Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleOctober 2024
Quantum-empowered federated learning and 6G wireless networks for IoT security: Concept, challenges and future directions
Future Generation Computer Systems (FGCS), Volume 160, Issue CPages 577–597https://doi.org/10.1016/j.future.2024.06.023AbstractThe Internet of Things (IoT) has revolutionized various sectors by enabling seamless device interaction. However, the proliferation of IoT devices has also raised significant security and privacy concerns. Traditional security measures often fail ...
Highlights- We introduce a comprehensive analysis of the complex interplay between quantum computing, federated learning, 6G networks, and IoT security, highlighting their mutual dependencies and their collective influence on the future of secure IoT ...
- research-articleOctober 2024
Global quantitative analysis and visualization of big data and medical devices based on bibliometrics
Expert Systems with Applications: An International Journal (EXWA), Volume 254, Issue Chttps://doi.org/10.1016/j.eswa.2024.124398Abstract BackgroundIn the big data era, the healthcare sector grapples with increased data volumes and the push for more intelligent medical devices. This challenge is marked by data silos, higher data processing needs, and the quest for personalized ...
- research-articleOctober 2024JUST ACCEPTED
EM-Rhythm: An Authentication Method for Heterogeneous IoT Devices
The popularity of IoT devices has penetrated our daily life while posing new challenges in user authentication. Today’s solutions, e.g., passwords, fingerprints, and FaceIDs, primarily rely on specialized sensors or user interfaces to collect user’s ...
- surveyOctober 2024JUST ACCEPTED
A Survey on IoT Programming Platforms: A Business-Domain Experts Perspective
The vast growth and digitalization potential offered by the Internet of Things (IoT) is hindered by substantial barriers in accessibility, interoperability, and complexity, mainly affecting small organizations and non-technical entities. This survey paper ...
- research-articleOctober 2024
Invisibly Entangled: When Children Meet a System of Connected Components
NordiCHI '24: Proceedings of the 13th Nordic Conference on Human-Computer InteractionArticle No.: 81, Pages 1–9https://doi.org/10.1145/3679318.3685483Today many children encounter Internet of Things (IoT) devices and systems of connected products in their daily contexts and activities such as learning, play, and helping in the household. When designing computational systems that children can ...
-
- research-articleOctober 2024
Older Generation: Self-Powered IoTs, Home-Life and “Ageing Well”
- Gavin Bailey,
- Krishna Seunarine,
- Carlos Valter Baptista De Lima,
- Matt Carnie,
- Zaid Haymoor,
- Martin Hyde,
- Benedict H Jones,
- Matt Jones,
- Jennifer Pearson,
- Thomas Reitmaier,
- Simon Robinson,
- Deepak Ranjan Sahoo,
- Aelwyn Williams
NordiCHI '24: Proceedings of the 13th Nordic Conference on Human-Computer InteractionArticle No.: 74, Pages 1–14https://doi.org/10.1145/3679318.3685410Internet of Things (IoT) technology is found in many homes. These systems enable tasks to be done more effectively or efficiently – e.g., securing property, monitoring and adjusting resources, tracking behaviours for well-being, and so on. The system ...
- surveyOctober 2024
A Comprehensive Survey on Edge Data Integrity Verification: Fundamentals and Future Trends
ACM Computing Surveys (CSUR), Volume 57, Issue 1Article No.: 8, Pages 1–34https://doi.org/10.1145/3680277Recent advances in edge computing (EC) have pushed cloud-based data caching services to edge; however, such emerging edge storage comes with numerous challenging and unique security issues. One of them is the problem of edge data integrity verification (...
- surveyOctober 2024JUST ACCEPTED
Knowledge-based Cyber Physical Security at Smart Home: A Review
Smart-home systems represent the future of modern building infrastructure as they integrate numerous devices and applications to improve the overall quality of life. These systems establish connectivity among smart devices, leveraging network technologies ...
- research-articleOctober 2024
IoT data encryption and phrase search-based efficient processing using a Fully Homomorphic-based SE (FHSE) scheme
Pervasive and Mobile Computing (PAMC), Volume 103, Issue Chttps://doi.org/10.1016/j.pmcj.2024.101952AbstractIn this study, the Efficient Multikeyword Fully Homomorphic Search Encryption (EMK-FHSE) model is proposed to improve cloud storage security for sensitive data. When fully homomorphic encryption (FHE) and search encryption (SE) technologies are ...
