Developing secure IoT services: A security-oriented review of IoT platforms
D Díaz López, M Blanco Uribe, C Santiago Cely… - Symmetry, 2018 - mdpi.com
… Additionally, IoT service developers may also use this work as a base for selecting the
correct platform to deploy solid and secure applications. This work evaluates existing IoT …
correct platform to deploy solid and secure applications. This work evaluates existing IoT …
Artificial intelligence for securing IoT services in edge computing: a survey
Z Xu, W Liu, J Huang, C Yang, J Lu… - Security and …, 2020 - Wiley Online Library
… secure IoT services because of its ability to augment the analytical capabilities of IoT devices
and there actually exist security … So, to further secure IoT services, reliable backup security …
and there actually exist security … So, to further secure IoT services, reliable backup security …
A secure IoT service architecture with an efficient balance dynamics based on cloud and edge computing
… We set the following: for general IoT services, the transfer time from the user to the cloud is
26 ms. However, for novel IoT-Cloud services based on edge (BOE) computing, the transfer …
26 ms. However, for novel IoT-Cloud services based on edge (BOE) computing, the transfer …
Secure IoT architecture for integrated smart services environment
… smart services environment, the raising security issues of different nature must be … security
architecture for integrated IoT Smart Services Environment which could resolve the security …
architecture for integrated IoT Smart Services Environment which could resolve the security …
Design and implementation of the secure compiler and virtual machine for developing secure IoT services
… We aimed to implement secure executing environments for IoT services by proposing a VM-…
develop and execute secure software for IoT services. Today, the security schemes of most …
develop and execute secure software for IoT services. Today, the security schemes of most …
The design of secure IoT applications using patterns: State of the art and directions for research
… need a secure development methodology and we survey IoT development methodologies;
we find that none of them considers security or … Secure orchestration of IoT services has been …
we find that none of them considers security or … Secure orchestration of IoT services has been …
Secure IoT framework and 2D architecture for End-To-End security
… an secure IoT framework to ensure an End-To-End security from an IoT application to IoT
devices. … Our framework provides the IoT services with the End-To-End security feature from the …
devices. … Our framework provides the IoT services with the End-To-End security feature from the …
Augmented reality based smart city services using secure iot infrastructure
B Pokrić, S Krco, M Pokrić - 2014 28th international conference …, 2014 - ieeexplore.ieee.org
… markers and the data is provided via secure IoT infrastructure. The IoT infrastructure is
based on bus-mounted IoT devices which utilize secure CoAP software protocol to transmit the …
based on bus-mounted IoT devices which utilize secure CoAP software protocol to transmit the …
SDN-enabled secure IoT architecture
… to secure IoT infrastructure using real life IoT scenarios and … as well as detecting malicious
IoT devices. The contributions … in our SIS services architecture for secure provisioning of IoT …
IoT devices. The contributions … in our SIS services architecture for secure provisioning of IoT …
Internet of Things (IoT) smart and secure service delivery
… By nature, IoT devices and services are vulnerable to malicious cyber threats as they cannot
… received by enterprise services within an enterprise perimeter. While IoT services will play …
… received by enterprise services within an enterprise perimeter. While IoT services will play …