for Journals by Title or ISSN
for Articles by Keywords
Followed Journals
Journal you Follow: 0
Sign Up to follow journals, search in your chosen journals and, optionally, receive Email Alerts when new issues of your Followed Journals are published.
Already have an account? Sign In to see the journals you follow.
Similar Journals
Journal Cover
International Journal of Internet of Things and Cyber-Assurance
Number of Followers: 0  
  Hybrid Journal Hybrid journal (It can contain Open Access articles)
ISSN (Print) 2059-7967 - ISSN (Online) 2059-7975
Published by Inderscience Publishers Homepage  [438 journals]
  • Semantically enabling IoT trust to ensure and secure deployment of IoT
    • Authors: Konstantinos Kotis, Iraklis Athanasakis, George A. Vouros
      Pages: 3 - 21
      Abstract: Semantics for the IoT domain have been already introduced for the (semi-)automated deployment of heterogeneous entities. Depending on the level of interoperability and the ability of dynamic expansion of the IoT environment, an application may have to 'decide' (and then select) which devices in that environment are trustworthy for ensuring and securing effective deployment. In the open and distributed IoT, where a large number of heterogeneous entities will be registered, the need to ensure and secure their selection and deployment tasks is highly important. In this paper, an effective modelling approach towards supporting the selection and deployment of IoT entities is presented, based on the notion of trust semantics. Using fuzzy ontologies as an enabler of trust semantics in IoT, this work demonstrates that such semantics, when seamlessly integrated in IoT ontologies, serve as a secure selection key to an IoT application (or service) for selecting, among the available entities, the one(s) that the application should trust for its effective deployment in the specific environment/context.
      Keywords: IoT trust; semantic interoperability; trust semantics; fuzzy semantics; IoT entities deployment; trust ontology; fuzzy ontology; trust interoperability; IoT entities matchmaking; IoT entities selection
      Citation: International Journal of Internet of Things and Cyber-Assurance, Vol. 1, No. 1 (2018) pp. 3 - 21
      PubDate: 2018-03-02T23:20:50-05:00
      DOI: 10.1504/IJITCA.2018.090158
      Issue No: Vol. 1, No. 1 (2018)
  • Main factors and good practices for managing BYOD and IoT risks in a
           K-12 environment
    • Authors: Oluwaseun Akeju, Sergey Butakov, Shaun Aghili
      Pages: 22 - 39
      Abstract: The presented research looks into information security and privacy risk related to using mobile and embedded devices for learning in the K-12 environment. <i>Bring Your Own Device</i> (BYOD) program and <i>Internet of Things</i> (IoT) for learning are the two focus areas discussed in this paper. The NIST privacy risk management framework (NIST-8062) template was used to illustrate the privacy impact factors K-12 ecosystem participants should consider while developing BYOD/IoT programs. The key factors involved in the decisions include reputation costs, direct business costs and non-compliance costs. Key security issues and risks such as network access, server and end-user device malware, application risks, and privacy risks were identified. The analysis of the risks suggested to recommend some good practices derived from various documents suggested by ISACA, IIA, SANS, and NIST. The proposed good practices were subsequently incorporated into BYOD guide for the K-12 system in two Canadian provinces (Alberta and Manitoba) in an attempt to increase its effectiveness in terms of addressing relevant risks. Although the good practices compiled in this research are proposed to be incorporated into the Alberta and Manitoba's BYOD guide for K-12 schools, the same process is applicable to any similar K-12 environment.
