Author(s):  
Martin Daumer ◽  
Patrick Burger

Imagine a world where everything from products to people, spaces and services is connected and together operates as a living network. ‘Meta Products’ is the next generation of ’living’ products, services and spaces referring to the potential of the Internet of Things to reach everywhere and to be embodied in everything. In the current transition period we are living in, we are building new aspirations that demand increasingly clever ways to use the potentially endless amounts of information we can track, sense, measure, share and produce via the constantly improving omnipresent technologies. So we are bringing information-fuelled products and services that will be around us as a network whenever we need them. The result of finding these increasingly clever ways to use information is what we call Meta-Products.


2021 ◽  
Vol 20 (1) ◽  
pp. 127-132
Author(s):  
Fadilah Eka Prasetiyo ◽  
Didik Setiyadi Setiyadi

The comfort and safety of a house is the dream of any home owner, even a house that has a modern security system will be more in demand than a house with an ordinary security system. By utilizing existing technology, it is possible to create an excellent security system from theft and fire. In order to overcome these problems, a prototype of a security threat detection system was made using telegrams based on the internet of things. This can minimize the inconvenience of home owners when they are not at home in a long time, such as the owner of the house going out of town or abroad. The design of this smart home uses the NodeMCU ESP8266 Wifi Module as a controller, the telegram application as a notification when an unknown person opens a door or window, and when a fire occurs. The sensor used to detect the security of burglars is a Magnetic Door Switch, this sensor is placed on doors and windows. The sensor used to detect fire indications is the Flame Sensor which is placed on the ceiling of the house


Sign in / Sign up

Export Citation Format

Share Document