Security Challenges in the IP-based Internet of Things
… and general security needs. We then present challenges and requirements for IP-based
security solutions and highlight specific technical limitations of standard IP security protocols. …
security solutions and highlight specific technical limitations of standard IP security protocols. …
On security challenges and open issues in Internet of Things
… security requirements. However, the current design of IoT does not effectively address the
higher security requirements … systems have shown that novel security solutions are needed to …
higher security requirements … systems have shown that novel security solutions are needed to …
A survey on internet of things security from data perspectives
… The security requirement of this scenario is not high while the demands for low power-cost
and low latency are stricter [23]. Hatzivasilis et al. [24] evaluated 52 block ciphers and 360 …
and low latency are stricter [23]. Hatzivasilis et al. [24] evaluated 52 block ciphers and 360 …
An in-depth analysis of IoT security requirements, challenges, and their countermeasures via software-defined security
… reviews the threats, security requirements, challenges, and the … We further elaborated
SDN-based IoT security solutions to … homes against Internet traffic analysis,” IEEE Internet Things J.…
SDN-based IoT security solutions to … homes against Internet traffic analysis,” IEEE Internet Things J.…
A federated architecture approach for Internet of Things security
… In this context security requirements and architectures must be properly formulated, … the
security policies during their life-cycle. This paper provides a survey and analysis of security in …
security policies during their life-cycle. This paper provides a survey and analysis of security in …
On the design of security mechanisms for the internet of things
S Pal, M Hitchens… - 2017 Eleventh International …, 2017 - ieeexplore.ieee.org
… We propose a set of security requirements for IoT systems and describe a novel … In section
V, we discuss our approach to IoT security requirements based on the various threats and …
V, we discuss our approach to IoT security requirements based on the various threats and …
[HTML][HTML] A roadmap for security challenges in the Internet of Things
AR Sfar, E Natalizio, Y Challal, Z Chtourou - Digital Communications and …, 2018 - Elsevier
… 5-layer protocol stack and considered security requirements and solutions for each layer.
This work focused exclusively on security issues based on some standardization efforts …
This work focused exclusively on security issues based on some standardization efforts …
Security challenges of the Internet of Things
MG Samaila, M Neto, DAB Fernandes… - … the internet of things …, 2017 - Springer
… basic concepts of security and security requirements in the context of IoT. We then consider
fundamental security issues in the IoT and thereafter highlight the security issues that need …
fundamental security issues in the IoT and thereafter highlight the security issues that need …
Introduction to the Internet of Things security: Standardization and research challenges
S Elbouanani, MA El Kiram… - … Assurance and Security …, 2015 - ieeexplore.ieee.org
… Any security architecture must address the security requirements of the object itself with its
OS and computational capabilities, the mobile and the cloud parts. The security and privacy of …
OS and computational capabilities, the mobile and the cloud parts. The security and privacy of …
Securing the Internet of Things: Challenges, threats and solutions
… After determining the security requirements and the challenges that the IoT generates,
we focus our attention on the potential threats and the corresponding countermeasures. In …
we focus our attention on the potential threats and the corresponding countermeasures. In …