A survey on IoT platforms: Communication, security, and privacy perspectives
Abstract The Internet of Things (IoT) redefines the way how commodity and industrial tasks
are performed every day. The integration of sensors, lightweight computation, and the …
are performed every day. The integration of sensors, lightweight computation, and the …
Blockchain at the edge: Performance of resource-constrained IoT networks
The proliferation of IoT in various technological realms has resulted in the massive spurt of
unsecured data. The use of complex security mechanisms for securing these data is highly …
unsecured data. The use of complex security mechanisms for securing these data is highly …
The future of IoT
J Ploennigs, J Cohn… - IEEE Internet of Things …, 2018 - ieeexplore.ieee.org
The Internet of Things (IoT) is infiltrating many businesses. It provides simple means to
collect and analyze technical system data to identify and optimize the performance of many …
collect and analyze technical system data to identify and optimize the performance of many …
[图书][B] Security and privacy in Internet of things (IoTs): Models, Algorithms, and Implementations
F Hu - 2016 - books.google.com
The Internet of Things (IoT) has attracted strong interest from both academia and industry.
Unfortunately, it also has attracted the attention of hackers. Security and Privacy in Internet of …
Unfortunately, it also has attracted the attention of hackers. Security and Privacy in Internet of …
Critical Internet of Things: An interworking solution to improve service reliability
MCC is essential for public safety, service efficiency improvement, and economic growth
sustainability. MCC services demand an extremely fast response rate. On the other hand …
sustainability. MCC services demand an extremely fast response rate. On the other hand …
Blockchain based trust management mechanism for IoT
Security presents a significant challenge for the implementation and the realization of IoT
scenarios. Its requirements include data confidentiality, authentication, access control as …
scenarios. Its requirements include data confidentiality, authentication, access control as …
Realizing an internet of secure things: A survey on issues and enabling technologies
Since the term first coined in 1999, the Internet of Things (IoT) has gained significant
momentum in connecting physical objects to the Internet and facilitating machine-to-human …
momentum in connecting physical objects to the Internet and facilitating machine-to-human …
IoT security: Review, blockchain solutions, and open challenges
MA Khan, K Salah - Future generation computer systems, 2018 - Elsevier
With the advent of smart homes, smart cities, and smart everything, the Internet of Things
(IoT) has emerged as an area of incredible impact, potential, and growth, with Cisco Inc …
(IoT) has emerged as an area of incredible impact, potential, and growth, with Cisco Inc …
Security and internet of things: benefits, challenges, and future perspectives
H Taherdoost - Electronics, 2023 - mdpi.com
Due to the widespread use of the Internet of Things (IoT), organizations should concentrate
their efforts on system security. Any vulnerability could lead to a system failure or …
their efforts on system security. Any vulnerability could lead to a system failure or …
Enhancing IoT data dependability through a blockchain mirror model
A Bellini, E Bellini, M Gherardelli, F Pirri - Future Internet, 2019 - mdpi.com
The Internet of Things (IoT) is a remarkable data producer and these data may be used to
prevent or detect security vulnerabilities and increase productivity by the adoption of …
prevent or detect security vulnerabilities and increase productivity by the adoption of …