Interoperability, Safety and Security in IoT Second International Conference, InterIoT 2016 and Third International Conference, SaSeIoT 2016, Paris, France, October 26-27, 2016, Revised Selected Papers /

This book constitutes the refereed post-conference proceedings of the International Conference on Safety and Security in Internet of Things , SaSeIoT 2016, which was collocated with InterIoT and took place in Paris, France, in October 2016. The 14 revised full papers were carefully reviewed and sele...

Full description

Corporate Author: SpringerLink (Online service)
Other Authors: Mitton, Nathalie. (Editor, http://id.loc.gov/vocabulary/relators/edt), Chaouchi, Hakima. (Editor, http://id.loc.gov/vocabulary/relators/edt), Noel, Thomas. (Editor, http://id.loc.gov/vocabulary/relators/edt), Watteyne, Thomas. (Editor, http://id.loc.gov/vocabulary/relators/edt), Gabillon, Alban. (Editor, http://id.loc.gov/vocabulary/relators/edt), Capolsini, Patrick. (Editor, http://id.loc.gov/vocabulary/relators/edt)
Language:English
Published: Cham : Springer International Publishing : Imprint: Springer, 2017.
Edition:1st ed. 2017.
Series:Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 190
Subjects:
Online Access:https://doi.org/10.1007/978-3-319-52727-7
Table of Contents:
  • Comparative Analysis of Opportunistic Communication Technologies
  • Technical Overview of F-Interop
  • BMFA: Bi-Directional Multicast Forwarding Algorithm for RPL-based 6LoWPANs
  • Synchronization Abstractions and Separation of Concerns as Key Aspects to the Interoperability in IoT
  • Providing Interoperability for Autonomic Control of Connected Devices
  • A framework to support interoperability in IoT and facilitate the development and deployment of highly distributed cloud applications
  • F-Interop - Online Platform of Interoperability and Performance Tests for the Internet of Things
  • Guard Time Optimisation for Energy Efficiency in IEEE 802.15.4-2015 TSCH Links SaSeIoT
  • On the Performance of Key Pre-distribution for RPL-based IoT Networks
  • Formulating a Global Identifier Based on Actor Relationship for the Internet of Things
  • Framework of Cyber Attack Attribution Based on Threat Intelligence
  • UML Modeling of Cross-layer Attack in Wireless Sensor Networks
  • Adoption of Miniaturized Safety-Related Systems for Industrial Internet-of-Things Applications
  • Identifying DOS and DDOS Attack Origin: IP Traceback Methods Comparison and Evaluation for IoT
  • Framework of Cyber Attack Attribution Based on Threat Intelligence.