A Survey on Internet of Things: Security and Privacy Issues
Citations
761 citations
Cites background from "A Survey on Internet of Things: Sec..."
...Figure 2) [12, 37, 74, 65, 33, 73, 2, 71, 30]....
[...]
...With the increasing number of interconnected CPPS and the possibility to use Big Data techniques to analyze data collected by CPPS, privacy becomes a fundamental aspect [42, 30]....
[...]
...The foundation of Industrial IoT are cyberphsical systems (CPS), which are computing platforms that monitor and control physical processes [30]....
[...]
616 citations
Cites background from "A Survey on Internet of Things: Sec..."
...Authors in [17], [18] addressed the security and privacy issues in IoT at each layer identified in the 3-layer architecture [3]....
[...]
553 citations
Cites background from "A Survey on Internet of Things: Sec..."
...Other issues associated with a centralized model are of security [76], [77], data privacy [78] and the trust inherently required in using centralized servers [79]....
[...]
543 citations
Cites background from "A Survey on Internet of Things: Sec..."
...For example, Surveys [11]–[17] reviewed extant research and classified the challenges in encryption, authentication, access control, network security and application security in IoT systems....
[...]
...For example, Surveys [13-19] reviewed extant research and classified the challenges in encryption, authentication, access control, network security and application security in IoT systems....
[...]
432 citations
Cites background from "A Survey on Internet of Things: Sec..."
...In [14, 74, 127, 137, 108, 66], authors underlined the security challenges and issues in IoT without discussing the various solutions proposed for these challenges....
[...]
References
12,539 citations
3,499 citations
2,542 citations
"A Survey on Internet of Things: Sec..." refers background in this paper
...1 Definition of Internet of Things [1]....
[...]
...In addition, we identified several open issues related to the security and privacy that need to be addressed by research community to make a secure and trusted platform for the delivery of future Internet of Things....
[...]
...1, the IoTs allow people and things to be connected anytime, anyplace, with anything and anyone, ideally using any path/network and any service [1]....
[...]
...Internet of Things virtually is a network of real world systems with real-time interactions....
[...]
...what we want, and what we need and act accordingly without explicit instructions [1]....
[...]
723 citations
"A Survey on Internet of Things: Sec..." refers methods in this paper
...From the transport layer and an application perspective, the introduction of the IETF CoAP protocol family has been instrumental in ensuring that application layers and applications themselves do not need to be re-engineered to run over low-power embedded networks [3]....
[...]
388 citations
"A Survey on Internet of Things: Sec..." refers background in this paper
...Privacy Concerns in IOTs The Internet security glossary [9] defines privacy as "the right of an entity (normally a person), acting in its own behalf, to determine the degree to which it will interact with its environment, including the degree to which the entity is willing to share information about itself with others"....
[...]