Although the Internet of Things (IoT) introduces remarkable ways to collect, manage, and apply data, it's also a huge vector for cyberattacks. One of the biggest vulnerabilities lies in embedded ...
It is no secret that the 4 billion-plus Internet Protocol Version 4 (IPv4) addresses are just about used up. According, the American Registry for Internet Numbers (ARIN), “phase 4” of its IPv4 ...
Wireless standards are plentiful, but most are not capable of being scaled to the level of a smart city. As a result, such networks have been built application-by-application using proprietary stacks, ...
Sponsored by IDT: Energy-constrained IEEE 802.15.4 sensors and devices will form a major portion of the IoT and must meet IPv6 protocols. 6LoWPAN will make that happen. Linking all kinds of different ...
Why the proliferation of wireless protocols is creating headaches for engineers. How multiprotocol wireless SoCs simplify IoT complexity and integration challenges. How innovations are tackling ...
In this paper, the authors discuss security procedures for constrained IoT devices. They start with the description of a general security architecture along with its basic procedures, then discuss how ...
These cybersecurity vulnerabilities could leave millions of connected medical devices open to attack
Critical vulnerabilities in millions of connected devices used in hospital networks could allow attackers to disrupt medical equipment and patient monitors, as well as Internet of Things devices that ...
We've compiled all of the pertinent Internet of Things terminology you should be keeping your eye on. As the Internet of Things (IoT) continues to grow, new information on emerging best practices, ...
A monthly overview of things you need to know as an architect or aspiring architect. Unlock the full InfoQ experience by logging in! Stay updated with your favorite authors and topics, engage with ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results