[PDF][PDF] Exploring data security and privacy issues in internet of things based on five-layer architecture
… to the IP based network … security issues in these two layers. Based on the research survey,
we recommend that each layer must have a security component to handle the security issues …
we recommend that each layer must have a security component to handle the security issues …
An overview of Internet of Things (IoT): Architectural aspects, challenges, and protocols
BB Gupta, M Quamara - Concurrency and Computation …, 2020 - Wiley Online Library
… associated risk factors and resulting challenges, the security issues that are yet to be addressed,
and … IP based Internet is visualized to provide a flexible architecture to IoT. But limited …
and … IP based Internet is visualized to provide a flexible architecture to IoT. But limited …
IoT Security Challenges and Mitigations: An Introduction
S Millar - arXiv preprint arXiv:2112.14618, 2021 - arxiv.org
… [5] warns DTLS applies in IP-based apps but as a secure channel solution it does not fit
into IoT for several reasons. Firstly, there is the overhead of establishing a channel, and …
into IoT for several reasons. Firstly, there is the overhead of establishing a channel, and …
Iotargos: A multi-layer security monitoring system for internet-of-things in smart homes
… the security challenges of IoT systems in smart homes, this paper introduces IoTArgos, a
multi-layer security … an embedded Linux operating system, to automatically collect TCP/IP-based …
multi-layer security … an embedded Linux operating system, to automatically collect TCP/IP-based …
Critical analysis of the layered and systematic approaches for understanding IoT security threats and challenges
R Nath, HV Nath - Computers and Electrical Engineering, 2022 - Elsevier
… security threats holistically. Therefore in our survey, we explore major IoT security threats …
We also examine the proper security requirements to address the devised attack categories. …
We also examine the proper security requirements to address the devised attack categories. …
[图书][B] Internet of Things Security
CK Wu, Wu - 2021 - Springer
… Chapter 10 presents the security problems of RFID security, which is also a specific kind
of … Veltri, Enforcing security mechanisms in the IP-based Internet of things: an algorithmic …
of … Veltri, Enforcing security mechanisms in the IP-based Internet of things: an algorithmic …
Security of Internet of Things Nodes
… security approaches address these security challenges. The … , like software threats and
hardware threats, which can cause … This book focuses on the security challenges of IoT devices …
hardware threats, which can cause … This book focuses on the security challenges of IoT devices …
Design of peer-to-peer protocol with sensible and secure IoT communication for future internet architecture
… With respect to the prevailing IP-based Security Protocol (SecP) suites, … and the security
issues prevailing in IoT. … for communication and interaction between the internet things. They …
issues prevailing in IoT. … for communication and interaction between the internet things. They …
Decades of Internet of Things towards twenty-first century: A research-based introspective
B Nagajayanthi - Wireless Personal Communications, 2022 - Springer
… Security concerns are addressed with micro-segmentation approaches. IoT, an incredible …
heterogeneous things with interoperability through an IP based architecture. Internet-of-things […
heterogeneous things with interoperability through an IP based architecture. Internet-of-things […
Hierarchical naming scheme in named data networking for Internet of Things: A review and future security challenges
… Due to IP-based deployment comes with an issues of scalability and host-centric nature,
NDN provide better support that allows multicasting and mobility thus suited well for PHINet. …
NDN provide better support that allows multicasting and mobility thus suited well for PHINet. …