1. Home
  2. Browse by Author

Browsing by Author "Kogias, Dimitrios G."

Filter results by typing the first few letters
Now showing 1 - 2 of 2
  • Results Per Page
  • Sort Options
  • Loading...
    Thumbnail Image
    bookpart.listelement.badge
    Realizing the wireless technology in internet of things (IoT)
    (Springer Singapore, 2018) Kogias, Dimitrios G.; Michailidis, Emmanouel T.; Tuna, Gurkan; Gungor, Vehbi Cagri; 0000-0003-0803-8372; AGÜ, Mühendislik Fakültesi, Bilgisayar Mühendisliği Bölümü; Gungor, Vehbi Cagri
    The evolution of the Internet of Things (IoT) has been highly based on the advances on wireless communications and sensing capabilities of smart devices, along with a, still increasing, number of applications that are being developed which manage to cover various small and more important aspects of every people's life. This chapter aims at presenting the wireless technologies and protocols that are used for the IoT communications, along with the main architectures and middleware that have been proposed to serve and enhance the IoT capabilities and increase its efficiency. Finally, since the generated data that are spread in an IoT ecosystem might include sensitive information (e.g., personal medical data by sensors), we will also discuss the security and privacy hazards that are introduced from the advances in the development and application of an IoT environment.
  • Loading...
    Thumbnail Image
    Article
    A survey on information security threats and solutions for Machine to Machine (M2M) communications
    (ACADEMIC PRESS INC ELSEVIER SCIENCE, 525 B ST, STE 1900, SAN DIEGO, CA 92101-4495 USA, 2017) Tuna, Gurkan; Kogias, Dimitrios G.; Gungor, V. Cagri; Gezer, Cengiz; Taskin, Erhan; Ayday, Erman; AGÜ, Mühendislik Fakültesi, Bilgisayar Mühendisliği Bölümü;
    Although Machine to Machine (M2M) networks allow the development of new promising applications, the restricted resources of machines and devices in the M2M networks bring several constraints including energy, bandwidth, storage, and computation. Such constraints pose several challenges in the design of M2M networks. Furthermore, some elements that contributed to the rise of M2M applications have caused several new security threats and risks, typically due to the advancements in technology, increasing computing power, declining hardware costs, and freely available software tools. Due to the restricted capabilities of M2M devices, most of the recent research efforts on M2M have focused on computing, resource management, sensing, congestion control and controlling technologies. However, there are few studies on security aspects and there is a need to introduce the threats existing in M2M systems and corresponding solutions. Accordingly, in this paper, after presenting an overview of potential M2M applications, we present a survey of security threats against M2M networks and solutions to prevent or reduce their impact. Then, we investigate security-related challenges and open research issues in M2M networks to provide an insight for future research opportunities. Moreover, we discuss the oneM2M standard, one of the prominent standard initiatives for more secure and smoother M2M networks and the Internet of Things. (C) 2017 Elsevier Inc. All rights reserved.