Internet of Things: Security in the keys
… as a distributed processing and storage layer for the data collected by IoT deployments and
provides a mechanism for the automatic assessment of data quality and security by means of …
provides a mechanism for the automatic assessment of data quality and security by means of …
A review of security in internet of things
… The implementation of conventional security mechanisms is infeasible since it … security
mechanism for highly constrained devices. This paper presents an analysis of the IoT security …
mechanism for highly constrained devices. This paper presents an analysis of the IoT security …
Security mechanisms of Internet of things (IoT) for reliable communication: a comparative review
B Gupta, KA Kumar - … on Vision Towards Emerging Trends in …, 2019 - ieeexplore.ieee.org
… This paper deals with the various proposed IoT security mechanisms which are capable of
… The paper has been focused on comparative study of emerging security mechanisms of IoT, …
… The paper has been focused on comparative study of emerging security mechanisms of IoT, …
Web of things: security challenges and mechanisms
R Sardar, T Anees - Ieee Access, 2021 - ieeexplore.ieee.org
… The findings of the study revealed that security mechanisms to secure WoT are still … security
challenges in the domain of the WoT; (2) we are identifying the existing security mechanisms …
challenges in the domain of the WoT; (2) we are identifying the existing security mechanisms …
Internet of things: Survey on security and privacy
… For secure communication, security mechanisms have to be adopted over existing MQTT
protocol. [82] proposes a new security solution for MQTT (Secure MQTT or SMQTT) that …
protocol. [82] proposes a new security solution for MQTT (Secure MQTT or SMQTT) that …
Enforcing security in Internet of Things frameworks: A systematic literature review
… From the security requirements of the OSiRM, a crucial aspect of the security mechanism
in the IoT is implemented at the data aggregation layer where the IoT gateway is placed [34]: …
in the IoT is implemented at the data aggregation layer where the IoT gateway is placed [34]: …
Internet of Things–New security and privacy challenges
RH Weber - Computer law & security review, 2010 - Elsevier
… restricting the use of mechanisms of the Internet of Things, rules on IT-security-legislation,
provisions supporting the use of mechanisms of the Internet of Things and the establishment of …
provisions supporting the use of mechanisms of the Internet of Things and the establishment of …
A review on the security of the internet of things: Challenges and solutions
… Confidentiality involves providing the security mechanism in the form of encryption protocol
that would seal the IoT system and make it impossible for a hacker to launch attacks. In so …
that would seal the IoT system and make it impossible for a hacker to launch attacks. In so …
Security in internet of things: Rpl attacks taxonomy
F Azzedin, H Albinali - Proceedings of the 5th International Conference …, 2021 - dl.acm.org
… is no official implementation of security mechanisms that are … security mechanisms. In this
article, we propose novel taxonomy to categorize RPL attacks based on the attack’s mechanism…
article, we propose novel taxonomy to categorize RPL attacks based on the attack’s mechanism…
Proposed embedded security framework for internet of things (iot)
… Embedded Security for IoT will be crucial and important with strong security mechanisms …
However, sound security solutions are not attained easily. There are many challenges that …
However, sound security solutions are not attained easily. There are many challenges that …