As a result, the above design aspects are relevant to consider in the analyses presented in this paper. 2.3.1 Design theories and approaches Prior research on the role of human-centered approaches in IoT argued that there is a gap between human-centered design frameworks and technology design ...
In the second phase of this paper, the authors discuss the security challenges in IoT followed by the security measures in IoT. Finally, these challenges, which are discussed in the paper, could be research direction for future work in security for IoT. Table 1. Related studies on security ...
Through the classification of their methods and contents, this paper constructed a mapping framework connecting the ReSOLVE concept with four IoT capabilities and the 6 R framework. It depicts the current research status of IoT supported CBMs and explains their contribution for enterprises from the ...
road congestion, etc in the urban areas. In this paper, we propose a participatory sensing based traffic honk monitoring system calledHonkSensethat uses smartphone equipped sensors (e.g. microphone, GPS, etc.). Citizens can take part in monitoring traffic noise pollution due to honking by record...
PDF Tools Share Abstract As an essential branch of physical layer authentication research, radio frequency identification (RFID) has advantages in achieving lightweight and highly reliable authentication. However, in the Internet of Things (IoT) environment, where a large scale of devices are connected...
We present our approach and the findings of this work in the following research paper: DIANE: Identifying Fuzzing Triggers in Apps to Generate Under-constrained Inputs for IoT Devices[PDF] Nilo Redini, Andrea Continella, Dipanjan Das, Giulio De Pasquale, Noah Spahn, Aravind Machiry, Antonio Bi...
The last section concludes our research study and also provides road map for the future work. 2. Existing Works There are several research approaches linked to the assignment of resources to user applications, but this paper considers IoT-based applications and resources of Edge-Cloud to provide ...
An online learning method used to address concept drift and model drift. Code for the paper entitled "A Lightweight Concept Drift Detection and Adaptation Framework for IoT Data Streams" published in IEEE Internet of Things Magazine. - Western-OC2-Lab/OA
Most of the research described in the chapter has been conducted via experimentation, using testbeds described in IRACON White Paper on Experimental Facilities [AB18]. 7.1. Low power wide area networks The LPWAN technology has recently emerged specifically focusing on IoT applications which require ...
This paper aims to present a comprehensive survey of existing IoT security solutions at the edge layer as well as to inspire more edge-based IoT security designs. We first present an edge-centric IoT architecture. Then, we extensively review the edge-based IoT security research efforts in the ...