مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

video

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

sound

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Version

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View:

165
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Download:

236
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Cites:

Information Journal Paper

Title

Home appliances energy management based on the IoT system

Pages

  167-175

Abstract

 The idea of the Internet of Things (IoT) has turned out to be increasingly prominent in the cutting edge period of innovation than at any other time. From little family unit gadgets to extensive modern machines, the vision of IoT has made it conceivable to interface the gadgets with the physical world around them. This expanding prominence has likewise made the IoT gadgets and applications in the focal point of consideration among aggressors. O cially, a few sorts of pernicious exercises exist that endeavor to bargain the security and protection of the IoT gadgets. One fascinating rising risk vector is the assaults that misuse the utilization of sensors on IoT gadgets. IoT gadgets are powerless against sensor-based dangers because of the absence of legitimate security estimations accessible to control the utilization of sensors by applications. By abusing the sensors (e. g., accelerometer, gyrator, mouthpiece, light sensor, and so on. ) on an IoT gadget, assailants can separate data from the gadget, exchange malware to a gadget, or trigger a pernicious movement to bargain the gadget. In this review, we investigate di erent dangers focusing on IoT gadgets and talk about how their sensors can be mishandled for malignant purposes. Speci cally, we present an itemized study about existing sensor-based dangers to IoT gadgets and countermeasures that are grown speci cally to verify the sensors of IoT gadgets. Besides, we talk about the security and protection issues of IoT gadgets with regards to sensor-based dangers and nish up with future research headings.

Multimedia

  • No record.
  • Cites

  • No record.
  • References

  • No record.
  • Cite

    APA: Copy

    Hosseinian, Heliasadat, Damghani, Hamidreza, Damghani, Leila, Nezam, Golnoosh, & Hosseinian, Hediyehsadat. (2019). Home appliances energy management based on the IoT system. INTERNATIONAL JOURNAL OF NONLINEAR ANALYSIS AND APPLICATIONS, 10(1), 167-175. SID. https://sid.ir/paper/340912/en

    Vancouver: Copy

    Hosseinian Heliasadat, Damghani Hamidreza, Damghani Leila, Nezam Golnoosh, Hosseinian Hediyehsadat. Home appliances energy management based on the IoT system. INTERNATIONAL JOURNAL OF NONLINEAR ANALYSIS AND APPLICATIONS[Internet]. 2019;10(1):167-175. Available from: https://sid.ir/paper/340912/en

    IEEE: Copy

    Heliasadat Hosseinian, Hamidreza Damghani, Leila Damghani, Golnoosh Nezam, and Hediyehsadat Hosseinian, “Home appliances energy management based on the IoT system,” INTERNATIONAL JOURNAL OF NONLINEAR ANALYSIS AND APPLICATIONS, vol. 10, no. 1, pp. 167–175, 2019, [Online]. Available: https://sid.ir/paper/340912/en

    Related Journal Papers

  • No record.
  • Related Seminar Papers

  • No record.
  • Related Plans

  • No record.
  • Recommended Workshops






    Move to top
    telegram sharing button
    whatsapp sharing button
    linkedin sharing button
    twitter sharing button
    email sharing button
    email sharing button
    email sharing button
    sharethis sharing button