[PDF][PDF] Internet of things (IoT) security: current status, challenges and countermeasures

T Yousuf, R Mahmoud, F Aloul… - International Journal for …, 2015 - shop.iotone.ir
This paper presents a survey and an analysis of the current status and concerns of Internet
of things (IoT) security. The IoT framework aspires to connect anyone with anything …

[引用][C] A critical cybersecurity analysis and future research directions for the internet of things: a comprehensive review

U Tariq, I Ahmed, AK Bashir, K Shaukat - Sensors, 2023 - MDPI

[图书][B] Practical internet of things security

B Russell, D Van Duren - 2016 - books.google.com
A practical, indispensable security guide that will navigate you through the complex realm of
securely building and deploying systems in our IoT-connected world About This Book Learn …

Internet of Things: A survey on the security of IoT frameworks

M Ammar, G Russello, B Crispo - Journal of Information Security and …, 2018 - Elsevier
Abstract The Internet of Things (IoT) is heavily affecting our daily lives in many domains,
ranging from tiny wearable devices to large industrial systems. Consequently, a wide variety …

Internet of things security: challenges and key issues

M Azrour, J Mabrouki, A Guezzaz… - Security and …, 2021 - Wiley Online Library
Internet of Things (IoT) refers to a vast network that provides an interconnection between
various objects and intelligent devices. The three important components of IoT are sensing …

Securing the IP-based internet of things with HIP and DTLS

O Garcia-Morchon, SL Keoh, S Kumar… - Proceedings of the sixth …, 2013 - dl.acm.org
The IP-based Internet of Things (IoT) refers to the pervasive interaction of smart devices and
people enabling new applications by means of new IP protocols such as 6LoWPAN and …

Security protocols for IoT

J Cynthia, H Parveen Sultana, MN Saroja… - … and computing security …, 2019 - Springer
Abstract The Internet of Things (IoT), is a network of devices that are uniquely identified and
has embedded software required to communicate the transient states and data that are …

[引用][C] Security Considerations in the IP-based Internet of Things

O Garcia-Morchon, S Kumar, R Struik, S Keoh… - Working Draft, IETF …, 2013

[HTML][HTML] IoT: Communication protocols and security threats

A Gerodimos, L Maglaras, MA Ferrag, N Ayres… - Internet of Things and …, 2023 - Elsevier
In this study, we review the fundamentals of IoT architecture and we thoroughly present the
communication protocols that have been invented especially for IoT technology. Moreover …

Evolution and trends in IoT security

R Román-Castro, J López, S Gritzalis - Computer, 2018 - ieeexplore.ieee.org
The amount and diversity of devices that integrate connection capabilities continues to grow,
and both the public and private sectors continue to explore various application areas and …
为了回应用户根据美国数字千年版权法案 (DMCA) 向我们提交的投诉,我们已从此页上移除了 1 个结果。如果需要,您可以访问 LumenDatabase.org,查看导致结果遭到移除的 DMCA 投诉内容