A review on privacy requirements and application layer security in internet of things (IoT)

KS Sudha, N Jeyanthi - Cybernetics and Information Technologies, 2021 - sciendo.com
… scheme was performed using AVIPSA tool and the internet security protocols also proved
their predominance in satisfying the security requirements of the smart home environment. In …

A review on the security of the internet of things: Challenges and solutions

OI Abiodun, EO Abiodun, M Alawida… - Wireless Personal …, 2021 - Springer
… Such security requirements in the domain of the IoTs is … The security requirements of IoT
are presented in Table 2. … their security and privacy components regarding the requirements. …

Internet-of-things security and vulnerabilities: Taxonomy, challenges, and practice

K Chen, S Zhang, Z Li, Y Zhang, Q Deng, S Ray… - … and Systems Security, 2018 - Springer
… In Section 6, we analyze the design security framework and security mechanism from …
security assurance from the point of view of system design. First, we analyze several requirements

Internet of things (IoT) security: Current status, challenges and prospective measures

R Mahmoud, T Yousuf, F Aloul… - … conference for internet …, 2015 - ieeexplore.ieee.org
The paper presents a survey and analysis on the current status and concerns of Internet of
things (IoT) security. The IoT framework aspires to connect anyone with anything at anywhere. …

Recommendations on the internet of things: Requirements, challenges, and directions

L Yao, X Wang, QZ Sheng, S Dustdar… - IEEE Internet …, 2019 - ieeexplore.ieee.org
… This paper discusses some of the important requirements and key challenges to enable
effective … This paper discusses the requirements and challenges and identifies the directions for …

The internet of things: Challenges & security issues

GS Matharu, P Upadhyay… - … conference on emerging …, 2014 - ieeexplore.ieee.org
… This paper briefs the idea of Internet of Things (IoT) and the … security requirements of
the Internet of Things encompass security of physical nodes, information acquisition security

Privacy and security requirements framework for the internet of things (IoT)

I Alqassem - Companion Proceedings of the 36th International …, 2014 - dl.acm.org
Capturing privacy and security requirements in the very early stages is essential for creating …
such as the Internet of Things (IoT). However, traditional requirements engineering methods …

Analysis of security standardization for the internet of things

I Hwang, YG Kim - 2017 International Conference on Platform …, 2017 - ieeexplore.ieee.org
… technical requirements for oneM2M. There are 63 security requirements are listed for security
about them. TS-0003 defines security solution applicable within the M2M system including …

A survey on industrial Internet of Things security: Requirements, attacks, AI-based solutions, and edge computing opportunities

B Alotaibi - Sensors, 2023 - mdpi.com
… This paper concentrates on the security requirements for IIoT environments, investigates
possible attacks targeting these environments, explores security solutions that protect IIoT …

Authorization schemes for internet of things: requirements, weaknesses, future challenges and trends

A Khan, A Ahmad, M Ahmed, J Sessa… - Complex & Intelligent …, 2022 - Springer
… The proposed scheme meets security requirements such as heterogeneity and robustness
against cryptanalysis attacks while maintaining the low cost of implementation. In 2019, Ding …