On the security aspects of Internet of Things: A systematic literature review
ELC Macedo, EAR De Oliveira, FH Silva… - Journal of …, 2019 - ieeexplore.ieee.org
… They also point out security … , “Security and privacy preservation scheme of face identification
and resolution framework using fog computing in internet of things,” IEEE Internet Things J., …
and resolution framework using fog computing in internet of things,” IEEE Internet Things J., …
[PDF][PDF] Internet of things (IoT) security: current status, challenges and countermeasures
T Yousuf, R Mahmoud, F Aloul… - … for Information Security …, 2015 - shop.iotone.ir
… security issues at perception layer can be coped with by using encryption (which can be
point-to-point … Further security measures and protocols to address this issue are given in Section …
point-to-point … Further security measures and protocols to address this issue are given in Section …
Fog computing for the internet of things: Security and privacy issues
… Because the bloom filter size is directly related to the resource consumption, we start
from the point of analyzing the bloom filter size in our scheme and compare it with other revocation …
from the point of analyzing the bloom filter size in our scheme and compare it with other revocation …
Security Challenges in the IP-based Internet of Things
… – Security bootstrapping denotes the process by which a thing securely joins the IoT at a
given location and point in time. Bootstrapping includes the authentication and authorization of …
given location and point in time. Bootstrapping includes the authentication and authorization of …
Security challenges and concerns of Internet of Things (IoT)
A Bhattacharjya, X Zhong, J Wang, X Li - … Systems: architecture, security …, 2019 - Springer
… Security (DTLS) as our security protocol that depends on this protocol stack. Alike the security
needs in traditional networks, such as the Internet… The Second point is that if we think about …
needs in traditional networks, such as the Internet… The Second point is that if we think about …
Internet of things (IoT) security: Current status, challenges and prospective measures
R Mahmoud, T Yousuf, F Aloul… - … conference for internet …, 2015 - ieeexplore.ieee.org
… The above listed security issues at perception layer can be addressed by using encryption
(which can be point-to-point … Further security measures and protocols are given in Section IV. …
(which can be point-to-point … Further security measures and protocols are given in Section IV. …
Security in Internet of Things: A review
… In this review, we aim to provide a broader perspective and focused on each possible
point in pursuance to secure IoT. To accomplish the aim we scrutinized different threats and …
point in pursuance to secure IoT. To accomplish the aim we scrutinized different threats and …
A decentralized approach for security and privacy challenges in the internet of things
AF Skarmeta, JL Hernandez-Ramos… - … on Internet of Things …, 2014 - ieeexplore.ieee.org
… vision of smart objects as part of our personal space, in which the identity of objects and
users … be properly addressed through the corresponding security and privacy mechanisms. In …
users … be properly addressed through the corresponding security and privacy mechanisms. In …
The future internet of things: Secure, efficient, and model-based
… Therefore, we choose to implement privacy- and security-protecting elements in our architecture
at multiple points, … The first element in our tiered approach is the Security Layer. The …
at multiple points, … The first element in our tiered approach is the Security Layer. The …
Security and privacy in the industrial internet of things: Current standards and future challenges
… We discuss how secure connectivity can be achieved in the IIoT by outlining a holistic … each
other; what security vulnerabilities could potentially arise at various points; and what needs …
other; what security vulnerabilities could potentially arise at various points; and what needs …