Search
Search Results
-
Internet of Things Integrated with Multi-level Authentication for Secured IoT Data Stream Through TLS/SSL Layer
With the advancement in recent technology, the world is connected to multiple devices or peripherals through the Internet of things (IoT). Therefore,... -
Robust Channels: Handling Unreliable Networks in the Record Layers of QUIC and DTLS 1.3
The common approach in secure communication channel protocols is to rely on ciphertexts arriving in-order and to close the connection upon any rogue...
-
A Security Policy Engine for Building Energy Management Systems
This paper presents a Policy Engine for securing building energy management systems (BEMSs), a class of industrial control systems (ICSs) requiring... -
Security
As an enterprise Linux administrator, security is of the utmost importance. System or security breaches can spell financial doom for any organization... -
Use of hybrid post-quantum key exchange in internet protocols
This article describes the current situation with incorporating hybrid post-quantum key exchange into the internet security protocols taking TLS 1.3...
-
A Survey on Security Issues of SDN Controllers
Software Defined Network (SDN) separates the data layer and control layer of traditional networks, achieving efficient logical centralized control... -
Privacy and security federated reference architecture for Internet of Things
Physical objects are getting connected to the Internet at an exceptional rate, making the idea of the Internet of Things (IoT) a reality. The IoT...
-
TCP, UDP und QUIC Internals Protokolle und Programmierung
Das Lehrbuch vermittelt praxisbezogen wichtige Grundkonzepte der Datenkommunikation mit einem Fokus auf den wichtigsten Transportprotokollen des...
-
Cryptographic Systems Technologies
Using the building blocks from the previous chapter, this chapter puts them together in two example systems. One of these, Transport Layer Security... -
Enhancing IoT Security: A Blockchain-Based Mitigation Framework for Deauthentication Attacks
The proposed Blockchain-Based Mitigation of Deauthentication Attacks (BBMDA) Framework aims to enhance the security and trustworthiness of IoT...
-
Discussion on a new paradigm of endogenous security towards 6G networks
The sixth-generation mobile communication (6G) networks will face more complex endogenous security problems, and it is urgent to propose new...
-
Transport Layer Security
Die Grundidee von SSL/TLS besteht darin, einen transparenten, verschlüsselten und authentifizierten Kanal zur Verfügung zu stellen, über den... -
Network Security
This chapter presents a number of common ways of protecting systems against various forms of attack via the network. These include:... -
Hel** novice developers harness security issues in cloud-IoT systems
The development of cloud-connected Internet of Things (IoT) systems is becoming more and more affordable, even to novice programmers, thanks to...
-
BlockFaaS: Blockchain-enabled Serverless Computing Framework for AI-driven IoT Healthcare Applications
With the development of new sensor technologies, Internet of Things (IoT)-based healthcare applications have gained momentum in recent years....
-
Communications and Network Security
In the ever-evolving landscape of information technology, Communications and Network Security is a vital domain in professional practice and a... -
Implement Security
Security is paramount when considering which data store to implement for your organization’s critical applications. Cloud-native services greatly... -
Infrastructure Security Patterns
Organizations typically focus on building applications and data-driven software to harvest the value from their data. To create secure and reliable... -
Enhanced authentication security for IoT client nodes through T-ECDSA integrated into MQTT broker
Advancements in computing and communication technology have increased the number of devices connected to the Internet, leading to the emergence of...
-
Transparent Security Method for Automating IoT Security Assessments
People and businesses are dependent on the security of the Internet of Things (IoT). Vendor-independent security assessment and certification intends...