Taxonomy and analysis of security protocols for Internet of Things

AK Das, S Zeadally, D He - Future Generation Computer Systems, 2018 - Elsevier
… We discuss the security requirements that are essential for designing security protocols
in the IoT environment. We highlight various attacks related to the IoT environment. We also …

[PDF][PDF] Internet of things security based on devices architecture

TM Alfaqih, J Al-Muhtadi - International Journal of Computer Applications, 2016 - Citeseer
… In this paper we will present the security and privacy when using the Internet of Things … be
focusing on how security building in the devices, and protection requirements, by studying the …

Emerging challenges and requirements for Internet of Things in 5G

L Xu, AD Jurcut, H Ahmadi - 5G-Enabled Internet of Things, 2019 - taylorfrancis.com
… and reliability, privacy and security exist in most IoT systems. In this section, the challenges
and requirements in terms of system design and privacy and security are presented when …

[HTML][HTML] Prospect of internet of medical things: A review on security requirements and solutions

PK Sadhu, VP Yanambaka, A Abdelgawad… - Sensors, 2022 - mdpi.com
With the widespread and increasing use of Internet-of-Things (IoT) devices in all aspects of
daily life, a hopeful future for people, data, and processes is emerging. Extensive spans allow …

Unification of Blockchain and Internet of Things (BIoT): requirements, working model, challenges and future directions

B Bhushan, C Sahoo, P Sinha, A Khamparia - Wireless Networks, 2021 - Springer
… covers the architecture, requirements and threats to the IoT systems, background and
working of blockchain, optimized BIoT architecture, Blockchain based IoT security solutions, and …

Security in Internet of Things: issues, challenges, taxonomy, and architecture

V Adat, BB Gupta - Telecommunication Systems, 2018 - Springer
… The tradeoff between these two techniques is usually based on the security requirement of
… The security requirements of application layer can be considered in two different aspects. On …

IoTsec: UML extension for internet of things systems security modelling

DA Robles-Ramirez… - 2017 International …, 2017 - ieeexplore.ieee.org
… for this task, where the security requirements can be mapped to … security requirements of
each system. The Open Web Application Security Project’s (OWASP) [7] List of Top Ten Internet

Internet of things (IoT): security and privacy threats

E Shaikh, I Mohiuddin… - … & Information Security  …, 2019 - ieeexplore.ieee.org
security thing and a security attack is that, a security thing is a thing which meets all of the
IAS-octave security requirements, whereas a security … the IASoctave security requirements [1]. …

Industrial internet of things: Requirements, architecture, challenges, and future research directions

M Alabadi, A Habbal, X Wei - IEEE Access, 2022 - ieeexplore.ieee.org
… 4 in terms of concepts, requirements and supporting technology. In addition, we discuss
the correlation between enabling technology and technical requirements in detail. Finally, our …

[PDF][PDF] Security issues in internet of things

LS Sayana, BK Joshi - Uttarakhand: ICFAI, 2016 - researchgate.net
… While without providing enough security, the promising benefits of Internet of Things will be
Internet of Things, its applications, security requirements, security issues and major security