Countermeasure Security Risks Management in the Internet of Things Based on Fuzzy Logic Inference

Author(s):  
Igor Kotenko ◽  
Igor Saenko ◽  
Sergey Ageev
2019 ◽  
pp. 958-964 ◽  
Author(s):  
Wissam Abbass ◽  
◽  
Zineb Bakraouy ◽  
Amine Baina ◽  
Mostafa Bella

2019 ◽  
Vol 75 (3) ◽  
pp. 380-394
Author(s):  
Uday Khanapurkar

Huawei, the Chinese telecom giant, has emerged as a key player in the provision of infrastructure required to support 5G wireless networks, the adoption of which will be foundational to recipient countries’ deployment of emerging technologies such as artificial intelligence and the Internet of things.   At the same time, however, security concerns with respect to Huawei’s ties to the Chinese army and state abound, prompting a number of countries to ban the company from supplying them said telecom infrastructure. India, however, is on the fence in this regard. This article assesses India’s Huawei conundrum through a conceptual framework of economic dependence wherein the costs of a ban and willingness to ban are examined in detail. It is argued that since the expected costs of banning Huawei equipment and the security risks of using them are both substantially high, India’s course of action must be to defer a quick decision and bargain for benefits and assurances.


Author(s):  
Bagas Wahyu Prakoso ◽  
Anifatul Faricha ◽  
Dimas Adiputra ◽  
Mochamad Fauzan Rasyid ◽  
Moch. Bagus Indrastata Purahita ◽  
...  

Author(s):  
Mohamed A Eltayeb

In the contemporary world, we are surrounded by a complex network of interconnected sensors. These allows us to share, collate, transmit, and store vast amounts of data. These systems are known as the Internet of Things (IoT), and this technological offering has attracted a large amount of interest from academics, researchers, and developers in recent years due to its highly scalable and agile nature. However, while the IoT delivers significant benefits, it also poses some risks. The data that is stored and exchanged via the IoT is extremely valuable to individuals who have malevolent intent. In more recent years, the increasing popularity of the IoT as a means of sharing information has been associated with privacy and security risks that have undermined users' trust in the IoT. This paper examines what these risks are and some of the actions that can be taken to mitigate them.


2020 ◽  
Vol 23 (1) ◽  
pp. e9484
Author(s):  
Yigliana Alvarez Mendoza ◽  
Tania J. Londoño Gomez ◽  
Miguel Angel Leguizamón Páez

The technological advance of the new era has led to the interconnection of devices, applications, people and data, giving way to the generation of the Internet of Things (IoT). The multiple data collected is so voluminous and variable that it must be stored in Big Data architectures. This evolution has provided the opportunity to have better access, quality and analysis of information, but at the same time, there is a challenge to prevent and mitigate the security risks associated with the relationship between IoT and Big Data, endangering the information collected and the user’ sensitive data, among others. The purpose of this document is to carry out a literature review to collect the security risks found between the relationship of Big Data and IoT, as well as evaluate the current solutions implemented and conclude if they cover the needs for prevention and mitigation of the risk.


2017 ◽  
Vol 76 ◽  
pp. 275-284 ◽  
Author(s):  
Daniel Meana-Llorián ◽  
Cristian González García ◽  
B. Cristina Pelayo G-Bustelo ◽  
Juan Manuel Cueva Lovelle ◽  
Nestor Garcia-Fernandez

Sensors ◽  
2018 ◽  
Vol 18 (7) ◽  
pp. 2190 ◽  
Author(s):  
Bing Jia ◽  
Lifei Hao ◽  
Chuxuan Zhang ◽  
Dong Chen

Sign in / Sign up

Export Citation Format

Share Document