On the security aspects of Internet of Things: A systematic literature review

ELC Macedo, EAR De Oliveira, FH Silva… - Journal of …, 2019 - ieeexplore.ieee.org
… They also point out security … , “Security and privacy preservation scheme of face identification
and resolution framework using fog computing in internet of things,” IEEE Internet Things J., …

[PDF][PDF] Internet of things (IoT) security: current status, challenges and countermeasures

T Yousuf, R Mahmoud, F Aloul… - … for Information Security …, 2015 - shop.iotone.ir
security issues at perception layer can be coped with by using encryption (which can be
point-to-point … Further security measures and protocols to address this issue are given in Section …

Fog computing for the internet of things: Security and privacy issues

A Alrawais, A Alhothaily, C Hu… - IEEE Internet …, 2017 - ieeexplore.ieee.org
… Because the bloom filter size is directly related to the resource consumption, we start
from the point of analyzing the bloom filter size in our scheme and compare it with other revocation …

Security Challenges in the IP-based Internet of Things

T Heer, O Garcia-Morchon, R Hummen… - Wireless Personal …, 2011 - Springer
… – Security bootstrapping denotes the process by which a thing securely joins the IoT at a
given location and point in time. Bootstrapping includes the authentication and authorization of …

Security challenges and concerns of Internet of Things (IoT)

A Bhattacharjya, X Zhong, J Wang, X Li - … Systems: architecture, security …, 2019 - Springer
Security (DTLS) as our security protocol that depends on this protocol stack. Alike the security
needs in traditional networks, such as the Internet… The Second point is that if we think about …

Internet of things (IoT) security: Current status, challenges and prospective measures

R Mahmoud, T Yousuf, F Aloul… - … conference for internet …, 2015 - ieeexplore.ieee.org
… The above listed security issues at perception layer can be addressed by using encryption
(which can be point-to-point … Further security measures and protocols are given in Section IV. …

Security in Internet of Things: A review

NA Khan, A Awang, SAA Karim - IEEE access, 2022 - ieeexplore.ieee.org
… In this review, we aim to provide a broader perspective and focused on each possible
point in pursuance to secure IoT. To accomplish the aim we scrutinized different threats and …

A decentralized approach for security and privacy challenges in the internet of things

AF Skarmeta, JL Hernandez-Ramos… - … on Internet of Things …, 2014 - ieeexplore.ieee.org
… vision of smart objects as part of our personal space, in which the identity of objects and
users … be properly addressed through the corresponding security and privacy mechanisms. In …

The future internet of things: Secure, efficient, and model-based

JE Siegel, S Kumar, SE Sarma - IEEE Internet of Things Journal, 2017 - ieeexplore.ieee.org
… Therefore, we choose to implement privacy- and security-protecting elements in our architecture
at multiple points, … The first element in our tiered approach is the Security Layer. The …

Security and privacy in the industrial internet of things: Current standards and future challenges

T Gebremichael, LPI Ledwaba, MH Eldefrawy… - IEEE …, 2020 - ieeexplore.ieee.org
… We discuss how secure connectivity can be achieved in the IIoT by outlining a holistic … each
other; what security vulnerabilities could potentially arise at various points; and what needs …