      Keywords: bring your own device; BYOD; internet of things; IoT; information security; risk assessment; information privacy; K-12; good practices
      Citation: International Journal of Internet of Things and Cyber-Assurance, Vol. 1, No. 1 (2018) pp. 22 - 39
      PubDate: 2018-03-02T23:20:50-05:00
      DOI: 10.1504/IJITCA.2018.090161
      Issue No: Vol. 1, No. 1 (2018)
  • Internet of things: a survey of challenges and issues
    • Authors: Oluwaseun Akeju, Sergey Butakov, Shaun Aghili
      Pages: 40 - 75
      Abstract: Internet of things (IoT) is the promising and future internet. The IoT is a network of connected sensors, actuators, and everyday objects that are used in various domains, such as healthcare, airports, and military. As it connects everything around us to the internet, the IoT poses a number of severe challenges and issues as compared to the conventional internet. Currently, there are massive studies on the IoT, these studies mostly cover IoT vision, enabling technologies, applications, or services. So far, a limited number of surveys point out comprehensively the challenges and issues of the IoT which considered unique to this future internet and which must be faced and tackled by different research communities. In this paper, well-known IoT challenges and issues (e.g., reliable cooperation, standards, protocols, operational, data, and software) have been surveyed alongside many directions. Furthermore, the paper also raises awareness of work being achieved across a number of research communities to help whoever decided to approach this hot discipline in order to contribute to its development.
      Keywords: internet of things; IoT; wireless sensor; actuator networks; smart objects; smart environments; IoT applications; IoT services; research challenges; survey
      Citation: International Journal of Internet of Things and Cyber-Assurance, Vol. 1, No. 1 (2018) pp. 40 - 75
      PubDate: 2018-03-02T23:20:50-05:00
      DOI: 10.1504/IJITCA.2018.090162
      Issue No: Vol. 1, No. 1 (2018)
  • Towards trusted mobile payment services: a security analysis on Apple
    • Authors: Ashay S. Jawale, Joon S. Park
      Pages: 76 - 90
      Abstract: Today, many stores and users adopt mobile payment services due to the various benefits that the technology can provide. Users can make transactions with their mobile devices such as smart phones instead of physically handing over cash or swiping credit cards. Stores can implement the payment service in a relatively simple and inexpensive way. For both users and stores, the technology increases speed of the check-out process thus reducing the waiting time. The time savings may give more profits to stores. Although the new mobile payment service can provide users and stores with various benefits, it also introduces new security concerns and vulnerabilities. In this paper, we analyse the security features in Apple Pay and discuss possible ways to make it more reliable. Furthermore, once we delve into security vulnerabilities in Apple Pay, we propose the possible solutions along with their implementation to overcome the security concerns in the service.
      Keywords: Apple Pay; mobile payment; secure transaction
      Citation: International Journal of Internet of Things and Cyber-Assurance, Vol. 1, No. 1 (2018) pp. 76 - 90
      PubDate: 2018-03-02T23:20:50-05:00
      DOI: 10.1504/IJITCA.2018.090169
      Issue No: Vol. 1, No. 1 (2018)
  • A study of security and privacy issues associated with the Amazon Echo
    • Authors: Catherine Jackson, Angela Orebaugh
      Pages: 91 - 100
      Abstract: More than 11 million US consumers have an Amazon Echo installed in their homes (Gonzales, 2017). While many consumers view the Amazon Echo as a useful helper in the home to provide information, play music, and order items online, consumers underestimate the device's security and privacy impacts. Additionally, law enforcement officials are beginning to see how consumer internet of things (IoT) devices can provide crucial evidence in cases. This paper presents security and privacy issues with the Amazon Echo and recent cases in which law enforcement officials have employed the Amazon Echo in an investigation. Due to the Amazon Echo's privacy issues and potential uses in court, this paper analyses the fourth amendment in regard to the Amazon Echo. This paper concludes with suggested recommendations that Amazon Echo owners should employ for greater security and privacy.
      Keywords: smart speaker; intelligent personal assistant; virtual assistant; Amazon Echo; Alexa; information security; privacy; law enforcement; internet of things; IoT
      Citation: International Journal of Internet of Things and Cyber-Assurance, Vol. 1, No. 1 (2018) pp. 91 - 100
      PubDate: 2018-03-02T23:20:50-05:00
      DOI: 10.1504/IJITCA.2018.090172
      Issue No: Vol. 1, No. 1 (2018)
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Tel: +00 44 (0)131 4513762
Fax: +00 44 (0)131 4513327
Home (Search)
Subjects A-Z
Publishers A-Z
Your IP address:
About JournalTOCs
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-