Security challenges against cognitive IoT development

dc.contributor.authorFourati, Lamia Chaari
dc.contributor.authorFourati, Mohamed
dc.contributor.authorMnaouer, Adel Ben
dc.date.accessioned2020-02-03T12:30:12Z
dc.date.available2020-02-03T12:30:12Z
dc.date.copyright2018en_US
dc.date.issued2018
dc.descriptionThis conference paper is not available at CUD collection. The version of scholarly record of this conference paper is published in 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC) (2018), available online at: https://doi.org/10.1109/IWCMC.2018.8450490.en_US
dc.description.abstractInternet of things has the ability to control and impact our physical world through technology by combining data collected from sensors and databases along with mining computational intelligence and analytics within IoT platforms. This is leading to a new generation of IoT solutions based on cognition and intelligent reasoning and known as cognitive IoT that will to paving the way to the deployment of new powerful tools. However, this cognition is susceptible to heavy risks related to security and privacy risks and vulnerabilities. In this context, this study will identify cognition and computing intelligence associated to IoT and highlights possible threats and attacks. © 2018 IEEE.en_US
dc.description.sponsorshipFrederick University
dc.identifier.citationFourati, L. C., Fourati, M., & Benmnaouer, A. (2018). Security challenges against cognitive IoT development. In 2018 14th International Wireless Communications and Mobile Computing Conference, IWCMC 2018 (pp. 1069–1073). https://doi.org/10.1109/IWCMC.2018.8450490en_US
dc.identifier.isbn9781538620700
dc.identifier.urihttp://dx.doi.org/10.1109/IWCMC.2018.8450490
dc.identifier.urihttps://hdl.handle.net/20.500.12519/107
dc.language.isoenen_US
dc.publisherInstitute of Electrical and Electronics Engineers Inc.en_US
dc.relationAuthors Affiliations: Fourati, L.C., LT2S Laboratory, Digital Research Center of Sfax (CNRS), Sfax University, Tunisia; Fourati, M., LT2S Laboratory, Digital Research Center of Sfax (CNRS), Sfax University, Tunisia; Benmnaouer, A., Canadian University Dubai, Dubai, United Arab Emirates
dc.relation.ispartofseries2018 14th International Wireless Communications and Mobile Computing Conference, IWCMC 2018;
dc.rightsPermission to reuse abstract has been secured from Institute of Electrical and Electronics Engineers Inc.
dc.rights.holderCopyright : 2018 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
dc.rights.urihttps://www.ieee.org/publications/rights/rights-policies.html
dc.subjectArtificial intelligenceen_US
dc.subjectData privacyen_US
dc.subjectLearning systemsen_US
dc.subjectMobile computingen_US
dc.subjectWireless telecommunication systemsen_US
dc.subjectCognitiveen_US
dc.subjectComputing intelligenceen_US
dc.subjectIntelligent reasoningen_US
dc.subjectPhysical worlden_US
dc.subjectSecurityen_US
dc.subjectSecurity and privacyen_US
dc.subjectSecurity challengesen_US
dc.subjectThreats and attacksen_US
dc.subjectInternet of Things (IoT)en_US
dc.titleSecurity challenges against cognitive IoT developmenten_US
dc.typeConference Paperen_US

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Access Instruction 107.pdf
Size:
102.93 KB
Format:
Adobe Portable Document Format
Description: