Security and privacy in the medical internet of things: a review

W Sun, Z Cai, Y Li, F Liu, S Fang… - Security and …, 2018 - Wiley Online Library
security and privacy as a core consideration. This paper proceeds as follows. In Section 2,
we discuss the security … solutions and research status about security and privacy issues. In …

[PDF][PDF] IOT supported security considerations for network

K Thamizhmaran - WSEAS Transactions on Communications, 2020 - academia.edu
… of data in excess of 20 billion Internet-connected objects and sensors (things) by 2022. The
… In this paper, we overview both IoT enabled network architecture as well as security for …

The Internet of Things vision: Key features, applications and open issues

E Borgia - Computer Communications, 2014 - Elsevier
… where Internet is connected to the physical world through ubiquitous sensors and a platform
based on real-time feedbacks, which have a huge potential to enhance comfort, security

Evolving authentication design considerations for the internet of biometric things (IoBT)

N Karimian, PA Wortman, F Tehranipoor - … of the eleventh IEEE/ACM/IFIP …, 2016 - dl.acm.org
… Postualte use cases, implementation considerations, and ease of adoption for … into IoT
devices along with consideration of security considerations brought about by implementation. We …

The ecosystem of IoT security considerations and generic framework of IoT

CH Sandeep, CH Pradeep, M Mendu… - AIP Conference …, 2022 - pubs.aip.org
… This paper provides iot ecosystem security considerations and also the generic framework
… This paper provided the IoT ecosystem security considerations and also the generic …

Cyber security considerations for designing IoT-based control systems

K Kim - Information Security Applications: 16th International …, 2016 - Springer
… However, considering the adverse side-effects of IT, security considerations must be given
to all aspects of the potential threats. Initially, when the Internet was designed and came into …

Internet of Things: Convenience vs. privacy and secrecy

BD Weinberg, GR Milne, YG Andonova, FM Hajjat - Business horizons, 2015 - Elsevier
… In this article we introduce the Internet of Things to the broad managerial community and
explore one of its central tensions: convenience vs. privacy and secrecy. We clarify the ways in …

Wireless communication and security issues for cyber–physical systems and the Internet-of-Things

A Burg, A Chattopadhyay, KY Lam - Proceedings of the IEEE, 2017 - ieeexplore.ieee.org
Security Requirements:The security requirements impact different layers depending on the
specific security … We note that there is a gap between the information-theoretic security tech…

Privacy in the Internet of Things: threats and challenges

JH Ziegeldorf, OG Morchon… - Security and …, 2014 - Wiley Online Library
… , for example, in Radomirovic's dense Internet of Things model 13. We thus believe that
the presented reference model adequately addresses our considerations and requirements. …

Security risk assessment in internet of things systems

JRC Nurse, S Creese, D De Roure - IT professional, 2017 - ieeexplore.ieee.org
Information security risk assessment methods have served us well over the past two
decades. They have provided a tool for organizations and governments to use in protecting …