Application specific internet of things (ASIoTs): Taxonomy, applications, use case and future directions
KLM Ang, JKP Seng - IEEE Access, 2019 - ieeexplore.ieee.org
… Although the security requirements for the IoMT may not be as stringent as for the IoBT, the
security and privacy of the patients’ records also require protection from unauthorized access. …
security and privacy of the patients’ records also require protection from unauthorized access. …
Design guidelines for machine learning-based cybersecurity in internet of things
A Boukerche, RWL Coutinho - IEEE Network, 2020 - ieeexplore.ieee.org
… (ML)-based solutions to secure the Internet of things (IoT). We described the fundamental
design requirements and challenges of cybersecurity solutions for IoT. Hence, we discussed …
design requirements and challenges of cybersecurity solutions for IoT. Hence, we discussed …
Designing privacy-aware internet of things applications
… This intertwining of security and privacy issues, means that privacy needs to be considered
as a key requirement for IoT applications. However, thus far, privacy concerns have not been …
as a key requirement for IoT applications. However, thus far, privacy concerns have not been …
Safety, security, and privacy threats posed by accelerating trends in the internet of things
The Internet of Things (IoT) is already transforming industries, cities, and homes. The economic
value of this transformation across all industries is estimated to be trillions of dollars and …
value of this transformation across all industries is estimated to be trillions of dollars and …
Internet of Things security threats and key technologies
SA Fadhil - Journal of Discrete Mathematical Sciences and …, 2021 - Taylor & Francis
… security solutions at the application layer is also different and different in synthesis. The
security requirements … The key technology of application layer security can include two aspects. …
security requirements … The key technology of application layer security can include two aspects. …
A survey on security and privacy issues in edge-computing-assisted internet of things
… types of security and privacy mechanisms, requirements, and … Yao, “Security and privacy
preservation scheme of face … in Internet of Things,” IEEE Internet Things J., vol. 4, no. 5, pp. …
preservation scheme of face … in Internet of Things,” IEEE Internet Things J., vol. 4, no. 5, pp. …
[PDF][PDF] Exploring data security and privacy issues in internet of things based on five-layer architecture
… IoT security requirements [10]. In Table 3, IoT properties are given in the column and the …
security requirements are given in the row. The first IoT security requirement, network security is …
security requirements are given in the row. The first IoT security requirement, network security is …
A critical cybersecurity analysis and future research directions for the internet of things: a comprehensive review
… when designing security measures. On the other hand, classical wireless networks and
devices may have different requirements and capabilities. While some security principles may …
devices may have different requirements and capabilities. While some security principles may …
AI-based joint optimization of QoS and security for 6G energy harvesting Internet of Things
… -level security protections consume too much energy even though the security requirement
may be … ensemble classification for face recognition,” IEEE Internet Things J., vol. 6, no. 3, pp. …
may be … ensemble classification for face recognition,” IEEE Internet Things J., vol. 6, no. 3, pp. …
Machine learning based solutions for security of Internet of Things (IoT): A survey
Over the last decade, IoT platforms have been developed into a global giant that grabs every
aspect of our daily lives by advancing human life with its unaccountable smart services. …
aspect of our daily lives by advancing human life with its unaccountable smart services. …