Internet of Things (IoT) security with blockchain technology: A state-of-the-art review

AA Khan, AA Laghari, ZA Shaikh… - IEEE …, 2022 - ieeexplore.ieee.org
… operations to be performed along with the requirement of security in the IIoT. Further, integrity
… Various experts on IoT analyze the billion-dollar impact of internet things in the industrial …

[PDF][PDF] A review of middleware platforms in internet of things: a non–functional requirements approach

HW Raza, MA Kamal, M Alam… - Journal of Independent …, 2020 - researchgate.net
… in terms of non-functional requirements and in middleware requirements. There are some
specific requirements where researchers need to work which are in terms of security, privacy, …

[HTML][HTML] A comprehensive and systematic survey on the internet of things: Security and privacy challenges, security frameworks, enabling technologies, threats …

MA Obaidat, S Obeidat, J Holst, A Al Hayajneh… - Computers, 2020 - mdpi.com
… The difference between traditional IT security requirements and IoT security requirements
is also discussed and the need for a multi-layer and cross-layer approach to security is …

An overview of Internet of Things (IoT): Architectural aspects, challenges, and protocols

BB Gupta, M Quamara - Concurrency and Computation …, 2020 - Wiley Online Library
… provide are going to impose specific requirements, among which security is the most prominent
one. Therefore, in order to comprehend and conform these requirements, there is a need …

Security in 5G-enabled internet of things communication: issues, challenges, and future research roadmap

M Wazid, AK Das, S Shetty, P Gope… - IEEE …, 2020 - ieeexplore.ieee.org
… The details of security requirements and attacks possible in this … of security requirements
and potential attacks in 5G-enabled IoT environment. The numerous categories of security

[引用][C] A review on security and privacy issues and challenges in internet of things

DK Alferidah, NZ Jhanjhi - … Journal of Computer Science and Network Security …, 2020

Towards a secure 5G-enabled Internet of Things: A survey on requirements, privacy, security, challenges, and opportunities

SF Ahmed, MSB Alam, S Afrin, SJ Rafa, SB Taher… - IEEE …, 2024 - ieeexplore.ieee.org
… In contrast, this review concentrates on privacy and security concerns, enabling technology
drivers in 5G-IoT layers, and 5G-enabled IoT requirements, providing consumers with …

Recent advances in the internet-of-medical-things (IoMT) systems security

A Ghubaish, T Salman, M Zolanvari… - … Internet of Things …, 2020 - ieeexplore.ieee.org
… 1) We review the security requirements that are necessary for IoMT systems as well as
different types of techniques to provide secure data collection, transmission, and storage. …

Configuring data flows in the Internet of Things for security and privacy requirements

L Logrippo, A Stambouli - Foundations and Practice of Security: 11th …, 2019 - Springer
… does not guarantee that a system will actually function, it can only guarantee conformity
to data security requirements, essentially that certain data can or cannot reach certain ‘things’. …

[图书][B] The Internet of Things: What Everyone Needs to Know?

SJ Shackelford - 2020 - books.google.com
… The Mirai botnet was so successful, and noteworthy, because it took advantage of security
weaknesses in Internet-connected devices such as security cameras and home routers. …