|
|
|
Mona Alkanhal, Abdulaziz Alali and Mohamed Younis
In recent times, the advent of innovative technological paradigms like the Internet of Things has paved the way for numerous applications that enhance the quality of human life. A remarkable application of IoT that has emerged is the Internet of Vehicles...
ver más
|
|
|
|
|
|
|
Shunfang Hu, Shaoping Jiang, Qing Miao, Fan Yang, Weihong Zhou and Peng Duan
With the rise of the Internet of Things (IoT), maintaining data confidentiality and protecting user privacy have become increasingly challenging. End devices in the IoT are often deployed in unattended environments and connected to open networks, making ...
ver más
|
|
|
|
|
|
|
Arun Sekar Rajasekaran, Azees Maria, Fadi Al-Turjman, Chadi Altrjman and Leonardo Mostarda
As there has been an advancement in avionic systems in recent years, the enactment of unmanned aerial vehicles (UAV) has upgraded. As compared to a single UAV system, multiple UAV systems can perform operations more inexpensively and efficiently. As a re...
ver más
|
|
|
|
|
|
|
Abdullah M. Almuhaideb and Huda A. Alghamdi
The Telecare Medical Information System (TMIS) is a technology used in Wireless Body Area Networks (WBAN) that is used efficiently for remote healthcare services. TMIS services can be provided as cloud computing services for storage and processing purpos...
ver más
|
|
|
|
|
|
|
Xiang Chen, Shouzhi Xu, Kai Ma and Peng Chen
A consortium system can leverage information to improve workflows, accountability, and transparency through setting up a backbone for these cross-company and cross-discipline solutions, which make it become a hot spot of market application. Users of a co...
ver más
|
|
|
|
|
|
|
Mario Noseda, Lea Zimmerli, Tobias Schläpfer and Andreas Rüst
New protocol stacks provide wireless IPv6 connectivity down to low power embedded IoT devices. From a security point of view, this leads to high exposure of such IoT devices. Consequently, even though they are highly resource-constrained, these IoT devic...
ver más
|
|
|
|
|
|
|
Wei-Chen Lin, Po-Kai Huang, Chung-Long Pan and Yu-Jung Huang
Medication safety administration is a complicated process involving the information of patients, drugs, and data storage. The sensitive data transmitted through wireless sensor networks (WSNs) from Internet of things (IoT) over an insecure channel is vul...
ver más
|
|
|
|
|
|
|
Yangheran Piao, Kai Ye and Xiaohui Cui
After the General Data Protection Regulation (GDPR) was introduced, some organizations and big data companies shared data without conducting any privacy protection and compliance authentication, which endangered user data security, and were punished fina...
ver más
|
|
|
|
|
|
|
Chin-Ling Chen, Zi-Yi Lim, Hsien-Chou Liao and Yong-Yuan Deng
Recently, private security services have become increasingly needed by the public. The proposed scheme involves blockchain technology with a smart contract. When a private security company signs a contract with a client, they install an Internet of Thing...
ver más
|
|
|
|
|
|
|
Seonghyeon Gong, Abir EL Azzaoui, Jeonghun Cha and Jong Hyuk Park
The service-based architecture of the Fifth Generation(5G) had combined the services and security architectures and enhanced the authentication process of services to expand the coverage of the network, including heterogeneous devices. This architecture ...
ver más
|
|
|
|