Giasoumi, Sofia (author)
Installing wireless sensors on a network of waste containers, that monitor at regular intervals their waste fill levels and transmit the data to the cloud of a waste management operator over the internet, describes the Internet of Things (IoT). With this constant stream of data, the dynamic organization of waste collection schedules is enabled as c...
Pélissier, Samuel Cunche, Mathieu Roca, Vincent Donsez, Didier
In LoRaWAN networks, devices are identified by two identifiers: a globally unique and stable one called DevEUI, and an ephemeral and randomly assigned pseudonym called DevAddr. The association between those identifiers is only known by the network and join servers, and is not available to a passive eavesdropper.In this work, we consider the problem...
Gandhi, Vedant Sardar, Aditi Wani, Paridhee Borase, Rakesh Gawande, Jayanand
Published in
ITM Web of Conferences
Traditional agriculture is converting into smart agriculture due to the bulge of the IoT (Internet of things). An agriculture services platform is developed to support environmental monitoring and to improve the efficiency of agriculture management. Contemporary the Internet of things (IoT) is one of the highest promising application areas in infor...
Rudrawar, Mangesh Sharma, Shivam Thakur, Madhuri Kadam, Vivek
Published in
ITM Web of Conferences
Traditional monitoring systems in coal mines are difficult to install, hazardous, and difficult to power. Because of the complexity of the mining environment and the wide range of operations performed in coal mines, it is vital to monitor and maintain the parameters in the background t increase the efficiency and safety of mineworkers. As a result,...
Chiara, Pier Giorgio
This article aims to cast light on how the fast-evolving European cybersecurity regulatory framework would impact the Internet of Things (IoT) domain. The legal analysis investigates whether and to what extent existing and proposed sectoral EU legislation addresses the manifold challenges in securing IoT and its supply chain. It firstly takes into ...
Bari, Md Faizul Agrawal, Parv Chatterjee, Baibhab Sen, Shreyas
Published in
Frontiers in Electronics
Due to the diverse and mobile nature of the deployment environment, smart commodity devices are vulnerable to various spoofing attacks which can allow a rogue device to get access to a large network. The vulnerability of the traditional digital signature-based authentication system lies in the fact that it uses only a key/pin, ignoring the device f...
Khan, Angshuman Chandra, Saurabh Parameshwara, M C
Published in
Engineering Research Express
The design of an air quality monitoring system is a recent trend and emerging research topic using IoT and wireless sensor technology. The massive number of automobiles entering metropolitan areas contributes to increased air pollution and lower air quality, which leads to serious health problems. The paper’s primary goal is to introduce a vehicula...
Lemogue, Arnol MARTINEZ BOLIVAR, Ivan Marino Toutain, Laurent Bouabdallah, Ahmed
We are witnessing an exponential increase in IoT applications resting on global mobility of objects. Mobility requires moreover roaming to allow any device to move from one IoT network operator to another. The solutions proposed in the literature are however neither scalable nor secure. The consequences for devices' owners with large fleets of roam...
Zhang, Chong Lu, Li Song, Yihang Meng, Qianhe Zhang, Junqin Shao, Xiandong Zhang, Guangyuan Hou, Mengshu
Published in
Sensors (Basel, Switzerland)
The rapid development of Internet of Things (IoT) applications calls for light-weight IoT sensor nodes with both low-power consumption and excellent task execution efficiency. However, in the existing system framework, designers must make trade-offs between these two. In this paper, we propose an "edge-to-end integration" design paradigm, Butterfly...
Chiara, Pier Giorgio
This contribution highlights how the Delegated Regulation (EU) 2022/30 - activating the essential requirements of Article 3(3)(d), (e) and (f) of Directive 2014/53/EU on radio equipment (RED) - will enhance and complement existing cybersecurity and privacy & data protection EU legal frameworks while strengthening the (cyber)security of wireless (Io...