- review-articleOctober 2024
Analysing the synergies between Multi-agent Systems and Digital Twins: A systematic literature review
Information and Software Technology (INST), Volume 174, Issue Chttps://doi.org/10.1016/j.infsof.2024.107503Abstract ContextDigital Twins (DTs) are used to augment physical entities by exploiting assorted computational approaches applied to the virtual twin counterpart. A DT is generally described as a physical entity, its virtual counterpart, and the data ...
- research-articleOctober 2024
Status update scheduling in remote sensing under variable activation and propagation delays
AbstractSensor data exchanges in IoT applications can experience a variable delay due to changes in the communication environment and sharing of processing capabilities. This variability can impact the performance and effectiveness of the systems being ...
- research-articleOctober 2024
Hyper-graph matching D2D offloading scheme for enhanced computation and communication capacity
AbstractAs the Internet of Things(IoT) and its intelligent applications continue to proliferate, forthcoming 6G networks will confront the dual challenge of heightened communication and computing capacity demands. To address this, D2D collaborative ...
- ArticleSeptember 2024
Voice Long Distance Transmission Using Audio Codec for Low-Performance Microcontrollers and LoRa Communication for Use in IoT
Computer Information Systems and Industrial ManagementPages 166–178https://doi.org/10.1007/978-3-031-71115-2_12AbstractThe Internet of Things (IoT) is a rapidly advancing field in the realm of technology. As IoT devices typically require low-power and low-performance systems, using popular audio codecs, such as FLAC (Free Lossless Audio Codec) or MP3 can be ...
- ArticleSeptember 2024
User Service Times in Wireless Energy Networks
Cooperative Design, Visualization, and EngineeringPages 117–122https://doi.org/10.1007/978-3-031-71315-6_12AbstractThe recent revival of Tesla’s original idea of transferring power without the use of wires has led to the conception of a wireless energy network as a new networking paradigm. Starting from the bases established in previous articles, this paper ...
- ArticleSeptember 2024
An Axiomatic Category-Based Access Control Model for Smart Homes
Logic-Based Program Synthesis and TransformationPages 131–148https://doi.org/10.1007/978-3-031-71294-4_8AbstractInternet of Things (IoT) refers to a system of devices that send and receive data via the internet. In the Smart Home IoT, appropriate access controls are key for the security of the household. Popular access control models, such as RBAC and ABAC, ...
- ArticleSeptember 2024
Strengthening Network Intrusion Detection in IoT Environments with Self-supervised Learning and Few Shot Learning
AbstractThe Internet of Things (IoT) has been introduced as a breakthrough technology that integrates intelligence into everyday objects, enabling high levels of connectivity between them. As the IoT networks grow and expand, they become more susceptible ...
- research-articleSeptember 2024JUST ACCEPTED
Pivot: Panoramic-image-based VR User Authentication against Side-Channel Attacks
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM), Just Accepted https://doi.org/10.1145/3694975With metaverse attracting increasing attention from both academic and industry, the application of virtual reality (VR) has extended beyond 3D immersive viewing/gaming to a broader range of areas, such as banking, shopping, tourism, education, etc., which ...
- research-articleSeptember 2024
Empowering IoT Developers with Privacy-Preserving End-User Development Tools
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), Volume 8, Issue 3Article No.: 90, Pages 1–47https://doi.org/10.1145/3678588Internet of Things applications (IoT) have the potential to derive sensitive user data, necessitating adherence to privacy and data protection laws. However, developers often struggle with privacy issues, resulting in personal data misuse. Despite the ...
- research-articleSeptember 2024
ChatIoT: Zero-code Generation of Trigger-action Based IoT Programs
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), Volume 8, Issue 3Article No.: 103, Pages 1–29https://doi.org/10.1145/3678585Trigger-Action Program (TAP) is a simple but powerful format to realize intelligent IoT applications, especially in home automation scenarios. Existing trace-driven approaches and in-situ programming approaches depend on either customized interaction ...
- ArticleSeptember 2024
Designing Digital Solutions in the Cultural Heritage and Tourism Industry for Advancing Visitors’ Experiences: SMEs Needs, Preferences, and Expectations
- Vito Del Vecchio,
- Mariangela Lazoi,
- Claudio Marche,
- Christos Mettouris,
- Mario Montagud,
- Giorgia Specchia,
- Mostafa Z. Ali
AbstractDigital transformation is reshaping business strategies and innovation, by creating new opportunities in different industries. Digital technologies, like eXtended Reality (XR) and Internet of Things (IoT), are rapidly advancing in the field of ...