International audienceTo empower end-users in the management of their IoT devices and related services, a natural solution is to design and implement a digital assistant whose role is to facilitate use of IoT devices, e.g. by recommending available services for the given set of existing IoT devices. This digital assistant must be able to identify the core capabilities of the IoT devices that are connected to home networks. In turn, this requires to identify the nature of the IoT devices connected to these home networks (e.g., category of the device, but also manufacturer and exact model of the device). In this article, we address this issue of IoT device identification. We propose a solution based on several existing network protocols. The ...
Billions of devices are connected to networks, which share data between them or with the processing ...
IoT devices are being widely deployed. But the huge variance among them in the level of security and...
IoT devices are being widely deployed. But the huge variance among them in the level of security and...
International audienceTo empower end-users in the management of their IoT devices and related servic...
International audienceTo empower end-users in the management of their IoT devices and related servic...
In an Internet of Things (IoT) environment, a large volume of potentially confidential data might be...
In an Internet of Things (IoT) environment, a large volume of potentially confidential data might be...
In an Internet of Things (IoT) environment, a large volume of potentially confidential data might be...
In an Internet of Things (IoT) environment, a large volume of potentially confidential data might be...
Best demo award: https://tma.ifip.org/2019/awards/International audienceIn this paper, we demonstrat...
| openaire: EC/H2020/688203/EU//bIoTope | openaire: EC/H2020/856602/EU//FINEST TWINSIn an Internet o...
Currently, the methods of identification of devices of the Internet of things are one of the main to...
© 2018 IEEE. With the widespread adoption of Internet of Things (IoT), billions of everyday objects ...
IoT devices are being widely deployed. But the huge variance among them in the level of security and...
International audienceA wide diversity of IoT devices are connected in various smart homes with an e...
Billions of devices are connected to networks, which share data between them or with the processing ...
IoT devices are being widely deployed. But the huge variance among them in the level of security and...
IoT devices are being widely deployed. But the huge variance among them in the level of security and...
International audienceTo empower end-users in the management of their IoT devices and related servic...
International audienceTo empower end-users in the management of their IoT devices and related servic...
In an Internet of Things (IoT) environment, a large volume of potentially confidential data might be...
In an Internet of Things (IoT) environment, a large volume of potentially confidential data might be...
In an Internet of Things (IoT) environment, a large volume of potentially confidential data might be...
In an Internet of Things (IoT) environment, a large volume of potentially confidential data might be...
Best demo award: https://tma.ifip.org/2019/awards/International audienceIn this paper, we demonstrat...
| openaire: EC/H2020/688203/EU//bIoTope | openaire: EC/H2020/856602/EU//FINEST TWINSIn an Internet o...
Currently, the methods of identification of devices of the Internet of things are one of the main to...
© 2018 IEEE. With the widespread adoption of Internet of Things (IoT), billions of everyday objects ...
IoT devices are being widely deployed. But the huge variance among them in the level of security and...
International audienceA wide diversity of IoT devices are connected in various smart homes with an e...
Billions of devices are connected to networks, which share data between them or with the processing ...
IoT devices are being widely deployed. But the huge variance among them in the level of security and...
IoT devices are being widely deployed. But the huge variance among them in the level of security and...