Publications tagged with Network security

Published:

Publications tagged with "Network security"

  1. Campanile, L., Gribaudo, M., Iacono, M., & Mastroianni, M. (2021). Hybrid Simulation of Energy Management in IoT Edge Computing Surveillance Systems [Conference paper]. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 13104 LNCS, 345–359. https://doi.org/10.1007/978-3-030-91825-5_21
    Abstract
    Internet of Things (IoT) is a well established approach used for the implementation of surveillance systems that are suitable for monitoring large portions of territory. Current developments allow the design of battery powered IoT nodes that can communicate over the network with low energy requirements and locally perform some computing and coordination task, besides running sensing and related processing: it is thus possible to implement edge computing oriented solutions on IoT, if the design encompasses both hardware and software elements in terms of sensing, processing, computing, communications and routing energy costs as one of the quality indices of the system. In this paper we propose a modeling approach for edge computing IoT-based monitoring systems energy related characteristics, suitable for the analysis of energy levels of large battery powered monitoring systems with dynamic and reactive computing workloads. © 2021, Springer Nature Switzerland AG.
    DOI Publisher Details
    Details
  2. Campanile, L., Iacono, M., Marulli, F., & Mastroianni, M. (2020). Privacy regulations challenges on data-centric and iot systems: A case study for smart vehicles [Conference paper]. IoTBDS 2020 - Proceedings of the 5th International Conference on Internet of Things, Big Data and Security, 507–520. https://www.scopus.com/inward/record.uri?eid=2-s2.0-85089476036&partnerID=40&md5=c18dd73c221ec312a330521bf03d332e
    Abstract
    Internet of Things (IoTs) services and data-centric systems allow smart and efficient information exchanging. Anyway, even if existing IoTs and cyber security architectures are enforcing, they are still vulnerable to security issues, as unauthorized access, data breaches, intrusions. They can’t provide yet sufficiently robust and secure solutions to be applied in a straightforward way, both for ensuring privacy preservation and trustworthiness of transmitted data, evenly preventing from its fraudulent and unauthorized usage. Such data potentially include critical information about persons’ privacy (locations, visited places, behaviors, goods, anagraphic data and health conditions). So, novel approaches for IoTs and data-centric security are needed. In this work, we address IoTs systems security problem focusing on the privacy preserving issue. Indeed, after the European Union introduced the General Data Protection Regulation (GDPR), privacy data protection is a mandatory requirement for systems producing and managing sensible users’ data. Starting from a case study for the Internet of Vehicles (IoVs), we performed a pilot study and DPIA assessment to analyze possible mitigation strategies for improving the compliance of IoTs based systems to GDPR requirements. Our preliminary results evidenced that the introduction of blockchains in IoTs systems architectures can improve significantly the compliance to privacy regulations. Copyright © 2020 by SCITEPRESS - Science and Technology Publications, Lda. All rights reserved.
    Publisher Details
    Details

← Back to all publications