Internet of Things (IoT) security with blockchain technology: A state-of-the-art review
… operations to be performed along with the requirement of security in the IIoT. Further, integrity
… Various experts on IoT analyze the billion-dollar impact of internet things in the industrial …
… Various experts on IoT analyze the billion-dollar impact of internet things in the industrial …
[PDF][PDF] A review of middleware platforms in internet of things: a non–functional requirements approach
… in terms of non-functional requirements and in middleware requirements. There are some
specific requirements where researchers need to work which are in terms of security, privacy, …
specific requirements where researchers need to work which are in terms of security, privacy, …
[HTML][HTML] A comprehensive and systematic survey on the internet of things: Security and privacy challenges, security frameworks, enabling technologies, threats …
… The difference between traditional IT security requirements and IoT security requirements
is also discussed and the need for a multi-layer and cross-layer approach to security is …
is also discussed and the need for a multi-layer and cross-layer approach to security is …
An overview of Internet of Things (IoT): Architectural aspects, challenges, and protocols
BB Gupta, M Quamara - Concurrency and Computation …, 2020 - Wiley Online Library
… provide are going to impose specific requirements, among which security is the most prominent
one. Therefore, in order to comprehend and conform these requirements, there is a need …
one. Therefore, in order to comprehend and conform these requirements, there is a need …
Security in 5G-enabled internet of things communication: issues, challenges, and future research roadmap
… The details of security requirements and attacks possible in this … of security requirements
and potential attacks in 5G-enabled IoT environment. The numerous categories of security …
and potential attacks in 5G-enabled IoT environment. The numerous categories of security …
[引用][C] A review on security and privacy issues and challenges in internet of things
DK Alferidah, NZ Jhanjhi - … Journal of Computer Science and Network Security …, 2020
Towards a secure 5G-enabled Internet of Things: A survey on requirements, privacy, security, challenges, and opportunities
SF Ahmed, MSB Alam, S Afrin, SJ Rafa, SB Taher… - IEEE …, 2024 - ieeexplore.ieee.org
… In contrast, this review concentrates on privacy and security concerns, enabling technology
drivers in 5G-IoT layers, and 5G-enabled IoT requirements, providing consumers with …
drivers in 5G-IoT layers, and 5G-enabled IoT requirements, providing consumers with …
Recent advances in the internet-of-medical-things (IoMT) systems security
… 1) We review the security requirements that are necessary for IoMT systems as well as
different types of techniques to provide secure data collection, transmission, and storage. …
different types of techniques to provide secure data collection, transmission, and storage. …
Configuring data flows in the Internet of Things for security and privacy requirements
L Logrippo, A Stambouli - Foundations and Practice of Security: 11th …, 2019 - Springer
… does not guarantee that a system will actually function, it can only guarantee conformity
to data security requirements, essentially that certain data can or cannot reach certain ‘things’. …
to data security requirements, essentially that certain data can or cannot reach certain ‘things’. …
[图书][B] The Internet of Things: What Everyone Needs to Know?
SJ Shackelford - 2020 - books.google.com
… The Mirai botnet was so successful, and noteworthy, because it took advantage of security
weaknesses in Internet-connected devices such as security cameras and home routers. …
weaknesses in Internet-connected devices such as security cameras and home routers. …