A taxonomy of security and privacy requirements for the Internet of Things (IoT)
I Alqassem, D Svetinovic - 2014 IEEE International Conference …, 2014 - ieeexplore.ieee.org
… However, security and privacy requirements are … security-related requirements of IoT
heterogeneous systems are decomposed into a taxonomy of quality attributes, and existing security …
heterogeneous systems are decomposed into a taxonomy of quality attributes, and existing security …
[HTML][HTML] Security trends in Internet of Things: A survey
… basic security requirements, as depicted in Table 5. In this analysis, we investigate the
parameters of the technique used and the security requirements satisfied by each one of them. …
parameters of the technique used and the security requirements satisfied by each one of them. …
Internet of things security analysis
G Gan, Z Lu, J Jiang - 2011 international conference on internet …, 2011 - ieeexplore.ieee.org
… develop, the security requirements of it is increasingly urgent, we need to figure out the
special security requirements, then consider how to provide end to end security protection. How …
special security requirements, then consider how to provide end to end security protection. How …
SecIoT: a security framework for the Internet of Things
… with other comprehensive security frameworks, for example, the frameworks in 9, 10, our
framework pays particular attention to user requirements including security requirements for IoT …
framework pays particular attention to user requirements including security requirements for IoT …
Embedded security for Internet of Things
… consider the embedded device security only, assuming that network security is properly in
… to different security attacks. In this work, we provide the requirements of embedded security, …
… to different security attacks. In this work, we provide the requirements of embedded security, …
Security of the Internet of Things: perspectives and challenges
Q Jing, AV Vasilakos, J Wan, J Lu, D Qiu - Wireless networks, 2014 - Springer
… With different application contexts and different security requirements, we can provide different
security architectures to solve the corresponding security issues. This means IoT security …
security architectures to solve the corresponding security issues. This means IoT security …
Study on security architecture in the Internet of Things
L Li - Proceedings of 2012 international conference on …, 2012 - ieeexplore.ieee.org
… The overall security requirement of the Internet of Things is in fact an integration of security
… processing, and that the ultimate aim of security is to guarantee the confidentiality, integrality, …
… processing, and that the ultimate aim of security is to guarantee the confidentiality, integrality, …
Proposed embedded security framework for internet of things (iot)
… Security requirements for IoT will certainly underline the importance of properly formulated,
implemented, and enforced security … and analysis of embedded security, especially in the …
implemented, and enforced security … and analysis of embedded security, especially in the …
Security challenges and requirements for smart internet of things applications: A comprehensive analysis
… This paper attempts to highlight the security challenges and requirements of smart IoT
applications. It intends to analyze the security concerns of IoT applications for improved security …
applications. It intends to analyze the security concerns of IoT applications for improved security …
A comprehensive study of security of internet-of-things
… Moreover, we define the security requirements in the context of IoT. Then, in Section IV, we
describe possible attacks against IoT. We summarize countermeasures against these attacks …
describe possible attacks against IoT. We summarize countermeasures against these attacks …