物联网(英文)Pub Date : 2021-01-01DOI: 10.1007/978-3-030-71017-0_53
Tarek Youssef, Guillermo A. Francia, H. Sevil
{"title":"Data Collection and Generation for Radio Frequency Signal Security","authors":"Tarek Youssef, Guillermo A. Francia, H. Sevil","doi":"10.1007/978-3-030-71017-0_53","DOIUrl":"https://doi.org/10.1007/978-3-030-71017-0_53","url":null,"abstract":"","PeriodicalId":69922,"journal":{"name":"物联网(英文)","volume":"17 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79726662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
物联网(英文)Pub Date : 2021-01-01DOI: 10.1007/978-3-030-71017-0_19
Farah Dernaika, N. Cuppens-Boulahia, F. Cuppens, Olivier Raynaud
{"title":"A Posteriori Access Control with an Administrative Policy","authors":"Farah Dernaika, N. Cuppens-Boulahia, F. Cuppens, Olivier Raynaud","doi":"10.1007/978-3-030-71017-0_19","DOIUrl":"https://doi.org/10.1007/978-3-030-71017-0_19","url":null,"abstract":"","PeriodicalId":69922,"journal":{"name":"物联网(英文)","volume":"1998 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90440162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
物联网(英文)Pub Date : 2021-01-01DOI: 10.1007/978-3-030-71017-0_18
Gonzalo Barbeito, Dieter Budde, M. Moll, S. Pickl, B. Thiebes
{"title":"A Hybrid AI and Simulation-Based Optimization DSS for Post-Disaster Logistics","authors":"Gonzalo Barbeito, Dieter Budde, M. Moll, S. Pickl, B. Thiebes","doi":"10.1007/978-3-030-71017-0_18","DOIUrl":"https://doi.org/10.1007/978-3-030-71017-0_18","url":null,"abstract":"","PeriodicalId":69922,"journal":{"name":"物联网(英文)","volume":"34 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87223401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
物联网(英文)Pub Date : 2021-01-01DOI: 10.1007/978-3-030-71017-0_13
Jeong Yang, David Velez, Harry C. Staley, Navin Mathew, Daniel De LeonII
{"title":"A Practice of Detecting Insider Threats within a Network","authors":"Jeong Yang, David Velez, Harry C. Staley, Navin Mathew, Daniel De LeonII","doi":"10.1007/978-3-030-71017-0_13","DOIUrl":"https://doi.org/10.1007/978-3-030-71017-0_13","url":null,"abstract":"","PeriodicalId":69922,"journal":{"name":"物联网(英文)","volume":"153 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77539935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
物联网(英文)Pub Date : 2021-01-01DOI: 10.1007/978-3-030-71017-0_55
B. Shaer, Garrick Gressett, Phillip Mitchell, Joshua Meeks, William Barnes, Stone Hewitt
{"title":"Piano Player with Embedded Microcontrollers","authors":"B. Shaer, Garrick Gressett, Phillip Mitchell, Joshua Meeks, William Barnes, Stone Hewitt","doi":"10.1007/978-3-030-71017-0_55","DOIUrl":"https://doi.org/10.1007/978-3-030-71017-0_55","url":null,"abstract":"","PeriodicalId":69922,"journal":{"name":"物联网(英文)","volume":"12 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82915024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
物联网(英文)Pub Date : 2020-11-19DOI: 10.1201/9780429270567-9
G. Mouta, M. Pardal, Joao Bota, M. Correia
{"title":"SPATIO: end-uSer Protection Against ioT IntrusiOns","authors":"G. Mouta, M. Pardal, Joao Bota, M. Correia","doi":"10.1201/9780429270567-9","DOIUrl":"https://doi.org/10.1201/9780429270567-9","url":null,"abstract":"The Internet of Things (IoT) is an emerging technology field where large numbers of physical objects communicate between themselves using Internet technology. IoT solutions are very diverse, ranging from simple toys to industrial applications. There are currently billions of IoT devices connected to the Internet, and this number has been growing exponentially in the recent years. The large amount of data being generated from the many devices in an IoT network makes it difficult to collect and analyse all the data. However, with this growth there also comes a growing security concern. With the use of IoT devices in the industrial and healthcare sectors, for example, a security incident can have far reaching consequences in the real world. It is imperative to detect attacks as fast as possible, in time to prevent significant damage. The continuous flow of data may be handled with a stream processing approach, a data processing paradigm in which highrate data sources are processed and generate results on-thefly. Based on this approach, we propose SPATIO (end-uSer Protection Against ioT IntrusiOns), an anomaly detection system designed for the IoT using machine learning to discover and alert on anomalies happening in an IoT network but takes a fog computing approach by using devices on the IoT network, such as routers, to collect and transform network traffic into flow metrics. Doing this transformation closer to the edge reduces the bandwidth cost on the network and allows anonymization of data before being sent outside the network, to the cloud or a server running outlier detection algorithms to generate timely alerts of network anomalies. We evaluate SPATIO by developing a prototype testing it on an existing public dataset of IoT attacks. We measured the accuracy of the machine learning approach, reaching close to 80% detection rate in the best scenario, and compared the performance of offloading work to gateway devices in the IoT network versus a centralized approach, in which the fog approach shows advantages in both network load as well as attack detection latency.","PeriodicalId":69922,"journal":{"name":"物联网(英文)","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88811429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}