SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "WFRF:(Sari Alparslan) srt2:(2020)"

Sökning: WFRF:(Sari Alparslan) > (2020)

  • Resultat 1-2 av 2
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  • Butun, Ismail, 1981, et al. (författare)
  • Hardware security of fog end-devices for the internet of things
  • 2020
  • Ingår i: Sensors. - : MDPI AG. - 1424-8220. ; 20:20, s. 1-28
  • Forskningsöversikt (refereegranskat)abstract
    • The proliferation of the Internet of Things (IoT) caused new application needs to emerge as rapid response ability is missing in the current IoT end-devices. Therefore, Fog Computing has been proposed to be an edge component for the IoT networks as a remedy to this problem. In recent times, cyber-attacks are on the rise, especially towards infrastructure-less networks, such as IoT. Many botnet attack variants (Mirai, Torii, etc.) have shown that the tiny microdevices at the lower spectrum of the network are becoming a valued participant of a botnet, for further executing more sophisticated attacks against infrastructural networks. As such, the fog devices also need to be secured against cyber-attacks, not only software-wise, but also from hardware alterations and manipulations. Hence, this article first highlights the importance and benefits of fog computing for IoT networks, then investigates the means of providing hardware security to these devices with an enriched literature review, including but not limited to Hardware Security Module, Physically Unclonable Function, System on a Chip, and Tamper Resistant Memory.
  •  
2.
  • Sari, Alparslan, et al. (författare)
  • Industrial networks and IIoT: Now and future trends
  • 2020
  • Ingår i: Industrial IoT: Challenges, Design Principles, Applications, and Security. - Cham : Springer International Publishing. ; , s. 3-55
  • Bokkapitel (övrigt vetenskapligt/konstnärligt)abstract
    • Connectivity is the one word summary for Industry 4.0 revolution. The importance of Internet of Things (IoT) and Industrial IoT (IIoT) have been increased dramatically with the rise of industrialization and industry 4.0. As new opportunities bring their own challenges, with the massive interconnected devices of the IIoT, cyber security of those networks and privacy of their users have become an important aspect. Specifically, intrusion detection for industrial networks (IIoT) has great importance. For instance, it is a key factor in improving the safe operation of the smart grid systems yet protecting the privacy of the consumers at the same time. In the same manner, data streaming is a valid option when the analysis is to be pushed from the cloud to the fog for industrial networks to provide agile response, since it brings the advantage of fast action on intrusion detection and also can buy time for intrusion mitigation. In order to dive deep in industrial networks, basic ground needs to be settled. Hence, this chapter serves in this manner, by presenting basic and emerging technologies along with ideas and discussions: First, an introduction of semiconductor evolution is provided along with the up-to-date hi-tech wired/wireless communication solutions for industrial networks. This is followed by a thorough representation of future trends in industrial environments. More importantly, enabling technologies for industrial networks is also presented. Finally, the chapter is concluded with a summary of the presentations along with future projections of IIoT networks.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-2 av 2
Typ av publikation
forskningsöversikt (1)
bokkapitel (1)
Typ av innehåll
övrigt vetenskapligt/konstnärligt (1)
refereegranskat (1)
Författare/redaktör
Butun, Ismail, 1981 (2)
Sari, Alparslan (2)
Österberg, Patrik, 1 ... (1)
Lekidis, Alexios (1)
Lärosäte
Chalmers tekniska högskola (2)
Mittuniversitetet (1)
Språk
Engelska (2)
Forskningsämne (UKÄ/SCB)
Naturvetenskap (2)
Teknik (2)
År

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy