Selected Articles from IEEE Xplore - February 2016
Introduction by Tom Coughlin, IEEE Senior Member
With the proliferation of smart connected devices in our homes, our automobiles and in wearable electronic devices, security and privacy have become crucial design requirements. These smart devices will be part of a non-hierarchical and intermittent local wired or wireless network perhaps through mobile phones or behind a gateway that connects them with enhanced services available in large data centers (the cloud). Data from these devices provides business intelligence for industries as well as services for consumers but also can be a source of more sophisticated identity theft, spoofing or spying. The creation of methods for anonymous sharing of person data as well as strong encryption of this data will be an essential element in creating a safe and secure consumer Internet of Things.
IEEE Xplore References
- J. Decuir, "The Story of the Internet of Things: Issues in utility, connectivity, and security.," in IEEE Consumer Electronics Magazine, vol. 4, no. 4, pp. 54-61, Oct. 2015.
- F. K. Santoso and N. C. H. Vun, "Securing IoT for smart home system," 2015 International Symposium on Consumer Electronics (ISCE), Madrid, 2015, pp. 1-2.
- R. Hiesgen, D. Charousset and T. C. Schmidt, "Embedded Actors - Towards distributed programming in the IoT," 2014 IEEE Fourth International Conference on Consumer Electronics Berlin (ICCE-Berlin), Berlin, 2014, pp. 371-375.
- T. Coughlin, "The internet of things meets the storage of everything [The Art of Storage]," in IEEE Consumer Electronics Magazine, vol. 4, no. 2, pp. 118-120, April 2015.
Subscribe to the IEEE Internet of Things Technical Community to receive complimentary access to our selected articles each month via email.