Security threats of communication protocols on the sea, in the air and on land

2016 ◽  
Vol 31 ◽  
pp. 104-108
Author(s):  
Pawel Lubomski ◽  
Katarzyna Kosinska
Author(s):  
Apostolos Gerodimos ◽  
Leandros Maglaras ◽  
NIck Ayres

The IoT is recognized as one of the most important areas of future technology and is gaining vast attention from a wide range of industries. Although, after 20 years from the first published literature (2002) the technology (as a whole) is not yet mature. In this study we will review the basics of IoT with a general approach, by addressing the problems of a standard architecture, vulnerabilities and use cases of this promising technology. Moreover, we will review some of the communication protocols that have invented especially for IoT technology, security threats and general implementation challenges.


Author(s):  
Apostolos Gerodimos ◽  
Leandros Maglaras ◽  
Ioanna Kantzavelou ◽  
NIck Ayres

The IoT is recognized as one of the most important areas of future technology and is gaining vast attention from a wide range of industries. Although, after 20 years from the first published literature (2002) the technology (as a whole) is not yet mature. In this study we will review the basics of IoT with a general approach, by addressing the problems of a standard architecture, vulnerabilities and use cases of this promising technology. Moreover, we will review some of the communication protocols that have invented especially for IoT technology, security threats and general implementation challenges.


1995 ◽  
Vol 34 (01/02) ◽  
pp. 75-78 ◽  
Author(s):  
R. D. Appel ◽  
O. Golaz ◽  
Ch. Pasquali ◽  
J.-C. Sanchez ◽  
A. Bairoch ◽  
...  

Abstract:The sharing of knowledge worldwide using hypermedia facilities and fast communication protocols (i.e., Mosaic and World Wide Web) provides a growth capacity with tremendous versatility and efficacy. The example of ExPASy, a molecular biology server developed at the University Hospital of Geneva, is striking. ExPASy provides hypermedia facilities to browse through several up-to-date biological and medical databases around the world and to link information from protein maps to genome information and diseases. Its extensive access is open through World Wide Web. Its concept could be extended to patient data including texts, laboratory data, relevant literature findings, sounds, images and movies. A new hypermedia culture is spreading very rapidly where the international fast transmission of documents is the central element. It is part of the emerging new “information society”.


2019 ◽  
Vol 22 (4) ◽  
pp. 336-341
Author(s):  
D. V. Ivanov ◽  
D. A. Moskvin

In the article the approach and methods of ensuring the security of VANET-networks based on automated counteraction to information security threats through self-regulation of the network structure using the theory of fractal graphs is provided.


Author(s):  
Shaveta Bhatia

 The epoch of the big data presents many opportunities for the development in the range of data science, biomedical research cyber security, and cloud computing. Nowadays the big data gained popularity.  It also invites many provocations and upshot in the security and privacy of the big data. There are various type of threats, attacks such as leakage of data, the third party tries to access, viruses and vulnerability that stand against the security of the big data. This paper will discuss about the security threats and their approximate method in the field of biomedical research, cyber security and cloud computing.


Sign in / Sign up

Export Citation Format

Share Document