Nothing Special   »   [go: up one dir, main page]

skip to main content
Volume 16, Issue 4December 2016Special Issue on Internet of Things (IoT): Smart and Secure Service Delivery
Editor:
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
ISSN:1533-5399
EISSN:1557-6051
Reflects downloads up to 02 Oct 2024Bibliometrics
Skip Table Of Content Section
SECTION: Special Issue on Internet of Things (IoT): Smart and Secure Service Delivery
editorial
Free
Internet of Things (IoT): Smart and Secure Service Delivery
Article No.: 22, Pages 1–7https://doi.org/10.1145/3013520

The Internet of Things (IoT) is the latest Internet evolution that incorporates a diverse range of things such as sensors, actuators, and services deployed by different organizations and individuals to support a variety of applications. The information ...

research-article
Secure Data-Centric Access Control for Smart Grid Services Based on Publish/Subscribe Systems
Article No.: 23, Pages 1–17https://doi.org/10.1145/3007190

The communication systems in existing smart grids mainly take the request/reply interaction model, in which data access is under the direct control of data producers. This tightly controlled interaction model is not scalable to support complex ...

research-article
Password-Authenticated Group Key Exchange: A Cross-Layer Design
Article No.: 24, Pages 1–20https://doi.org/10.1145/2955095

Two-party password-authenticated key exchange (2PAKE) protocols provide a natural mechanism for secret key establishment in distributed applications, and they have been extensively studied in past decades. However, only a few efforts have been made so ...

research-article
Authentication Protocol for an IoT-Enabled LTE Network
Article No.: 25, Pages 1–20https://doi.org/10.1145/2981547

The Evolved Packet System-based Authentication and Key Agreement (EPS-AKA) protocol of the long-term evolution (LTE) network does not support Internet of Things (IoT) objects and has several security limitations, including transmission of the object’s (...

research-article
Advanced Security Testbed Framework for Wearable IoT Devices
Article No.: 26, Pages 1–25https://doi.org/10.1145/2981546

Analyzing the security of Wearable Internet-of-Things (WIoT) devices is considered a complex task due to their heterogeneous nature. In addition, there is currently no mechanism that performs security testing for WIoT devices in different contexts. In ...

research-article
Intelligent Intrusion Detection in Low-Power IoTs
Article No.: 27, Pages 1–25https://doi.org/10.1145/2990499

Security and privacy of data are one of the prime concerns in today’s Internet of Things (IoT). Conventional security techniques like signature-based detection of malware and regular updates of a signature database are not feasible solutions as they ...

research-article
Crowdsourced Mobile Data Transfer with Delay Bound
Article No.: 28, Pages 1–29https://doi.org/10.1145/2939376

In this article, we design a crowdsourcing system, CrowdMAC, where mobile devices form a local community or marketplace to share network access and transfer data for each other. CrowdMAC enables (i) mobile clients to select and exploit multiple mobile ...

research-article
Characterization of Wireless Multidevice Users
Article No.: 29, Pages 1–25https://doi.org/10.1145/2955096

The number of wireless-enabled devices owned by a user has had huge growth over the past few years. Over one third of adults in the United States currently own three wireless devices: a smartphone, laptop, and tablet. This article provides a study of ...

Subjects

Comments

Please enable JavaScript to view thecomments powered by Disqus.