Taxonomy and analysis of security protocols for Internet of Things
… We discuss the security requirements that are essential for designing security protocols
in the IoT environment. We highlight various attacks related to the IoT environment. We also …
in the IoT environment. We highlight various attacks related to the IoT environment. We also …
[PDF][PDF] Internet of things security based on devices architecture
TM Alfaqih, J Al-Muhtadi - International Journal of Computer Applications, 2016 - Citeseer
… In this paper we will present the security and privacy when using the Internet of Things … be
focusing on how security building in the devices, and protection requirements, by studying the …
focusing on how security building in the devices, and protection requirements, by studying the …
Emerging challenges and requirements for Internet of Things in 5G
… and reliability, privacy and security exist in most IoT systems. In this section, the challenges
and requirements in terms of system design and privacy and security are presented when …
and requirements in terms of system design and privacy and security are presented when …
[HTML][HTML] Prospect of internet of medical things: A review on security requirements and solutions
With the widespread and increasing use of Internet-of-Things (IoT) devices in all aspects of
daily life, a hopeful future for people, data, and processes is emerging. Extensive spans allow …
daily life, a hopeful future for people, data, and processes is emerging. Extensive spans allow …
Unification of Blockchain and Internet of Things (BIoT): requirements, working model, challenges and future directions
… covers the architecture, requirements and threats to the IoT systems, background and
working of blockchain, optimized BIoT architecture, Blockchain based IoT security solutions, and …
working of blockchain, optimized BIoT architecture, Blockchain based IoT security solutions, and …
Security in Internet of Things: issues, challenges, taxonomy, and architecture
V Adat, BB Gupta - Telecommunication Systems, 2018 - Springer
… The tradeoff between these two techniques is usually based on the security requirement of
… The security requirements of application layer can be considered in two different aspects. On …
… The security requirements of application layer can be considered in two different aspects. On …
IoTsec: UML extension for internet of things systems security modelling
DA Robles-Ramirez… - 2017 International …, 2017 - ieeexplore.ieee.org
… for this task, where the security requirements can be mapped to … security requirements of
each system. The Open Web Application Security Project’s (OWASP) [7] List of Top Ten Internet …
each system. The Open Web Application Security Project’s (OWASP) [7] List of Top Ten Internet …
Internet of things (IoT): security and privacy threats
E Shaikh, I Mohiuddin… - … & Information Security …, 2019 - ieeexplore.ieee.org
… security thing and a security attack is that, a security thing is a thing which meets all of the
IAS-octave security requirements, whereas a security … the IASoctave security requirements [1]. …
IAS-octave security requirements, whereas a security … the IASoctave security requirements [1]. …
Industrial internet of things: Requirements, architecture, challenges, and future research directions
… 4 in terms of concepts, requirements and supporting technology. In addition, we discuss
the correlation between enabling technology and technical requirements in detail. Finally, our …
the correlation between enabling technology and technical requirements in detail. Finally, our …
[PDF][PDF] Security issues in internet of things
… While without providing enough security, the promising benefits of Internet of Things will be
… Internet of Things, its applications, security requirements, security issues and major security …
… Internet of Things, its applications, security requirements, security issues and major security …